Actions

Special

Orphaned pages

The following pages are not linked from or transcluded into other pages in CIO Wiki.

Showing below up to 500 results in range #21 to #520.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

  1. Asian Option
  2. Atomization
  3. Attention Model
  4. Attribute-Driven Design Method
  5. Attributes of Management Excellence
  6. Attribution
  7. Audio Messaging Interchange Specification (AMIS)
  8. Automated Storage Tiering (Auto-Tiering)
  9. Autoregressive Integrated Moving Average (ARIMA) Model
  10. Availability Plan
  11. Average Cost Pricing
  12. Bachman Diagram
  13. Back-End
  14. Back-End Plan
  15. Backbone Router
  16. Background Intelligent Transfer Service (BITS)
  17. Backward Integration
  18. Bait and Switch
  19. Balanced Technology Extended (BTX)
  20. Bandwagon Effect
  21. Bankmail Engagement
  22. Barcode
  23. Barker's Notation
  24. Base Station Controller (BSC)
  25. Bases of Social Power
  26. Behavior Learning Engine (BLE)
  27. Behavioral Finance
  28. Behavioral Pattern
  29. Behavioral Targeting
  30. Belbin Team Roles
  31. Benefit Dependency Network
  32. Beyond Budgeting
  33. Binary Runtime Environment for Wireless (BREW)
  34. Binary Synchronous Communications (BSC)
  35. Blake and Mouton's Managerial Grid
  36. Blind Spot Analysis
  37. Boil the Ocean
  38. Bond Insurance
  39. Book Value
  40. Bottom-up Approach
  41. Bottom of the Pyramid (BOP)
  42. Bounded Rationality
  43. Box-Jenkins Method
  44. Bridging Epistemologies
  45. Bubble Diagram
  46. Building Lifecycle Management (BLM)
  47. Buy-Side Analyst
  48. Buyback Insurance
  49. Buzzword Quotient (BWQ)
  50. CDL (WS Choreography Description Language)
  51. CIMOSA (Computer Integrated Manufacturing Open Systems Architecture)
  52. CIO Wiki:About
  53. CIO Wiki:General disclaimer
  54. CIO Wiki:Privacy policy
  55. COPE Model (Corporate-Owned, Personally-Enabled Model)
  56. COSMIC Software Sizing
  57. Cannibalization
  58. Canonical Data Model (CDM)
  59. Capacity Plan
  60. Capacity Utilization
  61. Card Sorting
  62. Career Limiting Move
  63. Career Management
  64. Cascade-Correlation Learning Architecture
  65. Case-Based Reasoning (CBR)
  66. Case Management
  67. Case Method
  68. Catalytic Mechanisms
  69. Centralization and Decentralization
  70. Ceteris Paribus
  71. Chairman of the Board
  72. Channel Partner Value
  73. Chen's Notation
  74. Chief Information Governance Officer (CIGO)
  75. Chinese Wall
  76. Choose Your Own Device (CYOD)
  77. Circular Economy
  78. Cisco EnergyWise
  79. Clarkson Principles
  80. Click Network
  81. Clicks and Mortar
  82. Client Server Model
  83. Clinical Decision Support (CDS)
  84. Cloud Service Architecture (CSA)
  85. Clusters
  86. Co-Creation
  87. Co-opetition
  88. Coalface
  89. Coalition
  90. Coercive Power
  91. Collaboration Diagram
  92. Collaboration Protocol Profile/Agreement (CPP/A)
  93. Collaborative Commerce (C-Commerce)
  94. Collaborative Computing
  95. Collaborative Master Data Management (CMDM)
  96. Collection Analytics
  97. Command-line Interface (CLI)
  98. Command and Control (C&C)
  99. Commodity Hardware
  100. CommonKADS
  101. Common Lisp Object System (CLOS)
  102. Common Vulnerabilities and Exposures (CVE)
  103. Competency Management System
  104. Competitive Research
  105. Competitor Profile Matrix (CPM)
  106. Completed-Contract Method
  107. Complex Event Processing (CEP)
  108. Compliance Officer
  109. Componentization
  110. Composable Infrastructure
  111. Composite Applications
  112. Composite Structure Diagram
  113. Computer-Aided Facilities Management (CAFM)
  114. Computer Aided Software Engineering (CASE)
  115. Computer Monitor
  116. Computer Vision
  117. Computer Worm
  118. Concentrated Marketing
  119. Concentration Strategy
  120. Concept Driven Strategy
  121. Concept Programming
  122. Concept Statement
  123. Concept of Operations (CONOP)
  124. Conceptual Design
  125. Conceptual Schema
  126. Conditional Logics
  127. Conditional Probability
  128. Configuration Management System (CMS)
  129. Congruent Strategy
  130. Connected Home
  131. Connection Power
  132. Construct Modeling
  133. Consumer Confidence
  134. Consumer Privacy
  135. Content Assembly Mechanism (CAM)
  136. Content Regulation
  137. Content Strategy
  138. Context-Aware Computing
  139. Context of Use (CoU) Analysis
  140. Contextual Collaboration
  141. Continuous Architecture
  142. Contribution Pricing
  143. Control Activities
  144. Control Environment
  145. Control Framework
  146. Controlled Vocabulary
  147. Convertible Preferred Stock
  148. Conway's Law
  149. Core Architecture Data Model (CADM)
  150. Core Group Theory
  151. Corporate Charter
  152. Corporate Image
  153. Corporate Parenting Style
  154. Corporate Reputation Quotient
  155. Corporate Transparency
  156. Correlation Architecture
  157. Cost, Insurance and Freight
  158. Cost-Plus Pricing
  159. Cost Allocation
  160. Cost Dynamics
  161. Cost Justification
  162. Cost Overrun
  163. Cost Recovery Method
  164. Cost of Revenue
  165. Covert Leadership
  166. Crawford's Slip Writing Method
  167. Creative Accounting
  168. Creative Destruction
  169. Cross-Branding
  170. Cross-Docking
  171. Cross-Functional Team
  172. Cross-Sell
  173. Cross-Selling
  174. Cross Process Integration
  175. Cross Tabulation
  176. Cross Training (Business)
  177. Crown Jewel Defense
  178. Culture Levels
  179. Culture Types
  180. Current Good Manufacturing Practice (cGMP)
  181. DICE Framework
  182. DIKW Pyramid
  183. Data Asset Framework (DAF)
  184. Data Buffer
  185. Data Deduplication
  186. Data Delivery Platform (DDP)
  187. Data Enrichment
  188. Data Federation
  189. Data Health Check
  190. Data Hierarchy
  191. Data Independence
  192. Data Integration Framework (DIF)
  193. Data Island
  194. Data Item
  195. Data Minimization
  196. Data Munging
  197. Data Preparation
  198. Data Presentation Architecture
  199. Data Propagation
  200. Data Prototyping
  201. Data Reconciliation
  202. Data Suppression
  203. Data Value Chain
  204. Data Vault Modeling
  205. Data Wrangling
  206. Data as a Service (DaaS)
  207. Database Design Methodology
  208. Database Marketing
  209. Debt Restructuring
  210. Deferred Shares
  211. Definitive Media Library (DML)
  212. Defragmentation
  213. Deliberate Strategy
  214. Delta Model
  215. Demand Planning
  216. Demand and Value Assessment Methodology (DAM and VAM)
  217. Deming Chain Reaction
  218. Deming Cycle (PDSA Cycle)
  219. Departmentalization
  220. Dependency Network
  221. Depletion
  222. Deployment Diagram
  223. Descriptive Model
  224. Deutsch limit
  225. Development Environment
  226. Dialectical Enquiry
  227. Diamond Model
  228. Dimension Reduction
  229. Dimensions of Relational Work
  230. Diminishing Marginal Productivity
  231. Diminishing Marginal Returns
  232. Diminishing Marginal Utility
  233. Diminishing Returns (DR)
  234. Direct Manipulation Interface
  235. Directed Acyclic Graph
  236. Directors and Officers Liability Insurance
  237. Disaggregation
  238. Discount
  239. Discretionary Access Control (DAC)
  240. Discussion Leadership
  241. Distributed Data Management Architecture (DDM)
  242. Distributed Management Task Force (DMTF)
  243. Distributed Relational Database Architecture (DRDA)
  244. Distributed System Object Model (DSOM)
  245. Document Modeling
  246. Downsizing
  247. Drakon Chart
  248. Dual Commitment
  249. Dual Inline Memory Module (DIMM)
  250. Dutch Auction
  251. Dynamic Data Exchange (DDE)
  252. Dynamic Dispatch
  253. Dynamic HTML
  254. Dynamic Link Library (DLL)
  255. Dynamic Pricing
  256. Dynamic Regression
  257. E3Value Methodology
  258. EFE Matrix (External Factor Evaluation Matrix)
  259. EProcurement
  260. ESourcing Capability Model (eSCM)
  261. ETOM
  262. Early Case Assessment (ECA)
  263. Early Data Assessment (EDA)
  264. Earnings Before Interest After Taxes (EBIAT)
  265. Economic Integration
  266. Economic Margin (EM)
  267. Economic Profit
  268. Effectiveness
  269. Efficiency Wage
  270. Efficient Consumer Response (ECR)
  271. Electronic Discovery (eDiscovery)
  272. Electronic Identity Verification (eIDV)
  273. Email Management (EMM)
  274. Emergent Strategy
  275. Empirical Process
  276. End-to-End Principle
  277. Enhanced Entity Relationship Model (EER Model)
  278. Enterprise Application
  279. Enterprise Feedback Management (EFM)
  280. Enterprise Function Diagram (EFD)
  281. Enterprise Goals
  282. Enterprise Information Portal (EIP)
  283. Enterprise Life Cycle
  284. Enterprise Ontology
  285. Enterprise Performance Life Cycle (EPLC)
  286. Enterprise Project Management (EPM)
  287. Enterprise Relationship Management (ERM)
  288. Enterprise Search
  289. Enterprise Workflow
  290. Entrepreneurial Government
  291. Environmental Factors
  292. Environmental Insurance
  293. Equivalence Partitioning
  294. Errors and Omissions Insurance
  295. Ethernet Card
  296. Event-Driven Process Chain (EPC)
  297. Everyday Low Pricing (EDLP)
  298. Excess Return (ER)
  299. Execution - Evaluation Cycle
  300. Execution as Learning
  301. Executive Compensation
  302. Executive Information System (EIS)
  303. Expected Value of Perfect Information
  304. Expense Center
  305. Experiential Learning
  306. Exponential Smoothing
  307. Extended Backus–Naur Form (EBNF)
  308. Extended Enterprise
  309. FCM (Factor-Criteria-Metrics) model
  310. FIPS (Federal Information Processing Standards)
  311. Face Value
  312. Facilitation Styles
  313. Facility Management
  314. Fact Based Modeling (FBM)
  315. Factory Gate Pricing
  316. Fair Value Accounting
  317. False Acceptance Ratio (FAR)
  318. False Consensus Bias
  319. Fatal Exception
  320. Fault Tree Analysis (FTA)
  321. Feature Detection
  322. Federal Internet Exchange (FIX)
  323. Federal Intrusion Detection Network (FIDNET)
  324. Feng's Classification
  325. Field Service Management (FSM)
  326. Financial Covenants
  327. FireWire
  328. Firmware
  329. First-In First-Out
  330. Fiscal Year
  331. Fixed Asset Management
  332. Flexible Organization
  333. Float (Project Management)
  334. Flow Control
  335. Flynn's Taxonomy
  336. Focus Group
  337. Folksonomy
  338. Foot in the Door
  339. Forced Compliance
  340. Forget, Borrow, Learn
  341. Formalization
  342. Forward Integration
  343. Fourteen Points of Management
  344. Free Cash Flow
  345. Free On Board
  346. Freeware
  347. French and Raven's Five Forms of Power
  348. Full Costing
  349. Function Hierarchy Diagram
  350. Function Points
  351. Functional Analysis
  352. Functional Economic Analysis (FEA)
  353. Functional Model
  354. Functional Size Measurement (FSM)
  355. Functional Software Architecture (FSA)
  356. Functional Team
  357. Future Pull
  358. Futures Contract
  359. GE Business Screen
  360. Garbage Can Model
  361. Gearing Ratio
  362. Generic Data Model
  363. GeoVMM
  364. Gigascale Integration (GSI)
  365. Gilder's Law
  366. Global Positioning System (GPS)
  367. Globalization Management System (GMS)
  368. Glocalization
  369. Graceful Degradation
  370. Green Computing
  371. Grey Knight
  372. Greyware
  373. Gross Revenue
  374. Growth-Share Matrix
  375. Growth Phase
  376. Guard Dog Theory
  377. Guerrilla Marketing
  378. Hagberg Model of Personal Power
  379. Handheld Device
  380. Handler's Classification
  381. Harvard Architecture
  382. Harvest Strategy
  383. Hawthorne Effect
  384. Heart Framework
  385. Hedge
  386. Hedging
  387. Heisenberg's Uncertainty Principle
  388. Helper Application
  389. Hertz (Hz, MHz, GHz)
  390. Heterogeneous Computing
  391. Heterogeneous Network
  392. Heterogeneous System Architecture
  393. Hierarchical-Input-Process-Output (HIPO) Mode
  394. Hierarchical Internetworking Model
  395. High Performance Workplace
  396. Hofstadter's Law
  397. Homogeneous Network
  398. Homoiconicity
  399. Horizontal Agreement
  400. Horizontal Merger
  401. Hospitality Management
  402. Hosted Virtual Desktops (HVD)
  403. Hub-and-Spoke Integration
  404. Human Performance Technology (HPT)
  405. Hypervisor
  406. Hypodermic Needle Theory
  407. IBM Academy of Technology (AoT)
  408. IFE Matrix (Internal Factor Evaluation Matrix)
  409. IPMA Competence Baseline (ICB)
  410. IS Strategy
  411. IT Chargeback Model
  412. IT Help Desk
  413. IT Productivity Paradox
  414. IT Value Model
  415. IUnknown Interface (COM)
  416. Identity Life Cycle Management (ILM)
  417. Illusion of Control Bias
  418. Impala Architecture
  419. Implementation Design
  420. Implementation Management
  421. Impression Management
  422. In-Transit Visiblity
  423. Incident
  424. Inclusive Value Measurement (IVM)
  425. Income Stock
  426. Independent Verification and Validation (IV&V)
  427. Index Fund
  428. Indicator
  429. Inductive Bias
  430. Inferior Goods
  431. Infomercial
  432. Informative Modeling
  433. Infrastructure Outsourcing
  434. Initiative for Policy Dialogue (IPD)
  435. Input-Output Model (I/O Model)
  436. Input-Process-Output (IPO) Model
  437. Inquiry Based Learning
  438. Insider Trading
  439. Institute of Electrical and Electronics Engineers (IEEE)
  440. Institutional Investors
  441. Instrumental Approach of Stakeholder Theory
  442. Insurance Application Architecture (IAA)
  443. Intangible Assets Monitor
  444. Integrated Application Lifecycle Management
  445. Integrated Business Planning (IBP)
  446. Integrated DEFinition Methods (IDEF)
  447. Integrated Marketing Communications
  448. Integration Appliance
  449. Integration Competency Center (ICC)
  450. Integration DEFinition for Information Modeling (IDEF1X)
  451. Integrative Thinking
  452. Intelligent ERP (i-ERP)
  453. Intelligent Process Automation (IPA)
  454. Intentional Change Theory (ICT)
  455. Interaction Overview Diagram
  456. Interaction Technique
  457. Intermediate Outcome
  458. Internal Systems
  459. International Electrotechnical Commission (IEC)
  460. International Telecommunication Union (ITU)
  461. Interpretive Strategy
  462. Interrelationship Diagraph
  463. Interrupt Request (IRQ)
  464. Invasion of Privacy
  465. Invested Capital
  466. Investment Center
  467. Iterative Design
  468. Iterative Development
  469. Ius in re
  470. JICNARS Scale
  471. Java Database Connectivity (JDBC)
  472. Java Message Service (JMS)
  473. Job Characteristics Theory
  474. Job Enlargement
  475. Job Enrichment
  476. Job Rotation
  477. Job Specialization
  478. Jour Fixe
  479. Just-World Effect
  480. Key Global Indicator (KGI)
  481. Key Success Factors (KSF)
  482. Killer Bees
  483. Knowledge Organization Systems (KOS)
  484. Korey's Model
  485. Kraljic Matrix
  486. LAMP Software
  487. Ladder of Inference
  488. Laffer Curve
  489. Lap Dog Theory
  490. Large Group Capacitation
  491. Last-In First-Out
  492. Learning Cycle
  493. Level 5 Leadership
  494. Leveraged Buy-out
  495. Leveraged Recapitalization
  496. Levers of Control
  497. Lexical Hypothesis
  498. Likert Management Systems
  499. Line of Business (LOB)
  500. Linear Economy

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)