Browse these keywords to find relevant content on SearchCIO.com
Bimodal IT organization
Business automation, robotics and business process management
CIO and IT salaries
CIO career development and career paths
Cloud computing for business
Contract negotiations and legal issues
Digital business management
Enterprise application development, DevOps and software agility
Enterprise artificial intelligence (AI)
Enterprise business applications
Enterprise business intelligence software and big data
Enterprise collaboration strategy
Enterprise data privacy management
Enterprise data storage management
Enterprise disaster recovery and business continuity planning
Enterprise information security management
Enterprise mobile strategy
Enterprise network and wireless management
Enterprise systems management
IT in vertical markets
IT project management and portfolio management
IT spending and budgeting
IT staff development and retention
IT vendor selection and management
Information technology outsourcing
Internet of things (IoT) for business
Leadership and strategic planning
Return on Investment (ROI)
Risk and compliance strategies and best practices
Small-business IT strategy
Small-business infrastructure and operations
Human error remains a threat to data, but privacy advocate Grace Buckler says setting the tone with company culture can offset enterprise information security and privacy risks.
Data anonymization techniques are designed to preserve privacy of shared data, but do they work with high-dimensional data? Here's what experts have to say.
Calls are growing louder for information security regulations to target consumer-centric technology such as the IoT and drones, but legislating their use could prove difficult.
The CEO of Medisafe, a medication management mobile application, discusses the challenges with mobile in healthcare and what makes a successful mobile health app.
Cybersecurity and blockchain received a lot of attention in 2016, and both trends are expected to remain on the radars of healthcare executives in 2017.
Best practices for value-based care include making data a strategic asset, empowering curiosity about data among clinicians and other staff, and looking for small victories.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
The fast pace of cloud adoption in 2016 sets the stage for an even more aggressive migration in 2017. Will it help IT shops become disruptors instead of being disrupted?
For Azure Premium Storage, are users billed by how much storage capacity they actually use or how much they reserve or allocate?
Storage is a primary reason enterprises move workloads to the cloud. But before shipping off your data, learn how region, capacity and other factors shape cloud storage costs.
End users want mobile apps to help with basic job functions, but the cost and time it takes IT and developers to deliver those apps leads them to do-it-yourself RMAD tools.
Mobility's the future of the enterprise, but going from old to new ways for IT becomes more complex every day. Organizations must embrace going mobile so business can move forward.
Citrix XenMobile mobile device management policies, features and mobile apps will soon be available to Microsoft shops as an Intune add-on.
Don't get hung up on data center dimensions in the design phase. Focus on length-to-width ratios to get the most out of data center space, power and cooling.
Understand the three different file system journaling modes for Linux, as well as which mount option provides the best levels of data protection and performance.
Evolving business needs demand a new approach to data center networking. Keep yourself updated on SDN, VXLAN and other technologies with this quiz.