Actions

Special

Short pages

Showing below up to 50 results in range #2,491 to #2,540.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎Mandatory Access Control (MAC) ‎[5,526 bytes]
  2. (hist) ‎Adaptable Organization ‎[5,532 bytes]
  3. (hist) ‎Profit Pools ‎[5,537 bytes]
  4. (hist) ‎IT Oganization Modeling and Assessment Tool (ITOMA) ‎[5,540 bytes]
  5. (hist) ‎Server-Side Scripting ‎[5,540 bytes]
  6. (hist) ‎Programming Paradigm ‎[5,545 bytes]
  7. (hist) ‎Intranet ‎[5,552 bytes]
  8. (hist) ‎Project Charter ‎[5,554 bytes]
  9. (hist) ‎Infrastructure as Code (IaC) ‎[5,560 bytes]
  10. (hist) ‎Collaborative Master Data Management (CMDM) ‎[5,562 bytes]
  11. (hist) ‎Business Process Query Language (BPQL) ‎[5,564 bytes]
  12. (hist) ‎Customer Intelligence (CI) ‎[5,564 bytes]
  13. (hist) ‎Diamond Model ‎[5,571 bytes]
  14. (hist) ‎ECMAScript ‎[5,574 bytes]
  15. (hist) ‎Information Infrastucture ‎[5,576 bytes]
  16. (hist) ‎The DIKW Model ‎[5,581 bytes]
  17. (hist) ‎Causal Ambiguity ‎[5,581 bytes]
  18. (hist) ‎Direct Response Marketing ‎[5,584 bytes]
  19. (hist) ‎Top-Level Domain (TLD) ‎[5,585 bytes]
  20. (hist) ‎The Gramm–Leach–Bliley Act (GLBA) ‎[5,585 bytes]
  21. (hist) ‎Throughput Analysis ‎[5,586 bytes]
  22. (hist) ‎Enterprise Performance Life Cycle (EPLC) ‎[5,592 bytes]
  23. (hist) ‎Servant Leadership ‎[5,596 bytes]
  24. (hist) ‎Collaboration Diagram ‎[5,603 bytes]
  25. (hist) ‎Operations Bridge ‎[5,603 bytes]
  26. (hist) ‎The Relational Model (RM) ‎[5,608 bytes]
  27. (hist) ‎Mass Customization ‎[5,612 bytes]
  28. (hist) ‎Cost Justification ‎[5,625 bytes]
  29. (hist) ‎Behavioral Pattern ‎[5,627 bytes]
  30. (hist) ‎Efficiency ‎[5,644 bytes]
  31. (hist) ‎Two Factor Theory ‎[5,646 bytes]
  32. (hist) ‎Common Object Request Broker Architecture (CORBA) ‎[5,656 bytes]
  33. (hist) ‎Andrew's Model ‎[5,666 bytes]
  34. (hist) ‎Spin-Off ‎[5,667 bytes]
  35. (hist) ‎Strategic Goal ‎[5,672 bytes]
  36. (hist) ‎Weill Ross Framework ‎[5,673 bytes]
  37. (hist) ‎Analytic Hierarchy Process Framework (AHP) ‎[5,681 bytes]
  38. (hist) ‎Applied Behavior Analysis (ABA) ‎[5,687 bytes]
  39. (hist) ‎DIKW Pyramid ‎[5,688 bytes]
  40. (hist) ‎The Principle of Causality ‎[5,691 bytes]
  41. (hist) ‎Electronic Discovery Reference Model (EDRM) ‎[5,691 bytes]
  42. (hist) ‎Network Access Server (NAS) ‎[5,692 bytes]
  43. (hist) ‎Service Provisioning Optimization (SPO) ‎[5,695 bytes]
  44. (hist) ‎Connection Speed ‎[5,696 bytes]
  45. (hist) ‎Big Data Integration ‎[5,698 bytes]
  46. (hist) ‎Intrusion Detection Prevention (IDS) ‎[5,707 bytes]
  47. (hist) ‎Diminishing Marginal Returns ‎[5,709 bytes]
  48. (hist) ‎Access Control Facility (ACF2) ‎[5,721 bytes]
  49. (hist) ‎Profitability ‎[5,726 bytes]
  50. (hist) ‎Simple Network Management Protocol (SNMP) ‎[5,728 bytes]

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)