CIO Influence

Category : Guest Authors

Digital Transformation Guest Authors IT and DevOps Machine Learning Security Technology

Why Employee Experience Is Your Best ROI Metric for Digital Workplace Investments

Patrycja Sobera
In times of economic uncertainty, organizations are forced to scrutinize every dollar spent, with workplace technology no exception. Whether it is new hardware, software or...
Automation Cloud Guest Authors IT and DevOps Networking Security

5 Keys to Modern Application Management on Citrix VDI

CIO Guest Author
By Dr. Arthur Hitomi, President, Chief Executive Officer and co-founder of Numecent And Todd Hsu, President, Ferroque Systems About Dr. Arthur Hitomi, President, Chief Executive...
Automation Guest Authors IT and DevOps Machine Learning Security

Building AI That Works: What CIOs and CTOs Know About Turning Pilots Into Productivity

Niranjan Vijayaragavan
Itโ€™s no exaggeration to say generative and agentic AI have stormed into the boardroom. According to recent research, only 11% of CIOs have fully implemented...
Analytics Data Management Guest Authors IT and DevOps Machine Learning Security

How Autonomous IT is Crossing the Threshold

Gil Pekelman
AI is rapidly becoming the defining force reshaping how IT drives enterprise operations and scalability. Gartner predicts that adoption of autonomous endpoint management will rise...
Analytics Guest Authors Machine Learning Networking Security

Why Forecasting Cybersecurity Trends Is A Waste Of Time

Connor Morley
The technology industry thrives on looking to the future and trying to work out which trends will shape markets and products alike. In the cybersecurity...
Analytics Guest Authors Machine Learning Security

The New Business of QA: How Continuous Delivery and AI Will Reshape 2026

Patricia Mateus
For years, โ€œmove fastโ€ was shorthand for pushing more code out the door. In 2026, that story changes. AI is writing, refactoring, and scaffolding code...
Analytics Cloud Edge Computing Guest Authors IT and DevOps Machine Learning

Beyond the Cloud: Why the Future of IT Isnโ€™t One-Size-Fits-All

Bruce Kornfeld
For years, IT strategy was framed as a simple choice. Move to the cloud or stay on-premises. Cloud-first became the default recommendation, and in many...
AIOps Analytics Automation Cloud Guest Authors IT and DevOps Machine Learning Networking Security

Unmasking the Imitators: How OSINT Maps the Hidden Networks that Damage Brand Value

Stuart Clarke
Counterfeit activity has quickly evolved far beyond individuals publishing fake listings or selling imitation products. Today, organised networks use legitimate-looking online storefronts, social media marketplaces,...
Analytics Automation Guest Authors IT and DevOps Machine Learning Security

AI Changed the Cost of Cybersecurity. Your Budget Didnโ€™t Get the Memo

Kumar Saurabh
When โ€œEssential Protectionโ€ Still Feels Like a Luxury If you run IT security at a mid-market company, youโ€™ve probably noticed the math stopped making sense....
Data Management Guest Authors IT and DevOps Security

Defense Contractors Face a New Reality as CMMC Enforcement Accelerates

Charlie Sciuto
With phased enforcement commencing, contractors face a tightening timeline to prove compliance. Those who mobilize early will stay ahead of deadlines and avoid potential bottlenecks....