Browse Definitions:

SearchCIO

SearchCIO.com is part of the CIO/IT Strategy network of sites from TechTarget, the Web's most comprehensive source of information for IT professionals who are purchasing, deploying, managing and developing technology at today's leading organizations.

You'll find continually updated management-focused features, along with essential news and commentary, a vast library of white papers, webcasts and in-depth IT executive guides spanning a wide variety of business and technology management issues such as security and risk management, enterprise software, compliance, data center and infrastructure challenges.

View the complete archive of news, research and expert advice for CIOs and IT Managers.

Go to:  SearchCIO

Recently on  SearchCIO

CIOs should lean on AI 'giants' for machine learning strategy

Components of AI, such as machine and deep learning, will be part and parcel of every enterprise. When devising a machine learning strategy, CIOs should think of it as the next wave of analytics.

More Highlights
Definitions

Browse CIO Topics

CIO mission

The CIO mission continues to expand as IT strategy is increasingly vital to enterprises' overall objectives and goals. Find the latest resources to help those in the CIO role adapt to these changing responsibilities, including best practices to educate executive management on the business value and risk that IT systems create for the enterprise.

Recent Definitions

  • IT automation

    IT automation is the use of instructions to create a repeated process that replaces an IT professional's manual work in data centers and cloud deployments.

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that means the basic functions of an HR department; the basic data captured about employees; and the software used to manage basic HR processes.

  • business innovation

    Business innovation is an organization's process for introducing new ideas, workflows, methodologies, services or products.

Highlights

More CIO mission Topics

Back to Top

Cloud computing

As companies' data volumes continue to grow in the digital age, they are increasingly turning to cloud computing for business process consolidation and to save IT resources. Read news and tips to help with enterprise cloud computing strategy, including advice to decide between developing cloud resources in-house or turning to third parties for cloud computing services.

Recent Definitions

  • cloud bursting

    Cloud bursting is an application deployment model in which an application normally runs in a private cloud or local data center but can also run in a public cloud when the demand for computing capacity spikes.

  • bimodal IT (bimodal information technology)

    Bimodal IT refers to the management of IT in two modes, one for providing reliable, available and safe IT systems, and the other for speed and maximum flexibility.

  • bring your own cloud (BYOC)

    BYOC is a movement whereby employees and departments use their cloud computing service of choice in the workplace. Allowing employees to use a public cloud storage service to share very large files may be more cost-effective than rolling out a shared storage system internally.

Highlights

Back to Top

Cybersecurity

An enterprise cybersecurity strategy is a vital component of successful businesses in the digital age as companies struggle with constantly evolving data threats. Read news and tips to assist with implementing cybersecurity policy and IT security strategy, including advice to streamline data loss protection efforts to help ensure comprehensive information security.

Recent Definitions

  • cognitive security

    Cognitive security is the application of AI technologies patterned on human thought processes to detect threats and protect physical and digital systems.

  • distributed ledger technology (DLT)

    Distributed ledger technology (DLT) is a digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time.

  • threat hunter (cybersecurity threat analyst)

    A threat hunter, also called a cybersecurity threat analyst, is a security professional or security professional service provider that proactively uses manual or machine-assisted techniques to detect security incidents that may elude the grasp of automated systems.

Highlights

More Cybersecurity Topics

Back to Top

Digital business transformation

Digital business transformation and innovation strategies are essential to corporate success as digital innovation increasingly brings a competitive advantage. Read news, tips and opinion to help your company implement digital business transformation best practices to adapt to -- and profit from – new technologies and processes influencing IT.

Recent Definitions

  • IT automation

    IT automation is the use of instructions to create a repeated process that replaces an IT professional's manual work in data centers and cloud deployments.

  • emotional intelligence (EI)

    Emotional intelligence (EI) is the area of cognitive ability that facilitates interpersonal behavior.

  • magical thinking

    Magical thinking is an illogical cognitive pattern in which people become invested in ideas and projects despite a lack of evidence that they are viable, and sometimes despite solid and easily available evidence that they are not.

Highlights

More Digital business transformation Topics

Back to Top

BI and big data

Enterprise business intelligence software and big data can open a window into the soul of your IT operation. Business and IT goals can be better analyzed and aligned thanks to BI and big data tools and techniques such as data mining and predictive analytics. Find the latest on enterprise BI software and big data with news, tips and other resources in this section.

Recent Definitions

  • metadata management

    Metadata management is the oversight of data associated with data assets to ensure that information can be integrated, accessed, shared, linked, analyzed and maintained to best effect across an organization.

  • social media

    Social media is the collective of online communications channels dedicated to community-based input, interaction and collaboration. This definition of social media explains what it is, how it works and how it's transforming personal and business communications.

  • data collection

    Data collection is a process for gathering information from different sources. In business, data collection helps organizations answer relevant questions and evaluate possible business outcomes.

Highlights

Back to Top

Mobile strategy

A thorough enterprise mobile strategy is essential to digitized companies' success as more employees use cell phones and cloud services to work outside of the office. Find the latest news, tips and opinion about implementing an enterprise mobility strategy, including advice on how to secure mobile data in the enterprise and institute mobile app development best practices.

Recent Definitions

  • SWOT analysis (strengths, weaknesses, opportunities and threats analysis)

    SWOT analysis (strengths, weaknesses, opportunities and threats analysis) is a framework for identifying and analyzing the internal and external factors that can have an impact on the viability of a project, product, place or person.

  • digital economy

    The digital economy is the worldwide network of economic activities, commercial transactions and professional interactions that are enabled by information and communications technologies.

  • Instagram

    Instagram is a free, online photo-sharing application and social network platform that was acquired by Facebook in 2012.

Highlights

Back to Top

Apps, infrastructure and operations

In the information age, good IT infrastructure and operations management practices have become essential to maintain quality control over technology-related policies, processes and equipment. Read news and tips to assist modern IT operations and infrastructure management, including strategies to ensure the proper flow of data throughout enterprise applications and other information systems.

Recent Definitions

  • corollary

    A corollary is a statement that follows naturally from some other statement that has either been proven or is generally accepted as true.

  • distributed ledger technology (DLT)

    Distributed ledger technology (DLT) is a digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time.

  • H-1B

    H-1B is a United States Immigration Service visa classification that permits employers to hire highly skilled foreign workers who possess theoretical and practical application of a body of specialized knowledge.

Highlights

More Apps, infrastructure and operations Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close