Actions

Special

Orphaned pages

The following pages are not linked from or transcluded into other pages in CIO Wiki.

Showing below up to 500 results in range #251 to #750.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

  1. Diminishing Marginal Returns
  2. Diminishing Marginal Utility
  3. Diminishing Returns (DR)
  4. Direct Manipulation Interface
  5. Directed Acyclic Graph
  6. Directors and Officers Liability Insurance
  7. Disaggregation
  8. Discount
  9. Discretionary Access Control (DAC)
  10. Discussion Leadership
  11. Distributed Data Management Architecture (DDM)
  12. Distributed Management Task Force (DMTF)
  13. Distributed Relational Database Architecture (DRDA)
  14. Distributed System Object Model (DSOM)
  15. Document Modeling
  16. Downsizing
  17. Drakon Chart
  18. Dual Commitment
  19. Dual Inline Memory Module (DIMM)
  20. Dutch Auction
  21. Dynamic Data Exchange (DDE)
  22. Dynamic Dispatch
  23. Dynamic HTML
  24. Dynamic Link Library (DLL)
  25. Dynamic Pricing
  26. Dynamic Regression
  27. E3Value Methodology
  28. EFE Matrix (External Factor Evaluation Matrix)
  29. EProcurement
  30. ESourcing Capability Model (eSCM)
  31. ETOM
  32. Early Case Assessment (ECA)
  33. Early Data Assessment (EDA)
  34. Earnings Before Interest After Taxes (EBIAT)
  35. Economic Integration
  36. Economic Margin (EM)
  37. Economic Profit
  38. Effectiveness
  39. Efficiency Wage
  40. Efficient Consumer Response (ECR)
  41. Electronic Discovery (eDiscovery)
  42. Electronic Identity Verification (eIDV)
  43. Email Management (EMM)
  44. Emergent Strategy
  45. Empirical Process
  46. End-to-End Principle
  47. Enhanced Entity Relationship Model (EER Model)
  48. Enterprise Application
  49. Enterprise Feedback Management (EFM)
  50. Enterprise Function Diagram (EFD)
  51. Enterprise Goals
  52. Enterprise Information Portal (EIP)
  53. Enterprise Life Cycle
  54. Enterprise Ontology
  55. Enterprise Performance Life Cycle (EPLC)
  56. Enterprise Project Management (EPM)
  57. Enterprise Relationship Management (ERM)
  58. Enterprise Search
  59. Enterprise Workflow
  60. Entrepreneurial Government
  61. Environmental Factors
  62. Environmental Insurance
  63. Equivalence Partitioning
  64. Errors and Omissions Insurance
  65. Ethernet Card
  66. Event-Driven Process Chain (EPC)
  67. Everyday Low Pricing (EDLP)
  68. Excess Return (ER)
  69. Execution - Evaluation Cycle
  70. Execution as Learning
  71. Executive Compensation
  72. Executive Information System (EIS)
  73. Expected Value of Perfect Information
  74. Expense Center
  75. Experiential Learning
  76. Exponential Smoothing
  77. Extended Backus–Naur Form (EBNF)
  78. Extended Enterprise
  79. FCM (Factor-Criteria-Metrics) model
  80. FIPS (Federal Information Processing Standards)
  81. Face Value
  82. Facilitation Styles
  83. Facility Management
  84. Fact Based Modeling (FBM)
  85. Factory Gate Pricing
  86. Fair Value Accounting
  87. False Acceptance Ratio (FAR)
  88. False Consensus Bias
  89. Fatal Exception
  90. Fault Tree Analysis (FTA)
  91. Feature Detection
  92. Federal Internet Exchange (FIX)
  93. Federal Intrusion Detection Network (FIDNET)
  94. Feng's Classification
  95. Field Service Management (FSM)
  96. Financial Covenants
  97. FireWire
  98. Firmware
  99. First-In First-Out
  100. Fiscal Year
  101. Fixed Asset Management
  102. Flexible Organization
  103. Float (Project Management)
  104. Flow Control
  105. Flynn's Taxonomy
  106. Focus Group
  107. Folksonomy
  108. Foot in the Door
  109. Forced Compliance
  110. Forget, Borrow, Learn
  111. Formalization
  112. Forward Integration
  113. Fourteen Points of Management
  114. Free Cash Flow
  115. Free On Board
  116. Freeware
  117. French and Raven's Five Forms of Power
  118. Full Costing
  119. Function Hierarchy Diagram
  120. Function Points
  121. Functional Analysis
  122. Functional Economic Analysis (FEA)
  123. Functional Model
  124. Functional Size Measurement (FSM)
  125. Functional Software Architecture (FSA)
  126. Functional Team
  127. Future Pull
  128. Futures Contract
  129. GE Business Screen
  130. Garbage Can Model
  131. Gearing Ratio
  132. Generic Data Model
  133. GeoVMM
  134. Gigascale Integration (GSI)
  135. Gilder's Law
  136. Global Positioning System (GPS)
  137. Globalization Management System (GMS)
  138. Glocalization
  139. Graceful Degradation
  140. Green Computing
  141. Grey Knight
  142. Greyware
  143. Gross Revenue
  144. Growth-Share Matrix
  145. Growth Phase
  146. Guard Dog Theory
  147. Guerrilla Marketing
  148. Hagberg Model of Personal Power
  149. Handheld Device
  150. Handler's Classification
  151. Harvard Architecture
  152. Harvest Strategy
  153. Hawthorne Effect
  154. Heart Framework
  155. Hedge
  156. Hedging
  157. Heisenberg's Uncertainty Principle
  158. Helper Application
  159. Hertz (Hz, MHz, GHz)
  160. Heterogeneous Computing
  161. Heterogeneous Network
  162. Heterogeneous System Architecture
  163. Hierarchical-Input-Process-Output (HIPO) Mode
  164. Hierarchical Internetworking Model
  165. High Performance Workplace
  166. Hofstadter's Law
  167. Homogeneous Network
  168. Homoiconicity
  169. Horizontal Agreement
  170. Horizontal Merger
  171. Hospitality Management
  172. Hosted Virtual Desktops (HVD)
  173. Hub-and-Spoke Integration
  174. Human Performance Technology (HPT)
  175. Hypervisor
  176. Hypodermic Needle Theory
  177. IBM Academy of Technology (AoT)
  178. IFE Matrix (Internal Factor Evaluation Matrix)
  179. IPMA Competence Baseline (ICB)
  180. IS Strategy
  181. IT Chargeback Model
  182. IT Help Desk
  183. IT Productivity Paradox
  184. IT Value Model
  185. IUnknown Interface (COM)
  186. Identity Life Cycle Management (ILM)
  187. Illusion of Control Bias
  188. Impala Architecture
  189. Implementation Design
  190. Implementation Management
  191. Impression Management
  192. In-Transit Visiblity
  193. Incentives
  194. Incident
  195. Inclusive Value Measurement (IVM)
  196. Income Stock
  197. Independent Verification and Validation (IV&V)
  198. Index Fund
  199. Indicator
  200. Inductive Bias
  201. Inferior Goods
  202. Infomercial
  203. Informative Modeling
  204. Infrastructure Outsourcing
  205. Initiative for Policy Dialogue (IPD)
  206. Input-Output Model (I/O Model)
  207. Input-Process-Output (IPO) Model
  208. Inquiry Based Learning
  209. Insider Trading
  210. Institute of Electrical and Electronics Engineers (IEEE)
  211. Institutional Investors
  212. Instrumental Approach of Stakeholder Theory
  213. Insurance Application Architecture (IAA)
  214. Intangible Assets Monitor
  215. Integrated Application Lifecycle Management
  216. Integrated Business Planning (IBP)
  217. Integrated DEFinition Methods (IDEF)
  218. Integrated Marketing Communications
  219. Integration Appliance
  220. Integration Competency Center (ICC)
  221. Integration DEFinition for Information Modeling (IDEF1X)
  222. Integrative Thinking
  223. Intelligent ERP (i-ERP)
  224. Intelligent Process Automation (IPA)
  225. Intentional Change Theory (ICT)
  226. Interaction Overview Diagram
  227. Interaction Technique
  228. Intermediate Outcome
  229. Internal Systems
  230. International Electrotechnical Commission (IEC)
  231. International Telecommunication Union (ITU)
  232. Interpretive Strategy
  233. Interrelationship Diagraph
  234. Interrupt Request (IRQ)
  235. Invasion of Privacy
  236. Invested Capital
  237. Investment Center
  238. Iterative Design
  239. Iterative Development
  240. Ius in re
  241. JICNARS Scale
  242. Java Database Connectivity (JDBC)
  243. Java Message Service (JMS)
  244. Job Characteristics Theory
  245. Job Enlargement
  246. Job Enrichment
  247. Job Rotation
  248. Job Specialization
  249. Jour Fixe
  250. Just-World Effect
  251. Key Global Indicator (KGI)
  252. Key Success Factors (KSF)
  253. Killer Bees
  254. Knowledge Organization Systems (KOS)
  255. Korey's Model
  256. Kraljic Matrix
  257. LAMP Software
  258. Ladder of Inference
  259. Laffer Curve
  260. Lap Dog Theory
  261. Large Group Capacitation
  262. Last-In First-Out
  263. Learning Cycle
  264. Level 5 Leadership
  265. Leveraged Buy-out
  266. Leveraged Recapitalization
  267. Levers of Control
  268. Lexical Hypothesis
  269. Likert Management Systems
  270. Line of Business (LOB)
  271. Linear Economy
  272. Linear Strategy
  273. Lobster Trap
  274. Local Land and Property Gazetteer (LLPG)
  275. Logical Database Design
  276. Logical Incrementalism
  277. Loss Aversion Bias
  278. Loss Leader
  279. Low Ball Technique
  280. Loyalty Program
  281. MAGIC (Measuring and Accounting Intellectual Capital)
  282. MECE Principle
  283. MK II Method
  284. MLOps
  285. Macro Environment
  286. Main Page
  287. Managerial Development
  288. Managerial Value
  289. Managing Successful Programmes (MSP)
  290. Managing for Results Framework
  291. Mandatory Access Control (MAC)
  292. Marginal Costing
  293. Marginal Revenue
  294. Marginal Utility
  295. Market Perform
  296. Marketing Operations Management (MOM)
  297. Marketing Resource Management (MRM)
  298. Markus and Soh Process Model
  299. Material Resource Planning (MRP)
  300. Maturity Date
  301. Media Intelligence
  302. Medium-Scale Integration (MSI)
  303. Message Exchange Pattern (MEP)
  304. Messaging Patterns
  305. Meta Model
  306. Metadata Registry
  307. Metcalf's Law
  308. Metonymy
  309. MiL Model
  310. Microcredit
  311. Microfinance
  312. Microfinance Channel
  313. Microinsurance
  314. Mid-Point Differential
  315. Middle Management
  316. Milestone
  317. Mintzberg's 5Ps of Strategy
  318. Mirroring and Matching
  319. Mission Activities
  320. Mission Value
  321. Mixed System
  322. Model Driven Development (MDD)
  323. Model–View–ViewModel (MVVM)
  324. Modified Accrual Accounting
  325. Monetary Value
  326. Moore's Law
  327. Moral Purpose
  328. Morphological Analysis
  329. Multi-Attribute Utility Theory (MAUT)
  330. Multi Criteria Analysis (MCA)
  331. Multi Messaging Service (MMS)
  332. Multidimensional Expressions (MDX)
  333. Multiple Criteria Decision Analysis (MCDA)
  334. Multiple Sourcing
  335. Multipurpose Internet Mail Extensions (MIME)
  336. Multitasking Behavior
  337. Multitasking Consumer
  338. Multiway Data Analysis
  339. N7 (New 7 Tools)
  340. NATO Architecture Framework (NAF)
  341. NPVGO Model (Net Present Value Of Growth Opportunities)
  342. Nationalization
  343. NetBIOS (Network Basic Input/Output System)
  344. Net Revenue
  345. New Public Management (NPM)
  346. Niche Marketing
  347. Nielsen Ratings
  348. Nominal Value
  349. Non-Systemic Risk
  350. Non Fungible Token (NFT)
  351. Non Value-Added Work
  352. Normative Approach of Stakeholder Theory
  353. OBASHI
  354. OODA Loop
  355. OSS through Java™ (OSS/J™)
  356. Object-Role Modeling (ORM)
  357. Object Model
  358. Object Modeling Technique (OMT)
  359. Object Oriented Approach
  360. Objective Analysis Tree
  361. Off-Balance Sheet Financing
  362. Office of Strategy Management
  363. Offshore Development
  364. Offshore Development Model
  365. On-Demand Software
  366. One-to-one Marketing
  367. OneSource
  368. Online Corporate Reputation
  369. Online Transaction Processing (OLTP)
  370. Open Geospatial Consortium (OGC)
  371. Open Government Licence (OGL)
  372. Open Knowledge Initiative (OKI)
  373. Open Security Architecture (OSA) Framework
  374. Open Services for Lifecycle Collaboration (OSLC)
  375. Open Web Analytics (OWA)
  376. Operating Cash Flow
  377. Operating Income
  378. Operating Lease
  379. Operating Profit Percentage
  380. Operational Analytics
  381. Operational Business Intelligence (OBI)
  382. Operational Capacity
  383. Operational Data Store (ODS)
  384. Operational Design
  385. Operations Bridge
  386. Operations Development
  387. Operator Function Model
  388. Opinion Leader
  389. Orchestration
  390. Order Management
  391. Organizational Management
  392. Outcome-Driven Innovation (ODI)
  393. Outcome Management
  394. Outcome Measure
  395. Outplacement
  396. PAEI Management Model
  397. PARTS Model
  398. PEG Ratio
  399. POSDCORB
  400. PRIDE Methodology
  401. PRIMO-F Model
  402. PRINCE2®
  403. PROxy Based Estimating (PROBE)
  404. PURE Method
  405. Package Diagram
  406. Paper Prototyping
  407. Parallel Design
  408. Paralysis by Analysis
  409. Parametric Estimating
  410. Parent Company
  411. Parenting Advantage
  412. Pareto Chart
  413. Parkinson's Law
  414. Partner Interface Process (PIP)
  415. Path-Goal Theory
  416. Peak-End Rule
  417. Pearson Correlation Coefficient
  418. Peer-Appraisal
  419. Penetration Pricing
  420. Pension Parachute
  421. People, Process, Technology Framework
  422. People Analytics
  423. People Pill
  424. Perceived Value Pricing
  425. Percentage-of-Completion Method
  426. Performance Based Budgeting (PBB)
  427. Performance Indicator
  428. Peripheral Technology
  429. Perishability
  430. Permission Marketing
  431. Personal Belief Bias
  432. Persuasion Techniques
  433. Peter Principle
  434. Phantom Stock Plan
  435. Plug-in
  436. Point-To-Point Integration
  437. Point of Presence (POP)
  438. Poison Put
  439. Portable Network Graphics (PNG)
  440. Portfolio Agility
  441. Portfolio Insurance
  442. Positive Deviance
  443. Post Implementation Review
  444. Postmodern ERP
  445. Pre-Employment Screening
  446. Preboot Execution Environment (PXE)
  447. Precedence Diagram Method (PDM)
  448. Predictive Model Markup Language (PMML)
  449. Pressure Group
  450. Price Skimming
  451. Primary Customer
  452. Principal Component Analysis (PCA)
  453. Principles of Reinvention
  454. Prioritization Matrix
  455. Prisoner's Dilemma
  456. Private Equity
  457. Pro Forma Earnings
  458. Probability Distribution
  459. Procedure
  460. Procedure Manual
  461. Process Decision Program Chart
  462. Process Hierarchy Diagram
  463. Profile Diagram
  464. Profit Motive
  465. Profit Pools
  466. Profit and Loss Statement
  467. Profitability Ratios
  468. Project Planning Matrix
  469. Promotional Pricing
  470. Proof of Concept (POC)
  471. Proportional Voting
  472. Proprietary Software
  473. Protected Extensible Authentication Protocol (PEAP)
  474. Protected Health Information (PHI)
  475. Pseudocode
  476. Psychological Pricing
  477. Public Value
  478. Put Option
  479. Putnam Model
  480. Qualitative Investment Analysis
  481. Quantitative Investment Analysis
  482. QueryInterface
  483. Quick Response Manufacturing
  484. RAPID Approach
  485. RAP as a Service (RaaS)
  486. RFID Technology
  487. Rapid Application Development (RAD)
  488. Rapid Economic Justification (REJ™)
  489. Real-Time Business Intelligence (RTBI)
  490. Real-Time Enterprise (RTE)
  491. Real Business-Cycle Theory (RBC Theory)
  492. Real Options
  493. Rebalancing
  494. Recapitalization
  495. Recognition Heuristic (RH)
  496. Reconciliation
  497. Record Linkage
  498. Recruiting
  499. Recurrent Cascade-Correlation (RCC)
  500. Redemption Value

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)