Actions

Special

Orphaned pages

The following pages are not linked from or transcluded into other pages in CIO Wiki.

Showing below up to 500 results in range #1 to #500.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

  1. AML/CTF Program
  2. ASEAN Integration
  3. Algorithmic Business
  4. All-in-One (AIO) PCs
  5. Alternative Card Network (ACN)
  6. Alternative Delivery Models
  7. Ambient Advertising
  8. Ambient and Glanceable Displays
  9. American-Style Option
  10. American Medical Informatics Association (AMIA)
  11. Answer Marketplace
  12. Anti-Pattern
  13. Anti-Spam
  14. Anti Hostile Takeover Mechanisms
  15. Applied Analytics
  16. Applied Behavior Analysis (ABA)
  17. Arbitrage Pricing Theory
  18. Archetype
  19. ArchiMate
  20. Asian Option
  21. Atomization
  22. Attention Model
  23. Attribute-Driven Design Method
  24. Attributes of Management Excellence
  25. Attribution
  26. Audio Messaging Interchange Specification (AMIS)
  27. Automated Storage Tiering (Auto-Tiering)
  28. Autoregressive Integrated Moving Average (ARIMA) Model
  29. Availability Plan
  30. Average Cost Pricing
  31. Bachman Diagram
  32. Back-End
  33. Back-End Plan
  34. Backbone Router
  35. Background Intelligent Transfer Service (BITS)
  36. Backward Integration
  37. Bait and Switch
  38. Balanced Technology Extended (BTX)
  39. Bandwagon Effect
  40. Bankmail Engagement
  41. Barcode
  42. Barker's Notation
  43. Base Station Controller (BSC)
  44. Bases of Social Power
  45. Behavior Learning Engine (BLE)
  46. Behavioral Finance
  47. Behavioral Pattern
  48. Behavioral Targeting
  49. Belbin Team Roles
  50. Benefit Dependency Network
  51. Beyond Budgeting
  52. Binary Runtime Environment for Wireless (BREW)
  53. Binary Synchronous Communications (BSC)
  54. Blake and Mouton's Managerial Grid
  55. Blind Spot Analysis
  56. Boil the Ocean
  57. Bond Insurance
  58. Book Value
  59. Bottom-up Approach
  60. Bottom of the Pyramid (BOP)
  61. Bounded Rationality
  62. Box-Jenkins Method
  63. Bridging Epistemologies
  64. Bubble Diagram
  65. Building Lifecycle Management (BLM)
  66. Buy-Side Analyst
  67. Buyback Insurance
  68. Buzzword Quotient (BWQ)
  69. CDL (WS Choreography Description Language)
  70. CIMOSA (Computer Integrated Manufacturing Open Systems Architecture)
  71. CIO Wiki:About
  72. CIO Wiki:General disclaimer
  73. CIO Wiki:Privacy policy
  74. COPE Model (Corporate-Owned, Personally-Enabled Model)
  75. COSMIC Software Sizing
  76. Cannibalization
  77. Canonical Data Model (CDM)
  78. Capacity Plan
  79. Capacity Utilization
  80. Card Sorting
  81. Career Limiting Move
  82. Career Management
  83. Cascade-Correlation Learning Architecture
  84. Case-Based Reasoning (CBR)
  85. Case Management
  86. Case Method
  87. Catalytic Mechanisms
  88. Centralization and Decentralization
  89. Ceteris Paribus
  90. Chairman of the Board
  91. Channel Partner Value
  92. Chen's Notation
  93. Chief Information Governance Officer (CIGO)
  94. Chinese Wall
  95. Choose Your Own Device (CYOD)
  96. Circular Economy
  97. Cisco EnergyWise
  98. Clarkson Principles
  99. Click Network
  100. Clicks and Mortar
  101. Client Server Model
  102. Clinical Decision Support (CDS)
  103. Cloud Service Architecture (CSA)
  104. Clusters
  105. Co-Creation
  106. Co-opetition
  107. Coalface
  108. Coalition
  109. Coercive Power
  110. Collaboration Diagram
  111. Collaboration Protocol Profile/Agreement (CPP/A)
  112. Collaborative Commerce (C-Commerce)
  113. Collaborative Computing
  114. Collaborative Master Data Management (CMDM)
  115. Collection Analytics
  116. Command-line Interface (CLI)
  117. Command and Control (C&C)
  118. Commodity Hardware
  119. CommonKADS
  120. Common Lisp Object System (CLOS)
  121. Common Vulnerabilities and Exposures (CVE)
  122. Competency Management System
  123. Competitive Research
  124. Competitor Profile Matrix (CPM)
  125. Completed-Contract Method
  126. Complex Event Processing (CEP)
  127. Compliance Officer
  128. Componentization
  129. Composable Infrastructure
  130. Composite Applications
  131. Composite Structure Diagram
  132. Computer-Aided Facilities Management (CAFM)
  133. Computer Aided Software Engineering (CASE)
  134. Computer Monitor
  135. Computer Vision
  136. Computer Worm
  137. Concentrated Marketing
  138. Concentration Strategy
  139. Concept Driven Strategy
  140. Concept Programming
  141. Concept Statement
  142. Concept of Operations (CONOP)
  143. Conceptual Design
  144. Conceptual Schema
  145. Conditional Logics
  146. Conditional Probability
  147. Configuration Management System (CMS)
  148. Congruent Strategy
  149. Connected Home
  150. Connection Power
  151. Construct Modeling
  152. Consumer Confidence
  153. Consumer Privacy
  154. Content Assembly Mechanism (CAM)
  155. Content Regulation
  156. Content Strategy
  157. Context-Aware Computing
  158. Context of Use (CoU) Analysis
  159. Contextual Collaboration
  160. Continuous Architecture
  161. Contribution Pricing
  162. Control Activities
  163. Control Environment
  164. Control Framework
  165. Controlled Vocabulary
  166. Convertible Preferred Stock
  167. Conway's Law
  168. Core Architecture Data Model (CADM)
  169. Core Group Theory
  170. Corporate Charter
  171. Corporate Image
  172. Corporate Parenting Style
  173. Corporate Reputation Quotient
  174. Corporate Transparency
  175. Correlation Architecture
  176. Cost, Insurance and Freight
  177. Cost-Plus Pricing
  178. Cost Allocation
  179. Cost Dynamics
  180. Cost Justification
  181. Cost Overrun
  182. Cost Recovery Method
  183. Cost of Revenue
  184. Covert Leadership
  185. Crawford's Slip Writing Method
  186. Creative Accounting
  187. Creative Destruction
  188. Cross-Branding
  189. Cross-Docking
  190. Cross-Functional Team
  191. Cross-Sell
  192. Cross-Selling
  193. Cross Process Integration
  194. Cross Tabulation
  195. Cross Training (Business)
  196. Crown Jewel Defense
  197. Culture Levels
  198. Culture Types
  199. Current Good Manufacturing Practice (cGMP)
  200. DICE Framework
  201. DIKW Pyramid
  202. Data Asset Framework (DAF)
  203. Data Buffer
  204. Data Deduplication
  205. Data Delivery Platform (DDP)
  206. Data Enrichment
  207. Data Federation
  208. Data Health Check
  209. Data Hierarchy
  210. Data Independence
  211. Data Integration Framework (DIF)
  212. Data Island
  213. Data Item
  214. Data Minimization
  215. Data Munging
  216. Data Preparation
  217. Data Presentation Architecture
  218. Data Propagation
  219. Data Prototyping
  220. Data Reconciliation
  221. Data Suppression
  222. Data Value Chain
  223. Data Vault Modeling
  224. Data Wrangling
  225. Data as a Service (DaaS)
  226. Database Design Methodology
  227. Database Marketing
  228. Debt Restructuring
  229. Deferred Shares
  230. Definitive Media Library (DML)
  231. Defragmentation
  232. Deliberate Strategy
  233. Delta Model
  234. Demand Planning
  235. Demand and Value Assessment Methodology (DAM and VAM)
  236. Deming Chain Reaction
  237. Deming Cycle (PDSA Cycle)
  238. Departmentalization
  239. Dependency Network
  240. Depletion
  241. Deployment Diagram
  242. Descriptive Model
  243. Deutsch limit
  244. Development Environment
  245. Dialectical Enquiry
  246. Diamond Model
  247. Dimension Reduction
  248. Dimensions of Relational Work
  249. Diminishing Marginal Productivity
  250. Diminishing Marginal Returns
  251. Diminishing Marginal Utility
  252. Diminishing Returns (DR)
  253. Direct Manipulation Interface
  254. Directed Acyclic Graph
  255. Directors and Officers Liability Insurance
  256. Disaggregation
  257. Discount
  258. Discretionary Access Control (DAC)
  259. Discussion Leadership
  260. Distributed Data Management Architecture (DDM)
  261. Distributed Management Task Force (DMTF)
  262. Distributed Relational Database Architecture (DRDA)
  263. Distributed System Object Model (DSOM)
  264. Document Modeling
  265. Downsizing
  266. Drakon Chart
  267. Dual Commitment
  268. Dual Inline Memory Module (DIMM)
  269. Dutch Auction
  270. Dynamic Data Exchange (DDE)
  271. Dynamic Dispatch
  272. Dynamic HTML
  273. Dynamic Link Library (DLL)
  274. Dynamic Pricing
  275. Dynamic Regression
  276. E3Value Methodology
  277. EFE Matrix (External Factor Evaluation Matrix)
  278. EProcurement
  279. ESourcing Capability Model (eSCM)
  280. ETOM
  281. Early Case Assessment (ECA)
  282. Early Data Assessment (EDA)
  283. Earnings Before Interest After Taxes (EBIAT)
  284. Economic Integration
  285. Economic Margin (EM)
  286. Economic Profit
  287. Effectiveness
  288. Efficiency Wage
  289. Efficient Consumer Response (ECR)
  290. Electronic Discovery (eDiscovery)
  291. Electronic Identity Verification (eIDV)
  292. Email Management (EMM)
  293. Emergent Strategy
  294. Empirical Process
  295. End-to-End Principle
  296. Enhanced Entity Relationship Model (EER Model)
  297. Enterprise Application
  298. Enterprise Feedback Management (EFM)
  299. Enterprise Function Diagram (EFD)
  300. Enterprise Goals
  301. Enterprise Information Portal (EIP)
  302. Enterprise Life Cycle
  303. Enterprise Ontology
  304. Enterprise Performance Life Cycle (EPLC)
  305. Enterprise Project Management (EPM)
  306. Enterprise Relationship Management (ERM)
  307. Enterprise Search
  308. Enterprise Workflow
  309. Entrepreneurial Government
  310. Environmental Factors
  311. Environmental Insurance
  312. Equivalence Partitioning
  313. Errors and Omissions Insurance
  314. Ethernet Card
  315. Event-Driven Process Chain (EPC)
  316. Everyday Low Pricing (EDLP)
  317. Evidence-Based Management
  318. Excess Return (ER)
  319. Execution - Evaluation Cycle
  320. Execution as Learning
  321. Executive Compensation
  322. Executive Information System (EIS)
  323. Expected Value of Perfect Information
  324. Expense Center
  325. Experiential Learning
  326. Exponential Smoothing
  327. Extended Backus–Naur Form (EBNF)
  328. Extended Enterprise
  329. Extreme Programming (XP)
  330. FCM (Factor-Criteria-Metrics) model
  331. FIPS (Federal Information Processing Standards)
  332. Face Value
  333. Facilitation Styles
  334. Facility Management
  335. Fact Based Modeling (FBM)
  336. Factory Gate Pricing
  337. Fair Value Accounting
  338. False Acceptance Ratio (FAR)
  339. False Consensus Bias
  340. Fatal Exception
  341. Fault Tree Analysis (FTA)
  342. Feature Detection
  343. Federal Internet Exchange (FIX)
  344. Federal Intrusion Detection Network (FIDNET)
  345. Feng's Classification
  346. Field Service Management (FSM)
  347. Financial Covenants
  348. FireWire
  349. Firmware
  350. First-In First-Out
  351. Fiscal Year
  352. Fixed Asset Management
  353. Flexible Organization
  354. Float (Project Management)
  355. Flow Control
  356. Flynn's Taxonomy
  357. Focus Group
  358. Folksonomy
  359. Foot in the Door
  360. Forced Compliance
  361. Forget, Borrow, Learn
  362. Formalization
  363. Forward Integration
  364. Fourteen Points of Management
  365. Free Cash Flow
  366. Free On Board
  367. Freeware
  368. French and Raven's Five Forms of Power
  369. Full Costing
  370. Function Hierarchy Diagram
  371. Function Points
  372. Functional Analysis
  373. Functional Economic Analysis (FEA)
  374. Functional Model
  375. Functional Size Measurement (FSM)
  376. Functional Software Architecture (FSA)
  377. Functional Team
  378. Future Pull
  379. Futures Contract
  380. GE Business Screen
  381. Garbage Can Model
  382. Gearing Ratio
  383. Generic Data Model
  384. GeoVMM
  385. Gigascale Integration (GSI)
  386. Gilder's Law
  387. Global Positioning System (GPS)
  388. Globalization Management System (GMS)
  389. Glocalization
  390. Graceful Degradation
  391. Green Computing
  392. Grey Knight
  393. Greyware
  394. Gross Revenue
  395. Growth-Share Matrix
  396. Growth Phase
  397. Guard Dog Theory
  398. Guerrilla Marketing
  399. Hagberg Model of Personal Power
  400. Handheld Device
  401. Handler's Classification
  402. Harvard Architecture
  403. Harvest Strategy
  404. Hawthorne Effect
  405. Heart Framework
  406. Hedge
  407. Hedging
  408. Heisenberg's Uncertainty Principle
  409. Helper Application
  410. Hertz (Hz, MHz, GHz)
  411. Heterogeneous Computing
  412. Heterogeneous Network
  413. Heterogeneous System Architecture
  414. Hierarchical-Input-Process-Output (HIPO) Mode
  415. Hierarchical Internetworking Model
  416. High Performance Workplace
  417. Hofstadter's Law
  418. Homogeneous Network
  419. Homoiconicity
  420. Horizontal Agreement
  421. Horizontal Merger
  422. Hospitality Management
  423. Hosted Virtual Desktops (HVD)
  424. Hub-and-Spoke Integration
  425. Human Performance Technology (HPT)
  426. Hypervisor
  427. Hypodermic Needle Theory
  428. IBM Academy of Technology (AoT)
  429. IFE Matrix (Internal Factor Evaluation Matrix)
  430. IPMA Competence Baseline (ICB)
  431. IS Strategy
  432. IT Chargeback Model
  433. IT Help Desk
  434. IT Productivity Paradox
  435. IT Value Model
  436. IUnknown Interface (COM)
  437. Identity Life Cycle Management (ILM)
  438. Illusion of Control Bias
  439. Impala Architecture
  440. Implementation Design
  441. Implementation Management
  442. Impression Management
  443. In-Transit Visiblity
  444. Incentives
  445. Incident
  446. Inclusive Value Measurement (IVM)
  447. Income Stock
  448. Independent Verification and Validation (IV&V)
  449. Index Fund
  450. Indicator
  451. Inductive Bias
  452. Inferior Goods
  453. Infomercial
  454. Informative Modeling
  455. Infrastructure Outsourcing
  456. Initiative for Policy Dialogue (IPD)
  457. Input-Output Model (I/O Model)
  458. Input-Process-Output (IPO) Model
  459. Inquiry Based Learning
  460. Insider Trading
  461. Institute of Electrical and Electronics Engineers (IEEE)
  462. Institutional Investors
  463. Instrumental Approach of Stakeholder Theory
  464. Insurance Application Architecture (IAA)
  465. Intangible Assets Monitor
  466. Integrated Application Lifecycle Management
  467. Integrated Business Planning (IBP)
  468. Integrated DEFinition Methods (IDEF)
  469. Integrated Marketing Communications
  470. Integration Appliance
  471. Integration Competency Center (ICC)
  472. Integration DEFinition for Information Modeling (IDEF1X)
  473. Integrative Thinking
  474. Intelligent ERP (i-ERP)
  475. Intelligent Process Automation (IPA)
  476. Intentional Change Theory (ICT)
  477. Interaction Overview Diagram
  478. Interaction Technique
  479. Intermediate Outcome
  480. Internal Systems
  481. International Electrotechnical Commission (IEC)
  482. International Telecommunication Union (ITU)
  483. Interpretive Strategy
  484. Interrelationship Diagraph
  485. Interrupt Request (IRQ)
  486. Invasion of Privacy
  487. Invested Capital
  488. Investment Center
  489. Iterative Design
  490. Iterative Development
  491. Ius in re
  492. JICNARS Scale
  493. Java Database Connectivity (JDBC)
  494. Java Message Service (JMS)
  495. Job Characteristics Theory
  496. Job Enlargement
  497. Job Enrichment
  498. Job Rotation
  499. Job Specialization
  500. Jour Fixe

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)