How we chose the 2012 CIO 100 winners
- 27 July, 2012 13:22
Beginning last November, we solicited applications for the 2012 CIO 100 Awards through ads in CIO and our online newsletters, and through electronic mailings to our print subscribers, event attendees and publicists who sign up to receive our editorial announcements.
Entrants filled out an online application between November 2011 and late February 2012. Although most applications came from companies headquartered in North America, the pool included entries from multiple continents.
Two CIO 100 judges--who included former CIOs, academic experts and independent consultants--read each application. The judges evaluated the applications according to two criteria: innovation and business value. Applications that received a score of 15 or higher (out of a possible 20) were selected for a second round of scrutiny by CIO editors.
We examined how each company stacked up against the others in the pool, putting emphasis on submissions that told the best stories about generating business value through creative and cutting-edge uses of technology. We sought to cull the most exciting initiatives from the pack and reward them with the CIO 100 honor.
The companies we selected for this year's CIO 100 Awards range from nonprofits to multibillion-dollar global powerhouses, and they come from every industry. Companies had to demonstrate not only that they were able to create new value using IT and to execute their project well, but also that they did so in uncommon, innovative ways: pioneering a new technology, applying a familiar technology to a new purpose, setting the bar higher for their competitors. We also emphasized projects that, due to their scope and impact, are helping propel companies to a more profitable future. In short, these organizations are technology leaders.
The list of award winners was published in the July 1 issue of CIO magazine, and award plaques will be handed out at the 2012 CIO 100 Symposium and Awards Ceremony, August 19-21, in Rancho Palos Verdes, Calif.
Read more about innovation in CIO's Innovation Drilldown.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Top Words Used in Spear Phishing Attacks to Successfully Compromise Enterprise Networks and Steal Data
- Easing The Transition To A Virtual Endpoint Infrastructure
- FAQs: How to break the old trade-off between effectiveness against malware and speed
- Big Data Computerworld Strategy Guide
- Addressing PCI DSS Requirements with Trend Micro Enterprise Security
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Mobile Load - Performance Testing for Mobile Applications
Key mobile trends and analysis on how performance testers must change their testing methodologies to ensure they are accounting for the changes caused by mobile usage. Download today.
The Foundation for Cloud Management
For businesses looking to provide real-time business solutions to employees and customers alike, you need to have a comprehensive network management strategy. The network is the foundation of all successful cloud services; it must be robust to meet traffic, efficiency, and performance demands. Download today the four steps to get your network operations cloud-ready.
Agentless Security for Virtual Environments
Virtualised datacentres, desktops, and cloud computing should be secured by the same strong protection technologies as physical machines. However, traditional agent-based solutions that are not architected for virtualisation can result in a number of significant operational security issues. Find out more about the first agentless security platform solution.