How we chose the 2012 CIO 100 winners
- 27 July, 2012 13:22
Beginning last November, we solicited applications for the 2012 CIO 100 Awards through ads in CIO and our online newsletters, and through electronic mailings to our print subscribers, event attendees and publicists who sign up to receive our editorial announcements.
Entrants filled out an online application between November 2011 and late February 2012. Although most applications came from companies headquartered in North America, the pool included entries from multiple continents.
Two CIO 100 judges--who included former CIOs, academic experts and independent consultants--read each application. The judges evaluated the applications according to two criteria: innovation and business value. Applications that received a score of 15 or higher (out of a possible 20) were selected for a second round of scrutiny by CIO editors.
We examined how each company stacked up against the others in the pool, putting emphasis on submissions that told the best stories about generating business value through creative and cutting-edge uses of technology. We sought to cull the most exciting initiatives from the pack and reward them with the CIO 100 honor.
The companies we selected for this year's CIO 100 Awards range from nonprofits to multibillion-dollar global powerhouses, and they come from every industry. Companies had to demonstrate not only that they were able to create new value using IT and to execute their project well, but also that they did so in uncommon, innovative ways: pioneering a new technology, applying a familiar technology to a new purpose, setting the bar higher for their competitors. We also emphasized projects that, due to their scope and impact, are helping propel companies to a more profitable future. In short, these organizations are technology leaders.
The list of award winners was published in the July 1 issue of CIO magazine, and award plaques will be handed out at the 2012 CIO 100 Symposium and Awards Ceremony, August 19-21, in Rancho Palos Verdes, Calif.
Read more about innovation in CIO's Innovation Drilldown.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Clearing the Clouds for Midmarket Businesses
Cloud computing promises to help midmarket companies reduce cost and complexity in the IT equation – and gain the flexibility and agility they need to thrive. Yet charting a clear course to the cloud isn’t always easy. In this paper, we aim to clear the clouds. We examine different cloud computing models, discuss the types of requirements that each can best address, and consider what midmarket businesses should look for in a cloud solutions provider.
Advanced Targeted Attacks
The new threat landscape has changed. Cybercriminals are aggressively pursuing valuable data assets, such as financial transaction information, product design blueprints, user credentials to sensitive systems, and other intellectual property. Simply put, the cyber offense has outpaced the defensive technologies used by most companies today. Find out more on how to protect against the next generation of cyber-attacks.
The Big Data Security Analytics Era is Here
Large organizations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous monitoring and data analysis for up‐to-the‐minute situational awareness and rapid data-driven security decisions. This means that large organisations have entered the era of big data security analytics. Learn more.