An overview of Mark Logic with Jason Hunter
By BobGourley MarkLogic offers next-generation database technology capable of handling any data, at any volume, in any structure. The video below features Jason Hunter, and enterprise architect with...
View ArticleBreaking News: Enterprise IT Now Sexy
By BobGourley OK I’ve always thought enterprise IT was cool. But now the hottest IT professionals from Silicon Valley, guys like Kirk Dunn of Cloudera, Aaron Levie of Box, Todd McKinnon of Okta and...
View ArticleArm-Based Servers on the Rise, Microsoft ditching credits and more
By Ryan Kamauff Here is the top tech news for the day. Calxeda, an ARM-based server firm, receives $55M in investment - ARM processors (those used in mobile devices) can be used in servers, creating...
View ArticleiPhone 5 Cable Hack, LG Nexus 4 Renders and more
By Ryan Kamauff The LG Nexus 4 is here and ready to compete with ANYTHING China has apparently cracked the iPhone 5 cable code - the iPhone 5 (Lightning) cable came with a chip built in to keep others...
View ArticleCTOlabs Quickstart Tutorial: Thetus Savanna and analysis of the White House...
By BobGourley Savanna by Thetus Software that provides model enabled analysis capabilities to enterprise users. In the video below, Bob Gourley provides a quickstart tutorial showing how easy it is to...
View ArticleWorld’s Top3 Humanoid Robots – Asimo vs HPR-4 vs NAO!
By Bob Gourley This is a video of the world’s top humanoid robots, including Asimo, HPR-4 and NAO! We thought you would want to check this out, these are all progressing so very fast, and soon will be...
View ArticleCreate Your Own Robofish!
By Bob Gourley This fun video shows you what you can make with a simple Arduino kit and some common insulating material. It really gets you thinking, just what can we do with these robofish? Patrol our...
View ArticleRevealed: Robotic Jellyfish the Size of A Full Grown Man
Researchers at Virginia Tech college of Engineering have revealed a stunningly lifelike autonomous robotic jellyfish the size of a full grown man. The robot is 5 foot and 7 inches long coming in at...
View ArticleBy: Video: An Introduction to Recorded Future
[...] More Here /* Filed Under: Big Data Tagged With: Big Data, Open Source Intelligence, Osama bin Laden, Predictive power, recorded future, terrorism, Terrorist Organizations, The Future, United...
View ArticleBy: Video: An Introduction to Recorded Future
[...] More Here /* Filed Under: Big Data Tagged With: Big Data, Open Source Intelligence, Osama bin Laden, Predictive power, recorded future, terrorism, Terrorist Organizations, The Future, United...
View ArticleCreate Your Own Robofish!
By Bob Gourley This fun video shows you what you can make with a simple Arduino kit and some common insulating material. It really gets you thinking, just what can we do with these robofish? Patrol our...
View ArticleRevealed: Robotic Jellyfish the Size of A Full Grown Man
By Kat Berry Researchers at Virginia Tech college of Engineering have revealed a stunningly lifelike autonomous robotic jellyfish the size of a full grown man. The robot is 5 foot and 7 inches long...
View ArticleNavy Cyber: The 5th Operational Domain
By Bob Gourley OK I just saw an awesome video that I’ll embed below. I loved it. Watch as the USN comes under attack by bad cyber guys and then see the good guys go tappity-tap on their keyboard and...
View ArticleInstagram Video, The New Vine?
By Kimberly Kelly Instagram, the popular photo sharing application which was recently acquired by Facebook, has released a new software update that enables the recording and sharing of 15 second long...
View ArticleStreaming: The Growing Threat to Cable Companies
TV watchers and moviegoers, CEOs and Wall Street, marketers and techies – we have all theorized about Internet video’s threat to cable companies at one time or another. The average cable bill has...
View ArticleNew Video: Automating Your Cyber Defenses Including Malware Removal
By Bob Gourley The video at this link and embedded below provides an overview of conclusions from CTOvision research into ways to automate the removal of cyber threats (including malware) from your...
View ArticleBig Data in the Public Sector
By Bob Gourley In the video at this link and embedded below I provide some context on new approaches to data can enhance outcomes for public sector organizations, with a focus on real world use cases....
View ArticleTroux Technologies: Providing Insights From Enterprise Intelligence
Troux Technologies provides enterprise intelligence and planning solutions into some of the world's most widely respected organizations. Troux provides business leaders, CIOs and their teams with...
View Article2014 Stevens Honor Award – Grandfather of the Internet, Dr. David J. Farber
The Stevens Honor Award has been awarded every year since 1945. The award recognizes notable individuals in any field of endeavor and has been awarded to remarkable individuals, including aviation...
View ArticleSoftware Defined Perimeter, Cloud Security Alliance: Coca-Cola Case Study
On September 30th Sierra Ventures hosted their 9th CIO summit in Palo Alto, CA. One of the many topics coved at the event was software defined perimeter and cloud security alliance. Coca-Cola was used...
View Article