Tips
Tips
-
India lockdown exacerbates coronavirus impact on IT
As the COVID-19 pandemic continues to impact IT outsourcing with India service providers, organizations should consider the following approaches that can allow for more flexibility. Continue Reading
-
The impact of India's pandemic lockdown on IT outsourcing
In part one of a two-part series, we're identifying the major factors affecting enterprises with India IT outsourcing providers during the COVID-19 pandemic. Continue Reading
-
6 tips to ensure your cloud migration is successful
Still considering making the move to the cloud? Here are some best practices and cloud-centric processes CIOs can follow to enable a successful cloud environment. Continue Reading
-
Cost of moving to the cloud drops with time and experience
Can IT leaders save money by moving to the cloud? According to the research, some companies are already seeing significant cost savings with UCaaS. Continue Reading
-
10 AI and machine learning use cases in ITSM
AI-enabled ITSM, while still maturing, promises to greatly improve the speed and quality of IT service management. Here are 10 AI and machine learning use cases for ITSM. Continue Reading
-
Contract risk management: Focus on these 6 areas
Inspecting vendor contracts for risk is increasingly important as CIOs scramble to stay nimble in a volatile economy. ClearEdge Partners explains how to protect your interests. Continue Reading
-
How to write an RFP and statement of work for an IT services contract
Master how to write an RFP and statement of work to get the IT services you need using these best practices from consulting firm ClearEdge Partners. Continue Reading
-
Improve your IT contract negotiations by focusing on 5 factors
When buying technology, a bare-knuckle approach rarely succeeds. To get a good IT deal, CIOs should pay heed to five transformations driving businesses, ClearEdge's CEO says. Continue Reading
-
Plan and implement a GRC framework with this checklist
Whether planning or updating your governance, risk and compliance program, use this guide to help simplify the initiative and successfully implement a GRC framework. Continue Reading
-
How to negotiate a good software subscription agreement
A big mistake IT execs make in negotiating software subscription deals is overbuying. Here are seven steps from ClearEdge Partners' Rachel Annello that will lead to a better deal. Continue Reading
-
Here's why a customer feedback program is essential to a business
With C-suite executives investing in a customer feedback program, they will be able to implement strategies to capitalize on positive ratings and resolve negative comments. Continue Reading
-
How ITSM services on mobile devices power employees, boost service
Delivering ITSM on mobile devices boosts productivity through the enterprise and will help CIOs drive digital transformation. Here's why and what you need to do. Continue Reading
-
8 ways CIOs can use technology in meetings
Meetings can be frustrating, as they often lead to scheduling and technical complications -- but today, enterprises are utilizing technology in meeting rooms to make them more beneficial. Continue Reading
-
How CIOs can tackle AI with ITSM tools
We've previously covered how to use AI to improve ITSM processes -- now, we're diving into how organizations can apply ITSM principles to AI. Continue Reading
-
How IoT, 5G, RPA and AI are opening doors to cybersecurity threats
In the second part of a series on CIOs preparing for cyberthreats in 2020, we look at how emerging technologies like IoT and the cloud became vulnerable to cyberattacks in the last year. Continue Reading
-
Preparing for the new forms of cybersecurity threats in 2020
In the first part of a series on the new forms of cyberthreats in 2020, we're diving into the many infiltration points being targeted today and why CIOs should be prepared. Continue Reading
-
RPA bots: Unattended vs. attended vs. hybrid
CIOs and other IT leaders have their pick of attended, unattended and hybrid RPA platforms; this tip explains how each works and outlines their strengths and limitations. Continue Reading
-
The rise of RPA bots and the role of C-level decision makers
According to new research, there will be 3 million RPA bots running in the enterprise in 2020. As RPA bots proliferate, C-level decision makers must take steps to ensure their RPA programs deliver tactical and strategic benefits. Check out this ... Continue Reading
-
Turning your business into a platform business
Leading Edge Forum offers four paths CIOs can take to develop the sophisticated ecosystems necessary to transform into a platform business. Continue Reading
-
AR headsets: 5 tips to get you started
Still in their adolescence, augmented reality headsets are poised for a growth spurt. Will you be ready? Here are some tips for a successful deployment. Continue Reading
-
Biometric data privacy, ethical questions complicate modern IAM
Use of biometrics in IAM systems may help secure company systems and data, but it also raises privacy issues. Here's how to keep both your security and ethical standards high. Continue Reading
-
Risk-based digital identity benefits CIOs, CMOs and customers
Asking customers to reaffirm their digital identities by sharing private information undermines CX and data security. Instead, use a risk-based approach to digital identity. Continue Reading
-
Agile practices endure and continue to adapt
As the 20th anniversary of the Agile Manifesto approaches, Agile practices remain vital to software development and are being adapted to critical business functions outside of IT. Continue Reading
-
Why CIOs need to adopt a process mining initiative
The father of process mining Wil van der Aalst weighs in on the future and explains why it's crucial for organizations to start process mining on a larger scale today. Continue Reading
-
5 tips on how to pick the right AI use cases
Businesses may not be ready to jump all in to AI just yet, so starting with individual projects can be a good place to start. What should CIOs look for in early-stage AI projects? Continue Reading
-
Regs create blueprint for industrial controls, IoT and IIoT
Protecting devices associated with industrial control systems, IoT and IIoT presents many challenges, but wide-ranging regulatory mandates can help guide cybersecurity processes. Continue Reading
-
10 cloud migration process tips CIOs need to consider
Cloud migrations are never easy, especially for CIOs and IT leaders moving workloads to the cloud. To ensure your migration is a success, consider these 10 tips from cloud experts. Continue Reading
-
Achieving business value from cognitive collaboration
CIOs can take advantage of AI to improve employee and customer collaboration with cognitive capabilities that are now available from vendors such as Microsoft, Google and Facebook. Continue Reading
-
3 ways to use quantum technology features in your enterprise
While quantum computers aren't available just yet, there are other properties to consider, such as quantum sensors and quantum copies, that are being utilized around the world today. Continue Reading
-
CIO as technology evangelist: Build your case for transformation
Technology change is hard -- and, these days, it's constant. Here's how one CIO learned to become a technology evangelist and got the time, money and buy-in for IT transformation. Continue Reading
-
Challenges vs. benefits of edge computing security
Organizations moving more compute to the edges of their networks must adjust how they protect and govern their data and devices. But what should you expect along the way? Continue Reading
-
Squads, pods, cells? Making sense of Agile teams
Workers are now organized in new types of groups as a result of the movement known as Agile at scale. However, to succeed, the changes have to be more than in name only. Continue Reading
-
Establishing a CCoE can secure your cloud cost savings
CIOs who made, or are considering making, the move to the cloud need to consider these three best practices to achieve real cost savings and efficiencies. Continue Reading
-
Approach customer engagement by first asking good questions
Organizations need to align their customer strategy with their technology and know how to gather and use the right customer data when integrating all the components. Continue Reading
-
Protect customer data with these 5 essential steps
Engagement with customers inevitably yields a trove of sensitive data. Learn the key steps you should take to stay compliant and secure in an era of virtual business. Continue Reading
-
5 ways CIOs can take their AI project to the next level
We've covered the basics for CIOs getting started with AI -- now, we're taking a look at the potential challenges they may face and how they can prepare for and mitigate them. Continue Reading
-
New class of cloud security suite promises next-gen protection
Nemertes analyst John Burke points CIOs to a new type of cloud security offering that combines the functions of VPN, cloud firewall, secure web gateway and cloud access security broker. Continue Reading
-
3 important steps to get started with AI
David Petersson lays out three steps that will change how you think about AI and help your business get started with AI. Continue Reading
-
Efficiency vs. effectiveness in business: Which comes first?
Operational efficiency gains do not equate to operational effectiveness. Expert Dan Morris explains efficiency vs. effectiveness in business process automation. Continue Reading
-
How edge computing differs from decentralized computing
Edge computing isn't about sticking servers and storage in a branch location. Learn the critical differences between edge and traditional decentralized computing. Continue Reading
-
Facebook's Libra project -- why enterprises should prepare
Facebook's foray into cryptocurrency is setting off alarm bells in government and finance circles. The question is how could the Libra project help the enterprise? Continue Reading
-
Ransomware attacks: How to get the upper hand
Ransomware attacks are on the rise. Can organizations play like Radiohead and refuse to pay? The answer from security experts is a qualified yes. Continue Reading
-
New BPMS architecture is answer to 'future-proofing' the enterprise
An aging, complex IT environment needed to become more nimble -- and remain stable. A months-long project using a new BPMS architecture pointed the way. Continue Reading
-
4 steps to remain compliant with SOX data retention policies
Data retention policy is inherent to Sarbanes-Oxley Act compliance. In this tip, learn SOX data retention best practices to remain regulatory compliant. Continue Reading
-
Expect graph database use cases for the enterprise to take off
Digital giants use graph databases: Traditional businesses not so much. Learn what graph tools do and why graph database use cases should be on every CIO's radar. Continue Reading
-
The C-suite case for hiring a chief customer officer: 5 elements
Delivering world-class digital customer experiences has become job No. 1 for companies. Nemertes' Robin Gareiss makes the case for putting a chief customer officer in charge. Continue Reading
-
Deep learning pioneer Fei-Fei Li on the fundamentals of ethical AI
AI luminary Fei-Fei Li was among a group of distinguished AI researchers asked to share their thoughts on how to develop ethical AI. The right data and careful observation help. Continue Reading
-
Andrew Ng's AI playbook for the enterprise: 6 must-dos
AI legend and online education pioneer Andrew Ng has developed an AI playbook for businesses. Here are six must-dos. Continue Reading
-
5G enables AR and VR for the enterprise: CIO primer
Lag time and the inability to accommodate multiple users have limited AR and VR for enterprise use. 5G will change that, spurring new ways of working and of serving customers. Continue Reading
-
CIOs need to rethink how they're managing outsourcing transitions
The old rules for managing outsourcing transitions no longer apply. Here are three nontraditional approaches to help ensure maximum benefit when switching outsourcing providers. Continue Reading
-
6 potential blockchain limitations for enterprise use
The potential benefits of blockchain for enterprise use must be weighed against blockchain's limitations. Here are six. Continue Reading
-
4 integrated monitoring strategies that will improve IT operations
Digital transformation expert Isaac Sacolick offers four ways to build an integrated monitoring architecture that will actually improve IT operations -- not slow them down. Continue Reading
-
Problems with blockchain and how they're being solved
Do you know about the blockchain trilemma? David Petersson looks at some of the problems with blockchain and how cutting-edge companies are tackling them. Continue Reading
-
5 reasons CIO career paths go south -- and how to protect yourself
Safeguard your CIO career path. Agiloft CEO Colin Earl details the top five reasons CIOs get the ax -- and how to avoid them. Continue Reading
-
BPM tools mitigate business disruption amid digital transformation
A major challenge in digital transformation is avoiding harmful disruption to the business while doing the work of creating a new business/IT operating model. BPM tools can help. Continue Reading
-
How AI cybersecurity thwarts attacks -- and how hackers fight back
IT leaders are using AI to take security to the next level. But how much security can AI provide? David Petersson examines where AI cybersecurity excels and how it can be fooled. Continue Reading
-
How to use AI in your business in 2019 -- AI sweet spots
Step one in figuring out how to use AI in your business is to know what AI can and can't do today. David Petersson lays out 2019's AI sweet spots for enterprise decision-makers. Continue Reading
-
Free IT mission statement examples for CIOs
These free IT mission statement examples and how-tos can help CIOs and their IT departments identify and refine their organizational goals. Continue Reading
-
How to sustain hard-won ITSM automation gains
The ITSM automation gains you've reaped from your ITSM provider can vanish when you need to switch vendors. These five tips will prevent that from happening. Continue Reading
-
BPMS architecture modernizes legacy tech, makes IT more strategic
The technology of the past put humans on the moon, but it's bringing businesses to a breaking point. Here's why CIOs should consider a BPMS architecture to modernize legacy systems. Continue Reading
-
AI in ITSM equals 'service intelligence' -- ITSM's next frontier
AI in ITSM, or 'service intelligence,' is the next logical step in IT's mastery of professional service delivery. ITSM expert Jan-Willem Middelburg lays out four use cases. Continue Reading
-
5 tips to improve ITSM SLAs in IT shops with multiple service providers
How do CIOs develop ITSM SLAs that satisfy business expectations in today's complex environment of multiple service providers? David Clifford takes CIOs through five key steps. Continue Reading
-
4 cloud-based e-discovery strategies to target containerized data
A cloud migration requires evaluating any existing information governance programs. E-discovery in the cloud and for container-based data platforms requires a detailed strategy. Continue Reading
-
E-discovery in the cloud introduces security, compliance issues
E-discovery is still reliable for organizing and preserving data for legal compliance, but e-discovery in the cloud and container-based storage complicate governance processes. Continue Reading
-
How automating feature engineering can help data scientists
Feature Labs CEO Max Kanter explains how automating feature engineering for machine learning can help data scientists and why CIOs should care. Continue Reading
-
Deploy RPA bots to clean legacy data
Got data cleaning issues? Business improvement expert Dan Morris shares how his team is experimenting with RPA bots to clean and reconcile data. Continue Reading
-
ITSM governance essential as new tech trends drive business processes
New tech trends in AI, cloud and robotic process automation create capabilities that are reshaping ITSM. But for the innovations to reach their full potential, strong governance over ITSM processes are required. Continue Reading
-
IoT adoption gets a C+ from Cisco expert -- how can CIOs improve?
Why is IoT adoption in trouble? Underestimating the disruption to the business is one reason, says Cisco's Jon Stanford, in this tip on the challenges and best practices for IoT adoption. Continue Reading
-
Benefits of ITSM: Use an ITSM portal as gateway to cloud services
Requiring users to access the cloud via an ITSM portal will reduce spending, explains Andy Sealock in part two of his tip on leveraging the benefits of ITSM in cloud services. Continue Reading
-
ITSM in the cloud: Using ITSM best practices to optimize cloud usage
Cloud-based services can't be beat for their ease of use, but companies often experience some 'unhappy surprises' when the bill comes due, says Andy Sealock. ITSM in the cloud can help. Continue Reading
-
4 ways to use machine learning to improve customer experience
There are many ways to use machine learning to improve customer experience. Gartner's Bill Delrieu offers four and names specific machine learning-based tools to help with each. Continue Reading
-
4 factors to consider when making the shift to the cloud
For CIOs assessing their organization's cloud readiness, Andrew Larkin discusses four factors to consider before moving their applications to the cloud. Continue Reading
-
5 ways ITSM automation is driving business value
Current trends in ITSM automation include the adoption of intelligent automation, ITSM as a service, digital labor, artificial intelligence and machine learning. Continue Reading
-
3 stages of ITSM and 5 ways to enhance your ITSM strategy
From help desk to service desk to business-aligned ITSM -- how evolved is your ITSM strategy? Dennis Drogseth explains ITSM's three stages and offers five tips for reaching maturity. Continue Reading
-
Cloud migration best practices: 4 potential problems to avoid
Andrew Larkin, from the Cloud Academy, explains why successful cloud migration strategies require more than just a 'lift and shift' approach to maximize the benefits of the cloud. Continue Reading
-
5 open source software problems -- and how to manage them
Open source software's appeal is understandable: It's free, accessible and relatively easy to implement. But CIOs should be aware of the pitfalls. Continue Reading
-
4 ITSM best practices for managing service vendors
CIOs must align IT strategy to business KPIs, and so should their service vendors. In this ITSM best practices tip, experts explain how to tie vendor services to business outcomes. Continue Reading
-
4 GDPR strategy tips to bring IT processes up to speed
The GDPR deadline has long passed, but U.S. companies remain behind on compliance. Experts provide GDPR compliance tips to make sure IT is on the right side of the privacy rules. Continue Reading
-
4 best practices to maximize the value of your ITSM vendor
If your ITSM vendor isn't living up to expectations, chances are you're ignoring these four ITSM best practices. ISG's Lois Coatney takes you through them, step by step. Continue Reading
-
Overcoming multi-cloud's risks, regulatory compliance challenges
Companies adopting multi-cloud data management models face numerous regulatory compliance challenges, but IT governance strategies are helping them protect disparate information. Continue Reading
-
Building a service catalog management strategy: Where to start?
The IT service catalog is the foundation of an effective ITSM program, but it's a complicated tool and hard to get right. Here's some expert advice on how to get started. Continue Reading
-
Business transformation project: Dealing with legacy data
Business transformation requires a solid data foundation. Expert Dan Morris offers a near-term fix for your data-quality problems and the basis for a long-term approach to better data. Continue Reading
-
What steps can CIOs take to optimize their ITSM software?
James Stanger of CompTIA dives into the reasons for ITSM software proliferation in the enterprise, why that's a problem and how sticking to a unified ITSM framework can help. Continue Reading
-
IT service desk vs. IT help desk: What's the difference?
One came first and focused on IT fixes. The other got direction from ITIL. Users ask for one over the other. Today, something called ESM might just put both out to pasture. Continue Reading
-
Don't get caught up in the neural processing unit hype
To differentiate new chip technology from existing GPUs, mobile tech companies (along with software titans) are slapping a 'neural' label on their products. Analysts say to be skeptical. Continue Reading
-
Resist 'garbage in, gospel out' doctrine -- defend data quality
The 'garbage in, gospel out' approach to business analytics may be a valid approach for doing big data projects, but CIOs should resist it for business transformation. Continue Reading
-
How to start a blockchain project: Questions for IBM's Jerry Cuomo
A blockchain project starts with a belief that business needs to be done in a different way. Here's what happens next, including the role CIOs play in a blockchain journey. Continue Reading
-
GDPR and AI: Data collection documentation essential to compliance
It's important to remember that artificial intelligence data and AI algorithms must hold up against GDPR regulations. Here's where GDPR and AI intersect and what CIOs can do to remain compliant. Continue Reading
-
Bad data stops business process transformation in its tracks
Dan Morris introduces his new eight-part series on exploring how bad data can sabotage business process transformation and what CIOs need to do to fix it. Continue Reading
-
Fostering human-machine collaboration is a CIO's job
Uncover why human-machine collaboration was singled out in a Forrester Research report that says it's time for enterprises to embrace AI in the workplace -- and IT has a special role to play. Continue Reading
-
How CIOs can support black box testing techniques
Ben Clark, Wayfair's chief architect, offers advice to CIOs on how to knowledgeably support AI endeavors in the enterprise, including the use of black box testing. Continue Reading
-
Using RPA development to bridge the gap between legacy and cloud apps
RPA tech has evolved into sophisticated frameworks that automate IT tasks and rules-based processes. Now, RPA benefits are bridging the gap between legacy apps and modern ones. Continue Reading
-
How to measure usability when selecting an RPA tool
If an RPA tool isn't user-friendly and isn't built for the long term, chances are the dividends won't be immediate. Read this before choosing your RPA tools. Continue Reading
-
Enterprise digitization's secret ingredient: Fusion teams
Cross-functional or 'fusion' teams are critical to meeting fast-changing digital challenges. Here are the four must-have team attributes for successful enterprise digitization. Continue Reading
-
How to overcome multi-cloud disaster recovery challenges
As multi-cloud environments proliferate, data backup and recovery tech is essential. Here's how to assess enterprise multi-cloud disaster recovery capabilities -- and limitations. Continue Reading
-
Rapid prototyping process brings technology to life
Carnegie Mellon University's Chris Harrison and his team are developing the user interfaces of the future. He explains why a rapid prototyping process is critical to building technology that changes lives. Continue Reading
-
Biometric security technology readies for corporate prime time
Companies are turning to biometric security technology to improve user authentication and experience, but its use presents unique challenges that could slow enterprise adoption. Continue Reading
-
How to create the best RPA architecture
Enterprises are embracing robotic process automation to automate rules-based, repetitive tasks in a cost-efficient manner. ROI depends on having the right RPA architecture. Continue Reading
-
Digital transformation plan: RPA and BPMS tools, better together
A sound digital transformation plan gives companies the ability to change quickly. Business process management suites and robotic process automation -- used together -- do that. Continue Reading
-
Cloud ERP systems present 'business-critical' security challenges
Where does the data live? Who -- the provider or the customer -- is responsible for securing what? They're vital questions to ask when mulling a cloud move, a new report posits. Continue Reading