Bob Violino

Contributing Writer

Bob Violino is a freelance writer who covers a variety of technology and business topics.

How and where to use serverless computing

Edge computing best practices

Edge computing best practices

Edge computing requires a change in thinking from the current IT environment dominated by data centers and cloud-based services. Here are some best practices to consider when building a strategy for the edge.

Hyperconvergence: Not just for specific workloads anymore

Hyperconvergence: Not just for specific workloads anymore

Hyperconvergence has come a long way in a relatively short time, and enterprises are taking advantage of the new capabilities.

IoT analytics guide: What to expect from Internet of Things data

IoT analytics guide: What to expect from Internet of Things data

Data capture, data governance, and availability of services are among the biggest challenges IT will face in creating an IoT analytics environment. IoT analytics will also place new pressures on network infrastructure. Depending on...

A corporate guide to addressing IoT security concerns

A corporate guide to addressing IoT security concerns

The benefits of the internet of things are potentially great and can be achieved with less risk of harm by following these steps

IoT: A vulnerable asset but also a tool in disaster recovery

IoT: A vulnerable asset but also a tool in disaster recovery

Digital twins within Internet of Things (IoT) systems, which represent a live, updated digital state of a collection of resources, could be used in a disaster-recovery situation.

3 real-world examples of IoT rolled out in the enterprise

3 real-world examples of IoT rolled out in the enterprise

Without network support, businesses may not be able to reap all the benefits of the data IoT generates.

IoT standards battles could get messy

IoT standards battles could get messy

As enterprises start to think about building Internet of Things (IoT) networks, the key question becomes: What’s happening on the standards front?

What it takes to be a security architect

What it takes to be a security architect

While the path to security architect varies, anyone considering the role should have a passion for IT infrastructure and protecting data.

What it takes to be a security consultant

What it takes to be a security consultant

The move to security consultant can be rewarding and challenging (in a good way), but be prepared to market and sell yourself and your services.

What it takes to become a chief information security officer (CISO)

What it takes to become a chief information security officer (CISO)

A CISO typically has a technical information security or IT risk background, but the path that leads to the role can vary greatly. Here’s how one CISO landed his first job in the position.

Machine learning proves its worth to business

Machine learning proves its worth to business

AI on the verge: Early adopters reap business benefits, as machine learning nears the mainstream

Load More