This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
As IT professionals and business decision-makers, weve routinely used the term digital transformation for well over a decade now to describe a portfolio of enterprise initiatives that somehow magically enable strategic business capabilities. Ultimately, the intent, however, is generally at odds with measurably useful outcomes.
Software-defined wide area networking (SD-WAN) emerged in 2014 as a way to help organizations embrace the cloud and quickly became a hot commodity. Why SD-WAN is still critical to the enterprise SD-WAN connects users, applications, and data across locations within a hybrid environment.
By Bob Gourley If you are a DC based technologist a great opportunity to learn from one of America’s greatest technologists is coming up on 5 March 2014. Doug Cutting, Cloudera’s Chief Architect and highly respected, community focused creator of capabilities like Apache Hadoop will be discussing the Enterprise Data Hub.
FedCyber is an annual cybersecurity event hosted by Matt Devost and Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The next FedCyber will be held November 5, 2014 in Tysons Corner VA. This event us unique in the DC ecosystem.
On 11 Dec 2014 we will be providing a briefing on lessons extracted from our research into the new Cloudera and Intel partnership. This presentation is designed to arm architects with the information they need to efficiently modernize and deliver cost-saving, mission-supporting capabilities to their enterprise.
On 11 Dec 2014 we will be providing a briefing on lessons extracted from our research into the new Cloudera and Intel partnership. This presentation is designed to arm architects with the information they need to efficiently modernize and deliver cost-saving, mission-supporting capabilities to their enterprise. By Bob Gourley.
In a 2014 Next-Generation WAN Survey , 68 percent of respondents said demand for WAN bandwidth will increase over the next year. These factors will prevent some global companies from successfully deploying bandwidth-hungry enterprise IT strategies worldwide, such as virtualization and data center consolidation. Limited WAN Bandwidth.
FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. If you are a cyber practitioner with lessons to share or learn please sign up for our 5 Nov 2014 Summit.
Congratulations to the 2014 Pentaho Excellence Award Winners and Honorable Mentions. Read more about each company and why they were selected: Best Enterprise Deployment – Landmark*. Speaking at PentahoWorld 2014. Honorable Mention: Penton, GrayMatter for AIA Bhd. Platform Innovation – Ruckus Wireless*.
Mr. Thomas said that some policymakers and enterprise leaders consider technology problems to be the next generation’s problems, even though these changes are already underway. — Michael Nelson (@MikeNelson) July 30, 2014. — Joe Boutte (@joeboutte) July 30, 2014. — Michael Nelson (@MikeNelson) July 30, 2014.
On 11 Dec 2014 we will be providing a briefing on lessons extracted from our research into the new Cloudera and Intel partnership. This presentation is designed to arm architects with the information they need to efficiently modernize and deliver cost-saving, mission-supporting capabilities to their enterprise. By Bob Gourley.
Lenzner is a thought-leader in the enterprise security, technology risk, privacy, and compliance arenas. Q: In your opinion what are the Top 5 anticipated tech trends for 2014? According to Gartner’s recent IT Spending Forecast in 2014 , IT spending will see a modest rebound to $3.8 As data breaches brought the U.S.
By Bob Gourley The National Institute of Standards and Technology (NIST) Information Technology Laboratory is holding a Data Science Symposium we believe will be of high interest to the enterprise CTO community. Please submit your topics in accordance with the below (From: [link] ): Data Science Symposium 2014.
The event was the 2014 Analyst Forum, a joint activity between the United Stated Geospatial Intelligence Foundation ( USGIF ) and our AnalystOne.com site (for an overview of the entire event see our recap here ). — Kirk Borne (@KirkDBorne) July 30, 2014. — KJ Masback (@geointer) July 30, 2014.
AWS, Microsoft, and Google may continue to dominate the enterprise cloud market, but a raft of second-tier cloud providers are proving to be valuable partners for organizations and innovators with specialized workloads and use cases especially in the burgeoning AI era. Athos Therapeutics is one such enterprise.
— Trajectory Magazine (@TrajectoryMag) July 30, 2014. David Bray says @FCC repositioned chief data officer as "enterprise information and data integration lead." — Seth Grimes (@SethGrimes) July 30, 2014. — Seth Grimes (@SethGrimes) July 30, 2014. Bray (@fcc_cio) July 30, 2014.
With this post we would like to give you a high level overview of their Spring 2014 Cohort. Sam Small, CEO, Menlo Park, CA – Fast Orientation allows organizations to query, reason about, and respond to enterprise events in real time. identiaIDentia Inc. – Dr. Nick Duan, CEO, Herndon, VA – IDentia Inc.
The video embedded below and at this link provides some pre-event context on FedCyber: FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. We would love to see you there!
FinOps finally became ubiquitous across the enterprise landscape last year with 75% of Forbes Global 2000 companies now all-in, according to IDC. Were looking more at SaaS and PaaS, and our enterprise technology organization is trying to utilize some of the same principles for our on-premises data centers.
The inaugural PentahoWorld conference is scheduled for October 8-10, 2014 at the Hilton Orlando Bonnet Creek in Orlando, Florida. Enterprise Architects and Data Scientists. Here is more info from PentahoWorld.com : Learn, Share and Discover. Help shape the future of analytics and big data innovation. Why make the investment?
By Bob Gourley 2014 Guidance Software Federal Summit: Cybersecurity | E-Discovery | Enterprise Forensics. Government. Registration is free for Government attendees. Register Now! Space is Limited. To Register visit: [link].
Tapping Global Threat Intelligence To Secure Enterprise Networks. August 27, 2014 | 11 AM -1:30 PM EST. Ruths Chris Steakhouse, Arlington, VA. On July 9, 2014, the Cybersecurity Information Sharing Act (CISA) passed the Senate Intelligence Committee in a 12-3 vote. By Bob Gourley. Cyber Security Symposium.
News like the release below shows how virtuous this firm is being in the enterprise IT domain. Their solutions are now enhancing enterprise defenses in every major sector of the economy and at firms of all sizes. Invincea Announces 54 New Enterprise Customers For its Flagship Enterprise Solution, $8.1M – bg.
But AI can also help humans be more creative and therefore represents a great opportunity for enterprises to scale more creativity throughout their organization. AI Is Maturing Fast And Is Getting Better At Increasing Human Creativity In 2014, […]. Artificial intelligence is a perfect example.
By Bob Gourley The infographic below, provided by Egnyte , provides great context for any IT professional tracking the features, functions, risks and strategic concepts around support to mobile devices. Thanks Egnyte for pulling this together, very informative. Analysis CTO Cyber Security Mobile'
Invincea Platform Enhances Large-Scale Enterprise Deployments With FreeSpace 4.0 LAS VEGAS, NV and FAIRFAX, VA—August 4, 2014, Black Hat—Invincea, Inc., Group templates to simplify the organization of user policies across the enterprise. Another reason why is pasted below. – bg. From Invincea. The FreeSpace 4.0
The real reason to watch is to get an overview of their well engineered approach and how it has evolved over time to the benefit of enterprise users. Look for my cameo appearance at 11:55 where say something I believe, but which must be totally obvious to you good readers.
While enterprise resource planning (ERP) had existed for three decades, its architecture and implementations were designed in a different era, before the globalization of the economy and supply chains, and the advancements in artificial intelligence (AI) and cloud computing.
As use cases move beyond hyper-scale and mobile and into the enterprise, executives in the sector discuss the state of modular adoption and design. Schneider''s acquisition of AST highlights the rise in adoption and competition in the modular data center market. Featured'
If you are a technologist you no doubt have thoughts about security and how to improve your approach to enterprise-wide defense. By Bob Gourley. Odds are you have concluded that the only way to mitigate the threat is through automation. Manual remediation is costly and requires manpower and time you don’t have.
On August 27, LogRhythm hosted a panel focused on “Tapping Global Threat Intelligence to Secure Enterprise Networks” at Ruth’s Chris Steakhouse in Crystal City. Todd Myers was asked to comment on best practices which could be used for architecting in security, especially around protection of enterprises. By Katie Kennedy.
If you are a technologist you no doubt have thoughts about security and how to improve your approach to enterprise-wide defense. By Bob Gourley. Odds are you have concluded that the only way to mitigate the threat is through automation. Manual remediation is costly and requires manpower and time you don’t have.
Business intelligence (BI) is a runaway locomotive that keeps picking up speed in terms of enterprise interest, adoption, and spending levels. Forrester started the original research with fewer than 30 vendors in 2014 and ended up with 73 in the current 2017 update. The result: Forrester now tracks 73(!) vendors in the segment.
On Thursday 10 April at 2pm eastern GovLoop will be hosting an online session that dives deep into the concept of an Enterprise Data Hub: a means to smartly accelerate time-to-value for data projects while economically modernizing your infrastructure. The Foundation for Data Innovation: The Enterprise Data Hub.
Editor’s note: My sense is this relationship will have important and positive impacts on many clients leveraging Hadoop in enterprises, especially those that would like to leverage Apache Accumulo. The enterprise data hub is the emerging and necessary center of enterprise data management, complementing existing infrastructure. .”
If you are or have been involved in enterprise grade cyber security you know the importance of collaboration among trusted teams of professionals. By Bob Gourley. One of the most virtuous groups enhancing the ability to execute on trusted collaboration is the TSCP: The Transglobal Secure Collaboration Participation (TSCP).
By Bob Gourley Editor’s note: we have met and had discussions with the leadership of MemSQL and are excited for the virtuous capabilities they bring to enterprise IT (see, for example, our interview with Eric Frenkiel and their position on our Top Enterprise Big Data Tech List ). Prominent Investors Enthusiastic about a $32.4
Achieving more, efficiently, with enterprise data is a hot topic. So optimizing Apache Hadoop to contribute to enterprise security missions is an incredibly hot topic. By Bob Gourley. Security is a hot topic. The security and audit of Hadoop itself is also of critical importance. Rethink Security Analysis.
That was the assumption behind BeyondCorp, a new model for network security that Google proposed back in 2014, and it’s one that’s starting to get some attention from networking and security vendors. What if all your company’s computers and applications were connected directly to the Internet?
At Trellix, which is positioning itself as a leader in extended detection and response (XDR), she heads the Enterprise Technology and Operations group.Anstett said at her appointment : My number one priority as CIO is to deliver insights to our business to serve our customers. billion range. Prior to Juniper, she was CIO at TIBCO Software.
By Michael Johnson For enterprise technology decision-makers, functionality, interoperability, scalability security and agility are key factors in evaluating technologies. Product innovation drives unprecedented enterprise customer growth. and the launch of Pentaho Labs were two key drivers of the strong enterprise adoption in 2013.
The National Institute of Standards and Technology (NIST), working collaboratively across a broad range of stakeholders, released a Cybersecurity Framework in February 2014. Specifically, this paper focuses on a taxonomy of capabilities and the technologies that can assist enterprises in the response function. By Bob Gourley.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content