Welcome!

Enterprise IT Context for the CTO

Bob Gourley

Subscribe to Bob Gourley: eMailAlertsEmail Alerts
Get Bob Gourley via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Bob Gourley
By Bob Gourley The best minds in data gather at Strata + Hadoop World to learn and connect—and explore the complex issues and exciting opportunities brought to business by big data, data science, and pervasive computing. Strata + Hadoop World 2014, happening October 15-17 at the Javits...
By Bob Gourley The discipline of cyber threat intelligence focuses on providing actionable information on adversaries. This information is becoming increasingly important to enterprise cyber defense. This importance has resulted in investment and creation of many new/innovative sources...
By Shannon Perry The debate over the future of the Internet and Net Neutrality has drawn attention from many sources this summer – including media companies, search engines, Internet service providers, politicians, and even comedians. In fact, the FCC’s proposed fast lanes received so ...
By Bob Gourley If you are or have been involved in enterprise grade cyber security you know the importance of collaboration among trusted teams of professionals. One of the most virtuous groups enhancing the ability to execute on trusted collaboration is the TSCP: The Transglobal Secur...
By Katie Kennedy Q Designs has created a unique bracelet that increases your phone’s battery life. Instead of carrying around a tangled mess of cords, this sleek band will increase your phones bettery life by 60 percent, without the mess: Most wrist-bound devices are designed to take y...
By AdamElkus Over at Wired, a headline blares “Artificial Intelligence Is Now Telling Doctors How To Treat You.” Sounds unique, novel, and even scary. Those AIs are replacing humans, to the point where even the detailed knowledge of the physician is superseded by a Dr. HAL!...
By Bob Gourley FedCyber is an annual cybersecurity event hosted by Matt Devost and Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. This event us unique in the DC ecosystem. We are focused on en...
By Bob Gourley Cloudera and Pentaho work well together and I’ve seen that first-hand in the marketplace. One very interesting way they are working together is through a deep integration of the two capabilities in ways that can deliver fast analysis to users. Pentaho can provide a...
By Katie Kennedy Attacks made on Sony’s PlayStation Network coincided with a bomb scare on an American Airlines jet carrying John Smedley, the president of Sony Online Entertainment. The same Twitter account that claimed responsibility for the online attacks repeated the warning that t...
By Shannon Perry Hope has been placed on the Internet (particularly on social media) to expose users to more sources of information and diverse points of view. In traditional settings, people going about their days do not always feel inclined to engage with strangers, acquaintances, an...
By Ron Kaese Editor’s note: This looks like one of the most relevant data analytics events of the season. Hear real use cases from real professionals serving critical missions. – bg Who:  Who should attend? Company representatives that want to meet the NASA experts on Big D...
By Shannon Perry On July 30th in northern Virginia, some of the greatest minds in analytics for business, outcomes, and mission impact gathered to share their lessons learned and experiences with data analytics. Academia, government, and industry came together to provide a comprehensiv...
By Katie Kennedy The Defense Information Systems Agency’s chief information officer and director for Enterprise Information Services Dave Bennett opened for FedScoop’s “Lowering the Cost of Government with Information Technology (IT) Summit” on August 21. Bennett’s opening discussion b...
By Shannon Perry If you have not heard of Twitch, it is a videogame-streaming company that enables gamers to upload videos of gameplay, watch gameplay from other users, and chat about different tactics, strategies, and achievements. Three months ago, the young company made headlines on...
By AdamElkus A recent BBC article asks the provocative question: can computers replace historians? But here is the biggest claim so far – crunching through the big data of history can help us spot patterns and work out where the world is heading next. That is what Kalev Leetaru, ...
By Katie Kennedy Is your wallet ever expanding due to the amount of credit cards you have? There is a new card that your wallet will thank you for. This new card by Coin is a credit card that houses all of your credit cards in one device. This card, that was expected to be debuted this...
By Shannon Perry On July 30th in northern Virginia, some of the greatest minds in analytics for business, outcomes, and mission impact gathered to share their lessons learned and experiences with data analytics. Academia, government, and industry came together to provide a comprehensiv...
By Bob Gourley To register see: http://ctolink.us/1pTyvDk Cloudera Breakfast Series – Washington, D.C. Leading organizations are changing the way they think about data with an enterprise data hub and driving everyday decisions and actions, from fraud prevention to insider threat analys...
By Bob Gourley The National Institute of Standards and Technology (NIST), working collaboratively across a broad range of stakeholders, released a Cybersecurity Framework in February 2014. This framework, based on the functions of Protect, Detect and Response, has been adopted as a com...
By Bob Gourley We have to assume all our readers, being the savvy connected people you are, are tracking the many concerning global events that appear to be happening with much more frequency. Humanity has a history of violence and some have postulated that what we are seeing now is ju...
By Bob Gourley The following is a recap of Navy Gold Coast 2014, a Small Business Procurement Event.   Attendees were treated to some great presentations 11-13 Aug 2014 in San Diego as the Navy provided their assessment of upcoming opportunities to interested small businesses. This eve...
By Bob Gourley The inaugural Intelligence and National Security Summit will occur September 18-19 2014 at the Omni Shoreham Hotel in Washington DC. Two of the most highly regarded professional organizations in the national security ecosystem have combined to facilitate this event: the ...
By Bob Gourley The Dunning–Kruger effect is a cognitive bias manifesting in unskilled individuals suffering from illusory superiority, mistakenly rating their ability much higher than is accurate. This bias is attributed to a metacognitive inability of the unskilled to recognize their ...
By Shannon Perry On July 30th in northern Virginia, some of the greatest minds in analytics for business, outcomes, and mission impact gathered to share their lessons learned and experiences with data analytics. Academia, government, and industry came together to provide a comprehensiv...
By Katie Kennedy What you did not know about your personal data? Reddit, Imgur, Twitch, and a couple other major internet portals are about to hand over reams and reams of user data to university professors to do research on. How can the sites do it while still maintaining users’ trust...
By Shannon Perry Data breaches have captured the attention of the American media several times this year. The compromise of Target’s systems and the resulting media coverage cost the corporation hundreds of millions of dollars in the first half of 2014, and the repercussions are far fr...
By Bob Gourley We have previously written about Wayin (I am proud to be one of their advisors). Their capabilities continue to evolve to enable organizations to continually improve how social media is used to both understand and engage. Wayin’s success in the marketplace has cent...
By Bob Gourley Enterprises everywhere have been seeking improved ways to make use of their data. Federal agencies have in many ways been on the cutting edge of community efforts at big data, with most all agencies either executing on a comprehensive big data strategy or empowering tech...
By Bob Gourley CTOvision Pro is a subscription based research and analysis service that provides information you can not get from any other source (if you have not tried it yet you may sign up for a free evaluation trial here).  This post provides tips on how to make the most of this i...
By William McElmurry For healthcare professionals participating in the Centers for Medicare & Medicaid Services electronic health record (EHR) incentive program, you’ll soon need to demonstrate compliance with the Stage 2 Meaningful Use requirements in order to continue recei...
By Bob Gourley Editor’s note: The use case articulated here is important on its own, but is also one that can be repeatable across multiple other medical research activities and diseases. Thanks Intel and Cloudera for the technology and thanks to the Michael J. Fox Foundation for...
By Bob Gourley We have previously written about the Security Innovation Network (SINET) and the yearly SINET Showcase.  This is a group every technology firm should have some familiarity with now. Startups should track SINET as a way to learn and perhaps expose your technology to the c...
By Katie Kennedy Editor’s note: On Wednesday 30 July 2014 analysts, executives and technologists gathered at our Analyst Forum, an event established by a partnership between AnalystOne and the United States Geospatial Intelligence Foundation (USGIF) to help share lessons learned across...
By Shannon Perry Scientists, programmers, and engineers work ceaselessly to develop improvements in robotics and artificial intelligence, which constitute some of the most impressive technological feats ever accomplished. Impressive personal assistants like Apple’s Siri and Microsoft’s...
By Bob Gourley The video at this link and embedded below shows Kirk Borne at TEDx GeorgeMason.   From the YouTube description: Dr. Kirk Borne is a Multidisciplinary Data Scientist and an Astrophysicist. He is Professor of Astrophysics and Computational Science in the George Mason ...
By Bob Gourley Tapping Global Threat Intelligence To Secure Enterprise Networks Cyber Security Symposium August 27, 2014 | 11 AM -1:30 PM EST Ruth’s Chris Steakhouse, Arlington, VA For more and to register see: http://ctolink.us/1nKbQqy On July 9, 2014, the Cybersecurity Informati...
By Bob Gourley The Carnegie Mellon University Software Engineering Institute is a national treasure. One of the great bastions of the discipline of enterprise grade software engineering. This is the home to the first computer emergency response team (CERT), a group formed with DoD fund...
By Shannon Perry The American media has never paid more attention to data breaches and cybersecurity than it does today. Major breaches in the last year – at large companies like Target and eBay – have made information security discussions more worrying and more widespread, albeit stil...
By Shannon Perry Do you have the email address you want? If you do, you are one of the lucky few. These days, most people have to employ numbers, symbols, or underscores in order to create a unique address for themselves, not to mention the fact that so much of the Internet is in Engli...
By Bob Gourley Editor’s note: X15 is new and exciting. We just finished a call with their leadership team. This firm is possibly very disruptive, in a positive way. The leadership views machine data in a new way with the result being a modern capability to this emerging challenge...