About Bob Gourley

Bob Gourley is the publisher of CTOvision.com and DelphiBrief.com and the new analysis focused Analyst One Bob's background is as an all source intelligence analyst and an enterprise CTO. Find him on Twitter at @BobGourley

What The Enterprise IT Professional Needs To Know About Git and GitHub

github

GitHub is so hot right now I know you have heard of it and you may even have your own account there. But we are finding GitHub to be of use in ways far more than we expected it to be and think it may disrupt (in a good way) many business processes that it […]

21-22 May O’Reilly Solid Conference Heralds the Merging of the Physical and Virtual Worlds

SolidConf_Tagline_small (1)

We previously wrote about the 21-22 May O’Reilly Solid Conference in San Francisco and just heard from the organizers that a significant number of registrations came from that write-up. That makes this event even more exciting for me, it means our readers are into this topic in measurable ways. It also confirms our assessment that enterprise […]

The CISO Technology Report: Twice A Week Review For Enterprise Security Professionals

securitypadlock-360x200

Our site CISOtech.com is a repository of articles and information of interest to enterprise security professionals. Any reporting we do here at CTOvision that has relevance for the CISO is archived at that site, plus evaluations on cyber security technologies of interest. We also tailor this reporting in a twice weekly CISO Technology Report. This […]

You Should Run R On Your Computer: Not just for stats, but to know what all the excitement is about

R-on-my-mac

“R” is a freely available language for interacting with your computer that is designed for a wide variety of functions. It is most frequently associated with statistical computing and graphics. R runs on a wide variety of systems, including Mac, Windows, Linux and Unix. Every analyst who deals with data should have a copy of […]

HawkEye-G: Addressing key enterprise security technology needs

cybersecuritylock

We have previously written about Hexis Cyber Solutions (see evaluation here). With this post we provide more context on some of the enterprise security needs addressed by HawkEye-G from Hexis. The following are some key technology considerations from an enterprise technology perspective: Over the years, CIOs, CTOs, CISOs and world class best cyber defense professionals have collaborated on the […]

USMC and DoD Rapid Reaction Technology Office Seeks Info On Six Categories of Technology: Please review and engage

Usmc

Friends at the Potomac Institute for Policy Studies recently brought this to our attention and since a high number of our readers live their lives studying or working with advanced technologies we wanted to get this to you right away. The threat of improvised explosive devices (IED) has proven very difficult to mitigate. This strategic threat poses […]