Bob Violino

Contributing Writer

Bob Violino is a freelance writer who covers a variety of technology and business topics.

IoT analytics guide: What to expect from Internet of Things data

IoT analytics guide: What to expect from Internet of Things data

Data capture, data governance, and availability of services are among the biggest challenges IT will face in creating an IoT analytics environment. IoT analytics will also place new pressures on network infrastructure. Depending on...

The 7 fundamentals of IT consultant success

The 7 fundamentals of IT consultant success

Looking to strike out on your own? IT consultants reveal the skills and practices you’ll need to succeed as an independent IT pro.

Essential skills and traits of elite data scientists

Essential skills and traits of elite data scientists

These days the data scientist is king. But extracting true business value from data requires a unique combination of technical skills, mathematical know-how, storytelling, and intuition.

How to choose the right NoSQL database

How to choose the right NoSQL database

NoSQL databases vary in architecture and function, so you need to pick the type that is best for the desired task

Risky AI business: Navigating regulatory and legal dangers to come

Risky AI business: Navigating regulatory and legal dangers to come

Artificial intelligence poses a wide range of hidden and unknown dangers for enterprises deploying the technology. Here’s how to guard against the legal and compliance risks of AI.

The unexpected benefits of data analytics

The unexpected benefits of data analytics

Data analytics can uncover surprising insights that lead to unexpected new program or product ideas, as these six real-world examples show.

Safeguarding your biggest cybersecurity target: Executives

Safeguarding your biggest cybersecurity target: Executives

Top execs make big targets, especially when traveling abroad. Here’s how to protect C-level officers from whaling, espionage, and themselves.

IoT: A vulnerable asset but also a tool in disaster recovery

IoT: A vulnerable asset but also a tool in disaster recovery

Digital twins within Internet of Things (IoT) systems, which represent a live, updated digital state of a collection of resources, could be used in a disaster-recovery situation.

What is data mining? How analytics uncovers insights

What is data mining? How analytics uncovers insights

Data mining is the automated process of sorting through huge data sets to identify trends and patterns and establish relationships

3 real-world examples of IoT rolled out in the enterprise

3 real-world examples of IoT rolled out in the enterprise

Without network support, businesses may not be able to reap all the benefits of the data IoT generates.

Guide to the top college and university cyber security degree programs

Guide to the top college and university cyber security degree programs

CISOs and CSOs should be heartened by the fact that more colleges and universities are offering academic programs and degrees in cyber security specialties. They are also doing their best to place young professionals into the...

What it takes to be a security incident responder

What it takes to be a security incident responder

A wide range of technical skills and curiosity about the mechanics and goals of an attack are key for effective incidence response.

What is cognitive computing? Here’s what you should know

What is cognitive computing? Here’s what you should know

If you’re confused about exactly what it means from an IT and business perspective, you’re not alone

The hard truths of navigating ageism in IT

The hard truths of navigating ageism in IT

In an industry that favors youth over experience, the best defense against age discrimination may be avoiding becoming a victim in the first place

Machine learning proves its worth to business

Machine learning proves its worth to business

AI on the verge: Early adopters reap business benefits, as machine learning nears the mainstream

Continuous authentication: Why it’s getting attention and what you need to know

Continuous authentication: Why it’s getting attention and what you need to know

In some cases traditional authentication processes are not enough to provide strong security throughout a user work session. That’s where continuous authentication comes in.

Are companies doing enough on the IoT security front?

Are companies doing enough on the IoT security front?

If security executives thought they had a lot to handle with the growth of mobile devices and the expanding digital enterprise, the emergence of connected products, corporate assets, vehicles and other “things” is taking security...

Dyn attack highlights 2016 security industry woes

Dyn attack highlights 2016 security industry woes

This has been another eventful year in the realm of cyber security—with a number of high-profile data breaches that affected large numbers of people and technological developments that promise to impact the market for years to come.

Robots present a cyber risk

Robots present a cyber risk

The prospect of an army of robots marching in unison to launch an attack on an unsuspecting city belongs in the realm of science fiction—as do most images of menacing autonomous machines wreaking all kinds of havoc on civilization.

Mergers create greater security risk

Mergers create greater security risk

Security risks, both cyber and physical, certainly belong on the list of concerns. And with the ongoing shortage of professionals who are expert in various aspects of data protection—coupled with the seemingly endless stream of...

Load More