This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
On 11 Dec 2014 we will be providing a briefing on lessons extracted from our research into the new Cloudera and Intel partnership. This presentation is designed to arm architects with the information they need to efficiently modernize and deliver cost-saving, mission-supporting capabilities to their enterprise. By Bob Gourley.
On 11 Dec 2014 we will be providing a briefing on lessons extracted from our research into the new Cloudera and Intel partnership. This presentation is designed to arm architects with the information they need to efficiently modernize and deliver cost-saving, mission-supporting capabilities to their enterprise. By Bob Gourley.
If you are a technologist you no doubt have thoughts about security and how to improve your approach to enterprise-wide defense. Bob’s first career was as a naval intelligence officer, which included operational tours in Europe and Asia. By Bob Gourley. Manual remediation is costly and requires manpower and time you don’t have.
If you are a technologist you no doubt have thoughts about security and how to improve your approach to enterprise-wide defense. Bob’s first career was as a naval intelligence officer, which included operational tours in Europe and Asia. By Bob Gourley. Manual remediation is costly and requires manpower and time you don’t have.
News like the release below shows how virtuous this firm is being in the enterprise IT domain. Their solutions are now enhancing enterprise defenses in every major sector of the economy and at firms of all sizes. Invincea Announces 54 New Enterprise Customers For its Flagship Enterprise Solution, $8.1M – bg.
She previously worked at Iron Mountain, where she was Executive Vice President and CTO. She joined Okta as CIO in 2020, and left Okta for her current role at F5 in January 2025, where she is tasked with building a data- and AI-first enterprise. Not many security vendors from the 1980s are still around, but Trend Micro is a survivor.
The 2014 Data Impact award, presented by Cloudera, is a great way of helping the community learn best practices by highlighting mission-focused solutions. 2014 Data Impact Awards. Nominations are open through September 12, 2014. The 2014 Data Impact Awards highlight achievements in the following areas: BUSINESS IMPACT.
Office of Management and Budget. Independent Consultant. Defense Intelligence Officer for Cyber. Vice President, Enterprise Security. Independent Consultant. Program and Consulting Director of Insider Threat Management and Strategic Threat Intelligence. ChiefTechnologyOfficer.
If you are in or know people in government, non-profits or NGO’s that have leveraged Hadoop in service to missions please nominate them for recognition as part of the 2014 Data Impact Awards presented by Cloudera. 2014 Data Impact Awards. Nominations are open through September 12, 2014. Presented by Cloudera.
Widely known security practitioner Dave Schackleford is presenting a webinar on Thursday 15 may at 2pm Eastern that should be of high interest to any enterprise technologist seeking to understand the dynamics of the modern data breach. By Bob Gourley. The following is from the invitation: You’re a target for data breach.
June 24, 2014 , New York City – MongoDB World — Continuing to deliver on thefuture of analytics, Pentaho Corporation today announced the general availability of version 5.1 Building upon the foundation of enterprise big data blueprints, the Pentaho 5.1 With the launch of 5.1,
Haystax Technology Names Advisory Board Members. McLean, VA – January 14, 2014 – Haystax Technology, Inc. He completed his career as the CIA’s CTO, where he was responsible for ensuring that the agency’s technology investments matched the needs of its mission. • Bob Gourley, Founder and CTO, Crucial Point LLC.
(Bumble Photo) — Antoine Leblond , a former longtime Microsoft exec who was most recently senior vice president of software at Sonos, joined dating app company Bumble as chieftechnologyofficer. Leblond previously spent 25 years at Microsoft leading various engineering teams working on Windows, Office, and other products.
Given software's significant role in helping accomplish agency missions, 3 Phoenix tapped for ope architecture work Washington Technology (Today) - 3 Phoenix Inc. million Navy contract. million contract extension. digital audiences from January 2014 until January 2015 with some interesting information that reinforces trends.
Enterprise software still rules the roost in the region. Industry: Enterprise customer data. Helion co-founder and ChiefTechnologyOfficer Chris Pihl (left) with founder and CEO David Kirtley at their facility in Redmond, Wash. Industry : Sales contract management software. Founded : 2014.
The majority operate in enterprise software or cloud computing. In fact, GeekWire reported this week on a little-known enterprise software company that just joined the unicorn ranks. GeekWire story from July 2019 : Contract management startup Icertis hits $1B valuation with massive $115M funding round. Founded : 2014.
acquired San Francisco-based immigration consulting company Bridge. The company has helped process more than 70,000 immigration applications, with customers including Coca-Cola Enterprises, Vanta, Insider, WebFlow, Opendoor, Carta, and more. He’s joined by CTO and co-founder Forrest Blount , a former Google engineer.
But if they have one thing in common, it’s that they are growing their companies at a time when the broader tech economy is contracting. He served as CTO before stepping into the CEO role in 2014. The UW spinout uses machine learning to help enterprises build their own machine learning and AI models and applications.
Only 17% of respondents said they work in what can be described as a paper-free office. A staggering 40% still use paper for filing “important stuff”, and 56% are wedded to signatures on paper for contracts and order forms. This is despite around half of organisations (49%) saying they are decreasing paper consumption.
In a swift succession of leadership changes within just three days, Shear’s appointment follows the brief tenure of Mira Murati, the chieftechnologyofficer, whose instatement on Friday led the premier AI company into a state of upheaval. “I Who is Emmett Shear?
Group14 TechnologiesChiefTechnologyOfficer Rick Costantino (left) and CEO Rick Luebbe inside of the company’s commercial-scale manufacturing factory in Woodinville. Group14 Technologies , the Woodinville, Wash. It has offices in Tualatin, Ore. and SK Innovation, along with other unnamed investors.
All those factors together make the Symantec Government Symposium of 11 March 2014 one to pay attention to. Track C: Creating an Agile Enterprise. Daniel Lohrmann , Chief Security Officer, State of Michigan. James Craft , Deputy Director for Information Enterprise Management, JIEDDO, DOD. Wolf Tombe , CTO, U.S.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content