Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Hill, David
Mesabi Group
Westwood, Massachusetts
 
   Featured Reviewer
   Reader Recommended
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

Through his writing, speaking, and research, David Hill focuses as an industry analyst on the transformations that are impacting information technology, notably in the field of information infrastructure. He has a concentration on storage and storage management, specializes in modern data protection, and takes an integrative perspective to emerging technologies—such as big data, advanced analytics, and the cloud—that impact the whole information infrastructure, but more particularly storage. He looks at how enterprises can best go about adopting new and improved processes, policies, and technologies that not only meet immediate requirements, but also help position themselves for future growth. He is the principal at Mesabi Group LLC, the industry analyst firm that he founded in 2004.

Prior to founding Mesabi Group, Hill was an industry analyst at the Aberdeen Group for a number of years. As the Vice President of Storage Research and founder of the Storage & Storage Management practice, he emphasized how enterprises could leverage their enterprise-wide storage investment to derive additional business value. Hill led both qualitative and quantitative market research studies during his tenure at Aberdeen.

Before Aberdeen, he carried out strategic marketing, competitive analysis, sales force planning, and market forecasting for EMC. Previously, he spent many years at Data General where, among other activities, he directed Data General’s internal IT data centers as well as managed the introduction of new analytical tools and business systems. Earlier in his career, as an operations research analyst at Cabot Corporation, he introduced some of the earliest decision support modeling projects, including simulation modeling using systems dynamics.

David has an advanced degree from the Sloan School at the Massachusetts Institute of Technology as well as a Bachelor of Science in Physics from the South Dakota School of Mines and Technology.

David contributes frequently to the electronic newsletter Pund-IT Review and has a blog at Network Computing. He is the author of Data Protection: Governance, Risk Management, and Compliance, published by CRC Press. This book addresses the rapidly changing scope, breadth, and depth of modern data protection.

 
 
Options:
Date Reviewed  
 
1
- 10 of 125 reviews

   
  Integrating runtime data with development data to monitor external quality: challenges from practice
Aghabayli A., Pfahl D., Martínez-Fernández S., Trendowicz A.  SQUADE 2019 (Proceedings of the 2nd ACM SIGSOFT International Workshop on Software Qualities and Their Dependencies, Tallinn, Estonia, Aug 26, 2019) 20-26, 2019.  Type: Proceedings

Aghabayli et al. describe a case study that integrates “software runtime data with development data in order to understand and predict” whether or not problems that occur “during the use of the software (external quality)” ...

Jan 18 2022  
  Using BPM technology to deploy and manage distributed analytics in collaborative IoT-driven business scenarios
d’Hondt T., Wilbik A., Grefen P., Ludwig H., Baracaldo N., Anwar A.  IoT 2019 (Proceedings of the 9th International Conference on the Internet of Things, Bilbao, Spain, Oct 22-25, 2019) 1-8, 2019.  Type: Proceedings

The Internet of Things (IoT), with its ability to create vast amounts of previously impossible-to-collect sensor-based data from physical objects, creates both an opportunity and a challenge for enterprises. The opportunity arises from...

Jul 15 2021  
  Technological research methodology to manage organizational change
Ramos H., Ramos P., García-Peñalvo F.  TEEM 2019 (Proceedings of the Seventh International Conference on Technological Ecosystems for Enhancing Multiculturality, León, Spain, Oct 16-18, 2019) 168-176, 2019.  Type: Proceedings

Change management is essential for all organizations to ensure that the desired benefits of the change process are actually achieved. This paper focuses on the design of a technological research methodology for managing organizational ...

May 14 2021  
  Privacy in mobile and pervasive computing
Langheinrich M., Schaub F., Morgan&Claypool Publishers, San Rafael, CA, 2019. 127 pp.  Type: Book (978-1-681731-17-9)

Mobile and pervasive computing can offer really valuable benefits, such as making our lives more convenient, efficient, and safe. This is done through tailored and context-aware services that anticipate what we need, as well as where a...

Sep 23 2020  
  Integration of information flow for greening supply chain management
Kolinski A., Dujak D., Golinska-Dawson P., Springer International Publishing, New York, NY, 2020. 415 pp.  Type: Book (978-3-030243-54-8)

Actually a monograph, this book presents primary research and original scholarship focused on a single subject, namely the “integration of information flow for greening supply chain management [SCM].” The editors de...

Feb 11 2020  
   Knowledge driven development: bridging waterfall and agile methodologies
Lal M., Cambridge University Press, New York, NY, 2018. 322 pp.  Type: Book (978-1-108475-21-1)

Software development projects are often labor-intensive and expensive. Although many software projects fail, even nominally successful projects may come in late and over budget. A software project delivery methodology can improve the c...

Jul 24 2019  
  Handbook of e-business security
Tavares J., Mishra B., Kumar R., Zaman N., Khari M., CRC Press, Inc., Boca Raton, FL, 2019. 422 pp.  Type: Book (978-1-138571-30-3)

This 15-chapter handbook opens up with an introductory chapter on security threats in e-commerce. Overall, the chapters cover traditional issues common to e-business security. For example, chapter 2 discusses the practical aspects of c...

Apr 3 2019  
  The importance of a great finish
Matsudaira K. Queue 16(5): 5-11, 2018.  Type: Article

The thesis of this article is “you have to finish strong, every time.” The author strongly emphasizes that the work at the end of a software development project is just as important (if not more so) than the work at...

Feb 27 2019  
   3D metal printing technology: the need to re-invent design practice
Duda T., Raghavan L. AI & Society 33(2): 241-252, 2018.  Type: Article

Additive manufacturing (AM) (also know as 3D printing) is the process of manufacturing objects directly from 3D model data, typically using a layer-by-layer material build-up strategy. Metal AM is a tool-less process that can manufactu...

Oct 4 2018  
  A review on the applications of neuro-fuzzy systems in business
Rajab S., Sharma V. Artificial Intelligence Review 49(4): 481-510, 2018.  Type: Article

Neuro-fuzzy systems (NFS) combine two artificial intelligence (AI) techniques, namely neural networks and fuzzy logic systems. This approach takes advantage of the strengths of each technique, while simultaneously overcoming their resp...

Jul 19 2018  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy