This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
On 11 Dec 2014 we will be providing a briefing on lessons extracted from our research into the new Cloudera and Intel partnership. This presentation is designed to arm architects with the information they need to efficiently modernize and deliver cost-saving, mission-supporting capabilities to their enterprise. By Bob Gourley.
On 11 Dec 2014 we will be providing a briefing on lessons extracted from our research into the new Cloudera and Intel partnership. This presentation is designed to arm architects with the information they need to efficiently modernize and deliver cost-saving, mission-supporting capabilities to their enterprise. By Bob Gourley.
If you are a technologist you no doubt have thoughts about security and how to improve your approach to enterprise-wide defense. Following retirement from the Navy Bob was an executive with TRW and Northrop Grumman, and then returned to government service as the ChiefTechnologyOfficer (CTO) of the Defense Intelligence Agency (DIA).
If you are a technologist you no doubt have thoughts about security and how to improve your approach to enterprise-wide defense. Following retirement from the Navy Bob was an executive with TRW and Northrop Grumman, and then returned to government service as the ChiefTechnologyOfficer (CTO) of the Defense Intelligence Agency (DIA).
FedCyber is an annual cybersecurity event hosted by Matt Devost and Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The next FedCyber will be held November 5, 2014 in Tysons Corner VA. This event us unique in the DC ecosystem.
By Bob Gourley If you are a DC based technologist a great opportunity to learn from one of America’s greatest technologists is coming up on 5 March 2014. Doug Cutting, Cloudera’s Chief Architect and highly respected, community focused creator of capabilities like Apache Hadoop will be discussing the Enterprise Data Hub.
Often considered a tech guru of the company or the smartest programmer in the room, the title of CTO alone indicates that the company is doing something big with technology. With this article, we’ll dip a toe into the field of the multiple responsibilities of an average CTO. The role of CTO.
FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. If you are a cyber practitioner with lessons to share or learn please sign up for our 5 Nov 2014 Summit.
By Deepak Kumar Editor’s note: This guest post is by Deepak Kumar, Founder and CTO of Adaptiva. New technologies like these are delivering dramatic efficiency gains in many areas; however, they are stressing infrastructure and creating unrealistic expectations. CTO Cyber Security DoD and IC Mobile' – bg.
Many large enterprises now rely on hundreds of third-party SaaS applications to do business, but their security organizations can barely keep pace. Right now, the state of the art for SaaS enterprise security are cloud access security brokers (CASBs) that act as intermediaries between users and the actual service.
In a panel on Lessons From and For the National Security Community, moderated by Dr. Erin Simpson , CEO of Caerus Associates, led a discussion with Dave Gauthier of the Analysis Directorate of NGA, Bob Jimenez , CTO at NRO, and Jason Thomas , the Manager of Innovation for the Government with Thomson Reuters.
On 11 Dec 2014 we will be providing a briefing on lessons extracted from our research into the new Cloudera and Intel partnership. This presentation is designed to arm architects with the information they need to efficiently modernize and deliver cost-saving, mission-supporting capabilities to their enterprise.
Here, from the Pentaho website, are the award winners Pentaho just announced: The Pentaho Excellence Awards recognize the innovative, interesting and impressive ways that customers and users worldwide deploy Pentaho technologies. Congratulations to the 2014 Pentaho Excellence Award Winners and Honorable Mentions.
SecurityScorecard has been helping companies understand the security risk of its vendors since 2014 by providing each one with a letter grade based on a number of dimensions. “The idea that we started the company was a realization that when I was CISO and CTO I had no metrics at my disposal.
CTOlabs.com , the research arm of CTOvision.com , has just released a White Paper for the federal technology community titled: Enhancing Functionality and Security of Enterprise Data Holdings: Examining new, mission-enabling design patterns made possible by the Cloudera-Intel partnership.
CTOlabs.com , the research arm of CTOvision.com , produced a White Paper for the federal technology community titled: Enhancing Functionality and Security of Enterprise Data Holdings: Examining new, mission-enabling design patterns made possible by the Cloudera-Intel partnership. Analysis Big Data CTO Cyber Security DoD and IC'
By Bob Gourley The National Institute of Standards and Technology (NIST) Information Technology Laboratory is holding a Data Science Symposium we believe will be of high interest to the enterpriseCTO community. Please submit your topics in accordance with the below (From: [link] ): Data Science Symposium 2014.
Former CIA CTO Gus Hunt Joins Venture Capital Firm Artis Ventures’ Board of Advisors. Hunt will assist in analyzing new enterprise investment opportunities and work with its portfolio companies, who’ll benefit from his unique experience. 27, 2014 (GLOBE NEWSWIRE) — From his office in Langley, Va.,
The event was the 2014 Analyst Forum, a joint activity between the United Stated Geospatial Intelligence Foundation ( USGIF ) and our AnalystOne.com site (for an overview of the entire event see our recap here ). — Kirk Borne (@KirkDBorne) July 30, 2014. — KJ Masback (@geointer) July 30, 2014.
— Trajectory Magazine (@TrajectoryMag) July 30, 2014. David Bray says @FCC repositioned chief data officer as "enterprise information and data integration lead." — Seth Grimes (@SethGrimes) July 30, 2014. — Seth Grimes (@SethGrimes) July 30, 2014. Bray (@fcc_cio) July 30, 2014.
Tapping Global Threat Intelligence To Secure Enterprise Networks. August 27, 2014 | 11 AM -1:30 PM EST. Ruths Chris Steakhouse, Arlington, VA. On July 9, 2014, the Cybersecurity Information Sharing Act (CISA) passed the Senate Intelligence Committee in a 12-3 vote. Chris Petersen, CTO/Co-Founder of LogRhythm. .
With this post we would like to give you a high level overview of their Spring 2014 Cohort. Sam Small, CEO, Menlo Park, CA – Fast Orientation allows organizations to query, reason about, and respond to enterprise events in real time. identiaIDentia Inc. – Dr. Nick Duan, CEO, Herndon, VA – IDentia Inc.
The video embedded below and at this link provides some pre-event context on FedCyber: FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. We would love to see you there!
The inaugural PentahoWorld conference is scheduled for October 8-10, 2014 at the Hilton Orlando Bonnet Creek in Orlando, Florida. CIOs, CTOs, Managers with IT Infrastructure responsibility. Enterprise Architects and Data Scientists. Analysis Big Data CTO DoD and IC Data integration Orlando Florida Pentaho PentahoWorld'
By Bob Gourley The agenda for the 3rd Annual Cloudera Federal Forum (6 Feb 2014, Hanover MD) has firmed up and will no doubt lead to an incredible event. 8:45 AM Hadoop’s Impact on the Future of Data Management – Introduction of the Enterprise Data Hub. Mike Olson – Chief Strategy Officer, Cloudera.
Analysis CTO Cyber Security Mobile' By Bob Gourley The infographic below, provided by Egnyte , provides great context for any IT professional tracking the features, functions, risks and strategic concepts around support to mobile devices. Thanks Egnyte for pulling this together, very informative.
The real reason to watch is to get an overview of their well engineered approach and how it has evolved over time to the benefit of enterprise users. CTO Cyber Security DoD and IC Mobile Amanda Knox Android Fixmo Google Innocence Network Mobile World Congress samsung Security'
The 2014 Data Impact award, presented by Cloudera, is a great way of helping the community learn best practices by highlighting mission-focused solutions. 2014 Data Impact Awards. Nominations are open through September 12, 2014. The 2014 Data Impact Awards highlight achievements in the following areas: BUSINESS IMPACT.
The following is from the RSA conference press release : Congratulations to Red Owl Analytics for being named the Most Innovative Company at RSA Conference 2014! Gerhard Eschelbeck, ChiefTechnologyOfficer and Senior Vice President, Sophos. CTO Cyber Security DoD and IC George Hoyem RSA RSA Conference'
News like the release below shows how virtuous this firm is being in the enterprise IT domain. Their solutions are now enhancing enterprise defenses in every major sector of the economy and at firms of all sizes. Invincea Announces 54 New Enterprise Customers For its Flagship Enterprise Solution, $8.1M – bg.
Godot, for the uninitiated, is a cross-platform game engine first released under an open source license back in 2014, though its initial development pre-dates that by several years. “Godot brings to the game industry the same benefits that enterprise software has been enjoying from it [open source software] for decades.”
Vice President, Enterprise Security. ChiefTechnologyOfficer. Chief Information Officer. Principal and CTO, Global Consulting Technology. Director Program Management Office. Office of Personnel Management. Cyber National Mission Force. US Cyber Command. Dr. Peng Ning.
If you are or have been involved in enterprise grade cyber security you know the importance of collaboration among trusted teams of professionals. By Bob Gourley. One of the most virtuous groups enhancing the ability to execute on trusted collaboration is the TSCP: The Transglobal Secure Collaboration Participation (TSCP).
If you are in or know people in government, non-profits or NGO’s that have leveraged Hadoop in service to missions please nominate them for recognition as part of the 2014 Data Impact Awards presented by Cloudera. 2014 Data Impact Awards. Nominations are open through September 12, 2014. Presented by Cloudera.
Tiffany Chu, SVP of Via and co-founder and former CEO of Remix, had been working in user experience design at ZipCar when, in 2014, she decided to take a year off for a fellowship at Code for America. So we didn’t know the first thing about running a business, much less running an enterprise, government-focused, B2G business.
By Bob Gourley Editor’s note: we have met and had discussions with the leadership of MemSQL and are excited for the virtuous capabilities they bring to enterprise IT (see, for example, our interview with Eric Frenkiel and their position on our Top Enterprise Big Data Tech List ). Big Data CTO DoD and IC'
On August 27, LogRhythm hosted a panel focused on “Tapping Global Threat Intelligence to Secure Enterprise Networks” at Ruth’s Chris Steakhouse in Crystal City. Todd Myers was asked to comment on best practices which could be used for architecting in security, especially around protection of enterprises. By Katie Kennedy.
On Thursday 10 April at 2pm eastern GovLoop will be hosting an online session that dives deep into the concept of an Enterprise Data Hub: a means to smartly accelerate time-to-value for data projects while economically modernizing your infrastructure. The Foundation for Data Innovation: The Enterprise Data Hub. Time: 2:00-3:00PM ET.
FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. FedCyber will be held on 5 Nov 2014 at the Tysons Corner Marriott. Seating is limited and tickets are going fast.
Editor’s note: My sense is this relationship will have important and positive impacts on many clients leveraging Hadoop in enterprises, especially those that would like to leverage Apache Accumulo. The enterprise data hub is the emerging and necessary center of enterprise data management, complementing existing infrastructure. .”
That independent restaurant customer, most likely adopting restaurant operation technology for the first time, is who Fudo is targeting. Co-founder and CTO Juan Manuel Cuello had the idea for Fudo back in 2014 after working as a developer at Restorando.com, an Open table-like company that was acquired by The Fork.
Traditionally, an enterprise application built with Java EE would be packaged into a single EAR (Enterprise Archive) deployment unit which includes WAR (Web Archive) modules and JARs (Java Archive) files. That could mean deploying dozens or even hundreds of application servers to support a typical enterprise application.
For those of us who work in and around the enterprise security domain something unique has just happened. Every enterprise CISO should be paying attention to this news. 2014 Edition), Galaxy Note Edge, Galaxy Alpha, Galaxy Tab S 8.4, It should also have many spin-off benefits in the corporate security world. Galaxy Tab S 10.5
His approach to dimensional modeling (known as the Kimball methodology) is currently the de facto standard in most enterprise decision support systems. Ralph Kimball has some thoughts on Apache Hadoop and will be sharing them during a webinar Wednesday 2 April 2014 at 1pm eastern. Hadoop 101 for Enterprise Data Warehouse Professionals.
We organize all of the trending information in your field so you don't have to. Join 49,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content