Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
8 dangers of shadow IT and how to manage them
Unauthorized devices, software and system changes -- and other forms of shadow IT -- can expose organizations to a range of security risks. Here are ways to manage them. Continue Reading
7 business process management challenges and how to fix them
Unclear goals, weak C-level support and subpar testing setups are among the factors that can derail BPM initiatives. Learn about seven BPM challenges and ways to overcome them. Continue Reading
Digital transformation challenges and 14 ways to solve them
Heading into 2024, CIOs must make digital transformation a core competency. Bestselling author Isaac Sacolick names the primary challenges organizations face and how to solve them. Continue Reading
-
11 reasons why digital transformations fail, explained by pros
Digital transformations continue to be challenging and are prone to failure. Learn about 11 fatal mistakes to avoid at all costs. Continue Reading
12 digital transformation tips and best practices
Successful digital transformation requires agility, speed, cost optimization, technical innovation and cultural change. C-suite commitment and employee buy-in are also critical. Continue Reading
7 challenges with blockchain adoption and how to avoid them
Organizations tend to face the same hurdles when they try to implement blockchain. Knowing what they are could be the first big step to overcoming them on the road to success.Continue Reading
4 challenges for creating a culture of innovation
Successful technology introduction pivots on a business's ability to embrace change. CIOs need to encourage risk-taking while providing guardrails to keep deployments on track.Continue Reading
5 advantages and 6 disadvantages of open source software
Open source software is popular with both small and large organizations, and for good reason. But CIOs should understand which situations works best for this lower cost option.Continue Reading
How to create a proof of concept with 6 free templates
What is a proof of concept and how does it help an organization? Here we dive into the importance of writing a POC and provide a list of free templates to help get you started.Continue Reading
8 free IT strategic planning templates and examples for CIOs
As technology becomes a business differentiator, a well-thought-out IT strategy plan is more crucial than ever. These IT strategy templates help CIOs make IT a business driver.Continue Reading
-
Navigating 7 digital experience monitoring challenges
Evaluating both customer and employee digital experience is increasingly valuable in the enterprise. Leaders will need to plan for the challenges that come with this new technology.Continue Reading
CIOs use data, tech to tackle racial disparities in healthcare
CIOs are looking at data and democratizing technology to help health systems address racial and economic disparities that COVID-19 made impossible to ignore.Continue Reading
6 tips for CIOs managing technical debt
Managing technical debt can be a challenge, but stepping back and positioning each project in the bigger picture can help minimize it going forward.Continue Reading
The return-to-work challenge: Ensuring employees remain safe
Simone Fenton-Jarvis offers some advice on how companies looking to reopen their offices safely could do so, allowing employees to actually be safe and feel it too.Continue Reading
How to maintain cybersecurity remotely during the pandemic
In the second 2020 MIT Sloan CIO Digital Learning Series, a panel of IT security leaders discussed how they are keeping their organizations secure in a COVID-19 environment.Continue Reading
Top 10 causes of RPA failures and how to avoid them
Experts in automation offer insight on why RPA implementations fail in the enterprise and how IT leaders can avoid them to ensure they're getting the most out of the technology.Continue Reading
5 post cloud migration risks and how CIOs can avoid them
We've covered issues that arise when making the move to the cloud but here we're diving into the challenges CIOs and their IT teams face post cloud migration and how to avoid them.Continue Reading
Creating agile conversations in digital transformation initiatives
Douglas Squirrel and Jeffrey Fredrick, authors of the book 'Agile Conversations,' dive into the significance of improved conversations while undergoing digital transformations.Continue Reading
How to overcome the limitations of AI
AI may not become the super-intelligent tool people envisioned, at least not in the near term. But that doesn't mean enterprises can't use AI in some valuable ways.Continue Reading
Why cloud migration failures happen and how to prevent them
Companies are moving more applications than ever to the cloud, but many of these initiatives fail. Learn how to avoid making your own cloud migration mistakes.Continue Reading
In comparing GDPR and CCPA, lessons in compliance emerge
In anticipation of the CCPA Jan. 1, 2020, implementation date, business leaders should understand the parallels between GDPR and CCPA to learn from the EU's GDPR rollout period.Continue Reading
6 ways AI and automation could improve process mining
Creating a digital twin of your enterprise, identifying automation candidates for RPA and connecting isolated tasks into processes are a few ways CIOs can advance process discovery.Continue Reading
Home Depot CIO promotes in-house tech boot camp
For companies having trouble finding qualified IT professionals to hire, the solution may be closer than you think. Just ask Home Depot, which now trains IT employees in-house.Continue Reading
How to deal with the lack of chatbot standards
A lack of standards around chatbot development has created a situation in which enterprises are building and rebuilding bots. But that could change in the near future.Continue Reading
How one CIO overcame the challenges of shadow apps
CIO John Rathje explains how he's tackling shadow IT challenges in the recruiting admissions process at Kent State by deploying a data integration tier that supports data movement.Continue Reading
Ransomware attacks: How to get the upper hand
Ransomware attacks are on the rise. Can organizations play like Radiohead and refuse to pay? The answer from security experts is a qualified yes.Continue Reading
New BPMS architecture is answer to 'future-proofing' the enterprise
An aging, complex IT environment needed to become more nimble -- and remain stable. A months-long project using a new BPMS architecture pointed the way.Continue Reading
Why is diversity in tech becoming a CIO issue?
CIOs need to take radical steps to increase the number of women and minorities in tech. Deloitte's Anjali Shaikh explains.Continue Reading
How can CIOs improve their IT mentorship programs?
According to Deloitte's Anjali Shaikh, CIOs are no better than their C-suite peers at mentoring. An IT talent shortage demands CIOs do better. Here's how.Continue Reading
6 potential blockchain limitations for enterprise use
The potential benefits of blockchain for enterprise use must be weighed against blockchain's limitations. Here are six.Continue Reading
4 integrated monitoring strategies that will improve IT operations
Digital transformation expert Isaac Sacolick offers four ways to build an integrated monitoring architecture that will actually improve IT operations -- not slow them down.Continue Reading
Problems with blockchain and how they're being solved
Do you know about the blockchain trilemma? David Petersson looks at some of the problems with blockchain and how cutting-edge companies are tackling them.Continue Reading
5 reasons CIO career paths go south -- and how to protect yourself
Safeguard your CIO career path. Agiloft CEO Colin Earl details the top five reasons CIOs get the ax -- and how to avoid them.Continue Reading
The big data paradox, or why no one thought Trump would win
It's commonly assumed that statistical analysis improves as sample size grows. But big data isn't always better data. A Harvard statistician explains why it's not that simple.Continue Reading
BPM tools mitigate business disruption amid digital transformation
A major challenge in digital transformation is avoiding harmful disruption to the business while doing the work of creating a new business/IT operating model. BPM tools can help.Continue Reading
RPA bots vs. case management -- both have value, one is transformative
RPA bots save costs, boost productivity and can improve customer experience. What they don't do is provide the transformational process change most companies need today, says Don Schuerman.Continue Reading
Sysco's network backbone spans clouds, speeds data
Food for thought: Sysco worked with interconnection company Equinix to create a backbone that brings together Equinix data centers, Sysco data centers and cloud service providers.Continue Reading
How to sustain hard-won ITSM automation gains
The ITSM automation gains you've reaped from your ITSM provider can vanish when you need to switch vendors. These five tips will prevent that from happening.Continue Reading
What's the difference between SLO vs. SLA?
Often used interchangeably, the terms SLO and SLA are not the same. Find out the key attributes of each and why each is important for managing service providers.Continue Reading
5 tips to improve ITSM SLAs in IT shops with multiple service providers
How do CIOs develop ITSM SLAs that satisfy business expectations in today's complex environment of multiple service providers? David Clifford takes CIOs through five key steps.Continue Reading
RPA project tackles financial processes, using SAP-savvy RPA vendor
RPA projects are not created equal. Read why automotive supplier Faurecia went with Redwood Software and about how the RPA implementation is playing out.Continue Reading
4 cloud-based e-discovery strategies to target containerized data
A cloud migration requires evaluating any existing information governance programs. E-discovery in the cloud and for container-based data platforms requires a detailed strategy.Continue Reading
E-discovery in the cloud introduces security, compliance issues
E-discovery is still reliable for organizing and preserving data for legal compliance, but e-discovery in the cloud and container-based storage complicate governance processes.Continue Reading
How one CTO is building a plan for legacy code replacement
Legacy code removal leads 2019 digital transformation plans for CTO Niel Nickolaisen. Learn how his team is prepping for the implementation of a new codebase.Continue Reading
Digital transformation for banks: One institution's website remake
Digital transformation for banks: A commercial bank in India retooled and relaunched its website to drive more visits and generate more leads.Continue Reading
Deploy RPA bots to clean legacy data
Got data cleaning issues? Business improvement expert Dan Morris shares how his team is experimenting with RPA bots to clean and reconcile data.Continue Reading
IoT adoption gets a C+ from Cisco expert -- how can CIOs improve?
Why is IoT adoption in trouble? Underestimating the disruption to the business is one reason, says Cisco's Jon Stanford, in this tip on the challenges and best practices for IoT adoption.Continue Reading
Big data processing techniques to streamline analytics
Analyzing raw data has become a complex task that companies are often underprepared for as data sets continue to grow. Here's how to create smarter data processing techniques.Continue Reading
What steps can CIOs take to neutralize cloud shadow IT?
In this Ask the Expert, Gartner's Marco Meinardi explains why denying access and applying too much intermediation are not effective in neutralizing cloud shadow IT projects.Continue Reading
The benefits of IAM processes, strategies for digitized companies
After regulatory compliance and audit requirements forced Raymond James Financial to re-examine its IAM processes, the company is now reaping the business benefits of IAM.Continue Reading
How ITSM can help CIOs drive SLAs in a multi-cloud environment
How do CIOs drive service level agreements (SLAs) in a multi-cloud environment? That's an important question when at issue is an end-to-end IT service involving many cloud providers, and the goal ...Continue Reading
The information technology budgeting process: One CTO's experience
Budget surprises have the power to take a company's yearly plans from smooth to chaotic. Look at one CTO's journey through the information technology budgeting process in 2018.Continue Reading
ITSM in the cloud: Using ITSM best practices to optimize cloud usage
Cloud-based services can't be beat for their ease of use, but companies often experience some 'unhappy surprises' when the bill comes due, says Andy Sealock. ITSM in the cloud can help.Continue Reading
How to manage multi-cloud: Deployment and maintenance strategies
Although multi-cloud deployment can help increase IT flexibility, CIOs must develop strategies to ensure these complicated environments don't create undue risk.Continue Reading
Cloud migration best practices: 4 potential problems to avoid
Andrew Larkin, from the Cloud Academy, explains why successful cloud migration strategies require more than just a 'lift and shift' approach to maximize the benefits of the cloud.Continue Reading
4 GDPR strategy tips to bring IT processes up to speed
The GDPR deadline has long passed, but U.S. companies remain behind on compliance. Experts provide GDPR compliance tips to make sure IT is on the right side of the privacy rules.Continue Reading
Overcoming multi-cloud's risks, regulatory compliance challenges
Companies adopting multi-cloud data management models face numerous regulatory compliance challenges, but IT governance strategies are helping them protect disparate information.Continue Reading
Texas college CIO pushes into enterprise service management
A mature ITSM program has not only won Link Alander's IT team kudos for superb service delivery, but it is also driving automation of business processes in other departments.Continue Reading
An ITSM program evolves from subpar to superb
How do you go from 'lousy' systems and subpar services to an ITSM program that is driving a service approach across the enterprise? CIO Link Alander gives us the details.Continue Reading
How to use value stream mapping tools, CSI to improve business processes
ITIL expert Gary Case lays out the leading methods for improving business processes. Learn how value stream mapping tools and CSI models can help.Continue Reading
Implementing machine learning to keep Facebook user data safe
Facebook Director of Security Aanchal Gupta shares how the social media giant is implementing machine learning in security to ensure user data is safe on its platform.Continue Reading
5 strategies to address the GDPR data management conundrum
As IT executives continue to wrap their heads around GDPR, strategies are emerging to ease its data management compliance burden. Here are five that are already proving effective.Continue Reading
Facebook cybersecurity: How the company is building a diverse team
Facebook director of security Aanchal Gupta sounds off on the need for diverse security teams and gives an overview of how the social media giant is working to make it happen.Continue Reading
Top 10: What IT service delivery challenges plague CIOs?
ITIL expert Gary Case has consulted with a wide range of companies over a long career in ITSM. Read his list of the 10 IT service delivery challenges that continue to bedevil CIOs.Continue Reading
Business transformation project: Dealing with legacy data
Business transformation requires a solid data foundation. Expert Dan Morris offers a near-term fix for your data-quality problems and the basis for a long-term approach to better data.Continue Reading
What steps can CIOs take to optimize their ITSM software?
James Stanger of CompTIA dives into the reasons for ITSM software proliferation in the enterprise, why that's a problem and how sticking to a unified ITSM framework can help.Continue Reading
RPA tools lead to better customer service: Three case studies
A global consumer credit reporting agency, an affordable housing lender, and a Fortune 500 insurance company bet on using RPA software. Here's what happened.Continue Reading
Six barriers to digital transformation; CIO strategies to conquer them
CIOs are under pressure to help companies find their digital mojo, but challenges abound. Learn about the top six barriers to digital transformation -- and how to vanquish them.Continue Reading
Digital business strategy: Safe, end-to-end software development
For CIO Frederic Veron, ensuring software runs "safe and sound" is a big part of his digital business strategy role. To get there, he gets involved early in the development stages.Continue Reading
Next-gen IT infrastructure strategy to guide digital transformation
The evolution of business tech forces companies to frequently redefine digital strategy. In this essential guide, learn best practices to manage modern IT infrastructure.Continue Reading
GDPR and AI: Data collection documentation essential to compliance
It's important to remember that artificial intelligence data and AI algorithms must hold up against GDPR regulations. Here's where GDPR and AI intersect and what CIOs can do to remain compliant.Continue Reading
MIT CIO: What is digital culture, why it's needed and how to get it
Creating a digital culture is essential in the age of information, but companies must not lose sight of their core values in the process. Two tech execs show how they're doing it.Continue Reading
CIO uses master data management to speed digitalization
IMA Financial Group CIO Michelle Vercellino's effort to clean up, protect and govern the firm's data is an important step in the firm's quest for 'data intelligence.'Continue Reading
What are the top RPA security risks and how do CIOs prevent them?
RPA security risks often take a back seat to the technology's promise of costs savings and reliability. HfS Research's Saurabh Gupta and KPMG's Martin Sokalski set the record straight.Continue Reading
Top 2018 cybersecurity trends to watch out for
A glance at IT news shows cybersecurity trends remain on companies' radar. At the CIO Boston Summit, Cybereason's Jessica Stanford discussed steps to defend against risk.Continue Reading
'Virtual humans' pick up on social cues
Carnegie Mellon University's Justine Cassell talks about her efforts to turn software into 'virtual humans.'Continue Reading
Cloud computing optimization: A CIO's perspective
Optimizing cloud means having a solid strategy in place, evaluating the services in use and ensuring the business is served, according to CyrusOne CIO Blake Hankins.Continue Reading
How CIOs can support black box testing techniques
Ben Clark, Wayfair's chief architect, offers advice to CIOs on how to knowledgeably support AI endeavors in the enterprise, including the use of black box testing.Continue Reading
Using RPA development to bridge the gap between legacy and cloud apps
RPA tech has evolved into sophisticated frameworks that automate IT tasks and rules-based processes. Now, RPA benefits are bridging the gap between legacy apps and modern ones.Continue Reading
Enterprise digitization's secret ingredient: Fusion teams
Cross-functional or 'fusion' teams are critical to meeting fast-changing digital challenges. Here are the four must-have team attributes for successful enterprise digitization.Continue Reading
Data literacy training: CIOs just got a new job, yippee!
Data literacy is fast becoming a requirement in the modern digital enterprise, but many so-called knowledge workers lack the ability to read data. Should CIOs take on the job of data literacy training?Continue Reading
From phishing attempt circumvention to AI, new CIO has a big job
As the new CIO at Snow Software, Alastair Pooley is taking on a range of priorities, from helping the business to recognize a phishing attempt to exploring AI for customer support.Continue Reading
Machine learning algorithms: New tool for fighting cyberthreats?
As hackers use increasingly sophisticated tech to tap into corporate data, machine learning platforms can help companies fight fire with fire by detecting cyberthreats early on.Continue Reading
Cybersecurity skills gap: Get creative about cyber hiring
Hiring candidates from disciplines beyond infosec can go a long way to address the widening cybersecurity skills gap, says industry veteran Javvad Malik.Continue Reading
Is end user training essential to data loss prevention program success?
Regulations like the GDPR promise to enforce stricter data protection rules. While a data loss prevention program can help, it requires end-user training to ease adoption.Continue Reading
Digital labor transforms IT, but not without careful prep
Robotic process automation can replace humans with software bots that are always on and always right, says believer Gerson Benker, but be prepared for major organizational change.Continue Reading
For IT chief, the goal is to deliver business value
Waste Industries' Hubert Barkley discusses the CIO role and tech projects that increase efficiency in this Q&A.Continue Reading
At Waste Industries, digital transformation initiatives rooted in trust
Getting the business to buy the notion of business-enabling technology comes before big, flashy wins, IT chief Hubert Barkley says in this interview.Continue Reading
What is 'ground truth' in AI and deep learning?
'Ground truth' is the bedrock of AI and deep learning. Carnegie Mellon professor Tom Mitchell explains the term and its significance with an example from healthcare.Continue Reading
Digital transformation plan: RPA and BPMS tools, better together
A sound digital transformation plan gives companies the ability to change quickly. Business process management suites and robotic process automation -- used together -- do that.Continue Reading
Relentless AI cyberattacks will require new protective measures
AI cyberattacks won't be particularly clever; instead, they'll be fast and fierce. Carnegie Mellon University's Jason Hong explains in this episode of 'Schooled in AI.'Continue Reading
Tech vs. training: Where should business focus cybersecurity spending?
As information security budgets grow, cybersecurity spending needs to be focused on employee-centric areas like training to be effective. ISSA's Candy Alexander explains why.Continue Reading
Neurala claims 'lifelong deep neural nets' don't forget
Boston startup Neurala says it has developed deep neural networks that can learn on the fly. Neurala's COO Heather Ames explains.Continue Reading
RM principles should guide compliance management system development
Regulatory agencies offer broad guidance for compliance management system development, but companies may be best served by referring to widely accepted risk management principles.Continue Reading
Why EA should take the lead on improving customer experience
The business shift to digital goods and services gives IT a critical role in improving the customer experience. Here's why CIOs are assigning enterprise architecture the job.Continue Reading
Reshape the role of the PMO for the digital era
The project management office needs a new mandate to be a player in digital transformation. Matt McWha offers advice on how to rethink the role of the PMO.Continue Reading
What IT automation trends mean for the future of the shop
Smart technology is creating citizen technologists who can now function in a traditional IT department, even though they're not trained. Here's what that means for the future.Continue Reading
Enterprise data analytics strategy: A guide for CIOs
This Essential Guide explores enterprise data analytics strategies and how to select the right infrastructure, management tactics and technologies for your organization.Continue Reading
Mitigating security risks posed by emerging tech: Expert advice
Companies are in hot pursuit of the benefits offered by cutting-edge technologies, but mitigating security risks often gets scant attention. CIOs need to change that. Here's how.Continue Reading
Delegator vs. micromanager: What kind of boss are you?
Being a delegator is one of the hardest jobs for a leader. Joseph Flahiff explains.Continue Reading