Actions

Special

Orphaned pages

The following pages are not linked from or transcluded into other pages in CIO Wiki.

Showing below up to 250 results in range #101 to #350.

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

  1. Clicks and Mortar
  2. Client Server Model
  3. Clinical Decision Support (CDS)
  4. Cloud Service Architecture (CSA)
  5. Clusters
  6. Co-Creation
  7. Co-opetition
  8. Coalface
  9. Coalition
  10. Coercive Power
  11. Collaboration Diagram
  12. Collaboration Protocol Profile/Agreement (CPP/A)
  13. Collaborative Commerce (C-Commerce)
  14. Collaborative Computing
  15. Collaborative Master Data Management (CMDM)
  16. Collection Analytics
  17. Command-line Interface (CLI)
  18. Command and Control (C&C)
  19. Commodity Hardware
  20. CommonKADS
  21. Common Lisp Object System (CLOS)
  22. Common Vulnerabilities and Exposures (CVE)
  23. Competency Management System
  24. Competitive Research
  25. Competitor Profile Matrix (CPM)
  26. Completed-Contract Method
  27. Complex Event Processing (CEP)
  28. Compliance Officer
  29. Componentization
  30. Composable Infrastructure
  31. Composite Applications
  32. Composite Structure Diagram
  33. Computer-Aided Facilities Management (CAFM)
  34. Computer Aided Software Engineering (CASE)
  35. Computer Monitor
  36. Computer Vision
  37. Computer Worm
  38. Concentrated Marketing
  39. Concentration Strategy
  40. Concept Driven Strategy
  41. Concept Programming
  42. Concept Statement
  43. Concept of Operations (CONOP)
  44. Conceptual Design
  45. Conceptual Schema
  46. Conditional Logics
  47. Conditional Probability
  48. Configuration Management System (CMS)
  49. Congruent Strategy
  50. Connected Home
  51. Connection Power
  52. Construct Modeling
  53. Consumer Confidence
  54. Consumer Privacy
  55. Content Assembly Mechanism (CAM)
  56. Content Regulation
  57. Content Strategy
  58. Context-Aware Computing
  59. Context of Use (CoU) Analysis
  60. Contextual Collaboration
  61. Continuous Architecture
  62. Contribution Pricing
  63. Control Activities
  64. Control Environment
  65. Control Framework
  66. Controlled Vocabulary
  67. Convertible Preferred Stock
  68. Conway's Law
  69. Core Architecture Data Model (CADM)
  70. Core Group Theory
  71. Corporate Charter
  72. Corporate Image
  73. Corporate Parenting Style
  74. Corporate Reputation Quotient
  75. Corporate Transparency
  76. Correlation Architecture
  77. Cost, Insurance and Freight
  78. Cost-Plus Pricing
  79. Cost Allocation
  80. Cost Dynamics
  81. Cost Justification
  82. Cost Overrun
  83. Cost Recovery Method
  84. Cost of Revenue
  85. Covert Leadership
  86. Crawford's Slip Writing Method
  87. Creative Accounting
  88. Creative Destruction
  89. Cross-Branding
  90. Cross-Docking
  91. Cross-Functional Team
  92. Cross-Sell
  93. Cross-Selling
  94. Cross Process Integration
  95. Cross Tabulation
  96. Cross Training (Business)
  97. Crown Jewel Defense
  98. Culture Levels
  99. Culture Types
  100. Current Good Manufacturing Practice (cGMP)
  101. DICE Framework
  102. DIKW Pyramid
  103. Data Asset Framework (DAF)
  104. Data Buffer
  105. Data Deduplication
  106. Data Delivery Platform (DDP)
  107. Data Enrichment
  108. Data Federation
  109. Data Health Check
  110. Data Hierarchy
  111. Data Independence
  112. Data Integration Framework (DIF)
  113. Data Island
  114. Data Item
  115. Data Minimization
  116. Data Munging
  117. Data Preparation
  118. Data Presentation Architecture
  119. Data Propagation
  120. Data Prototyping
  121. Data Reconciliation
  122. Data Suppression
  123. Data Value Chain
  124. Data Vault Modeling
  125. Data Wrangling
  126. Data as a Service (DaaS)
  127. Database Design Methodology
  128. Database Marketing
  129. Debt Restructuring
  130. Deferred Shares
  131. Definitive Media Library (DML)
  132. Defragmentation
  133. Deliberate Strategy
  134. Delta Model
  135. Demand Planning
  136. Demand and Value Assessment Methodology (DAM and VAM)
  137. Deming Chain Reaction
  138. Deming Cycle (PDSA Cycle)
  139. Departmentalization
  140. Dependency Network
  141. Depletion
  142. Deployment Diagram
  143. Descriptive Model
  144. Deutsch limit
  145. Development Environment
  146. Dialectical Enquiry
  147. Diamond Model
  148. Dimension Reduction
  149. Dimensions of Relational Work
  150. Diminishing Marginal Productivity
  151. Diminishing Marginal Returns
  152. Diminishing Marginal Utility
  153. Diminishing Returns (DR)
  154. Direct Manipulation Interface
  155. Directed Acyclic Graph
  156. Directors and Officers Liability Insurance
  157. Disaggregation
  158. Discount
  159. Discretionary Access Control (DAC)
  160. Discussion Leadership
  161. Distributed Data Management Architecture (DDM)
  162. Distributed Management Task Force (DMTF)
  163. Distributed Relational Database Architecture (DRDA)
  164. Distributed System Object Model (DSOM)
  165. Document Modeling
  166. Downsizing
  167. Drakon Chart
  168. Dual Commitment
  169. Dual Inline Memory Module (DIMM)
  170. Dutch Auction
  171. Dynamic Data Exchange (DDE)
  172. Dynamic Dispatch
  173. Dynamic HTML
  174. Dynamic Link Library (DLL)
  175. Dynamic Pricing
  176. Dynamic Regression
  177. E3Value Methodology
  178. EFE Matrix (External Factor Evaluation Matrix)
  179. EProcurement
  180. ESourcing Capability Model (eSCM)
  181. ETOM
  182. Early Case Assessment (ECA)
  183. Early Data Assessment (EDA)
  184. Earnings Before Interest After Taxes (EBIAT)
  185. Economic Integration
  186. Economic Margin (EM)
  187. Economic Profit
  188. Effectiveness
  189. Efficiency Wage
  190. Efficient Consumer Response (ECR)
  191. Electronic Discovery (eDiscovery)
  192. Electronic Identity Verification (eIDV)
  193. Email Management (EMM)
  194. Emergent Strategy
  195. Empirical Process
  196. End-to-End Principle
  197. Enhanced Entity Relationship Model (EER Model)
  198. Enterprise Application
  199. Enterprise Feedback Management (EFM)
  200. Enterprise Function Diagram (EFD)
  201. Enterprise Goals
  202. Enterprise Information Portal (EIP)
  203. Enterprise Life Cycle
  204. Enterprise Ontology
  205. Enterprise Performance Life Cycle (EPLC)
  206. Enterprise Project Management (EPM)
  207. Enterprise Relationship Management (ERM)
  208. Enterprise Search
  209. Enterprise Workflow
  210. Entrepreneurial Government
  211. Environmental Factors
  212. Environmental Insurance
  213. Equivalence Partitioning
  214. Errors and Omissions Insurance
  215. Ethernet Card
  216. Event-Driven Process Chain (EPC)
  217. Everyday Low Pricing (EDLP)
  218. Excess Return (ER)
  219. Execution - Evaluation Cycle
  220. Execution as Learning
  221. Executive Compensation
  222. Executive Information System (EIS)
  223. Expected Value of Perfect Information
  224. Expense Center
  225. Experiential Learning
  226. Exponential Smoothing
  227. Extended Backus–Naur Form (EBNF)
  228. Extended Enterprise
  229. FCM (Factor-Criteria-Metrics) model
  230. FIPS (Federal Information Processing Standards)
  231. Face Value
  232. Facilitation Styles
  233. Facility Management
  234. Fact Based Modeling (FBM)
  235. Factory Gate Pricing
  236. Fair Value Accounting
  237. False Acceptance Ratio (FAR)
  238. False Consensus Bias
  239. Fatal Exception
  240. Fault Tree Analysis (FTA)
  241. Feature Detection
  242. Federal Internet Exchange (FIX)
  243. Federal Intrusion Detection Network (FIDNET)
  244. Feng's Classification
  245. Field Service Management (FSM)
  246. Financial Covenants
  247. FireWire
  248. Firmware
  249. First-In First-Out
  250. Fiscal Year

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)