Pages with the fewest revisions
Showing below up to 500 results in range #21 to #520.
View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)
- Computational Fluid Dynamics (CFD) (1 revision)
- BIOS (Basic Input/Output System) (1 revision)
- Employment Contract (1 revision)
- Declarative Programming (1 revision)
- Environmental Impact Assessment (EIA): (1 revision)
- Manufacturing Execution System (MES) (1 revision)
- Cyber Threat Intelligence (CTI) (1 revision)
- Computational Logic (1 revision)
- Financial Model (1 revision)
- Actual Cost (AC) (1 revision)
- Bond (1 revision)
- Supply Chain Resilience (1 revision)
- Commodity (1 revision)
- Stakeholder Value Index (SVI) (1 revision)
- Actuarial Science (1 revision)
- Production line monitoring (1 revision)
- Economics (1 revision)
- Structural Analysis (1 revision)
- Creative Commons License (1 revision)
- Equilibrium Price (1 revision)
- Arbitrage (1 revision)
- Social Cognitive Theory (1 revision)
- Market Positioning (1 revision)
- Internal Audit (1 revision)
- Productive Capacity (1 revision)
- IT Infrastructure Management (1 revision)
- Centralized Control (1 revision)
- Structural Equation Modeling (SEM) (1 revision)
- Labor Relations (1 revision)
- Imperative Programming (1 revision)
- Navier-Stokes Equations (1 revision)
- Session Initiation Protocol (SIP) (1 revision)
- Equity Market (1 revision)
- Accounts Receivable (1 revision)
- Bandwidth (1 revision)
- Financial Reporting (1 revision)
- Productive Efficiency (1 revision)
- Microservices Architecture (1 revision)
- Differential Equations (1 revision)
- Discount (1 revision)
- Asynchronous JavaScript and XML (AJAX) (1 revision)
- Fluid Mechanics (1 revision)
- Transaction Workflow Innovation Standards Team (TWIST) (1 revision)
- Trompenaars' Model of National Culture Differences (1 revision)
- Brand Line (1 revision)
- Endpoint Security (1 revision)
- Load Balancing (1 revision)
- Reintermediation (1 revision)
- Low Level Language (1 revision)
- Direct-to-Consumer (DTC) (1 revision)
- Object Oriented Analysis and Design (OOAD) (1 revision)
- Integrated Behavioral Model (1 revision)
- Website Wireframe (1 revision)
- Internal Systems (1 revision)
- Operational Support Services (OSS) (1 revision)
- Content Strategy (1 revision)
- Psychometrics (1 revision)
- Knowledge Base (1 revision)
- Classical Test Theory (1 revision)
- Value Delivery (1 revision)
- Customer Experience (CX) (1 revision)
- 7MP (7 Management and Planning Tools) (1 revision)
- Object Oriented Approach (1 revision)
- Distributed System (1 revision)
- Lean IT (1 revision)
- Object Oriented Database (OODB) (1 revision)
- Open Source Hardware (1 revision)
- Trusted Computing Group (TCG) Standards (1 revision)
- Employee Retention (1 revision)
- Decentralized Control (1 revision)
- Allocative Efficiency (1 revision)
- Brooks's Law (1 revision)
- N7 (New 7 Tools) (1 revision)
- Real-Time Processing (1 revision)
- Crowdsourcing (1 revision)
- Business Model Canvas (BMC) (1 revision)
- Direct Mail (1 revision)
- DSL Access Multiplexer (DSLAM) (1 revision)
- Merchandising (1 revision)
- Strategy Formulation (1 revision)
- Path Analysis (1 revision)
- Derivative (1 revision)
- Service Mark (1 revision)
- Recurrent Neural Network (RNN) (1 revision)
- Local Loop (1 revision)
- Expansion through Cooperation (1 revision)
- Business Rule (1 revision)
- Right to Work (1 revision)
- Material Science (1 revision)
- Filter (1 revision)
- Data Mart (1 revision)
- Strategy Implementation (1 revision)
- Industrial Relations (1 revision)
- Symmetric Digital Subscriber Line (SDSL) (1 revision)
- MECE Principle (1 revision)
- Health Insurance (1 revision)
- Expansion through Internationalization (1 revision)
- Distribution Model (1 revision)
- Finance (1 revision)
- Confirmatory Factor Analysis (1 revision)
- Consumer Behavior (1 revision)
- Total Value of Opportunity (1 revision)
- JavaScript Object Notation (JSON) (1 revision)
- Use Case (1 revision)
- Service-Oriented Business Model (1 revision)
- Gemba Walk (1 revision)
- Cost of Quality (CoQ) (1 revision)
- Liability Insurance (1 revision)
- Logic Programming (1 revision)
- Entity Relationship Diagram (ERD) (1 revision)
- Takeover (1 revision)
- Very High Bitrate Digital Subscriber Line (VDSL) (1 revision)
- Dashboard (1 revision)
- Procedural Programming (1 revision)
- Thompson’s and Martin’s Strategic Management Framework (1 revision)
- Mergers and Acquisitions (M&A) (1 revision)
- Conflict Resolution (1 revision)
- SMS Marketing (1 revision)
- Strategic Control (1 revision)
- Team Dynamics (1 revision)
- Social Return on Investment (SROI) (1 revision)
- External Audit (1 revision)
- Software Engineering (1 revision)
- Decision Support System (DSS) (1 revision)
- Latent Trait Theory (1 revision)
- Business Administration (1 revision)
- Smart Information Systems (SIS) (1 revision)
- Compiled Language (1 revision)
- Business Value Measurement (1 revision)
- S-Curve (2 revisions)
- Opportunity Cost (2 revisions)
- Firmware (2 revisions)
- Earned Schedule (ES) (2 revisions)
- Conformity Assessment (2 revisions)
- Tiny Encryption Algorithm (TEA) (2 revisions)
- Storytelling (2 revisions)
- Trade Secret (2 revisions)
- Foreign Exchange Market (2 revisions)
- Blueprint (2 revisions)
- Treasury Stock (2 revisions)
- Scorched Earth Defense (2 revisions)
- Proprietary Software (2 revisions)
- Ultramobiles (2 revisions)
- Put Option (2 revisions)
- Channel Management (2 revisions)
- Brand Vision (2 revisions)
- Unissued Stock (2 revisions)
- Budgeted Cost of Work Scheduled (BCWS) (2 revisions)
- Nanotechnology (2 revisions)
- Coaching (2 revisions)
- Personal Consumption Expenditure (PCE) (2 revisions)
- Network News Transfer Protocol (NNTP) (2 revisions)
- Cultural Intelligence (2 revisions)
- Tangible Book Value (2 revisions)
- Gustafson's Law (2 revisions)
- Viability Study (2 revisions)
- Smart Machines (2 revisions)
- Portability (2 revisions)
- Soft Systems Methodology (2 revisions)
- Completed-Contract Method (2 revisions)
- Audit Trail (2 revisions)
- The Design School of Strategy Formation (2 revisions)
- Open-System Environment Reference Model (OSERM) (2 revisions)
- Open Web Application Security Project (OWASP) (2 revisions)
- Hypermedia (2 revisions)
- Federal Rules of Civil Procedure (FRCP) (2 revisions)
- Balance Theory (2 revisions)
- Data Integrity (2 revisions)
- Baseline (2 revisions)
- Threat Modeling (2 revisions)
- SCADA (Supervisory Control and Data Acquisition) (2 revisions)
- SOC 2 (2 revisions)
- Profit Pools (2 revisions)
- Advanced Mobile Phone Service (AMPS) (2 revisions)
- Tree Diagram (2 revisions)
- Organogram (2 revisions)
- Key Global Indicator (KGI) (2 revisions)
- Cause and Effect Diagram (2 revisions)
- Security Policy (2 revisions)
- Functional Size Measurement (FSM) (2 revisions)
- Employer Brand (2 revisions)
- Unit Cost (2 revisions)
- Sequence Diagram (2 revisions)
- Service Component Architecture (SCA) (2 revisions)
- National Change of Address (NCOA) (2 revisions)
- Performance Based Budgeting (PBB) (2 revisions)
- Network Access Server (NAS) (2 revisions)
- Line of Business (LOB) (2 revisions)
- Information Flow (2 revisions)
- Cross-Branding (2 revisions)
- Vendor-Neutral (2 revisions)
- 3D Modeling (2 revisions)
- Technical Analysis (2 revisions)
- Smart Manufacturing (2 revisions)
- Portable Network Graphics (PNG) (2 revisions)
- Initiative for Policy Dialogue (IPD) (2 revisions)
- Compatible Time Sharing System (CTSS) (2 revisions)
- Terms of Reference (2 revisions)
- High availability (2 revisions)
- The Disciplined Agile (DA) Framework (2 revisions)
- Principles of Reinvention (2 revisions)
- Data Aggregation (2 revisions)
- The Open Information Systems Management Maturity Model (O-ISM3) (2 revisions)
- Spiral Dynamics (2 revisions)
- Dunning-Kruger Effect (2 revisions)
- Bases of Social Power (2 revisions)
- Work Management (2 revisions)
- Canonical Data Model (CDM) (2 revisions)
- Benefit Cost Ratio (BCR) (2 revisions)
- Economic Value (2 revisions)
- Capital Turnover (2 revisions)
- Strategic Human Resource Management (SHRM) (2 revisions)
- Satisficing (2 revisions)
- Electronic Discovery (eDiscovery) (2 revisions)
- Tree Testing (2 revisions)
- Protected Extensible Authentication Protocol (PEAP) (2 revisions)
- Friendly Takeover (2 revisions)
- Unbranding (2 revisions)
- Pyramid Principle (2 revisions)
- PEST Analysis (2 revisions)
- Universal Data Element Framework (UDEF) (2 revisions)
- User Acceptance Testing (UAT) (2 revisions)
- Design Process (2 revisions)
- Value Profit Chain (2 revisions)
- Reference Semantic Model (RSM) (2 revisions)
- Simulation Modeling (2 revisions)
- Hadoop (2 revisions)
- Virtual Business (2 revisions)
- Social CRM (2 revisions)
- Porter's 3 Generic Strategies (2 revisions)
- Management Information System (MIS) (2 revisions)
- Hedging (2 revisions)
- Terms of Service (2 revisions)
- Insurance (2 revisions)
- Hiring (2 revisions)
- Complexity Theory (2 revisions)
- Wage Drift (2 revisions)
- The Eisenhower Method (2 revisions)
- Revenue Recognition (2 revisions)
- Prioritization Matrix (2 revisions)
- Web Services (2 revisions)
- Hypertext Transfer Protocol (HTTP) (2 revisions)
- Data Dictionary (2 revisions)
- Balanced Technology Extended (BTX) (2 revisions)
- White Paper (2 revisions)
- Internet Crime (2 revisions)
- IS Strategy (2 revisions)
- Three Dimensional Business Definition (2 revisions)
- Production (2 revisions)
- Intranet (2 revisions)
- Earnings Before Interest, Taxes, Depreciation, and Amortization (EBITDA) (2 revisions)
- Benefit Dependency Network (2 revisions)
- SOSTAC Model (2 revisions)
- Profit and Loss Statement (2 revisions)
- Investment Strategy (2 revisions)
- Float (Project Management) (2 revisions)
- Capitalism (2 revisions)
- Binomial Option Pricing Model (2 revisions)
- Training Within Industry (2 revisions)
- Say's Law (2 revisions)
- Protected Health Information (PHI) (2 revisions)
- Centralization (2 revisions)
- Undercapitalization (2 revisions)
- Segment Architecture (2 revisions)
- Qualitative Investment Analysis (2 revisions)
- Functional Strategy (2 revisions)
- Corporate Parenting Style (2 revisions)
- Dempster Shafer (D-S) Theory (2 revisions)
- Building Management Systems (BMS) (2 revisions)
- Service Host Superfetch (2 revisions)
- Performance Indicator (2 revisions)
- Cross-Docking (2 revisions)
- Target Marketing (2 revisions)
- Single Customer View (2 revisions)
- Virtual Customer Premises Equipment (vCPE) (2 revisions)
- Social Capital (2 revisions)
- Competency-based Approach (2 revisions)
- Tertiary Sector (2 revisions)
- Software Archeology (2 revisions)
- Manufacturing Extension Partnership (MEP) (2 revisions)
- The Entrepreneurial School of Strategy Formation (2 revisions)
- Software Prototyping (2 revisions)
- Prisoner's Dilemma (2 revisions)
- Bachman Diagram (2 revisions)
- Web Services Business Process Execution Language (WS-BPEL) (2 revisions)
- Buy-Side Analyst (2 revisions)
- Internet Engineering Task Force (IETF) (2 revisions)
- Conditional Logics (2 revisions)
- CMN-GOMS (2 revisions)
- SECI Model of Knowledge Creation (2 revisions)
- Best Practice (2 revisions)
- Adsorption Chillers (2 revisions)
- Total Addressable Market (TAM) (2 revisions)
- SOSTAC® Planning Model (2 revisions)
- Investor Sentiment (2 revisions)
- Flow Analysis (2 revisions)
- Capitalization Rate (2 revisions)
- Organizational Integrity (2 revisions)
- Contract (2 revisions)
- Second-Mover Strategy (2 revisions)
- Outcome-Driven Innovation (ODI) (2 revisions)
- POSDCORB (2 revisions)
- Impala Architecture (2 revisions)
- Encryption (2 revisions)
- Chaos Theory (2 revisions)
- Server-Side Rendering (2 revisions)
- Indemnity (2 revisions)
- Circular Economy (2 revisions)
- Antivirus Software (2 revisions)
- Service Integration and Management (SIAM) (2 revisions)
- Read-Only Memory (ROM) (2 revisions)
- Penetration Pricing (2 revisions)
- Leontief Paradox (2 revisions)
- Industry Models (2 revisions)
- Design Tool (2 revisions)
- Cross-Functional Team (2 revisions)
- Persuasion Theory (2 revisions)
- Loss Leader (2 revisions)
- Target Pricing (2 revisions)
- Single Sourcing (2 revisions)
- Representational State Transfer (REST) (2 revisions)
- Plesiochronous Digital Hierarchy (PDH) (2 revisions)
- Handheld Device (2 revisions)
- Virtual Desktop Infrastructure (VDI) (2 revisions)
- Resource Dependence Theory (2 revisions)
- Competency Management System (2 revisions)
- Office of Strategy Management (2 revisions)
- Hofstede's Cultural Dimensions Theory (2 revisions)
- Waste Management (2 revisions)
- The Environmental School of Strategy Formation (2 revisions)
- Revenue Stream (2 revisions)
- Back-End (2 revisions)
- The Planning School of Strategy Formation (2 revisions)
- Splitter (2 revisions)
- Feedforward Neural Network (2 revisions)
- Buy Back (2 revisions)
- Bandwagon Effect (2 revisions)
- Bayes' Theorem (2 revisions)
- Work Specialization (2 revisions)
- SEER-SEM (2 revisions)
- Trajectories of Industry Change (2 revisions)
- Strategic Influence (2 revisions)
- Cash Flow Management (2 revisions)
- Triple Bottom Line (2 revisions)
- Defense Advanced Research Projects Agency (DARPA) (2 revisions)
- Supervisoral Development (2 revisions)
- Server-Side Scripting (2 revisions)
- Pareto Chart (2 revisions)
- Creative Destruction (2 revisions)
- Value Configuration (2 revisions)
- Record Linkage (2 revisions)
- Liquidation Value (2 revisions)
- Current Good Manufacturing Practice (cGMP) (2 revisions)
- Arbitrage Pricing Theory (2 revisions)
- Mainframe (2 revisions)
- Diminishing Marginal Utility (2 revisions)
- Virtual Function (2 revisions)
- Technical Standard (2 revisions)
- Social Cost Benefit Analysis (SCBA) (2 revisions)
- Resource Description Framework (RDF) (2 revisions)
- Portfolio Analysis (2 revisions)
- Competing Values Framework (CVF) (2 revisions)
- Compliance Officer (2 revisions)
- Automated Storage Tiering (Auto-Tiering) (2 revisions)
- Software Visualization (2 revisions)
- Integration Testing (2 revisions)
- Document Modeling (2 revisions)
- Computer-Aided Engineering (CAE) (2 revisions)
- Back-End Plan (2 revisions)
- The Positioning School of Strategy Formation (2 revisions)
- Process Capability Assessment Model (PCAT) (2 revisions)
- Feng's Classification (2 revisions)
- Standard Cost Pricing (2 revisions)
- Internet Privacy (2 revisions)
- Cone of Uncertainty (2 revisions)
- Beyond Budgeting (2 revisions)
- Item Response Theory (IRT) (2 revisions)
- Economies of Scope (2 revisions)
- Data Replication (2 revisions)
- Card Sorting (2 revisions)
- Transaction Cost Theory (2 revisions)
- Cash Flow Return on Investment (CFROI) (2 revisions)
- Trojan Horse (2 revisions)
- Secure Shell (SSH) (2 revisions)
- Pseudocode (2 revisions)
- Convolutional Neural Network (CNN) (2 revisions)
- Algorithmic Business (2 revisions)
- Self-Appraisal (2 revisions)
- PRIDE Methodology (2 revisions)
- Ladder of Inference (2 revisions)
- Unsolicited Commercial Email (UCE) (2 revisions)
- Departmentalization (2 revisions)
- Support Activities (2 revisions)
- Design of Experiments (2 revisions)
- Credit Rating (2 revisions)
- Application Maintenance (2 revisions)
- System of Record (SOR) (2 revisions)
- Performance Measurement Baseline (PMB) (2 revisions)
- Shareware (2 revisions)
- Six Forces Model (2 revisions)
- Request for Proposal (RFP) (2 revisions)
- Handler's Classification (2 revisions)
- Diminishing Returns (DR) (2 revisions)
- Virtual Inheritance (2 revisions)
- Technological Forecasting (2 revisions)
- Innovation Management (2 revisions)
- Test Method (2 revisions)
- Accelerated Depreciation (2 revisions)
- The Gramm–Leach–Bliley Act (GLBA) (2 revisions)
- Market Saturation (2 revisions)
- Integrative Thinking (2 revisions)
- Fault Tree Analysis (FTA) (2 revisions)
- Backbone (2 revisions)
- The Power School of Strategy Formation (2 revisions)
- Fiber to the Home (FTTH) (2 revisions)
- Dynamic HTML (2 revisions)
- Data Enrichment (2 revisions)
- Buyback Insurance (2 revisions)
- Tie-in Marketing (2 revisions)
- Intrusion Prevention System (IPS) (2 revisions)
- Capacity Planning (2 revisions)
- Advanced Clinical Research Information Systems (ACRIS) (2 revisions)
- Strategic Altitude (2 revisions)
- Career Limiting Move (2 revisions)
- Advanced Technology Attachment (ATA) (2 revisions)
- Scenario Planning (2 revisions)
- Project Portfolio (2 revisions)
- Psychological Pricing (2 revisions)
- Employee Development (2 revisions)
- All-in-One (AIO) PCs (2 revisions)
- Undifferentiated Marketing (2 revisions)
- Self-Directed Team (2 revisions)
- Dependency Network (2 revisions)
- Sustainability (2 revisions)
- Negotiation Technique (2 revisions)
- Value Creation Index (2 revisions)
- Seven Habits of Highly Effective People (2 revisions)
- Performance Measurement Tools (2 revisions)
- Cross Process Integration (2 revisions)
- Information System Urbanization (2 revisions)
- Venture Funding (2 revisions)
- Task Dependencies (2 revisions)
- Hard Disk Drive (HDD) (2 revisions)
- Management by Exception (MBE) (2 revisions)
- Innovation Maturity Model (2 revisions)
- Competitive Advantage of Nations (2 revisions)
- Atomization (2 revisions)
- Automation (2 revisions)
- Solid-State Drive (SSD) (2 revisions)
- Reverse Logistics (2 revisions)
- Pro Forma Earnings (2 revisions)
- Computer-Aided Process Planning (CAPP) (2 revisions)
- The Principle of Causality (2 revisions)
- Operating Profit (2 revisions)
- Fiduciary Responsibility (2 revisions)
- Buzzword Quotient (BWQ) (2 revisions)
- Theory of Reasoned Action (2 revisions)
- Financial Services Data Model (FSDM) (2 revisions)
- Behavior Learning Engine (BLE) (2 revisions)
- Adaptive Control (2 revisions)
- SG&A (Selling, General & Administrative Expense) (2 revisions)
- Consortium (2 revisions)
- Total Economic Impact (TEI) (2 revisions)
- Safe Harbor (2 revisions)
- Programmable Logic Controller (PLC) (2 revisions)
- Effectiveness (2 revisions)
- Career Management (2 revisions)
- Blake and Mouton's Managerial Grid (2 revisions)
- Scenarios Forecasting (2 revisions)
- Bottom of the Pyramid (BOP) (2 revisions)
- PRINCE2® (2 revisions)
- Engineering Change Order (ECO) (2 revisions)
- Unstructured Information Management Architecture (UIMA) (2 revisions)
- Cost Performance Index (CPI) (2 revisions)
- Systemic Risk (2 revisions)
- Seven Signs Of Ethical Collapse (2 revisions)
- Performance Metrics (2 revisions)
- Sherwood Applied Business Security Architecture (SABSA) Framework (2 revisions)
- Relational Capital (2 revisions)
- Network Structure (2 revisions)
- ArchiMate (2 revisions)
- Task Management (2 revisions)
- Information as a Service (IaaS) (2 revisions)
- Executive Development (2 revisions)
- Business Portfolio Analysis (2 revisions)
- Virtual Machine Manager (VMM) (2 revisions)
- Technology Appropriation (2 revisions)
- Exponential Smoothing (2 revisions)
- Voluntary Interindustry Commerce Standards (VICS) Association (2 revisions)
- On-Demand Software (2 revisions)
- Market Share (2 revisions)
- The Problem Definition Process (2 revisions)
- Process Decision Program Chart (2 revisions)
- Dynamic Pricing (2 revisions)
- Computerized Maintenance Management System (CMMS) (2 revisions)
- Barker's Notation (2 revisions)
- Barriers to Entry (2 revisions)
- Thick Client (2 revisions)
- Standardization (2 revisions)
- Internet Service Provider (ISP) (2 revisions)