Welcome!

Enterprise IT Context for the CTO

Bob Gourley

Subscribe to Bob Gourley: eMailAlertsEmail Alerts
Get Bob Gourley via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Bob Gourley
By Bob Gourley The next in a series of technical talks provided by Cloudera focuses on protecting Big Data. This breakfast session will be held 7 May 2014 at the Tower Club in Tysons corner. More from their invite is below: Protecting Big Data Inside and Out Big data is a key advantage...
By Bob Gourley Call me lazy, but I really like it when I attend a Government presentation and they include some information on exactly and precisely WHAT upcoming opportunities are available for Industry.   Details!  RFI?  RFP?  What quarter?  Contract type?  How much?Of course, Govern...
By ShannonPerry When registering for email accounts online, have you ever had trouble reading those fuzzy letters and faded numbers that prove you are not a robot? Those tests happen to have a name, CAPTCHA – “Completely Automated Public turing tests to Tell Computers and Humans Apart”...
By HudsonHollister Editor’s note: Hudson Hollister is the executive director of the data transparency coalition. His insightful update below covers issues of interests to technologists in and out of government. -bg Sweeping change and open data are dawning for U.S. federal spendi...
By Bob Gourley Tim Dombrowski, partner at the highly renowned VC firm Andreessen Horowitz, has just provided us with an update on their 20 May 2014 technology and government event. Tim writes that: We have a great lineup of speakers that have recently confirmed including Marc Andreesse...
By ShannonPerry Amazon released another new service – Fire TV – to further penetrate the home entertainment market. While an Amazon Prime account already provides members access to thousands of free TV episodes and movies through a web browser, Fire TV is a small black box that allows ...
By SeanLawson There have been a number of important new developments in the battle over domestic drones in the United States this week, many of which lend support to the concerns that I have raised in my last two posts. First, the FAA has confirmed this week that it is launching an off...
By Michael Johnson With this post we initiate coverage of CSG Invotas. CSG Invotas is a new division of CSG International which focuses on providing security automation and orchestration solutions to both public and private sector clients. Developed after years of working to automate s...
By Bob Gourley GitHub is so hot right now I know you have heard of it and you may even have your own account there. But we are finding GitHub to be of use in ways far more than we expected it to be and think it may disrupt (in a good way) many business processes that it […]
By ShannonPerry I’ve written about tech waves before – in the last ten years, cell phones, online commerce, social networks, smartphones, laptops, and tablets have risen from obscurity to ubiquity. By capitalizing on these waves, the earnings and popularity forward-thinking companies (...
By Bob Gourley We previously wrote about the 21-22 May O’Reilly Solid Conference in San Francisco and just heard from the organizers that a significant number of registrations came from that write-up. That makes this event even more exciting for me, it means our readers are into ...
By Bob Gourley Our site CISOtech.com is a repository of articles and information of interest to enterprise security professionals. Any reporting we do here at CTOvision that has relevance for the CISO is archived at that site, plus evaluations on cyber security technologies of interest...
By Bob Gourley “R” is a freely available language for interacting with your computer that is designed for a wide variety of functions. It is most frequently associated with statistical computing and graphics. R runs on a wide variety of systems, including Mac, Windows, Linu...
By ShannonPerry Throughout 2012, Iran targeted United States banks and companies with a series of distributed denial-of-services cyber attacks. The attacks doubled and sometimes tripled the amount of traffic that the American websites were capable of handling. Many considered the attac...
By Bob Gourley We have previously written about Hexis Cyber Solutions (see evaluation here). With this post we provide more context on some of the enterprise security needs addressed by HawkEye-G from Hexis. The following are some key technology considerations from an enterprise techno...
By Bob Gourley Friends at the Potomac Institute for Policy Studies recently brought this to our attention and since a high number of our readers live their lives studying or working with advanced technologies we wanted to get this to you right away. The threat of improvised explosive d...
By SeanLawson Recently, several news outlets reported on a supposed plot by a Moroccan national to use remote controlled model airplanes as flying bombs. The story seems to lend credibility to speculation that model airplanes could be the next terrorist threat. In reality, however, the...
By ChrisScott Editor's note: Chris Scott has deep insights into how government works. Let us know if you would like more info on any of this.-bg With this post I'll provide some of my personal observations and insights from the the 24th Annual Government Procurement Conference. The con...
By ChrisScott When Defense Secretary Hagel announced that he was going to expand his cyber workforce by more than 6,000 by the end of 2016, I think most of us in the industry collectively wondered: “Where the heck is he going to FIND these cyber warriors?” While almost every University...
By ShannonPerry Free mobile games sound like an advertiser’s dream. Smartphone owners like them because the applications download quickly, cost nothing, and are fun to play; marketers like them because they provide a huge, new space for promoting companies and services. Want to adverti...
By ShannonPerry We knew this day would come – when Windows XP, the twelve-year-old operating system for Windows, stops receiving technical support from Microsoft. While the transition does not mark the death of Windows XP necessarily, as you can still choose to use whatever operating s...
By ShannonPerry Even security applications are not always secure. In April, an application named “Virus Shield” reached the top of Google Play Store’s paid charts – the app was downloaded more than 10,000 times for $3.99. The application’s description boasts the capability to “improve ...
By Bob Gourley At this link and embedded below (recorded at the USGIF Geoint Symposium) is a video featuring Gus Taveras, Dan Doney and Matt Carroll on several mechanisms put in place to open up their enterprise to innovations. This builds on many community efforts taking place under t...
By ShannonPerry While younger generations are known to quickly adapt to technological advances, older adults and seniors have traditionally lagged behind – preferring TV to the Internet or landlines to cell phones. But the Pew Research Center published a report on April 3rd finding tha...
By ShannonPerry Young tech companies certainly do not shy away from innovation or acquisition. Two examples: this year, Facebook acquired virtual reality firm Oculus in an effort to develop new communication lines, and Google purchased DeepMind, pushing into the artificial intelligence...
By ChrisScott Everyone is talking about the data scientist. Harvard Business Review called it the "Sexiest Job of the 21st Century". Friends from across industry and academia have also been using this term and I have met so many real data scientists that are making big differences for ...
By Bob Gourley For a short update on some key issues to track, sessions to watch and tech to see on during the 14-17 Apr USGIF GeoInt Symposium see the video at this link (it is also embedded below): Thanks for watching! For more like this please subscribe to our YouTube channel.  ...
By Bob Gourley Today is the first day of the Geoint Symposium. Most of the events are special, pre-events that dive deep into key mission areas, but the convention center is humming with activity. I picked up my credentials and walked the halls a bit, with my Google Glass. I didn’...
By Michael Johnson We read this press release with pleasure and have deep respect for the incredibly hard work required to achieve the kinds of success demonstrated here. It is not easy to get things like this done in government. From: the NGA pless release at http://ctolink.us/PYD2IQ ...
By Bob Gourley This is a follow on to our post on planning your time at the Geoint Symposium. With this post I want to make some technology recommendations that may be helpful to you as you plan out your time at the Geoint Symposium 14-17 Apr. There are so many great firms on the expo ...
By Bob Gourley Are you the kind of person that thinks long range planning means anything that is more than 24 hours out? If so, don’t feel lonely! Especially when it comes to events like the Geoint Symposium 14-17 Apr.  You know it is going to be a great event and you don’t...
By Bob Gourley Threats to our information are not only from malware or brute force hacks or social engineering. Criminals are motivated to look for every advantage. Sometimes we read about very sophisticated attacks against hardware that require advanced engineering. But attacks don...
By Bob Gourley We have previously written about Hexis Cyber Solutions (see evaluation here). With this post we provide more context on the state of the cyber threat, which is a key driver of the need for the HawkEye-G solution from Hexis. Here is the nature of today’s cyber threa...
By SeanLawson This week we learned of two new FAA actions against domestic operators of what are popularly called “drones” and what the FAA calls “unmanned aircraft systems” (UAS). In one case, the FAA has claimed that it is illegal for volunteers to use radio controlled model aircraft...
By ShannonPerry For a while now, wearable technologies have received attention from the media and attracted scores of fit minded and curious customers. A Fit Bit can monitor sleep habits, activity levels, and distance traveled, but the Nike + Fuelband provides similar information and c...
By Bob Gourley Save the date! The 2014 Analytics Forum will be held 30 July in Reston VA. This event is focused on analytical insights for mission impact. The Analytics Forum is co-sponsored by the United States Geospatial Intelligence Foundation (USGIF)and the Analyst One website. The...
By Bob Gourley If you find our open technology context and analysis of use please consider evaluating our subscription-only research and analysis service CTOvision Pro. CTOvision Pro provides access to more in-depth analysis and reporting. Subscribers receive a bi-weekly newsletter wit...
By ShannonPerry Kill Switches – the technology to remotely render stolen smartphones unusable – have recently received attention for their potential to protect smartphone owners. According to an FCC report, cell phone thefts constitute 30-40% of all thefts in major U.S. cities. Senator...
By Bob Gourley Editor’s note: I have remarked before how proud I am to be on the Invincea advisory board. News like the release below shows how virtuous this firm is being in the enterprise IT domain. Their solutions are now enhancing enterprise defenses in every major sector of ...
By ShannonPerry On March 30th, the hacktivist organization Anonymous shut down the Albuquerque Police Department’s website for several hours in a distributed denial-of-service (DoS) attack. The attack protested two controversial deaths – involving a homeless man in the Albuquerque foot...