Opinion: Page 10

The latest opinion pieces by industry thought leaders


If you are interested in having your voice heard on CIO Dive's Opinion page, please read our editorial guidelines and fill out the submission form here.

  • 3 reasons adoption of robotic process automation is on the rise

    RPA software robots help to perform time-consuming tasks by mimicking the way humans interact with applications through a user interface. And that's good for the enterprise. 

    Anand Veeramani • July 18, 2017
  • The Big Brother you want: Finding the data privacy sweet spot

    When it comes to personal data and privacy, businesses, policy makers and consumers are still trying to find the sweet spot, where all parties feel like the right balance between data privacy and data innovation is struck.

    Steven Hillion • July 11, 2017
  • Career path in cybersecurity still steep for women

    The cybersecurity industry needs more women, Morphisec's Netta Schmeidler says in a guest article. Their diverse voices, viewpoints and opinions help drive innovation, improvement and resilience.

    Netta Schmeidler • July 6, 2017
  • 3 questions to ask about machine learning in cybersecurity

    Machine learning allows security products to do vastly better in various areas. But it is best understood as a set of techniques that dramatically optimize detection techniques.

    Sven Krasser • June 27, 2017
  • Image attribution tooltip
    Taylor McKnight/CIO Dive
    Image attribution tooltip

    Did SD-WAN kill WAN optimization?

    WAN optimization was first introduced in 2004, which is eons in the world of information technology. So naturally it’s time to move on to the next big thing, right?

    Scott Gibson • June 20, 2017
  • Can low code really fix the IT skills gap?

    For IT, low code tools mean that the business can create simpler applications without putting a burden on skilled developers who are better utilized on complex coding projects.

    Clare Grant • June 13, 2017
  • 8 steps CIOs can take for successful supply chain management

    CIOs are the new stewards of the supply chain. Due to the growing digital footprint and impact of systems and architecture with business processes, their role has become more important than ever. 

    Chaney Ojinnaka • June 6, 2017
  • Some tasks are best left to the experts: Be wary of the rise of citizen developers

    The rise of "citizen developers" is a development made possible by more user-friend computing, but limiting their role in the enterprise is a wise choice.

    Mike Garofalo • May 30, 2017
  • Image attribution tooltip
    Fotolia
    Image attribution tooltip

    IT security stinks: Here's how to fix it

    Both awareness and spending allocated toward cyberthreats has increased, so why do so many organizations still struggle with IT security? 

    Ash Wilson • May 24, 2017
  • Simplifying your Windows 10 adoption, and beyond

    In just a few months, Windows 10 will mark its second anniversary, and although one might be hard-pressed to find a CIO over the moon about transitioning to the Windows 10 OS, the reality is Windows 7 is on its way out. 

    Jon Rolls • May 11, 2017
  • 4 reasons why most data science projects fail

    While data is a key component that drives true digital transformation, too often companies approach data and analytics projects the wrong way. 

    James Roberts • May 2, 2017
  • Image attribution tooltip
    Adobe Stock
    Image attribution tooltip

    SOC challenge: Balancing the trade-offs between cost and risk

    For a SOC, mitigating risks must always include an analysis of the associated costs. How do you find the right balance?  

    Slavik Markovich • April 27, 2017
  • How enterprises can facilitate IT, line of business collaboration for app development

    Instead of relying on long processes, IT departments at the forefront of the app development curve are turning to collaborative models to design and deploy business apps.

    Jonathan Kaplan • April 25, 2017
  • Humanizing the digital workplace computing experience

    Instead of boosting productivity and output, the current model of disjointed cloud services is over-complicating the digital workplace experience. Why?

    Yaacov Cohen • April 18, 2017
  • Quantum computing security threats looming over IT industry

    Academics and experts agree that a universal quantum computer capable of cracking current cryptography will become available within the next decade.

    Scott Totzke • April 11, 2017
  • Getting IT out of the basement and into the boardroom

    Organizations won’t be able to see the true value of their IT teams until staff are made more accessible, more visible and more available to deliver services beyond those required to "keep the lights on."

    Jarod Greene • April 10, 2017
  • Perimeter security increasingly losing its ability to protect

    You can bet your bottom dollar malware and other threats can get past the biggest, best-built barriers. Stop proverbially staring forlornly along the fence and start searching the grounds.

    Scott Millis • April 4, 2017
  • How to use predictive analytics to optimize software delivery

    Predictive analytics is revolutionizing the software testing industry by helping businesses take advantage of DevOps continuous deployment pipelines to reduce the cost, time and risk of software delivery.

    Sanjay Zalavadia • March 21, 2017
  • The incumbent's dilemma: Enterprises changing service providers at an accelerating rate

    With more than 5,000 IT outsourcing contracts up for rebid by 2018, the competition is likely to get very hot. Why are we seeing favor shift so dramatically away from the incumbent?

    Todd Lavieri • March 7, 2017
  • Image attribution tooltip
    Pixabay
    Image attribution tooltip

    The 3 keys to digital transformation

    Digital transformation and a company's ability to leverage data is at the core of future competitiveness and is critical to being able to control costs and drive innovation. 

    Jack Norris • Feb. 28, 2017
  • Businesses need to prepare as ransomware emerges as one of the most dangerous cyberthreats

    The blackmail threat is faceless, with plenty of modern day raiders hacking into computers and accounts and then demanding money to return the victim's data. 

    Mark Crosbie • Feb. 14, 2017
  • Why fog computing will power IoT in 2017

    Fog enables companies to pursue the goal of optimizing the geographical proximity of data and computation. If organizations can process data closer to where it is produced, they can save bandwidth and time.

    Rob MacInnis • Feb. 7, 2017
  • Companies are missing the point of the API economy

    Organizations need to make sure they don’t forget that the end goal of their APIs should be to improve the user experience through open development.

    Nikhil Hasija • Jan. 23, 2017
  • Transforming the digital workplace is about evolution, not revolution

    Digital innovation continues to grow at neck-breaking speed in virtually every aspect of life today. Except for maybe in businesses.

    Scott McDonald • Jan. 11, 2017
  • 10 tips for surviving an IT outage with IT resilience

    Growing business demands and shrinking budgets continually burden IT professionals. The ramification is increased pressure on an IT shop's ability to respond to a crisis.

    Todd Scallan • Jan. 5, 2017