Enterprise IT Context for the CTO

Bob Gourley

Subscribe to Bob Gourley: eMailAlertsEmail Alerts
Get Bob Gourley: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Bob Gourley

Tracking the Megatrend of Cloud Computing There are seven key MegaTrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for Cloud Computing, Artificial Intelligence, Mobility, Big Data, Robotics, Internet of Things, CyberSecurity. In this post we dive deeper into the first of these trends, Cloud Computing. We succinctly describe Cloud Computing as the scalable delivery of computational resources. Models of cloud compute include public clouds, private clouds and blends in between. Architectures are in place now that leverage tiers of clouds that can exist in multiple sizes and locations, including homes, businesses and datacenters. A snapshot of the trend right now indicates: Efficiencies of this architecture are driving compute costs down. Commercial Cloud Computing providers are know widely know... (more)

A Conversation with Marc Andreessen: Part 2 By @BobGourley | @ThingsExpo #IoT

This post is the second in a series based on a discussion with Marc Andreessen. The first was on: AI, Robotics, Jobs and Accelerating The Future Gourley: Can you provide more context on what kind of education and training? Andreessen: It is fair to say I am biased on that subject but my view is that the quantitative skills will be in greater demand: Math, Economics, Science, Engineering, and Computer Science. The requirements for these are rising at much higher rates so their premium is rising. All of us should seek to self-educate on these when we can and this is what we should en... (more)

What If This Is the Most Important Thing the Government Can Do to Enhance Our Cybersecurity? | @CloudExpo #Cloud

What If This Is the Most Important Thing the Government Can Do to Enhance Our Cybersecurity? In December 1998 when transitioning into a job doing intelligence support to DoD computer network defense, one of my mentors reminded me of a Reagan-era publication that helped the public better understand the Soviet threat called "Soviet Military Power."  This document was based on the intelligence. It provided the best possible understanding of Soviet military hardware and operational concepts but was produced at an unclassified level so it could be broadly disseminated. My mentor was ... (more)

Apple vs FBI - The Basics, Explained By @BobGourley | @CloudExpo #Cloud

#AppleVsFBI – #FBIVsApple – The Basics, Explained, with Links to Original Documents This post provides an update on the ongoing battle between Apple and the  U.S. government regarding Syed Rizwan Farook's iPhone, recovered by police after the horrific massacre in San Bernadino on December 2, 2015. It is just days before the March 22, 2016, hearing in this long-running, highly publicized dispute between the FBI and Apple, with the FBI’s demands of Apple being variously termed “jailbreak,” put a backdoor into, brute force access, compromise security of, or any number of other descr... (more)

SOCOM Networks, Satellite Tracking, and More

Today’s federal cybersecurity and information technology news round-up: The proposed Social Networking Online Protection Act (SNOPA) would make it illegal for employers to demand access rto social media accounts. More here. The Defense Advanced Research Projects Agency has requested proposals for automated tracking and identification solutions for satellites  More here. The full report on the Federal Communications Commission’s investigation into Google revealed that the company knew it was collecting personal data with their Street View vans. More here. The General Services Admini... (more)