How we chose the 2012 CIO 100 winners
- 27 July, 2012 13:22
Beginning last November, we solicited applications for the 2012 CIO 100 Awards through ads in CIO and our online newsletters, and through electronic mailings to our print subscribers, event attendees and publicists who sign up to receive our editorial announcements.
Entrants filled out an online application between November 2011 and late February 2012. Although most applications came from companies headquartered in North America, the pool included entries from multiple continents.
Two CIO 100 judges--who included former CIOs, academic experts and independent consultants--read each application. The judges evaluated the applications according to two criteria: innovation and business value. Applications that received a score of 15 or higher (out of a possible 20) were selected for a second round of scrutiny by CIO editors.
We examined how each company stacked up against the others in the pool, putting emphasis on submissions that told the best stories about generating business value through creative and cutting-edge uses of technology. We sought to cull the most exciting initiatives from the pack and reward them with the CIO 100 honor.
The companies we selected for this year's CIO 100 Awards range from nonprofits to multibillion-dollar global powerhouses, and they come from every industry. Companies had to demonstrate not only that they were able to create new value using IT and to execute their project well, but also that they did so in uncommon, innovative ways: pioneering a new technology, applying a familiar technology to a new purpose, setting the bar higher for their competitors. We also emphasized projects that, due to their scope and impact, are helping propel companies to a more profitable future. In short, these organizations are technology leaders.
The list of award winners was published in the July 1 issue of CIO magazine, and award plaques will be handed out at the 2012 CIO 100 Symposium and Awards Ceremony, August 19-21, in Rancho Palos Verdes, Calif.
Read more about innovation in CIO's Innovation Drilldown.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Implementing A Security Analytics Architecture
According to the 2012 Verizon Data Breach Investigations report, 99% of breaches led to data compromise within “days” or less, whereas 85% of breaches took “weeks” or more to discover. This presents a significant challenge to security teams as it grants attackers extended periods of time within a victim’s environment. More “free time” leads to more stolen data and more digital damage. Principally, this is because today’s security measures aren’t designed to counter today’s more advanced threats. Read on.
CSO Spotlight: Security-as-a-Service Gaining Popularity
Organizations that are looking for security features including identity management, encryption and access control — and at the same time want to take advantage of the cost and flexibility benefits of the cloud —might check into security-as-a-service offerings available now from several vendors. Download now to find out more.
Accelerate Cloud and Composite Application Delivery
Are your requirements the need for faster release cycles, you have reduced budgets required to run and manage a complex test environment, and you want to decrease your third party expenses? HP Service Virtualisation, designed to enable your teams to create, develop and test against virtual services that simulate real service behaviour with no constraints, available anytime.