Short pages
Showing below up to 250 results in range #251 to #500.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)
- (hist) Social Intelligence [1,285 bytes]
- (hist) Bankmail Engagement [1,286 bytes]
- (hist) User Interface [1,287 bytes]
- (hist) Supervisory Control and Data Acquisition (SCADA) [1,288 bytes]
- (hist) Internet Protocol (IP) [1,288 bytes]
- (hist) Organic Growth [1,289 bytes]
- (hist) Code of Ethics [1,291 bytes]
- (hist) Behavior Driven Development (BDD) [1,292 bytes]
- (hist) World Class Manufacturing [1,294 bytes]
- (hist) Strategic Initiatives [1,294 bytes]
- (hist) Structure Chart [1,294 bytes]
- (hist) Office of Strategy Management [1,297 bytes]
- (hist) Synectics [1,297 bytes]
- (hist) Application Life Cycle Management Platform as a Service (ALM PaaS) [1,298 bytes]
- (hist) Value at Risk [1,299 bytes]
- (hist) Cannibalization [1,301 bytes]
- (hist) Strategic Architecture [1,301 bytes]
- (hist) CMN-GOMS [1,301 bytes]
- (hist) Business Rule [1,301 bytes]
- (hist) Outcome [1,304 bytes]
- (hist) Employee Turnover [1,305 bytes]
- (hist) Balance Theory [1,307 bytes]
- (hist) Bond Insurance [1,307 bytes]
- (hist) Bottom-up Approach [1,307 bytes]
- (hist) Pareto Chart [1,307 bytes]
- (hist) Reference Semantic Model (RSM) [1,307 bytes]
- (hist) Fault Tree Analysis (FTA) [1,308 bytes]
- (hist) Probability Theory [1,309 bytes]
- (hist) Straight Through Processing (STP) [1,310 bytes]
- (hist) Preboot Execution Environment (PXE) [1,311 bytes]
- (hist) Distributor [1,314 bytes]
- (hist) Social Multi Criteria Analysis (SMCA) [1,314 bytes]
- (hist) Structured Data Analysis [1,315 bytes]
- (hist) IT Productivity Paradox [1,316 bytes]
- (hist) Information Quality Management (IQM) [1,317 bytes]
- (hist) Viability Study [1,319 bytes]
- (hist) Internet Service Provider (ISP) [1,319 bytes]
- (hist) Budgeted Cost of Work Scheduled (BCWS) [1,319 bytes]
- (hist) Data Dictionary [1,320 bytes]
- (hist) Coaching [1,321 bytes]
- (hist) Direct Mail [1,321 bytes]
- (hist) Retired Services [1,323 bytes]
- (hist) Telemarketing [1,325 bytes]
- (hist) Management Buy-Out [1,326 bytes]
- (hist) Industry Life Cycle [1,327 bytes]
- (hist) Collective Intelligence [1,328 bytes]
- (hist) Channel Management [1,330 bytes]
- (hist) Service Mark [1,330 bytes]
- (hist) Break-even Point [1,331 bytes]
- (hist) Profit Motive [1,331 bytes]
- (hist) Information Mapping [1,333 bytes]
- (hist) Software Visualization [1,333 bytes]
- (hist) Design Principles [1,335 bytes]
- (hist) Risk Maturity [1,337 bytes]
- (hist) Quantitative Investment Analysis [1,337 bytes]
- (hist) Strategic Infliction Point [1,337 bytes]
- (hist) Security Management [1,337 bytes]
- (hist) Cost of Equity [1,338 bytes]
- (hist) Financial Services Data Model (FSDM) [1,338 bytes]
- (hist) Desktop Operating System [1,339 bytes]
- (hist) Executive Information System (EIS) [1,340 bytes]
- (hist) Probability Distribution [1,343 bytes]
- (hist) Systems Architecture [1,343 bytes]
- (hist) Bayes' Theorem [1,344 bytes]
- (hist) Software Sizing [1,345 bytes]
- (hist) Recurrent Neural Network (RNN) [1,346 bytes]
- (hist) Underpinning Contract (UC) [1,347 bytes]
- (hist) Simulation Modeling [1,348 bytes]
- (hist) Computerized Maintenance Management System (CMMS) [1,349 bytes]
- (hist) Enterprise Architecture Life Cycle (EALC) [1,349 bytes]
- (hist) Asset Performance Management (APM) [1,350 bytes]
- (hist) Health Insurance Portability and Accountability Act (HIPAA) [1,351 bytes]
- (hist) Project Dependencies [1,352 bytes]
- (hist) Capitalism [1,353 bytes]
- (hist) Purchase Order [1,353 bytes]
- (hist) Resource Description Framework (RDF) [1,354 bytes]
- (hist) Blake and Mouton's Managerial Grid [1,354 bytes]
- (hist) Integrative Thinking [1,359 bytes]
- (hist) Software Archeology [1,359 bytes]
- (hist) Value Creation Index [1,361 bytes]
- (hist) Cyberspace [1,361 bytes]
- (hist) Strategic Themes [1,362 bytes]
- (hist) Data Asset Framework (DAF) [1,363 bytes]
- (hist) Brand Line [1,363 bytes]
- (hist) Browser Isolation [1,370 bytes]
- (hist) Workplace Safety [1,370 bytes]
- (hist) Information as a Service (IaaS) [1,371 bytes]
- (hist) Stakeholder Engagement [1,371 bytes]
- (hist) Operating Expenses [1,373 bytes]
- (hist) Brand Reputation [1,373 bytes]
- (hist) Cost to Serve (CTS) [1,378 bytes]
- (hist) Extensible Authentication Protocol (EAP) [1,379 bytes]
- (hist) Formal Organization [1,379 bytes]
- (hist) Phishing [1,380 bytes]
- (hist) Productive Efficiency [1,381 bytes]
- (hist) Marketing Metrics [1,382 bytes]
- (hist) Subscription Right [1,382 bytes]
- (hist) Payback Period [1,383 bytes]
- (hist) CAN-SPAM Act of 2003 [1,384 bytes]
- (hist) Dependency Network [1,385 bytes]
- (hist) Health Level 7 (HL7) [1,385 bytes]
- (hist) Rätselvermehrung [1,385 bytes]
- (hist) Organizational Behavior [1,385 bytes]
- (hist) Value for Money Audit [1,386 bytes]
- (hist) Advanced Distribution Protection and Restoration Devices [1,388 bytes]
- (hist) Markup Language [1,388 bytes]
- (hist) Autonomous System Number (ASN) [1,391 bytes]
- (hist) Value-Based Business-IT Alignment (VITAL) Project [1,394 bytes]
- (hist) Strike Price [1,394 bytes]
- (hist) Total Shareholder Return (TSR) [1,395 bytes]
- (hist) Dempster Shafer (D-S) Theory [1,396 bytes]
- (hist) Investor Sentiment [1,397 bytes]
- (hist) Crescendo Model of Rejuvenation [1,397 bytes]
- (hist) Diminishing Returns (DR) [1,398 bytes]
- (hist) SMS Marketing [1,400 bytes]
- (hist) Strategic Imperatives [1,401 bytes]
- (hist) Support Activities [1,401 bytes]
- (hist) Commercial Property Insurance [1,403 bytes]
- (hist) Pricing Model [1,404 bytes]
- (hist) Infrastructure as a Service (IaaS) [1,405 bytes]
- (hist) Social Cost Benefit Analysis (SCBA) [1,405 bytes]
- (hist) Cross Training (Business) [1,407 bytes]
- (hist) Sunk Cost [1,407 bytes]
- (hist) Supply Chain Design [1,407 bytes]
- (hist) Information Privacy [1,409 bytes]
- (hist) Supply Chain Visibility (SCV) [1,409 bytes]
- (hist) Virtual Customer Premises Equipment (vCPE) [1,410 bytes]
- (hist) Request for Proposal (RFP) [1,411 bytes]
- (hist) Blogging Platform [1,412 bytes]
- (hist) Information Flow [1,412 bytes]
- (hist) Network Monitoring [1,413 bytes]
- (hist) Supplier Evaluation [1,413 bytes]
- (hist) National Change of Address (NCOA) [1,415 bytes]
- (hist) Business Transaction Protocol (BTP) [1,417 bytes]
- (hist) Hedging [1,418 bytes]
- (hist) Inventory Shrinkage [1,418 bytes]
- (hist) Business Process Simulation [1,420 bytes]
- (hist) Open Security Architecture (OSA) Framework [1,420 bytes]
- (hist) Document Modeling [1,421 bytes]
- (hist) Gantt Chart [1,421 bytes]
- (hist) Penetration Pricing [1,421 bytes]
- (hist) Cause and Effect Diagram [1,422 bytes]
- (hist) Common Alerting Protocol (CAP) [1,422 bytes]
- (hist) The Abridged Big Five-Dimensional Circumplex (AB5C) [1,425 bytes]
- (hist) Application Control [1,427 bytes]
- (hist) Bridging Epistemologies [1,429 bytes]
- (hist) Strategic Grid for IT [1,431 bytes]
- (hist) Document Object Model (DOM) [1,431 bytes]
- (hist) Information Governance Professional (IGP) Certification [1,432 bytes]
- (hist) Professional Liability Insurance [1,432 bytes]
- (hist) Strategic Synergy [1,432 bytes]
- (hist) Intrinsic Stakeholder Commitment [1,434 bytes]
- (hist) Six Webs Framework [1,434 bytes]
- (hist) Supplier Scorecard [1,435 bytes]
- (hist) Play Theory of Mass Communication [1,437 bytes]
- (hist) Storage Device [1,438 bytes]
- (hist) Primary Customer [1,439 bytes]
- (hist) Crypto Currency [1,440 bytes]
- (hist) Web Content Management [1,440 bytes]
- (hist) Information Model [1,441 bytes]
- (hist) Structured Analysis and Design Technique (SADT) [1,442 bytes]
- (hist) POSDCORB [1,443 bytes]
- (hist) Reverse Logistics [1,444 bytes]
- (hist) MoSCoW Method [1,444 bytes]
- (hist) Corporate Sustainability [1,448 bytes]
- (hist) Waste Management [1,449 bytes]
- (hist) Elasticity of Supply [1,449 bytes]
- (hist) Functional Strategy [1,449 bytes]
- (hist) Vertical Integration [1,450 bytes]
- (hist) Collaboration Protocol Profile/Agreement (CPP/A) [1,450 bytes]
- (hist) First-Mover Advantage (FMA) [1,450 bytes]
- (hist) Software Non-functional Assessment Process (SNAP) [1,450 bytes]
- (hist) User-Centered Design (UCD) [1,452 bytes]
- (hist) Strategic Window [1,452 bytes]
- (hist) Use Case Diagram [1,453 bytes]
- (hist) Web Ontology Language (OWL) [1,454 bytes]
- (hist) Requirements Analysis [1,454 bytes]
- (hist) Laswell's Communication Model [1,454 bytes]
- (hist) Representational State Transfer (REST) [1,454 bytes]
- (hist) Information Design [1,455 bytes]
- (hist) Logical Incrementalism [1,455 bytes]
- (hist) Public Relations [1,457 bytes]
- (hist) Horizontal Integration [1,461 bytes]
- (hist) Weighted Average Cost of Capital (WACC) [1,464 bytes]
- (hist) Completed-Contract Method [1,465 bytes]
- (hist) Conditional Logics [1,465 bytes]
- (hist) Virtual Desktop Infrastructure (VDI) [1,466 bytes]
- (hist) The Value Model™ (VM) [1,468 bytes]
- (hist) Domain Specific Language (DSL) [1,468 bytes]
- (hist) GeoVMM [1,468 bytes]
- (hist) Metropolitan Area Network (MAN) [1,472 bytes]
- (hist) Polymorphism [1,472 bytes]
- (hist) Simulation Governance [1,473 bytes]
- (hist) Revenue Recognition [1,475 bytes]
- (hist) Prioritization Matrix [1,475 bytes]
- (hist) Strategic CRM [1,480 bytes]
- (hist) Supervisoral Development [1,483 bytes]
- (hist) Very Large-Scale Integration (VLSI) [1,484 bytes]
- (hist) Open Systems [1,485 bytes]
- (hist) Computational Logic [1,487 bytes]
- (hist) Operating Cash Flow [1,489 bytes]
- (hist) Fast Common Gateway Interface (FastCGI) [1,490 bytes]
- (hist) Persuasion Theory [1,494 bytes]
- (hist) Planning Game [1,494 bytes]
- (hist) Application Management [1,496 bytes]
- (hist) Amdahl's Law [1,498 bytes]
- (hist) Goodwill [1,499 bytes]
- (hist) The Three Component Model of Organizational Commitment [1,499 bytes]
- (hist) Parallel Processing [1,500 bytes]
- (hist) Stretch Goals [1,501 bytes]
- (hist) Organizational Architecture [1,502 bytes]
- (hist) Supplier Selection [1,503 bytes]
- (hist) Amortization [1,508 bytes]
- (hist) SMTP (Simple Mail Transfer Protocol) [1,509 bytes]
- (hist) Cost, Insurance and Freight [1,511 bytes]
- (hist) Lean Six Sigma [1,511 bytes]
- (hist) Smart Manufacturing [1,512 bytes]
- (hist) Network Management [1,513 bytes]
- (hist) Total Quality Management (TQM) [1,514 bytes]
- (hist) Computer Integrated Manufacturing (CIM) [1,514 bytes]
- (hist) Port [1,517 bytes]
- (hist) Planning Fallacy [1,518 bytes]
- (hist) Defense Advanced Research Projects Agency (DARPA) [1,518 bytes]
- (hist) Uses and Gratifications Theory [1,519 bytes]
- (hist) Process Capability Assessment Model (PCAT) [1,519 bytes]
- (hist) Design for Six Sigma (DFSS) [1,520 bytes]
- (hist) Base Station [1,523 bytes]
- (hist) Cross-Functional Team [1,524 bytes]
- (hist) Spreadmart [1,524 bytes]
- (hist) Record Linkage [1,525 bytes]
- (hist) Own Risk and Solvency Assessment (ORSA) [1,526 bytes]
- (hist) Qualitative Investment Analysis [1,530 bytes]
- (hist) Hypermedia [1,531 bytes]
- (hist) Cross-Docking [1,532 bytes]
- (hist) Risk Maturity Model (RMM) [1,533 bytes]
- (hist) Keystroke-Level Model (KLM) [1,533 bytes]
- (hist) Theory of Reasoned Action [1,538 bytes]
- (hist) Project Management Office (PMO) [1,540 bytes]
- (hist) Logical Database Design [1,542 bytes]
- (hist) Cultural Intelligence [1,545 bytes]
- (hist) Copyright Infringement [1,546 bytes]
- (hist) Dynamical Systems Theory [1,546 bytes]
- (hist) ISO/IEC 27002:2005 [1,546 bytes]
- (hist) Local Area Network (LAN) [1,547 bytes]
- (hist) ADL Matrix [1,548 bytes]
- (hist) Change Equation [1,548 bytes]
- (hist) Underwriting [1,548 bytes]
- (hist) Beckhard-Harris Change Equation [1,550 bytes]
- (hist) Ius in re [1,550 bytes]
- (hist) Sales Model [1,552 bytes]