Welcome!

Enterprise IT Context for the CTO

Bob Gourley

Subscribe to Bob Gourley: eMailAlertsEmail Alerts
Get Bob Gourley via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Articles from Bob Gourley
Editor’s note: This post by Invincea CEO Anup Ghosh first appeared at LinkedIn. We knew this would be of interest to you and posted it here with the author’s permission.-bg I’ll say it up front, your security program does not work because it is based on three common m...
American interest in online privacy and surveillance programs has jumped since Edward Snowden’s revelations about digital government surveillance in the United States. Deteriorating public relations have plagued intelligence agencies that have been identified as participating in the ma...
On August 28th, Samsung and LG announced their latest generation of smartwatches in separate press releases. The Samsung report flaunts its Gear S, a smartwatch with a curved screen that measures a full two-inches long. Capabilities of the watch include providing notifications from soc...
Google has created what it calls a “Matrix-style,” virtual version of California’s road system that it’s been using to test self-driving cars before sending them out onto the actual road, according to the Guardian. Google is apparently so thrilled with its simulation that it asked Cali...
As enterprises work to rapidly embrace the mobile revolution, both for their workforce and to engage more deeply with their customers, the pressure is on for IT to support the tools needed by their application developers. Mobile application developers are working with a massive variety...
Think of a cloud provider. I’d bet that for the majority of people reading this article, the first that comes to mind is AWS. Amazon Web Services were a trailblazer in the cloud space, and they still lead adoption rates at all levels of the market, from SMBs to multinationals. In some ...
With the herald of innovative, personal, smart and targeted marketing, ‘big data’ offers enticing and varied advantages for businesses. The ability uncover and harness data, to tackle and tame the informational chaos presented, is increasingly expected of most organisations. But how...
“Global spending on big data by organizations will exceed $31 billion in 2013, finds a new market forecast by ABI Research. The spending will grow at a CAGR of 29.6% over the next five years, reaching $114 billion in 2018. The forecast includes the money spent on internal salaries, pro...
Enterprise technologists have been wrestling with a common challenge for years. Just like Vannever Bush described in 1945, the amount of data being created is growing faster than humans can analyze. We all seem more motivated to address this challenge, especially since fast fast analys...
Today, IT requirements are changing.  IT trends are moving towards centralized processing, exploding stores of data and always-on always available services. Economic realities in the federal space are driving new approaches even faster now, since centralized processing and services mak...
Peter Schlampp, the Vice President of Products and Business Development at Platfora, explains what the Hadoop Big Data reservoir is and is not in this webinar that I watched today. Knowing what the HDR is and is not is key to pulling out business intelligence insights and analytics. Pl...
When talking with the less-technical people in your enterprise, which may include end users and many others on the leadership team, it always pays to have non technical expressions to describe new capabilities. Here are some thoughts on Platfora that may be of use in discussions like t...
By Bob GourleyYou don’t have to convince government IT leaders of the smart new business models, efficiencies and performance enhancements available with cloud computing. Like IT professionals everywhere, federal technologists get it. But things are different in the federal commu...
There are several certainties in computer security. One is that when adversaries have intent they will always find a way to get what they want. Another certainty is that leadership in government and industry is quick to forget the lessons learned in cyber security, especially those dea...
By MollyJust With this post we provide insights into three key healthcare trends to watch: 1.  Impending Meaningful Use Stage 2 Deadline The federal government introduced requirements for “meaningful use” attestation in the use of electronic health care records. Rules are r...
Here is the top tech news and stories for Tuesday (sorry about the delay). Firefox for Tablets updated with speed and power - one of the top mobile browsers is Firefox. Their latest update mirrors the most recent smartphone update. Unlike many mobile browsers, Firefox supports Flash. V...
Do you remember service-oriented architecture (SOA)? This concept led to tremendous new capabilities and efficient, mission-focused designs. Enterprises established architectures in which application interfaces, logic and data were separated and smartly reusable. After the term went ma...
Big Data is the data too large, complex, and fast-moving for conventional information infrastructure to handle. There’s been a lot of buzz about investment in cutting edge Big Data solutions and start ups, and for good reason. Venture capital for Big Data is sizable and growing.
Researchers Show How to Crack Android Encryption – Thomas Cannon and Seyton Bradford have successfully shown brute force attacks against Android encryption at DEFCON.  Because Android encryption is based on the Linux dm-crypt, it is easily broken on either Android 3.x or 4.x devi...
Here are today’s top tech news stories. Bitcoin, the underground currency of the Internet, is experiencing speculative growth - there have been a few things pushing up the value of the Bitcoin, including a drug purchasing version of eBay. There are now “High Yield Investmen...
In the emerging multi-tenant cloud, the old rules of vendor lock-in are rapidly changing. A network virtualization platform must be able to operate on top of any network hardware, much like x86 server hypervisors work on top of any server. This independence means the physical network c...
Network Virtualization represents the most significant innovation in networking since the inventions of Ethernet and the multi-protocol router, two technologies pioneered to level the playing field for  device connectivity. Network Virtualization is an emerging technology that will pro...
Cleversafe provides dispersed storage solutions that give infinite scale and cost-effective data storage/protection/access. Apache Hadoop and the CDH4 distribution provides all the required software for implementing MapReduce and the other chores associated with analysis over massive q...
At AT&T Labs in Florham Park, New Jersey, big data is being used to analyze the traffic and movement patterns of people through data generated by their mobile phones to help improve policymaking and urban and traffic planning. The research team realized they could understand deep patte...
The greatest source of potential use cases for technology is the user community. This is a great reason to attend events where customers are at the center of focus. This was what last month’s Splunk Live DC was like. Splunk is a very user-focused capability and when you create a ...
Here is today’s federal cybersecurity and information technology news: IBM and the Lawrence Livermore National Laboratory are working together on the Vulcan supercomputer to analyze data for developing new technologies in applied energy, green energy, manufacturing, data manageme...
We recently wrote about TechAmerica and their activities related to Big Data in the Public Sector. A Big Data Task Force in TechAmerica’s public sector group has kicked off a collaborative activity in a Big Data Task Force. There has been a new development in domain. The foundation a...
The New York Times revealed June 1st what many experts had already asserted regarding the United States role in the Stuxnet attack. While speculation of U.S. involvement complicated international relations on cyber conflict, an acknowledgement of U.S. involvement in a forum such as the...
Here is today’s federal cybersecurity and information technology news: The Defense Advanced Research Projects Agency’s Plan X is reaching out to the private sector and universities to develop an operating system capable of launching cyber attacks and surviving counterattack...
GovLoop, the social knowledge network for public sector professionals, is one of the most virtuous members of the Gov2.0 ecosystem. Their support of the community demonstrates, on a daily basis, their dedication to a simple mission: They want to connect government to improve government...
This year at Splunk Live, CTOvision editor and Crucial Point CTO Bob Gourley provided a keynote on predicting the future of information technology, outlining some of his methods and what we can learn from each.
HBase is an open source data base with some very special features you should take note of. This post provides some context of hBase. Most of this information was gleaned from the great reference material at Cloudera.com, which has become the go-to site for learning about Big Data appro...
Today’s federal cybersecurity and information technology news: The U.S. Office of Naval Research is partnering with Chilean scientists to develop a mobile application to provide information helpful in countering pirates, arms traffickers, and illegal fishermen. More here. The Arm...
Today’s federal cybersecurity and information technology news round-up: The proposed Social Networking Online Protection Act (SNOPA) would make it illegal for employers to demand access rto social media accounts. More here. The Defense Advanced Research Projects Agency has reques...
Study after study refutes the myth that cybersecurity is compromised by malicious, brilliant hackers. Advanced persistent threats, state-sponsored hackers, and foreign intelligence agencies are serious threats, especially to major targets, but the vast majority of breaches and leaks re...
Good news for Big Data users: Cloudera recently released the second and final beta for Cloudera’s Distribution Including Apache Hadoop version 4 (CDH4), meaning that the official CDH4 release is coming soon. If you aren’t already using CDH, Cloudera offers the leading open-source...
Dion Hinchcliffe of Dachis Group is one of the brightest minds in the nation today. For years he has helped individuals and organizations think through complex challenges. And for years he has proven he can glean trends and impart their relevance to decision-makers. He is world renowne...
One of the sessions I attended at FOSE 2012 was titled: “What the Research Shows: The Future of Mobile.” It featured two researchers, Dr. David Metcalf of the University of Central Florida, and Aaron Smith, of the Pew Internet and American Life Project. These gentlemen focu...
The T in ETL, or the “transform” stage of “extract, transform, load” data process, rarely gets the spotlight in the Big Data revolution, but it’s one of the most challenging and important elements in turning raw data into intelligence.
The Department of Defense Intelligence Information Systems (DoDIIS) conference is held once a year by the Defense Intelligence Agency technology leadership team. This is an incredible event full of information-packed presentations and social sessions.  One of its greatest features is a...