Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
12 AI and machine learning use cases in ITSM
AI-enabled ITSM, while still maturing, promises to greatly improve the speed and quality of IT service management. Here are 12 AI and machine learning use cases in ITSM. Continue Reading
atom
An atom is a particle of matter that uniquely defines a chemical element. Continue Reading
What is user-generated content and why is it important?
User-generated content (UGC) is published information that an unpaid contributor provides to a website. Continue Reading
-
data privacy (information privacy)
Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, retention, immutability and security of sensitive data. Continue Reading
leadership skills
Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and steer their employees toward the achievement of goals. Continue Reading
data governance policy
A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are managed consistently and used properly.Continue Reading
10 blockchain quiz questions: Test your understanding
IT leaders are learning how to implement blockchain, a distributed ledger technology, within their organizations. Use this blockchain quiz to test the depth of your knowledge.Continue Reading
strategic management
Strategic management is the ongoing planning, monitoring, analysis and assessment of all necessities an organization needs to meet its goals and objectives.Continue Reading
resource allocation
Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic planning goals.Continue Reading
chief digital officer (CDO)
A chief digital officer (CDO) is charged with helping an enterprise use digital information and advanced technologies to create business value.Continue Reading
-
security audit
A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms to an established set of criteria.Continue Reading
10 metaverse dangers CIOs and IT leaders should address
The metaverse poses many of the same risks and security pitfalls that the internet does. Here's a look at 10 of those issues and how IT leaders should address them.Continue Reading
data latency
Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how long it takes for a business user to retrieve source data from a data warehouse or BI dashboard.Continue Reading
chief data officer (CDO)
A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data management responsibilities related to the business to derive maximum value from the data available to the enterprise.Continue Reading
information technology (IT) director
An information technology (IT) director is the person in charge of technology within an organization. IT directors manage technology resources and employees to ensure that IT operations run smoothly.Continue Reading
business integration
Business integration is a strategy whose goal is to synchronize IT and business cultures and objectives and align technology with business strategy and goals.Continue Reading
e-commerce
E-commerce (electronic commerce) is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the internet.Continue Reading
project charter
A project charter is a formal short document that states a project exists and provides project managers with written authority to begin work.Continue Reading
15 tips for delivering a successful presentation to the board
What do you do when everyone thinks they're the smartest person in the room, and all of them are counting on you for answers? Here's how to give a presentation to the board.Continue Reading
regulatory compliance
Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business processes.Continue Reading
CEO (Chief Executive Officer)
The chief executive officer (CEO) is the top position in an organization and responsible for implementing existing plans and policies, improving the company's financial strength, supporting ongoing digital business transformation and setting future ...Continue Reading
What is IT-business alignment and why is it important?
It's more important than ever that IT and the business operate from the same playbook. So why do so many organizations struggle to achieve IT-business alignment?Continue Reading
Key enterprise software-buying team roles, responsibilities
The enterprise software team has critical tasks to achieve for your organization's success. This guide explains each person's role and area of influence and offers tips for success.Continue Reading
CIO career path: How to become a CIO
The career path to becoming a CIO has evolved as the role has become increasingly critical to business success. Find out how to become a CIO and what the job entails.Continue Reading
e-business (electronic business)
E-business (electronic business) is the conduct of business processes on the internet.Continue Reading
business resilience
Business resilience is the ability an organization has to quickly adapt to disruptions while maintaining continuous business operations and safeguarding people, assets and overall brand equity.Continue Reading
8 free IT strategic planning templates and examples for CIOs
As technology becomes a business differentiator, a well-thought-out IT strategy plan is more crucial than ever. These IT strategy templates help CIOs make IT a business driver.Continue Reading
chief procurement officer (CPO)
The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and services made by the organization.Continue Reading
4 types of information technology cultures explained
How the CEO and other top leadership view the IT department has a major impact on how CIOs should make their business cases for new technology.Continue Reading
Lean Six Sigma
Lean Six Sigma is a data-driven approach to improving efficiency, customer satisfaction and profits.Continue Reading
change management
Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes or technologies.Continue Reading
business transformation
Business transformation is a term used to describe what happens when a company makes fundamental changes to how it operates.Continue Reading
9 top business process modeling techniques with examples
Business process modeling techniques and tools provide a visual representation critical to monitoring, improving and streamlining the flow of tasks along numerous processes.Continue Reading
business goals
A business goal is an endpoint, accomplishment or target an organization wants to achieve in the short term or long term.Continue Reading
business process outsourcing (BPO)
Business process outsourcing (BPO) is a business practice in which an organization contracts with an external service provider to perform an essential business function or task.Continue Reading
business process automation (BPA)
Business process automation (BPA) is the use of advanced technology to complete business processes with minimal human intervention.Continue Reading
Business Process Modeling Notation (BPMN)
Business Process Modeling Notation (BPMN), also called Business Process Model and Notation, is an open standard to diagram a business process.Continue Reading
business process management software
Business process management software (BPMS) helps companies design, model, execute, automate and improve a set of activities and tasks that, when completed, achieve an organizational goal.Continue Reading
How to set business goals, step by step
Setting business goals that are specific and come with deadlines keeps your company on track, employees motivated and everyone pulling in the same direction. Learn how to do it.Continue Reading
How to develop a business process in 8 steps
Well-designed business processes help organizations achieve their goals faster, but they require planning and effort. Follow these steps to develop processes that deliver value.Continue Reading
workflow
Workflow is the series of activities that are necessary to complete a task.Continue Reading
workflow management
Workflow management is the discipline of creating, documenting, monitoring and improving upon the series of steps, or workflow, that is required to complete a specific task.Continue Reading
How to improve and optimize business processes, step by step
Hundreds of processes that form the lifeblood of business operations require constant monitoring, so the most vulnerable can be revitalized through a methodical series of actions.Continue Reading
business process reengineering (BPR)
Business process reengineering (BPR) is a management practice in which the related tasks required to obtain a specific business outcome are radically redesigned.Continue Reading
RPA vs. BPM: How are they different?
Don't confuse RPA with BPM. These process-oriented initiatives are distinctly different yet highly complementary when planning, automating and improving key business operations.Continue Reading
business process mapping
Business process mapping is the visual display of the steps within a business process showing how it's done from start to finish.Continue Reading
business process
A business process is an activity or set of activities that accomplish a specific organizational goal. Business processes should have purposeful goals, be as specific as possible and produce consistent outcomes.Continue Reading
business process improvement (BPI)
Business process improvement (BPI) is a practice in which enterprise leaders analyze their business processes to identify areas where they can improve accuracy, effectiveness and efficiency and then make changes within the processes to realize these...Continue Reading
16 BPM best practices to ensure project success
A BPM approach to transformation enables companies to continuously improve and reinvent their business processes, injecting innovation as they go. Learn how to do it right.Continue Reading
Top 7 metaverse tech strategy do's and don'ts
Technology and business leaders must be strategic when entering the new world of metaverse projects. Here are critical tips that help provide guidance.Continue Reading
10 critical people skills today's CIOs and IT leaders need
Learn about 10 of the most important soft skills -- from communication to empathy -- and why they are critical to successful technology leadership.Continue Reading
IT asset management (ITAM)
IT asset management (ITAM) is a set of business practices that combines financial, inventory and contractual functions to optimize spending and support lifecycle management and strategic decision-making within the IT environment.Continue Reading
IT innovation
IT (information technology) innovation in an enterprise is about using technology in new ways, where the result is a more efficient organization and an improved alignment between technology initiatives and business goals.Continue Reading
10 examples of the metaverse for business and IT leaders
The potential for metaverse projects exist across a range use cases. Here are enterprise-focused and consumer-focused examples that business and IT leaders may want to explore.Continue Reading
digital enterprise
A digital enterprise is an organization that uses technology as a competitive advantage in its internal and external operations.Continue Reading
multisourcing (multi-sourcing)
Multisourcing (multi-sourcing) is an approach to outsourcing in which IT operations and technology infrastructure are contracted to a number of vendors, usually in combination with some internally provided elements of information technology.Continue Reading
strategic planning
Strategic planning is a process in which an organization's leaders define their vision for the future and identify their organization's goals and objectives.Continue Reading
CIO (Chief Information Officer)
A chief information officer (CIO) is the corporate executive in charge of information technology (IT) strategy and implementation.Continue Reading
CIO job description: Chief information officer responsibilities
Learn about the role of the chief information officer, including daily responsibilities, necessary skills and how the role is evolving in the digital age.Continue Reading
Sarbanes-Oxley Act (SOX) Section 404
Sarbanes-Oxley Act (SOX) Section 404 mandates that all publicly traded companies must establish internal controls and procedures for financial reporting and must document, test, and maintain those controls and procedures to ensure their ...Continue Reading
COPPA (Children's Online Privacy Protection Act )
The Children's Online Privacy Protection Act of 1998 (COPPA) is a federal law that imposes specific requirements on operators of websites and online services to protect the privacy of children under 13.Continue Reading
SWOT analysis (strengths, weaknesses, opportunities and threats analysis)
SWOT analysis is a framework for identifying and analyzing an organization's strengths, weaknesses, opportunities and threats.Continue Reading
Chief Technology Officer (CTO)
The chief technology officer (CTO) is the individual within an organization who oversees the current technology and creates relevant policy.Continue Reading
The CIO's guide to understanding the metaverse
Metaverse definitions vary as do predictions on when it will arrive. But smart CIOs should familiarize themselves with the concept and ways it might affect their company.Continue Reading
Adobe Flash Player
Adobe Flash Player is software used to stream and view video, audio, multimedia and Rich Internet Applications on a computer or supported mobile device.Continue Reading
risk assessment framework (RAF)
A risk assessment framework (RAF) is a strategy for prioritizing and sharing information about the security risks to an information technology (IT) infrastructure.Continue Reading
Radical collaboration in enterprises: How does it work?
What would a world with 'no bureaucracies, no bosses and no bull' look like? Like success, says Matt Parker in his new book, 'A Radical Enterprise.'Continue Reading
Consumption-based, pay-for-what-you-use IT as a service
Composable infrastructure provides CIOs flexibility in combining compute, storage and networking into one framework. Learn the benefits of this relatively new technology and HCI.Continue Reading
Sustainability in business practices: What IT should know
Bjoern Stengel, global sustainability research lead at IDC discusses the trends he's seeing in the use of sustainable tools and technologies and what leaders need to focus on.Continue Reading
data collection
Data collection is the process of gathering data for use in business decision-making, strategic planning, research and other purposes.Continue Reading
CIOs: Nominate your IT services partners for project award
Here's your opportunity to recognize an MSP, IT consultancy, systems integrator or other tech service provider that made a difference to your organization in 2021.Continue Reading
Learn 4 key types of enterprise automation technologies
Low-code, iPaaS, declarative automation and traditional scripting are all important methods of automating business processes. Learn how each can help.Continue Reading
10 must-read digital transformation books in 2022
If you're searching for a book on digital transformation that addresses your business needs, look no further. We've compiled a list of 10 of the most popular books out there.Continue Reading
prescriptive analytics
Prescriptive analytics is a type of data analytics that provides guidance on what should happen next.Continue Reading
5 keys to IT talent development in a hybrid work model
With the tech talent shortage in full force, IT talent development is critical for every organization. Learn the essentials of doing it right.Continue Reading
Top 3 information security strategy essentials CIOs need
Cybersecurity is more important than ever before as hackers get more aggressive and vulnerabilities grow. Learn how to approach it in the right way and why getting alignment is so key.Continue Reading
6 steps to create a CIO-CEO strategic partnership
The pandemic pushed CIOs to the head of the C-suite table. Here's how they can keep that respect and power and create true partnership with their CEO.Continue Reading
enterprise agility
Enterprise agility is a paradigm for scaling agile methodologies beyond development teams.Continue Reading
LOB (line of business)
An LOB (line-of-business) application is one of the set of critical computer applications that are vital to running an enterprise, such as accounting, supply chain management, and resource planning applications.Continue Reading
Superdome
Superdome is a high-end 64-bit, Hewlett Packard Enterprise (HPE) PA-8600 processor-based UNIX server designed for e-commerce customers using very large databases.Continue Reading
gap analysis
A gap analysis is a method of assessing the performance of a business unit to determine whether business requirements or objectives are being met and, if not, what steps should be taken to meet them.Continue Reading
Information and Content Exchange (ICE)
Information and Content Exchange (ICE) is an XML-based standard protocol for electronic business-to-business (B2B) asset management.Continue Reading
data monetization
Data monetization is the act of measuring the economic benefit of corporate data.Continue Reading
FQA (frequently questioned answers)
FQA (frequently questioned answers) are conventions or mandates scrutinized by individuals or groups who doubt their validity.Continue Reading
value-sensitive design (VSD)
Value-sensitive design (VSD) is a concept that advocates the consideration of human principles and standards when planning technology.Continue Reading
ephemeral messaging
Ephemeral messaging is the mobile-to-mobile transmission of multimedia messages that automatically disappear from the recipient's screen after the message has been viewed.Continue Reading
digital labor
Digital labor is work that is performed by robotic process automation (RPA) systems.Continue Reading
systems of engagement
Systems of engagement are decentralized IT components that incorporate technologies such as social media and the cloud to encourage and enable peer interaction.Continue Reading
labor arbitrage
Labor arbitrage is the practice of searching for and then using the lowest-cost workforce to produce products or goods.Continue Reading
software license
A software license is a document that provides legally binding guidelines for the use and distribution of software.Continue Reading
4 basic types of business risks in the enterprise
As part of enterprise risk management, companies can mitigate many types of business risks by focusing on the underlying factors of people, processes, technologies and facilities.Continue Reading
Top 12 risk management skills and why you need them
Risk management is necessary at all levels of a business. Here are some skills needed to be a successful risk manager.Continue Reading
ISO 31000 vs. COSO: Comparing risk management standards
ISO 31000 and the COSO ERM framework are the two most popular risk management standards. Here's what they include and some of their similarities and differences.Continue Reading
Implementing an enterprise risk management framework
A well-designed, all-inclusive ERM framework provides enterprises with a playbook to avert corporate disasters, generate competitive advantages and create business opportunities.Continue Reading
risk management specialist
A risk management specialist is a role appointed within organizations to identify potential risks that might negatively affect the business.Continue Reading
Risk appetite vs. risk tolerance: How are they different?
Risk appetite and risk tolerance are important risk terms that are related but not the same. Here's the difference, plus examples of risk appetite and risk tolerance statements.Continue Reading
Risk Management Framework (RMF)
The Risk Management Framework (RMF) is a template and guideline used by companies to identify, eliminate and minimize risks.Continue Reading
Risk management process: What are the 5 steps?
While many organizations understand they must manage risk, implementing a risk management process is not always straightforward. Follow these five steps to ensure success.Continue Reading
key risk indicator (KRI)
A key risk indicator (KRI) is a metric for measuring the likelihood that the combined probability of an event and its consequence will exceed the organization's risk appetite and have a profoundly negative impact on an organization's ability to be ...Continue Reading
enterprise risk management (ERM)
Enterprise risk management is the process of planning, organizing, directing and controlling the activities of an organization to minimize the deleterious effects of risk on its capital and earnings.Continue Reading