• Edition
  • United States
  • Africa
  • ASEAN
  • Australia
  • Canada
  • India
  • Ireland
  • Middle East
  • Netherlands
  • New Zealand
  • United Kingdom
  • Events
  • Newsletters
  • White Papers/Webcasts
  • Brandposts
  • Community
  • Blogs
  • Podcasts
  • CIO 100 Awards
  • CIO Digital Magazine
  • CIO Leadership Live
  • CIO Think Tank
  • Analytics
  • Careers
  • Cloud Computing
  • Digital Transformation
  • Diversity and Inclusion
  • Enterprise Applications
  • Innovation
  • IT Leadership
  • IT Management
  • IT Operations
  • IT Strategy
  • Project Management
Skip to content
  • Menu
  • Events
  • Newsletters
  • White Papers/Webcasts
  • Brandposts
  • Community
  • Blogs
  • Podcasts
  • CIO 100 Awards
  • CIO Digital Magazine
  • CIO Leadership Live
  • CIO Think Tank
  • Analytics
  • Careers
  • Cloud Computing
  • Digital Transformation
  • Diversity and Inclusion
  • Enterprise Applications
  • Innovation
  • IT Leadership
  • IT Management
  • IT Operations
  • IT Strategy
  • Project Management
  • SIGN IN
  • REGISTER

Learn about Insider

Help

Member Preferences

Hot Topics
  • IT Leadership
  • Digital Transformation
  • Innovation
  • Data Analytics & AI
  • Enterprise Applications
  • Diversity and Inclusion
Home / Sponsors

From Our Advertisers

Building an Agile Business Rules Engine on AWS
Sponsored by AWS and Capgemini

Building an Agile Business Rules Engine on AWS

A cloud-based rules engine can be scaled, easily configured, and quickly accessed, enabling organizations to be completely agile in developing new business rules, or updating/retiring business rules, without relying on IT.
Capgemini’s Trusted Logistics and Drug Counterfeit Solution for the Pharma Industry
Sponsored by AWS and Capgemini

Capgemini’s Trusted Logistics and Drug Counterfeit Solution for the Pharma Industry

Transportation and supply chain inefficiencies can cause devastation for the pharmaceutical industry and the consumers it serves. Capgemini’s Trusted Logistics provides a solution.
How Capgemini Uses AWS IoT to Monitor Farmland Through Agricultural Insights
Sponsored by AWS and Capgemini

How Capgemini Uses AWS IoT to Monitor Farmland Through Agricultural Insights

With the use of IoT technologies and agricultural insights, today’s farmers can better assess and understand their farmland, to help yield the crops demanded by a growing population of people.
3 Ways to Simplify Data Management
Sponsored by HPE

3 Ways to Simplify Data Management

Organizations have discovered ways to overcome data management complexity and deliver the cloud operational experience. Here’s how.
What to Look for in a Modern DevOps Solution
Sponsored by Rocket Software

What to Look for in a Modern DevOps Solution

Many DevOps solutions currently in use are simply outdated and unable to meet the complex challenges facing businesses. We rounded up key features to consider as you modernize your organization.
Determining the right multi-cloud approach
Sponsored by VMware

Determining the right multi-cloud approach

To get ahead, organizations need a consistent multi-cloud operations and applications management stack.
Learning from Experience: 5 Critical Success Factors for CIAM Passwordless Projects
Sponsored by Transmit Security

Learning from Experience: 5 Critical Success Factors for CIAM Passwordless Projects

The benefits of passwordless authentication are indisputable, but a successful passwordless implementation project requires a very thoughtful approach. nn
GREEN500 Supercomputer Powering Robot Scientists and Transformational Machine Learning
Sponsored by Dell Technologies and Intel®

GREEN500 Supercomputer Powering Robot Scientists and Transformational Machine Learning

University of Cambridge has one of the greenest, and fastest supercomputers in the world.
Top500: The Supercomputers Advancing Cyber Security, Renewable Energy, and Black Hole Research
Sponsored by Dell Technologies and Intel®

Top500: The Supercomputers Advancing Cyber Security, Renewable Energy, and Black Hole Research

Get a peek into the standouts conducting powerful research in energy generation, cyber and physical threats, and astrophysics.
Lessons from the Field: Improving the Developer Experience and Cutting through Complexity
Sponsored by VMware

Lessons from the Field: Improving the Developer Experience and Cutting through Complexity

By enhancing the developer experience and reducing underlying complexities, we can enhance the time to market and make developer and operations team’s lives simpler…and more fulfilling.
Bionic Eye, Disease Control, Time Crystal Research Powered by IO500 Top Storage Systems
Sponsored by Dell Technologies and Intel®

Bionic Eye, Disease Control, Time Crystal Research Powered by IO500 Top Storage Systems

CSIRO in Australia, Simon Fraser University in Canada, and Stanford University in the U.S. in the world’s fastest storage systems.
Digital Twin Use Races Ahead at McLaren Group
Sponsored by Dell Technologies and Intel®

Digital Twin Use Races Ahead at McLaren Group

Condition-based Insights Fuel Rapid Innovation in Highly Competitive Formula 1 Racing
How to Achieve Security First for a Remote-First Workforce
Sponsored by Tanium

How to Achieve Security First for a Remote-First Workforce

Cyber risks have increased, however, they’re not insurmountable given the right strategy.
Protecting Workers with a Digital Safety Net
Sponsored by SAP

Protecting Workers with a Digital Safety Net

Digital technology is inspiring a new era of innovation in occupational safety, especially for those working in hazardous conditions and alone.
Air Canada Flies Into the Digital Stratosphere
Sponsored by SAP

Air Canada Flies Into the Digital Stratosphere

Learn how Air Canada’s digital transformation earned them a winner’s trophy at the 2022 SAP Innovation Awards.
Transforming Accounting With a Modern Financial Management System
Sponsored by Sage Intacct

Transforming Accounting With a Modern Financial Management System

As cloud-native management systems gain traction in finance, experts weigh in on the benefits to companies, employees, and customers.
The Evolving Role of the CIO
Sponsored by Rocket Software

The Evolving Role of the CIO

With the modernizing of business technologies, the role of CIO has changed significantly. Here’s one approach to hiring talent with the right criteria.
Stop Thinking Small: 100% of Your Customers Can Go Passwordless
Sponsored by Transmit Security

Stop Thinking Small: 100% of Your Customers Can Go Passwordless

Passwords have reached end of life. Is your organization prepared for passwordless authentication? Here’s how to reach a 100% customer adoption rate.
You’ve Got the Data. Why Can’t Your Developers Build with it?
Sponsored by DataStax

You’ve Got the Data. Why Can’t Your Developers Build with it?

By Chet Kapoor, Chairman and CEO, DataStax – Customers demand experiences that meet them at the speed of life. Think about an app that lets you know exactly when your latte will be ready or one that offers you alternate flight options as soon as you miss your connection.
Decision-makers’ guide to multi-cloud experiences
Sponsored by VMware

Decision-makers’ guide to multi-cloud experiences

A new survey of IT leaders pinpoints benefits and challenges.
5 Reasons Why a Good First Login Experience Can Drive Revenue
Sponsored by Transmit Security

5 Reasons Why a Good First Login Experience Can Drive Revenue

Customers have the power to choose which digital vendors to spend their money with. And they’re choosing those vendors that provide the most effortless transactions – starting with their first login.
5 Steps to Optimized Value Stream Management for Agile and Development Leaders
Sponsored by Broadcom

5 Steps to Optimized Value Stream Management for Agile and Development Leaders

Value Stream Management (VSM) tools and principles enable teams to enhance innovation, optimally balance resources, and fuel dramatic improvements in delivery. But how do leaders get started?
How to Drive Sustainable, Data-First Business With HPE GreenLake
Sponsored by Hewlett Packard Enterprise

How to Drive Sustainable, Data-First Business With HPE GreenLake

With the right technologies in place, you can embark on data-first transformation with an eye toward energy reduction.
PeaSoup: The UK’s Only Cloud Provider to Use Liquid Immersion Cooling Technology Has a History of Innovation
Sponsored by VMware

PeaSoup: The UK’s Only Cloud Provider to Use Liquid Immersion Cooling Technology Has a History of Innovation

PeaSoup has already dramatically reduced its carbon footprint by deploying systems that enable the company to use 60% less power than comparably sized providers, but that’s just the start. It’s determined to decrease its emissions to near zero, or lower, by the middle of this decade.
Considerations for Effectively Leading a Global Workforce
Sponsored by Rocket Software

Considerations for Effectively Leading a Global Workforce

The key to maintaining a strong global workforce amid the Great Resignation? Prioritizing your employees – no matter their location. Here are three ways successful leaders are doing just that.
As a CIO, Why Should I Support an Internal Developer Portal?
Sponsored by VMware

As a CIO, Why Should I Support an Internal Developer Portal?

At a high-level, developer portals greatly improve your organization's developer experience: the ease and speed with which developers can do their daily jobs. This makes developers not only more productive but also happier.
Broadcom Software Shows How the Cyber Defence Centre Will Help in 2022
Sponsored by Broadcom Software

Broadcom Software Shows How the Cyber Defence Centre Will Help in 2022

By Andy Nallappan, Chief Technology Officer and Head of Software Business Operations, Broadcom Software – Enterprises and operators of critical infrastructure have long been on the front lines of cybersecurity. Most recently, new threats have been identified through our Symantec Threat Hunter team, including Lazarus, Verblecon and Daxin. And of course, the previous attacks forcing major service interruptions on large infrastructure.
Let’s meet! Virtually, in-person, or somewhere in between?
Sponsored by NTT

Let’s meet! Virtually, in-person, or somewhere in between?

The love/hate relationship with virtual events and what can be done to deliver better experience
Architecting Identity: Five Essential Elements of a Modern Customer Authentication Service
Sponsored by Transmit Security

Architecting Identity: Five Essential Elements of a Modern Customer Authentication Service

Enhancing customer authentication leads to more robust security, among other benefits. The best identity architects use a FIDO-based solution to modernize their customer authentication. Here’s how.
Don’t Get Caught with Your Door Unlocked
Sponsored by Skyhigh Security

Don’t Get Caught with Your Door Unlocked

The case for Zero Trust security has never been clearer than it is today. Workflows are increasingly happening in the cloud, hybrid work is becoming the norm, and the number and impact of cyberattacks continues to escalate. According to the Cloud Collaboration Market 2022 by Mordor Intelligence, the Cloud Collaboration Market is growing at a calculated annual growth rate of 13.43% over the next five years. It seems the hackers have noticed.
How CIOs Can Accelerate Digital Growth Through Automation
Sponsored by UiPath

How CIOs Can Accelerate Digital Growth Through Automation

By automating key IT and business processes, CIOs can digitally transform their enterprises to grow revenue, improve operational efficiency, and increase employee and customer satisfaction.
Your New Cloud for AI May Be Inside a Colo
Sponsored by NVIDIA

Your New Cloud for AI May Be Inside a Colo

Enterprises moving their artificial intelligence projects into full scale development are discovering escalating costs based on initial infrastructure choices. Many companies whose AI model training infrastructure is not proximal to their data lake incur steeper costs as the data sets grow larger and AI models become more complex.
Make Better AI Infrastructure Decisions: Why Hybrid Cloud is a Solid Fit
Sponsored by NVIDIA

Make Better AI Infrastructure Decisions: Why Hybrid Cloud is a Solid Fit

The traditional approach for artificial intelligence (AI) and deep learning projects has been to deploy them in the cloud. Because it’s common for enterprise software development to leverage cloud environments, many IT groups assume that this infrastructure approach will succeed as well for AI model training.
Hidden Mistakes that Companies Make in their AI Journey
Sponsored by NVIDIA

Hidden Mistakes that Companies Make in their AI Journey

As more companies deploy artificial intelligence (AI) initiatives to help transform their businesses, key areas where projects can go off the rails are becoming clear. Many problems can be avoided with some advanced planning, but several hidden obstacles exist that companies don’t often see until it’s too late.
Colocation: A Crucial Pillar for Building a Data-First Organization
Sponsored by Hewlett Packard Enterprise

Colocation: A Crucial Pillar for Building a Data-First Organization

Colocation adds another robust layer to a hybrid IT estate, but there are challenges to making the move and ensuring seamless integration.
Why Now is the Time to Converge IT and Security Functions
Sponsored by Tanium

Why Now is the Time to Converge IT and Security Functions

What does it mean for IT and security functions to converge? Learn how and why these two distinctive functions can eliminate silos.
Point Tools are Failing: The Need For a New Class of Converged Endpoint Platforms
Sponsored by Tanium

Point Tools are Failing: The Need For a New Class of Converged Endpoint Platforms

Navigating the largest attack surface in history requires a convergence of tools, teams, and data. Here’s what that looks like.
Too Many Tools in the Security Box and What to Do About It
Sponsored by Tanium

Too Many Tools in the Security Box and What to Do About It

When it comes mitigating cybersecurity risks, technology, tools and partnerships are critical — but you can have too much of a good thing!
How to Achieve a Holistic, Integrative and Proactive View of Risk
Sponsored by Tanium

How to Achieve a Holistic, Integrative and Proactive View of Risk

Security risks are increasing and becoming more sophisticated. It’s critical to gain visibility to ensure all endpoints and systems are appropriately secured.
Determining the right multi-cloud approach for your applications
Sponsored by VMware

Determining the right multi-cloud approach for your applications

Avoiding inconsistent workflows and application limitations are essential keys to realizing the desired benefits.
Seven Signs That Your Consumers are Ready for Passwordless Authentication
Sponsored by Transmit Security

Seven Signs That Your Consumers are Ready for Passwordless Authentication

A brief assessment of your customers using these 7 signs will reveal whether passwordless authentication can ease your customers’ journey.
C-Suite Must Mitigate Siloes to Mitigate Security Risks
Sponsored by Tanium

C-Suite Must Mitigate Siloes to Mitigate Security Risks

Organizations have multiple teams often working in isolation to manage vulnerabilities and security concerns, creating even greater risks.
Despite Advancements in Technology, the Mainframe Remains a Priority
Sponsored by Rocket Software

Despite Advancements in Technology, the Mainframe Remains a Priority

A recent study shows that IT professionals say the mainframe continues to dominate IT infrastructure, and regardless of digital transformations, it will continue to do so.
Developing Data Security Practices Before, During, and After Cloud Migrations
Sponsored by Tanium

Developing Data Security Practices Before, During, and After Cloud Migrations

Here’s how to validate cloud security throughout the migration process.
Why DE&I Should Be Part of Your Engineering Culture – And How to Do It
Sponsored by VMware

Why DE&I Should Be Part of Your Engineering Culture – And How to Do It

When there are diverse teams and an inclusive culture, one will undeniably realize greater output and better products that meet the needs of the general public and users.
Zero Trust: Protecting Data Wherever It Resides with Data-Aware Security
Sponsored by Skyhigh Security

Zero Trust: Protecting Data Wherever It Resides with Data-Aware Security

Protecting remote workers’ access to cloud applications, public cloud environments, and private access networks is crucial. While organizations are thriving in highly collaborative environments with globally dispersed teams, partners, vendors, and suppliers, the sharing of data comes with risk. It is now more imperative than ever to have a precise level of control and insight into the data sharing process.
Convergence is Key to Supply Chain Resilience: NC State University Research
Sponsored by GEP

Convergence is Key to Supply Chain Resilience: NC State University Research

The need of the hour is to ‘converge’ critical processes, information flows and technologies across the organization, supply chain and extended ecosystem. Explore the NC State University research to learn more.
The Age of Zero Trust Security
Sponsored by Tanium

The Age of Zero Trust Security

Effective security amid today’s distributed workforces requires a “trust no one” approach.
The New Cybersecurity Motto: Trust is Not an Option
Sponsored by Tanium

The New Cybersecurity Motto: Trust is Not an Option

Today’s risk environment requires more than simply managing identities and authenticating users.
Three Steps to Creating a Risk Reporting Strategy
Sponsored by Tanium

Three Steps to Creating a Risk Reporting Strategy

Effective reporting helps everyone in the organization better understand and mitigate risks. Here’s what that looks like.
Previous 1 2 3 4 5 6 7 8 9 10 … 73 Next

Sponsored Links

  • Want to learn how to simplify your IT operations with automation technology that meets your standards.
  • Successful and profitable Edge infrastructure management requires planning. Is your enterprise ready?
  • Keep your business always-on with Carbonite® Availability
  • Every second counts when it comes to mitigating cyberattacks and resolving network performance issues. NETSCOUT Visibility Without Borders keeps you one step ahead.
  • Connect With CIOs & IT Executives At Gartner IT Symposium/ Xpo™ 2022
  • Do you have what it takes to be a Transformative CIO? Learn what IT leaders are doing to integrate technology, business processes, and people to drive business agility and innovation.
  • SANS Summer Buy Window: Through July 31 eligible SLTTs can save more than 50% off training.
  • The cyber insurance market is getting tougher as premiums and the bar to get coverage go up
  • It’s time for a simpler AI approach. Discover Lakehouse today.
  • Software risk is business risk. Learn how to build trust in your software with Synopsys with a click through to
The voice of IT leadership
  • Policies
    • Privacy Policy
    • Cookie Policy
    • Member Preferences
    • About AdChoices
    • Your California Privacy Rights
  • About
    • About Us
    • Advertise
    • Contact Us
    • Foundry Careers
    • Reprints
    • Newsletters
  • More from CIO
    • News

      Reviews

      Buyer's Guides

      Blogs/Opinion

      Podcasts

      Awards programs

  • Digital Magazine
    • View the archive

Copyright © 2022 IDG Communications, Inc.
Top Of Page