Welcome!

Enterprise IT Context for the CTO

Bob Gourley

Subscribe to Bob Gourley: eMailAlertsEmail Alerts
Get Bob Gourley via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Bob Gourley

Thanks to the professional, virtuous work of security researchers Chris Valasek and Charlie Miller and some fantastic reporting on this research by Andy Greenberg of Wired Magazine, we have long known that theoretical hacks against cars are no longer theoretical. They are real. Many connected cars can be hacked and they can be hacked from long distance. And the threats include threats to safety. The publicity brought to these issues was incredibly important and helpful. Zero action would have occurred without it. Now, almost a year after the research was initially published, the FBI, Department of Transportation and National Highway Traffic Safety Administration have issued a joint alert. This alert provides more background, discusses some of what the government does, and provides some tips to the driving public. The full public service announcement is here: Motor... (more)

Want to Learn About IoT? | @ThingsExpo #IoT #M2M #ML #InternetOfThings

Want to Learn About the Coming Internet of Things? Read About the Victorian Internet In the late 1990's Tom Standage released the first edition of a book that would sweep across the tech community because of its incredible analogies to the rise of the Internet hitting the world at that time. The "Victorian Internet", first released in 1998, was updated and re-released again in 2013. It provided a well-written history and meaningful assessment of the rise of the Telegraph, and made very interesting observations about how the remarkable impact of the Telegraph could help us all th... (more)

What If This Is the Most Important Thing the Government Can Do to Enhance Our Cybersecurity? | @CloudExpo #Cloud

What If This Is the Most Important Thing the Government Can Do to Enhance Our Cybersecurity? In December 1998 when transitioning into a job doing intelligence support to DoD computer network defense, one of my mentors reminded me of a Reagan-era publication that helped the public better understand the Soviet threat called "Soviet Military Power."  This document was based on the intelligence. It provided the best possible understanding of Soviet military hardware and operational concepts but was produced at an unclassified level so it could be broadly disseminated. My mentor was ... (more)

Apple vs FBI - The Basics, Explained By @BobGourley | @CloudExpo #Cloud

#AppleVsFBI – #FBIVsApple – The Basics, Explained, with Links to Original Documents This post provides an update on the ongoing battle between Apple and the  U.S. government regarding Syed Rizwan Farook's iPhone, recovered by police after the horrific massacre in San Bernadino on December 2, 2015. It is just days before the March 22, 2016, hearing in this long-running, highly publicized dispute between the FBI and Apple, with the FBI’s demands of Apple being variously termed “jailbreak,” put a backdoor into, brute force access, compromise security of, or any number of other descr... (more)

A Conversation with Marc Andreessen: Part 2 By @BobGourley | @ThingsExpo #IoT

This post is the second in a series based on a discussion with Marc Andreessen. The first was on: AI, Robotics, Jobs and Accelerating The Future Gourley: Can you provide more context on what kind of education and training? Andreessen: It is fair to say I am biased on that subject but my view is that the quantitative skills will be in greater demand: Math, Economics, Science, Engineering, and Computer Science. The requirements for these are rising at much higher rates so their premium is rising. All of us should seek to self-educate on these when we can and this is what we should en... (more)