Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
IT innovation
IT (information technology) innovation in an enterprise is about using technology in new ways, where the result is a more efficient organization and an improved alignment between technology initiatives and business goals. Continue Reading
digital enterprise
A digital enterprise is an organization that uses technology as a competitive advantage in its internal and external operations. Continue Reading
multisourcing (multi-sourcing)
Multisourcing (multi-sourcing) is an approach to outsourcing in which IT operations and technology infrastructure are contracted to a number of vendors, usually in combination with some internally provided elements of information technology. Continue Reading
-
strategic planning
Strategic planning is a process in which an organization's leaders define their vision for the future and identify their organization's goals and objectives. Continue Reading
CIO job description: Chief information officer responsibilities
Learn about the role of the chief information officer, including daily responsibilities, necessary skills and how the role is evolving in the digital age. Continue Reading
CIO (Chief Information Officer)
A chief information officer (CIO) is the corporate executive in charge of information technology (IT) strategy and implementation.Continue Reading
Sarbanes-Oxley Act (SOX) Section 404
Sarbanes-Oxley Act (SOX) Section 404 mandates that all publicly traded companies must establish internal controls and procedures for financial reporting and must document, test, and maintain those controls and procedures to ensure their ...Continue Reading
COPPA (Children's Online Privacy Protection Act )
The Children's Online Privacy Protection Act of 1998 (COPPA) is a federal law that imposes specific requirements on operators of websites and online services to protect the privacy of children under 13.Continue Reading
SWOT analysis (strengths, weaknesses, opportunities and threats analysis)
SWOT analysis is a framework for identifying and analyzing an organization's strengths, weaknesses, opportunities and threats.Continue Reading
Chief Technology Officer (CTO)
The chief technology officer (CTO) is the individual within an organization who oversees the current technology and creates relevant policy.Continue Reading
-
The CIO's guide to understanding the metaverse
Metaverse definitions vary as do predictions on when it will arrive. But smart CIOs should familiarize themselves with the concept and ways it might affect their company.Continue Reading
Adobe Flash Player
Adobe Flash Player is software used to stream and view video, audio, multimedia and Rich Internet Applications on a computer or supported mobile device.Continue Reading
risk assessment framework (RAF)
A risk assessment framework (RAF) is a strategy for prioritizing and sharing information about the security risks to an information technology (IT) infrastructure.Continue Reading
Radical collaboration in enterprises: How does it work?
What would a world with 'no bureaucracies, no bosses and no bull' look like? Like success, says Matt Parker in his new book, 'A Radical Enterprise.'Continue Reading
Consumption-based, pay-for-what-you-use IT as a service
Composable infrastructure provides CIOs flexibility in combining compute, storage and networking into one framework. Learn the benefits of this relatively new technology and HCI.Continue Reading
Sustainability in business practices: What IT should know
Bjoern Stengel, global sustainability research lead at IDC discusses the trends he's seeing in the use of sustainable tools and technologies and what leaders need to focus on.Continue Reading
data collection
Data collection is the process of gathering data for use in business decision-making, strategic planning, research and other purposes.Continue Reading
CIOs: Nominate your IT services partners for project award
Here's your opportunity to recognize an MSP, IT consultancy, systems integrator or other tech service provider that made a difference to your organization in 2021.Continue Reading
Learn 4 key types of enterprise automation technologies
Low-code, iPaaS, declarative automation and traditional scripting are all important methods of automating business processes. Learn how each can help.Continue Reading
prescriptive analytics
Prescriptive analytics is a type of data analytics that provides guidance on what should happen next.Continue Reading
5 keys to IT talent development in a hybrid work model
With the tech talent shortage in full force, IT talent development is critical for every organization. Learn the essentials of doing it right.Continue Reading
Top 3 information security strategy essentials CIOs need
Cybersecurity is more important than ever before as hackers get more aggressive and vulnerabilities grow. Learn how to approach it in the right way and why getting alignment is so key.Continue Reading
6 steps to create a CIO-CEO strategic partnership
The pandemic pushed CIOs to the head of the C-suite table. Here's how they can keep that respect and power and create true partnership with their CEO.Continue Reading
enterprise agility
Enterprise agility is a paradigm for scaling agile methodologies beyond development teams.Continue Reading
LOB (line of business)
An LOB (line-of-business) application is one of the set of critical computer applications that are vital to running an enterprise, such as accounting, supply chain management, and resource planning applications.Continue Reading
Superdome
Superdome is a high-end 64-bit, Hewlett Packard Enterprise (HPE) PA-8600 processor-based UNIX server designed for e-commerce customers using very large databases.Continue Reading
gap analysis
A gap analysis is a method of assessing the performance of a business unit to determine whether business requirements or objectives are being met and, if not, what steps should be taken to meet them.Continue Reading
Information and Content Exchange (ICE)
Information and Content Exchange (ICE) is an XML-based standard protocol for electronic business-to-business (B2B) asset management.Continue Reading
data monetization
Data monetization is the act of measuring the economic benefit of corporate data.Continue Reading
FQA (frequently questioned answers)
FQA (frequently questioned answers) are conventions or mandates scrutinized by individuals or groups who doubt their validity.Continue Reading
value-sensitive design (VSD)
Value-sensitive design (VSD) is a concept that advocates the consideration of human principles and standards when planning technology.Continue Reading
ephemeral messaging
Ephemeral messaging is the mobile-to-mobile transmission of multimedia messages that automatically disappear from the recipient's screen after the message has been viewed.Continue Reading
digital labor
Digital labor is work that is performed by robotic process automation (RPA) systems.Continue Reading
systems of engagement
Systems of engagement are decentralized IT components that incorporate technologies such as social media and the cloud to encourage and enable peer interaction.Continue Reading
labor arbitrage
Labor arbitrage is the practice of searching for and then using the lowest-cost workforce to produce products or goods.Continue Reading
software license
A software license is a document that provides legally binding guidelines for the use and distribution of software.Continue Reading
key risk indicator (KRI)
A key risk indicator (KRI) is a metric for measuring the likelihood that the combined probability of an event and its consequence will exceed the organization's risk appetite and have a profoundly negative impact on an organization's ability to be ...Continue Reading
Risk Management Framework (RMF)
The Risk Management Framework (RMF) is a template and guideline used by companies to identify, eliminate and minimize risks.Continue Reading
risk management specialist
A risk management specialist is a role appointed within organizations to identify potential risks that might negatively affect the business.Continue Reading
enterprise risk management (ERM)
Enterprise risk management is the process of planning, organizing, directing and controlling the activities of an organization to minimize the deleterious effects of risk on its capital and earnings.Continue Reading
4 basic types of business risks in the enterprise
As part of enterprise risk management, companies can mitigate many types of business risks by focusing on the underlying factors of people, processes, technologies and facilities.Continue Reading
Implementing an enterprise risk management framework
A well-designed, all-inclusive ERM framework provides enterprises with a playbook to avert corporate disasters, generate competitive advantages and create business opportunities.Continue Reading
ISO 31000 vs. COSO: Comparing risk management standards
ISO 31000 and the COSO ERM framework are the two most popular risk management standards. Here's what they include and some of their similarities and differences.Continue Reading
Top 12 risk management skills and why you need them
Risk management is necessary at all levels of a business. Here are some skills needed to be a successful risk manager.Continue Reading
Risk management process: What are the 5 steps?
While many organizations understand they must manage risk, implementing a risk management process is not always straightforward. Follow these five steps to ensure success.Continue Reading
Risk appetite vs. risk tolerance: How are they different?
Risk appetite and risk tolerance are important risk terms that are related but not the same. Here's the difference, plus examples of risk appetite and risk tolerance statements.Continue Reading
corportal (corporate portal)
Corportals, short for corporate portals, are sometimes referred to as enterprise information portals and are used by corporations to build their internal web presence by leveraging a company's information resources.Continue Reading
chief trust officer
A chief trust officer in the IT industry is an executive job title given to the person responsible for building confidence around the use of customer information.Continue Reading
integration server
An integration server is a type of computer server that facilitates the interaction between different operating systems (OSes), services and applications across an enterprise IT environment.Continue Reading
demand shaping
Demand shaping is an operational supply chain management (SCM) strategy where a company uses tactics such as price incentives, cost modifications and product substitutions to entice customers to purchase specific items.Continue Reading
Business Process Management Initiative (BPMI)
Established in August 2000, the Business Process Management Initiative (BPMI) is a non-profit organization that exists to promote the standardization of common business processes, as a means of furthering e-business and B2B development.Continue Reading
ebXML (Electronic Business XML)
EbXML (Electronic Business XML or e-business XML) is a project to use the Extensible Markup Language (XML) to standardize the secure exchange of business data.Continue Reading
XACML (Extensible Access Control Markup Language)
XACML (Extensible Access Control Markup Language) is an attribute-based access control policy language (ABAC) or XML-based language, designed to express security policies and access requests to information.Continue Reading
project scope
Project scope is the part of project planning that involves determining and documenting a list of specific project goals, deliverables, tasks, costs and deadlines.Continue Reading
Project planning: What is it and 5 steps to create a plan
Project planning is a discipline addressing how to complete a project in a certain timeframe, usually with defined stages and designated resources.Continue Reading
coopetition (co-opetition)
Coopetition is a business strategy that uses insights gained from game theory to understand when it is better for competitors to work together.Continue Reading
Top 10 promising 5G use cases CIOs should know
The technological advantages 5G presents are well known. The hard part for business leaders is choosing where 5G implementation can be the difference maker for their organization.Continue Reading
core competency (core competencies)
For any organization, its core competency refers to the capabilities, knowledge, skills and resources that constitute its 'defining strength.'Continue Reading
3 enterprise uses for virtual reality
As enterprise adoption of virtual reality increases, CIOs are choosing the best ways to use the technology to gain a competitive edge. Here are three use cases to consider.Continue Reading
e-procurement (supplier exchange)
Electronic procurement, also known as e-procurement or supplier exchange, is the process of requisitioning, ordering and purchasing goods and services online.Continue Reading
cognitive automation
Cognitive automation describes diverse ways of combining artificial intelligence (AI) and process automation capabilities to improve business outcomes.Continue Reading
ROI (return on investment)
Return on investment, or ROI, is a mathematical formula that investors can use to evaluate their investments and judge how well a particular investment has performed compared to others.Continue Reading
What is digital transformation?
Digital transformation is the incorporation of computer-based technologies into an organization's products, processes and strategies.Continue Reading
metered services (pay-per-use)
Metered services (also called pay-per-use) are any type of payment structure in which a customer has access to potentially unlimited resources but only pays for what they actually use.Continue Reading
nearshore outsourcing
Nearshore outsourcing is the practice of getting work done or services performed by people in neighboring countries rather than an organization's country.Continue Reading
Six Sigma
Six Sigma is a business methodology for quality improvement that measures how many defects there are in a current process and seeks to systematically eliminate them.Continue Reading
CVO (Chief Visionary Officer)
The Chief Visionary Officer (CVO) is a newer title where the holder is expected to have a broad and comprehensive knowledge of all matters related to the business of the organization, as well as the vision required to steer its course into the ...Continue Reading
balanced scorecard
The balance scorecard (BSC) is a management system aimed at translating an organization's strategic goals into a set of organizational performance objectives that, in turn, are measured, monitored, and changed if necessary to ensure that an ...Continue Reading
globalization
Globalization is the process by which ideas, goods and services spread throughout the world.Continue Reading
Gramm-Leach-Bliley Act (GLBA)
The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways financial institutions deal with the private information of individuals.Continue Reading
5 tips to successfully implement blockchain for businesses
Learning how to implement blockchain requires a clear understanding of the technology's decentralized ecosystem. Following these guidelines will help simplify your approach.Continue Reading
big data as a service (BDaaS)
Big data as a service (BDaaS) is the delivery of data platforms and tools by a cloud provider to help organizations process, manage and analyze large data sets so they can generate insights in order to improve business operations and gain a ...Continue Reading
B2B (business-to-business)
B2B (business-to-business), a type of electronic commerce (e-commerce), is the exchange of products, services or information between businesses, rather than between businesses and consumers (B2C).Continue Reading
smart contract
A smart contract is a decentralized application that executes business logic in response to events.Continue Reading
7 must-know blockchain trends
Blockchain-driven tokenization, identity management and decentralized finance are poised to transform business -- to say nothing of cryptocurrency's newfound credibility.Continue Reading
blockchain
Blockchain is a record-keeping technology designed to make it impossible to hack the system or forge the data stored on it, thereby making it secure and immutable.Continue Reading
distributed ledger technology (DLT)
Distributed ledger technology (DLT) is a digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time.Continue Reading
What are the 4 different types of blockchain technology?
Public, private, hybrid or consortium, each blockchain network has distinct pluses and minuses that largely drive its ideal uses -- and will determine which one is best for you.Continue Reading
IT project manager
An IT project manager is a professional charged with overseeing the process of planning, executing and delegating responsibilities around an organization's information technology (IT) pursuits and goals.Continue Reading
What CIOs need to know about digital experience monitoring
As evaluating user and employee digital experience becomes more common, CIOs need to learn how the technologies work and what they stand to gain by implementing DEM.Continue Reading
5 tips on how to build agile teams in the new workplace
As business leaders begin looking into ways to become more agile in the workplace, we're diving into how they can effectively create agile teams for any given project.Continue Reading
4 agile team best practices to follow in the enterprise
Agile teams can help businesses respond to change more quickly, which is crucial in today's digital age. According to experts, these are the best practices to follow.Continue Reading
decision support system (DSS)
A decision support system (DSS) is a computer program application used to improve a company's decision-making capabilities.Continue Reading
Hyperledger
Hyperledger is an open source project created to support the development of blockchain-based distributed ledgers.Continue Reading
digital process automation
Digital process automation (DPA) uses low-code development tools to automate processes that can span multiple applications.Continue Reading
RPA vs. BPA vs. DPA: Compare process automation technologies
Enterprise leaders have a choice of business process automation technologies. We delve into three top options and zero in on key differences.Continue Reading
C-Level (C-Suite)
C-level, also called the C-suite, is a term used to describe high-ranking executive titles in an organization.Continue Reading
robotic process automation (RPA)
Robotic process automation (RPA) is a technology that mimics the way humans interact with software to perform high-volume, repeatable tasks.Continue Reading
hyperautomation
Hyperautomation is a framework and set of advanced technologies for scaling automation in the enterprise; the ultimate goal of hyperautomation is to develop a process for automating enterprise automation.Continue Reading
compliance risk
Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting from its failure to act in accordance with industry laws and regulations, internal policies or prescribed best practices.Continue Reading
How to measure the success of agile transformation
In his new book 'Sooner, Safer, Happier,' Jonathan Smart dives into the ways in which organizations can achieve better outcomes through business agility.Continue Reading
cyber threat hunter (cybersecurity threat analyst)
A cyber threat hunter, also called a cybersecurity threat analyst, proactively identifies security incidents that may go undetected by automated security tools such as malware detectors and firewalls.Continue Reading
transformational leadership
Transformational leadership is a management philosophy that encourages and inspires employees to innovate and develop new ways to grow and improve the path to a company's future success.Continue Reading
7 online digital transformation courses and certifications
We've compiled a list of the best paid online digital transformation courses and certification programs for business leaders seeking to gain a competitive edge in the digital age.Continue Reading
14 need-to-know tips for digital transformation success
What separates a successful digital transformation implementation from a recipe for disaster? These 14 tips will help ensure your DX efforts result in business improvement.Continue Reading
Build a digital transformation roadmap in 6 steps
Digital transformation, done right, is the key to business survival. Build a roadmap to digital business model success by following this in-depth, six-step template.Continue Reading
6 tips for digital transformation budget planning
Digital transformation budgets require different processes than traditional business or IT budgets. Here's what to bear in mind when budgeting for DX.Continue Reading
value chain
A value chain is a concept describing the full chain of a business's activities in the creation of a product or service -- from the initial reception of materials all the way through its delivery to market, and everything in between.Continue Reading
Building a digital transformation team: 8 essential roles
Who needs to be on your digital transformation team? Metrigy's Robin Gareiss lists the key positions of an effective digital transformation team and explains why they're important.Continue Reading
information governance
Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and metrics that treat information as a valuable business asset.Continue Reading