Actions

Special

Oldest pages

Showing below up to 50 results in range #51 to #100.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Compliance Officer‏‎ (14:43, 6 February 2021)
  2. Component-Based Development (CBD)‏‎ (14:43, 6 February 2021)
  3. Composite Applications‏‎ (14:44, 6 February 2021)
  4. Continuous Delivery‏‎ (14:51, 6 February 2021)
  5. Cost Justification‏‎ (14:56, 6 February 2021)
  6. Cost to Serve (CTS)‏‎ (14:57, 6 February 2021)
  7. Creative Destruction‏‎ (14:57, 6 February 2021)
  8. Crisis Management‏‎ (14:58, 6 February 2021)
  9. Critical Success Factor (CSF)‏‎ (14:58, 6 February 2021)
  10. Current Good Manufacturing Practice (cGMP)‏‎ (15:00, 6 February 2021)
  11. Data Storage‏‎ (15:13, 6 February 2021)
  12. Definitive Media Library (DML)‏‎ (15:17, 6 February 2021)
  13. Dempster Shafer (D-S) Theory‏‎ (15:18, 6 February 2021)
  14. Device to Device (D2D)‏‎ (15:21, 6 February 2021)
  15. Digital Watermarking‏‎ (15:24, 6 February 2021)
  16. Economic Capital (ECAP)‏‎ (15:34, 6 February 2021)
  17. Electronic Data Interchange (EDI)‏‎ (15:36, 6 February 2021)
  18. Electronic Data Processing (EDP)‏‎ (15:36, 6 February 2021)
  19. Electronic Government (E-Government)‏‎ (15:36, 6 February 2021)
  20. Embedded System‏‎ (15:37, 6 February 2021)
  21. Engineering Change Order (ECO)‏‎ (15:39, 6 February 2021)
  22. Enterprise Data Warehouse (EDW)‏‎ (15:41, 6 February 2021)
  23. Enterprise Function Diagram (EFD)‏‎ (15:42, 6 February 2021)
  24. Enterprise Information Portal (EIP)‏‎ (15:42, 6 February 2021)
  25. Enterprise Modeling‏‎ (15:43, 6 February 2021)
  26. Enterprise Release Management (ERM)‏‎ (15:44, 6 February 2021)
  27. Entrepreneur‏‎ (15:45, 6 February 2021)
  28. Ethernet Industrial Protocol (Ethernet/IP)‏‎ (15:46, 6 February 2021)
  29. Expected Return‏‎ (15:48, 6 February 2021)
  30. Extranet‏‎ (15:50, 6 February 2021)
  31. Fault Configuration Accounting Performance Security (FCAPS)‏‎ (15:51, 6 February 2021)
  32. Federal Information Security Management Act (FISMA)‏‎ (15:52, 6 February 2021)
  33. Fiber to the Home (FTTH)‏‎ (15:53, 6 February 2021)
  34. Field Service Management (FSM)‏‎ (15:53, 6 February 2021)
  35. Five Whys‏‎ (15:55, 6 February 2021)
  36. Flexible Firm Model‏‎ (15:56, 6 February 2021)
  37. Free Software‏‎ (15:58, 6 February 2021)
  38. Functional Size Measurement (FSM)‏‎ (16:01, 6 February 2021)
  39. Future search method‏‎ (16:01, 6 February 2021)
  40. General Systems Theory (GST)‏‎ (16:03, 6 February 2021)
  41. Graduated Security‏‎ (16:06, 6 February 2021)
  42. ICT4D (Information and Communication Technologies for Development)‏‎ (16:14, 6 February 2021)
  43. IMAC (Install Move Add Change)‏‎ (16:15, 6 February 2021)
  44. IP Address‏‎ (16:15, 6 February 2021)
  45. IP Network‏‎ (16:15, 6 February 2021)
  46. ISO/IEC 27002:2005‏‎ (16:15, 6 February 2021)
  47. IT Chargeback Model‏‎ (16:19, 6 February 2021)
  48. Information Systems Security (INFOSEC)‏‎ (16:32, 6 February 2021)
  49. Initiative for Policy Dialogue (IPD)‏‎ (16:35, 6 February 2021)
  50. Internet Crime‏‎ (16:41, 6 February 2021)

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)