CIO Magazine: March 1, 2011

iPhone Banking: How USAA Launched New Mobile Apps for Customers

The financial services company built on existing technology to enable iPhone and Android users to deposit checks remotely.

Four Ways to Mitigate Mobile and Cloud Data Leaks

Your CEO may be paranoid about WikiLeaks, but his mobile device and cloud computing are the real threats to corporate security


Five Things You Need to Know About LTE

LTE, or long-term evolution service, is poised to be the new world standard for mobile data. Here are five things that set it apart from its predecessors.

How CIOs Can Enable an Empowered Business

IT will see a lot of change by 2020 and as CIO, you need to help your company get out in front. Here are four keys to success from Forrester Research.

Four Kinds of IT Professionals CIOs Need to Hire Now

Developers of mobile, social media and collaboration apps. Business experts. Cloud-vendor managers. Masters of unstructured data. Why these IT professionals are essential to maintaining your company’s competitive edge.


Why New Technology Demands New Business Models

You’ll get the most from investments in cloud computing, mobile applications and other emerging technology if you apply them to fresh ways of doing business.


What Retailers Can Teach You About Green IT

Retailers get a payoff from sustainability because it’s part of their business strategy. It’s the same lesson companies have learned about investing in technology.

Why 2011 Is the Year of the Tablet

Michael Friedenberg, President and CEO of IDG Enterprise, says all signs indicate it will be all about tablets this year and CIOs should do what they can to stay ahead of the game.


BI in the Cloud: Advice for Success

To get the benefits of BI in the cloud, pay attention to vendor contract details and integration needs

Survey: More to IT Than Building and Running Systems

A survey by CIO and the MIT Center for Information Systems Research finds the IT department role goes beyond delivering systems. Technologists must help companies exploit the technology, too.

1 2 Page 1