Browse Definitions:

SearchCIO

SearchCIO.com is part of the CIO/IT Strategy network of sites from TechTarget, the Web's most comprehensive source of information for IT professionals who are purchasing, deploying, managing and developing technology at today's leading organizations.

You'll find continually updated management-focused features, along with essential news and commentary, a vast library of white papers, webcasts and in-depth IT executive guides spanning a wide variety of business and technology management issues such as security and risk management, enterprise software, compliance, data center and infrastructure challenges.

View the complete archive of news, research and expert advice for CIOs and IT Managers.

Go to:  SearchCIO

Recently on  SearchCIO

RSA 2018: Juniper CEO stresses training, automation in cybersecurity

During his RSA Conference keynote, Juniper CEO Rami Rahim encouraged leaders to be "agents of change" that embrace automation in cybersecurity and new training techniques.

More Highlights
Definitions
  • enterprise risk management (ERM)

    Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimize the effects of risk on an organization's capital and earnings.

  • entrepreneur (entrepreneurship)

    An entrepreneur is an individual who identifies a need in the marketplace and works to fulfill it.

  • change agent (agent of change)

    A change agent, or agent of change, is someone who promotes and enables change to happen within any group or organization.

Browse CIO Topics

CIO mission

The CIO mission continues to expand as IT strategy is increasingly vital to enterprises' overall objectives and goals. Find the latest resources to help those in the CIO role adapt to these changing responsibilities, including best practices to educate executive management on the business value and risk that IT systems create for the enterprise.

Recent Definitions

  • biofeedback

    Biofeedback is a system that monitors biological data from users and trains them to improve their physiological responses, with the goal of improving physical and mental health and performance.

  • transformative technology

    Transformative technology is hardware- and software-based tools designed to enhance human psychological well-being, cognitive function and physical capabilities.

  • change agent (agent of change)

    A change agent, or agent of change, is someone who promotes and enables change to happen within any group or organization.

Highlights

More CIO mission Topics

Back to Top

Cloud computing

As companies' data volumes continue to grow in the digital age, they are increasingly turning to cloud computing for business process consolidation and to save IT resources. Read news and tips to help with enterprise cloud computing strategy, including advice to decide between developing cloud resources in-house or turning to third parties for cloud computing services.

Recent Definitions

  • bimodal IT (bimodal information technology)

    Bimodal IT is a two-tiered IT operations model that allows for the creation of IT systems and processes that are stable and predictable as well as agile and fast.

  • cloud bursting

    Cloud bursting is an application deployment model in which an application normally runs in a private cloud or local data center but can also run in a public cloud when the demand for computing capacity spikes.

  • bring your own cloud (BYOC)

    BYOC is a movement whereby employees and departments use their cloud computing service of choice in the workplace. Allowing employees to use a public cloud storage service to share very large files may be more cost-effective than rolling out a shared storage system internally.

Highlights

Back to Top

Cybersecurity

An enterprise cybersecurity strategy is a vital component of successful businesses in the digital age as companies struggle with constantly evolving data threats. Read news and tips to assist with implementing cybersecurity policy and IT security strategy, including advice to streamline data loss protection efforts to help ensure comprehensive information security.

Recent Definitions

  • black swan event

    A black swan event is an incident that occurs randomly and unexpectedly, and has a major effect on operations. The phrase illustrates the frailty of inductive reasoning and the danger of making sweeping generalizations from limited observations.

  • cognitive security

    Cognitive security is the application of AI technologies patterned on human thought processes to detect threats and protect physical and digital systems.

  • distributed ledger technology (DLT)

    Distributed ledger technology (DLT) is a digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time.

Highlights

More Cybersecurity Topics

Back to Top

Digital business transformation

Digital business transformation and innovation strategies are essential to corporate success as digital innovation increasingly brings a competitive advantage. Read news, tips and opinion to help your company implement digital business transformation best practices to adapt to -- and profit from – new technologies and processes influencing IT.

Recent Definitions

  • enterprise risk management (ERM)

    Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimize the effects of risk on an organization's capital and earnings.

  • Mandela effect

    The Mandela effect is an observed phenomenon in which a large segment of the population misremembers a significant event or shares a memory of an event that did not actually occur. Fiona Broome, a paranormal researcher, coined the term to describe collective false memory when she discovered that a significant number of people at a conference she was attending in 2010 shared her memory that Nelson Mandela had died in prison during the 1980s.

  • explainable AI (XAI)

    Explainable AI (XAI) is artificial intelligence that is programmed to describe its purpose, rationale and decision-making process in a way that can be understood by the average person.

Highlights

More Digital business transformation Topics

Back to Top

BI and big data

Enterprise business intelligence software and big data can open a window into the soul of your IT operation. Business and IT goals can be better analyzed and aligned thanks to BI and big data tools and techniques such as data mining and predictive analytics. Find the latest on enterprise BI software and big data with news, tips and other resources in this section.

Recent Definitions

  • data management platform (DMP)

    A data management platform (DMP), also referred to as a unified data management platform (UDMP), is a centralized system for collecting and analyzing large sets of data originating from disparate sources.

  • smart machines

    A smart machine is a device embedded with machine-to-machine (M2M) and/or cognitive computing technologies such as artificial intelligence (AI), machine learning or deep learning, all of which it uses to reason, problem-solve, make decisions and even, ultimately, take action.

  • data science

    Data science is the study of where information comes from, what it represents and how it can be turned into a valuable resource in the creation of business and IT strategies.

Highlights

Back to Top

Mobile strategy

A thorough enterprise mobile strategy is essential to digitized companies' success as more employees use cell phones and cloud services to work outside of the office. Find the latest news, tips and opinion about implementing an enterprise mobility strategy, including advice on how to secure mobile data in the enterprise and institute mobile app development best practices.

Recent Definitions

  • bimodal IT (bimodal information technology)

    Bimodal IT is a two-tiered IT operations model that allows for the creation of IT systems and processes that are stable and predictable as well as agile and fast.

  • SWOT analysis (strengths, weaknesses, opportunities and threats analysis)

    SWOT analysis (strengths, weaknesses, opportunities and threats analysis) is a framework for identifying and analyzing the internal and external factors that can have an impact on the viability of a project, product, place or person.

  • digital economy

    The digital economy is the worldwide network of economic activities, commercial transactions and professional interactions that are enabled by information and communications technologies.

Highlights

Back to Top

Apps, infrastructure and operations

In the information age, good IT infrastructure and operations management practices have become essential to maintain quality control over technology-related policies, processes and equipment. Read news and tips to assist modern IT operations and infrastructure management, including strategies to ensure the proper flow of data throughout enterprise applications and other information systems.

Recent Definitions

  • entrepreneur (entrepreneurship)

    An entrepreneur is an individual who identifies a need in the marketplace and works to fulfill it.

  • supply chain management (SCM)

    Supply chain management (SCM) is the broad range of activities required to plan, control and execute a product's flow, from acquiring raw materials and production through distribution to the final customer, in the most streamlined and cost-effective way possible.

  • business process reengineering (BPR)

    Business process reengineering (BPR) is an approach to change management in which the related tasks required to obtain a specific business outcome are radically redesigned. An important goal of BPR is to analyze workflows within and between enterprises in order to optimize end-to-end processes and eliminate tasks that do not provide the customer with value.

Highlights

More Apps, infrastructure and operations Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • National Security Agency (NSA)

    The National Security Agency is the official U.S. cryptologic organization of the United States Intelligence Community under the ...

SearchHealthIT

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

SearchDisasterRecovery

SearchStorage

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close