New & Notable
Manage
4 examples of IT department goals
An important consideration for setting IT goals specifically is aligning them with the overall goals of the larger organization. Learn more about how to set IT department goals.
Get Started
An explanation of quantum in computing
Quantum particles have unique behaviors that enable engineers to perform more complex calculations, which could have a significant effect across industries and operations.
Get Started
ISO 31000 vs. COSO: Comparing risk management standards
ISO 31000 and the COSO ERM framework are the two most popular risk management standards. Here's what they include and some of their similarities and differences.
News
Federal research funding cuts could slow tech innovation
With massive funding cuts proposed at both federal research agencies and U.S. universities, U.S. R&D investment is poised to fall behind China and the EU.
Trending Topics
-
CIO Strategy Get Started
Digital literacy vs. digital fluency: Learn the differences
Business and IT leaders alike need their workers to develop digital capabilities. Here are some terms that can help convey that need.
-
Digital Transformation Manage
Emerging technologies in construction help manage work, risk
Emerging technologies in construction include AI and digital twins. Read how companies use advanced IT to improve risk analysis, forecasting, and more.
-
Risk Management & Governance News
Federal research funding cuts could slow tech innovation
With massive funding cuts proposed at both federal research agencies and U.S. universities, U.S. R&D investment is poised to fall behind China and the EU.
-
Apps, Infrastructure and Operations Manage
4 examples of IT department goals
An important consideration for setting IT goals specifically is aligning them with the overall goals of the larger organization. Learn more about how to set IT department goals.
-
Cloud deployment and architecture Manage
Demystify the cloud and edge computing relationship
Edge computing remains primarily on-prem, but evolving technologies like 5G might enable some workloads to migrate to shared hosting models, creating a hybrid computing ecosystem.
-
Data security and privacy Get Started
An explanation of data breaches
Data breaches can be intentional or accidental and come in various forms, but all types have the potential to cause considerable harm to individuals and organizations.
Sponsored Sites
-
Storage
Building Beyond Storage
Modern data storage is more than just getting a faster more powerful box.
-
Generative AI
Enhancing Generative AI for Independent Software Vendors (ISVs)
Transform your software and deliver enhanced experiences to your end users when you integrate with the Amazon Q Business index. Access secure, multi-app data through an API to deliver smarter, context-rich experiences to your end users. Join leading providers in revolutionizing applications with composable AI features.
-
Resource Center
Dell Technologies Thought Leadership Communities
Innovation that Stops at Nothing
Find Solutions For Your Project
-
Evaluate
Risk prediction models: How they work and their benefits
Accurate risk prediction models can aid risk management efforts in organizations. Here's a look at how risk models work and the business benefits they provide.
-
12 top enterprise risk management trends in 2025
-
Help desk vs. service desk: What's the difference?
-
The history of quantum computing: A complete timeline
-
-
Problem Solve
A guide to risk registers: Benefits and examples
Risk registers document, prioritize and track an organization's risks, providing a holistic view of the risks and a ready way to communicate risk strategies.
-
Learn how to harness strategic risk and improve your operations
-
What is risk monitoring? Definition and best practices
-
How to attract tech talent in 2025: 7 essentials
-
-
Manage
4 examples of IT department goals
An important consideration for setting IT goals specifically is aligning them with the overall goals of the larger organization. Learn more about how to set IT department goals.
-
12 best practices to keep in mind for SLA compliance
-
What is a compliance audit? (with an example checklist)
-
How to meet IoT compliance standards
-
CIO Basics
-
Get Started
Digital literacy vs. digital fluency: Learn the differences
Business and IT leaders alike need their workers to develop digital capabilities. Here are some terms that can help convey that need.
-
Get Started
An explanation of quantum in computing
Quantum particles have unique behaviors that enable engineers to perform more complex calculations, which could have a significant effect across industries and operations.
-
Get Started
ISO 31000 vs. COSO: Comparing risk management standards
ISO 31000 and the COSO ERM framework are the two most popular risk management standards. Here's what they include and some of their similarities and differences.
Multimedia
-
Get Started
An explanation of quantum in computing
-
-
-
News
View All -
Risk management and governance
Federal research funding cuts could slow tech innovation
With massive funding cuts proposed at both federal research agencies and U.S. universities, U.S. R&D investment is poised to fall behind China and the EU.
-
CIO strategy
U.S. pushes back on China, invests in rare earth resources
U.S. officials are increasingly concerned about China's dominance over critical minerals used in advanced technologies.
-
CIO strategy
Tariffs could hamper U.S. manufacturing growth
The Trump administration's fluctuating position on tariffs is creating pricing unpredictability for U.S. businesses and manufacturers.
Search CIO Definitions
- What is a procurement plan?
- What is a quantum circuit? Quantum vs. classical circuit
- What is prescriptive analytics?
- What is the Risk Management Framework (RMF)?
- What is an IT strategic plan (information technology strategic plan)?
- What is financial risk management?
- What is a risk management specialist, and what does one do?
- What is third-party risk management (TPRM)?