How we chose the 2012 CIO 100 winners
- 27 July, 2012 13:22
Beginning last November, we solicited applications for the 2012 CIO 100 Awards through ads in CIO and our online newsletters, and through electronic mailings to our print subscribers, event attendees and publicists who sign up to receive our editorial announcements.
Entrants filled out an online application between November 2011 and late February 2012. Although most applications came from companies headquartered in North America, the pool included entries from multiple continents.
Two CIO 100 judges--who included former CIOs, academic experts and independent consultants--read each application. The judges evaluated the applications according to two criteria: innovation and business value. Applications that received a score of 15 or higher (out of a possible 20) were selected for a second round of scrutiny by CIO editors.
We examined how each company stacked up against the others in the pool, putting emphasis on submissions that told the best stories about generating business value through creative and cutting-edge uses of technology. We sought to cull the most exciting initiatives from the pack and reward them with the CIO 100 honor.
The companies we selected for this year's CIO 100 Awards range from nonprofits to multibillion-dollar global powerhouses, and they come from every industry. Companies had to demonstrate not only that they were able to create new value using IT and to execute their project well, but also that they did so in uncommon, innovative ways: pioneering a new technology, applying a familiar technology to a new purpose, setting the bar higher for their competitors. We also emphasized projects that, due to their scope and impact, are helping propel companies to a more profitable future. In short, these organizations are technology leaders.
The list of award winners was published in the July 1 issue of CIO magazine, and award plaques will be handed out at the 2012 CIO 100 Symposium and Awards Ceremony, August 19-21, in Rancho Palos Verdes, Calif.
Read more about innovation in CIO's Innovation Drilldown.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Devising a Server Protection Strategy with Trend Micro
With so many Information Technology solutions available to choose from today, many organizations put their trust in the experience, insight and advice of Gartner, and their industry-leading analysts. Trend Micro’s portfolio of solutions meets and exceeds Gartner’s recommendations on how to devise a server protection strategy. Precisely how Trend Micro does it is detailed in this whitepaper. Read now.
Getting Real About Security Management and Big Data – A Roadmap for Big Data in Security Analytics
It’s an exciting yet daunting time to be a security professional. Security threats are becoming more aggressive and voracious. This whitepaper examines the escalating complexity for the security management environment; how to get more meaning from data already collected and the combination of infrastructure, analytic tools and threat intelligence need to drive business value from Big Data. Download now.
Android Malware Exposed
Take an in-depth look at the evolution of android malware. The world of malware targeting the Android OS is similar yet very different from malware affecting Windows. Explore the rapidly evolving world of android malware and shed light on the various techniques used to exploit devices using this OS.