Bob Violino

Contributing Writer

Bob Violino is a freelance writer who covers a variety of technology and business topics.

How to assemble a highly effective analytics team

How to assemble a highly effective analytics team

The right mix of skills, strong leadership and stretch goals are just a few of the secrets to building a top-notch analytics team primed to derive lasting value from your data.

12 myths of data analytics debunked

12 myths of data analytics debunked

From data concerns to staffing needs to technology combinations, data analytics misconceptions abound. Here’s a no-bull look at how to leverage data science to deliver bona fide business results.

7 sure-fire ways to fail at data analytics

7 sure-fire ways to fail at data analytics

Data analytics is fast becoming the key to a winning business strategy. But without the right approach, skills, and tactics, your data initiatives may never add up.

The secrets of highly successful data analytics teams

The secrets of highly successful data analytics teams

Effective data teams bring diverse, cross-functional skill sets to bear on clearly defined business priorities — without losing sight of the value of experimentation and ongoing education.

The next IT jobs boom? The internet of things

The next IT jobs boom? The internet of things

Massive investments in IoT will shake up the core skills in high demand at IT organizations in the years to come. Here’s how to transform your career path to capitalize.

5 secrets of highly effective IoT strategies

5 secrets of highly effective IoT strategies

A winning internet of things strategy requires strong leadership, clearly defined roles and a dedicated team. Pioneering IT leaders offer hard-earned advice for IoT success.

The hidden pitfalls of going freelance in IT

The hidden pitfalls of going freelance in IT

Independence has its upsides and downsides. IT pros lend firsthand advice on the challenges of going solo,

The hard truths of navigating ageism in IT

The hard truths of navigating ageism in IT

In an industry that favors youth over experience, the best defense against age discrimination may be avoiding becoming a victim in the first place

IoT standards battles could get messy

IoT standards battles could get messy

As enterprises start to think about building Internet of Things (IoT) networks, the key question becomes: What’s happening on the standards front?

What it takes to be a security architect

What it takes to be a security architect

While the path to security architect varies, anyone considering the role should have a passion for IT infrastructure and protecting data.

What it takes to be a security consultant

What it takes to be a security consultant

The move to security consultant can be rewarding and challenging (in a good way), but be prepared to market and sell yourself and your services.

What it takes to become a chief information security officer (CISO)

What it takes to become a chief information security officer (CISO)

A CISO typically has a technical information security or IT risk background, but the path that leads to the role can vary greatly. Here’s how one CISO landed his first job in the position.

Ultimate guide to strategic tech partners

Ultimate guide to strategic tech partners

In today’s fast-changing vendor landscape, market leaders are facing new challengers in security, data center, cloud, networking and wireless.

Machine learning proves its worth to business

Machine learning proves its worth to business

AI on the verge: Early adopters reap business benefits, as machine learning nears the mainstream

Continuous authentication: Why it’s getting attention and what you need to know

Continuous authentication: Why it’s getting attention and what you need to know

In some cases traditional authentication processes are not enough to provide strong security throughout a user work session. That’s where continuous authentication comes in.

Are companies doing enough on the IoT security front?

Are companies doing enough on the IoT security front?

If security executives thought they had a lot to handle with the growth of mobile devices and the expanding digital enterprise, the emergence of connected products, corporate assets, vehicles and other “things” is taking security...

Hyperconvergence: What’s all the hype about?

Hyperconvergence: What’s all the hype about?

One of the hottest trends in data center technology is hyperconvergence, with early adopters reaping the benefits of cost savings, enhanced data protection, increased scalability and ease of management. So, what is hyperconvergence?...

Dyn attack highlights 2016 security woes

Dyn attack highlights 2016 security woes

This has been another eventful year in the realm of cyber security—with a number of high-profile data breaches that affected large numbers of people and technological developments that promise to impact the market for years to come.

To the cloud! Real-world container migrations

To the cloud! Real-world container migrations

Forward-thinking organizations offer real-world lessons for containerizing enterprise apps for the cloud

Robots present a cyber risk

Robots present a cyber risk

The prospect of an army of robots marching in unison to launch an attack on an unsuspecting city belongs in the realm of science fiction—as do most images of menacing autonomous machines wreaking all kinds of havoc on civilization.

Load More