Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
 
David Gary Hill
Mesabi Group
Westwood, Massachusetts
 

Through his writing, speaking, and research, David Hill focuses as an industry analyst on the transformations that are impacting information technology, notably in the field of information infrastructure. He has a concentration on storage and storage management, specializes in modern data protection, and takes an integrative perspective to emerging technologies—such as big data, advanced analytics, and the cloud—that impact the whole information infrastructure, but more particularly storage. He looks at how enterprises can best go about adopting new and improved processes, policies, and technologies that not only meet immediate requirements, but also help position themselves for future growth. He is the principal at Mesabi Group LLC, the industry analyst firm that he founded in 2004.

Prior to founding Mesabi Group, Hill was an industry analyst at the Aberdeen Group for a number of years. As the Vice President of Storage Research and founder of the Storage & Storage Management practice, he emphasized how enterprises could leverage their enterprise-wide storage investment to derive additional business value. Hill led both qualitative and quantitative market research studies during his tenure at Aberdeen.

Before Aberdeen, he carried out strategic marketing, competitive analysis, sales force planning, and market forecasting for EMC. Previously, he spent many years at Data General where, among other activities, he directed Data General’s internal IT data centers as well as managed the introduction of new analytical tools and business systems. Earlier in his career, as an operations research analyst at Cabot Corporation, he introduced some of the earliest decision support modeling projects, including simulation modeling using systems dynamics.

David has an advanced degree from the Sloan School at the Massachusetts Institute of Technology as well as a Bachelor of Science in Physics from the South Dakota School of Mines and Technology.

David contributes frequently to the electronic newsletter Pund-IT Review and has a blog at Network Computing. He is the author of Data Protection: Governance, Risk Management, and Compliance, published by CRC Press. This book addresses the rapidly changing scope, breadth, and depth of modern data protection.


     

Handbook of e-business security
Tavares J., Mishra B., Kumar R., Zaman N., Khari M.,  CRC Press, Inc., Boca Raton, FL, 2019. 422 pp. Type: Book (978-1-138571-30-3)

This 15-chapter handbook opens up with an introductory chapter on security threats in e-commerce. Overall, the chapters cover traditional issues common to e-business security. For example, chapter 2 discusses the practical aspects of cryptography ...

 

The importance of a great finish
Matsudaira K.  Queue 16(5): 5-11, 2018. Type: Article

The thesis of this article is “you have to finish strong, every time.” The author strongly emphasizes that the work at the end of a software development project is just as important (if not more so) than the work at the earlier stages ...

 

 3D metal printing technology: the need to re-invent design practice
Duda T., Raghavan L.  AI & Society 33(2): 241-252, 2018. Type: Article

Additive manufacturing (AM) (also know as 3D printing) is the process of manufacturing objects directly from 3D model data, typically using a layer-by-layer material build-up strategy. Metal AM is a tool-less process that can manufacture fully den...

 

A review on the applications of neuro-fuzzy systems in business
Rajab S., Sharma V.  Artificial Intelligence Review 49(4): 481-510, 2018. Type: Article

Neuro-fuzzy systems (NFS) combine two artificial intelligence (AI) techniques, namely neural networks and fuzzy logic systems. This approach takes advantage of the strengths of each technique, while simultaneously overcoming their respective limit...

 

Federated IoT services leveraging 5G technologies at the edge
Farris I., Orsino A., Militano L., Iera A., Araniti G.  Ad Hoc Networks 68 58-69, 2018. Type: Article

The highly anticipated fifth generation of wireless mobile technology is called 5G. It promises to enable innovative services and applications that require huge performance increases. Among the uses for the Internet of Things (IoT), many will requ...

 
  more...

 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy