Browse Definitions:

SearchCIO

SearchCIO.com is part of the CIO/IT Strategy network of sites from TechTarget, the Web's most comprehensive source of information for IT professionals who are purchasing, deploying, managing and developing technology at today's leading organizations.

You'll find continually updated management-focused features, along with essential news and commentary, a vast library of white papers, webcasts and in-depth IT executive guides spanning a wide variety of business and technology management issues such as security and risk management, enterprise software, compliance, data center and infrastructure challenges.

View the complete archive of news, research and expert advice for CIOs and IT Managers.

Go to:  SearchCIO

Recently on  SearchCIO

Solving for human-robot communication deficits in autonomous driving

Self-driving cars are already doing amazing things, but gesturing to other drivers isn't one of them. That's a problem that needs to be solved, according to experts at the MIT Disruption Timeline Conference.

More Highlights
Definitions
  • core competency (core competencies)

    Core competency is an organization's defining strength, providing the foundation from which the business will grow, seize upon new opportunities and deliver value to customers.

  • project management office (PMO)

    A project management office (PMO) is a group or department within a business, agency or enterprise that defines and maintains standards for project management within the organization.

  • change agent

    A change agent is anyone who helps an organization transform by improving business processes and interpersonal interactions.

Browse CIO Topics

CIO mission

The CIO mission continues to expand as IT strategy is increasingly vital to enterprises' overall objectives and goals. Find the latest resources to help those in the CIO role adapt to these changing responsibilities, including best practices to educate executive management on the business value and risk that IT systems create for the enterprise.

Recent Definitions

  • adulting

    Adulting is the assumption of tasks and behaviors associated with normal grown-up life, along with the implication that the individual in question does not particularly identify as an adult.

  • fact checking

    Fact checking is the process of attempting to verify or disprove assertions made in speech, print media or online content.

  • inductive argument

    An inductive argument is the use of collected instances of evidence of something specific to support a general conclusion. Inductive reasoning is used to show the likelihood that an argument will prove true in the future.

Highlights

More CIO mission Topics

Back to Top

Cloud computing

As companies' data volumes continue to grow in the digital age, they are increasingly turning to cloud computing for business process consolidation and to save IT resources. Read news and tips to help with enterprise cloud computing strategy, including advice to decide between developing cloud resources in-house or turning to third parties for cloud computing services.

Recent Definitions

  • bimodal IT (bimodal information technology)

    Bimodal IT refers to the management of IT in two modes, one for providing reliable, available and safe IT systems, and the other for speed and maximum flexibility.

  • bring your own cloud (BYOC)

    BYOC is a movement whereby employees and departments use their cloud computing service of choice in the workplace. Allowing employees to use a public cloud storage service to share very large files may be more cost-effective than rolling out a shared storage system internally.

  • IT elasticity

    IT elasticity is the ability to adapt an IT infrastructure to seamless changes without hindering or jeopardizing stability, performance, security, governance or compliance protocols.

Highlights

Back to Top

Cybersecurity

An enterprise cybersecurity strategy is a vital component of successful businesses in the digital age as companies struggle with constantly evolving data threats. Read news and tips to assist with implementing cybersecurity policy and IT security strategy, including advice to streamline data loss protection efforts to help ensure comprehensive information security.

Recent Definitions

  • doxing

    Doxing is the act of gathering information about a target individual or organization and making it public. The term is hacker-speak for documenting.

  • security incident

    A security incident is an event that may indicate that an organization's systems or data have been compromised.

  • distributed ledger

    A distributed ledger is a digital system for recording the transactions of assets, in which the transactions and their details are recorded in multiple places at the same time.

Highlights

More Cybersecurity Topics

Back to Top

Digital business transformation

Digital business transformation and innovation strategies are essential to corporate success as digital innovation increasingly brings a competitive advantage. Read news, tips and opinion to help your company implement digital business transformation best practices to adapt to -- and profit from – new technologies and processes influencing IT.

Recent Definitions

  • core competency (core competencies)

    Core competency is an organization's defining strength, providing the foundation from which the business will grow, seize upon new opportunities and deliver value to customers.

  • project management office (PMO)

    A project management office (PMO) is a group or department within a business, agency or enterprise that defines and maintains standards for project management within the organization.

  • Mandela effect

    The Mandela effect is the observed phenomenon of people misremembering significant events and facts, often leading to false memories of things that didn't actually happen. The phenomenon is named for Nelson Mandela because many people mistakenly believe he died in prison in the 1980s.

Highlights

More Digital business transformation Topics

Back to Top

BI and big data

Enterprise business intelligence software and big data can open a window into the soul of your IT operation. Business and IT goals can be better analyzed and aligned thanks to BI and big data tools and techniques such as data mining and predictive analytics. Find the latest on enterprise BI software and big data with news, tips and other resources in this section.

Recent Definitions

  • social media

    Social media is the collective of online communications channels dedicated to community-based input, interaction and collaboration. This definition of social media explains what it is, how it works and how it's transforming personal and business communications.

  • data collection

    Data collection is a process for gathering information from different sources. In business, data collection helps organizations answer relevant questions and evaluate possible business outcomes.

  • interim CIO (interim chief information officer)

    An interim CIO is an experienced chief information officer employed by a company on a temporary basis to lead or transform its IT organization.

Highlights

Back to Top

Mobile strategy

A thorough enterprise mobile strategy is essential to digitized companies' success as more employees use cell phones and cloud services to work outside of the office. Find the latest news, tips and opinion about implementing an enterprise mobility strategy, including advice on how to secure mobile data in the enterprise and institute mobile app development best practices.

Recent Definitions

  • interim CIO (interim chief information officer)

    An interim CIO is an experienced chief information officer employed by a company on a temporary basis to lead or transform its IT organization.

  • digital economy

    Fueled by personal computing devices and advanced technologies, such as GPS and real-time analytics, the digital economy represents a new economic paradigm.

  • outcome economy

    Outcome economy describes an economy based on the marketing, pricing and selling of the results provided by goods and services rather than their face value.

Highlights

Back to Top

Apps, infrastructure and operations

In the information age, good IT infrastructure and operations management practices have become essential to maintain quality control over technology-related policies, processes and equipment. Read news and tips to assist modern IT operations and infrastructure management, including strategies to ensure the proper flow of data throughout enterprise applications and other information systems.

Recent Definitions

  • configuration management (CM)

    Configuration management is a governance and systems engineering process that ensures the proper accounting of an enterprise's configuration items and of the interrelationship between them in an operational environment.

  • core competency (core competencies)

    Core competency is an organization's defining strength, providing the foundation from which the business will grow, seize upon new opportunities and deliver value to customers.

  • go-live (go live)

    In software development, go-live is the time at which code moves from the test environment to the production environment. As a verb, go-live means to make such an event happen.

Highlights

More Apps, infrastructure and operations Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • spear phishing

    Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

  • supercookie

    A supercookie is a type of tracking cookie inserted into an HTTP header by an internet service provider to collect data about a ...

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store ...

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

SearchSolidStateStorage

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close