Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Hill, David
Mesabi Group
Westwood, Massachusetts
 
   Featured Reviewer
   Reader Recommended
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

Through his writing, speaking, and research, David Hill focuses as an industry analyst on the transformations that are impacting information technology, notably in the field of information infrastructure. He has a concentration on storage and storage management, specializes in modern data protection, and takes an integrative perspective to emerging technologies—such as big data, advanced analytics, and the cloud—that impact the whole information infrastructure, but more particularly storage. He looks at how enterprises can best go about adopting new and improved processes, policies, and technologies that not only meet immediate requirements, but also help position themselves for future growth. He is the principal at Mesabi Group LLC, the industry analyst firm that he founded in 2004.

Prior to founding Mesabi Group, Hill was an industry analyst at the Aberdeen Group for a number of years. As the Vice President of Storage Research and founder of the Storage & Storage Management practice, he emphasized how enterprises could leverage their enterprise-wide storage investment to derive additional business value. Hill led both qualitative and quantitative market research studies during his tenure at Aberdeen.

Before Aberdeen, he carried out strategic marketing, competitive analysis, sales force planning, and market forecasting for EMC. Previously, he spent many years at Data General where, among other activities, he directed Data General’s internal IT data centers as well as managed the introduction of new analytical tools and business systems. Earlier in his career, as an operations research analyst at Cabot Corporation, he introduced some of the earliest decision support modeling projects, including simulation modeling using systems dynamics.

David has an advanced degree from the Sloan School at the Massachusetts Institute of Technology as well as a Bachelor of Science in Physics from the South Dakota School of Mines and Technology.

David contributes frequently to the electronic newsletter Pund-IT Review and has a blog at Network Computing. He is the author of Data Protection: Governance, Risk Management, and Compliance, published by CRC Press. This book addresses the rapidly changing scope, breadth, and depth of modern data protection.

 
 
Options:
Date Reviewed  
 
1
- 10 of 17 reviews

   
   Big data and the Internet of Things: enterprise information architecture for a new age
Stackowiak R., Licht A., Mantha V., Nagode L., Apress, New York, NY, 2015. 220 pp.  Type: Book (978-1-484209-87-5)

The book’s subtitle best describes what it’s all about. The book does not focus on selling the concepts of big data and the Internet of Things (IoT). Rather, it assumes that big data and IoT are ushering in a new ag...

Nov 10 2015  
   Enterprise cloud computing: technology, architecture, applications
Shroff G., Cambridge University Press, New York, NY, 2010. 290 pp.  Type: Book (978-0-521137-35-5)

This book provides a sound foundation for software architects who need to understand the potential impacts of moving to cloud computing. Though the book tends to focus on the public cloud, where information technology (IT) uses the ser...

Apr 6 2011  
   ITIL V3 implementation quick guide: the art of stress-free IT service management
Menken I., Emereo Pty Ltd, London, UK, 2009. 148 pp.  Type: Book (9781921573415)

The Information Technology Infrastructure Library (ITIL) attracts a lot of attention from many organizations. The first third of this book introduces ITIL and its relationship to the ITIL version 3 (V3) framework. The ITIL V3 library c...

Oct 9 2009  
   Automated planners for storage provisioning and disaster recovery
Gopisetty S., Butler E., Jaquet S., Korupolu M., Nayak T., Routray R., Seaman M., Singh A., Tan C., Uttamchandani S., Verma A. IBM Journal of Research and Development 52(4): 353-365, 2008.  Type: Article

Two key interrelated planning issues in a data center--storage provisioning and disaster recovery--are dealt with in this paper....

Jan 22 2009  
   Concept-based electronic health records: opportunities and challenges
Ebadollahi S., Coden A., Tanenblatt M., Chang S., Syeda-Mahmood T., Amir A.  Multimedia (Proceedings of the 14th Annual ACM International Conference on Multimedia, Santa Barbara, CA, USA, Oct 23-27, 2006) 997-1006, 2006.  Type: Proceedings

Readers who have an active interest in the future of electronic health records (EHR) systems will find this paper essential. It presents the idea that electronic health records can be organized around anatomical concepts. The paper the...

Dec 21 2006  
   Realizing multilevel snapshots in dynamically changing virtualized storage environments
Brinkmann A., Effert S., Heidebuer M., Vodisek M.  Networking (International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICN/ICONS/MCL’06),Apr 23-29, 2006) 262006.  Type: Proceedings

Snapshots are virtual copies of disk storage. These copies can be used for backup and recovery purposes, as well as production testing. This paper discusses how to use snapshots in a virtualized storage environment. In one such environ...

Dec 14 2006  
   Electronic commerce 2006 (4th ed.): a managerial perspective
Turban E., King D., Viehland D., Lee J., Pearson Prentice Hall, Upper Saddle River, NJ, 2006. 756 pp.  Type: Book (9780131854611)

As the title of the book indicates, the focus is on the managerial perspective, not the technological perspective, of electronic commerce. However, the underlying technologies of e-commerce are interwoven into the discuss...

Sep 15 2006  
   Building the data warehouse
Inmon W., John Wiley & Sons, Inc., New York, NY, 2005. 543 pp.  Type: Book (9780764599446)

The world of information technology is often full of hyperbole, so the use of the words “father,” “Bible,” and “classic” in the same paragraph may seem excessive. However, the...

Jun 20 2006  
   Deep store: an archival storage system architecture
You L., Pollack K., Long D.  Data engineering (Proceedings of the 21st International Conference on Data Engineering (ICDE’05),Apr 5-Apr 8, 2005) 804-815, 2005.  Type: Proceedings

The fraction of fixed content data (data that is immutable) is likely greater than the fraction of mutable (changeable) data. Much of this fixed content data (for instance, reference and compliance data) can be moved to an active archi...

Apr 10 2006  
   Securing storage: a practical guide to SAN and NAS security
Dwivedi H., Addison-Wesley Professional, Boston, MA, 2005. 560 pp.  Type: Book (9780321349958), Reviews: (1 of 3)

Information technology (IT) security has been receiving more attention recently, but, with one exception, that attention has not been directed at storage security. That exception is a well-publicized loss of unencrypted tapes containin...

Jan 25 2006  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy