Get started

Bring yourself up to speed with our introductory content.

Get started

Bring yourself up to speed with our introductory content.

  • IT budget (information technology budget)

    IT budget encompasses the money spent on information technology systems and services. The IT budget, typically overseen by the CIO, includes compensation for IT professionals and expenses for building and maintaining enterprise-wide systems. Continue Reading

  • innovation culture

    Innovation culture is an environment that organizations cultivate in order to nurture new, creative thinking and its application. Continue Reading

  • value innovation

    Value innovation is the implementation of upgrades or new technologies designed to help a company differentiate its products or services while lowering costs. Continue Reading

  • deputy CIO (deputy chief information officer)

    Deputy CIO is a role within some organizations that generally has responsibility for overseeing day-to-day IT operations. The role is more prevalent in the public sector than in the private sector and often can lead to a CIO position. Continue Reading

  • incremental innovation

    Incremental innovation is the introduction of small improvements or upgrades to already existing products, services, processes or methods. Continue Reading

  • Sample IT strategy plan templates and examples

    How do organizations gain a competitive edge in today's rapidly evolving tech landscape? With a solid IT strategy plan to guide them, for starters. These IT strategy plan templates and samples will help.Continue Reading

  • IT leadership (information technology leadership)

    IT leadership (information technology leadership) refers to the senior management in an organization responsible for driving business strategy via IT infrastructure and applications.Continue Reading

  • CIO guide to project management basics, DevOps and Agile

    In this Essential Guide, learn project management basics and get expert advice on how to get the most out of DevOps and i an Agile digital strategy.Continue Reading

  • PPM (project and portfolio management)

    PPM (project and portfolio management) is a methodology used to prioritize IT projects based on cost, benefits and use of resources to achieve business goals.Continue Reading

  • IT project management

    Every IT project should begin with two questions: What business problem are we trying to solve? And does everyone agree it's worth the effort to solve it?Continue Reading

  • Loss of focus chief reason for startup failure

    Too much passion, too little passion, too many cooks -- there are many factors that can lead to loss of focus and, ultimately, to startup failure.Continue Reading

  • Merchant Customer Exchange (MCX) CurrentC

    Merchant Customer Exchange (MCX) CurrentC is a mobile payments application backed by some of the nation's largest retailers including Target, Walmart, CVS, Best Buy and Rite Aid, as well as banks like Capital One.Continue Reading

  • consumer data

    Consumer data is the information trail customers leave behind as a result of their Internet use.Continue Reading

  • Agile business intelligence (BI)

    Agile business intelligence (BI) is a fast and flexible process that uses agile software development (ASD) methodologies to enable rapid development and allow users to efficiently adapt intelligence-based strategy to business needs.Continue Reading

  • Intelligent workload management (IWM)

    Intelligent workload management (IWM) is an approach to running IT systems in a way that rationally optimizes and maximizes use of computing resources and directing them toward better processing, workflow and delivery of services.Continue Reading

  • critical success factors

    Critical success factors are a limited number of key variables or conditions that have a tremendous impact on how successfully and effectively an organization meets its mission or the strategic goals or objectives of a program or project.Continue Reading

  • workflow

    Workflow is the series of activities that are necessary to complete a task.Continue Reading

  • field-level encryption

    Field-level encryption is the ability to encrypt data based on entire fields.Continue Reading

  • chief architect (chief IT architect)

    In information technology (IT), a chief architect is a c-level executive whose job is to look closely at how IT functions can be centralized so that departments across the company can work together seamlessly.Continue Reading

  • cultural fit

    Cultural fit is the likelihood that a job candidate will be able to conform and adapt to the core values and collective behaviors that make up an organization.Continue Reading

  • Wizard of Oz prototyping

    Wizard of Oz prototyping is a tactic used by developers to give the appearance that an application or program has been completely automated when, in fact, it hasn't.Continue Reading

  • benefit corporation

    Benefit corporation is a type of corporate structure recognized by some state governments in the United States. In addition to being profitable, a benefit corporation assumes the legal responsibility of considering its impact on society and the ...Continue Reading

  • dot-com bubble

    The dot-com bubble, also referred to as the Internet bubble, refers to the period between 1995 and 2000 when investors pumped money into Internet-based startups in the hopes that these fledgling companies would soon turn a profit.Continue Reading

  • information superhighway (infobahn)

    Information superhighway is a term that was used mainly in the 1990s to describe a national communications network that would span the United States and allow Americans to quickly access and exchange information via voice, data, video and other ...Continue Reading

  • chief marketing technologist (CMT)

    A chief marketing technologist (CMT) is a C-level executive who sets a technology vision for the marketing team that aligns with business goals.Continue Reading

  • business service management (BSM)

    Business service management (BSM) is an approach to overseeing information technology that emphasizes treating IT offerings as part of the larger enterprise strategy, and provisioning IT resources based on an understanding of the business' most ...Continue Reading

  • bring your own cloud (BYOC)

    BYOC is a movement whereby employees and departments use their cloud computing service of choice in the workplace. Allowing employees to use a public cloud storage service to share very large files may be more cost-effective than rolling out a ...Continue Reading

  • Free RFP template examples for ERP

    Use these free RFP template examples for ERP to make the best use of your business' technology resources.Continue Reading

  • IT continuity (information technology continuity)

    IT continuity (information technology continuity) is the holistic management of technology systems toward the guarantee that essential business operations will proceed in the event of a major disruption.Continue Reading

  • IT skills gap (information technology skills gap)

    In human resource management, an information technology (IT) skills gap is a mismatch between the capabilities an employer needs to meet business objectives and what the organization's employees know and can do.Continue Reading

  • startup culture

    Startup culture refers to how people within a new business, or startup, work together.Continue Reading

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help the oversee processes, guide initiatives and steer their employees toward the achievement of goals.Continue Reading

  • Porter's Five Forces

    Porter's Five Forces is a framework developed by economist Michael E. Porter to determine the profitability and therefore attractiveness of a market or market segment.Continue Reading

  • mobile experience

    Mobile experience, or mobile user experience (UX), is the practice of fostering a certain user perception before, during and after the interaction with a mobile product or offering.Continue Reading

  • IT elasticity

    IT elasticity is the ability to adapt an IT infrastructure to seamless changes without hindering or jeopardizing stability, performance, security, governance or compliance protocols.Continue Reading

  • resource allocation

    Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic goals.Continue Reading

  • Honey Encryption

    Honey Encryption is a security tool that makes it difficult for an attacker who is carrying out a brute force attack to know if he has correctly guessed a password or encryption key.Continue Reading

  • enterprise data hub

    An enterprise data hub, also referred to as a data lake, is a new big data management model for big data that utilizes Hadoop as the central data repository.Continue Reading

  • embedded IT

    Embedded IT is the process of inserting information technology staff and expertise into other business units in order to quickly and more effectively identify and pursue new business opportunities and increase the likelihood that IT projects are ...Continue Reading

  • two-speed IT

    Two-speed IT is the concept that strategic planning for an IT department should include a fast track that allows some projects to be implemented quickly.Continue Reading

  • data products

    A data product is digital information that can be purchased. Continue Reading

  • Information Age

    The Information Age refers to the idea that access to and the control of information is the defining characteristic of this current era in human civilization.Continue Reading

  • IT blueprint

    An IT blueprint, like an architectural blueprint, is a planning tool or document an information technology organization establishes in order to guide its priorities, projects, budgets, staffing and other IT strategy-related initiatives.Continue Reading

  • IT management

    IT management is the process of overseeing all matters related to information technology operations and resources within an IT organization.Continue Reading

  • rogue IT

    Rogue IT is the use of unsanctioned information technology resources within an organization. Continue Reading

  • IT centralization (information technology centralization)

    IT centralization (information technology centralization) is the act of concentrating an organization's technology resources under a single entity.Continue Reading

  • change management strategy

    A change management strategy is a systematic approach to making adjustments to the application of a set of tools, processes or skills during a project or initiative.Continue Reading

  • tweetchat

    A tweetchat, also called a tweet jam, is a discussion carried out on Twitter.Continue Reading

  • collaboration specialist

    A collaboration specialist is an individual in charge of managing customer experience and implementing a collaborative platform across the enterprise in order to enhance the user experience and employee productivity, and collectively accomplish ...Continue Reading

  • application transformation

    Application transformation is a process that aims to assess, modernize and manage applications in an enterprise organization.Continue Reading

  • UX (user experience)

    User experience (UX) encompasses all aspects of an end user's interaction with and attitude toward a given IT system or services, including the interface, graphics and design.Continue Reading

  • business resilience

    Business resilience is the ability an organization has to quickly adapt to disruptions while maintaining continuous business operations and safeguarding people, assets and overall brand equity.Continue Reading

  • smart process applications (smart process apps)

    A smart process application is software that is designed to support an organization's business process management (BPM) efforts in a collaborative manner.Continue Reading

  • IT organization (information technology organization)

    An IT organization (information technology organization) is the department within an organization charged with establishing, monitoring and maintaining information technology systems and services, and with strategic planning around current and ...Continue Reading

  • intrapreneur (intrapreneurship)

    Intrapreneurs are employees who use entrepreneurial skills and critical thinking to seek out initiatives that could benefit the organization financially.Continue Reading

  • green IT (green information technology)

    Green IT (green information technology) is the practice of environmentally sustainable computing.Continue Reading

  • corporate executive board

    A corporate executive board, or board of directors, oversees activities and strategic planning and decision making in an organization.Continue Reading

  • IT strategist (information technology strategist)

    An IT strategist (information technology strategist) is someone in an organization who is given the responsibility and authority to establish initiatives that affect the organization's IT and business strategy.Continue Reading

  • Strategic business intelligence for a mobile future

    Gathering, analyzing and providing easy access to data is central to strategic business intelligence programs. Learn more in this CIO Essential Guide.Continue Reading

  • social network

    A social network, in technology parlance, is a website or other application where people, often of similar interests, come together to communicate with each other and share information including photos, videos, audio and written messages.Continue Reading

  • steering committee

    A steering committee is a group of high-level advisors who have been appointed to provide an organization or project with direction.Continue Reading

  • cutting edge

    Cutting edge is an adjective used to describe the newest, most advanced version of a product or service. The phrase cutting edge has a positive connotation and can be contrasted with the phrase bleeding edge, which has a negative connotation. ...Continue Reading

  • project post-mortem

    Project post-mortem is a process intended to inform project improvements by determining aspects that were successful or unsuccessful.Continue Reading

  • repeatable process

    A repeatable process is a set of actions that allow for a more efficient use of limited resources and reduce unwanted variation during the development and implementation of various projects.Continue Reading

  • IT director (information technology director)

    An IT director (information technology director) is an employee in charge of technology within an organization. IT director is sometimes used interchangeably with CIO but, in the majority of large enterprise organizations, they are two separate ...Continue Reading

  • Cloud: A disruptive technology that's worth the disruption

    Cloud computing is a disruptive technology that promises to upend the enterprise, but the upsides are worth the risk.Continue Reading

  • power user

    A power user, also called a super user, is someone whose computer skills are better than those of an organization's average end user. Continue Reading

  • Fortune 500

    The Fortune 500 is Fortune Magazine's annual ranking of the United States' 500 largest corporations. The list is important because it provides the general public with a sense for which companies have the ability to influence the economy in the ...Continue Reading

  • social shopping

    Social shopping is a type of e-commerce that seeks to involve people with similar tastes in an online shopping experience.Continue Reading

  • cloud economics

    Cloud economics is the branch of knowledge concerned with the principles, costs and benefits of cloud computing.Continue Reading

  • IT productivity

    IT productivity is a reference to the relationship between an organization's technology investments and its corresponding efficiency gains, or return on investment.Continue Reading

  • IT cost structure

    IT cost structure is the relationship of different types of costs within a larger IT budget.Continue Reading

  • Nexus of Forces

    The nexus of forces is a concept developed by consultancy Gartner Inc. that describes how the convergence and mutual strengthening of social media, mobility, cloud computing and information patterns are creating new business opportunities.Continue Reading

  • holistic (holistic technology)

    Holistic (holistic technology) is a concept concerned with treatment of entire systems, rather than the analysis, treatment or segmentation of parts of those systems.Continue Reading

  • selective outsourcing

    Selective outsourcing is a targeted sourcing strategy that relies upon sending very specific functions and work off-premises while keeping other functions on-premises.Continue Reading

  • enterprise social software

    Enterprise social software is a general term that describes social networking and collaboration tools used in large organizations.Continue Reading

  • competitive differentiation

    Competitive differentiation is a strategic positioning tactic an organization can undertake to set its products, services and brands apart from those of its competitors.Continue Reading

  • IT service management and delivery: A quiz for CIOs

    Is your IT organization doing all it can to improve user experience? Review our CIO coverage and take our quiz on IT service management and delivery.Continue Reading

  • newsfeed

    A news feed (newsfeed) is list of newly published content on a website. End users can receive push updates for new content on a site by subscribing to the site's news feed. Continue Reading

  • Silicon Valley

    Silicon Valley is home to some of the world's largest technology corporations and thousands of technology-related startup companies.Continue Reading

  • business agility (BA)

    Business agility (BA) is an concept whereby organizations seek to approach their operations and resources in a flexible, responsive manner.Continue Reading

  • Apple iMessage (Apple instant message)

    Apple iMessage (Apple instant message) is an instant messenger service developed by Apple Inc. that allows users to send texts, documents, photos, videos, locations, contact information and group messages over Wi-Fi, 3G or LTE networks to other iOS ...Continue Reading

  • mobile IT (mobile information technology)

    Mobile IT (mobile information technology) is the ability of IT departments to deliver enterprise information technology solutions to employees working anywhere on any device.Continue Reading

  • hurdle rate

    A hurdle rate is the required rate of return above which an investment makes sense and below which it does not.Continue Reading

  • fractional CIO

    A fractional CIO is a high-level consultant who specializes in aligning information technology (IT) with business goals. Quite simply, a fractional CIO works for a fraction of the time, at a fraction of the cost it would take to hire a full-time ...Continue Reading

  • business process monitoring

    Business process monitoring is real-time scrutiny of an activity or set of activities that have been set up to accomplish a specific organizational goal.Continue Reading

  • business process visibility

    Business process visibility, also called process visibility, is the ability to accurately and completely view the processes, transactions and other activities operating within an enterprise. Continue Reading

  • human-centric BPM

    Human-centric business process management is an approach to BPM  that considers human skills and activities first and uses automated functions to support them. Most BPM suites include human-centric BPM features.Continue Reading

  • process-centric BPM

    Process-centric business process management is a holistic approach to BPM that centers on processes themselves, rather than individual  components such as  documents, workflow or people.  Continue Reading

  • enterprise IT (enterprise-class IT)

    Enterprise IT, also known as enterprise-class IT, is hardware and software designed to meet the demands of a large organization. In comparison to consumers and small companies, an enterprise has greater requirements for availability, reliability, ...Continue Reading

  • data privacy (information privacy)

    Data privacy, also called information privacy, is the aspect of information technology (IT) that deals with the ability an organization or individual has to determine what data in a computer system can be shared with third parties.Continue Reading

  • public data

    Public data is information that can be freely used, reused and redistributed by anyone with no existing local, national or international legal restrictions on access or usage.Continue Reading

  • ITIL v3

    ITIL v3 is the third version of the Information Technology Infrastructure Library, a globally recognized collection of best practices for managing information technology (IT).Continue Reading

  • application modernization

    Application modernization is the refactoring, re-purposing or consolidation of legacy software programming to align it more closely with current business needs. The goal of an application modernization project is to create new business value from ...Continue Reading

  • IT procurement

    IT procurement is the series of activities and procedures necessary to acquire information technology products or services.Continue Reading

  • infonomics

    Infonomics is a social science that involves studying the production and consumption of information and the transfer of money to produce, sell or obtain it. Simply put, infonomics is the economics of information.Continue Reading

  • pilot program (pilot study)

    A pilot program, also called a feasibility study or experimental trial, is a small-scale experiment that helps an organization learn how a large-scale project might work in practice.Continue Reading

  • Vine (Vine app)

    Vine is a free mobile application that enables users to record and share an unlimited number of short, looping video clips with a maximum length of six seconds.Continue Reading

  • sunk cost (SC)

    A sunk cost is money that has already been spent and cannot be recovered. Logic dictates that because sunk costs will not change -- no matter what actions are taken -- they should not play a role in decision-making. Emotionally, however, the more ...Continue Reading

  • user-generated content (UGC)

    User-generated content (UGC) is the words and photos that unpaid contributors create and provide to publications, particularly Web properties.Continue Reading

SearchCompliance
SearchHealthIT
SearchCloudComputing
SearchMobileComputing
SearchDataCenter
Close