Robin ghost writes technical documents including whitepapers, data sheets, feature guides, tech specs, case studies, and articles. She has 20+ years experience in IT, regulated industry, science, finance and engineering.
The Impact of BYOD on Health Care Security -2016
Are You Falling Behind Your Patients' Consumer Expectations? - 2016
Why Health Care Security is Unique - 2016
A Better Approach to Oracle Backup and Recovery - 2016
Forward-thinking Backup through Converged Data Protection -2016
Actionable Insights Through Analytics - 2015
Choosing the Right Tools to Harness Big Data -2015
Rapid Recovery for Virtual and Cloud Environments - 2015
Deconstructing Unstructured Data - 2015
IT Transformation for a Digital World - 2015
Turning Data Into Actionable Insights - 2015
Best Practices for Intelligently Connecting the Enterprise - 2015
Disarming the Big Data Explosion - 2015
Best Practices for Data Governance - 2015
Building a Business Case for Modern Healthcare Analytics - 2014
Three Cornerstones for Healthcare Analytics Success - 2014
Building a Business Case for Workload Consolidations on Flash Storage -2014
Affordable, Compliant Health Data Storage Through LTO with LTFS - 2014
Mainframe Application Development in the Modern Data Center - 2014
Benefits of Predictive Analytics for Healthcare -2014
Deconstructing Unstructured Data -2014
Top 10 Best Practices for Securing Healthcare Data Before Migration -2014
The Case for a Clinical Device Assessment -2014
Benefits of Health Analytics -2014
Building the Business Case for Next Generation CMS - 2014
Mainframe Application Development in the Modern Data Center - 2013
Building a Business Case for BPM Automation - 2013
Cloud, In-house or CoLocation? - 2012
Tiered Cloud Services - 2012
Top 10 Best Practices for Securing Healthcare Data Before Migration - 2012
Discover the Power of Automating Your Budget - 2012
Term Contracts and Securing Business from Government Agencies - 2012
Improve Budgeting Efficiency with QuickBooks Integration - 2012
Electronic Health Care Records: The Availability Imperative - 2012
Real-time Protection for Hyper-V - 2012
Achieving Rapid Data Recovery for IBM AIX Environments - 2011
Continuous Data Protection: A Critical Element in a Recovery Solution - 2011
SAN Array-based Replication - 2010
Reducing the Costs and Risks of Branch Office Data Protection - 2010
Replication in the VMware Environment - 2010
Effortless No Downtime Server and Storage Migrations - 2010
Windows Server Multi-site Clustering- 2010
More Functionality, Less infrastructure: Managed IT - 2010
The Benefits of Continuous Data Protection for IBM i Environments - 2010
Exchange 2010 Advanced Protection - 2010
What People Are Saying:
"I've never had a writer BEAT a deadline, until now!"
"OMG. That was so FAST!"
"It's hard to believe what you're capable of..."
"You make boring interesting..."
"That sounds like me, only better..."
"Her sense of audience is pitch-perfect!"