Browse Definitions:

SearchCIO

SearchCIO.com is part of the CIO/IT Strategy network of sites from TechTarget, the Web's most comprehensive source of information for IT professionals who are purchasing, deploying, managing and developing technology at today's leading organizations.

You'll find continually updated management-focused features, along with essential news and commentary, a vast library of white papers, webcasts and in-depth IT executive guides spanning a wide variety of business and technology management issues such as security and risk management, enterprise software, compliance, data center and infrastructure challenges.

View the complete archive of news, research and expert advice for CIOs and IT Managers.

Go to:  SearchCIO

Recently on  SearchCIO

Enterprise cloud strategy: Improve agility while avoiding risk

Modern CIOs are refining IT strategies to ensure the plethora of available cloud computing options spur innovation, reap efficiency and increase agility -- without incurring undue risk.

More Highlights
Definitions
  • digital transformation (DX)

    Digital transformation (DX) is the reworking of the products, processes and strategies within an organization by leveraging current technologies.

  • startup company

    A startup company is a newly formed business with particular momentum behind it based on perceived demand for its product or service.

  • Instagram

    Instagram is a free, online photo-sharing application and social network platform that was acquired by Facebook in 2012.

Browse CIO Topics

CIO mission

The CIO mission continues to expand as IT strategy is increasingly vital to enterprises' overall objectives and goals. Find the latest resources to help those in the CIO role adapt to these changing responsibilities, including best practices to educate executive management on the business value and risk that IT systems create for the enterprise.

Recent Definitions

  • red teaming

    Red teaming is the practice of rigorously challenging an organization's plans, policies, systems and assumptions by applying an adversarial approach. The purpose of red teaming is to overcome cognitive errors common to organizations such as group think and confirmation bias.

  • T-shaped employee

    A T-shaped employee, in the context of human resources, is an individual that has a depth of knowledge and skills in a particular area of specialization, along with a breadth of knowledge in related areas and the ability to make connections across disciplines.

  • HRIS

    A human resource information system (HRIS) is software that provides a centralized repository of employee master data that the human resource management (HRM) group needs for completing core human resource (HR) processes.

Highlights

More CIO mission Topics

Back to Top

Cloud computing

As companies' data volumes continue to grow in the digital age, they are increasingly turning to cloud computing for business process consolidation and to save IT resources. Read news and tips to help with enterprise cloud computing strategy, including advice to decide between developing cloud resources in-house or turning to third parties for cloud computing services.

Recent Definitions

  • cloud bursting

    Cloud bursting is an application deployment model in which an application normally runs in a private cloud or local data center but can also run in a public cloud when the demand for computing capacity spikes.

  • bimodal IT (bimodal information technology)

    Bimodal IT refers to the management of IT in two modes, one for providing reliable, available and safe IT systems, and the other for speed and maximum flexibility.

  • bring your own cloud (BYOC)

    BYOC is a movement whereby employees and departments use their cloud computing service of choice in the workplace. Allowing employees to use a public cloud storage service to share very large files may be more cost-effective than rolling out a shared storage system internally.

Highlights

Back to Top

Cybersecurity

An enterprise cybersecurity strategy is a vital component of successful businesses in the digital age as companies struggle with constantly evolving data threats. Read news and tips to assist with implementing cybersecurity policy and IT security strategy, including advice to streamline data loss protection efforts to help ensure comprehensive information security.

Recent Definitions

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if it occurs: loss.

  • threat hunter (cybersecurity threat analyst)

    A threat hunter, also called a cybersecurity threat analyst, is a security professional or security professional service provider that proactively uses manual or machine-assisted techniques to detect security incidents that may elude the grasp of automated systems.

  • metacoin platform

    Metacoin platform is the information technology infrastructure that enables digital currency and digital asset transactions.

Highlights

More Cybersecurity Topics

Back to Top

Digital business transformation

Digital business transformation and innovation strategies are essential to corporate success as digital innovation increasingly brings a competitive advantage. Read news, tips and opinion to help your company implement digital business transformation best practices to adapt to -- and profit from – new technologies and processes influencing IT.

Recent Definitions

  • augmented intelligence

    Augmented intelligence is an alternative conceptualization of artificial intelligence that focuses on AI's assistive role, emphasizing the fact that it is designed to supplement human intelligence rather than replace it.

  • startup company

    A startup company is a newly formed business with particular momentum behind it based on perceived demand for its product or service.

  • universal basic income (UBI)

    Universal basic income (UBI) is a model for providing all citizens of a country or other geographic area with a given sum of money, regardless of their income, resources or employment status.

Highlights

More Digital business transformation Topics

Back to Top

BI and big data

Enterprise business intelligence software and big data can open a window into the soul of your IT operation. Business and IT goals can be better analyzed and aligned thanks to BI and big data tools and techniques such as data mining and predictive analytics. Find the latest on enterprise BI software and big data with news, tips and other resources in this section.

Recent Definitions

  • social media

    Social media is the collective of online communications channels dedicated to community-based input, interaction and collaboration. This definition of social media explains what it is, how it works and how it's transforming personal and business communications.

  • data collection

    Data collection is a process for gathering information from different sources. In business, data collection helps organizations answer relevant questions and evaluate possible business outcomes.

  • interim CIO (interim chief information officer)

    An interim CIO is an experienced chief information officer employed by a company on a temporary basis to lead or transform its IT organization.

Highlights

Back to Top

Mobile strategy

A thorough enterprise mobile strategy is essential to digitized companies' success as more employees use cell phones and cloud services to work outside of the office. Find the latest news, tips and opinion about implementing an enterprise mobility strategy, including advice on how to secure mobile data in the enterprise and institute mobile app development best practices.

Recent Definitions

  • Instagram

    Instagram is a free, online photo-sharing application and social network platform that was acquired by Facebook in 2012.

  • interim CIO (interim chief information officer)

    An interim CIO is an experienced chief information officer employed by a company on a temporary basis to lead or transform its IT organization.

  • digital economy

    Fueled by personal computing devices and advanced technologies, such as GPS and real-time analytics, the digital economy represents a new economic paradigm.

Highlights

Back to Top

Apps, infrastructure and operations

In the information age, good IT infrastructure and operations management practices have become essential to maintain quality control over technology-related policies, processes and equipment. Read news and tips to assist modern IT operations and infrastructure management, including strategies to ensure the proper flow of data throughout enterprise applications and other information systems.

Recent Definitions

  • Instagram

    Instagram is a free, online photo-sharing application and social network platform that was acquired by Facebook in 2012.

  • adware

    Adware is any software application in which advertising banners are displayed while a program is running.

  • Six Sigma

    Six Sigma is an approach to data-driven management that seeks to improve quality by measuring how many defects there are in a process and systematically eliminating them until there are as close to zero defects as possible.

Highlights

More Apps, infrastructure and operations Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close