Short pages
Showing below up to 250 results in range #101 to #350.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)
- (hist) Mobile Network [1,104 bytes]
- (hist) Semantic Data Modeling [1,106 bytes]
- (hist) Porter's 3 Generic Strategies [1,107 bytes]
- (hist) Service Integration and Management (SIAM) [1,108 bytes]
- (hist) Year 2000 (Y2K) [1,109 bytes]
- (hist) Design Tool [1,110 bytes]
- (hist) Cloud Manufacturing [1,113 bytes]
- (hist) Shareholder [1,113 bytes]
- (hist) Fiber to the Home (FTTH) [1,114 bytes]
- (hist) Viable System Model (VSM) [1,115 bytes]
- (hist) Backward Integration [1,116 bytes]
- (hist) Wireless LAN [1,116 bytes]
- (hist) Branded Content Management [1,117 bytes]
- (hist) Z-Score [1,121 bytes]
- (hist) Programmable Logic Controller (PLC) [1,122 bytes]
- (hist) SOA Governance [1,123 bytes]
- (hist) Current Good Manufacturing Practice (cGMP) [1,124 bytes]
- (hist) Security Policy [1,125 bytes]
- (hist) Autoregressive Integrated Moving Average (ARIMA) Model [1,128 bytes]
- (hist) Financing [1,131 bytes]
- (hist) Browser Hijacking [1,132 bytes]
- (hist) Target Market [1,132 bytes]
- (hist) Average Cost Pricing [1,134 bytes]
- (hist) Back-End Plan [1,137 bytes]
- (hist) Performance Metrics [1,137 bytes]
- (hist) Swim Lane Diagram [1,140 bytes]
- (hist) IP Address [1,142 bytes]
- (hist) Backup Server [1,144 bytes]
- (hist) Microblogging [1,144 bytes]
- (hist) Network News Transfer Protocol (NNTP) [1,145 bytes]
- (hist) Internet Privacy [1,146 bytes]
- (hist) Mobile Platform as a Service (mPaaS) [1,147 bytes]
- (hist) Crown Jewel Defense [1,149 bytes]
- (hist) Swivel Chair Interface [1,150 bytes]
- (hist) Relational Capital [1,151 bytes]
- (hist) Virtual Machine Manager (VMM) [1,153 bytes]
- (hist) Smart Device [1,153 bytes]
- (hist) Shared Services [1,153 bytes]
- (hist) Identity Theft [1,156 bytes]
- (hist) Binomial Option Pricing Model [1,157 bytes]
- (hist) Bait and Switch [1,159 bytes]
- (hist) Hadoop [1,159 bytes]
- (hist) Data Integrity [1,160 bytes]
- (hist) Template [1,162 bytes]
- (hist) Back-End [1,165 bytes]
- (hist) Extended Enterprise [1,166 bytes]
- (hist) Hypertext Transfer Protocol (HTTP) [1,167 bytes]
- (hist) Web Portal [1,167 bytes]
- (hist) Graduated Security [1,167 bytes]
- (hist) Hiring [1,167 bytes]
- (hist) Industry Models [1,167 bytes]
- (hist) Business Objects [1,172 bytes]
- (hist) Balanced Technology Extended (BTX) [1,173 bytes]
- (hist) Knowledge Base [1,173 bytes]
- (hist) Critical Success Factor (CSF) [1,174 bytes]
- (hist) Boundary Value Analysis [1,177 bytes]
- (hist) Business Process as a Service (BPaaS) [1,177 bytes]
- (hist) Cost Analysis [1,178 bytes]
- (hist) CXML (Commerce eXtensible Markup Language) [1,179 bytes]
- (hist) Synchromarketing [1,179 bytes]
- (hist) Diminishing Marginal Utility [1,180 bytes]
- (hist) Synchronous Digital Hierarchy (SDH) [1,182 bytes]
- (hist) Value Methodology [1,183 bytes]
- (hist) Exit Strategy [1,185 bytes]
- (hist) Sub Contractor [1,186 bytes]
- (hist) Human Development Theory [1,187 bytes]
- (hist) Quality Function Deployment (QFD) [1,187 bytes]
- (hist) Attribute-Driven Design Method [1,189 bytes]
- (hist) Zero-sum Game [1,189 bytes]
- (hist) Organizational Alignment [1,191 bytes]
- (hist) Committee of Sponsoring Organizations of the Treadway Commission (COSO) [1,192 bytes]
- (hist) Retention Ratio [1,193 bytes]
- (hist) Operational Capability [1,193 bytes]
- (hist) Building Management Systems (BMS) [1,194 bytes]
- (hist) Better Business Case (BBC) [1,195 bytes]
- (hist) Digital Asset Management (DAM) [1,195 bytes]
- (hist) Collaborative Content Management [1,195 bytes]
- (hist) Use Case [1,195 bytes]
- (hist) Business Continuity Management (BCM) [1,199 bytes]
- (hist) Big Data Maturity Model (BDMM) [1,200 bytes]
- (hist) Portability [1,201 bytes]
- (hist) Multi Channel Marketing [1,201 bytes]
- (hist) Strategic Human Resource Management (SHRM) [1,201 bytes]
- (hist) Enterprise Model [1,203 bytes]
- (hist) Application Service Management (ASM) [1,204 bytes]
- (hist) Terms of Service [1,205 bytes]
- (hist) Feng's Classification [1,205 bytes]
- (hist) Infrastructure Outsourcing [1,205 bytes]
- (hist) Pareto Principle [1,206 bytes]
- (hist) Visual Analytics [1,209 bytes]
- (hist) Click-Through Rate (CTR) [1,211 bytes]
- (hist) Plug-in [1,213 bytes]
- (hist) Semantic Web [1,213 bytes]
- (hist) Availability Plan [1,215 bytes]
- (hist) Business Process Change Cycle [1,217 bytes]
- (hist) Schedule Performance Index (SPI) [1,217 bytes]
- (hist) User Interface Design (UI) [1,218 bytes]
- (hist) Subliminal Advertizing [1,221 bytes]
- (hist) Dark Web [1,221 bytes]
- (hist) Market Share [1,225 bytes]
- (hist) Reliability Block Diagram (RBD) [1,226 bytes]
- (hist) Fourier Analysis [1,230 bytes]
- (hist) Unstructured Information Management Architecture (UIMA) [1,231 bytes]
- (hist) Bandwagon Effect [1,232 bytes]
- (hist) Dynamic HTML [1,232 bytes]
- (hist) Weighted Micro Function Points (WMFP) [1,233 bytes]
- (hist) Systemic Risk [1,233 bytes]
- (hist) Atomization [1,235 bytes]
- (hist) Privacy Policy [1,235 bytes]
- (hist) Network Motif [1,237 bytes]
- (hist) Dunning-Kruger Effect [1,237 bytes]
- (hist) Compatible Time Sharing System (CTSS) [1,238 bytes]
- (hist) Binary File [1,243 bytes]
- (hist) Information Asymmetry [1,243 bytes]
- (hist) Deliberate Strategy [1,244 bytes]
- (hist) System of Record (SOR) [1,246 bytes]
- (hist) Value Proposition [1,247 bytes]
- (hist) Direct Marketing [1,249 bytes]
- (hist) Gartner's Market Share Analysis [1,249 bytes]
- (hist) Behavior Learning Engine (BLE) [1,251 bytes]
- (hist) Ring Fencing [1,252 bytes]
- (hist) Management Information System (MIS) [1,255 bytes]
- (hist) Scientific Management Theory [1,258 bytes]
- (hist) On-Demand Software [1,262 bytes]
- (hist) Supplier Relationship Management [1,262 bytes]
- (hist) Abilene Paradox [1,263 bytes]
- (hist) Economic Value [1,263 bytes]
- (hist) Straw Man Concept [1,263 bytes]
- (hist) Platform as a Service (PaaS) [1,265 bytes]
- (hist) Quality Management [1,265 bytes]
- (hist) Market Driven Organization [1,265 bytes]
- (hist) Binary Large Object (BLOB) [1,269 bytes]
- (hist) Workers Compensation Insurance [1,269 bytes]
- (hist) Value Based Management [1,270 bytes]
- (hist) Talent Management [1,270 bytes]
- (hist) Transactional Content Management (TCM) [1,270 bytes]
- (hist) Substitution Effect [1,271 bytes]
- (hist) Web Services Flow Language (WSFL) [1,272 bytes]
- (hist) Shareholders' Equity [1,273 bytes]
- (hist) Trusted Computer System Evaluation Criteria (TCSEC) [1,274 bytes]
- (hist) C-Suite [1,274 bytes]
- (hist) Concentrated Marketing [1,275 bytes]
- (hist) Large-Scale Integration (LSI) [1,275 bytes]
- (hist) Asynchronous JavaScript and XML (AJAX) [1,276 bytes]
- (hist) Forced Compliance [1,278 bytes]
- (hist) Actual Cost (AC) [1,278 bytes]
- (hist) Object Oriented Approach [1,279 bytes]
- (hist) Componentization [1,281 bytes]
- (hist) Strategic Change Momentum [1,282 bytes]
- (hist) Software Development Effort Estimation [1,284 bytes]
- (hist) Social Intelligence [1,285 bytes]
- (hist) Bankmail Engagement [1,286 bytes]
- (hist) User Interface [1,287 bytes]
- (hist) Supervisory Control and Data Acquisition (SCADA) [1,288 bytes]
- (hist) Internet Protocol (IP) [1,288 bytes]
- (hist) Organic Growth [1,289 bytes]
- (hist) Code of Ethics [1,291 bytes]
- (hist) Behavior Driven Development (BDD) [1,292 bytes]
- (hist) World Class Manufacturing [1,294 bytes]
- (hist) Strategic Initiatives [1,294 bytes]
- (hist) Structure Chart [1,294 bytes]
- (hist) Office of Strategy Management [1,297 bytes]
- (hist) Synectics [1,297 bytes]
- (hist) Application Life Cycle Management Platform as a Service (ALM PaaS) [1,298 bytes]
- (hist) Value at Risk [1,299 bytes]
- (hist) Cannibalization [1,301 bytes]
- (hist) Strategic Architecture [1,301 bytes]
- (hist) CMN-GOMS [1,301 bytes]
- (hist) Business Rule [1,301 bytes]
- (hist) Outcome [1,304 bytes]
- (hist) Employee Turnover [1,305 bytes]
- (hist) Balance Theory [1,307 bytes]
- (hist) Bond Insurance [1,307 bytes]
- (hist) Bottom-up Approach [1,307 bytes]
- (hist) Pareto Chart [1,307 bytes]
- (hist) Reference Semantic Model (RSM) [1,307 bytes]
- (hist) Fault Tree Analysis (FTA) [1,308 bytes]
- (hist) Probability Theory [1,309 bytes]
- (hist) Straight Through Processing (STP) [1,310 bytes]
- (hist) Preboot Execution Environment (PXE) [1,311 bytes]
- (hist) Distributor [1,314 bytes]
- (hist) Social Multi Criteria Analysis (SMCA) [1,314 bytes]
- (hist) Structured Data Analysis [1,315 bytes]
- (hist) IT Productivity Paradox [1,316 bytes]
- (hist) Information Quality Management (IQM) [1,317 bytes]
- (hist) Viability Study [1,319 bytes]
- (hist) Internet Service Provider (ISP) [1,319 bytes]
- (hist) Budgeted Cost of Work Scheduled (BCWS) [1,319 bytes]
- (hist) Data Dictionary [1,320 bytes]
- (hist) Coaching [1,321 bytes]
- (hist) Direct Mail [1,321 bytes]
- (hist) Retired Services [1,323 bytes]
- (hist) Telemarketing [1,325 bytes]
- (hist) Management Buy-Out [1,326 bytes]
- (hist) Industry Life Cycle [1,327 bytes]
- (hist) Collective Intelligence [1,328 bytes]
- (hist) Channel Management [1,330 bytes]
- (hist) Service Mark [1,330 bytes]
- (hist) Break-even Point [1,331 bytes]
- (hist) Profit Motive [1,331 bytes]
- (hist) Information Mapping [1,333 bytes]
- (hist) Software Visualization [1,333 bytes]
- (hist) Design Principles [1,335 bytes]
- (hist) Risk Maturity [1,337 bytes]
- (hist) Quantitative Investment Analysis [1,337 bytes]
- (hist) Strategic Infliction Point [1,337 bytes]
- (hist) Security Management [1,337 bytes]
- (hist) Cost of Equity [1,338 bytes]
- (hist) Financial Services Data Model (FSDM) [1,338 bytes]
- (hist) Desktop Operating System [1,339 bytes]
- (hist) Executive Information System (EIS) [1,340 bytes]
- (hist) Probability Distribution [1,343 bytes]
- (hist) Systems Architecture [1,343 bytes]
- (hist) Bayes' Theorem [1,344 bytes]
- (hist) Software Sizing [1,345 bytes]
- (hist) Recurrent Neural Network (RNN) [1,346 bytes]
- (hist) Underpinning Contract (UC) [1,347 bytes]
- (hist) Simulation Modeling [1,348 bytes]
- (hist) Computerized Maintenance Management System (CMMS) [1,349 bytes]
- (hist) Enterprise Architecture Life Cycle (EALC) [1,349 bytes]
- (hist) Asset Performance Management (APM) [1,350 bytes]
- (hist) Health Insurance Portability and Accountability Act (HIPAA) [1,351 bytes]
- (hist) Project Dependencies [1,352 bytes]
- (hist) Capitalism [1,353 bytes]
- (hist) Purchase Order [1,353 bytes]
- (hist) Resource Description Framework (RDF) [1,354 bytes]
- (hist) Blake and Mouton's Managerial Grid [1,354 bytes]
- (hist) Integrative Thinking [1,359 bytes]
- (hist) Software Archeology [1,359 bytes]
- (hist) Value Creation Index [1,361 bytes]
- (hist) Cyberspace [1,361 bytes]
- (hist) Strategic Themes [1,362 bytes]
- (hist) Data Asset Framework (DAF) [1,363 bytes]
- (hist) Brand Line [1,363 bytes]
- (hist) Browser Isolation [1,370 bytes]
- (hist) Workplace Safety [1,370 bytes]
- (hist) Information as a Service (IaaS) [1,371 bytes]
- (hist) Stakeholder Engagement [1,371 bytes]
- (hist) Operating Expenses [1,373 bytes]
- (hist) Brand Reputation [1,373 bytes]
- (hist) Cost to Serve (CTS) [1,378 bytes]
- (hist) Extensible Authentication Protocol (EAP) [1,379 bytes]
- (hist) Formal Organization [1,379 bytes]
- (hist) Phishing [1,380 bytes]
- (hist) Productive Efficiency [1,381 bytes]
- (hist) Marketing Metrics [1,382 bytes]
- (hist) Subscription Right [1,382 bytes]
- (hist) Payback Period [1,383 bytes]
- (hist) CAN-SPAM Act of 2003 [1,384 bytes]
- (hist) Dependency Network [1,385 bytes]