CIO 2010 agenda: IT innovation

Recent economic history contains an important lesson for CIOs. Each of the previous three global downturns were marked by the emergence of an innovative,...

This Article Covers


Recent economic history contains an important lesson for CIOs. Each of the previous three global downturns were marked by the emergence of an innovative, disruptive technology that was overlooked when budgets were under pressure, but took off as recovery set in.

In the early 1980s, it was the PC; in the 1990s, ERP software; in the first years of the 21st century the internet revolutionised business once the dotcom crash had abated. So what innovations are lining up as possible successors to these technologies? Social media is perhaps one, but in the corporate world most experts believe cloud computing is best placed to drive such change.

"CIOs need help identifying the key emerging technologies that should impact their planning and investment. They want to institutionalise innovative technologies such as cloud and social computing that can drive business innovation," says Sharyn Leaver, CIO research director at analyst Forrester Research

Bob Tarzey, director at analyst firm Quocirca, says so-called "platform as a service" offerings are set for growth. "Any CIO who believes their responsibility is to acquire and deliver IT resources to the business internally is in danger of overlooking many potential opportunities to use cheaper, more flexible capability available on-demand over the internet.

"Today's CIO needs to be co-ordinator of the business's requirement for applications - however they are delivered. Integration and shrewd purchasing are still key elements to the successful use of IT, but it is no longer an internal service. CIOs who ignore this will be bypassed by the business."

This was last published in January 2010



Enjoy the benefits of CW+ membership, learn more and join.

Read more on Networking hardware

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...