Browse Definitions :

SearchCIO

SearchCIO.com is part of the CIO/IT Strategy network of sites from TechTarget, the Web's most comprehensive source of information for IT professionals who are purchasing, deploying, managing and developing technology at today's leading organizations.

You'll find continually updated management-focused features, along with essential news and commentary, a vast library of white papers, webcasts and in-depth IT executive guides spanning a wide variety of business and technology management issues such as security and risk management, enterprise software, compliance, data center and infrastructure challenges.

View the complete archive of news, research and expert advice for CIOs and IT Managers.

Go to:  SearchCIO

Recently on  SearchCIO

The benefits of CIO dashboards and tips on how to build them

CIO dashboards can be a vital tool for assessing metrics in real time to gain insight on IT performance and support better decision-making. Here, we dive into how to build one.

More Highlights
Definitions
  • IT strategy (information technology strategy)

    IT strategy (information technology strategy) is a comprehensive plan that outlines how technology should be used to meet IT and business goals.

  • disruptive innovation

    Disruptive innovation is the introduction of a product or service into an established industry that performs better and, generally, at a lower cost than existing offerings, thereby displacing the market leaders in that particular market space and transforming the industry.

  • blockchain

    Blockchain is a type of distributed ledger for maintaining a permanent and tamperproof record of transaction-based data.

Browse CIO Topics

CIO mission

The CIO mission continues to expand as IT strategy is increasingly vital to enterprises' overall objectives and goals. Find the latest resources to help those in the CIO role adapt to these changing responsibilities, including best practices to educate executive management on the business value and risk that IT systems create for the enterprise.

Recent Definitions

  • IT strategy (information technology strategy)

    IT strategy (information technology strategy) is a comprehensive plan that outlines how technology should be used to meet IT and business goals.

  • disruptive innovation

    Disruptive innovation is the introduction of a product or service into an established industry that performs better and, generally, at a lower cost than existing offerings, thereby displacing the market leaders in that particular market space and transforming the industry.

  • ITIL (Information Technology Infrastructure Library)

    The ITIL (Information Technology Infrastructure Library) is a framework designed to standardize the selection, planning, delivery, maintenance, and overall lifecycle of IT services within a business.

Highlights

More CIO mission Topics

Back to Top

Cloud computing

As companies' data volumes continue to grow in the digital age, they are increasingly turning to cloud computing for business process consolidation and to save IT resources. Read news and tips to help with enterprise cloud computing strategy, including advice to decide between developing cloud resources in-house or turning to third parties for cloud computing services.

Recent Definitions

  • IBM Cloud Functions

    IBM Cloud Functions is the company’s software underlying cloud applications to provide granular access control to cloud resources.

  • ghost worker

    Ghost worker is a term coined by computer scientist Siddharth Suri and Harvard researcher Mary L. Gray to describe an emerging class of remote freelance workers who make their living by completing microtasks for cloud providers.

  • bimodal IT (bimodal information technology)

    Bimodal IT is a two-tiered IT operations model that allows for the creation of IT systems and processes that are stable and predictable as well as agile and fast.

Highlights

Back to Top

Cybersecurity

An enterprise cybersecurity strategy is a vital component of successful businesses in the digital age as companies struggle with constantly evolving data threats. Read news and tips to assist with implementing cybersecurity policy and IT security strategy, including advice to streamline data loss protection efforts to help ensure comprehensive information security.

Recent Definitions

  • Sarbanes-Oxley Act (SOX)

    The Sarbanes-Oxley Act of 2002 is a federal law that established sweeping auditing and financial regulations for public companies.

  • black swan event

    A black swan event is an incident that occurs randomly and unexpectedly, and has a major effect on operations. The phrase illustrates the frailty of inductive reasoning and the danger of making sweeping generalizations from limited observations.

  • cognitive security

    Cognitive security is the application of AI technologies patterned on human thought processes to detect threats and protect physical and digital systems.

Highlights

More Cybersecurity Topics

Back to Top

Digital business transformation

Digital business transformation and innovation strategies are essential to corporate success as digital innovation increasingly brings a competitive advantage. Read news, tips and opinion to help your company implement digital business transformation best practices to adapt to -- and profit from – new technologies and processes influencing IT.

Recent Definitions

  • artificial intelligence

    Artificial intelligence (AI) is the simulation of human intelligence processes by machines, especially computer systems.

  • project management framework

    A project management framework is a set of processes, tasks, and tools that provide guidance and structure for the execution of a project.

  • triple constraint

    The triple constraint is a model that describes the three most significant restrictions on any project: scope, schedule and cost.

Highlights

More Digital business transformation Topics

Back to Top

BI and big data

Enterprise business intelligence software and big data can open a window into the soul of your IT operation. Business and IT goals can be better analyzed and aligned thanks to BI and big data tools and techniques such as data mining and predictive analytics. Find the latest on enterprise BI software and big data with news, tips and other resources in this section.

Recent Definitions

  • data collection

    Data collection is the systematic approach to gathering and measuring information from a variety of sources to get a complete and accurate picture of an area of interest.

  • chief experience officer (CXO)

    A chief experience officer (CXO) is an executive in the C-suite who ensures positive interactions with an organization's customers.

  • social media

    Social media is a collective term for websites and applications which focus on communication, community-based input, interaction, content-sharing and collaboration.

Highlights

Back to Top

Mobile strategy

A thorough enterprise mobile strategy is essential to digitized companies' success as more employees use cell phones and cloud services to work outside of the office. Find the latest news, tips and opinion about implementing an enterprise mobility strategy, including advice on how to secure mobile data in the enterprise and institute mobile app development best practices.

Recent Definitions

  • omnichannel

    Omnichannel -- also spelled omni-channel -- is a multichannel approach to sales that seeks to provide customers with a seamless shopping experience, whether they're shopping online from a desktop or mobile device, by telephone, or in a brick-and-mortar store.

  • device ID (device identification)

    A device ID (device identification) is a distinctive number associated with a smartphone or similar handheld device.

  • consumerization of IT

    IT consumerization is the blending of personal and business use of technology devices and applications. Gartner traced the trend to the dot-com collapse, when enterprise IT budgets shrank and many IT vendors shifted focus to the potentially bigger consumer IT markets. The result has been a change in the way technology enters the marketplace.

Highlights

Back to Top

Apps, infrastructure and operations

In the information age, good IT infrastructure and operations management practices have become essential to maintain quality control over technology-related policies, processes and equipment. Read news and tips to assist modern IT operations and infrastructure management, including strategies to ensure the proper flow of data throughout enterprise applications and other information systems.

Recent Definitions

  • applicant tracking system (ATS)

    An applicant tracking system (ATS) is software that manages the recruiting and hiring process, including job postings and job applications.

  • What is configuration management? A comprehensive guide

    Configuration management (CM) is an information governance and systems engineering process to ensure consistency among physical and logical assets in an operational environment.

  • supply chain management (SCM)

    Supply chain management (SCM) is the optimization of a product's creation and flow from raw material sourcing to production, logistics and delivery to the final customer.

Highlights

More Apps, infrastructure and operations Topics

Back to Top

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • M.2 SSD

    An M.2 SSD is a solid-state drive that is used in internally mounted storage expansion cards of a small form factor.

Close