Actions

Special

Long pages

Showing below up to 500 results in range #1,001 to #1,500.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎Value Delivery ‎[6,604 bytes]
  2. (hist) ‎Human Relations Theory ‎[6,604 bytes]
  3. (hist) ‎Symmetric Digital Subscriber Line (SDSL) ‎[6,602 bytes]
  4. (hist) ‎Semantic Interoperability ‎[6,598 bytes]
  5. (hist) ‎Conflict Resolution ‎[6,596 bytes]
  6. (hist) ‎The Environmental School of Strategy Formation ‎[6,592 bytes]
  7. (hist) ‎Sustainable Competitive Advantage ‎[6,591 bytes]
  8. (hist) ‎User-Centered Evaluation (UCE) ‎[6,588 bytes]
  9. (hist) ‎Work Process ‎[6,587 bytes]
  10. (hist) ‎Liability ‎[6,585 bytes]
  11. (hist) ‎Application Security Testing (AST) ‎[6,583 bytes]
  12. (hist) ‎VRIO Framework ‎[6,582 bytes]
  13. (hist) ‎Kaizen Philosophy ‎[6,572 bytes]
  14. (hist) ‎Corporate Social Responsibility (CSR) ‎[6,569 bytes]
  15. (hist) ‎CATWOE ‎[6,566 bytes]
  16. (hist) ‎Deductive Reasoning ‎[6,565 bytes]
  17. (hist) ‎Below the Fold ‎[6,553 bytes]
  18. (hist) ‎Business Requirements ‎[6,551 bytes]
  19. (hist) ‎Universal Description Discovery and Integration (UDDI) ‎[6,544 bytes]
  20. (hist) ‎Framework ‎[6,535 bytes]
  21. (hist) ‎Organizational Health Index (OHI) ‎[6,525 bytes]
  22. (hist) ‎Software Architecture Analysis Method (SAAM) ‎[6,524 bytes]
  23. (hist) ‎Business Diversification ‎[6,517 bytes]
  24. (hist) ‎Feedforward Neural Network ‎[6,512 bytes]
  25. (hist) ‎American National Standards Institute (ANSI) ‎[6,505 bytes]
  26. (hist) ‎Organizational Commitment Questionnaire (OCQ) ‎[6,503 bytes]
  27. (hist) ‎Reference Architecture ‎[6,502 bytes]
  28. (hist) ‎The Configuration School of Strategy Formation ‎[6,499 bytes]
  29. (hist) ‎Disaster recovery ‎[6,496 bytes]
  30. (hist) ‎Computing System ‎[6,495 bytes]
  31. (hist) ‎The Entrepreneurial School of Strategy Formation ‎[6,473 bytes]
  32. (hist) ‎Stakeholder ‎[6,472 bytes]
  33. (hist) ‎Total Cost of Ownership (TCO) ‎[6,471 bytes]
  34. (hist) ‎Benefit Cost Ratio (BCR) ‎[6,468 bytes]
  35. (hist) ‎Competitive Position ‎[6,446 bytes]
  36. (hist) ‎System ‎[6,441 bytes]
  37. (hist) ‎Discount ‎[6,433 bytes]
  38. (hist) ‎Splitter ‎[6,430 bytes]
  39. (hist) ‎Software Design ‎[6,425 bytes]
  40. (hist) ‎Metaplan Method ‎[6,425 bytes]
  41. (hist) ‎API Management ‎[6,417 bytes]
  42. (hist) ‎Structured Programming ‎[6,414 bytes]
  43. (hist) ‎Competitive Pricing ‎[6,409 bytes]
  44. (hist) ‎Marketing Campaign ‎[6,404 bytes]
  45. (hist) ‎Incident Management ‎[6,401 bytes]
  46. (hist) ‎Gartner Business Value Model ‎[6,400 bytes]
  47. (hist) ‎Business Mission ‎[6,399 bytes]
  48. (hist) ‎Data Storage ‎[6,392 bytes]
  49. (hist) ‎Outplacement ‎[6,391 bytes]
  50. (hist) ‎XML Schema ‎[6,391 bytes]
  51. (hist) ‎Rockart and Scott's Alignment Model ‎[6,389 bytes]
  52. (hist) ‎Glueck and Jauch's Strategic Management Model ‎[6,387 bytes]
  53. (hist) ‎COSO Internal Control Integrated Framework ‎[6,387 bytes]
  54. (hist) ‎The Learning School of Strategy Formation ‎[6,379 bytes]
  55. (hist) ‎Anti-Pattern ‎[6,378 bytes]
  56. (hist) ‎Gartner Magic Quadrant ‎[6,370 bytes]
  57. (hist) ‎Abstract Data Type ‎[6,370 bytes]
  58. (hist) ‎Accredited Standards Committee (ASC) ‎[6,366 bytes]
  59. (hist) ‎Market Positioning ‎[6,357 bytes]
  60. (hist) ‎Business Technology Management (BTM) ‎[6,355 bytes]
  61. (hist) ‎Data Center Infrastructure Management (DCIM) ‎[6,346 bytes]
  62. (hist) ‎Business Activity Monitoring (BAM) ‎[6,340 bytes]
  63. (hist) ‎Environmental Impact Assessment (EIA): ‎[6,338 bytes]
  64. (hist) ‎Threat Agent Risk Assessment (TARA) ‎[6,337 bytes]
  65. (hist) ‎Test Method ‎[6,337 bytes]
  66. (hist) ‎Enterprise Release Management (ERM) ‎[6,329 bytes]
  67. (hist) ‎Interpreted Language ‎[6,319 bytes]
  68. (hist) ‎Active Matrix Organic Light-Emitting Diodes (AMOLED) ‎[6,313 bytes]
  69. (hist) ‎Data Processing ‎[6,303 bytes]
  70. (hist) ‎Strategic Stakeholder Management ‎[6,301 bytes]
  71. (hist) ‎Five Case Model ‎[6,295 bytes]
  72. (hist) ‎Logic Programming ‎[6,290 bytes]
  73. (hist) ‎Causal Layered Analysis (CLA) ‎[6,288 bytes]
  74. (hist) ‎Web Server ‎[6,286 bytes]
  75. (hist) ‎Security Information Event Management (SIEM) ‎[6,285 bytes]
  76. (hist) ‎Reconciliation ‎[6,281 bytes]
  77. (hist) ‎Calibrated Probability Assessment ‎[6,268 bytes]
  78. (hist) ‎Advanced Mobile Phone Service (AMPS) ‎[6,265 bytes]
  79. (hist) ‎Intrusion Detection System (IDS) ‎[6,263 bytes]
  80. (hist) ‎Common Data Security Architecture (CDSA) ‎[6,257 bytes]
  81. (hist) ‎Cost Allocation ‎[6,255 bytes]
  82. (hist) ‎Object Oriented Methodology (OOM) ‎[6,245 bytes]
  83. (hist) ‎Twelve Principles of the Network Economy ‎[6,235 bytes]
  84. (hist) ‎Hybrid Online Analytical Processing (HOLAP) ‎[6,234 bytes]
  85. (hist) ‎Business Process Automation ‎[6,222 bytes]
  86. (hist) ‎Program Evaluation and Review Technique (PERT) ‎[6,219 bytes]
  87. (hist) ‎Call Option ‎[6,217 bytes]
  88. (hist) ‎Technology Assessment ‎[6,216 bytes]
  89. (hist) ‎Workflow ‎[6,211 bytes]
  90. (hist) ‎Charismatic Leadership ‎[6,209 bytes]
  91. (hist) ‎Encryption ‎[6,208 bytes]
  92. (hist) ‎IT Help Desk ‎[6,200 bytes]
  93. (hist) ‎Sell-Side Analyst ‎[6,196 bytes]
  94. (hist) ‎Object Oriented Modeling (OOM) ‎[6,195 bytes]
  95. (hist) ‎Diffusion of Innovation Theory ‎[6,194 bytes]
  96. (hist) ‎Lean Manufacturing ‎[6,182 bytes]
  97. (hist) ‎Intellectual Property ‎[6,174 bytes]
  98. (hist) ‎Declarative Programming ‎[6,168 bytes]
  99. (hist) ‎GE/McKinsey Matrix ‎[6,168 bytes]
  100. (hist) ‎Wheelen and Hunger's Strategic Management Model ‎[6,166 bytes]
  101. (hist) ‎Methodology ‎[6,162 bytes]
  102. (hist) ‎Effectiveness ‎[6,161 bytes]
  103. (hist) ‎Cross-Cultural Leadership ‎[6,157 bytes]
  104. (hist) ‎Agent Collaboration Tools ‎[6,151 bytes]
  105. (hist) ‎Cryptography ‎[6,137 bytes]
  106. (hist) ‎ITIL Service Value Chain (SVC) ‎[6,136 bytes]
  107. (hist) ‎Business Function Model ‎[6,134 bytes]
  108. (hist) ‎The Power School of Strategy Formation ‎[6,130 bytes]
  109. (hist) ‎Component-Based Development (CBD) ‎[6,124 bytes]
  110. (hist) ‎Team Leadership ‎[6,122 bytes]
  111. (hist) ‎Iterative Development ‎[6,118 bytes]
  112. (hist) ‎Web Development ‎[6,118 bytes]
  113. (hist) ‎Customer Perceived Value (CPV) ‎[6,117 bytes]
  114. (hist) ‎Background Process ‎[6,106 bytes]
  115. (hist) ‎Hyperautomation ‎[6,103 bytes]
  116. (hist) ‎Employee Retention ‎[6,101 bytes]
  117. (hist) ‎Shareholder Theory ‎[6,097 bytes]
  118. (hist) ‎Value ‎[6,094 bytes]
  119. (hist) ‎Point of Sale (POS) ‎[6,077 bytes]
  120. (hist) ‎Credit Scoring ‎[6,075 bytes]
  121. (hist) ‎Gartner ‎[6,073 bytes]
  122. (hist) ‎Serverless Architecture ‎[6,072 bytes]
  123. (hist) ‎Conformity Assessment ‎[6,069 bytes]
  124. (hist) ‎Business Process Analytics ‎[6,069 bytes]
  125. (hist) ‎Cognitive Walkthrough Method ‎[6,065 bytes]
  126. (hist) ‎Operational Risk Management (ORM) ‎[6,053 bytes]
  127. (hist) ‎The POSEC Method ‎[6,038 bytes]
  128. (hist) ‎Target ‎[6,034 bytes]
  129. (hist) ‎Resource Allocation ‎[6,033 bytes]
  130. (hist) ‎The Cultural School of Strategy Formation ‎[6,033 bytes]
  131. (hist) ‎Anchoring Bias ‎[6,033 bytes]
  132. (hist) ‎Hybrid Cloud ‎[6,020 bytes]
  133. (hist) ‎Innovation Economics ‎[6,016 bytes]
  134. (hist) ‎Pivot Table ‎[6,014 bytes]
  135. (hist) ‎Database Management System (DBMS) ‎[6,007 bytes]
  136. (hist) ‎Total Addressable Market (TAM) ‎[6,001 bytes]
  137. (hist) ‎Commodity Computing ‎[5,989 bytes]
  138. (hist) ‎Procedural Programming ‎[5,971 bytes]
  139. (hist) ‎Efficient Consumer Response (ECR) ‎[5,971 bytes]
  140. (hist) ‎Program Management ‎[5,969 bytes]
  141. (hist) ‎Consumer Behavior ‎[5,963 bytes]
  142. (hist) ‎Organizational Agility ‎[5,955 bytes]
  143. (hist) ‎Stewardship Theory ‎[5,951 bytes]
  144. (hist) ‎Target Marketing ‎[5,938 bytes]
  145. (hist) ‎Application Infrastructure Suite (AIS) ‎[5,938 bytes]
  146. (hist) ‎Advanced Technology Attachment (ATA) ‎[5,928 bytes]
  147. (hist) ‎Parent Company ‎[5,926 bytes]
  148. (hist) ‎Software Development Kit (SDK) ‎[5,922 bytes]
  149. (hist) ‎Run time (Program Lifecycle Phase) ‎[5,920 bytes]
  150. (hist) ‎Business Process Modeling ‎[5,919 bytes]
  151. (hist) ‎Earned Schedule (ES) ‎[5,908 bytes]
  152. (hist) ‎Business Process Specification Schema (BPSS) ‎[5,907 bytes]
  153. (hist) ‎Basel I ‎[5,900 bytes]
  154. (hist) ‎BIOS (Basic Input/Output System) ‎[5,898 bytes]
  155. (hist) ‎Compensation ‎[5,897 bytes]
  156. (hist) ‎Object Modeling Technique (OMT) ‎[5,892 bytes]
  157. (hist) ‎Switch Framework ‎[5,887 bytes]
  158. (hist) ‎Business Interruption Insurance ‎[5,881 bytes]
  159. (hist) ‎SOSTAC® Planning Model ‎[5,875 bytes]
  160. (hist) ‎Bandwidth ‎[5,873 bytes]
  161. (hist) ‎Wi-Fi Network ‎[5,866 bytes]
  162. (hist) ‎Dimensions of Relational Work ‎[5,859 bytes]
  163. (hist) ‎Margin Analysis ‎[5,857 bytes]
  164. (hist) ‎Concept Driven Strategy ‎[5,856 bytes]
  165. (hist) ‎Agent Systems Reference Model (ASRM) ‎[5,849 bytes]
  166. (hist) ‎Procedure Manual ‎[5,848 bytes]
  167. (hist) ‎Action Logic ‎[5,848 bytes]
  168. (hist) ‎Business Process Analysis ‎[5,847 bytes]
  169. (hist) ‎Futures Contract ‎[5,842 bytes]
  170. (hist) ‎Market Segmentation ‎[5,838 bytes]
  171. (hist) ‎Universal Strategy Formulation Model (USFM) ‎[5,830 bytes]
  172. (hist) ‎Synchronous Optical Network (SONET) ‎[5,828 bytes]
  173. (hist) ‎Telnet ‎[5,822 bytes]
  174. (hist) ‎Imperative Programming ‎[5,815 bytes]
  175. (hist) ‎Gartner's PACE Layered Application Strategy ‎[5,814 bytes]
  176. (hist) ‎Business Rules Engine (BRE) ‎[5,810 bytes]
  177. (hist) ‎Dividend Growth Model ‎[5,809 bytes]
  178. (hist) ‎Democratic Leadership ‎[5,808 bytes]
  179. (hist) ‎Online Analytical Processing (OLAP) ‎[5,805 bytes]
  180. (hist) ‎Computer Architecture ‎[5,793 bytes]
  181. (hist) ‎Closed Source Software ‎[5,792 bytes]
  182. (hist) ‎Performance Analysis ‎[5,788 bytes]
  183. (hist) ‎Data Buffer ‎[5,785 bytes]
  184. (hist) ‎Incident ‎[5,783 bytes]
  185. (hist) ‎Dimension Reduction ‎[5,780 bytes]
  186. (hist) ‎Advanced Manufacturing ‎[5,779 bytes]
  187. (hist) ‎Authentication ‎[5,779 bytes]
  188. (hist) ‎Low Level Language ‎[5,776 bytes]
  189. (hist) ‎Customer Dynamics ‎[5,776 bytes]
  190. (hist) ‎Control Activities ‎[5,773 bytes]
  191. (hist) ‎Dividend Discount Model ‎[5,765 bytes]
  192. (hist) ‎Applied Analytics ‎[5,765 bytes]
  193. (hist) ‎Web Services Business Process Execution Language (WS-BPEL) ‎[5,764 bytes]
  194. (hist) ‎Treasury Enterprise Architecture Framework (TEAF) ‎[5,761 bytes]
  195. (hist) ‎Organizational Capacity ‎[5,752 bytes]
  196. (hist) ‎Cost Leadership ‎[5,749 bytes]
  197. (hist) ‎Delphi Method ‎[5,748 bytes]
  198. (hist) ‎Electronic Data Processing (EDP) ‎[5,746 bytes]
  199. (hist) ‎Aerial and Digital Imagery ‎[5,746 bytes]
  200. (hist) ‎E-Business ‎[5,745 bytes]
  201. (hist) ‎Risk Mitigation ‎[5,739 bytes]
  202. (hist) ‎Simple Network Management Protocol (SNMP) ‎[5,728 bytes]
  203. (hist) ‎Profitability ‎[5,726 bytes]
  204. (hist) ‎Access Control Facility (ACF2) ‎[5,721 bytes]
  205. (hist) ‎Diminishing Marginal Returns ‎[5,709 bytes]
  206. (hist) ‎Intrusion Detection Prevention (IDS) ‎[5,707 bytes]
  207. (hist) ‎Big Data Integration ‎[5,698 bytes]
  208. (hist) ‎Connection Speed ‎[5,696 bytes]
  209. (hist) ‎Service Provisioning Optimization (SPO) ‎[5,695 bytes]
  210. (hist) ‎Network Access Server (NAS) ‎[5,692 bytes]
  211. (hist) ‎Electronic Discovery Reference Model (EDRM) ‎[5,691 bytes]
  212. (hist) ‎The Principle of Causality ‎[5,691 bytes]
  213. (hist) ‎DIKW Pyramid ‎[5,688 bytes]
  214. (hist) ‎Applied Behavior Analysis (ABA) ‎[5,687 bytes]
  215. (hist) ‎Analytic Hierarchy Process Framework (AHP) ‎[5,681 bytes]
  216. (hist) ‎Weill Ross Framework ‎[5,673 bytes]
  217. (hist) ‎Strategic Goal ‎[5,672 bytes]
  218. (hist) ‎Spin-Off ‎[5,667 bytes]
  219. (hist) ‎Andrew's Model ‎[5,666 bytes]
  220. (hist) ‎Common Object Request Broker Architecture (CORBA) ‎[5,656 bytes]
  221. (hist) ‎Two Factor Theory ‎[5,646 bytes]
  222. (hist) ‎Efficiency ‎[5,644 bytes]
  223. (hist) ‎Behavioral Pattern ‎[5,627 bytes]
  224. (hist) ‎Cost Justification ‎[5,625 bytes]
  225. (hist) ‎Mass Customization ‎[5,612 bytes]
  226. (hist) ‎The Relational Model (RM) ‎[5,608 bytes]
  227. (hist) ‎Operations Bridge ‎[5,603 bytes]
  228. (hist) ‎Collaboration Diagram ‎[5,603 bytes]
  229. (hist) ‎Servant Leadership ‎[5,596 bytes]
  230. (hist) ‎Enterprise Performance Life Cycle (EPLC) ‎[5,592 bytes]
  231. (hist) ‎Throughput Analysis ‎[5,586 bytes]
  232. (hist) ‎The Gramm–Leach–Bliley Act (GLBA) ‎[5,585 bytes]
  233. (hist) ‎Top-Level Domain (TLD) ‎[5,585 bytes]
  234. (hist) ‎Direct Response Marketing ‎[5,584 bytes]
  235. (hist) ‎Causal Ambiguity ‎[5,581 bytes]
  236. (hist) ‎The DIKW Model ‎[5,581 bytes]
  237. (hist) ‎Information Infrastucture ‎[5,576 bytes]
  238. (hist) ‎ECMAScript ‎[5,574 bytes]
  239. (hist) ‎Diamond Model ‎[5,571 bytes]
  240. (hist) ‎Customer Intelligence (CI) ‎[5,564 bytes]
  241. (hist) ‎Business Process Query Language (BPQL) ‎[5,564 bytes]
  242. (hist) ‎Collaborative Master Data Management (CMDM) ‎[5,562 bytes]
  243. (hist) ‎Infrastructure as Code (IaC) ‎[5,560 bytes]
  244. (hist) ‎Project Charter ‎[5,554 bytes]
  245. (hist) ‎Intranet ‎[5,552 bytes]
  246. (hist) ‎Programming Paradigm ‎[5,545 bytes]
  247. (hist) ‎Server-Side Scripting ‎[5,540 bytes]
  248. (hist) ‎IT Oganization Modeling and Assessment Tool (ITOMA) ‎[5,540 bytes]
  249. (hist) ‎Profit Pools ‎[5,537 bytes]
  250. (hist) ‎Adaptable Organization ‎[5,532 bytes]
  251. (hist) ‎Mandatory Access Control (MAC) ‎[5,526 bytes]
  252. (hist) ‎Direct Economic Impact ‎[5,522 bytes]
  253. (hist) ‎Mintzberg's 5Ps of Strategy ‎[5,516 bytes]
  254. (hist) ‎Facilitative Leadership ‎[5,509 bytes]
  255. (hist) ‎Concept of Operations (CONOP) ‎[5,508 bytes]
  256. (hist) ‎Attribution ‎[5,508 bytes]
  257. (hist) ‎8D Problem Solving ‎[5,504 bytes]
  258. (hist) ‎The Problem Definition Process ‎[5,503 bytes]
  259. (hist) ‎Digital Solutions Provider ‎[5,495 bytes]
  260. (hist) ‎Organizational Assessment ‎[5,493 bytes]
  261. (hist) ‎Diminishing Marginal Productivity ‎[5,491 bytes]
  262. (hist) ‎Advanced Research Projects Agency Network (ARPANET) ‎[5,490 bytes]
  263. (hist) ‎Organizational Diagnosis ‎[5,484 bytes]
  264. (hist) ‎Composite Structure Diagram ‎[5,482 bytes]
  265. (hist) ‎7MP (7 Management and Planning Tools) ‎[5,480 bytes]
  266. (hist) ‎Vital Business Function (VBF) ‎[5,479 bytes]
  267. (hist) ‎Consumer Confidence ‎[5,478 bytes]
  268. (hist) ‎Structured Data ‎[5,473 bytes]
  269. (hist) ‎Dividend Payout Ratio ‎[5,472 bytes]
  270. (hist) ‎Aggregate Demand ‎[5,472 bytes]
  271. (hist) ‎JavaScript ‎[5,470 bytes]
  272. (hist) ‎Abstract Syntax Notation One (ASN.1) ‎[5,467 bytes]
  273. (hist) ‎Data Sharing ‎[5,464 bytes]
  274. (hist) ‎Tactical Plan ‎[5,463 bytes]
  275. (hist) ‎Economic Capital (ECAP) ‎[5,456 bytes]
  276. (hist) ‎8 Hidden Needs ‎[5,455 bytes]
  277. (hist) ‎Collaborative Planning, Forecasting and Replenishment (CPFR) ‎[5,448 bytes]
  278. (hist) ‎Operational Level Agreement (OLA) ‎[5,444 bytes]
  279. (hist) ‎Point-to-Point Protocol (PPP) ‎[5,442 bytes]
  280. (hist) ‎Digital Connectivism ‎[5,430 bytes]
  281. (hist) ‎Firmware ‎[5,421 bytes]
  282. (hist) ‎Measurement ‎[5,419 bytes]
  283. (hist) ‎Geographic Information System (GIS) ‎[5,416 bytes]
  284. (hist) ‎Managed Service Provider (MSP) ‎[5,410 bytes]
  285. (hist) ‎Investment Management Lifecycle ‎[5,410 bytes]
  286. (hist) ‎Vendor-Neutral ‎[5,409 bytes]
  287. (hist) ‎Operational Analytics ‎[5,401 bytes]
  288. (hist) ‎American Medical Informatics Association (AMIA) ‎[5,401 bytes]
  289. (hist) ‎BPM Everywhere (BPME) ‎[5,400 bytes]
  290. (hist) ‎Direct Costing ‎[5,398 bytes]
  291. (hist) ‎SERVQUAL ‎[5,395 bytes]
  292. (hist) ‎Accounts Receivable Factoring (FACTORING) ‎[5,388 bytes]
  293. (hist) ‎Value Risk Matrix (VRM) ‎[5,367 bytes]
  294. (hist) ‎Addressable TV Advertising ‎[5,362 bytes]
  295. (hist) ‎Theory of Inventive Problem Solving ‎[5,356 bytes]
  296. (hist) ‎Brand Value ‎[5,355 bytes]
  297. (hist) ‎Say's Law ‎[5,354 bytes]
  298. (hist) ‎MLOps ‎[5,345 bytes]
  299. (hist) ‎Investment Center ‎[5,339 bytes]
  300. (hist) ‎International Accounting Standards (IAS) ‎[5,318 bytes]
  301. (hist) ‎Information Technology Systems ‎[5,316 bytes]
  302. (hist) ‎Compiled Language ‎[5,313 bytes]
  303. (hist) ‎Analogical Strategic Reasoning ‎[5,313 bytes]
  304. (hist) ‎Cost Accounting Standards (CAS) ‎[5,310 bytes]
  305. (hist) ‎Data Source ‎[5,302 bytes]
  306. (hist) ‎Investment ‎[5,299 bytes]
  307. (hist) ‎Modem ‎[5,298 bytes]
  308. (hist) ‎Request for Tenders (RFT) ‎[5,296 bytes]
  309. (hist) ‎Data Breach ‎[5,288 bytes]
  310. (hist) ‎Task Management ‎[5,284 bytes]
  311. (hist) ‎Agile Absorption ‎[5,282 bytes]
  312. (hist) ‎Asset Turnover Ratio ‎[5,272 bytes]
  313. (hist) ‎Vocabulary of Interlinked Datasets (VoID) ‎[5,271 bytes]
  314. (hist) ‎N7 (New 7 Tools) ‎[5,270 bytes]
  315. (hist) ‎IT Governance Framework ‎[5,266 bytes]
  316. (hist) ‎Budgeted Cost of Work Performed (BCWP) ‎[5,265 bytes]
  317. (hist) ‎Pyramid Principle ‎[5,260 bytes]
  318. (hist) ‎Network Performance Management (NPM) ‎[5,256 bytes]
  319. (hist) ‎The Interaction Framework ‎[5,254 bytes]
  320. (hist) ‎The Disciplined Agile (DA) Framework ‎[5,253 bytes]
  321. (hist) ‎Action Research ‎[5,253 bytes]
  322. (hist) ‎Commercial off-the-shelf (COTS) ‎[5,250 bytes]
  323. (hist) ‎Economic Model ‎[5,246 bytes]
  324. (hist) ‎Information Technology Implementation (IT Implementation) ‎[5,244 bytes]
  325. (hist) ‎DICE Framework ‎[5,237 bytes]
  326. (hist) ‎Asymmetric Digital Subscriber Line (ADSL) ‎[5,231 bytes]
  327. (hist) ‎Service Request ‎[5,222 bytes]
  328. (hist) ‎Days Payable Outstanding ‎[5,222 bytes]
  329. (hist) ‎Value Streams ‎[5,219 bytes]
  330. (hist) ‎The Star Model ‎[5,214 bytes]
  331. (hist) ‎Risk Assessment Framework (RAF) ‎[5,213 bytes]
  332. (hist) ‎Software Defined Networking (SDN) ‎[5,184 bytes]
  333. (hist) ‎Customer Modeling ‎[5,178 bytes]
  334. (hist) ‎Cultural Dimensions ‎[5,175 bytes]
  335. (hist) ‎S-Curve ‎[5,163 bytes]
  336. (hist) ‎Lewin/Schein's Change Theory ‎[5,162 bytes]
  337. (hist) ‎Enhanced Entity Relationship Model (EER Model) ‎[5,161 bytes]
  338. (hist) ‎Normative Approach of Stakeholder Theory ‎[5,159 bytes]
  339. (hist) ‎Factor Endowments ‎[5,155 bytes]
  340. (hist) ‎Development Environment ‎[5,151 bytes]
  341. (hist) ‎Dividend ‎[5,150 bytes]
  342. (hist) ‎CIO Wiki:General disclaimer ‎[5,146 bytes]
  343. (hist) ‎Strategy Markup Language (StratML) ‎[5,132 bytes]
  344. (hist) ‎Caching ‎[5,124 bytes]
  345. (hist) ‎Data Loss Prevention (DLP) ‎[5,120 bytes]
  346. (hist) ‎Federal Enterprise Architecture Framework (FEA) ‎[5,115 bytes]
  347. (hist) ‎ACT-IAC ‎[5,109 bytes]
  348. (hist) ‎Expense ‎[5,106 bytes]
  349. (hist) ‎10 Commandments for Media Consumers ‎[5,103 bytes]
  350. (hist) ‎General Systems Theory (GST) ‎[5,085 bytes]
  351. (hist) ‎Strategic Planning Cycle ‎[5,075 bytes]
  352. (hist) ‎Conditional Probability ‎[5,074 bytes]
  353. (hist) ‎Variable Costs ‎[5,070 bytes]
  354. (hist) ‎Advertising ‎[5,069 bytes]
  355. (hist) ‎Correlation Architecture ‎[5,068 bytes]
  356. (hist) ‎Common Vulnerabilities and Exposures (CVE) ‎[5,067 bytes]
  357. (hist) ‎Standardized Approach ‎[5,064 bytes]
  358. (hist) ‎Business Systems Planning (BSP) ‎[5,056 bytes]
  359. (hist) ‎Employer Brand ‎[5,047 bytes]
  360. (hist) ‎Two Step Flow Model ‎[5,047 bytes]
  361. (hist) ‎Conceptual Data Model ‎[5,040 bytes]
  362. (hist) ‎Mobile Strategy ‎[5,034 bytes]
  363. (hist) ‎Profit ‎[5,029 bytes]
  364. (hist) ‎Intelligent Process Automation (IPA) ‎[5,028 bytes]
  365. (hist) ‎Performance Goal ‎[5,016 bytes]
  366. (hist) ‎Boundaryless Organization ‎[5,009 bytes]
  367. (hist) ‎RCSA (Risk Control Self Assessment) ‎[5,002 bytes]
  368. (hist) ‎Adaptive Enterprise Framework (AEF) ‎[4,999 bytes]
  369. (hist) ‎Mass Communication Theories ‎[4,993 bytes]
  370. (hist) ‎Content Assembly Mechanism (CAM) ‎[4,992 bytes]
  371. (hist) ‎Bass Diffusion Model ‎[4,979 bytes]
  372. (hist) ‎Insurance Application Architecture (IAA) ‎[4,977 bytes]
  373. (hist) ‎The Eisenhower Method ‎[4,976 bytes]
  374. (hist) ‎Advertisement Action ‎[4,973 bytes]
  375. (hist) ‎Strategic Alignment Maturity Model ‎[4,970 bytes]
  376. (hist) ‎Tacit Knowledge ‎[4,967 bytes]
  377. (hist) ‎Formalization ‎[4,965 bytes]
  378. (hist) ‎Business Process Model ‎[4,955 bytes]
  379. (hist) ‎Computer Supported Cooperative Work (CSCW) ‎[4,954 bytes]
  380. (hist) ‎Belbin Team Roles ‎[4,937 bytes]
  381. (hist) ‎Strategy Visualization ‎[4,930 bytes]
  382. (hist) ‎Model ‎[4,929 bytes]
  383. (hist) ‎Quality Function Deployment ‎[4,929 bytes]
  384. (hist) ‎Common Lisp Object System (CLOS) ‎[4,922 bytes]
  385. (hist) ‎Web Services ‎[4,912 bytes]
  386. (hist) ‎Messaging Standard ‎[4,911 bytes]
  387. (hist) ‎IT Standard (Information Technology Standard) ‎[4,907 bytes]
  388. (hist) ‎User Experience Design (UX) ‎[4,895 bytes]
  389. (hist) ‎Invasion of Privacy ‎[4,891 bytes]
  390. (hist) ‎Impact Mapping ‎[4,884 bytes]
  391. (hist) ‎Flow Chart ‎[4,882 bytes]
  392. (hist) ‎Financial Analysis ‎[4,874 bytes]
  393. (hist) ‎Terms of Reference ‎[4,873 bytes]
  394. (hist) ‎Acid Test Ratio ‎[4,872 bytes]
  395. (hist) ‎Institutional Investors ‎[4,868 bytes]
  396. (hist) ‎Informative Modeling ‎[4,867 bytes]
  397. (hist) ‎Collaborative Computing ‎[4,865 bytes]
  398. (hist) ‎Ad Ops ‎[4,863 bytes]
  399. (hist) ‎Collaborative Commerce (C-Commerce) ‎[4,859 bytes]
  400. (hist) ‎Algorithm ‎[4,857 bytes]
  401. (hist) ‎Unified Modeling Language (UML) ‎[4,852 bytes]
  402. (hist) ‎Days Sales Outstanding ‎[4,849 bytes]
  403. (hist) ‎Business Support System (BSS) ‎[4,844 bytes]
  404. (hist) ‎Process Improvement Methodologies ‎[4,837 bytes]
  405. (hist) ‎Transactional Leadership ‎[4,835 bytes]
  406. (hist) ‎Consumption ‎[4,833 bytes]
  407. (hist) ‎Big Five Personality Traits ‎[4,833 bytes]
  408. (hist) ‎Customer Feedback ‎[4,825 bytes]
  409. (hist) ‎Data Lake ‎[4,821 bytes]
  410. (hist) ‎TCP/IP (Transmission Control Protocol/Internet Protocol) ‎[4,818 bytes]
  411. (hist) ‎Trajectories of Industry Change ‎[4,816 bytes]
  412. (hist) ‎Statistical Process Control (SPC) ‎[4,802 bytes]
  413. (hist) ‎Process Analytics ‎[4,793 bytes]
  414. (hist) ‎Buyback Insurance ‎[4,793 bytes]
  415. (hist) ‎Co-opetition ‎[4,784 bytes]
  416. (hist) ‎Electronic Document Management System (EDMS) ‎[4,783 bytes]
  417. (hist) ‎Information ‎[4,779 bytes]
  418. (hist) ‎Transnational Strategy ‎[4,778 bytes]
  419. (hist) ‎Microeconomic Theory ‎[4,770 bytes]
  420. (hist) ‎Venture Capital ‎[4,764 bytes]
  421. (hist) ‎DMADV Framework ‎[4,756 bytes]
  422. (hist) ‎Application Modernization Services ‎[4,754 bytes]
  423. (hist) ‎Attribution Theory ‎[4,753 bytes]
  424. (hist) ‎Agile NeoRAD ‎[4,753 bytes]
  425. (hist) ‎Profit and Loss Statement ‎[4,752 bytes]
  426. (hist) ‎Business Process Outsourcing (BPO) ‎[4,751 bytes]
  427. (hist) ‎Delta Model ‎[4,744 bytes]
  428. (hist) ‎Asset Management ‎[4,740 bytes]
  429. (hist) ‎IT Strategy Process ‎[4,738 bytes]
  430. (hist) ‎Active Listening ‎[4,728 bytes]
  431. (hist) ‎IT Value Model ‎[4,721 bytes]
  432. (hist) ‎Unaided Recall ‎[4,721 bytes]
  433. (hist) ‎Request for Quotation (RFQ) ‎[4,714 bytes]
  434. (hist) ‎Paired Comparison Analysis ‎[4,710 bytes]
  435. (hist) ‎Empirical Method ‎[4,708 bytes]
  436. (hist) ‎Conway's Law ‎[4,705 bytes]
  437. (hist) ‎Certo and Peter's Strategic Management Model ‎[4,683 bytes]
  438. (hist) ‎Operating Cost ‎[4,680 bytes]
  439. (hist) ‎Unstructured Data ‎[4,677 bytes]
  440. (hist) ‎Data Integration Framework (DIF) ‎[4,673 bytes]
  441. (hist) ‎Known Error ‎[4,671 bytes]
  442. (hist) ‎Computer Aided Software Engineering (CASE) ‎[4,671 bytes]
  443. (hist) ‎Transaction Workflow Innovation Standards Team (TWIST) ‎[4,670 bytes]
  444. (hist) ‎Network Optimization ‎[4,664 bytes]
  445. (hist) ‎Reference Data Management (RDM) ‎[4,664 bytes]
  446. (hist) ‎Mature Market ‎[4,663 bytes]
  447. (hist) ‎Performance Prism ‎[4,661 bytes]
  448. (hist) ‎Obligation Management ‎[4,660 bytes]
  449. (hist) ‎Input-Output Model (I/O Model) ‎[4,659 bytes]
  450. (hist) ‎Financial Ratio ‎[4,652 bytes]
  451. (hist) ‎Agent-Based Model (ABM) ‎[4,651 bytes]
  452. (hist) ‎Computer Worm ‎[4,651 bytes]
  453. (hist) ‎Collective Bargaining ‎[4,651 bytes]
  454. (hist) ‎Responsibility Assignment Matrix (RAM) ‎[4,648 bytes]
  455. (hist) ‎Strategy Process Steps ‎[4,645 bytes]
  456. (hist) ‎Sale and Leaseback ‎[4,645 bytes]
  457. (hist) ‎Full Costing ‎[4,642 bytes]
  458. (hist) ‎Product Data Management (PDM) ‎[4,641 bytes]
  459. (hist) ‎Ambient Advertising ‎[4,639 bytes]
  460. (hist) ‎Relationship Marketing ‎[4,637 bytes]
  461. (hist) ‎The Value Net Model ‎[4,630 bytes]
  462. (hist) ‎Action Priority Matrix (APM) ‎[4,630 bytes]
  463. (hist) ‎Iterative Design ‎[4,625 bytes]
  464. (hist) ‎Concept Programming ‎[4,623 bytes]
  465. (hist) ‎Chaordic Leadership ‎[4,623 bytes]
  466. (hist) ‎PRINCE2® ‎[4,621 bytes]
  467. (hist) ‎Content Delivery Network (CDN) ‎[4,621 bytes]
  468. (hist) ‎Infrastructure Architecture ‎[4,619 bytes]
  469. (hist) ‎Contract Optimization ‎[4,616 bytes]
  470. (hist) ‎Inquiry Based Learning ‎[4,607 bytes]
  471. (hist) ‎Operational Agility ‎[4,602 bytes]
  472. (hist) ‎Affinity Diagram ‎[4,601 bytes]
  473. (hist) ‎Construct Modeling ‎[4,597 bytes]
  474. (hist) ‎Randomness ‎[4,595 bytes]
  475. (hist) ‎Remote Infrastructure Management ‎[4,589 bytes]
  476. (hist) ‎5C's of Marketing Strategy ‎[4,589 bytes]
  477. (hist) ‎Market Development ‎[4,583 bytes]
  478. (hist) ‎Cloud Computing Governance ‎[4,579 bytes]
  479. (hist) ‎Information Technology Risk (IT Risk) ‎[4,576 bytes]
  480. (hist) ‎Virtual Machine (VM) ‎[4,573 bytes]
  481. (hist) ‎Remote Method Invocation (RMI) ‎[4,573 bytes]
  482. (hist) ‎Accounts Payable ‎[4,572 bytes]
  483. (hist) ‎Data Minimization ‎[4,566 bytes]
  484. (hist) ‎Operational Design ‎[4,564 bytes]
  485. (hist) ‎Concept Statement ‎[4,562 bytes]
  486. (hist) ‎Modular Programming ‎[4,561 bytes]
  487. (hist) ‎Impala Architecture ‎[4,552 bytes]
  488. (hist) ‎Restricted Stock ‎[4,550 bytes]
  489. (hist) ‎4S Web Marketing Mix Model ‎[4,546 bytes]
  490. (hist) ‎Thick Client ‎[4,543 bytes]
  491. (hist) ‎Tree Testing ‎[4,540 bytes]
  492. (hist) ‎Digital Reference ‎[4,539 bytes]
  493. (hist) ‎Standstill Agreement ‎[4,535 bytes]
  494. (hist) ‎Relational Database Management System (RDBMS) ‎[4,532 bytes]
  495. (hist) ‎Initial Public Offering (IPO) ‎[4,532 bytes]
  496. (hist) ‎Tertiary Sector ‎[4,532 bytes]
  497. (hist) ‎Latency Optimization ‎[4,529 bytes]
  498. (hist) ‎Non Fungible Token (NFT) ‎[4,527 bytes]
  499. (hist) ‎Content Management System (CMS) ‎[4,527 bytes]
  500. (hist) ‎Results-Based Leadership ‎[4,521 bytes]

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)