|
|
|
|
| Through his writing, speaking, and research, David Hill focuses as an industry analyst on the transformations that are impacting information technology, notably in the field of information infrastructure. He has a concentration on storage and storage management, specializes in modern data protection, and takes an integrative perspective to emerging technologies—such as big data, advanced analytics, and the cloud—that impact the whole information infrastructure, but more particularly storage. He looks at how enterprises can best go about adopting new and improved processes, policies, and technologies that not only meet immediate requirements, but also help position themselves for future growth. He is the principal at Mesabi Group LLC, the industry analyst firm that he founded in 2004. Prior to founding Mesabi Group, Hill was an industry analyst at the Aberdeen Group for a number of years. As the Vice President of Storage Research and founder of the Storage & Storage Management practice, he emphasized how enterprises could leverage their enterprise-wide storage investment to derive additional business value. Hill led both qualitative and quantitative market research studies during his tenure at Aberdeen. Before Aberdeen, he carried out strategic marketing, competitive analysis, sales force planning, and market forecasting for EMC. Previously, he spent many years at Data General where, among other activities, he directed Data General’s internal IT data centers as well as managed the introduction of new analytical tools and business systems. Earlier in his career, as an operations research analyst at Cabot Corporation, he introduced some of the earliest decision support modeling projects, including simulation modeling using systems dynamics. David has an advanced degree from the Sloan School at the Massachusetts Institute of Technology as well as a Bachelor of Science in Physics from the South Dakota School of Mines and Technology. David contributes frequently to the electronic newsletter Pund-IT Review and has a blog at Network Computing. He is the author of Data Protection: Governance, Risk Management, and Compliance, published by CRC Press. This book addresses the rapidly changing scope, breadth, and depth of modern data protection. |
|
|
|
Date Reviewed |
|
|
1 - 10 of 17
reviews
|
|
|
|
|
|
|
|
Big data and the Internet of Things: enterprise information architecture for a new age Stackowiak R., Licht A., Mantha V., Nagode L., Apress, New York, NY, 2015. 220 pp. Type: Book (978-1-484209-87-5)
The book’s subtitle best describes what it’s all about. The book does not focus on selling the concepts of big data and the Internet of Things (IoT). Rather, it assumes that big data and IoT are ushering in a new ag...
|
Nov 10 2015 |
|
|
|
|
|
|
Enterprise cloud computing: technology, architecture, applications Shroff G., Cambridge University Press, New York, NY, 2010. 290 pp. Type: Book (978-0-521137-35-5)
This book provides a sound foundation for software architects who need to understand the potential impacts of moving to cloud computing. Though the book tends to focus on the public cloud, where information technology (IT) uses the ser...
|
Apr 6 2011 |
|
|
|
|
|
|
ITIL V3 implementation quick guide: the art of stress-free IT service management Menken I., Emereo Pty Ltd, London, UK, 2009. 148 pp. Type: Book (9781921573415)
The Information Technology Infrastructure Library (ITIL) attracts a lot of attention from many organizations. The first third of this book introduces ITIL and its relationship to the ITIL version 3 (V3) framework. The ITIL V3 library c...
|
Oct 9 2009 |
|
|
|
|
|
|
Automated planners for storage provisioning and disaster recovery Gopisetty S., Butler E., Jaquet S., Korupolu M., Nayak T., Routray R., Seaman M., Singh A., Tan C., Uttamchandani S., Verma A. IBM Journal of Research and Development 52(4): 353-365, 2008. Type: Article
Two key interrelated planning issues in a data center--storage provisioning and disaster recovery--are dealt with in this paper....
|
Jan 22 2009 |
|
|
|
|
|
|
Concept-based electronic health records: opportunities and challenges Ebadollahi S., Coden A., Tanenblatt M., Chang S., Syeda-Mahmood T., Amir A. Multimedia (Proceedings of the 14th Annual ACM International Conference on Multimedia, Santa Barbara, CA, USA, Oct 23-27, 2006) 997-1006, 2006. Type: Proceedings
Readers who have an active interest in the future of electronic health records (EHR) systems will find this paper essential. It presents the idea that electronic health records can be organized around anatomical concepts. The paper the...
|
Dec 21 2006 |
|
|
|
|
|
|
Realizing multilevel snapshots in dynamically changing virtualized storage environments Brinkmann A., Effert S., Heidebuer M., Vodisek M. Networking (International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICN/ICONS/MCL’06),Apr 23-29, 2006) 262006. Type: Proceedings
Snapshots are virtual copies of disk storage. These copies can be used for backup and recovery purposes, as well as production testing. This paper discusses how to use snapshots in a virtualized storage environment. In one such environ...
|
Dec 14 2006 |
|
|
|
|
|
|
Electronic commerce 2006 (4th ed.): a managerial perspective Turban E., King D., Viehland D., Lee J., Pearson Prentice Hall, Upper Saddle River, NJ, 2006. 756 pp. Type: Book (9780131854611)
As the title of the book indicates, the focus is on the managerial perspective, not the technological perspective, of electronic commerce. However, the underlying technologies of e-commerce are interwoven into the discuss...
|
Sep 15 2006 |
|
|
|
|
|
|
Building the data warehouse Inmon W., John Wiley & Sons, Inc., New York, NY, 2005. 543 pp. Type: Book (9780764599446)
The world of information technology is often full of hyperbole, so the use of the words “father,” “Bible,” and “classic” in the same paragraph may seem excessive. However, the...
|
Jun 20 2006 |
|
|
|
|
|
|
Deep store: an archival storage system architecture You L., Pollack K., Long D. Data engineering (Proceedings of the 21st International Conference on Data Engineering (ICDE’05),Apr 5-Apr 8, 2005) 804-815, 2005. Type: Proceedings
The fraction of fixed content data (data that is immutable) is likely greater than the fraction of mutable (changeable) data. Much of this fixed content data (for instance, reference and compliance data) can be moved to an active archi...
|
Apr 10 2006 |
|
|
|
|
|
|
Securing storage: a practical guide to SAN and NAS security Dwivedi H., Addison-Wesley Professional, Boston, MA, 2005. 560 pp. Type: Book (9780321349958), Reviews: (1 of 3)
Information technology (IT) security has been receiving more attention recently, but, with one exception, that attention has not been directed at storage security. That exception is a well-publicized loss of unencrypted tapes containin...
|
Jan 25 2006 |
|
|
|
|
|
|
|
|
|
|
|