Browse Definitions:

SearchCIO

SearchCIO.com is part of the CIO/IT Strategy network of sites from TechTarget, the Web's most comprehensive source of information for IT professionals who are purchasing, deploying, managing and developing technology at today's leading organizations.

You'll find continually updated management-focused features, along with essential news and commentary, a vast library of white papers, webcasts and in-depth IT executive guides spanning a wide variety of business and technology management issues such as security and risk management, enterprise software, compliance, data center and infrastructure challenges.

View the complete archive of news, research and expert advice for CIOs and IT Managers.

Go to:  SearchCIO

Recently on  SearchCIO

'Heavy lifting' ahead for mobile digital transformation: Forrester

Forrester analysts interviewed 40 digital business leaders about their paths to mobile digital transformation. The verdict: It's not an easy road.

More Highlights
Definitions
  • blockchain

    Blockchain is a type of distributed ledger for maintaining a permanent and tamper-proof record of transactional data. A blockchain functions as a decentralized database that is managed by computers belonging to a peer-to-peer (P2P) network. Each of the computers in the distributed network maintains a copy of the ledger to prevent a single point of failure and all copies are updated simultaneously.

  • crowdsourcing

    Crowdsourcing is the practice of turning to a body of people to obtain needed knowledge, goods or services.

  • digital transformation (DX)

    Digital transformation (DX) is the reworking of the products, processes and strategies within an organization by leveraging current technologies.

Browse CIO Topics

CIO mission

The CIO mission continues to expand as IT strategy is increasingly vital to enterprises' overall objectives and goals. Find the latest resources to help those in the CIO role adapt to these changing responsibilities, including best practices to educate executive management on the business value and risk that IT systems create for the enterprise.

Recent Definitions

  • unicorn

    A unicorn, in an investment context, is a tech startup that is assessed at a valuation of $1 billion or more.

  • red teaming

    Red teaming is the practice of rigorously challenging an organization's plans, policies, systems and assumptions by applying an adversarial approach. The purpose of red teaming is to overcome cognitive errors common to organizations such as group think and confirmation bias.

  • internal marketing

    Internal marketing is the promotion of a company’s objectives, as well as its products and services, to people within the organization. The purpose of the promotion is increasing employee engagement with the company’s goals and fostering brand advocacy among them.

Highlights

More CIO mission Topics

Back to Top

Cloud computing

As companies' data volumes continue to grow in the digital age, they are increasingly turning to cloud computing for business process consolidation and to save IT resources. Read news and tips to help with enterprise cloud computing strategy, including advice to decide between developing cloud resources in-house or turning to third parties for cloud computing services.

Recent Definitions

  • cloud bursting

    Cloud bursting is an application deployment model in which an application normally runs in a private cloud or local data center but can also run in a public cloud when the demand for computing capacity spikes.

  • bimodal IT (bimodal information technology)

    Bimodal IT refers to the management of IT in two modes, one for providing reliable, available and safe IT systems, and the other for speed and maximum flexibility.

  • bring your own cloud (BYOC)

    BYOC is a movement whereby employees and departments use their cloud computing service of choice in the workplace. Allowing employees to use a public cloud storage service to share very large files may be more cost-effective than rolling out a shared storage system internally.

Highlights

Back to Top

Cybersecurity

An enterprise cybersecurity strategy is a vital component of successful businesses in the digital age as companies struggle with constantly evolving data threats. Read news and tips to assist with implementing cybersecurity policy and IT security strategy, including advice to streamline data loss protection efforts to help ensure comprehensive information security.

Recent Definitions

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if it occurs: loss.

  • threat hunter (cybersecurity threat analyst)

    A threat hunter, also called a cybersecurity threat analyst, is a security professional or security professional service provider that proactively uses manual or machine-assisted techniques to detect security incidents that may elude the grasp of automated systems.

  • metacoin platform

    Metacoin platform is the information technology infrastructure that enables digital currency and digital asset transactions.

Highlights

More Cybersecurity Topics

Back to Top

Digital business transformation

Digital business transformation and innovation strategies are essential to corporate success as digital innovation increasingly brings a competitive advantage. Read news, tips and opinion to help your company implement digital business transformation best practices to adapt to -- and profit from – new technologies and processes influencing IT.

Recent Definitions

  • SAP Leonardo

    SAP Leonardo is a collection of software and services that organizations can use to develop digital transformation applications.

  • Echo Show

    The Echo Show is a smart speaker enabled with a 7-inch touchscreen by Amazon featuring Alexa, the company’s AI assistant. Amazon introduced the Echo Show in May 2017.

  • PredictionIO

    PredictionIO is a machine learning server built on a state-of-the-art open source stack, allowing developers and data scientists to build smart applications and create predictive engines for machine learning.

Highlights

More Digital business transformation Topics

Back to Top

BI and big data

Enterprise business intelligence software and big data can open a window into the soul of your IT operation. Business and IT goals can be better analyzed and aligned thanks to BI and big data tools and techniques such as data mining and predictive analytics. Find the latest on enterprise BI software and big data with news, tips and other resources in this section.

Recent Definitions

  • social media

    Social media is the collective of online communications channels dedicated to community-based input, interaction and collaboration. This definition of social media explains what it is, how it works and how it's transforming personal and business communications.

  • data collection

    Data collection is a process for gathering information from different sources. In business, data collection helps organizations answer relevant questions and evaluate possible business outcomes.

  • interim CIO (interim chief information officer)

    An interim CIO is an experienced chief information officer employed by a company on a temporary basis to lead or transform its IT organization.

Highlights

Back to Top

Mobile strategy

A thorough enterprise mobile strategy is essential to digitized companies' success as more employees use cell phones and cloud services to work outside of the office. Find the latest news, tips and opinion about implementing an enterprise mobility strategy, including advice on how to secure mobile data in the enterprise and institute mobile app development best practices.

Recent Definitions

  • Instagram

    Instagram is a free, online photo-sharing application and social network platform that was acquired by Facebook in 2012.

  • interim CIO (interim chief information officer)

    An interim CIO is an experienced chief information officer employed by a company on a temporary basis to lead or transform its IT organization.

  • digital economy

    Fueled by personal computing devices and advanced technologies, such as GPS and real-time analytics, the digital economy represents a new economic paradigm.

Highlights

Back to Top

Apps, infrastructure and operations

In the information age, good IT infrastructure and operations management practices have become essential to maintain quality control over technology-related policies, processes and equipment. Read news and tips to assist modern IT operations and infrastructure management, including strategies to ensure the proper flow of data throughout enterprise applications and other information systems.

Recent Definitions

  • vertical market

    A vertical market is a particular industry or group of enterprises in which similar products or services are developed and marketed using similar methods (and to whom goods and services can be sold).

  • blockchain

    Blockchain is a type of distributed ledger for maintaining a permanent and tamper-proof record of transactional data. A blockchain functions as a decentralized database that is managed by computers belonging to a peer-to-peer (P2P) network. Each of the computers in the distributed network maintains a copy of the ledger to prevent a single point of failure and all copies are updated simultaneously.

  • Instagram

    Instagram is a free, online photo-sharing application and social network platform that was acquired by Facebook in 2012.

Highlights

More Apps, infrastructure and operations Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • nearline storage

    Nearline storage is the on-site storage of data on removable media.

  • application-aware storage

    Application-aware storage is a storage system with built-in intelligence about relevant applications and their utilization ...

  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that allows computers in a network to exchange data in main memory without ...

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close