Welcome!

Enterprise IT Context for the CTO

Bob Gourley

Subscribe to Bob Gourley: eMailAlertsEmail Alerts
Get Bob Gourley via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Bob Gourley

What If This Is the Most Important Thing the Government Can Do to Enhance Our Cybersecurity? In December 1998 when transitioning into a job doing intelligence support to DoD computer network defense, one of my mentors reminded me of a Reagan-era publication that helped the public better understand the Soviet threat called "Soviet Military Power."  This document was based on the intelligence. It provided the best possible understanding of Soviet military hardware and operational concepts but was produced at an unclassified level so it could be broadly disseminated. My mentor was making the point to me that in my new role leading intelligence support to operational cyber defense I should champion something analogous in the cyber security domain. I believe my mentor was right and advocate this idea whenever possible. Consider this theory: if more people are really awa... (more)

A Conversation with Marc Andreessen: Part 2 By @BobGourley | @ThingsExpo #IoT

This post is the second in a series based on a discussion with Marc Andreessen. The first was on: AI, Robotics, Jobs and Accelerating The Future Gourley: Can you provide more context on what kind of education and training? Andreessen: It is fair to say I am biased on that subject but my view is that the quantitative skills will be in greater demand: Math, Economics, Science, Engineering, and Computer Science. The requirements for these are rising at much higher rates so their premium is rising. All of us should seek to self-educate on these when we can and this is what we should en... (more)

Apple vs FBI - The Basics, Explained By @BobGourley | @CloudExpo #Cloud

#AppleVsFBI – #FBIVsApple – The Basics, Explained, with Links to Original Documents This post provides an update on the ongoing battle between Apple and the  U.S. government regarding Syed Rizwan Farook's iPhone, recovered by police after the horrific massacre in San Bernadino on December 2, 2015. It is just days before the March 22, 2016, hearing in this long-running, highly publicized dispute between the FBI and Apple, with the FBI’s demands of Apple being variously termed “jailbreak,” put a backdoor into, brute force access, compromise security of, or any number of other descr... (more)

Going 100% SaaS: Deploying and Operating By @YuviKochar | @CloudExpo #Cloud

Going 100% SaaS: Deploying and Operating By Yuvi Kochar This is the second post in this series. For the first see: Going 100% SaaS. As I mentioned before, SaaS is not just a software product, but also a service. In addition, due to the fact that the product is constantly enhanced and upgraded, it requires more active management than a traditional COTS product. I have found that SaaS implementations are most successful when the business function and IT teams work together to select, deploy and operate SaaS products. In many organizations, SaaS products are identified and selected b... (more)

Want to Learn About IoT? | @ThingsExpo #IoT #M2M #ML #InternetOfThings

Want to Learn About the Coming Internet of Things? Read About the Victorian Internet In the late 1990's Tom Standage released the first edition of a book that would sweep across the tech community because of its incredible analogies to the rise of the Internet hitting the world at that time. The "Victorian Internet", first released in 1998, was updated and re-released again in 2013. It provided a well-written history and meaningful assessment of the rise of the Telegraph, and made very interesting observations about how the remarkable impact of the Telegraph could help us all th... (more)