Actions

Special

Short pages

Showing below up to 250 results in range #1 to #250.

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎CIO Wiki:Privacy policy ‎[715 bytes]
  2. (hist) ‎Run time (Program Lifecycle Phase) ‎[733 bytes]
  3. (hist) ‎Team Leadership ‎[744 bytes]
  4. (hist) ‎Vocabulary of Interlinked Datasets (VoID) ‎[745 bytes]
  5. (hist) ‎Intelligent Process Automation (IPA) ‎[748 bytes]
  6. (hist) ‎Component-Based Development (CBD) ‎[754 bytes]
  7. (hist) ‎Shareholder Theory ‎[754 bytes]
  8. (hist) ‎Delphi Method ‎[755 bytes]
  9. (hist) ‎Feedforward Neural Network ‎[755 bytes]
  10. (hist) ‎Behavioral Pattern ‎[757 bytes]
  11. (hist) ‎Cost Justification ‎[760 bytes]
  12. (hist) ‎Vital Business Function (VBF) ‎[767 bytes]
  13. (hist) ‎Consumer Confidence ‎[770 bytes]
  14. (hist) ‎Object Oriented Modeling (OOM) ‎[774 bytes]
  15. (hist) ‎Control Activities ‎[779 bytes]
  16. (hist) ‎Facilitative Leadership ‎[785 bytes]
  17. (hist) ‎Economic Capital (ECAP) ‎[792 bytes]
  18. (hist) ‎Stewardship Theory ‎[796 bytes]
  19. (hist) ‎Business Process Query Language (BPQL) ‎[799 bytes]
  20. (hist) ‎Democratic Leadership ‎[802 bytes]
  21. (hist) ‎Business Process Analysis ‎[802 bytes]
  22. (hist) ‎Operational Analytics ‎[804 bytes]
  23. (hist) ‎Value Risk Matrix (VRM) ‎[813 bytes]
  24. (hist) ‎Innovation Economics ‎[814 bytes]
  25. (hist) ‎Application Infrastructure Suite (AIS) ‎[815 bytes]
  26. (hist) ‎General Systems Theory (GST) ‎[816 bytes]
  27. (hist) ‎Analytic Hierarchy Process Framework (AHP) ‎[832 bytes]
  28. (hist) ‎Managed Service Provider (MSP) ‎[832 bytes]
  29. (hist) ‎The N7 and 7MP Tools ‎[836 bytes]
  30. (hist) ‎RCSA (Risk Control Self Assessment) ‎[838 bytes]
  31. (hist) ‎Service Request ‎[840 bytes]
  32. (hist) ‎Transactional Leadership ‎[850 bytes]
  33. (hist) ‎Universal Strategy Formulation Model (USFM) ‎[854 bytes]
  34. (hist) ‎Empirical Method ‎[870 bytes]
  35. (hist) ‎Commercial off-the-shelf (COTS) ‎[874 bytes]
  36. (hist) ‎Lewin/Schein's Change Theory ‎[874 bytes]
  37. (hist) ‎Attribution Theory ‎[879 bytes]
  38. (hist) ‎Quality Management Maturity Grid (QMMG) ‎[879 bytes]
  39. (hist) ‎Object Modeling Technique (OMT) ‎[880 bytes]
  40. (hist) ‎Top-Level Domain (TLD) ‎[885 bytes]
  41. (hist) ‎Applied Analytics ‎[886 bytes]
  42. (hist) ‎Procedure Manual ‎[889 bytes]
  43. (hist) ‎DIKW Pyramid ‎[890 bytes]
  44. (hist) ‎Compensation ‎[893 bytes]
  45. (hist) ‎Enterprise Release Management (ERM) ‎[893 bytes]
  46. (hist) ‎Causal Ambiguity ‎[895 bytes]
  47. (hist) ‎Commodity Computing ‎[898 bytes]
  48. (hist) ‎Variable Costs ‎[899 bytes]
  49. (hist) ‎Application Lifecycle Framework ‎[900 bytes]
  50. (hist) ‎Kano Model ‎[902 bytes]
  51. (hist) ‎Flexible Organization ‎[903 bytes]
  52. (hist) ‎Procedure ‎[905 bytes]
  53. (hist) ‎ArchiMate ‎[912 bytes]
  54. (hist) ‎Art of War ‎[915 bytes]
  55. (hist) ‎Rapid Economic Justification (REJ™) ‎[915 bytes]
  56. (hist) ‎.MDB File Format ‎[916 bytes]
  57. (hist) ‎Standard Cost Pricing ‎[916 bytes]
  58. (hist) ‎Plesiochronous Digital Hierarchy (PDH) ‎[916 bytes]
  59. (hist) ‎Operational Support Services (OSS) ‎[918 bytes]
  60. (hist) ‎.NET Enterprise Server ‎[919 bytes]
  61. (hist) ‎Autocratic Leadership ‎[923 bytes]
  62. (hist) ‎Website Wireframe ‎[932 bytes]
  63. (hist) ‎Service-Based Costing ‎[933 bytes]
  64. (hist) ‎Tangible Book Value ‎[937 bytes]
  65. (hist) ‎Requirement ‎[938 bytes]
  66. (hist) ‎Cascading Style Sheet (CSS) ‎[945 bytes]
  67. (hist) ‎Reservoir Approach ‎[945 bytes]
  68. (hist) ‎3D Modeling ‎[946 bytes]
  69. (hist) ‎Boil the Ocean ‎[949 bytes]
  70. (hist) ‎SCOR (Supply Chain Operations Reference Model) ‎[954 bytes]
  71. (hist) ‎IP Network ‎[955 bytes]
  72. (hist) ‎Yottabyte ‎[956 bytes]
  73. (hist) ‎Usability ‎[961 bytes]
  74. (hist) ‎Audio Messaging Interchange Specification (AMIS) ‎[962 bytes]
  75. (hist) ‎Intrusion Prevention System (IPS) ‎[963 bytes]
  76. (hist) ‎Asset Liability Management (ALM) ‎[964 bytes]
  77. (hist) ‎Blind Spot Analysis ‎[966 bytes]
  78. (hist) ‎Strategic Priorities ‎[966 bytes]
  79. (hist) ‎Organogram ‎[967 bytes]
  80. (hist) ‎Zeta Architecture ‎[970 bytes]
  81. (hist) ‎Barriers to Entry ‎[971 bytes]
  82. (hist) ‎Adaptive Control ‎[974 bytes]
  83. (hist) ‎Business Process Discovery ‎[975 bytes]
  84. (hist) ‎Five Whys ‎[986 bytes]
  85. (hist) ‎Product Personalization ‎[990 bytes]
  86. (hist) ‎Minimum Viable Product (MVP) ‎[995 bytes]
  87. (hist) ‎Workflow Reference Model ‎[1,000 bytes]
  88. (hist) ‎People, Process, Technology Framework ‎[1,002 bytes]
  89. (hist) ‎Internal Systems ‎[1,002 bytes]
  90. (hist) ‎Audit Trail ‎[1,005 bytes]
  91. (hist) ‎Financial Services Function Model (FSFM) ‎[1,008 bytes]
  92. (hist) ‎Bottom of the Pyramid (BOP) ‎[1,009 bytes]
  93. (hist) ‎Deliverable ‎[1,009 bytes]
  94. (hist) ‎Baseline ‎[1,010 bytes]
  95. (hist) ‎Binary Code ‎[1,017 bytes]
  96. (hist) ‎Application Service Provider (ASP) ‎[1,019 bytes]
  97. (hist) ‎Transition Methodology ‎[1,019 bytes]
  98. (hist) ‎Binary Digit (Bit) ‎[1,021 bytes]
  99. (hist) ‎Single Customer View ‎[1,026 bytes]
  100. (hist) ‎Box-Jenkins Method ‎[1,027 bytes]
  101. (hist) ‎Solutions Provider ‎[1,027 bytes]
  102. (hist) ‎Gartner Score ‎[1,029 bytes]
  103. (hist) ‎Yield to Maturity ‎[1,030 bytes]
  104. (hist) ‎Working Capital ‎[1,034 bytes]
  105. (hist) ‎Bitcoin ‎[1,041 bytes]
  106. (hist) ‎Guard Dog Theory ‎[1,041 bytes]
  107. (hist) ‎Backbone ‎[1,043 bytes]
  108. (hist) ‎Nanotechnology ‎[1,043 bytes]
  109. (hist) ‎Application Sharing ‎[1,049 bytes]
  110. (hist) ‎ICT4D (Information and Communication Technologies for Development) ‎[1,049 bytes]
  111. (hist) ‎Unique Selling Proposition ‎[1,051 bytes]
  112. (hist) ‎Pricing ‎[1,052 bytes]
  113. (hist) ‎Restructuring ‎[1,054 bytes]
  114. (hist) ‎Business Process Maturity Model (BPMM) ‎[1,054 bytes]
  115. (hist) ‎Cyber Attack ‎[1,056 bytes]
  116. (hist) ‎Dashboard ‎[1,057 bytes]
  117. (hist) ‎Level 5 Leadership ‎[1,059 bytes]
  118. (hist) ‎Context of Use (CoU) Analysis ‎[1,061 bytes]
  119. (hist) ‎Average Rate of Return ‎[1,065 bytes]
  120. (hist) ‎White Knight ‎[1,065 bytes]
  121. (hist) ‎Basel Committee on Banking Supervision ‎[1,066 bytes]
  122. (hist) ‎Consulting Services ‎[1,066 bytes]
  123. (hist) ‎Guideline ‎[1,067 bytes]
  124. (hist) ‎Available to Promise (ATP) ‎[1,068 bytes]
  125. (hist) ‎Project ‎[1,068 bytes]
  126. (hist) ‎Heart Framework ‎[1,069 bytes]
  127. (hist) ‎Mergers and Acquisitions (M&A) ‎[1,071 bytes]
  128. (hist) ‎Organizational Flexibility ‎[1,073 bytes]
  129. (hist) ‎The Open Information Systems Management Maturity Model (O-ISM3) ‎[1,075 bytes]
  130. (hist) ‎SHARP (Structured, Holistic Approach for a Research Proposal) ‎[1,077 bytes]
  131. (hist) ‎Broad Network Access ‎[1,079 bytes]
  132. (hist) ‎Information Governance Reference Model (IGRM) ‎[1,080 bytes]
  133. (hist) ‎Perceived Value Pricing ‎[1,080 bytes]
  134. (hist) ‎Attrition ‎[1,081 bytes]
  135. (hist) ‎Smart Information Systems (SIS) ‎[1,081 bytes]
  136. (hist) ‎Book Value ‎[1,085 bytes]
  137. (hist) ‎Data Enrichment ‎[1,088 bytes]
  138. (hist) ‎Supplier Value ‎[1,088 bytes]
  139. (hist) ‎Design of Experiments ‎[1,090 bytes]
  140. (hist) ‎Interaction Technique ‎[1,095 bytes]
  141. (hist) ‎Financial Services Workflow Model (FSWM) ‎[1,095 bytes]
  142. (hist) ‎Asset Liability Modeling ‎[1,098 bytes]
  143. (hist) ‎Assets Held For Sale ‎[1,100 bytes]
  144. (hist) ‎Globalization Management System (GMS) ‎[1,101 bytes]
  145. (hist) ‎Preferred Stock ‎[1,102 bytes]
  146. (hist) ‎Background Intelligent Transfer Service (BITS) ‎[1,104 bytes]
  147. (hist) ‎Standard Generalized Markup Language (SGML) ‎[1,104 bytes]
  148. (hist) ‎Mobile Network ‎[1,104 bytes]
  149. (hist) ‎Semantic Data Modeling ‎[1,106 bytes]
  150. (hist) ‎Porter's 3 Generic Strategies ‎[1,107 bytes]
  151. (hist) ‎Service Integration and Management (SIAM) ‎[1,108 bytes]
  152. (hist) ‎Year 2000 (Y2K) ‎[1,109 bytes]
  153. (hist) ‎Design Tool ‎[1,110 bytes]
  154. (hist) ‎Cloud Manufacturing ‎[1,113 bytes]
  155. (hist) ‎Shareholder ‎[1,113 bytes]
  156. (hist) ‎Fiber to the Home (FTTH) ‎[1,114 bytes]
  157. (hist) ‎Viable System Model (VSM) ‎[1,115 bytes]
  158. (hist) ‎Backward Integration ‎[1,116 bytes]
  159. (hist) ‎Wireless LAN ‎[1,116 bytes]
  160. (hist) ‎Branded Content Management ‎[1,117 bytes]
  161. (hist) ‎Z-Score ‎[1,121 bytes]
  162. (hist) ‎Programmable Logic Controller (PLC) ‎[1,122 bytes]
  163. (hist) ‎SOA Governance ‎[1,123 bytes]
  164. (hist) ‎Current Good Manufacturing Practice (cGMP) ‎[1,124 bytes]
  165. (hist) ‎Security Policy ‎[1,125 bytes]
  166. (hist) ‎Autoregressive Integrated Moving Average (ARIMA) Model ‎[1,128 bytes]
  167. (hist) ‎Financing ‎[1,131 bytes]
  168. (hist) ‎Browser Hijacking ‎[1,132 bytes]
  169. (hist) ‎Target Market ‎[1,132 bytes]
  170. (hist) ‎Average Cost Pricing ‎[1,134 bytes]
  171. (hist) ‎Back-End Plan ‎[1,137 bytes]
  172. (hist) ‎Performance Metrics ‎[1,137 bytes]
  173. (hist) ‎Swim Lane Diagram ‎[1,140 bytes]
  174. (hist) ‎IP Address ‎[1,142 bytes]
  175. (hist) ‎Backup Server ‎[1,144 bytes]
  176. (hist) ‎Microblogging ‎[1,144 bytes]
  177. (hist) ‎Network News Transfer Protocol (NNTP) ‎[1,145 bytes]
  178. (hist) ‎Internet Privacy ‎[1,146 bytes]
  179. (hist) ‎Mobile Platform as a Service (mPaaS) ‎[1,147 bytes]
  180. (hist) ‎Crown Jewel Defense ‎[1,149 bytes]
  181. (hist) ‎Swivel Chair Interface ‎[1,150 bytes]
  182. (hist) ‎Relational Capital ‎[1,151 bytes]
  183. (hist) ‎Virtual Machine Manager (VMM) ‎[1,153 bytes]
  184. (hist) ‎Smart Device ‎[1,153 bytes]
  185. (hist) ‎Shared Services ‎[1,153 bytes]
  186. (hist) ‎Identity Theft ‎[1,156 bytes]
  187. (hist) ‎Binomial Option Pricing Model ‎[1,157 bytes]
  188. (hist) ‎Bait and Switch ‎[1,159 bytes]
  189. (hist) ‎Hadoop ‎[1,159 bytes]
  190. (hist) ‎Data Integrity ‎[1,160 bytes]
  191. (hist) ‎Template ‎[1,162 bytes]
  192. (hist) ‎Back-End ‎[1,165 bytes]
  193. (hist) ‎Extended Enterprise ‎[1,166 bytes]
  194. (hist) ‎Hypertext Transfer Protocol (HTTP) ‎[1,167 bytes]
  195. (hist) ‎Web Portal ‎[1,167 bytes]
  196. (hist) ‎Graduated Security ‎[1,167 bytes]
  197. (hist) ‎Hiring ‎[1,167 bytes]
  198. (hist) ‎Industry Models ‎[1,167 bytes]
  199. (hist) ‎Business Objects ‎[1,172 bytes]
  200. (hist) ‎Balanced Technology Extended (BTX) ‎[1,173 bytes]
  201. (hist) ‎Knowledge Base ‎[1,173 bytes]
  202. (hist) ‎Critical Success Factor (CSF) ‎[1,174 bytes]
  203. (hist) ‎Boundary Value Analysis ‎[1,177 bytes]
  204. (hist) ‎Business Process as a Service (BPaaS) ‎[1,177 bytes]
  205. (hist) ‎Cost Analysis ‎[1,178 bytes]
  206. (hist) ‎CXML (Commerce eXtensible Markup Language) ‎[1,179 bytes]
  207. (hist) ‎Synchromarketing ‎[1,179 bytes]
  208. (hist) ‎Diminishing Marginal Utility ‎[1,180 bytes]
  209. (hist) ‎Synchronous Digital Hierarchy (SDH) ‎[1,182 bytes]
  210. (hist) ‎Value Methodology ‎[1,183 bytes]
  211. (hist) ‎Exit Strategy ‎[1,185 bytes]
  212. (hist) ‎Sub Contractor ‎[1,186 bytes]
  213. (hist) ‎Human Development Theory ‎[1,187 bytes]
  214. (hist) ‎Quality Function Deployment (QFD) ‎[1,187 bytes]
  215. (hist) ‎Attribute-Driven Design Method ‎[1,189 bytes]
  216. (hist) ‎Zero-sum Game ‎[1,189 bytes]
  217. (hist) ‎Organizational Alignment ‎[1,191 bytes]
  218. (hist) ‎Committee of Sponsoring Organizations of the Treadway Commission (COSO) ‎[1,192 bytes]
  219. (hist) ‎Retention Ratio ‎[1,193 bytes]
  220. (hist) ‎Operational Capability ‎[1,193 bytes]
  221. (hist) ‎Building Management Systems (BMS) ‎[1,194 bytes]
  222. (hist) ‎Better Business Case (BBC) ‎[1,195 bytes]
  223. (hist) ‎Digital Asset Management (DAM) ‎[1,195 bytes]
  224. (hist) ‎Collaborative Content Management ‎[1,195 bytes]
  225. (hist) ‎Use Case ‎[1,195 bytes]
  226. (hist) ‎Business Continuity Management (BCM) ‎[1,199 bytes]
  227. (hist) ‎Big Data Maturity Model (BDMM) ‎[1,200 bytes]
  228. (hist) ‎Portability ‎[1,201 bytes]
  229. (hist) ‎Multi Channel Marketing ‎[1,201 bytes]
  230. (hist) ‎Strategic Human Resource Management (SHRM) ‎[1,201 bytes]
  231. (hist) ‎Enterprise Model ‎[1,203 bytes]
  232. (hist) ‎Application Service Management (ASM) ‎[1,204 bytes]
  233. (hist) ‎Terms of Service ‎[1,205 bytes]
  234. (hist) ‎Feng's Classification ‎[1,205 bytes]
  235. (hist) ‎Infrastructure Outsourcing ‎[1,205 bytes]
  236. (hist) ‎Pareto Principle ‎[1,206 bytes]
  237. (hist) ‎Visual Analytics ‎[1,209 bytes]
  238. (hist) ‎Click-Through Rate (CTR) ‎[1,211 bytes]
  239. (hist) ‎Plug-in ‎[1,213 bytes]
  240. (hist) ‎Semantic Web ‎[1,213 bytes]
  241. (hist) ‎Availability Plan ‎[1,215 bytes]
  242. (hist) ‎Business Process Change Cycle ‎[1,217 bytes]
  243. (hist) ‎Schedule Performance Index (SPI) ‎[1,217 bytes]
  244. (hist) ‎User Interface Design (UI) ‎[1,218 bytes]
  245. (hist) ‎Subliminal Advertizing ‎[1,221 bytes]
  246. (hist) ‎Dark Web ‎[1,221 bytes]
  247. (hist) ‎Market Share ‎[1,225 bytes]
  248. (hist) ‎Reliability Block Diagram (RBD) ‎[1,226 bytes]
  249. (hist) ‎Fourier Analysis ‎[1,230 bytes]
  250. (hist) ‎Unstructured Information Management Architecture (UIMA) ‎[1,231 bytes]

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)