Welcome!

Enterprise IT Context for the CTO

Bob Gourley

Subscribe to Bob Gourley: eMailAlertsEmail Alerts
Get Bob Gourley via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Bob Gourley
This post is sponsored by the Enterprise CIO Forum and HP’s Make It Matter. Cyber intelligence is a growing discipline in the cybersecurity community, providing important information for cyber defenders in enterprises large and small. This post reviews key sources of cyber intelligence...
Ayasdi provides advanced analytics software to healthcare, financial services, life sciences, energy, public sector, consumer products, high-tech, and for communications. The vision of Ayasdi: Deep Analytics Will Be Essential and Transformative For Every Organization. Our Goal is to Ma...
Police use technology to track movements of suspect in Indiana killings as … Police use technology to track movements of suspect in Indiana killings as probe widens. Published October 23, 2014. Associated Press. Facebook0 Twitter0 Email Print. 18782a05aeb84929630f6a7067004b49.jpg...
Today’s data centers are being built at the forefront of industry standards. Within the past five years, the way we construct data centers has changed dramatically. David Cappuccio, the Chief of Infrastructure Research at Gartner, told CIO that “Data centers will no longer be constrain...
What if you decided to take a holiday in the sun on a luxurious cruise liner only to discover that your shipmate could have Ebola? Determining who may have come in contact with the potential victim is tricky. LUX, an analytics tool, has the ability to track individuals and ships to aid...
Here is some of the technology news we are tracking from across the tech community: Gartner’s Top 10 Strategic Technology Trends for 2015 Gartner, Inc. (NYSE: IT) is the world’s leading information technology research and advisory company. We deliver the technology-related ...
For those of us who work in and around the enterprise security domain something unique has just happened. The U.S. Government has just approved a commercial consumer device, the Samsung Galaxy family of devices, for classified info. This means government organizations can establish new...
Last week I was lucky enough to tour the new F-35B Training site at Marine Corps Aviation Squadron, Beaufort, South Carolina. I have been reading about the pros and cons of this new airframe for years, and with a price tag that continues to surpass all expectations, I was eager to see ...
There are threats to your business and mission needs. Tracking them can give you insights that drive your decisions. This is the operating thesis behind ThreatBrief, our daily report on business risks (with a focus on cyber risks). Our analysts and experienced executives are collaborat...
Intel has created a Bay Trail Atom PC that is only 1.6 ounces. It is manufactured by Shenzen Apec Electronics and can be purchased on AliExpress for just under $125 (with shipping). The device does not come with OS, but you are able to load Windows, Linux, Android or other OS systems. ...
This month Pentaho announced the release of Pentaho 5.2. Here are highlights of the new platform: Secured and Blended Data On Demand Pentaho 5.2 sets a new standard in data delivery by simplifying and streamlining the analytics process. Empowering business users with IT trust, this lat...
With Edward Snowden’s revelations, the myriad of recent information breaches at large corporations, and the extraordinary level of digitalization in our country, the American public has never placed a higher value on cyber security. This heightened attention has manifested itself in re...
The Stevens Honor Award has been awarded every year since 1945. The award recognizes notable individuals in any field of endeavor and has been awarded to remarkable individuals, including aviation pioneer Igor Sikorsky, and architect and inventor R Buckminster, as well as many more. Do...
DHL, a German logistics company , has announced its launch of a new drone delivery service that will transport “urgently needed goods”, which include life-saving medicines, to remote locations. The company’s plan is to use small, parcel-carrying drones to deliver medications and ...
Next year the mobile payment service PayPal will become a publicly traded company after it’s split from eBay. With many companies, including Apple, entering into the mobile payment sector, PayPal now has more major competitors. Almost a year after billionaire Carl Icahn opened a proxy ...
When Microsoft released Windows 8 two years ago, its massive departure from its predecessor made a big splash in the technology community. Windows 8 represented a big change for Microsoft, which was investing heavily on the fact that desktop computers, laptops, and tablets were quickly...
On July 30th in northern Virginia, some of the greatest minds in analytics for business, outcomes, and mission impact gathered to share their lessons learned and experiences with data analytics. Academia, government, and industry came together to provide a comprehensive approach to inv...
By Katie Kennedy On August 27, LogRhythm hosted a panel focused on “Tapping Global Threat Intelligence to Secure Enterprise Networks” at Ruth’s Chris Steakhouse in Crystal City. The panel participants included Sameer Bhalotra, COO of Impermium and former Senior Director for Cybersecuri...
By Shannon Perry Over the Labor Day weekend, a heap of sensitive pictures of celebrities found their way onto online forums 4chan and Reddit, and the leak has since made headlines across the country. The Washington Post, The New York Times, and The Wall Street Journal have dedicated fr...
By Shannon Perry The list of corporations affected by data breaches in 2014 continues to lengthen. UPS announced a breach a few weeks ago; eBay announced a breach in the Spring, and we still have not heard the last of the breach that affected Target at the end of last year. Brian Krebs...
By Robert Doswell It’s now common practice to perform a variety of banking tasks from home. Individuals also can arrange insurance with one click. Health records can be viewed securely from any device in the world with a web connection. A multitude of variations of this type of self-se...
By Bob Gourley The best minds in data gather at Strata + Hadoop World to learn and connect—and explore the complex issues and exciting opportunities brought to business by big data, data science, and pervasive computing. Strata + Hadoop World 2014, happening October 15-17 at the Javits...
By Bob Gourley The discipline of cyber threat intelligence focuses on providing actionable information on adversaries. This information is becoming increasingly important to enterprise cyber defense. This importance has resulted in investment and creation of many new/innovative sources...
By Shannon Perry The debate over the future of the Internet and Net Neutrality has drawn attention from many sources this summer – including media companies, search engines, Internet service providers, politicians, and even comedians. In fact, the FCC’s proposed fast lanes received so ...
By Bob Gourley If you are or have been involved in enterprise grade cyber security you know the importance of collaboration among trusted teams of professionals. One of the most virtuous groups enhancing the ability to execute on trusted collaboration is the TSCP: The Transglobal Secur...
By Katie Kennedy Q Designs has created a unique bracelet that increases your phone’s battery life. Instead of carrying around a tangled mess of cords, this sleek band will increase your phones bettery life by 60 percent, without the mess: Most wrist-bound devices are designed to take y...
By AdamElkus Over at Wired, a headline blares “Artificial Intelligence Is Now Telling Doctors How To Treat You.” Sounds unique, novel, and even scary. Those AIs are replacing humans, to the point where even the detailed knowledge of the physician is superseded by a Dr. HAL!...
By Bob Gourley FedCyber is an annual cybersecurity event hosted by Matt Devost and Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. This event us unique in the DC ecosystem. We are focused on en...
By Bob Gourley Cloudera and Pentaho work well together and I’ve seen that first-hand in the marketplace. One very interesting way they are working together is through a deep integration of the two capabilities in ways that can deliver fast analysis to users. Pentaho can provide a...
By Katie Kennedy Attacks made on Sony’s PlayStation Network coincided with a bomb scare on an American Airlines jet carrying John Smedley, the president of Sony Online Entertainment. The same Twitter account that claimed responsibility for the online attacks repeated the warning that t...
By Shannon Perry Hope has been placed on the Internet (particularly on social media) to expose users to more sources of information and diverse points of view. In traditional settings, people going about their days do not always feel inclined to engage with strangers, acquaintances, an...
By Ron Kaese Editor’s note: This looks like one of the most relevant data analytics events of the season. Hear real use cases from real professionals serving critical missions. – bg Who:  Who should attend? Company representatives that want to meet the NASA experts on Big D...
By Shannon Perry On July 30th in northern Virginia, some of the greatest minds in analytics for business, outcomes, and mission impact gathered to share their lessons learned and experiences with data analytics. Academia, government, and industry came together to provide a comprehensiv...
By Katie Kennedy The Defense Information Systems Agency’s chief information officer and director for Enterprise Information Services Dave Bennett opened for FedScoop’s “Lowering the Cost of Government with Information Technology (IT) Summit” on August 21. Bennett’s opening discussion b...
By Shannon Perry If you have not heard of Twitch, it is a videogame-streaming company that enables gamers to upload videos of gameplay, watch gameplay from other users, and chat about different tactics, strategies, and achievements. Three months ago, the young company made headlines on...
By AdamElkus A recent BBC article asks the provocative question: can computers replace historians? But here is the biggest claim so far – crunching through the big data of history can help us spot patterns and work out where the world is heading next. That is what Kalev Leetaru, ...
By Katie Kennedy Is your wallet ever expanding due to the amount of credit cards you have? There is a new card that your wallet will thank you for. This new card by Coin is a credit card that houses all of your credit cards in one device. This card, that was expected to be debuted this...
By Shannon Perry On July 30th in northern Virginia, some of the greatest minds in analytics for business, outcomes, and mission impact gathered to share their lessons learned and experiences with data analytics. Academia, government, and industry came together to provide a comprehensiv...
By Bob Gourley To register see: http://ctolink.us/1pTyvDk Cloudera Breakfast Series – Washington, D.C. Leading organizations are changing the way they think about data with an enterprise data hub and driving everyday decisions and actions, from fraud prevention to insider threat analys...
By Bob Gourley The National Institute of Standards and Technology (NIST), working collaboratively across a broad range of stakeholders, released a Cybersecurity Framework in February 2014. This framework, based on the functions of Protect, Detect and Response, has been adopted as a com...