Enterprise IT Context for the CTO

Bob Gourley

Subscribe to Bob Gourley: eMailAlertsEmail Alerts
Get Bob Gourley via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories by Bob Gourley

Tracking the Megatrend of Cloud Computing There are seven key MegaTrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for Cloud Computing, Artificial Intelligence, Mobility, Big Data, Robotics, Internet of Things, CyberSecurity. In this post we dive deeper into the first of these trends, Cloud Computing. We succinctly describe Cloud Computing as the scalable delivery of computational resources. Models of cloud compute include public clouds, private clouds and blends in between. Architectures are in place now that leverage tiers of clouds that can exist in multiple sizes and locations, including homes, businesses and datacenters. A snapshot of the trend right now indicates: Efficiencies of this architecture are driving compute costs down. Commercial Cloud Computing providers are know widely know... (more)

Apple vs FBI - The Basics, Explained By @BobGourley | @CloudExpo #Cloud

#AppleVsFBI – #FBIVsApple – The Basics, Explained, with Links to Original Documents This post provides an update on the ongoing battle between Apple and the  U.S. government regarding Syed Rizwan Farook's iPhone, recovered by police after the horrific massacre in San Bernadino on December 2, 2015. It is just days before the March 22, 2016, hearing in this long-running, highly publicized dispute between the FBI and Apple, with the FBI’s demands of Apple being variously termed “jailbreak,” put a backdoor into, brute force access, compromise security of, or any number of other descr... (more)

Cyber War and the Expanding Definition of War

Editor’s note: This post by Sean Lawson provides context on cyber conflict, an area of interest at the nexus of national security and technology. – bg Recently, Dr. Thomas Rid of the War Studies department of King’s College in London published an article in the Journal of Strategic Studies titled, “Cyber War Will Not Take Place.” Rid’s essay relies upon a definition of war taken from the work of Carl von Clausewitz to assess whether cyber attacks can be accurately described as “stand-alone” acts of war. His conclusion is that we have yet to see any cyber attacks that, on their... (more)

The 2016 Big Data Prediction | @BigDataExpo #BigData #IoT #RTC #Java #InternetOfThings

The 2016 Big Data Prediction: Which of These Two Types of Organization Will You Be In? By Katie Kennedy Today, there is countless data collected and analyzed by companies. Just a few years ago, that data was useless, now data is collected and used to provide answers and solve problems. As Big Data use cases continue to evolve, there will be an increasing number of business missions that will be served by new approaches to data. With the adoption of an enterprise data hub, developers are finding new agility to create services and applications, as well as decision-making that leads... (more)

If You Drive a Car, or Know Someone Who Does, You Must Read This... By @BobGourley | @ThingsExpo #IoT

Thanks to the professional, virtuous work of security researchers Chris Valasek and Charlie Miller and some fantastic reporting on this research by Andy Greenberg of Wired Magazine, we have long known that theoretical hacks against cars are no longer theoretical. They are real. Many connected cars can be hacked and they can be hacked from long distance. And the threats include threats to safety. The publicity brought to these issues was incredibly important and helpful. Zero action would have occurred without it. Now, almost a year after the research was initially published, the... (more)