Pages with the fewest revisions
Showing below up to 500 results in range #251 to #750.
View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)
- Social Multi Criteria Analysis (SMCA) (2 revisions)
- Competitive Position (2 revisions)
- The Central Computer and Telecommunications Agency (CCTA) (2 revisions)
- Distribution Channel (2 revisions)
- Availability Plan (2 revisions)
- The KISS Principle (2 revisions)
- Intentional Change Theory (ICT) (2 revisions)
- The Shell Directional Policy Matrix (2 revisions)
- Process Hierarchy Diagram (2 revisions)
- Dynamical Systems Theory (2 revisions)
- Base Station Controller (BSC) (2 revisions)
- Thinker's Keys (2 revisions)
- SLEPT Analysis (2 revisions)
- Inventory Shrinkage (2 revisions)
- Capital Assets (2 revisions)
- Sales Forecasting (2 revisions)
- Java (2 revisions)
- Schools Interoperability Framework (SIF) (2 revisions)
- Email Marketing (2 revisions)
- Catastrophe Theory (2 revisions)
- Turnaround Management (2 revisions)
- Public Value (2 revisions)
- Identity Theft (2 revisions)
- Core Competencies (2 revisions)
- Unified Profile for DoDAF/MODAF (UPDM) (2 revisions)
- Service-Based Costing (2 revisions)
- NATO Architecture Framework (NAF) (2 revisions)
- Cost of Equity (2 revisions)
- Real-Time System (RTS) (2 revisions)
- Value Management (2 revisions)
- Systems Architecture (2 revisions)
- Digital Asset Management (DAM) (2 revisions)
- Crown Jewel Defense (2 revisions)
- Application Software Services (2 revisions)
- Value for Money Audit (2 revisions)
- Tacit Knowledge (2 revisions)
- Short Selling (2 revisions)
- Planned Value (PV) (2 revisions)
- Collective Intelligence (2 revisions)
- Team Building (2 revisions)
- Skills Framework for the Information Age (SFIA) (2 revisions)
- Asset Liability Management (ALM) (2 revisions)
- Techquisition (2 revisions)
- Restructuring (2 revisions)
- Customer Value Index (CVI) (2 revisions)
- Software Development Kit (SDK) (2 revisions)
- Dark Web (2 revisions)
- Composite Applications (2 revisions)
- Available to Promise (ATP) (2 revisions)
- The Learning School of Strategy Formation (2 revisions)
- Open Systems (2 revisions)
- Marketing Campaign (2 revisions)
- Business Value Analysis (BVA) (2 revisions)
- Backup Server (2 revisions)
- Wf-XML (2 revisions)
- Third-Generation Balanced Scorecard (2 revisions)
- ESourcing Capability Model (eSCM) (2 revisions)
- Caching (2 revisions)
- SLIM Framework (2 revisions)
- Profit Center (2 revisions)
- Consulting Services (2 revisions)
- Case-Based Reasoning (CBR) (2 revisions)
- Scientific Management (2 revisions)
- Promotional Pricing (2 revisions)
- Employee Stock Options (2 revisions)
- Semantic Integration (2 revisions)
- Incident (2 revisions)
- Cost Accounting Standards (CAS) (2 revisions)
- Usability Inspection (2 revisions)
- Random Sampling (2 revisions)
- Real-time operations (2 revisions)
- Enterprise Model (2 revisions)
- Critical Chain (2 revisions)
- Logic Model (2 revisions)
- Information Mapping (2 revisions)
- Values and Lifestyles (2 revisions)
- Tactical Plan (2 revisions)
- European Union (2 revisions)
- Reservoir Approach (2 revisions)
- OPC Unified Architecture (2 revisions)
- Expectancy Theory (2 revisions)
- Asset Liability Modeling (2 revisions)
- Telemarketing (2 revisions)
- Object Oriented Programming (OOP) (2 revisions)
- Cyber-Physical Systems (CPS) (2 revisions)
- Attrition (2 revisions)
- Abilene Paradox (2 revisions)
- Vulture Capitalist (2 revisions)
- The Configuration School of Strategy Formation (2 revisions)
- Prime Number (2 revisions)
- Average Cost Pricing (2 revisions)
- The New St. Gallen Management Model (2 revisions)
- Ring Fencing (2 revisions)
- Business Value Assessment (2 revisions)
- Backward Integration (2 revisions)
- Wheel of Consumer Analysis (2 revisions)
- The Three Component Model of Organizational Commitment (2 revisions)
- Process Improvement Methodologies (2 revisions)
- Interpreted Language (2 revisions)
- Finite Element Analysis (FEA) (2 revisions)
- Behavioral Targeting (2 revisions)
- Profit Distribution (2 revisions)
- Forced Compliance (2 revisions)
- Case Management (2 revisions)
- Strategic Priorities (2 revisions)
- Free Software (2 revisions)
- Emergent Strategy (2 revisions)
- Agile Manifesto (2 revisions)
- Purchase Funnel (2 revisions)
- Employee Stock Ownership Plan (ESOP) (2 revisions)
- Corporate Accountability (2 revisions)
- Brand Reputation (2 revisions)
- Semantic Interoperability (2 revisions)
- Quantitative Investment Analysis (2 revisions)
- Multi Channel Marketing (2 revisions)
- Validity Effect (2 revisions)
- Synchromarketing (2 revisions)
- Net Profit (2 revisions)
- Information Asymmetry (2 revisions)
- Critical Path Analysis (2 revisions)
- Value Methodology (2 revisions)
- Information Model (2 revisions)
- Cryptography (2 revisions)
- Cognitive Walkthrough Method (2 revisions)
- Variable Costing (2 revisions)
- Talent Management (2 revisions)
- Simple Knowledge Organization System (SKOS) (2 revisions)
- Planning Game (2 revisions)
- Smart Device (2 revisions)
- Expected Return (2 revisions)
- Cyber Attack (2 revisions)
- Business Process Orchestration (2 revisions)
- Audio Messaging Interchange Specification (AMIS) (2 revisions)
- WIAL Model (2 revisions)
- The Cultural School of Strategy Formation (2 revisions)
- Principal Component Analysis (2 revisions)
- Ontology (2 revisions)
- Distributor (2 revisions)
- Average Rate of Return (2 revisions)
- The Nominal Group Technique (NGT) (2 revisions)
- Spear Phishing (2 revisions)
- Marketing Metrics (2 revisions)
- Interaction Technique (2 revisions)
- Bait and Switch (2 revisions)
- The Value Model™ (VM) (2 revisions)
- Risk Sensitivity (2 revisions)
- Statement of Changes in Equity (2 revisions)
- Economic Margin (EM) (2 revisions)
- Towers Perrin Model (2 revisions)
- Sales Order (2 revisions)
- Java Database Connectivity (JDBC) (2 revisions)
- Case Method (2 revisions)
- Property Insurance (2 revisions)
- Kano Model (2 revisions)
- Purchase Order (2 revisions)
- Modem (2 revisions)
- Employee Turnover (2 revisions)
- Ambient and Glanceable Displays (2 revisions)
- Semantic Spectrum (2 revisions)
- Gap Analysis (2 revisions)
- Cost Analysis (2 revisions)
- Use Case Diagram (2 revisions)
- Payback Period (2 revisions)
- Cost of Revenue (2 revisions)
- Synchronous Digital Hierarchy (SDH) (2 revisions)
- Performance-Risk-Valuation Investment Technology (PRVit) (2 revisions)
- Life Insurance (2 revisions)
- Globalization Management System (GMS) (2 revisions)
- Critical Path Method (CPM) (2 revisions)
- Value Migration (2 revisions)
- Shared Service Center (2 revisions)
- Network Monitoring (2 revisions)
- Logical Data Model (LDM) (2 revisions)
- Entity Relationship Model (2 revisions)
- Digital Device (2 revisions)
- Reliability Block Diagram (RBD) (2 revisions)
- Guideline (2 revisions)
- Vesting of Stock or Options (2 revisions)
- Port (2 revisions)
- Societal Value (2 revisions)
- Objective and Key Results (OKR) (2 revisions)
- Managing for Results Framework (2 revisions)
- High Level Language (HLL) (2 revisions)
- Software Factory (2 revisions)
- Principal Component Analysis (PCA) (2 revisions)
- Ontology Engineering (2 revisions)
- Hyperautomation (2 revisions)
- Federal Risk and Authorization Program (FedRAMP) (2 revisions)
- The Value Net Model (2 revisions)
- Financial Covenants (2 revisions)
- Product Management (2 revisions)
- Call Option (2 revisions)
- Belbin Team Roles (2 revisions)
- Timing Diagram (2 revisions)
- Storyboard (2 revisions)
- Trade Marketing Mix (2 revisions)
- Elasticity of Supply (2 revisions)
- Scope Creep (2 revisions)
- Proportional Voting (2 revisions)
- Ultra Vires (2 revisions)
- Employee Value (2 revisions)
- Corporate Charter (2 revisions)
- Semantic Web (2 revisions)
- Parallel Processing (2 revisions)
- Budgeted Cost of Work Performed (BCWP) (2 revisions)
- Use Case Points (UCP) (2 revisions)
- Supply Chain Architecture Life Cycle (SCALe) (2 revisions)
- Cost to Serve (CTS) (2 revisions)
- Value-Based Business-IT Alignment (VITAL) Project (2 revisions)
- Systems Dynamics (2 revisions)
- Logical Database Design (2 revisions)
- Collaboration Diagram (2 revisions)
- Tangible Book Value (2 revisions)
- Gustafson's Law (2 revisions)
- Viability Study (2 revisions)
- Smart Machines (2 revisions)
- Portability (2 revisions)
- Soft Systems Methodology (2 revisions)
- Completed-Contract Method (2 revisions)
- Audit Trail (2 revisions)
- The Design School of Strategy Formation (2 revisions)
- Open-System Environment Reference Model (OSERM) (2 revisions)
- Open Web Application Security Project (OWASP) (2 revisions)
- Hypermedia (2 revisions)
- Federal Rules of Civil Procedure (FRCP) (2 revisions)
- Balance Theory (2 revisions)
- S-Curve (2 revisions)
- Opportunity Cost (2 revisions)
- Firmware (2 revisions)
- Earned Schedule (ES) (2 revisions)
- Conformity Assessment (2 revisions)
- Tiny Encryption Algorithm (TEA) (2 revisions)
- Storytelling (2 revisions)
- Trade Secret (2 revisions)
- Foreign Exchange Market (2 revisions)
- Blueprint (2 revisions)
- Treasury Stock (2 revisions)
- Scorched Earth Defense (2 revisions)
- Proprietary Software (2 revisions)
- Ultramobiles (2 revisions)
- Put Option (2 revisions)
- Channel Management (2 revisions)
- Brand Vision (2 revisions)
- Unissued Stock (2 revisions)
- Budgeted Cost of Work Scheduled (BCWS) (2 revisions)
- Nanotechnology (2 revisions)
- Coaching (2 revisions)
- Personal Consumption Expenditure (PCE) (2 revisions)
- Network News Transfer Protocol (NNTP) (2 revisions)
- Cultural Intelligence (2 revisions)
- Vendor-Neutral (2 revisions)
- 3D Modeling (2 revisions)
- Technical Analysis (2 revisions)
- Smart Manufacturing (2 revisions)
- Portable Network Graphics (PNG) (2 revisions)
- Initiative for Policy Dialogue (IPD) (2 revisions)
- Compatible Time Sharing System (CTSS) (2 revisions)
- Terms of Reference (2 revisions)
- High availability (2 revisions)
- The Disciplined Agile (DA) Framework (2 revisions)
- Principles of Reinvention (2 revisions)
- Data Aggregation (2 revisions)
- The Open Information Systems Management Maturity Model (O-ISM3) (2 revisions)
- Spiral Dynamics (2 revisions)
- Dunning-Kruger Effect (2 revisions)
- Data Integrity (2 revisions)
- Baseline (2 revisions)
- Threat Modeling (2 revisions)
- SCADA (Supervisory Control and Data Acquisition) (2 revisions)
- SOC 2 (2 revisions)
- Profit Pools (2 revisions)
- Advanced Mobile Phone Service (AMPS) (2 revisions)
- Tree Diagram (2 revisions)
- Organogram (2 revisions)
- Key Global Indicator (KGI) (2 revisions)
- Cause and Effect Diagram (2 revisions)
- Security Policy (2 revisions)
- Functional Size Measurement (FSM) (2 revisions)
- Employer Brand (2 revisions)
- Unit Cost (2 revisions)
- Sequence Diagram (2 revisions)
- Service Component Architecture (SCA) (2 revisions)
- National Change of Address (NCOA) (2 revisions)
- Performance Based Budgeting (PBB) (2 revisions)
- Network Access Server (NAS) (2 revisions)
- Line of Business (LOB) (2 revisions)
- Information Flow (2 revisions)
- Cross-Branding (2 revisions)
- Simulation Modeling (2 revisions)
- Hadoop (2 revisions)
- Virtual Business (2 revisions)
- Social CRM (2 revisions)
- Porter's 3 Generic Strategies (2 revisions)
- Management Information System (MIS) (2 revisions)
- Hedging (2 revisions)
- Terms of Service (2 revisions)
- Insurance (2 revisions)
- Hiring (2 revisions)
- Complexity Theory (2 revisions)
- Wage Drift (2 revisions)
- The Eisenhower Method (2 revisions)
- Revenue Recognition (2 revisions)
- Prioritization Matrix (2 revisions)
- Web Services (2 revisions)
- Hypertext Transfer Protocol (HTTP) (2 revisions)
- Data Dictionary (2 revisions)
- Balanced Technology Extended (BTX) (2 revisions)
- White Paper (2 revisions)
- Bases of Social Power (2 revisions)
- Work Management (2 revisions)
- Canonical Data Model (CDM) (2 revisions)
- Benefit Cost Ratio (BCR) (2 revisions)
- Economic Value (2 revisions)
- Capital Turnover (2 revisions)
- Strategic Human Resource Management (SHRM) (2 revisions)
- Satisficing (2 revisions)
- Electronic Discovery (eDiscovery) (2 revisions)
- Tree Testing (2 revisions)
- Protected Extensible Authentication Protocol (PEAP) (2 revisions)
- Friendly Takeover (2 revisions)
- Unbranding (2 revisions)
- Pyramid Principle (2 revisions)
- PEST Analysis (2 revisions)
- Universal Data Element Framework (UDEF) (2 revisions)
- User Acceptance Testing (UAT) (2 revisions)
- Design Process (2 revisions)
- Value Profit Chain (2 revisions)
- Reference Semantic Model (RSM) (2 revisions)
- Target Marketing (2 revisions)
- Single Customer View (2 revisions)
- Virtual Customer Premises Equipment (vCPE) (2 revisions)
- Social Capital (2 revisions)
- Competency-based Approach (2 revisions)
- Tertiary Sector (2 revisions)
- Software Archeology (2 revisions)
- Manufacturing Extension Partnership (MEP) (2 revisions)
- The Entrepreneurial School of Strategy Formation (2 revisions)
- Software Prototyping (2 revisions)
- Prisoner's Dilemma (2 revisions)
- Bachman Diagram (2 revisions)
- Web Services Business Process Execution Language (WS-BPEL) (2 revisions)
- Buy-Side Analyst (2 revisions)
- Internet Crime (2 revisions)
- IS Strategy (2 revisions)
- Three Dimensional Business Definition (2 revisions)
- Production (2 revisions)
- Intranet (2 revisions)
- Earnings Before Interest, Taxes, Depreciation, and Amortization (EBITDA) (2 revisions)
- Benefit Dependency Network (2 revisions)
- SOSTAC Model (2 revisions)
- Profit and Loss Statement (2 revisions)
- Investment Strategy (2 revisions)
- Float (Project Management) (2 revisions)
- Capitalism (2 revisions)
- Binomial Option Pricing Model (2 revisions)
- Training Within Industry (2 revisions)
- Say's Law (2 revisions)
- Protected Health Information (PHI) (2 revisions)
- Centralization (2 revisions)
- Undercapitalization (2 revisions)
- Segment Architecture (2 revisions)
- Qualitative Investment Analysis (2 revisions)
- Functional Strategy (2 revisions)
- Corporate Parenting Style (2 revisions)
- Dempster Shafer (D-S) Theory (2 revisions)
- Building Management Systems (BMS) (2 revisions)
- Service Host Superfetch (2 revisions)
- Performance Indicator (2 revisions)
- Cross-Docking (2 revisions)
- Target Pricing (2 revisions)
- Single Sourcing (2 revisions)
- Representational State Transfer (REST) (2 revisions)
- Plesiochronous Digital Hierarchy (PDH) (2 revisions)
- Handheld Device (2 revisions)
- Virtual Desktop Infrastructure (VDI) (2 revisions)
- Resource Dependence Theory (2 revisions)
- Competency Management System (2 revisions)
- Office of Strategy Management (2 revisions)
- Hofstede's Cultural Dimensions Theory (2 revisions)
- Waste Management (2 revisions)
- The Environmental School of Strategy Formation (2 revisions)
- Revenue Stream (2 revisions)
- Back-End (2 revisions)
- The Planning School of Strategy Formation (2 revisions)
- Splitter (2 revisions)
- Feedforward Neural Network (2 revisions)
- Buy Back (2 revisions)
- Bandwagon Effect (2 revisions)
- Internet Engineering Task Force (IETF) (2 revisions)
- Conditional Logics (2 revisions)
- CMN-GOMS (2 revisions)
- SECI Model of Knowledge Creation (2 revisions)
- Best Practice (2 revisions)
- Adsorption Chillers (2 revisions)
- Total Addressable Market (TAM) (2 revisions)
- SOSTAC® Planning Model (2 revisions)
- Investor Sentiment (2 revisions)
- Flow Analysis (2 revisions)
- Capitalization Rate (2 revisions)
- Organizational Integrity (2 revisions)
- Contract (2 revisions)
- Second-Mover Strategy (2 revisions)
- Outcome-Driven Innovation (ODI) (2 revisions)
- POSDCORB (2 revisions)
- Impala Architecture (2 revisions)
- Encryption (2 revisions)
- Chaos Theory (2 revisions)
- Server-Side Rendering (2 revisions)
- Indemnity (2 revisions)
- Circular Economy (2 revisions)
- Antivirus Software (2 revisions)
- Service Integration and Management (SIAM) (2 revisions)
- Read-Only Memory (ROM) (2 revisions)
- Penetration Pricing (2 revisions)
- Leontief Paradox (2 revisions)
- Industry Models (2 revisions)
- Design Tool (2 revisions)
- Cross-Functional Team (2 revisions)
- Persuasion Theory (2 revisions)
- Loss Leader (2 revisions)
- Current Good Manufacturing Practice (cGMP) (2 revisions)
- Arbitrage Pricing Theory (2 revisions)
- Mainframe (2 revisions)
- Diminishing Marginal Utility (2 revisions)
- Virtual Function (2 revisions)
- Technical Standard (2 revisions)
- Social Cost Benefit Analysis (SCBA) (2 revisions)
- Resource Description Framework (RDF) (2 revisions)
- Portfolio Analysis (2 revisions)
- Competing Values Framework (CVF) (2 revisions)
- Compliance Officer (2 revisions)
- Automated Storage Tiering (Auto-Tiering) (2 revisions)
- Software Visualization (2 revisions)
- Integration Testing (2 revisions)
- Document Modeling (2 revisions)
- Computer-Aided Engineering (CAE) (2 revisions)
- Back-End Plan (2 revisions)
- The Positioning School of Strategy Formation (2 revisions)
- Process Capability Assessment Model (PCAT) (2 revisions)
- Feng's Classification (2 revisions)
- Bayes' Theorem (2 revisions)
- Work Specialization (2 revisions)
- SEER-SEM (2 revisions)
- Trajectories of Industry Change (2 revisions)
- Strategic Influence (2 revisions)
- Cash Flow Management (2 revisions)
- Triple Bottom Line (2 revisions)
- Defense Advanced Research Projects Agency (DARPA) (2 revisions)
- Supervisoral Development (2 revisions)
- Server-Side Scripting (2 revisions)
- Pareto Chart (2 revisions)
- Creative Destruction (2 revisions)
- Value Configuration (2 revisions)
- Record Linkage (2 revisions)
- Liquidation Value (2 revisions)
- Six Forces Model (2 revisions)
- Request for Proposal (RFP) (2 revisions)
- Handler's Classification (2 revisions)
- Diminishing Returns (DR) (2 revisions)
- Virtual Inheritance (2 revisions)
- Technological Forecasting (2 revisions)
- Innovation Management (2 revisions)
- Test Method (2 revisions)
- Accelerated Depreciation (2 revisions)
- The Gramm–Leach–Bliley Act (GLBA) (2 revisions)
- Market Saturation (2 revisions)
- Integrative Thinking (2 revisions)
- Fault Tree Analysis (FTA) (2 revisions)
- Backbone (2 revisions)
- The Power School of Strategy Formation (2 revisions)
- Fiber to the Home (FTTH) (2 revisions)
- Dynamic HTML (2 revisions)
- Data Enrichment (2 revisions)
- Buyback Insurance (2 revisions)
- Standard Cost Pricing (2 revisions)
- Internet Privacy (2 revisions)
- Cone of Uncertainty (2 revisions)
- Beyond Budgeting (2 revisions)
- Item Response Theory (IRT) (2 revisions)
- Economies of Scope (2 revisions)
- Data Replication (2 revisions)
- Card Sorting (2 revisions)
- Transaction Cost Theory (2 revisions)
- Cash Flow Return on Investment (CFROI) (2 revisions)
- Trojan Horse (2 revisions)
- Secure Shell (SSH) (2 revisions)
- Pseudocode (2 revisions)
- Convolutional Neural Network (CNN) (2 revisions)
- Algorithmic Business (2 revisions)
- Self-Appraisal (2 revisions)
- PRIDE Methodology (2 revisions)
- Ladder of Inference (2 revisions)
- Unsolicited Commercial Email (UCE) (2 revisions)
- Departmentalization (2 revisions)
- Support Activities (2 revisions)
- Design of Experiments (2 revisions)
- Credit Rating (2 revisions)
- Application Maintenance (2 revisions)
- System of Record (SOR) (2 revisions)
- Performance Measurement Baseline (PMB) (2 revisions)