Enterprise IT Context for the CTO

Bob Gourley

Subscribe to Bob Gourley: eMailAlertsEmail Alerts
Get Bob Gourley: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Bob Gourley

There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for Cloud Computing, Artificial Intelligence, Mobility, Big Data, Robotics, Internet of Things, CyberSecurity. In this post we dive deeper into Artificial Intelligence. Artificial Intelligence is the discipline of thinking machines. The field is growing dramatically with the proliferation of high powered computers into homes and businesses and especially with the growing power of smartphones and other mobile devices. Artificial intelligence software is assisting people in most every discipline. The many functions of AI are considered by many to be threatening many human jobs across multiple industries, but others consider it a great producer of jobs since it will help create entirely new industries and free more human... (more)

RiskIQ: Tools to Improve Cyber- Situational Understanding in DoD

Bob Gourley Operating, securing and defending the Department of Defense Information Network (DoDIN) network and the data traversing through it is inherently a governmental function for the Armed Forces. To accomplish this, DoD has a skilled workforce, empowered with advanced cyber capabilities, which seeks to detect, mitigate and attribute hostile cyber activity within their networks. While much of DoD operates within secured boundaries, there will always be points of intersection with the publicly accessible Internet. There are also connections to other departments and agencies,... (more)

Security and #MachineLearning | @CloudExpo #ML #AI #DL #CyberSecurity

Machine Learning May Be the Solution to Enterprise Security Woes By Karl Zimmerman For large enterprise organizations, it can be next-to-impossible to identify attacks and act to mitigate them in good time. That's one of the reasons executives often discover security breaches when an external researcher - or worse, a journalist - gets in touch to ask why hundreds of millions of logins for their company's services are freely available on hacker forums. The huge volume of incoming connections, the heterogeneity of services, and the desire to avoid false positives leave enterprise sec... (more)

A Look at the Google Nexus Q

Google is pushing their ecosystem past the desktop and mobile environments. Starting with Google TV and continuing with the Nexus Q, Google is attempting to move their ecosystem into your living. A user of Google TV myself, I have enjoyed the system and the user interface, but it is clearly a beta product. The current Google TV interface is lacking, yet capable. It needs more third-party developer support, a concern which I’m sure will plague the Nexus Q. The Nexus Q has USB/HDMI/Ethernet/Optical/WiFi, but it also has a built in amplifier to power real speakers. This does make t... (more)

Stealth IT: Ninjas In The Workplace

The highly empowered mobile user is a disruptive trend most enterprises have yet to come to grips with. This is causing huge changes in enterprises. Friends at Wikibon, the awesome open research and collaboration site, have produced an infographic that helps capture some key dimensions of this trend. It is embedded below: Via: Wikibon Infographics This post by BobGourley was first published at CTOvision.com. ... (more)