Actions

Special

Orphaned pages

The following pages are not linked from or transcluded into other pages in CIO Wiki.

Showing below up to 250 results in range #21 to #270.

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

  1. Asian Option
  2. Atomization
  3. Attention Model
  4. Attribute-Driven Design Method
  5. Attributes of Management Excellence
  6. Attribution
  7. Audio Messaging Interchange Specification (AMIS)
  8. Automated Storage Tiering (Auto-Tiering)
  9. Autoregressive Integrated Moving Average (ARIMA) Model
  10. Availability Plan
  11. Average Cost Pricing
  12. Bachman Diagram
  13. Back-End
  14. Back-End Plan
  15. Backbone Router
  16. Background Intelligent Transfer Service (BITS)
  17. Backward Integration
  18. Bait and Switch
  19. Balanced Technology Extended (BTX)
  20. Bandwagon Effect
  21. Bankmail Engagement
  22. Barcode
  23. Barker's Notation
  24. Base Station Controller (BSC)
  25. Bases of Social Power
  26. Behavior Learning Engine (BLE)
  27. Behavioral Finance
  28. Behavioral Pattern
  29. Behavioral Targeting
  30. Belbin Team Roles
  31. Benefit Dependency Network
  32. Beyond Budgeting
  33. Binary Runtime Environment for Wireless (BREW)
  34. Binary Synchronous Communications (BSC)
  35. Blake and Mouton's Managerial Grid
  36. Blind Spot Analysis
  37. Boil the Ocean
  38. Bond Insurance
  39. Book Value
  40. Bottom-up Approach
  41. Bottom of the Pyramid (BOP)
  42. Bounded Rationality
  43. Box-Jenkins Method
  44. Bridging Epistemologies
  45. Bubble Diagram
  46. Building Lifecycle Management (BLM)
  47. Buy-Side Analyst
  48. Buyback Insurance
  49. Buzzword Quotient (BWQ)
  50. CDL (WS Choreography Description Language)
  51. CIMOSA (Computer Integrated Manufacturing Open Systems Architecture)
  52. CIO Wiki:About
  53. CIO Wiki:General disclaimer
  54. CIO Wiki:Privacy policy
  55. COPE Model (Corporate-Owned, Personally-Enabled Model)
  56. COSMIC Software Sizing
  57. Cannibalization
  58. Canonical Data Model (CDM)
  59. Capacity Plan
  60. Capacity Utilization
  61. Card Sorting
  62. Career Limiting Move
  63. Career Management
  64. Cascade-Correlation Learning Architecture
  65. Case-Based Reasoning (CBR)
  66. Case Management
  67. Case Method
  68. Catalytic Mechanisms
  69. Centralization and Decentralization
  70. Ceteris Paribus
  71. Chairman of the Board
  72. Channel Partner Value
  73. Chen's Notation
  74. Chief Information Governance Officer (CIGO)
  75. Chinese Wall
  76. Choose Your Own Device (CYOD)
  77. Circular Economy
  78. Cisco EnergyWise
  79. Clarkson Principles
  80. Click Network
  81. Clicks and Mortar
  82. Client Server Model
  83. Clinical Decision Support (CDS)
  84. Cloud Service Architecture (CSA)
  85. Clusters
  86. Co-Creation
  87. Co-opetition
  88. Coalface
  89. Coalition
  90. Coercive Power
  91. Collaboration Diagram
  92. Collaboration Protocol Profile/Agreement (CPP/A)
  93. Collaborative Commerce (C-Commerce)
  94. Collaborative Computing
  95. Collaborative Master Data Management (CMDM)
  96. Collection Analytics
  97. Command-line Interface (CLI)
  98. Command and Control (C&C)
  99. Commodity Hardware
  100. CommonKADS
  101. Common Lisp Object System (CLOS)
  102. Common Vulnerabilities and Exposures (CVE)
  103. Competency Management System
  104. Competitive Research
  105. Competitor Profile Matrix (CPM)
  106. Completed-Contract Method
  107. Complex Event Processing (CEP)
  108. Compliance Officer
  109. Componentization
  110. Composable Infrastructure
  111. Composite Applications
  112. Composite Structure Diagram
  113. Computer-Aided Facilities Management (CAFM)
  114. Computer Aided Software Engineering (CASE)
  115. Computer Monitor
  116. Computer Vision
  117. Computer Worm
  118. Concentrated Marketing
  119. Concentration Strategy
  120. Concept Driven Strategy
  121. Concept Programming
  122. Concept Statement
  123. Concept of Operations (CONOP)
  124. Conceptual Design
  125. Conceptual Schema
  126. Conditional Logics
  127. Conditional Probability
  128. Configuration Management System (CMS)
  129. Congruent Strategy
  130. Connected Home
  131. Connection Power
  132. Construct Modeling
  133. Consumer Confidence
  134. Consumer Privacy
  135. Content Assembly Mechanism (CAM)
  136. Content Regulation
  137. Content Strategy
  138. Context-Aware Computing
  139. Context of Use (CoU) Analysis
  140. Contextual Collaboration
  141. Continuous Architecture
  142. Contribution Pricing
  143. Control Activities
  144. Control Environment
  145. Control Framework
  146. Controlled Vocabulary
  147. Convertible Preferred Stock
  148. Conway's Law
  149. Core Architecture Data Model (CADM)
  150. Core Group Theory
  151. Corporate Charter
  152. Corporate Image
  153. Corporate Parenting Style
  154. Corporate Reputation Quotient
  155. Corporate Transparency
  156. Correlation Architecture
  157. Cost, Insurance and Freight
  158. Cost-Plus Pricing
  159. Cost Allocation
  160. Cost Dynamics
  161. Cost Justification
  162. Cost Overrun
  163. Cost Recovery Method
  164. Cost of Revenue
  165. Covert Leadership
  166. Crawford's Slip Writing Method
  167. Creative Accounting
  168. Creative Destruction
  169. Cross-Branding
  170. Cross-Docking
  171. Cross-Functional Team
  172. Cross-Sell
  173. Cross-Selling
  174. Cross Process Integration
  175. Cross Tabulation
  176. Cross Training (Business)
  177. Crown Jewel Defense
  178. Culture Levels
  179. Culture Types
  180. Current Good Manufacturing Practice (cGMP)
  181. DICE Framework
  182. DIKW Pyramid
  183. Data Asset Framework (DAF)
  184. Data Buffer
  185. Data Deduplication
  186. Data Delivery Platform (DDP)
  187. Data Enrichment
  188. Data Federation
  189. Data Health Check
  190. Data Hierarchy
  191. Data Independence
  192. Data Integration Framework (DIF)
  193. Data Island
  194. Data Item
  195. Data Minimization
  196. Data Munging
  197. Data Preparation
  198. Data Presentation Architecture
  199. Data Propagation
  200. Data Prototyping
  201. Data Reconciliation
  202. Data Suppression
  203. Data Value Chain
  204. Data Vault Modeling
  205. Data Wrangling
  206. Data as a Service (DaaS)
  207. Database Design Methodology
  208. Database Marketing
  209. Debt Restructuring
  210. Deferred Shares
  211. Definitive Media Library (DML)
  212. Defragmentation
  213. Deliberate Strategy
  214. Delta Model
  215. Demand Planning
  216. Demand and Value Assessment Methodology (DAM and VAM)
  217. Deming Chain Reaction
  218. Deming Cycle (PDSA Cycle)
  219. Departmentalization
  220. Dependency Network
  221. Depletion
  222. Deployment Diagram
  223. Descriptive Model
  224. Deutsch limit
  225. Development Environment
  226. Dialectical Enquiry
  227. Diamond Model
  228. Dimension Reduction
  229. Dimensions of Relational Work
  230. Diminishing Marginal Productivity
  231. Diminishing Marginal Returns
  232. Diminishing Marginal Utility
  233. Diminishing Returns (DR)
  234. Direct Manipulation Interface
  235. Directed Acyclic Graph
  236. Directors and Officers Liability Insurance
  237. Disaggregation
  238. Discount
  239. Discretionary Access Control (DAC)
  240. Discussion Leadership
  241. Distributed Data Management Architecture (DDM)
  242. Distributed Management Task Force (DMTF)
  243. Distributed Relational Database Architecture (DRDA)
  244. Distributed System Object Model (DSOM)
  245. Document Modeling
  246. Downsizing
  247. Drakon Chart
  248. Dual Commitment
  249. Dual Inline Memory Module (DIMM)
  250. Dutch Auction

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)