Verified Document

Big Data Annotated Bibliography Annotated Bibliography

Perera has vast experience in computing and technology as he is a member of the Commonwealth Scientific and Industrial Research Organization alongside publishing numerous journals. Georgakopoulos is the Director of Information Engineering Laboratory. He has published over 100 journals on issues related to science and technology (Big Data). Cohen, J., Dolan, B., Dunlap, M., Hellerstein, J.M., & Welton, C. (2009). MAD Skills: New

Analysis Practices for Big Data. Proc. VLDB Endow., 2(2), 1481 -- 1492.

The article focuses on the Magnetic, Agile, Deep (MAD) that proves more effective in data analysis than the traditional Enterprise Data Warehouse and Business Intelligence. The strength of their article lies on the fact that, it presents the philosophy behind the design of the technology, techniques, and positive experiences associated with the use of the MAD technology of data analysis. The authors provide more insight into the benefits of the technology in contributing to the realization of the objectives of the Big Data that, the system supports agility of data analysis and provides sophisticated data statistical techniques for data analysis. The most contribution to the study is the approaches presented used by the technology as presented by the authors. The study also is significant as it provides directions for future directions of the MAD technology and recommendations applicable in improving the future outcomes of data storage and analysis.

Author Notes: The authors of this article have a variety of professional backgrounds. Cohen has vast experience in programming; Dunlap works with the Evergreen Technologies, and Hellerstein works with the Berkeley University. Welton works with the Greenplum as Senior Director of Programming Services.

Herodotou, H., Lim, H., Luo, G., Borisov, N., Dong, L., Cetin, F.B., & Babu, S. (2011). Starfish?: A Self-tuning System for Big Data Analytics. CIDR, 11, 261 -- 272. doi:10.1.1.222.6934

The authors of this article introduce the Starfish, one of the self-tunings systems that ensure the effectiveness and efficiency of the big data. The starfish provides automation of activities without the need for manual tuning of knobs in the Hadoop. The starfish combines the principles of agility, depth, and magnetism that constitute the previously analyzed MAD to ensure effectiveness of the big data in information storage and analysis. The authors strengthened their...

The article proves applicable for the study because, starfish focuses enhancing optimization of organizational activities using different principles such as the principle of thumb for parameter tuning and dynamic instrumentation that influence the effectiveness of data storage and analysis.
Author Notes: The authors work at the Duke University, Department of Computer Science. They are also senior researchers at Data Management, Exploration and Mining (DMX). Long works as an associate professor at the Baylor University. Borisov has published over 150 studies similar to Luo, Cetin and Babu's.

Grove, R. (2009). Web Based Application Development. Jones & Bartlett Learning.

Grove (2009) provides a detailed analysis of web based theories, concepts, tools, languages, and practices that can be used in the development of systems aiming at eliminating security threats. The author also provides fundamental applications that can be used to put Big Data ideas and other programming related interventions into practice. The book is important for the study as it provides theoretical frameworks applicable in the development of reliable architecture of for handling cyber related insecurities.

Author Notes: Grove teaches SoftWare Engineering in the Department of Computer Science, Madison University.

Peitz, M., & Waldfogel, J. (2012). The Oxford handbook of the digital economy. New York:

Peitz and Waldfogel (2012)'s book provides an up-to-date analysis of the main concerns associated with digital technology having an impact on the global security. The book is important for the study because it provides a pathway for conducting research on issues related to data storage affecting the global environment. It focuses on the key problems facing large industries, businesses, and issues associated with data storage and digital industry.

Author Notes: Peitz works with the University of Manheim as a Professor of Economics. He has published numerous journals and books such as Regulation and Entry into Telecommunications Markets. Waldfogel works with the Carlson School of Management, Minnesota as a professor of Applied Economics. He has published over 50 articles and 2 books such as, Scroogenomics: Why You Shouldn't Buy Presents for the Holidays.

Sources used in this document:
Peitz, M., & Waldfogel, J. (2012). The Oxford handbook of the digital economy. New York:

Peitz and Waldfogel (2012)'s book provides an up-to-date analysis of the main concerns associated with digital technology having an impact on the global security. The book is important for the study because it provides a pathway for conducting research on issues related to data storage affecting the global environment. It focuses on the key problems facing large industries, businesses, and issues associated with data storage and digital industry.

Author Notes: Peitz works with the University of Manheim as a Professor of Economics. He has published numerous journals and books such as Regulation and Entry into Telecommunications Markets. Waldfogel works with the Carlson School of Management, Minnesota as a professor of Applied Economics. He has published over 50 articles and 2 books such as, Scroogenomics: Why You Shouldn't Buy Presents for the Holidays.
Cite this Document:
Copy Bibliography Citation

Related Documents

Big Data Annotated Bibliography
Words: 1639 Length: 4 Document Type: Annotated Bibliography

Authors Note: Rosenbaum is technology and retail analysts. She writes articles for the New York Times and Forbes. Saikali, A. (2013, December 30). The Target Data Breach Lawsuits: Why every Company Should Care. Data Security Law Journal. Retrieved from: http://www.datasecuritylawjournal.com/2013/12/30/the-target-data-breach-lawsuits-why-every-company-should-care/ The article provides insight on the number of lawsuits filed against different organizations and strengthens the need for the companies to protect their information from data breach. The article shows the significant

Bigger Data
Words: 1215 Length: 4 Document Type: Annotated Bibliography

component graded. The amassing of data has become an integral process of life in the 21st century (Nunan and Di Domenico, 2013, p. 2). This fact is partially reflected by the fact that in contemporary times, people are generating much more data than they previously did. Every time someone goes shopping and makes a purchase with a credit card, receives a call or sends a text message, or visits a

Annotated Bibliography Academic Honesty in Nursing Profession
Words: 2041 Length: 4 Document Type: Essay

Academic Honesty in Nursing Profession: Annotated Bibliography Kececi, A., Bulduk, S., Oruc, D. & Celik, S. (2011). Academic Dishonesty among Nursing Students: A Descriptive Study. Nursing Ethics 18(5) 725-733 This cross-sectional, descriptive research's objective is assessment of academic dishonesty in Turkish university-level nursing students. The sample size for this research was 196 students. Data collection employed two instruments, which, on an average, could be completed in about 10 to 15 minutes: 1)

Information Technology -- Annotated Bibliography Information Technology...
Words: 1128 Length: 4 Document Type: Annotated Bibliography

Information Technology -- Annotated Bibliography Information Technology Baker, N. (2011). The Borderless Enterprise. Internal Auditor, August, 28 -- 33. This article endeavors to explain the various trends in digital media. The author contends the use of digital technology is evidence of a deeper trend and shift in global culture. The article is as philosophical as it is technical. This article could be considered a technical article or a philosophy of technology article. Durkee, D.

Annotated Bibliography on Corruption
Words: 1003 Length: 4 Document Type: Essay

Barker, T. (2011). Police ethics: Crisis in law enforcement. Springfield, IL: Thomas. This book deals with problems experienced in law enforcement that demonstrate the inability of police officers to make lawful decisions. Chapter 8 deals specifically with police corruption and identifies three elements that exist in police corruption. The first is, the behave must be forbidden, the second is misuse of officer's position, and third, the reward. Although this chapter offers

Annotated Bibliography for Prisons Conditions
Words: 1321 Length: 3 Document Type: Annotated Bibliography

Aleinikoff, T. (2014). Between National and Postnational: Membership in the United States. Palgrave Macmillan UK, 110-129. http://dx.doi.org/10.1057/9780230554795 This paper focuses on the 'postnational viewpoint' to the American notion of sovereignty and membership. The author defines what postnational viewpoint is and explains it means the view that a universal model of membership is replacing national citizenship and is doing so because it is anchored within deterritorialized concepts of persons' rights. Essentially this

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now