SAP HANA: A Fantasy Football Use Case

sap-square

Every August, hoards of diehard football fans flood the internet in search of information that might provide them with an edge in their upcoming fantasy football drafts. The demand for fantasy sports has been driven by fans’ desire to get more involved with the sport they love and fueled by the availability of vast amounts […]

Maturing Security Posture and Mitigating Concerns with FireMon

firemon

According to Greg Young of the Gartner Group, many organizations are taking the “adopt first, secure later” approach to the cloud. Currently, IT organizations are initially finding ways to meet emerging business requirements, and then realizing the necessity of identifying additional security controls. The involved work is typically acquitted slowly and piecemeal, based largely on […]

Bright Computing: Advanced Linux Cluster Management

Bright_Logo_v2

With this post we are initiating coverage of Bright Computing. Bright Computing provides comprehensive software solutions for provisioning and managing HPC clusters, Hadoop clusters, and OpenStack private clouds in your data center or in the cloud. Bright’s platform, the Bright Cluster Manager, was designed by a highly regarded team of cluster specialists with first-hand experience […]

CTOvision Interviews CIA CIO Doug Wolfe on Commercial Cloud Services (C2S) Lessons Learned and Road Ahead

CIA CIO Doug Wolfe Interviewed on C2S

We recently had the opportunity to interview the CIA CIO, Doug Wolfe. Doug has been the CIA’s CIO since 2013. In this role he oversees the agency information technology vision and strategic direction. He is also an advisor to the intelligence community CIO and a collaborative leader in the federal technology world. His past tours […]

Cybersecurity: Too Often Overlooked is the Impact to the Individual

Cyber_Crime

Recently, there have been questions raised as to why corporations have been slow to be more vigilant about Cybersecurity. In the scheme of a large organization, it is often deprioritized because the minimal impact to the bottom line is a risk that is deemed acceptable to the business. For example, Target’s high profile breach cost […]

Improving Security and Efficiency in the Public Sector with Hadoop

Interested in using Hadoop in the federal space?  A white paper has been added to the CTOVision Research Library which showcases several use cases for improving security and efficiency for government agencies using Hadoop. Use Cases are grouped together into two main themes: IT Efficiency and Good Government practices. IT Efficiency covers offloading ETL to […]