Actions

Special

Orphaned pages

The following pages are not linked from or transcluded into other pages in CIO Wiki.

Showing below up to 500 results in range #1 to #500.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

  1. AML/CTF Program
  2. ASEAN Integration
  3. Algorithmic Business
  4. All-in-One (AIO) PCs
  5. Alternative Card Network (ACN)
  6. Alternative Delivery Models
  7. Ambient Advertising
  8. Ambient and Glanceable Displays
  9. American-Style Option
  10. American Medical Informatics Association (AMIA)
  11. Answer Marketplace
  12. Anti-Pattern
  13. Anti-Spam
  14. Anti Hostile Takeover Mechanisms
  15. Applied Analytics
  16. Applied Behavior Analysis (ABA)
  17. Arbitrage Pricing Theory
  18. Archetype
  19. ArchiMate
  20. Asian Option
  21. Atomization
  22. Attention Model
  23. Attribute-Driven Design Method
  24. Attributes of Management Excellence
  25. Attribution
  26. Audio Messaging Interchange Specification (AMIS)
  27. Automated Storage Tiering (Auto-Tiering)
  28. Autoregressive Integrated Moving Average (ARIMA) Model
  29. Availability Plan
  30. Average Cost Pricing
  31. Bachman Diagram
  32. Back-End
  33. Back-End Plan
  34. Backbone Router
  35. Background Intelligent Transfer Service (BITS)
  36. Backward Integration
  37. Bait and Switch
  38. Balanced Technology Extended (BTX)
  39. Bandwagon Effect
  40. Bankmail Engagement
  41. Barcode
  42. Barker's Notation
  43. Base Station Controller (BSC)
  44. Bases of Social Power
  45. Behavior Learning Engine (BLE)
  46. Behavioral Finance
  47. Behavioral Pattern
  48. Behavioral Targeting
  49. Belbin Team Roles
  50. Benefit Dependency Network
  51. Beyond Budgeting
  52. Binary Runtime Environment for Wireless (BREW)
  53. Binary Synchronous Communications (BSC)
  54. Blake and Mouton's Managerial Grid
  55. Blind Spot Analysis
  56. Boil the Ocean
  57. Bond Insurance
  58. Book Value
  59. Bottom-up Approach
  60. Bottom of the Pyramid (BOP)
  61. Bounded Rationality
  62. Box-Jenkins Method
  63. Bridging Epistemologies
  64. Bubble Diagram
  65. Building Lifecycle Management (BLM)
  66. Buy-Side Analyst
  67. Buyback Insurance
  68. Buzzword Quotient (BWQ)
  69. CDL (WS Choreography Description Language)
  70. CIMOSA (Computer Integrated Manufacturing Open Systems Architecture)
  71. CIO Wiki:About
  72. CIO Wiki:General disclaimer
  73. CIO Wiki:Privacy policy
  74. COPE Model (Corporate-Owned, Personally-Enabled Model)
  75. COSMIC Software Sizing
  76. Cannibalization
  77. Canonical Data Model (CDM)
  78. Capacity Plan
  79. Capacity Utilization
  80. Card Sorting
  81. Career Limiting Move
  82. Career Management
  83. Cascade-Correlation Learning Architecture
  84. Case-Based Reasoning (CBR)
  85. Case Management
  86. Case Method
  87. Catalytic Mechanisms
  88. Centralization and Decentralization
  89. Ceteris Paribus
  90. Chairman of the Board
  91. Channel Partner Value
  92. Chen's Notation
  93. Chief Information Governance Officer (CIGO)
  94. Chinese Wall
  95. Choose Your Own Device (CYOD)
  96. Circular Economy
  97. Cisco EnergyWise
  98. Clarkson Principles
  99. Click Network
  100. Clicks and Mortar
  101. Client Server Model
  102. Clinical Decision Support (CDS)
  103. Cloud Service Architecture (CSA)
  104. Clusters
  105. Co-Creation
  106. Co-opetition
  107. Coalface
  108. Coalition
  109. Coercive Power
  110. Collaboration Diagram
  111. Collaboration Protocol Profile/Agreement (CPP/A)
  112. Collaborative Commerce (C-Commerce)
  113. Collaborative Computing
  114. Collaborative Master Data Management (CMDM)
  115. Collection Analytics
  116. Command-line Interface (CLI)
  117. Command and Control (C&C)
  118. Commodity Hardware
  119. CommonKADS
  120. Common Lisp Object System (CLOS)
  121. Common Vulnerabilities and Exposures (CVE)
  122. Competency Management System
  123. Competitive Research
  124. Competitor Profile Matrix (CPM)
  125. Completed-Contract Method
  126. Complex Event Processing (CEP)
  127. Compliance Officer
  128. Componentization
  129. Composable Infrastructure
  130. Composite Applications
  131. Composite Structure Diagram
  132. Computer-Aided Facilities Management (CAFM)
  133. Computer Aided Software Engineering (CASE)
  134. Computer Monitor
  135. Computer Vision
  136. Computer Worm
  137. Concentrated Marketing
  138. Concentration Strategy
  139. Concept Driven Strategy
  140. Concept Programming
  141. Concept Statement
  142. Concept of Operations (CONOP)
  143. Conceptual Design
  144. Conceptual Schema
  145. Conditional Logics
  146. Conditional Probability
  147. Configuration Management System (CMS)
  148. Congruent Strategy
  149. Connected Home
  150. Connection Power
  151. Construct Modeling
  152. Consumer Behavior
  153. Consumer Confidence
  154. Consumer Privacy
  155. Content Assembly Mechanism (CAM)
  156. Content Regulation
  157. Content Strategy
  158. Context-Aware Computing
  159. Context of Use (CoU) Analysis
  160. Contextual Collaboration
  161. Continuous Architecture
  162. Contribution Pricing
  163. Control Activities
  164. Control Environment
  165. Control Framework
  166. Controlled Vocabulary
  167. Convertible Preferred Stock
  168. Conway's Law
  169. Core Architecture Data Model (CADM)
  170. Core Group Theory
  171. Corporate Charter
  172. Corporate Image
  173. Corporate Parenting Style
  174. Corporate Reputation Quotient
  175. Corporate Transparency
  176. Correlation Architecture
  177. Cost, Insurance and Freight
  178. Cost-Plus Pricing
  179. Cost Allocation
  180. Cost Dynamics
  181. Cost Justification
  182. Cost Overrun
  183. Cost Recovery Method
  184. Cost of Revenue
  185. Covert Leadership
  186. Crawford's Slip Writing Method
  187. Creative Accounting
  188. Creative Destruction
  189. Cross-Branding
  190. Cross-Docking
  191. Cross-Functional Team
  192. Cross-Sell
  193. Cross-Selling
  194. Cross Process Integration
  195. Cross Tabulation
  196. Cross Training (Business)
  197. Crown Jewel Defense
  198. Cultural Intelligence
  199. Culture Levels
  200. Culture Types
  201. Current Good Manufacturing Practice (cGMP)
  202. DICE Framework
  203. DIKW Pyramid
  204. Data Asset Framework (DAF)
  205. Data Buffer
  206. Data Deduplication
  207. Data Delivery Platform (DDP)
  208. Data Enrichment
  209. Data Federation
  210. Data Health Check
  211. Data Hierarchy
  212. Data Independence
  213. Data Integration Framework (DIF)
  214. Data Island
  215. Data Item
  216. Data Minimization
  217. Data Munging
  218. Data Preparation
  219. Data Presentation Architecture
  220. Data Propagation
  221. Data Prototyping
  222. Data Reconciliation
  223. Data Suppression
  224. Data Value Chain
  225. Data Vault Modeling
  226. Data Wrangling
  227. Data as a Service (DaaS)
  228. Database Design Methodology
  229. Database Marketing
  230. Debt Restructuring
  231. Deferred Shares
  232. Definitive Media Library (DML)
  233. Defragmentation
  234. Deliberate Strategy
  235. Delta Model
  236. Demand Planning
  237. Demand and Value Assessment Methodology (DAM and VAM)
  238. Deming Chain Reaction
  239. Deming Cycle (PDSA Cycle)
  240. Departmentalization
  241. Dependency Network
  242. Depletion
  243. Deployment Diagram
  244. Descriptive Model
  245. Deutsch limit
  246. Development Environment
  247. Dialectical Enquiry
  248. Diamond Model
  249. Dimension Reduction
  250. Dimensions of Relational Work
  251. Diminishing Marginal Productivity
  252. Diminishing Marginal Returns
  253. Diminishing Marginal Utility
  254. Diminishing Returns (DR)
  255. Direct Manipulation Interface
  256. Directed Acyclic Graph
  257. Directors and Officers Liability Insurance
  258. Disaggregation
  259. Discount
  260. Discretionary Access Control (DAC)
  261. Discussion Leadership
  262. Distributed Data Management Architecture (DDM)
  263. Distributed Management Task Force (DMTF)
  264. Distributed Relational Database Architecture (DRDA)
  265. Distributed System Object Model (DSOM)
  266. Document Modeling
  267. Downsizing
  268. Drakon Chart
  269. Dual Commitment
  270. Dual Inline Memory Module (DIMM)
  271. Dutch Auction
  272. Dynamic Data Exchange (DDE)
  273. Dynamic Dispatch
  274. Dynamic HTML
  275. Dynamic Link Library (DLL)
  276. Dynamic Pricing
  277. Dynamic Programming
  278. Dynamic Regression
  279. E3Value Methodology
  280. EFE Matrix (External Factor Evaluation Matrix)
  281. EProcurement
  282. ESourcing Capability Model (eSCM)
  283. ETOM
  284. Early Case Assessment (ECA)
  285. Early Data Assessment (EDA)
  286. Earnings Before Interest After Taxes (EBIAT)
  287. EbXML (Electronic Business XML)
  288. Economic Integration
  289. Economic Margin (EM)
  290. Economic Profit
  291. Effectiveness
  292. Efficiency Wage
  293. Efficient Consumer Response (ECR)
  294. Electronic Discovery (eDiscovery)
  295. Electronic Identity Verification (eIDV)
  296. Email Management (EMM)
  297. Emergent Strategy
  298. Empirical Process
  299. End-to-End Principle
  300. Enhanced Entity Relationship Model (EER Model)
  301. Enterprise Application
  302. Enterprise Feedback Management (EFM)
  303. Enterprise Function Diagram (EFD)
  304. Enterprise Goals
  305. Enterprise Information Portal (EIP)
  306. Enterprise Life Cycle
  307. Enterprise Ontology
  308. Enterprise Performance Life Cycle (EPLC)
  309. Enterprise Project Management (EPM)
  310. Enterprise Relationship Management (ERM)
  311. Enterprise Search
  312. Enterprise Workflow
  313. Entrepreneurial Government
  314. Environmental Factors
  315. Environmental Insurance
  316. Equivalence Partitioning
  317. Errors and Omissions Insurance
  318. Ethernet Card
  319. Event-Driven Process Chain (EPC)
  320. Everyday Low Pricing (EDLP)
  321. Evidence-Based Management
  322. Excess Return (ER)
  323. Execution - Evaluation Cycle
  324. Execution as Learning
  325. Executive Compensation
  326. Executive Information System (EIS)
  327. Expected Value of Perfect Information
  328. Expense Center
  329. Experiential Learning
  330. Exponential Smoothing
  331. Extended Backus–Naur Form (EBNF)
  332. Extended Enterprise
  333. Extreme Programming (XP)
  334. FCM (Factor-Criteria-Metrics) model
  335. FIPS (Federal Information Processing Standards)
  336. Face Value
  337. Facilitation Styles
  338. Facility Management
  339. Fact Based Modeling (FBM)
  340. Factory Gate Pricing
  341. Fair Value Accounting
  342. False Acceptance Ratio (FAR)
  343. False Consensus Bias
  344. Fatal Exception
  345. Fault Tree Analysis (FTA)
  346. Feature Detection
  347. Federal Internet Exchange (FIX)
  348. Federal Intrusion Detection Network (FIDNET)
  349. Feng's Classification
  350. Field Service Management (FSM)
  351. Financial Covenants
  352. FireWire
  353. Firmware
  354. First-In First-Out
  355. Fiscal Year
  356. Fixed Asset Management
  357. Flexible Organization
  358. Float (Project Management)
  359. Flow Control
  360. Flynn's Taxonomy
  361. Focus Group
  362. Folksonomy
  363. Foot in the Door
  364. Forced Compliance
  365. Forget, Borrow, Learn
  366. Formalization
  367. Forward Integration
  368. Fourteen Points of Management
  369. Free Cash Flow
  370. Free On Board
  371. Freeware
  372. French and Raven's Five Forms of Power
  373. Full Costing
  374. Function Hierarchy Diagram
  375. Function Points
  376. Functional Analysis
  377. Functional Economic Analysis (FEA)
  378. Functional Model
  379. Functional Size Measurement (FSM)
  380. Functional Software Architecture (FSA)
  381. Functional Team
  382. Future Pull
  383. Futures Contract
  384. GE Business Screen
  385. Garbage Can Model
  386. Gearing Ratio
  387. Generic Data Model
  388. GeoVMM
  389. Gigascale Integration (GSI)
  390. Gilder's Law
  391. Global Positioning System (GPS)
  392. Globalization Management System (GMS)
  393. Glocalization
  394. Graceful Degradation
  395. Green Computing
  396. Grey Knight
  397. Greyware
  398. Gross Revenue
  399. Growth-Share Matrix
  400. Growth Phase
  401. Guard Dog Theory
  402. Guerrilla Marketing
  403. Hagberg Model of Personal Power
  404. Handheld Device
  405. Handler's Classification
  406. Harvard Architecture
  407. Harvest Strategy
  408. Hawthorne Effect
  409. Heart Framework
  410. Hedge
  411. Hedging
  412. Heisenberg's Uncertainty Principle
  413. Helper Application
  414. Hertz (Hz, MHz, GHz)
  415. Heterogeneous Computing
  416. Heterogeneous Network
  417. Heterogeneous System Architecture
  418. Hierarchical-Input-Process-Output (HIPO) Mode
  419. Hierarchical Internetworking Model
  420. High Performance Workplace
  421. Hofstadter's Law
  422. Homogeneous Network
  423. Homoiconicity
  424. Horizontal Agreement
  425. Horizontal Merger
  426. Hospitality Management
  427. Hosted Virtual Desktops (HVD)
  428. Hub-and-Spoke Integration
  429. Human Performance Technology (HPT)
  430. Hypervisor
  431. Hypodermic Needle Theory
  432. IBM Academy of Technology (AoT)
  433. IFE Matrix (Internal Factor Evaluation Matrix)
  434. IPMA Competence Baseline (ICB)
  435. IS Strategy
  436. IT Chargeback Model
  437. IT Help Desk
  438. IT Productivity Paradox
  439. IT Value Model
  440. IUnknown Interface (COM)
  441. Identity Life Cycle Management (ILM)
  442. Identity Management (ID Management)
  443. Illusion of Control Bias
  444. Impala Architecture
  445. Implementation Design
  446. Implementation Management
  447. Impression Management
  448. In-Transit Visiblity
  449. Incentives
  450. Incident
  451. Inclusive Value Measurement (IVM)
  452. Income Stock
  453. Independent Verification and Validation (IV&V)
  454. Index Fund
  455. Indicator
  456. Inductive Bias
  457. Inferior Goods
  458. Infomercial
  459. Informative Modeling
  460. Infrastructure Outsourcing
  461. Initiative for Policy Dialogue (IPD)
  462. Input-Output Model (I/O Model)
  463. Input-Process-Output (IPO) Model
  464. Inquiry Based Learning
  465. Insider Trading
  466. Institute of Electrical and Electronics Engineers (IEEE)
  467. Institutional Investors
  468. Instrumental Approach of Stakeholder Theory
  469. Insurance Application Architecture (IAA)
  470. Intangible Assets Monitor
  471. Integrated Application Lifecycle Management
  472. Integrated Business Planning (IBP)
  473. Integrated DEFinition Methods (IDEF)
  474. Integrated Marketing Communications
  475. Integration Appliance
  476. Integration Competency Center (ICC)
  477. Integration DEFinition for Information Modeling (IDEF1X)
  478. Integrative Thinking
  479. Intelligent ERP (i-ERP)
  480. Intelligent Process Automation (IPA)
  481. Intentional Change Theory (ICT)
  482. Interaction Overview Diagram
  483. Interaction Technique
  484. Intermediate Outcome
  485. Internal Systems
  486. International Electrotechnical Commission (IEC)
  487. International Telecommunication Union (ITU)
  488. Interpretive Strategy
  489. Interrelationship Diagraph
  490. Interrupt Request (IRQ)
  491. Invasion of Privacy
  492. Invested Capital
  493. Investment Center
  494. Iterative Design
  495. Iterative Development
  496. Ius in re
  497. JICNARS Scale
  498. Java Database Connectivity (JDBC)
  499. Java Message Service (JMS)
  500. Job Characteristics Theory

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)