Enterprise IT Context for the CTO

Bob Gourley

Subscribe to Bob Gourley: eMailAlertsEmail Alerts
Get Bob Gourley: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Bob Gourley

There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for Cloud Computing, Artificial Intelligence, Mobility, Big Data, Robotics, Internet of Things, CyberSecurity. In this post we dive deeper into Artificial Intelligence. Artificial Intelligence is the discipline of thinking machines. The field is growing dramatically with the proliferation of high powered computers into homes and businesses and especially with the growing power of smartphones and other mobile devices. Artificial intelligence software is assisting people in most every discipline. The many functions of AI are considered by many to be threatening many human jobs across multiple industries, but others consider it a great producer of jobs since it will help create entirely new industries and free more human... (more)

Enterprise Security and Functionality Benefits of the new Software Defined Perimeter (SDP) Approach

Bob Gourley The dynamic nature of today’s IT Operations has eroded the network perimeter in ways we have all been watching and even cheering on! This is a new world of mobility, cloud computing and rapid partnering for success. But the erosion of the network perimeter is making traditional security a roadblock to efficiency. No one wants to allow holes to be poked in the security system but no one wants to shut down connectivity to partners either. The Software Defined Perimeter uses software techniques to render the internal environment invisible to all outsiders, unless trust ... (more)

DIY Update to Windows 7

Yesterday, I came down to find my Vista 32-bit machine in a registry loop.  After getting over my aggravation, I decided that I would just make the move to Windows 7.  Having already downloaded a release candidate (RC 7201 64-bit).  Using another 32-bit Vista machine, I set out to turn my 8GB flash drive into a window’s install disk. I decided to switch to 64-bit for my inevitable upgrade to the Core i7 platform.  Core i7 uses triple channel memory – so I will want 6GB which is not supported by 32-bit versions of Windows.  This decision to switch to 64-bit made my upgrade a litt... (more)

2016 Internet of Things Predictions By @TDaughney | @ThingsExpo #IoT

2016 Internet of Things Predictions By Trevor Daughney Gartner predicts that number of IoT devices in use worldwide will grow from an estimated 5 billion in 2015 to some 25 billion connected devices by 2020. The best business strategies will perfectly balance the ever-growing IoT market opportunities versus a rapidly evolving threat environment. To help IoT solution providers define their 2016 product roadmap, here are some of INSIDE Secure’s top IoT predictions for the year: IoT hype will become reality. For the past few years, we’ve been inundated with stories of IoT solutions ... (more)

Open Source Software: More Reasons It Is More Secure

Software designed by open source standards has security built in and has been found to be fielded with far fewer faults per unit of code than proprietary development houses.  There are many reasons for this.  This factor is especially true when the open source code is commercially supported.  For example, Linux, which has the strength of a huge open community and also the strength of thousands of paid developers from great companies like IBM, Oracle, Sun, Novell and now even Microsoft (that is a long story, but a great trend I hope continues). There are many myths out there on t... (more)