Welcome!

Enterprise IT Context for the CTO

Bob Gourley

Subscribe to Bob Gourley: eMailAlertsEmail Alerts
Get Bob Gourley via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Bob Gourley
New in the CTOvision Research Library: We have just posted an overview of an architectural assessment we produced laying out best practices and design patterns for the use of SAS and Apache Hadoop, with a focus on the government sector. Enterprises in government are awash in more data...
The article titled Minding The Analytics Gap  by Sam Ransbotham, David Kiron and Pamela Kirk Prentice, highlights the gap between an organization’s capacity to produce analytical results and its ability to apply them effectively to business issues.Key takeaway: XL Group plc, a global i...
Editor's note: I am an advisor to Invincea, and am very proud to share the press release below with you. Also of note, Invincea is a sponsor of our 30 April Synergy Forum.  -bg Invincea Redefines Endpoint Security with Integrated  Endpoint, Cloud Analysis and Enterprise Response Capabi...
By Dan Cybulski Late last month we introduced readers to Napatech’s high speed packet capture appliance, Pandion, announced at this years Mobile World Congress in Barcelona. Napatech has been providing industry leading network management and security accelerators to telcos, the financi...
By Charles Hall Offering five full days of educational training from experienced industry practitioners, the RSA Conference is widely regarded as one of the world's leading forums for enterprises and technical information security professionals. This year, the Conference will be held A...
By Charles Hall If you're interested in cyber security and operations at the federal level, check out the AFCEA Defensive Cyber Operations Symposium.  This event combines the  JIE Mission Partners Symposium and the International Cyber Symposium to increase dialogue among key participan...
By Bob Gourley Peter W. Singer, strategist at the New Ameria think tank and author of "Cybersecurity and Cyberwar: What Everyone Needs To know" and Sara Sorcher, deputy editor of The Christian Science Monitor's new cybersecurity section, Passcode, provide a monthly podcast of interest ...
By Bob Gourley On 15 April at 10am EDT Cognitio will present a webinar on the Cyber Threat. This presentation will examine the threat from the perspective of seasoned professionals who have spent years in direct contact with adversaries defending both corporate and government systems. ...
By Bob Gourley The paperback version of our book The Cyber Threat is now ranked by Amazon as the number one best seller in their White Collar Crime category. Most cyber threats today are associated by crime and we are very proud to be ranked so high in this category (the book is also t...
By Bob Gourley CTOvision readers are among the busiest people in the community, far too busy to waste time on attending the wrong event. We would like to help you as you consider which events warrant your time and attention. To address this issue we maintain the CTOvision Events Calend...
By Bob Gourley One of our more popular white papers (with over 2000 downloads) is titled "Advice for the Tech Startup CEO Considering a Federal Strategy." We have just updated this paper with new advice and actionable information relevant to any firm with advanced technology seeking to...
By Dan Cybulski It is no secret that insider threat is a serious issue that every organization is facing. A look back at 2014 reveals any number of breaches that can be traced back to malicious or exploited insiders. The 2014 Data Breach Investigation Report published by Verizon highli...
By Charles Hall Learn more about how to better protect your assets from cyber attack at the Palo Alto Networks  Federal Forum on 20 May 2015, from 8:00 AM to 5:00 PM at the Newseum in Washington, DC.  This all-day event brings representatives from industry, government, and technology t...
By Charles Hall Today's data-intensive analytic platforms offer a dizzying amount of data, originating from sensors, markets, social media, the Internet of Things, and countless other sources.   All this data can cause a significant delay in decision-making.  Organizations must stop re...
By Bob Gourley on 21 May at 1pm, CTOvision publisher Bob Gourley will host a webinar SAS engineers in an overview of architectural best practices for SAS and Hadoop. This webinar will examine lessons learned, best practices and concepts of operation designed to help you make the most o...
Imagine you are getting ready to fill your washing machine with all your of dirty clothes and when you are ready to close the door and fill up the detergent, you suddenly realize your detergent bottle is completely empty. A sense of panic washes over you and then the doorbell rings. Yo...
By Bob Gourley The CTOvision Research Library is a repository of research curated by our analysts to provide enterprise technologists a fast way to reference actionable information relevant to your operational decisions. Our analyst curate the research library into categories of Analyt...
By Bob Gourley Opptiv is a sponsor of Cognitio's 30 April 2015 Synergy Forum. Opptiv works with firms around the globe to bring more precision and less guesswork to acceleration of revenue and sustained growth. I've enjoyed working with them in the past and like the fact that they do t...
By Charles Hall CPPIB, Canada's largest pension fund, teamed with Permira, a European private equity group, to acquire Informatica (NASDAQ: INFA), the US data software and services company, in the largest leveraged buyout so far this year.  The companies will pay $48.75 per share in ca...
Messaging is a critical function for any organization. This is especially true for the Military and Intelligence communities, where it is imperative that vital messages reach intended recipients as quickly as possible. The first messaging system was hand-written notes. While functiona...
By Charles Hall Are you a system engineer or administrator charged with protecting your network infrastructure from attack?  Napatech's Field Programmable Gate Arrays (FPGAs) can help you to improve on the ability to monitor and react to malicious events that occur within your network....
By Bob Gourley It has been my pleasure to have the honor of working on the planning team for the 30 April Synergy Forum. This has been a great opportunity to interact with the DC strategy and technology community and I really look forward to seeing you all at this event. If you have no...
By Bob Gourley Learn about the cyber threat from seasoned professionals who have spent years in direct contact with adversaries defending government and corporate systems. This presentation provides facts and observations on the cyber threat in ways that can inform you decision-making ...
By Bob Gourley There are threats to your business and mission needs. Tracking them can give you insights that drive your decisions. This is the operating thesis behind ThreatBrief, our daily report on business risks (with a focus on cyber risks). Our analysts and experienced executives...
By Katie Kennedy Hortonworks has just announced their first hands-on, performance based certification exam. This new “HDP Certified Developer, ” or HDPCD, exam is designed for individuals who would like the opportunity to prove their Hadoop skills. Instead of multiple choice or true/fa...
By SeanLawson For decades, we have heard a lot of talk from American officials, industry experts, and others about the supposed threat of a “cyber 9/11,” “cyber Pearl Harbor,” “cyber Katrina,” or even “cyber Sandy.” In short, we have been warned repeatedly that “cyber doom” is coming. ...
By Bob Gourley Everyone I have ever spoken to about Thorn is a huge supporter of this group. We are so proud to have them involved with Cognitio's 30 April 2015 Synergy Forum. Thorn leveraged technology to combat the sexual exploitation of children. They partner with tech companies, go...
By John Mancini Editor's note: t’s been 14 years since SharePoint was first launched, so AIIM’s John Mancini takes the opportunity to look at where it sits in enterprises today and how it will be used in the future.-bg SharePoint, Microsoft’s web application framework and platform, was...
By Katie Kennedy Ford's newest technology plans to turn drivers into slower, safer drivers. Ford's "Intelligent Speed Limiter" tech will be able to read speed limit signs and keep your car at that speed, or alter your speed to the new limit. A camera mounted on the windshield scans the...
By Chris Ward The Navy knows it is falling behind in innovation. Constrained by a mountain of acquisition regulations, it has a hard time reaching across the Industry/Government divide to learn the “art of the possible”. CTOvision Pro readers can review our update on how the Navy inten...
By Bob Gourley Learn about the cyber threat from seasoned professionals who have spent years in direct contact with adversaries defending government and corporate systems. This presentation provides facts and observations on the cyber threat in ways that can inform you decision-making ...
By Shannon Perry A recent report from the Pew Research Center provides an interesting look into Americans’ online habits following Edward Snowden’s revelations about surveillance practices in the United States. The survey questioned adults about the extent to which their attitudes and ...
By Charles Hall We noticed an event readers in the great state of Tennessee may take an interest in. The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak...
By Bob Gourley An upgrade for The CTOvision Mobile Application is available for iPhone, iPad and Android users. The app began as a way to serve our readers with content from CTOvision and that remains a key capability. But we now include feeds from all other major tech blogs, letting y...
By Bob Gourley Our friends at FedScoop and Brocade are combining efforts to produce an informative event that can help ensure your networks and data centers are optimized. And by optimized I mean are significantly reducing your IT spend, which should get your attention. Here is more fr...
By Katie Kennedy Facebook is planning on launching a drone program they call Aquila. Launch will be in three months time, and from then they will continue to expand till they provide internet to every person in the world. The program is designed for: beaming high-speed data from 60,000...
By Bob Gourley NapaTech has just announced Pandion, a powerful, highly-optimized high-speed packet capture solution. NapaTech has a history of fielding high speed devices and they applied their talent here in ways that enable incredibly fast, reliable, real-time packet capture, then in...
By Katie Kennedy Today we are just beginning to see what e-ink has to offer. With e-readers, e-ink multi-cards, the Pebble smartwatch, and more devices on the market, e-ink can be used in a variety of ways due to its flexibility. Now, e-ink is transitioning to the fashion world. A new ...
By Bob Gourley One of the key sponsors of our 30 April Synergy Forum is Basis Technology. Basis is a company we have tracked for years, and have watched as they have become part of the fabric of solutions now serving billions of people. We are honored to have them as a sponsor but even...
By Dean Wiech Helpdesks are overwhelmed, it’s no secret, often by mundane and repetitive tasks that can, or should, be automated. By taking steps, that are usually simple and financially efficient, much time can be saved for employees and organizations managing this process. By automat...