Stories by Bob Violino

Edge computing best practices

Edge computing requires a change in thinking from the current IT environment dominated by data centers and cloud-based services. Here are some best practices to consider when building a strategy for the edge.

Hyperconvergence: Not just for specific workloads anymore

Hyperconvergence is appealing for more workloads now that systems can independently scale compute and storage capacity via a disaggregated model. The ability to create a hyperconverged solution using NVMe over fabrics is another draw.

IoT analytics guide: What to expect from Internet of Things data

Data capture, data governance, and availability of services are among the biggest challenges IT will face in creating an IoT analytics environment. IoT analytics will also place new pressures on network infrastructure. Depending on the application and industry, IoT’s requirements will create more demand for additional bandwidth and less tolerance of latency within the network infrastructure.

Does your title match your authority?

Security executives have taken on much more responsibility and visibility in recent years as threats to corporate information assets and physical resources have increased.

7 ways to work around security compliance problems

Regulations aimed at protecting the security and privacy of organizations and individuals are well meaning. But sometimes these standards, or how they're interpreted, can be more than a nuisance--they can actually contribute to weaker security.

The top 8 security threats of 2013

The past year has seen its share of newly emerging or persistent threats that security and IT executives need to be aware of and in many cases defend against.

A clear-eyed guide to Android's actual security risks

If you're an Android user -- or want to be -- you've likely heard about all the security risks of Google's mobile operating system. But how real are these threats, and how much damage can they do? Despite the fears, are Android devices actually a safe bet for an enterprise mobility strategy?

What the Internet of Things means for security

You've probably been hearing a lot lately about the Internet of Things (IoT). The IoT (see: "The IoT: A Primer" at the end of this piece), while still in the early stages of development, is slowly making its way into the mainstream as more objects become connected via technology such as radio frequency identification (RFID) and the iniquitousness of the Internet.

[]