Welcome!

Enterprise IT Context for the CTO

Bob Gourley

Subscribe to Bob Gourley: eMailAlertsEmail Alerts
Get Bob Gourley via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Bob Gourley
By ChrisScott Everyone is talking about the data scientist. Harvard Business Review called it the "Sexiest Job of the 21st Century". Friends from across industry and academia have also been using this term and I have met so many real data scientists that are making big differences for ...
By Bob Gourley For a short update on some key issues to track, sessions to watch and tech to see on during the 14-17 Apr USGIF GeoInt Symposium see the video at this link (it is also embedded below): Thanks for watching! For more like this please subscribe to our YouTube channel.  ...
By Bob Gourley Today is the first day of the Geoint Symposium. Most of the events are special, pre-events that dive deep into key mission areas, but the convention center is humming with activity. I picked up my credentials and walked the halls a bit, with my Google Glass. I didn’...
By Michael Johnson We read this press release with pleasure and have deep respect for the incredibly hard work required to achieve the kinds of success demonstrated here. It is not easy to get things like this done in government. From: the NGA pless release at http://ctolink.us/PYD2IQ ...
By Bob Gourley This is a follow on to our post on planning your time at the Geoint Symposium. With this post I want to make some technology recommendations that may be helpful to you as you plan out your time at the Geoint Symposium 14-17 Apr. There are so many great firms on the expo ...
By Bob Gourley Are you the kind of person that thinks long range planning means anything that is more than 24 hours out? If so, don’t feel lonely! Especially when it comes to events like the Geoint Symposium 14-17 Apr.  You know it is going to be a great event and you don’t...
By Bob Gourley Threats to our information are not only from malware or brute force hacks or social engineering. Criminals are motivated to look for every advantage. Sometimes we read about very sophisticated attacks against hardware that require advanced engineering. But attacks don...
By Bob Gourley We have previously written about Hexis Cyber Solutions (see evaluation here). With this post we provide more context on the state of the cyber threat, which is a key driver of the need for the HawkEye-G solution from Hexis. Here is the nature of today’s cyber threa...
By SeanLawson This week we learned of two new FAA actions against domestic operators of what are popularly called “drones” and what the FAA calls “unmanned aircraft systems” (UAS). In one case, the FAA has claimed that it is illegal for volunteers to use radio controlled model aircraft...
By ShannonPerry For a while now, wearable technologies have received attention from the media and attracted scores of fit minded and curious customers. A Fit Bit can monitor sleep habits, activity levels, and distance traveled, but the Nike + Fuelband provides similar information and c...
By Bob Gourley Save the date! The 2014 Analytics Forum will be held 30 July in Reston VA. This event is focused on analytical insights for mission impact. The Analytics Forum is co-sponsored by the United States Geospatial Intelligence Foundation (USGIF)and the Analyst One website. The...
By Bob Gourley If you find our open technology context and analysis of use please consider evaluating our subscription-only research and analysis service CTOvision Pro. CTOvision Pro provides access to more in-depth analysis and reporting. Subscribers receive a bi-weekly newsletter wit...
By ShannonPerry Kill Switches – the technology to remotely render stolen smartphones unusable – have recently received attention for their potential to protect smartphone owners. According to an FCC report, cell phone thefts constitute 30-40% of all thefts in major U.S. cities. Senator...
By Bob Gourley Editor’s note: I have remarked before how proud I am to be on the Invincea advisory board. News like the release below shows how virtuous this firm is being in the enterprise IT domain. Their solutions are now enhancing enterprise defenses in every major sector of ...
By ShannonPerry On March 30th, the hacktivist organization Anonymous shut down the Albuquerque Police Department’s website for several hours in a distributed denial-of-service (DoS) attack. The attack protested two controversial deaths – involving a homeless man in the Albuquerque foot...
By Bob Gourley I believe every enterprise CTO develops a knack for asking hard questions about software, including its functionality, how to install/configure/maintain it and how well it will work with other enterprise capabilities. Enterprise CTOs are also quick to seek information on...
By Bob Gourley Salesforce.com Announces New Industries Strategy BOSTON, April 2, 2014 /PRNewswire/ – Salesforce.com (NYSE: CRM), the world’s #1 CRM platform, today announced a new industries strategy aimed at accelerating the company’s growth and transforming the way ...
By ShannonPerry On March 27th, Microsoft’s Word, Excel, and PowerPoint became available in the App Store for the iPad. Microsoft asserts that the new applications maintain the functionality and familiarity associated with Microsoft Office, “while offering a fantastic touch experience b...
By ShannonPerry We’ve written plenty about data breaches. Within the last year, valuable data has been stolen from Target, the University of Maryland at College Park, the California Department of Motor Vehicles, and the Internal Revenue Service. Retailers and reputations have suffered ...
By Bob Gourley The Geoint Symposium is a great place to connect with friends and associates from across the intelligence community. It remains the premier event for government and industry to collaborate and exchange lessons learned and work on mission needs. It is also a great way to ...
By Bob Gourley We have previously written about Mach37, the Virginia Cyber Accelerator we hold in such high regard for their quality programs. With this post we would like to give you a high level overview of their Spring 2014 Cohort. They are: Axon Ghost Sentinel – Hugh Brooks, ...
By Bob Gourley On the Crimean Peninsula, Russia writes the rules because they control the territory. They control who goes in and who goes out. Anyone who wants access to the Crimea can only do so if Russia allows it. You might have a treaty that says it is not supposed to be that way,...
By Bob Gourley The Pentaho blog has just announced a series of design overviews which can be of use in accelerating data modernization activities in your enterprise. These Blueprints to Big Data Success include design packages around the use cases of: Optimizing the data warehouse Stre...
By Bob Gourley We have previously written about our friends at GovLoop, the online community for public sector professionals. If you are in or support government technology we hope you are in Govloop, they are a very open community designed to foster collaborative information exchanges...
By ShannonPerry Have you noticed a new lock in your address bar? Last week, Google announced new security measures for Gmail – “something we made a top priority after last summer’s revelations.”  The change is yet another reaction to last year’s revelations of Edward Snowden, the contr...
By Bob Gourley Editor’s note: This strikes me as important news that can impact every sector of the economy and every industry, as well as the future of humanity. Yep, this can be really big. Read the release below for more, including info on how to watch the scientific symposium...
By ChrisScott All who track DoD technology issues have been waiting way too long to see DoD to capitalize on the benefits of Cloud Solutions. This topic has been studied for years (see, for example, DSB Report on Cyber Security and Reliability in a Digital Cloud). Building on years of ...
By ShannonPerry Nearly everyone has an opinion of Steve Jobs. Since his death in 2011, a bad movie, a weighty autobiography, and numerous anecdotes have surfaced – describing his inexhaustible ambition, his excitable, and his disrespect for others. Perhaps you have heard pieces of the ...
By Bob Gourley A reader just brought a job description to my attention and I wanted to share it with you in the hopes that you will pass it along till the right person is found for this very important position. From: http://ctolink.us/OYJgbf Chief Cyberinfrastructure Security Officer I...
By Bob Gourley The Intelligence and National Security Alliance (INSA) is a virtuous firm I have personally volunteered with for almost a decade. I believe in the value they add to the discourse on matters of national security importance and also in cyber security issues. The cyber coun...
By Bob Gourley Two of my favorite technology companies, the great American firms Intel Corporation and Cloudera, are now working very strategically together in a way that will have a positive impact on the future of enterprise IT. For context, see the video at this link and embedded be...
By ShannonPerry Tuesday, Facebook announced its plans to acquire Oculus VR for $2 billion. If you haven’t heard of it, Oculus VR is a virtual reality startup out of Irvine, CA. Its mission? – to produce “immersive virtual reality technology that’s wearable and affordable.” Starti...
By Bob Gourley Security is a hot topic. Achieving more, efficiently, with enterprise data is a hot topic. So optimizing Apache Hadoop to contribute to enterprise security missions is an incredibly hot topic. The security and audit of Hadoop itself is also of critical importance. These ...
By ShannonPerry We have written here before about Cyber Security Wake-Up Calls.  Now here is a huge wake up call for citizens in California. Brian Krebs, the investigative journalist famous for revealing the Target credit card breach late last year, has revealed another compromised cre...
By Bob Gourley For over two years we have tracked Actifio as a leading firm on our Disruptive IT list and have watched as they continually and consistently improve the ability of enterprises to manage their data. Today Actifio announced they have achieved an over 182% annual growth rat...
By Bob Gourley If you are an enterprise technologist from any sector I implore you, please learn from trusted sources what the situation at NSA is. It is especially important that technologists understand the facts since we are the ones who can help people understand the technologies i...
By Bob Gourley It’s always interesting to see how large, complex organizations have morphed over time to absorb the increasing importance of IT and Cyber. Industry, academia and government have approached this important task with varying solutions. It’s sometimes unbelievably frustrati...
By Bob Gourley Security is a hot topic. Achieving more, efficiently, with enterprise data is a hot topic. So optimizing Apache Hadoop to contribute to enterprise security missions is an incredibly hot topic. The security and audit of Hadoop itself is also of critical importance. These ...
By Natalie Lehrer Editor’s note: PowerShell is an object-oriented programming language and interactive command line for Microsoft Windows. It is designed with automation in mind, and remains an important element in managing and configuring Windows Azure. In this post, Natalie Leh...
By Bob Gourley DISA released the information below as an update on milCloud, an integrated suite of capabilities designed to drive agility into the development, deployment and maintenance of DoD applications. I have no insider information on this activity, but reading between the lines...