Bob Violino

Contributing Writer

Bob Violino is a freelance writer who covers a variety of technology and business topics.

Career roadmap: Network architect

IT Career Roadmap: Infrastructure software manager

IT Career Roadmap: Infrastructure software manager

A new and growing title in IT, infrastructure software manager is becoming a vital role for organizations, especially those embarking on digital transformations.

 Can microsegmentation help IoT security?

Can microsegmentation help IoT security?

Deploying microsegmentation as part of a broad IoT security strategy can enable more granular control of network systems and better isolation if a security flaw is exploited.

7 steps to enhance IoT security

7 steps to enhance IoT security

Securing the IoT is a multi-faceted effort that requires big moves as well as small adjustments to ensure networks, systems, data and devices are protected. Here are 7 security practices you might not have considered.

How and where to use serverless computing

How and where to use serverless computing

Serverless computing is designed to automate infrastructure provisioning and eliminate the burden of server management.

Edge computing best practices

Edge computing best practices

Edge computing requires a change in thinking from the current IT environment dominated by data centers and cloud-based services. Here are some best practices to consider when building a strategy for the edge.

Hyperconvergence: Not just for specific workloads anymore

Hyperconvergence: Not just for specific workloads anymore

Hyperconvergence has come a long way in a relatively short time, and enterprises are taking advantage of the new capabilities.

IoT analytics guide: What to expect from Internet of Things data

IoT analytics guide: What to expect from Internet of Things data

Data capture, data governance, and availability of services are among the biggest challenges IT will face in creating an IoT analytics environment. IoT analytics will also place new pressures on network infrastructure. Depending on...

A corporate guide to addressing IoT security concerns

A corporate guide to addressing IoT security concerns

The benefits of the internet of things are potentially great and can be achieved with less risk of harm by following these steps

IoT: A vulnerable asset but also a tool in disaster recovery

IoT: A vulnerable asset but also a tool in disaster recovery

Digital twins within Internet of Things (IoT) systems, which represent a live, updated digital state of a collection of resources, could be used in a disaster-recovery situation.

3 real-world examples of IoT rolled out in the enterprise

3 real-world examples of IoT rolled out in the enterprise

Without network support, businesses may not be able to reap all the benefits of the data IoT generates.

IoT standards battles could get messy

IoT standards battles could get messy

As enterprises start to think about building Internet of Things (IoT) networks, the key question becomes: What’s happening on the standards front?

Load More