Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
cultural fit
Cultural fit is the likelihood that a job candidate will be able to conform and adapt to the core values and collective behaviors that make up an organization. Continue Reading
Wizard of Oz prototyping
Wizard of Oz prototyping is a tactic used by developers to give the appearance that an application or program has been completely automated when, in fact, it hasn't. Continue Reading
dot-com bubble
The dot-com bubble, also referred to as the Internet bubble, refers to the period between 1995 and 2000 when investors pumped money into Internet-based startups in the hopes that these fledgling companies would soon turn a profit. Continue Reading
-
information superhighway (infobahn)
Information superhighway is a term that was used mainly in the 1990s to describe a national communications network that would span the United States and allow Americans to quickly access and exchange information via voice, data, video and other ... Continue Reading
business service management (BSM)
Business service management (BSM) is an approach to overseeing information technology that emphasizes treating IT offerings as part of the larger enterprise strategy, and provisioning IT resources based on an understanding of the business' most ... Continue Reading
bring your own cloud (BYOC)
BYOC is a movement whereby employees and departments use their cloud computing service of choice in the workplace. Allowing employees to use a public cloud storage service to share very large files may be more cost-effective than rolling out a ...Continue Reading
Free RFP template examples for ERP
Use these free RFP template examples for ERP to make the best use of your business' technology resources.Continue Reading
IT skills gap (information technology skills gap)
In human resource management, an information technology (IT) skills gap is a mismatch between the capabilities an employer needs to meet business objectives and what the organization's employees know and can do.Continue Reading
Three steps to keep IT policies and procedures regulatory compliant
Corporate compliance and risk management expert Jeffrey Jenkins shares how he ensures IT policies and procedures remain in sync with current compliance regulations.Continue Reading
IT Governance Institute (ITGI)
The IT Governance Institute (ITGI) is an arm of ISACA that provides research, publications and resources on IT governance and related topics.Continue Reading
-
Can automated segregation of duties benefit regulatory compliance?
In this feature, Michael Rasmussen explains why automated SoD reduces compliance costs as well as the potential for fraud and lawsuits.Continue Reading
startup culture
Startup culture refers to how people within a new business, or startup, work together.Continue Reading
IT audit (information technology audit)
An IT audit is the examination and evaluation of an organization's information technology infrastructure, policies and operations.Continue Reading
Mobility trend: For this IT leader, connected car is both zest and threat
The connected car is just one example of a mobility trend that is reshaping business as usual.Continue Reading
Generally Accepted Recordkeeping Principles (the Principles)
Generally Accepted Recordkeeping Principles is a framework for managing records in a way that supports an organization's immediate and future regulatory, legal, risk mitigation, environmental and operational requirements.Continue Reading
Information Age
The Information Age refers to the idea that access to and the control of information is the defining characteristic of this current era in human civilization.Continue Reading
IT blueprint
An IT blueprint, like an architectural blueprint, is a planning tool or document an information technology organization establishes in order to guide its priorities, projects, budgets, staffing and other IT strategy-related initiatives.Continue Reading
rogue IT
Rogue IT is the use of unsanctioned information technology resources within an organization. Continue Reading
IT centralization (information technology centralization)
IT centralization (information technology centralization) is the act of concentrating an organization's technology resources under a single entity.Continue Reading
Government Accountability Office (GAO)
The U.S. Government Accountability Office (GAO) is an independent, nonpartisan agency that works for Congress to investigate how the federal government spends taxpayer dollars.Continue Reading
change management strategy
A change management strategy is a systematic approach to making adjustments to the application of a set of tools, processes or skills during a project or initiative.Continue Reading
EDRM (electronic discovery reference model)
The Electronic Discovery Reference Model (EDRM) is a framework that outlines standards for the recovery and discovery and of digital data.Continue Reading
IT organization (information technology organization)
An IT organization (information technology organization) is the department within an organization charged with establishing, monitoring and maintaining information technology systems and services, and with strategic planning around current and ...Continue Reading
The new BPM program: A focus on data-driven business outcomes
With an emphasis on data-driven business results, the new BPM program is giving CIOs the tools to help grow the business.Continue Reading
intrapreneur (intrapreneurship)
Intrapreneurs are employees who use entrepreneurial skills and critical thinking to seek out initiatives that could benefit the organization financially.Continue Reading
IT strategist (information technology strategist)
An IT strategist (information technology strategist) is someone in an organization who is given the responsibility and authority to establish initiatives that affect the organization's IT and business strategy.Continue Reading
Preparation underway for Dodd-Frank conflict mineral disclosures
Dodd-Frank conflict mineral provisions create new disclosure rules for public companies. In this tip, learn how to prepare for the regulations.Continue Reading
Strategic business intelligence for a mobile future
Gathering, analyzing and providing easy access to data is central to strategic business intelligence programs. Learn more in this CIO Essential Guide.Continue Reading
social network
A social network, in technology parlance, is a website or other application where people, often of similar interests, come together to communicate with each other and share information including photos, videos, audio and written messages.Continue Reading
steering committee
A steering committee is a group of high-level advisors who have been appointed to provide an organization or project with direction.Continue Reading
cutting edge
Cutting edge is an adjective used to describe the newest, most advanced version of a product or service. The phrase cutting edge has a positive connotation and can be contrasted with the phrase bleeding edge, which has a negative connotation. ...Continue Reading
project post-mortem
Project post-mortem is a process intended to inform project improvements by determining aspects that were successful or unsuccessful.Continue Reading
Quiz: Mobile BI strategy, techniques and practices for CIOs
Mobile business intelligence techniques are a hot topic in today's IT departments. Test your knowledge in our mobile BI strategy quiz.Continue Reading
repeatable process
A repeatable process is a set of actions that allow for a more efficient use of limited resources and reduce unwanted variation during the development and implementation of various projects.Continue Reading
Cloud: A disruptive technology that's worth the disruption
Cloud computing is a disruptive technology that promises to upend the enterprise, but the upsides are worth the risk.Continue Reading
power user
A power user, also called a super user, is someone whose computer skills are better than those of an organization's average end user. Continue Reading
Fortune 500
The Fortune 500 is Fortune Magazine's annual ranking of the United States' 500 largest corporations. The list is important because it provides the general public with a sense for which companies have the ability to influence the economy in the ...Continue Reading
IT cost structure
IT cost structure is the relationship of different types of costs within a larger IT budget.Continue Reading
holistic (holistic technology)
Holistic (holistic technology) is a concept concerned with treatment of entire systems, rather than the analysis, treatment or segmentation of parts of those systems.Continue Reading
risk intelligence (RQ)
Risk intelligence (RQ) is a term used to describe predictions made around uncertainties and future threat probabilities.Continue Reading
electronically stored information (ESI)
Electronically stored information (ESI) is data created, altered, communicated and stored in digital form.Continue Reading
Office of Management and Budget (OMB)
The Office of Management and Budget (OMB) is the business division of the Executive Office of the President of the United States that administers the United States federal budget and oversees the performance of federal agencies.Continue Reading
competitive differentiation
Competitive differentiation is a strategic positioning tactic an organization can undertake to set its products, services and brands apart from those of its competitors.Continue Reading
IT service management and delivery: A quiz for CIOs
Is your IT organization doing all it can to improve user experience? Review our CIO coverage and take our quiz on IT service management and delivery.Continue Reading
newsfeed
A news feed (newsfeed) is list of newly published content on a website. End users can receive push updates for new content on a site by subscribing to the site's news feed. Continue Reading
Silicon Valley
Silicon Valley is home to some of the world's largest technology corporations and thousands of technology-related startup companies.Continue Reading
Apple iMessage (Apple instant message)
Apple iMessage (Apple instant message) is an instant messenger service developed by Apple Inc. that allows users to send texts, documents, photos, videos, locations, contact information and group messages over Wi-Fi, 3G or LTE networks to other iOS ...Continue Reading
ISACA
ISACA is an independent, nonprofit, global association that engages in the development, adoption and use of globally accepted information system (IS) knowledge and practices.Continue Reading
U.S. Department of Homeland Security (DHS)
The U.S. Department of Homeland Security (DHS) is a federal agency designed to protect the United States against threats.Continue Reading
fractional CIO
A fractional CIO is a high-level consultant who specializes in aligning information technology (IT) with business goals. Quite simply, a fractional CIO works for a fraction of the time, at a fraction of the cost it would take to hire a full-time ...Continue Reading
enterprise IT (enterprise-class IT)
Enterprise IT, also known as enterprise-class IT, is hardware and software designed to meet the demands of a large organization. In comparison to consumers and small companies, an enterprise has greater requirements for availability, reliability, ...Continue Reading
public data
Public data is information that can be freely used, reused and redistributed by anyone with no existing local, national or international legal restrictions on access or usage.Continue Reading
ITIL v3
ITIL v3 is the third version of the Information Technology Infrastructure Library, a globally recognized collection of best practices for managing information technology (IT).Continue Reading
IT procurement
IT procurement is the series of activities and procedures necessary to acquire information technology products or services.Continue Reading
pilot program (pilot study)
A pilot program, also called a feasibility study or experimental trial, is a small-scale experiment that helps an organization learn how a large-scale project might work in practice.Continue Reading
Vine (Vine app)
Vine is a free mobile application that enables users to record and share an unlimited number of short, looping video clips with a maximum length of six seconds.Continue Reading
geolocation data
Geolocation data is information associated with an electronic device that can be used to identify its physical location. The most common example of geolocation data is an IP address.Continue Reading
business continuity management (BCM)
Business continuity management (BCM) is a framework for identifying an organization's risk of exposure to internal and external threats.Continue Reading
reshoring
Reshoring is the practice of bringing outsourced personnel and services back to the location from which they were originally offshored. Continue Reading
growth potential
Growth potential is an organization's future ability to generate larger profits, expand its workforce and ramp up its production.Continue Reading
group think
Group think (also spelled groupthink) is a phenomenon that occurs when group's need for consensus supersedes the judgment of individual group members.Continue Reading
Generation Facebook (Generation F)
Generation Facebook (Generation F) is a term used to define millennials who have grown up using social media as their primary networking tool.Continue Reading
Social media management software (SMMS)
Social media management software (SMMS) is a tool that allows organizations to monitor and analyze online conversations from different communication channels.Continue Reading
PICK chart (Possible, Implement, Challenge and Kill chart)
A PICK chart (Possible, Implement, Challenge and Kill chart) is a visual tool for organizing ideas. The purpose of a PICK chart is to identify which ideas can be implemented easily and have a high payoff.Continue Reading
Yammer
Yammer is a private microblogging and collaboration platform for enterprise social networking. Unlike public social media platforms such as Twitter,Yammer only allows members to connect with other members who belong to the same email domain.Continue Reading
Millennials 101: Test yourself with our generational diversity quiz
As the Millennial generation enters the workforce, CIOs are balancing a lot of generational diversity. Test your knowledge about managing Millennials.Continue Reading
business services
Business services is a general term that describes work that supports a business but does not produce a tangible commodity. Continue Reading
Vertical SaaS (Software as a Service)
Vertical SaaS describes a type of Software as a Service cloud computing solution created for a specific industry.Continue Reading
business technology (BT)
Business technology (BT) is a term that points specifically to the technology used by businesses to treat information.Continue Reading
shared services
Shared services is the consolidation of business operations that are used by multiple parts of the same organization. Continue Reading
FAQ: Four criteria for an effective IT innovation strategy
In this FAQ, IT executives share four ways to kick-start and manage an IT innovation strategy that drives business value and transformation.Continue Reading
vendor management office (VMO)
A vendor management office (VMO) is an internal unit within an enterprise that is charged with evaluating third-party providers of goods and services, supervising day-to-day interactions and managing longer-term relationships.Continue Reading
Test your social media risk management IQ: A SearchCompliance.com quiz
Proliferating social networks have cast a spotlight on social media risk management. Take our quiz to find out if you are up to speed on social media.Continue Reading
corporate social responsibility (CSR)
Corporate social responsibility is an umbrella term used to describe voluntary corporate initiatives concerned with community development, the environment and human rights. Continue Reading
control framework
A control framework is a data structure that organizes and categorizes an organization’s internal controls, which are practices and procedures established to create business value and minimize risk.Continue Reading
change request
A change request is a formal proposal for an alteration to some product or system.Continue Reading
99.999 (Five nines or Five 9s)
In computers, 99.999 (often called "five 9s") refers to a desired percentage of availability of a given computer system.Continue Reading
sustainability risk management (SRM)
Sustainability risk management (SRM) is a business strategy that aligns profit goals with a company's environmental policies.Continue Reading
Cloud computing service quiz for enterprise CIOs
Is your organization ready to ramp up its cloud computing service offerings? Read these recent stories and take our quiz to assess your cloud computing readiness.Continue Reading
FAQ: GARP and how it helps you achieve better information governance
Many organizations do not have an information governance structure that works with defined record-keeping principles that ensures accountability. GARP may be your answer.Continue Reading
IT controls
An IT control is a procedure or policy that provides a reasonable assurance that the information technology (IT) used by an organization operates as intended, that data is reliable and that the organization is in compliance with applicable laws and ...Continue Reading
IT in 2010: Keeping up with the latest IT management trends
Running IT in 2010 requires CIOs to consider ITSM methodologies, vendor contract renegotiations and investments in new technologies. Have you kept up with IT management trends?Continue Reading
organizational change management (OCM)
Organizational change management (OCM) is a framework for managing the effect of new business processes, changes in organizational structure or cultural changes within an enterprise. Simply put, OCM addresses the people side of change management.Continue Reading
spoliation
Spoliation is the destruction, alteration, or mutilation of evidence that may pertain to legal action. (Continued)Continue Reading
Electronic Communications Privacy Act (ECPA)
The Electronic Communications Privacy Act (ECPA) is a United States federal statute that prohibits a third party from intercepting or disclosing communications without authorization.Continue Reading
Fair Credit Reporting Act (FCRA)
The Fair Credit Reporting Act (FCRA) is United States federal legislation that promotes accuracy, fairness and privacy for data used by consumer reporting agencies.Continue Reading
CKO (chief knowledge officer)
Chief knowledge officer (CKO) is a corporate title for the person responsible overseeing knowledge management within an organization.Continue Reading
FFIEC compliance (Federal Financial Institutions Examination Council)
FFIEC compliance is conformance to a set of standards for online banking issued in October 2005 by the Federal Financial Institutions Examination Council (FFIEC)... (Continued)Continue Reading
transaction
In computer programming, a transaction usually means a sequence of information exchange and related work (such as database updating) that is treated as a unit for the purposes of satisfying a request and for ensuring database integrity.Continue Reading