Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

3 Ways CIOs Work With Sales to Create Innovative Solutions

Here are three ways innovative CIOs are recruiting ideas, building trust and embracing lessons learned when building tools sales teams want to use.

1. Get Continual Input

Sheryl Fikse, CIO, Southwire: Almost a year ago, we set out to ensure that our salespeople are better equipped than anyone else who could call on a customer. We created two new tablet applications that provide real-time access to the information we hold on customers and inventory. The customer-focused app rolled out in June and the configuration-management app went live in September, and we're seeing an amazing rate of adoption.

To continue reading, register here to become an Insider . You'll get free access to premium content from CIO, Computerworld, CSO, InfoWorld, and Network World. See more Insider content or sign in.

Register or Login to continue

This article is only available for subscribers. Sign up now for free and get free access to premium content from ARN, CIO, CMO, and Computerworld.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: freemium, leadership, alignment, business knowledge, Networking, CIO role, IT management, management, relationships, Management | CIO Role
Latest Blog Posts
Whitepapers
  • Manufacturing Overview
    An enterprise resource planning (ERP) software solution provides the ability to access the right information, from the right source, at the right time, empowering all users throughout the supply chain. This report explains how your solution can identify the resources needed to capture, produce, ship, and account for customer orders, while supporting the various manufacturing processes.
    Learn more »
  • Using an Expert System for Deeper Vulnerability Scanning
    This paper serves security professionals interested in better techniques for finding vulnerabilities, who have a solid understanding of networking principles and familiarity with the concepts related to hacking, vulnerabilities, and exploits. Read on for an in-depth view of the use of expert systems to achieve accurate and detailed vulnerability results.
    Learn more »
  • IBM X-Force Threat Intelligence
    In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index


Computerworld
ARN
Techworld
CMO