This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
At this link and embedded below (recorded at the USGIF Geoint Symposium) is a video featuring Gus Taveras, Dan Doney and Matt Carroll on several mechanisms put in place to open up their enterprise to innovations. This builds on many community efforts taking place under the ICITE collection of projects. Please sign up today at CTOvision Pro.
Accenture reports that the top three sources of technical debt are enterprise applications, AI, and enterprise architecture. Incident response: Firefighting daily issues, responding to major incidents, or performing root cause analysis prevents database administrators from performing more proactive tasks.
Its an offshoot of enterprise architecture that comprises the models, policies, rules, and standards that govern the collection, storage, arrangement, integration, and use of data in organizations. Limit the times data must be moved to reduce cost, increase data freshness, and optimize enterprise agility. Curate the data.
“Our valued customers include everything from global, Fortune 500 brands to startups that all rely on IT to do business and achieve a competitive advantage,” says Dante Orsini, chief strategy officer at 11:11 Systems. “We Justin Giardina, CTO at 11:11 Systems, notes that the company’s dedicated compliance team is also a differentiator.
Our site CISOtech.com is a repository of articles and information of interest to enterprise security professionals. Any reporting we do here at CTOvision that has relevance for the CISO is archived at that site, plus evaluations on cyber security technologies of interest. By Bob Gourley. Please sign up for this report here.
We may look back at 2024 as the year when LLMs became mainstream, every enterprise SaaS added copilot or virtual assistant capabilities, and many organizations got their first taste of agentic AI. AI at Wharton reports enterprises increased their gen AI investments in 2024 by 2.3
If you are a technologist you no doubt have thoughts about security and how to improve your approach to enterprise-wide defense. Following retirement from the Navy Bob was an executive with TRW and Northrop Grumman, and then returned to government service as the ChiefTechnologyOfficer (CTO) of the Defense Intelligence Agency (DIA).
This presentation is designed to arm architects with the information they need to efficiently modernize and deliver cost-saving, mission-supporting capabilities to their enterprise. This webinar format will enable us to dynamically present and then interact with the architects, program managers and technology executives attending.
Change management is a specialized discipline, just like business analysis, user experience development, or business analysis. But Bilow observes that enterprises sometimes bypass early stakeholder groups and jump straight to business user needs.
This presentation is designed to arm architects with the information they need to efficiently modernize and deliver cost-saving, mission-supporting capabilities to their enterprise. This webinar format will enable us to dynamically present and then interact with the architects, program managers and technology executives attending.
CTOlabs.com , the research arm of CTOvision.com , has just released a White Paper for the federal technology community titled: Enhancing Functionality and Security of Enterprise Data Holdings: Examining new, mission-enabling design patterns made possible by the Cloudera-Intel partnership.
CTOlabs.com , the research arm of CTOvision.com , produced a White Paper for the federal technology community titled: Enhancing Functionality and Security of Enterprise Data Holdings: Examining new, mission-enabling design patterns made possible by the Cloudera-Intel partnership. Analysis Big Data CTO Cyber Security DoD and IC'
She previously worked at Iron Mountain, where she was Executive Vice President and CTO. She joined Okta as CIO in 2020, and left Okta for her current role at F5 in January 2025, where she is tasked with building a data- and AI-first enterprise. Not many security vendors from the 1980s are still around, but Trend Micro is a survivor.
Poor resource management and optimization Excessive enterprise cloud costs are typically the result of inefficient resource management and a lack of optimization. Many enterprises also overestimate the resources required, leading to larger, more expensive instances being provisioned than necessary, causing overprovisioning.
Enterprise infrastructures have expanded far beyond the traditional ones focused on company-owned and -operated data centers. As a result, for IT consultants, keeping the pulse of the technology market is essential. The goal is to be able to compellingly communicate the right answer with facts and analysis.
Scalable automated malware analysis has become a critical component of enterprise defense. In this post we provide context enterprise architects and security engineers can use to dramatically scale their ability to conduct malware analysis. It is based on an […].
The open source identity management platform ForgeRock is quickly becoming the go-to supporter of enterprise access solutions. For some more writing on this topic see: An Update on @ForgeRock: This company is quietly transforming the entire stack of enterprise identity management, access control and authorization capabilities.
If you are a technologist you no doubt have thoughts about security and how to improve your approach to enterprise-wide defense. Following retirement from the Navy Bob was an executive with TRW and Northrop Grumman, and then returned to government service as the ChiefTechnologyOfficer (CTO) of the Defense Intelligence Agency (DIA).
By Bob Gourley EnterpriseCTOs are increasingly seeking new ways to enable assistive technologies into mission applications and to assist those with needs in interacting with organizational assets and others in the workforce. This makes the category of Assistive Technologies one of growing importance. AnalysisCTO'
Cyber has been called the ultimate team sport: CIOs, CTOs, SysAdmins, Software Developers, CISOs, threat teams, red teams, testing groups, etc. It seems more like a jobs program that moves headcount from one part of the enterprise to the expensive nerdy-side. etc, but really should it be? So: constrain funding!
By Bob Gourley I’ve known Kevin Smith of Novetta Solutions for years and have been a huge fan of both his ability to write about technology and his ability to field enterprise grade solutions that really work. Analysis Big Data Books CTO Cyber Security DoD and IC'
Leading organizations are changing the way they think about data with an enterprise data hub and driving everyday decisions and actions, from fraud prevention to insider threat analysis to exploratory analytics, with new information and new insights. The following is from Cloudera: Bring More Analysis to Your Data.
But the hottest firms in cyber security, those growing because they make real, measurable, virtuous differences in enterprise security, are growing because they realized that Symantec''s core antivirus features just are not sufficient. The reality is that antivirus software that uses old fashioned methods of signature analysi.
Driven by the development community’s desire for more capabilities and controls when deploying applications, DevOps gained momentum in 2011 in the enterprise with a positive outlook from Gartner and in 2015 when the Scaled Agile Framework (SAFe) incorporated DevOps. It may surprise you, but DevOps has been around for nearly two decades.
It will mean, in theory, that Morgan Stanley management can see analysis of every call made across the enterprise — often within a few minutes of that call’s completion. It is going to make their data analysis far better. It could lead to mistaken conclusions and wrong decisions,” said Yossi Altevet, the CTO at DeepKeep.
The speakers are a world-class-best mix of data and analysis practitioners, and from what I can tell the attendees will be the real action-oriented professionals from government really making things happen in Big Data analysis. Mike Olson – Chief Strategy Officer, Cloudera. Bob Gourley, Editor, CTO Vision.
With this post we provide more context on some of the enterprise security needs addressed by HawkEye-G from Hexis. The following are some key technology considerations from an enterprisetechnology perspective: Over the years, CIOs, CTOs, CISOs and world class best cyber defense professionals have collaborated on the topic of best practices.
CTOvision Pro is a subscription based research and analysis service that provides information you can not get from any other source (if you have not tried it yet you may sign up for a free evaluation trial here ). . Tips For The Technology Creator. By Bob Gourley.
Every enterprise has users that expect performance of their applications. Traditionally it has been difficult to tie these many tools together for comprehensive reporting and analysis and therefore hard to provide the deep insights required in optimising data for applications. This is done in real-time by analysis of wire-data.
Attending these sessions will put you in direct contact with some of the community’s greatest champions of mission focused IT, including: Gus Taveras, ChiefTechnologyOfficer, DIA. Dan Doney, Chief Innovation Officer, DIA. Guitard, Deputy CIO and Senior Advisor, Office of the G-2, U.S.
Analysis Big Data CTO Cyber Security DoD and IC Health IT Mobile' Our analysts and experienced executives are collaborating to ensure this newsletter captures the insights you need. Our goal is to make this product your most anticipated read of the day. Please sign up for the ThreatBrief here.
Forge.mil provides some very important functionality that developers in the DoD ecosystem need and more importantly allow the technology leadership of DoD to ensure more appropriate influence over enterprise software projects. Analysis Cloud Computing CTO Cyber Security DOD DoD and IC Research GitHub'
But we now include feeds from all other major tech blogs, letting you use our mobile app to track all the technology news, analysis and context you need. App features include: Up to the minute news, analysis and context from every relevant technology news source. The best of Twitter for the tech professional.
Here is the nature of today’s cyber threat against enterprises: The Cyber Threat continues to grow in every metric. There are more threat actors, the sophistication of their techniques grows, the capabilities of their technologies continue to increase, and their ability to penetrate systems without detection is also growing.
AnalysisCTO Cyber Security Mobile' By Bob Gourley The infographic below, provided by Egnyte , provides great context for any IT professional tracking the features, functions, risks and strategic concepts around support to mobile devices. Thanks Egnyte for pulling this together, very informative.
By Bob Gourley If you are an analyst or executive or architect engaged in the analysis of big data, this is a “must attend” event. Register today and discover how Cloudera and an Enterprise Data Hub can empower you and your teams to do more with Big Data. Mike Olson – Chief Strategy Officer, Cloudera.
Analysis Big Data Cloud Computing CTO Research Startup News Configuration Management Distributed revision control Git GitHub NGA Revision control Source code' Registering as a CTOvision Pro member provides unique insights, exclusive content and special reporting that can help you achieve more in your professional life.
Enterprise architecture definition Enterprise architecture (EA) is the practice of analyzing, designing, planning, and implementing enterpriseanalysis to successfully execute on business strategies. EA, and its goals, however, are constantly evolving.
Voice over IP (VoIP) is one of the most widely deployed enterprise IT capabilities, and it is also one of the greatest contributions to business success IT provides. It can be an incredibly economical way to link enterprise users together. To ensure optimal performance for enterprise VoIP, CorvilNet monitors in-call quality.
Daily CTOvision Update: Once a day recap of reporting for the enterprise CIO, CTO, CISO and Data Scientist. CTOvision Pro Tech Review: For those with need for more advanced research and analysis. Weekly Big Data Newsletter: Big Data use cases and technology lessons learned. Find all at: [link].
If you are an enterprise technologist you are bombarded with requests to participate in technology events. We can help by offering our views on the best events in the enterprise tech space. We consider the event’s ability to contribute to the efforts of the enterpriseCTO, CIO, CISO or data scientist.
The video at this link and embedded below captures the content and dialog of a webinar which examined new capabilities of Cloudera and Intel , with a focus on capabilities that provide a full stack solution to many key enterprise mission needs. Results of the recent CTOlabs.com white paper on this topic were also presented.
News like the release below shows how virtuous this firm is being in the enterprise IT domain. Their solutions are now enhancing enterprise defenses in every major sector of the economy and at firms of all sizes. Invincea Announces 54 New Enterprise Customers For its Flagship Enterprise Solution, $8.1M – bg.
We had five different forecast engines running in the company through various acquisitions,” says Lars Ewe, who inherited the thorny IT environment when he joined as CTO in February 2020. Enterprises often make strategic errors when combining IT systems following an acquisition, Ewe says. The merger playbook.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content