Browse Definitions :

SearchCIO

SearchCIO.com is part of the CIO/IT Strategy network of sites from TechTarget, the Web's most comprehensive source of information for IT professionals who are purchasing, deploying, managing and developing technology at today's leading organizations.

You'll find continually updated management-focused features, along with essential news and commentary, a vast library of white papers, webcasts and in-depth IT executive guides spanning a wide variety of business and technology management issues such as security and risk management, enterprise software, compliance, data center and infrastructure challenges.

View the complete archive of news, research and expert advice for CIOs and IT Managers.

Go to:  SearchCIO

Recently on  SearchCIO

Adobe, Uber on the challenges of digital transformation

Digital transformation initiatives may be all the rage in the enterprise, but they also pose significant challenges to CIOs and others who have to manage the transition.

More Highlights
Definitions
  • e-business (electronic business)

    E-business (electronic business) is the conduct of business processes on the internet.

  • digital transformation

    Digital transformation (DX) is the reworking of the products, processes and strategies within an organization by leveraging current technologies.

  • strategic management

    Strategic management is the continuous planning, monitoring, analysis and assessment of all that is necessary for an organization to meet its goals and objectives.

Browse CIO Topics

CIO mission

The CIO mission continues to expand as IT strategy is increasingly vital to enterprises' overall objectives and goals. Find the latest resources to help those in the CIO role adapt to these changing responsibilities, including best practices to educate executive management on the business value and risk that IT systems create for the enterprise.

Recent Definitions

  • strategic sourcing

    Strategic sourcing is an approach to supply chain management that formalizes the way information is gathered and used so that an organization can leverage its consolidated purchasing power to find the best possible values in the marketplace.

  • digital transformation

    Digital transformation (DX) is the reworking of the products, processes and strategies within an organization by leveraging current technologies.

  • strategic management

    Strategic management is the continuous planning, monitoring, analysis and assessment of all that is necessary for an organization to meet its goals and objectives.

Highlights

More CIO mission Topics

Back to Top

Cloud computing

As companies' data volumes continue to grow in the digital age, they are increasingly turning to cloud computing for business process consolidation and to save IT resources. Read news and tips to help with enterprise cloud computing strategy, including advice to decide between developing cloud resources in-house or turning to third parties for cloud computing services.

Recent Definitions

  • ghost worker

    Ghost worker is a term coined by computer scientist Siddharth Suri and Harvard researcher Mary L. Gray to describe an emerging class of remote freelance workers who make their living by completing microtasks for cloud providers.

  • bimodal IT (bimodal information technology)

    Bimodal IT is a two-tiered IT operations model that allows for the creation of IT systems and processes that are stable and predictable as well as agile and fast.

  • cloud bursting

    Cloud bursting is an application deployment model in which an application normally runs in a private cloud or local data center but can also run in a public cloud when the demand for computing capacity spikes.

Highlights

Back to Top

Cybersecurity

An enterprise cybersecurity strategy is a vital component of successful businesses in the digital age as companies struggle with constantly evolving data threats. Read news and tips to assist with implementing cybersecurity policy and IT security strategy, including advice to streamline data loss protection efforts to help ensure comprehensive information security.

Recent Definitions

  • Sarbanes-Oxley Act (SOX)

    The Sarbanes-Oxley Act of 2002 is a federal law that established sweeping auditing and financial regulations for public companies.

  • black swan event

    A black swan event is an incident that occurs randomly and unexpectedly, and has a major effect on operations. The phrase illustrates the frailty of inductive reasoning and the danger of making sweeping generalizations from limited observations.

  • cognitive security

    Cognitive security is the application of AI technologies patterned on human thought processes to detect threats and protect physical and digital systems.

Highlights

More Cybersecurity Topics

Back to Top

Digital business transformation

Digital business transformation and innovation strategies are essential to corporate success as digital innovation increasingly brings a competitive advantage. Read news, tips and opinion to help your company implement digital business transformation best practices to adapt to -- and profit from – new technologies and processes influencing IT.

Recent Definitions

  • workflow automation

    Workflow automation is an approach to making the flow of tasks, documents and information across work-related activities perform independently in accordance with defined business rules.

  • e-business (electronic business)

    E-business (electronic business) is the conduct of business processes on the internet.

  • digital transformation

    Digital transformation (DX) is the reworking of the products, processes and strategies within an organization by leveraging current technologies.

Highlights

More Digital business transformation Topics

Back to Top

BI and big data

Enterprise business intelligence software and big data can open a window into the soul of your IT operation. Business and IT goals can be better analyzed and aligned thanks to BI and big data tools and techniques such as data mining and predictive analytics. Find the latest on enterprise BI software and big data with news, tips and other resources in this section.

Recent Definitions

  • big data

    Big data is an evolving term that describes a large volume of structured, semi-structured and unstructured data that has the potential to be mined for information and used in machine learning projects and other advanced analytics applications.

  • subscription management

    Subscription management is the process of overseeing and controlling all aspects of products and services sold repeatedly through a weekly, monthly, quarterly or yearly subscription-based pricing model.

  • social media

    Social media is the collective of online communications channels dedicated to community-based input, interaction and collaboration.

Highlights

Back to Top

Mobile strategy

A thorough enterprise mobile strategy is essential to digitized companies' success as more employees use cell phones and cloud services to work outside of the office. Find the latest news, tips and opinion about implementing an enterprise mobility strategy, including advice on how to secure mobile data in the enterprise and institute mobile app development best practices.

Recent Definitions

  • consumerization of IT

    IT consumerization is the blending of personal and business use of technology devices and applications. Gartner traced the trend to the dot-com collapse, when enterprise IT budgets shrank and many IT vendors shifted focus to the potentially bigger consumer IT markets. The result has been a change in the way technology enters the marketplace.

  • Chief Digital Officer (CDO)

    A chief digital officer (CDO) is an executive enlisted to help businesses transform traditional IT policies and business processes to accommodate digital sectors such as mobile technology and applications and Web-based information management and marketing trends.

  • SWOT analysis (strengths, weaknesses, opportunities and threats analysis)

    SWOT analysis (strengths, weaknesses, opportunities and threats analysis) is a framework for identifying and analyzing the internal and external factors that can have an impact on the viability of a project, product, place or person.

Highlights

Back to Top

Apps, infrastructure and operations

In the information age, good IT infrastructure and operations management practices have become essential to maintain quality control over technology-related policies, processes and equipment. Read news and tips to assist modern IT operations and infrastructure management, including strategies to ensure the proper flow of data throughout enterprise applications and other information systems.

Recent Definitions

  • strategic sourcing

    Strategic sourcing is an approach to supply chain management that formalizes the way information is gathered and used so that an organization can leverage its consolidated purchasing power to find the best possible values in the marketplace.

  • configuration management (CM)

    Configuration management (CM) is a governance and systems engineering process for ensuring consistency in an operational environment.

  • ERP (enterprise resource planning)

    ERP, or enterprise resource planning, is a modular software system designed to integrate the main functional areas of an organization's business processes into a unified system.

Highlights

More Apps, infrastructure and operations Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems -- including hardware, software and data -- from cyberattacks.

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close