Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
8 free IT strategic planning templates and examples for CIOs
As technology becomes a business differentiator, a well-thought-out IT strategy plan is more crucial than ever. These IT strategy templates help CIOs make IT a business driver. Continue Reading
chief procurement officer (CPO)
The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and services made by the organization. Continue Reading
4 types of information technology cultures explained
How the CEO and other top leadership view the IT department has a major impact on how CIOs should make their business cases for new technology. Continue Reading
-
Lean Six Sigma
Lean Six Sigma is a data-driven approach to improving efficiency, customer satisfaction and profits. Continue Reading
business transformation
Business transformation is a term used to describe what happens when a company makes fundamental changes to how it operates. Continue Reading
-
Definitions to Get Started
- What is qualitative data?
- What is a learning management system (LMS)?
- What is a PMO (project management office)?
- What are leadership skills?
- What is a decision support system (DSS)?
- What is an entrepreneur (entrepreneurship)?
- What is an IT service catalog?
- What is strategic innovation?
Top 7 metaverse tech strategy do's and don'ts
Technology and business leaders must be strategic when entering the new world of metaverse projects. Here are critical tips that help provide guidance.Continue Reading
10 critical people skills today's CIOs and IT leaders need
Learn about 10 of the most important soft skills -- from communication to empathy -- and why they are critical to successful technology leadership.Continue Reading
IT asset management (ITAM)
IT asset management (ITAM) is a set of business practices that combines financial, inventory and contractual functions to optimize spending and support lifecycle management and strategic decision-making within the IT environment.Continue Reading
IT innovation
IT (information technology) innovation in an enterprise is about using technology in new ways, where the result is a more efficient organization and an improved alignment between technology initiatives and business goals.Continue Reading
digital enterprise
A digital enterprise is an organization that uses technology as a competitive advantage in its internal and external operations.Continue Reading
-
multisourcing (multi-sourcing)
Multisourcing (multi-sourcing) is an approach to outsourcing in which IT operations and technology infrastructure are contracted to a number of vendors, usually in combination with some internally provided elements of information technology.Continue Reading
CIO job description: Chief information officer responsibilities
Learn about the role of the chief information officer, including daily responsibilities, necessary skills and how the role is evolving in the digital age.Continue Reading
CIO (Chief Information Officer)
A chief information officer (CIO) is the corporate executive in charge of information technology (IT) strategy and implementation.Continue Reading
Sarbanes-Oxley Act (SOX) Section 404
Sarbanes-Oxley Act (SOX) Section 404 mandates that all publicly traded companies must establish internal controls and procedures for financial reporting and must document, test, and maintain those controls and procedures to ensure their ...Continue Reading
COPPA (Children's Online Privacy Protection Act )
The Children's Online Privacy Protection Act of 1998 (COPPA) is a federal law that imposes specific requirements on operators of websites and online services to protect the privacy of children under 13.Continue Reading
Chief Technology Officer (CTO)
The chief technology officer (CTO) is the individual within an organization who oversees the current technology and creates relevant policy.Continue Reading
The CIO's guide to understanding the metaverse
Metaverse definitions vary as do predictions on when it will arrive. But smart CIOs should familiarize themselves with the concept and ways it might affect their company.Continue Reading
Adobe Flash Player
Adobe Flash Player is software used to stream and view video, audio, multimedia and Rich Internet Applications on a computer or supported mobile device.Continue Reading
risk assessment framework (RAF)
A risk assessment framework (RAF) is a strategy for prioritizing and sharing information about the security risks to an information technology (IT) infrastructure.Continue Reading
Radical collaboration in enterprises: How does it work?
What would a world with 'no bureaucracies, no bosses and no bull' look like? Like success, says Matt Parker in his new book, 'A Radical Enterprise.'Continue Reading
Consumption-based, pay-for-what-you-use IT as a service
Composable infrastructure provides CIOs flexibility in combining compute, storage and networking into one framework. Learn the benefits of this relatively new technology and HCI.Continue Reading
Sustainability in business practices: What IT should know
Bjoern Stengel, global sustainability research lead at IDC discusses the trends he's seeing in the use of sustainable tools and technologies and what leaders need to focus on.Continue Reading
CIOs: Nominate your IT services partners for project award
Here's your opportunity to recognize an MSP, IT consultancy, systems integrator or other tech service provider that made a difference to your organization in 2021.Continue Reading
Learn 4 key types of enterprise automation technologies
Low-code, iPaaS, declarative automation and traditional scripting are all important methods of automating business processes. Learn how each can help.Continue Reading
prescriptive analytics
Prescriptive analytics is a type of data analytics that provides guidance on what should happen next.Continue Reading
5 keys to IT talent development in a hybrid work model
With the tech talent shortage in full force, IT talent development is critical for every organization. Learn the essentials of doing it right.Continue Reading
6 steps to create a CIO-CEO strategic partnership
The pandemic pushed CIOs to the head of the C-suite table. Here's how they can keep that respect and power and create true partnership with their CEO.Continue Reading
LOB (line of business)
An LOB (line-of-business) application is one of the set of critical computer applications that are vital to running an enterprise, such as accounting, supply chain management, and resource planning applications.Continue Reading
Superdome
Superdome is a high-end 64-bit, Hewlett Packard Enterprise (HPE) PA-8600 processor-based UNIX server designed for e-commerce customers using very large databases.Continue Reading
gap analysis
A gap analysis is a method of assessing the performance of a business unit to determine whether business requirements or objectives are being met and, if not, what steps should be taken to meet them.Continue Reading
Information and Content Exchange (ICE)
Information and Content Exchange (ICE) is an XML-based standard protocol for electronic business-to-business (B2B) asset management.Continue Reading
FQA (frequently questioned answers)
FQA (frequently questioned answers) are conventions or mandates scrutinized by individuals or groups who doubt their validity.Continue Reading
ephemeral messaging
Ephemeral messaging is the mobile-to-mobile transmission of multimedia messages that automatically disappear from the recipient's screen after the message has been viewed.Continue Reading
Implementing an enterprise risk management framework
A well-designed ERM framework provides a playbook to avert corporate disasters, generate competitive advantages and create business opportunities.Continue Reading
corportal (corporate portal)
Corportals, short for corporate portals, are sometimes referred to as enterprise information portals and are used by corporations to build their internal web presence by leveraging a company's information resources.Continue Reading
integration server
An integration server is a type of computer server that facilitates the interaction between different operating systems (OSes), services and applications across an enterprise IT environment.Continue Reading
ebXML (Electronic Business XML)
EbXML (Electronic Business XML or e-business XML) is a project to use the Extensible Markup Language (XML) to standardize the secure exchange of business data.Continue Reading
XACML (Extensible Access Control Markup Language)
XACML (Extensible Access Control Markup Language) is an attribute-based access control policy language (ABAC) or XML-based language, designed to express security policies and access requests to information.Continue Reading
coopetition (co-opetition)
Coopetition is a business strategy that uses insights gained from game theory to understand when it is better for competitors to work together.Continue Reading
Top 10 promising 5G use cases CIOs should know
The technological advantages 5G presents are well known. The hard part for business leaders is choosing where 5G implementation can be the difference maker for their organization.Continue Reading
3 enterprise uses for virtual reality
As enterprise adoption of virtual reality increases, CIOs are choosing the best ways to use the technology to gain a competitive edge. Here are three use cases to consider.Continue Reading
e-procurement (supplier exchange)
Electronic procurement, also known as e-procurement or supplier exchange, is the process of requisitioning, ordering and purchasing goods and services online.Continue Reading
cognitive automation
Cognitive automation describes diverse ways of combining artificial intelligence (AI) and process automation capabilities to improve business outcomes.Continue Reading
metered services (pay-per-use)
Metered services (also called pay-per-use) are any type of payment structure in which a customer has access to potentially unlimited resources but only pays for what they actually use.Continue Reading
nearshore outsourcing
Nearshore outsourcing is the practice of getting work done or services performed by people in neighboring countries rather than an organization's country.Continue Reading
Six Sigma
Six Sigma is a business methodology for quality improvement that measures how many defects there are in a current process and seeks to systematically eliminate them.Continue Reading
CVO (Chief Visionary Officer)
The Chief Visionary Officer (CVO) is a newer title where the holder is expected to have a broad and comprehensive knowledge of all matters related to the business of the organization, as well as the vision required to steer its course into the ...Continue Reading
balanced scorecard
The balance scorecard (BSC) is a management system aimed at translating an organization's strategic goals into a set of organizational performance objectives that, in turn, are measured, monitored, and changed if necessary to ensure that an ...Continue Reading
Gramm-Leach-Bliley Act (GLBA)
The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways financial institutions deal with the private information of individuals.Continue Reading
IT project manager
An IT project manager is a professional charged with overseeing the process of planning, executing and delegating responsibilities around an organization's information technology (IT) pursuits and goals.Continue Reading
What CIOs need to know about digital experience monitoring
As evaluating user and employee digital experience becomes more common, CIOs need to learn how the technologies work and what they stand to gain by implementing DEM.Continue Reading
5 tips on how to build agile teams in the new workplace
As business leaders begin looking into ways to become more agile in the workplace, we're diving into how they can effectively create agile teams for any given project.Continue Reading
4 agile team best practices to follow in the enterprise
Agile teams can help businesses respond to change more quickly, which is crucial in today's digital age. According to experts, these are the best practices to follow.Continue Reading
RPA vs. BPA vs. DPA: Compare process automation technologies
Enterprise leaders have a choice of business process automation technologies. We delve into three top options and zero in on key differences.Continue Reading
compliance risk
Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting from its failure to act in accordance with industry laws and regulations, internal policies or prescribed best practices.Continue Reading
How to measure the success of agile transformation
In his new book 'Sooner, Safer, Happier,' Jonathan Smart dives into the ways in which organizations can achieve better outcomes through business agility.Continue Reading
cyber threat hunter (cybersecurity threat analyst)
A cyber threat hunter, also called a cybersecurity threat analyst, proactively identifies security incidents that may go undetected by automated security tools such as malware detectors and firewalls.Continue Reading
transformational leadership
Transformational leadership is a management philosophy that encourages and inspires employees to innovate and develop new ways to grow and improve the path to a company's future success.Continue Reading
14 need-to-know tips for digital transformation success
What separates a successful digital transformation implementation from a recipe for disaster? These 14 tips will help ensure your DX efforts result in business improvement.Continue Reading
3 steps to recalibrate a strategic IT roadmap
Business leaders must reevaluate their IT roadmap to ensure it aligns with today's growing landscape. Deloitte's IBM Alliance Lead Terri Cobb shares three steps to help get started.Continue Reading
What CIOs need to know about RPA in IT operations
We have yet to see a big investment in RPA for IT operations, but that could change as experts identify it as an area that can yield significant benefits for CIOs and their departments.Continue Reading
4 reasons to involve CISOs in mergers and acquisitions planning
As mergers and acquisitions go virtual due to COVID-19, the C-suite should include CISOs to help identify security risks, expedite cyber processes, review the new threat landscape and more.Continue Reading
How to conduct an IoT audit for compliance
To effectively prepare for and conduct an IoT audit, organizations need to understand which IT controls are in scope. Get actionable guidance on the audit process in this tip.Continue Reading
Cloud and data considerations for new business models
Enterprises need to manage complex data structures in the cloud without sparing security and compliance. Here's what companies need to consider as they move to embrace cloud adoption.Continue Reading
How to develop a technology strategy
Implementing a technology strategy can be difficult for any CIO, but following this step-by-step guide enables them to build one that delivers on an organization's needs.Continue Reading
An introduction to intelligent document processing for CIOs
With IDP, enterprises can bring documents into automation workflows, which can help reduce document processing time and save on operational costs. Read more about its value here.Continue Reading
Why CIOs need to establish an automation CoE
With organizations continuing to automate business processes across several departments at a rapid pace, it's time they consider implementing a Center of Excellence. Here's why.Continue Reading
Is your company's IT governance strategy cloud ready?
As companies prepare to migrate to the cloud, they need to review their IT governance strategy before making any decisions to ensure there won't be any issues later.Continue Reading
Top 5 executive soft skills CIOs need to lead today
To help navigate through a crisis like the pandemic, IT executives are drawing on their leadership and interpersonal skills as much as -- if not more than -- their technical ones.Continue Reading
Everything CIOs need to know about IT business continuity plans
Carrying out a BC plan has become vital to organizations, especially as they deal with the effects of the pandemic. Here, we discuss what the plan entails and the role the CIO plays.Continue Reading
The 5 CMMC levels and how to achieve compliance
While the CMMC certification process is still in development, IT leaders should get familiar with the five CMMC levels and learn how to comply with the security maturity model.Continue Reading
What is the Dodd-Frank voice recording rule for the swaps market?
A Dodd-Frank rule requires swaps dealers to record voice communications, which regulators designed to deter illicit financial activity and improve financial compliance.Continue Reading
Emotion AI shows promise for IT leaders in the enterprise
Although still in its infancy, experts have no doubt that artificial emotional intelligence will be of great value. Here's why your organization should develop a strategy.Continue Reading
Successful digital ecosystems depend on cloud services
Business models are changing in the digital age, requiring companies to create sometimes unexpected partnerships, enabled by the widespread availability of cloud services.Continue Reading
How to negotiate a good software subscription agreement
A big mistake IT execs make in negotiating software subscription deals is overbuying. Here are seven steps from ClearEdge Partners' Rachel Annello that will lead to a better deal.Continue Reading
The evolution of RPA, from macros to process transformation
RPA evolved from technology debuted in the 1950s and '60s and was developed to today's standards by the industry's leading vendors. It's future? Think AI.Continue Reading
The rise of RPA bots and the role of C-level decision makers
According to new research, there will be 3 million RPA bots running in the enterprise in 2020. As RPA bots proliferate, C-level decision makers must take steps to ensure their RPA programs deliver tactical and strategic benefits. Check out this ...Continue Reading
AR headsets: 5 tips to get you started
Still in their adolescence, augmented reality headsets are poised for a growth spurt. Will you be ready? Here are some tips for a successful deployment.Continue Reading
Championing IT operational excellence: The strategic CIO's first day
CIOs may be tempted to roll out their strategic initiatives to C-suite peers on day one, but savvy CIOs know IT operational excellence is step No. 1.Continue Reading
Approach customer engagement by first asking good questions
Organizations need to align their customer strategy with their technology and know how to gather and use the right customer data when integrating all the components.Continue Reading
Fashion a first-rate customer experience management program
Learn how to choose and implement the strategy, policies and digital tools that deliver customer satisfaction while keeping essential data and systems secure.Continue Reading
4 steps to a blockchain implementation
If you're not experimenting with blockchain, you're behind the curve. Our step-by-step guide on implementing blockchain dissects the challenges, best practices and payoffs.Continue Reading
3 important steps to get started with AI
David Petersson lays out three steps that will change how you think about AI and help your business get started with AI.Continue Reading
AI in IT infrastructure transforms how work gets done
Cutting through the hype around AI has become a major job for IT leaders. Our in-depth guide on where and how to add AI to your IT infrastructure will help.Continue Reading
Build a digital transformation strategy with software at its core
What is a winning digital transformation strategy? For many companies, it starts with an overhaul of their software environments. Our comprehensive guide explains how it's done.Continue Reading
Andrew Ng's AI playbook for the enterprise: 6 must-dos
AI legend and online education pioneer Andrew Ng has developed an AI playbook for businesses. Here are six must-dos.Continue Reading
When does the state of quantum computing become relevant for CIOs?
What do CIOs need to know about the state of quantum computing? Forrester Research provides some guidance.Continue Reading
EU GDPR terms to know
Compliance regulations can be complicated to follow, particularly in the new age of data privacy. Here's a breakdown of the must-know terms for companies who are subject to GDPR.Continue Reading
The shift to edge computing is happening fast -- here's why
Whether you call it the Fourth Industrial Revolution or digital transformation, enterprise IT is being changed fast, and forever, and edge computing is a big reason why.Continue Reading
RPA software harnesses the potential of a digital workforce
RPA software cuts costs, boosts efficiency and frees employees from mind-numbing tasks. But governance challenges must be faced.Continue Reading
High-performance computing use cases and benefits in business
High-performance computing has moved from the rarified realm of research and government and into the enterprise. Learn how systems are evolving to handle data and deliver profit.Continue Reading
The urgent need for enterprise AI governance -- and where to start
By 2022, 65% of CIOs will be tasked with modernizing governance policies to reflect the risks and opportunities posed by AI technologies. Here's why it can't be a one-person job.Continue Reading
AI cybersecurity benefits are real, but not automatic
Smart tech promises security and other benefits, but they don't come automatically. Learn how these tools work and where they can work best in your organization.Continue Reading
AI security tech is making waves in incident response
Experts weigh in on the latest smart cybersecurity tools -- how they work, the implications for your IT security team and whether the investment is worth the expense.Continue Reading
Free IT mission statement examples for CIOs
These free IT mission statement examples and how-tos can help CIOs and their IT departments identify and refine their organizational goals.Continue Reading
Include dark web security strategies to strengthen security framework
As dark web security threats rise, enterprises should begin incorporating strategies to understand and implement dark web cyber-security measures.Continue Reading
What is embedded intelligence and how can CIOs prepare for it?
Deloitte advises CIOs keep their eyes on a new application of AI. The consultancy calls it pervasive intelligence.Continue Reading
How can companies build a strategy for monetizing data?
To extract value from data, most companies will face people, process and technology challenges. Matt Maccaux explains the ins and outs of monetizing data.Continue Reading
How automating feature engineering can help data scientists
Feature Labs CEO Max Kanter explains how automating feature engineering for machine learning can help data scientists and why CIOs should care.Continue Reading
With AI techniques, don't get stuck in the data quantity rut
Gartner's Erick Brethenoux gives practical advice on how CIOs can get started with AI. One of his tips: Think data quality, not data quantity.Continue Reading