Stories by Bob Violino

7 steps to enhance IoT security

Securing the IoT is a multi-faceted effort that requires big moves as well as small adjustments to ensure networks, systems, data and devices are protected. Here are 7 security practices you might not have considered.

Edge computing best practices

Edge computing requires a change in thinking from the current IT environment dominated by data centers and cloud-based services. Here are some best practices to consider when building a strategy for the edge.

Hyperconvergence: Not just for specific workloads anymore

Hyperconvergence is appealing for more workloads now that systems can independently scale compute and storage capacity via a disaggregated model. The ability to create a hyperconverged solution using NVMe over fabrics is another draw.

IoT analytics guide: What to expect from Internet of Things data

Data capture, data governance, and availability of services are among the biggest challenges IT will face in creating an IoT analytics environment. IoT analytics will also place new pressures on network infrastructure. Depending on the application and industry, IoT’s requirements will create more demand for additional bandwidth and less tolerance of latency within the network infrastructure.

IoT: A vulnerable asset but also a recovery tool in disasters

If you think the proliferation of mobile devices changed the concept of the network edge, get ready for the emerging Internet of Things (IoT), where a network-connected sensor could be located on top of a mountain, in a corn field or even in the ocean.

12 myths of data analytics debunked

From data concerns to staffing needs to technology combinations, data analytics misconceptions abound. Here’s a no-bull look at how to leverage data science to deliver bona fide business results.