Research & Analysis
Find original analysis, case studies, analyst research, and technology news on business trends, strategy, innovation, tools and technologies.
Fri, March 07, 2014 - HP was the first IT vendor out of the gate with its analyst-only event. CIO.com columnist Rob Enderle was there to grade HP on five metrics and see how the company stacks up to IBM, EMC and Dell -- all of which know a thing or two about successful industry analyst events.
Thu, March 06, 2014 - ICSA Labs, an independent division of Verizon, is now one of the largest government-approved EHR testing and certification body. The organization has aspirations beyond meaningful use, though, and hopes to drive healthcare IT vendors toward interoperability and innovation.
Wed, March 05, 2014 - Microsoft's government security expert warns that there's no such thing as perfect security, so systems must be able to adapt and respond to attacks on unforeseen vulnerabilities.
Wed, March 05, 2014 - American workers don't get too worked up about lost or stolen mobile phones -- even if those phones contain company data. A large percentage think it's not their problem and don't change their security practices afterwards. Are CIOs partly to blame for not setting stricter and clearer mobile security policies?
Wed, March 05, 2014 - An analysis of IBM's new BlueMix project, which puts most of IBM's software in the cloud, reveals that 80 percent of IT spending goes to legacy systems. As organizations finally learn to stop worrying and love the cloud, IT departments will have to decide if they will continue to be a money pit or can find a way to add value to new cloud systems.
Tue, March 04, 2014 - Red Hat is extending JBoss up the middleware stack with a new business process management suite that gives organizations advanced decision and process automation capabilities.
Tue, March 04, 2014 - Some things go together like peanut butter and jelly. Others are more like peanut butter and motor oil. The joining of tech titans is no different. Here we discuss whether six high-profile mergers have made a tasty combination or a gross one.
Fri, February 28, 2014 - Whether you're talking about your network, your company's building or your home, a perimeter approach to security is no longer adequate. As McAfee discussed at this week's RSA Conference, you can't provide physical or electronic security simply by trying to prevent authorized access -- you have to rethink all types to security to protect data and lives.
Thu, February 27, 2014 - BLE -- which Apple calls iBeacon -- can be used for a wide range of applications, if privacy and security issues are addressed.
Thu, February 27, 2014 - CIO’s Publisher Adam Dennison nominates the CIO as the best 'pathfinder' to help C-suite execs move confidently toward digital business, and provides a link to the CIO Executive Council’s new digital readiness survey.
Wed, February 26, 2014 - Michael White, CEO of DirecTV, describes the company's innovation culture and what he expects from his CIO .
Wed, February 26, 2014 - The DIY technology could be a problem for intellectual property owners because of the ease of copying products or designs. But with some creative licensing deals, the technology could also be a marketing opportunity.
Wed, February 26, 2014 - The INFORMS code of ethics requires analytics professionals to report unbiased answers, not just what the client wants to hear.
Wed, February 26, 2014 - An IT veteran describes the four stages of the technology organization -- and what it takes to move up a notch
Wed, February 26, 2014 - Yuri Aguiar, CIO at Ogilvy and Mather, says a new social, intranet-based portal manages the company's content and has become 'a vital and vibrant place for our employees around the world to quickly find each other and the information they need to do their jobs.'
Wed, February 26, 2014 - French cosmetics company Clarins uses Demandware for international ecommerce expansion.
Wed, February 26, 2014 - Are iPhones used primarily by more mature mobile users who crave ease of use? Are Android phones more popular among the young, techie and cost-conscious? CIO.com's Tom Kaneshige has discovered there are no simple answers.
Wed, February 26, 2014 - A recent threat intelligence study reports widespread security vulnerabilities in healthcare organizations, many of which went unnoticed for months. In December, a developer pulled unencrypted data from a 'certified' mobile health app in less than a minute. Why is it so hard for healthcare to get security right?
Tue, February 25, 2014 - When traveling to a foreign country, the exchange rate may not always be in your favor, but your iPhone is as good as gold -- and with the markup you can charge, it may be better than gold.
Tue, February 25, 2014 - With divestitures on the rise, CIOs at Hess, DuPont and other companies that are selling off pieces of the business must rip apart deeply integrated systems.
Mon, February 24, 2014 - The business intelligence software veteran is adapting to the latest analytics trends--and to new rivals.
Mon, February 24, 2014 - Three CIOs discuss how a successful business continuity plan requires prioritization, awareness and testing
Mon, February 24, 2014 - For IT to stop being a 'cost center' in hospitals and other healthcare organizations, CIOs need to dictate their own IT strategy. Demonstrating the value of information technology to reluctant end users and making better decisions will help IT leaders achieve that goal.
Fri, February 21, 2014 - In medieval times, kings let barbarians break down the castle gates but made sure they paid the price once they got inside. McAfee's approach to security takes a similar approach -- since data breaches are inevitable, companies should worry less about the perimeter and more on catching the bad guys in the act.