Actions

Special

Orphaned pages

The following pages are not linked from or transcluded into other pages in CIO Wiki.

Showing below up to 500 results in range #101 to #600.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

  1. Clicks and Mortar
  2. Client Server Model
  3. Clinical Decision Support (CDS)
  4. Cloud Service Architecture (CSA)
  5. Clusters
  6. Co-Creation
  7. Co-opetition
  8. Coalface
  9. Coalition
  10. Coercive Power
  11. Collaboration Diagram
  12. Collaboration Protocol Profile/Agreement (CPP/A)
  13. Collaborative Commerce (C-Commerce)
  14. Collaborative Computing
  15. Collaborative Master Data Management (CMDM)
  16. Collection Analytics
  17. Command-line Interface (CLI)
  18. Command and Control (C&C)
  19. Commodity Hardware
  20. CommonKADS
  21. Common Lisp Object System (CLOS)
  22. Common Vulnerabilities and Exposures (CVE)
  23. Competency Management System
  24. Competitive Research
  25. Competitor Profile Matrix (CPM)
  26. Completed-Contract Method
  27. Complex Event Processing (CEP)
  28. Compliance Officer
  29. Componentization
  30. Composable Infrastructure
  31. Composite Applications
  32. Composite Structure Diagram
  33. Computer-Aided Facilities Management (CAFM)
  34. Computer Aided Software Engineering (CASE)
  35. Computer Monitor
  36. Computer Vision
  37. Computer Worm
  38. Concentrated Marketing
  39. Concentration Strategy
  40. Concept Driven Strategy
  41. Concept Programming
  42. Concept Statement
  43. Concept of Operations (CONOP)
  44. Conceptual Design
  45. Conceptual Schema
  46. Conditional Logics
  47. Conditional Probability
  48. Configuration Management System (CMS)
  49. Congruent Strategy
  50. Connected Home
  51. Connection Power
  52. Construct Modeling
  53. Consumer Confidence
  54. Consumer Privacy
  55. Content Assembly Mechanism (CAM)
  56. Content Regulation
  57. Content Strategy
  58. Context-Aware Computing
  59. Context of Use (CoU) Analysis
  60. Contextual Collaboration
  61. Continuous Architecture
  62. Contribution Pricing
  63. Control Activities
  64. Control Environment
  65. Control Framework
  66. Controlled Vocabulary
  67. Convertible Preferred Stock
  68. Conway's Law
  69. Core Architecture Data Model (CADM)
  70. Core Group Theory
  71. Corporate Charter
  72. Corporate Image
  73. Corporate Parenting Style
  74. Corporate Reputation Quotient
  75. Corporate Transparency
  76. Correlation Architecture
  77. Cost, Insurance and Freight
  78. Cost-Plus Pricing
  79. Cost Allocation
  80. Cost Dynamics
  81. Cost Justification
  82. Cost Overrun
  83. Cost Recovery Method
  84. Cost of Revenue
  85. Covert Leadership
  86. Crawford's Slip Writing Method
  87. Creative Accounting
  88. Creative Destruction
  89. Cross-Branding
  90. Cross-Docking
  91. Cross-Functional Team
  92. Cross-Sell
  93. Cross-Selling
  94. Cross Process Integration
  95. Cross Tabulation
  96. Cross Training (Business)
  97. Crown Jewel Defense
  98. Culture Levels
  99. Culture Types
  100. Current Good Manufacturing Practice (cGMP)
  101. DICE Framework
  102. DIKW Pyramid
  103. Data Asset Framework (DAF)
  104. Data Buffer
  105. Data Deduplication
  106. Data Delivery Platform (DDP)
  107. Data Enrichment
  108. Data Federation
  109. Data Health Check
  110. Data Hierarchy
  111. Data Independence
  112. Data Integration Framework (DIF)
  113. Data Island
  114. Data Item
  115. Data Minimization
  116. Data Munging
  117. Data Preparation
  118. Data Presentation Architecture
  119. Data Propagation
  120. Data Prototyping
  121. Data Reconciliation
  122. Data Suppression
  123. Data Value Chain
  124. Data Vault Modeling
  125. Data Wrangling
  126. Data as a Service (DaaS)
  127. Database Design Methodology
  128. Database Marketing
  129. Debt Restructuring
  130. Deferred Shares
  131. Definitive Media Library (DML)
  132. Defragmentation
  133. Deliberate Strategy
  134. Delta Model
  135. Demand Planning
  136. Demand and Value Assessment Methodology (DAM and VAM)
  137. Deming Chain Reaction
  138. Deming Cycle (PDSA Cycle)
  139. Departmentalization
  140. Dependency Network
  141. Depletion
  142. Deployment Diagram
  143. Descriptive Model
  144. Deutsch limit
  145. Development Environment
  146. Dialectical Enquiry
  147. Diamond Model
  148. Dimension Reduction
  149. Dimensions of Relational Work
  150. Diminishing Marginal Productivity
  151. Diminishing Marginal Returns
  152. Diminishing Marginal Utility
  153. Diminishing Returns (DR)
  154. Direct Manipulation Interface
  155. Directed Acyclic Graph
  156. Directors and Officers Liability Insurance
  157. Disaggregation
  158. Discount
  159. Discretionary Access Control (DAC)
  160. Discussion Leadership
  161. Distributed Data Management Architecture (DDM)
  162. Distributed Management Task Force (DMTF)
  163. Distributed Relational Database Architecture (DRDA)
  164. Distributed System Object Model (DSOM)
  165. Document Modeling
  166. Downsizing
  167. Drakon Chart
  168. Dual Commitment
  169. Dual Inline Memory Module (DIMM)
  170. Dutch Auction
  171. Dynamic Data Exchange (DDE)
  172. Dynamic Dispatch
  173. Dynamic HTML
  174. Dynamic Link Library (DLL)
  175. Dynamic Pricing
  176. Dynamic Regression
  177. E3Value Methodology
  178. EFE Matrix (External Factor Evaluation Matrix)
  179. EProcurement
  180. ESourcing Capability Model (eSCM)
  181. ETOM
  182. Early Case Assessment (ECA)
  183. Early Data Assessment (EDA)
  184. Earnings Before Interest After Taxes (EBIAT)
  185. Economic Integration
  186. Economic Margin (EM)
  187. Economic Profit
  188. Effectiveness
  189. Efficiency Wage
  190. Efficient Consumer Response (ECR)
  191. Electronic Discovery (eDiscovery)
  192. Electronic Identity Verification (eIDV)
  193. Email Management (EMM)
  194. Emergent Strategy
  195. Empirical Process
  196. End-to-End Principle
  197. Enhanced Entity Relationship Model (EER Model)
  198. Enterprise Application
  199. Enterprise Feedback Management (EFM)
  200. Enterprise Function Diagram (EFD)
  201. Enterprise Goals
  202. Enterprise Information Portal (EIP)
  203. Enterprise Life Cycle
  204. Enterprise Ontology
  205. Enterprise Performance Life Cycle (EPLC)
  206. Enterprise Project Management (EPM)
  207. Enterprise Relationship Management (ERM)
  208. Enterprise Search
  209. Enterprise Workflow
  210. Entrepreneurial Government
  211. Environmental Factors
  212. Environmental Insurance
  213. Equivalence Partitioning
  214. Errors and Omissions Insurance
  215. Ethernet Card
  216. Event-Driven Process Chain (EPC)
  217. Everyday Low Pricing (EDLP)
  218. Excess Return (ER)
  219. Execution - Evaluation Cycle
  220. Execution as Learning
  221. Executive Compensation
  222. Executive Information System (EIS)
  223. Expected Value of Perfect Information
  224. Expense Center
  225. Experiential Learning
  226. Exponential Smoothing
  227. Extended Backus–Naur Form (EBNF)
  228. Extended Enterprise
  229. FCM (Factor-Criteria-Metrics) model
  230. FIPS (Federal Information Processing Standards)
  231. Face Value
  232. Facilitation Styles
  233. Facility Management
  234. Fact Based Modeling (FBM)
  235. Factory Gate Pricing
  236. Fair Value Accounting
  237. False Acceptance Ratio (FAR)
  238. False Consensus Bias
  239. Fatal Exception
  240. Fault Tree Analysis (FTA)
  241. Feature Detection
  242. Federal Internet Exchange (FIX)
  243. Federal Intrusion Detection Network (FIDNET)
  244. Feng's Classification
  245. Field Service Management (FSM)
  246. Financial Covenants
  247. FireWire
  248. Firmware
  249. First-In First-Out
  250. Fiscal Year
  251. Fixed Asset Management
  252. Flexible Organization
  253. Float (Project Management)
  254. Flow Control
  255. Flynn's Taxonomy
  256. Focus Group
  257. Folksonomy
  258. Foot in the Door
  259. Forced Compliance
  260. Forget, Borrow, Learn
  261. Formalization
  262. Forward Integration
  263. Fourteen Points of Management
  264. Free Cash Flow
  265. Free On Board
  266. Freeware
  267. French and Raven's Five Forms of Power
  268. Full Costing
  269. Function Hierarchy Diagram
  270. Function Points
  271. Functional Analysis
  272. Functional Economic Analysis (FEA)
  273. Functional Model
  274. Functional Size Measurement (FSM)
  275. Functional Software Architecture (FSA)
  276. Functional Team
  277. Future Pull
  278. Futures Contract
  279. GE Business Screen
  280. Garbage Can Model
  281. Gearing Ratio
  282. Generic Data Model
  283. GeoVMM
  284. Gigascale Integration (GSI)
  285. Gilder's Law
  286. Global Positioning System (GPS)
  287. Globalization Management System (GMS)
  288. Glocalization
  289. Graceful Degradation
  290. Green Computing
  291. Grey Knight
  292. Greyware
  293. Gross Revenue
  294. Growth-Share Matrix
  295. Growth Phase
  296. Guard Dog Theory
  297. Guerrilla Marketing
  298. Hagberg Model of Personal Power
  299. Handheld Device
  300. Handler's Classification
  301. Harvard Architecture
  302. Harvest Strategy
  303. Hawthorne Effect
  304. Heart Framework
  305. Hedge
  306. Hedging
  307. Heisenberg's Uncertainty Principle
  308. Helper Application
  309. Hertz (Hz, MHz, GHz)
  310. Heterogeneous Computing
  311. Heterogeneous Network
  312. Heterogeneous System Architecture
  313. Hierarchical-Input-Process-Output (HIPO) Mode
  314. Hierarchical Internetworking Model
  315. High Performance Workplace
  316. Hofstadter's Law
  317. Homogeneous Network
  318. Homoiconicity
  319. Horizontal Agreement
  320. Horizontal Merger
  321. Hospitality Management
  322. Hosted Virtual Desktops (HVD)
  323. Hub-and-Spoke Integration
  324. Human Performance Technology (HPT)
  325. Hypervisor
  326. Hypodermic Needle Theory
  327. IBM Academy of Technology (AoT)
  328. IFE Matrix (Internal Factor Evaluation Matrix)
  329. IPMA Competence Baseline (ICB)
  330. IS Strategy
  331. IT Chargeback Model
  332. IT Help Desk
  333. IT Productivity Paradox
  334. IT Value Model
  335. IUnknown Interface (COM)
  336. Identity Life Cycle Management (ILM)
  337. Illusion of Control Bias
  338. Impala Architecture
  339. Implementation Design
  340. Implementation Management
  341. Impression Management
  342. In-Transit Visiblity
  343. Incident
  344. Inclusive Value Measurement (IVM)
  345. Income Stock
  346. Independent Verification and Validation (IV&V)
  347. Index Fund
  348. Indicator
  349. Inductive Bias
  350. Inferior Goods
  351. Infomercial
  352. Informative Modeling
  353. Infrastructure Outsourcing
  354. Initiative for Policy Dialogue (IPD)
  355. Input-Output Model (I/O Model)
  356. Input-Process-Output (IPO) Model
  357. Inquiry Based Learning
  358. Insider Trading
  359. Institute of Electrical and Electronics Engineers (IEEE)
  360. Institutional Investors
  361. Instrumental Approach of Stakeholder Theory
  362. Insurance Application Architecture (IAA)
  363. Intangible Assets Monitor
  364. Integrated Application Lifecycle Management
  365. Integrated Business Planning (IBP)
  366. Integrated DEFinition Methods (IDEF)
  367. Integrated Marketing Communications
  368. Integration Appliance
  369. Integration Competency Center (ICC)
  370. Integration DEFinition for Information Modeling (IDEF1X)
  371. Integrative Thinking
  372. Intelligent ERP (i-ERP)
  373. Intelligent Process Automation (IPA)
  374. Intentional Change Theory (ICT)
  375. Interaction Overview Diagram
  376. Interaction Technique
  377. Intermediate Outcome
  378. Internal Systems
  379. International Electrotechnical Commission (IEC)
  380. International Telecommunication Union (ITU)
  381. Interpretive Strategy
  382. Interrelationship Diagraph
  383. Interrupt Request (IRQ)
  384. Invasion of Privacy
  385. Invested Capital
  386. Investment Center
  387. Iterative Design
  388. Iterative Development
  389. Ius in re
  390. JICNARS Scale
  391. Java Database Connectivity (JDBC)
  392. Java Message Service (JMS)
  393. Job Characteristics Theory
  394. Job Enlargement
  395. Job Enrichment
  396. Job Rotation
  397. Job Specialization
  398. Jour Fixe
  399. Just-World Effect
  400. Key Global Indicator (KGI)
  401. Key Success Factors (KSF)
  402. Killer Bees
  403. Knowledge Organization Systems (KOS)
  404. Korey's Model
  405. Kraljic Matrix
  406. LAMP Software
  407. Ladder of Inference
  408. Laffer Curve
  409. Lap Dog Theory
  410. Large Group Capacitation
  411. Last-In First-Out
  412. Learning Cycle
  413. Level 5 Leadership
  414. Leveraged Buy-out
  415. Leveraged Recapitalization
  416. Levers of Control
  417. Lexical Hypothesis
  418. Likert Management Systems
  419. Line of Business (LOB)
  420. Linear Economy
  421. Linear Strategy
  422. Lobster Trap
  423. Local Land and Property Gazetteer (LLPG)
  424. Logical Database Design
  425. Logical Incrementalism
  426. Loss Aversion Bias
  427. Loss Leader
  428. Low Ball Technique
  429. Loyalty Program
  430. MAGIC (Measuring and Accounting Intellectual Capital)
  431. MECE Principle
  432. MK II Method
  433. MLOps
  434. Macro Environment
  435. Main Page
  436. Managerial Development
  437. Managerial Value
  438. Managing Successful Programmes (MSP)
  439. Managing for Results Framework
  440. Mandatory Access Control (MAC)
  441. Marginal Costing
  442. Marginal Revenue
  443. Marginal Utility
  444. Market Perform
  445. Marketing Operations Management (MOM)
  446. Marketing Resource Management (MRM)
  447. Markus and Soh Process Model
  448. Material Resource Planning (MRP)
  449. Maturity Date
  450. Media Intelligence
  451. Medium-Scale Integration (MSI)
  452. Message Exchange Pattern (MEP)
  453. Messaging Patterns
  454. Meta Model
  455. Metadata Registry
  456. Metcalf's Law
  457. Metonymy
  458. MiL Model
  459. Microcredit
  460. Microfinance
  461. Microfinance Channel
  462. Microinsurance
  463. Mid-Point Differential
  464. Middle Management
  465. Milestone
  466. Mintzberg's 5Ps of Strategy
  467. Mirroring and Matching
  468. Mission Activities
  469. Mission Value
  470. Mixed System
  471. Model Driven Development (MDD)
  472. Model–View–ViewModel (MVVM)
  473. Modified Accrual Accounting
  474. Monetary Value
  475. Moore's Law
  476. Moral Purpose
  477. Morphological Analysis
  478. Multi-Attribute Utility Theory (MAUT)
  479. Multi Criteria Analysis (MCA)
  480. Multi Messaging Service (MMS)
  481. Multidimensional Expressions (MDX)
  482. Multiple Criteria Decision Analysis (MCDA)
  483. Multiple Sourcing
  484. Multipurpose Internet Mail Extensions (MIME)
  485. Multitasking Behavior
  486. Multitasking Consumer
  487. Multiway Data Analysis
  488. N7 (New 7 Tools)
  489. NATO Architecture Framework (NAF)
  490. NPVGO Model (Net Present Value Of Growth Opportunities)
  491. Nationalization
  492. NetBIOS (Network Basic Input/Output System)
  493. Net Revenue
  494. New Public Management (NPM)
  495. Niche Marketing
  496. Nielsen Ratings
  497. Nominal Value
  498. Non-Systemic Risk
  499. Non Fungible Token (NFT)
  500. Non Value-Added Work

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)