Actions

Special

Short pages

Showing below up to 50 results in range #3,271 to #3,320.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎Morphological Analysis ‎[11,882 bytes]
  2. (hist) ‎Customer Acquisition Cost (CAC) ‎[11,883 bytes]
  3. (hist) ‎Disruptive Technology ‎[11,890 bytes]
  4. (hist) ‎Protocol Stack ‎[11,961 bytes]
  5. (hist) ‎Data Munging ‎[11,977 bytes]
  6. (hist) ‎Activity-Based Management (ABM) ‎[11,986 bytes]
  7. (hist) ‎Business Game ‎[12,007 bytes]
  8. (hist) ‎Service Portfolio ‎[12,028 bytes]
  9. (hist) ‎Kotter's 8-Step Change Model ‎[12,045 bytes]
  10. (hist) ‎Workflow Engine ‎[12,052 bytes]
  11. (hist) ‎Stock ‎[12,056 bytes]
  12. (hist) ‎Business Software ‎[12,128 bytes]
  13. (hist) ‎Management Accounting ‎[12,129 bytes]
  14. (hist) ‎Cloud Computing Reference Architecture (CCRA) ‎[12,134 bytes]
  15. (hist) ‎Configuration Item (CI) ‎[12,137 bytes]
  16. (hist) ‎Malvertising ‎[12,165 bytes]
  17. (hist) ‎Free and Open-Source Software (FOSS) ‎[12,207 bytes]
  18. (hist) ‎Server ‎[12,222 bytes]
  19. (hist) ‎Cloud Operations (CloudOps) ‎[12,241 bytes]
  20. (hist) ‎Data Center ‎[12,254 bytes]
  21. (hist) ‎Data Management Platform (DMP) ‎[12,264 bytes]
  22. (hist) ‎Risk Analysis ‎[12,285 bytes]
  23. (hist) ‎Congruence Model ‎[12,286 bytes]
  24. (hist) ‎Function Point Analysis (FPA) ‎[12,318 bytes]
  25. (hist) ‎Business Model for Information Security (BMIS) ‎[12,337 bytes]
  26. (hist) ‎Risk Matrix ‎[12,340 bytes]
  27. (hist) ‎ITIL Service Design ‎[12,370 bytes]
  28. (hist) ‎Business Analysis ‎[12,383 bytes]
  29. (hist) ‎Advanced Distribution Management Systems (ADMS) ‎[12,391 bytes]
  30. (hist) ‎Enterprise Decision Management (EDM) ‎[12,418 bytes]
  31. (hist) ‎Advanced Metering Infrastructure (AMI) ‎[12,427 bytes]
  32. (hist) ‎Customer ‎[12,469 bytes]
  33. (hist) ‎Human Resources Information System (HRIS) ‎[12,492 bytes]
  34. (hist) ‎Customer Service ‎[12,514 bytes]
  35. (hist) ‎Business Process Orchestration ‎[12,518 bytes]
  36. (hist) ‎Data Monitoring ‎[12,518 bytes]
  37. (hist) ‎Flow Analysis ‎[12,523 bytes]
  38. (hist) ‎Digital Strategy ‎[12,532 bytes]
  39. (hist) ‎Backcasting ‎[12,558 bytes]
  40. (hist) ‎IT Management (Information Technology Management) ‎[12,574 bytes]
  41. (hist) ‎Manufacturing Operations Management (MOM) ‎[12,580 bytes]
  42. (hist) ‎Task Analysis ‎[12,599 bytes]
  43. (hist) ‎Cloud Bursting ‎[12,609 bytes]
  44. (hist) ‎Remote Procedure Call (RPC) ‎[12,641 bytes]
  45. (hist) ‎Progressive Enhancement (PE) ‎[12,678 bytes]
  46. (hist) ‎Risk Assessment ‎[12,693 bytes]
  47. (hist) ‎Application Integration ‎[12,712 bytes]
  48. (hist) ‎GOMS ‎[12,737 bytes]
  49. (hist) ‎Information Systems Security (INFOSEC) ‎[12,756 bytes]
  50. (hist) ‎Adaptive Security Architecture (ASA) ‎[12,769 bytes]

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)