Short pages
Showing below up to 250 results in range #1 to #250.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)
- (hist) CIO Wiki:Privacy policy [715 bytes]
- (hist) Run time (Program Lifecycle Phase) [733 bytes]
- (hist) Vocabulary of Interlinked Datasets (VoID) [745 bytes]
- (hist) Intelligent Process Automation (IPA) [748 bytes]
- (hist) Behavioral Pattern [757 bytes]
- (hist) Cost Justification [760 bytes]
- (hist) Vital Business Function (VBF) [767 bytes]
- (hist) Consumer Confidence [770 bytes]
- (hist) Control Activities [779 bytes]
- (hist) Facilitative Leadership [785 bytes]
- (hist) Economic Capital (ECAP) [792 bytes]
- (hist) Stewardship Theory [796 bytes]
- (hist) Business Process Query Language (BPQL) [799 bytes]
- (hist) Democratic Leadership [802 bytes]
- (hist) Business Process Analysis [802 bytes]
- (hist) Operational Analytics [804 bytes]
- (hist) Value Risk Matrix (VRM) [813 bytes]
- (hist) Innovation Economics [814 bytes]
- (hist) Application Infrastructure Suite (AIS) [815 bytes]
- (hist) General Systems Theory (GST) [816 bytes]
- (hist) Analytic Hierarchy Process Framework (AHP) [832 bytes]
- (hist) Managed Service Provider (MSP) [832 bytes]
- (hist) The N7 and 7MP Tools [836 bytes]
- (hist) RCSA (Risk Control Self Assessment) [838 bytes]
- (hist) Service Request [840 bytes]
- (hist) Transactional Leadership [850 bytes]
- (hist) Universal Strategy Formulation Model (USFM) [854 bytes]
- (hist) Empirical Method [870 bytes]
- (hist) Commercial off-the-shelf (COTS) [874 bytes]
- (hist) Lewin/Schein's Change Theory [874 bytes]
- (hist) Attribution Theory [879 bytes]
- (hist) Quality Management Maturity Grid (QMMG) [879 bytes]
- (hist) Object Modeling Technique (OMT) [880 bytes]
- (hist) Top-Level Domain (TLD) [885 bytes]
- (hist) Applied Analytics [886 bytes]
- (hist) Procedure Manual [889 bytes]
- (hist) DIKW Pyramid [890 bytes]
- (hist) Compensation [893 bytes]
- (hist) Enterprise Release Management (ERM) [893 bytes]
- (hist) Causal Ambiguity [895 bytes]
- (hist) Commodity Computing [898 bytes]
- (hist) Variable Costs [899 bytes]
- (hist) Application Lifecycle Framework [900 bytes]
- (hist) Kano Model [902 bytes]
- (hist) Flexible Organization [903 bytes]
- (hist) Procedure [905 bytes]
- (hist) ArchiMate [912 bytes]
- (hist) Art of War [915 bytes]
- (hist) Rapid Economic Justification (REJ™) [915 bytes]
- (hist) .MDB File Format [916 bytes]
- (hist) Standard Cost Pricing [916 bytes]
- (hist) Plesiochronous Digital Hierarchy (PDH) [916 bytes]
- (hist) Operational Support Services (OSS) [918 bytes]
- (hist) .NET Enterprise Server [919 bytes]
- (hist) Autocratic Leadership [923 bytes]
- (hist) Website Wireframe [932 bytes]
- (hist) Service-Based Costing [933 bytes]
- (hist) Tangible Book Value [937 bytes]
- (hist) Requirement [938 bytes]
- (hist) Cascading Style Sheet (CSS) [945 bytes]
- (hist) Reservoir Approach [945 bytes]
- (hist) 3D Modeling [946 bytes]
- (hist) Boil the Ocean [949 bytes]
- (hist) SCOR (Supply Chain Operations Reference Model) [954 bytes]
- (hist) IP Network [955 bytes]
- (hist) Yottabyte [956 bytes]
- (hist) Usability [961 bytes]
- (hist) Audio Messaging Interchange Specification (AMIS) [962 bytes]
- (hist) Intrusion Prevention System (IPS) [963 bytes]
- (hist) Asset Liability Management (ALM) [964 bytes]
- (hist) Blind Spot Analysis [966 bytes]
- (hist) Strategic Priorities [966 bytes]
- (hist) Organogram [967 bytes]
- (hist) Zeta Architecture [970 bytes]
- (hist) Barriers to Entry [971 bytes]
- (hist) Adaptive Control [974 bytes]
- (hist) Business Process Discovery [975 bytes]
- (hist) Five Whys [986 bytes]
- (hist) Product Personalization [990 bytes]
- (hist) Minimum Viable Product (MVP) [995 bytes]
- (hist) Workflow Reference Model [1,000 bytes]
- (hist) People, Process, Technology Framework [1,002 bytes]
- (hist) Internal Systems [1,002 bytes]
- (hist) Audit Trail [1,005 bytes]
- (hist) Financial Services Function Model (FSFM) [1,008 bytes]
- (hist) Bottom of the Pyramid (BOP) [1,009 bytes]
- (hist) Deliverable [1,009 bytes]
- (hist) Baseline [1,010 bytes]
- (hist) Binary Code [1,017 bytes]
- (hist) Application Service Provider (ASP) [1,019 bytes]
- (hist) Transition Methodology [1,019 bytes]
- (hist) Binary Digit (Bit) [1,021 bytes]
- (hist) Single Customer View [1,026 bytes]
- (hist) Box-Jenkins Method [1,027 bytes]
- (hist) Solutions Provider [1,027 bytes]
- (hist) Gartner Score [1,029 bytes]
- (hist) Yield to Maturity [1,030 bytes]
- (hist) Working Capital [1,034 bytes]
- (hist) Bitcoin [1,041 bytes]
- (hist) Guard Dog Theory [1,041 bytes]
- (hist) Backbone [1,043 bytes]
- (hist) Nanotechnology [1,043 bytes]
- (hist) Application Sharing [1,049 bytes]
- (hist) ICT4D (Information and Communication Technologies for Development) [1,049 bytes]
- (hist) Unique Selling Proposition [1,051 bytes]
- (hist) Pricing [1,052 bytes]
- (hist) Restructuring [1,054 bytes]
- (hist) Business Process Maturity Model (BPMM) [1,054 bytes]
- (hist) Cyber Attack [1,056 bytes]
- (hist) Dashboard [1,057 bytes]
- (hist) Level 5 Leadership [1,059 bytes]
- (hist) Context of Use (CoU) Analysis [1,061 bytes]
- (hist) Average Rate of Return [1,065 bytes]
- (hist) White Knight [1,065 bytes]
- (hist) Basel Committee on Banking Supervision [1,066 bytes]
- (hist) Consulting Services [1,066 bytes]
- (hist) Guideline [1,067 bytes]
- (hist) Available to Promise (ATP) [1,068 bytes]
- (hist) Project [1,068 bytes]
- (hist) Heart Framework [1,069 bytes]
- (hist) Mergers and Acquisitions (M&A) [1,071 bytes]
- (hist) Organizational Flexibility [1,073 bytes]
- (hist) The Open Information Systems Management Maturity Model (O-ISM3) [1,075 bytes]
- (hist) SHARP (Structured, Holistic Approach for a Research Proposal) [1,077 bytes]
- (hist) Broad Network Access [1,079 bytes]
- (hist) Information Governance Reference Model (IGRM) [1,080 bytes]
- (hist) Perceived Value Pricing [1,080 bytes]
- (hist) Attrition [1,081 bytes]
- (hist) Smart Information Systems (SIS) [1,081 bytes]
- (hist) Book Value [1,085 bytes]
- (hist) Data Enrichment [1,088 bytes]
- (hist) Supplier Value [1,088 bytes]
- (hist) Design of Experiments [1,090 bytes]
- (hist) Interaction Technique [1,095 bytes]
- (hist) Financial Services Workflow Model (FSWM) [1,095 bytes]
- (hist) Asset Liability Modeling [1,098 bytes]
- (hist) Assets Held For Sale [1,100 bytes]
- (hist) Globalization Management System (GMS) [1,101 bytes]
- (hist) Preferred Stock [1,102 bytes]
- (hist) Background Intelligent Transfer Service (BITS) [1,104 bytes]
- (hist) Standard Generalized Markup Language (SGML) [1,104 bytes]
- (hist) Mobile Network [1,104 bytes]
- (hist) Semantic Data Modeling [1,106 bytes]
- (hist) Porter's 3 Generic Strategies [1,107 bytes]
- (hist) Service Integration and Management (SIAM) [1,108 bytes]
- (hist) Year 2000 (Y2K) [1,109 bytes]
- (hist) Design Tool [1,110 bytes]
- (hist) Cloud Manufacturing [1,113 bytes]
- (hist) Shareholder [1,113 bytes]
- (hist) Fiber to the Home (FTTH) [1,114 bytes]
- (hist) Viable System Model (VSM) [1,115 bytes]
- (hist) Backward Integration [1,116 bytes]
- (hist) Wireless LAN [1,116 bytes]
- (hist) Branded Content Management [1,117 bytes]
- (hist) Z-Score [1,121 bytes]
- (hist) Programmable Logic Controller (PLC) [1,122 bytes]
- (hist) SOA Governance [1,123 bytes]
- (hist) Current Good Manufacturing Practice (cGMP) [1,124 bytes]
- (hist) Security Policy [1,125 bytes]
- (hist) Autoregressive Integrated Moving Average (ARIMA) Model [1,128 bytes]
- (hist) Financing [1,131 bytes]
- (hist) Browser Hijacking [1,132 bytes]
- (hist) Target Market [1,132 bytes]
- (hist) Average Cost Pricing [1,134 bytes]
- (hist) Back-End Plan [1,137 bytes]
- (hist) Performance Metrics [1,137 bytes]
- (hist) Swim Lane Diagram [1,140 bytes]
- (hist) IP Address [1,142 bytes]
- (hist) Backup Server [1,144 bytes]
- (hist) Microblogging [1,144 bytes]
- (hist) Network News Transfer Protocol (NNTP) [1,145 bytes]
- (hist) Internet Privacy [1,146 bytes]
- (hist) Mobile Platform as a Service (mPaaS) [1,147 bytes]
- (hist) Crown Jewel Defense [1,149 bytes]
- (hist) Swivel Chair Interface [1,150 bytes]
- (hist) Relational Capital [1,151 bytes]
- (hist) Virtual Machine Manager (VMM) [1,153 bytes]
- (hist) Smart Device [1,153 bytes]
- (hist) Shared Services [1,153 bytes]
- (hist) Identity Theft [1,156 bytes]
- (hist) Binomial Option Pricing Model [1,157 bytes]
- (hist) Bait and Switch [1,159 bytes]
- (hist) Hadoop [1,159 bytes]
- (hist) Data Integrity [1,160 bytes]
- (hist) Template [1,162 bytes]
- (hist) Back-End [1,165 bytes]
- (hist) Extended Enterprise [1,166 bytes]
- (hist) Hypertext Transfer Protocol (HTTP) [1,167 bytes]
- (hist) Web Portal [1,167 bytes]
- (hist) Graduated Security [1,167 bytes]
- (hist) Hiring [1,167 bytes]
- (hist) Industry Models [1,167 bytes]
- (hist) Business Objects [1,172 bytes]
- (hist) Balanced Technology Extended (BTX) [1,173 bytes]
- (hist) Knowledge Base [1,173 bytes]
- (hist) Critical Success Factor (CSF) [1,174 bytes]
- (hist) Boundary Value Analysis [1,177 bytes]
- (hist) Business Process as a Service (BPaaS) [1,177 bytes]
- (hist) Cost Analysis [1,178 bytes]
- (hist) CXML (Commerce eXtensible Markup Language) [1,179 bytes]
- (hist) Synchromarketing [1,179 bytes]
- (hist) Diminishing Marginal Utility [1,180 bytes]
- (hist) Synchronous Digital Hierarchy (SDH) [1,182 bytes]
- (hist) Value Methodology [1,183 bytes]
- (hist) Exit Strategy [1,185 bytes]
- (hist) Sub Contractor [1,186 bytes]
- (hist) Human Development Theory [1,187 bytes]
- (hist) Quality Function Deployment (QFD) [1,187 bytes]
- (hist) Attribute-Driven Design Method [1,189 bytes]
- (hist) Zero-sum Game [1,189 bytes]
- (hist) Organizational Alignment [1,191 bytes]
- (hist) Committee of Sponsoring Organizations of the Treadway Commission (COSO) [1,192 bytes]
- (hist) Retention Ratio [1,193 bytes]
- (hist) Operational Capability [1,193 bytes]
- (hist) Building Management Systems (BMS) [1,194 bytes]
- (hist) Better Business Case (BBC) [1,195 bytes]
- (hist) Digital Asset Management (DAM) [1,195 bytes]
- (hist) Collaborative Content Management [1,195 bytes]
- (hist) Use Case [1,195 bytes]
- (hist) Business Continuity Management (BCM) [1,199 bytes]
- (hist) Big Data Maturity Model (BDMM) [1,200 bytes]
- (hist) Portability [1,201 bytes]
- (hist) Multi Channel Marketing [1,201 bytes]
- (hist) Strategic Human Resource Management (SHRM) [1,201 bytes]
- (hist) Enterprise Model [1,203 bytes]
- (hist) Application Service Management (ASM) [1,204 bytes]
- (hist) Terms of Service [1,205 bytes]
- (hist) Feng's Classification [1,205 bytes]
- (hist) Infrastructure Outsourcing [1,205 bytes]
- (hist) Pareto Principle [1,206 bytes]
- (hist) Visual Analytics [1,209 bytes]
- (hist) Click-Through Rate (CTR) [1,211 bytes]
- (hist) Plug-in [1,213 bytes]
- (hist) Semantic Web [1,213 bytes]
- (hist) Availability Plan [1,215 bytes]
- (hist) Business Process Change Cycle [1,217 bytes]
- (hist) Schedule Performance Index (SPI) [1,217 bytes]
- (hist) User Interface Design (UI) [1,218 bytes]
- (hist) Subliminal Advertizing [1,221 bytes]
- (hist) Dark Web [1,221 bytes]
- (hist) Market Share [1,225 bytes]
- (hist) Reliability Block Diagram (RBD) [1,226 bytes]
- (hist) Fourier Analysis [1,230 bytes]
- (hist) Unstructured Information Management Architecture (UIMA) [1,231 bytes]
- (hist) Bandwagon Effect [1,232 bytes]
- (hist) Dynamic HTML [1,232 bytes]
- (hist) Weighted Micro Function Points (WMFP) [1,233 bytes]
- (hist) Systemic Risk [1,233 bytes]
- (hist) Atomization [1,235 bytes]
- (hist) Privacy Policy [1,235 bytes]