Actions

Special

Short pages

Showing below up to 250 results in range #101 to #350.

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎Mobile Network ‎[1,104 bytes]
  2. (hist) ‎Semantic Data Modeling ‎[1,106 bytes]
  3. (hist) ‎Porter's 3 Generic Strategies ‎[1,107 bytes]
  4. (hist) ‎Service Integration and Management (SIAM) ‎[1,108 bytes]
  5. (hist) ‎Year 2000 (Y2K) ‎[1,109 bytes]
  6. (hist) ‎Design Tool ‎[1,110 bytes]
  7. (hist) ‎Cloud Manufacturing ‎[1,113 bytes]
  8. (hist) ‎Shareholder ‎[1,113 bytes]
  9. (hist) ‎Fiber to the Home (FTTH) ‎[1,114 bytes]
  10. (hist) ‎Viable System Model (VSM) ‎[1,115 bytes]
  11. (hist) ‎Backward Integration ‎[1,116 bytes]
  12. (hist) ‎Wireless LAN ‎[1,116 bytes]
  13. (hist) ‎Branded Content Management ‎[1,117 bytes]
  14. (hist) ‎Z-Score ‎[1,121 bytes]
  15. (hist) ‎Programmable Logic Controller (PLC) ‎[1,122 bytes]
  16. (hist) ‎SOA Governance ‎[1,123 bytes]
  17. (hist) ‎Current Good Manufacturing Practice (cGMP) ‎[1,124 bytes]
  18. (hist) ‎Security Policy ‎[1,125 bytes]
  19. (hist) ‎Autoregressive Integrated Moving Average (ARIMA) Model ‎[1,128 bytes]
  20. (hist) ‎Financing ‎[1,131 bytes]
  21. (hist) ‎Browser Hijacking ‎[1,132 bytes]
  22. (hist) ‎Target Market ‎[1,132 bytes]
  23. (hist) ‎Average Cost Pricing ‎[1,134 bytes]
  24. (hist) ‎Back-End Plan ‎[1,137 bytes]
  25. (hist) ‎Performance Metrics ‎[1,137 bytes]
  26. (hist) ‎Swim Lane Diagram ‎[1,140 bytes]
  27. (hist) ‎IP Address ‎[1,142 bytes]
  28. (hist) ‎Backup Server ‎[1,144 bytes]
  29. (hist) ‎Microblogging ‎[1,144 bytes]
  30. (hist) ‎Network News Transfer Protocol (NNTP) ‎[1,145 bytes]
  31. (hist) ‎Internet Privacy ‎[1,146 bytes]
  32. (hist) ‎Mobile Platform as a Service (mPaaS) ‎[1,147 bytes]
  33. (hist) ‎Crown Jewel Defense ‎[1,149 bytes]
  34. (hist) ‎Swivel Chair Interface ‎[1,150 bytes]
  35. (hist) ‎Relational Capital ‎[1,151 bytes]
  36. (hist) ‎Virtual Machine Manager (VMM) ‎[1,153 bytes]
  37. (hist) ‎Smart Device ‎[1,153 bytes]
  38. (hist) ‎Shared Services ‎[1,153 bytes]
  39. (hist) ‎Identity Theft ‎[1,156 bytes]
  40. (hist) ‎Binomial Option Pricing Model ‎[1,157 bytes]
  41. (hist) ‎Bait and Switch ‎[1,159 bytes]
  42. (hist) ‎Hadoop ‎[1,159 bytes]
  43. (hist) ‎Data Integrity ‎[1,160 bytes]
  44. (hist) ‎Template ‎[1,162 bytes]
  45. (hist) ‎Back-End ‎[1,165 bytes]
  46. (hist) ‎Extended Enterprise ‎[1,166 bytes]
  47. (hist) ‎Hypertext Transfer Protocol (HTTP) ‎[1,167 bytes]
  48. (hist) ‎Web Portal ‎[1,167 bytes]
  49. (hist) ‎Graduated Security ‎[1,167 bytes]
  50. (hist) ‎Hiring ‎[1,167 bytes]
  51. (hist) ‎Industry Models ‎[1,167 bytes]
  52. (hist) ‎Business Objects ‎[1,172 bytes]
  53. (hist) ‎Balanced Technology Extended (BTX) ‎[1,173 bytes]
  54. (hist) ‎Knowledge Base ‎[1,173 bytes]
  55. (hist) ‎Critical Success Factor (CSF) ‎[1,174 bytes]
  56. (hist) ‎Boundary Value Analysis ‎[1,177 bytes]
  57. (hist) ‎Business Process as a Service (BPaaS) ‎[1,177 bytes]
  58. (hist) ‎Cost Analysis ‎[1,178 bytes]
  59. (hist) ‎CXML (Commerce eXtensible Markup Language) ‎[1,179 bytes]
  60. (hist) ‎Synchromarketing ‎[1,179 bytes]
  61. (hist) ‎Diminishing Marginal Utility ‎[1,180 bytes]
  62. (hist) ‎Synchronous Digital Hierarchy (SDH) ‎[1,182 bytes]
  63. (hist) ‎Value Methodology ‎[1,183 bytes]
  64. (hist) ‎Exit Strategy ‎[1,185 bytes]
  65. (hist) ‎Sub Contractor ‎[1,186 bytes]
  66. (hist) ‎Human Development Theory ‎[1,187 bytes]
  67. (hist) ‎Quality Function Deployment (QFD) ‎[1,187 bytes]
  68. (hist) ‎Attribute-Driven Design Method ‎[1,189 bytes]
  69. (hist) ‎Zero-sum Game ‎[1,189 bytes]
  70. (hist) ‎Organizational Alignment ‎[1,191 bytes]
  71. (hist) ‎Committee of Sponsoring Organizations of the Treadway Commission (COSO) ‎[1,192 bytes]
  72. (hist) ‎Retention Ratio ‎[1,193 bytes]
  73. (hist) ‎Operational Capability ‎[1,193 bytes]
  74. (hist) ‎Building Management Systems (BMS) ‎[1,194 bytes]
  75. (hist) ‎Better Business Case (BBC) ‎[1,195 bytes]
  76. (hist) ‎Digital Asset Management (DAM) ‎[1,195 bytes]
  77. (hist) ‎Collaborative Content Management ‎[1,195 bytes]
  78. (hist) ‎Use Case ‎[1,195 bytes]
  79. (hist) ‎Business Continuity Management (BCM) ‎[1,199 bytes]
  80. (hist) ‎Big Data Maturity Model (BDMM) ‎[1,200 bytes]
  81. (hist) ‎Portability ‎[1,201 bytes]
  82. (hist) ‎Multi Channel Marketing ‎[1,201 bytes]
  83. (hist) ‎Strategic Human Resource Management (SHRM) ‎[1,201 bytes]
  84. (hist) ‎Enterprise Model ‎[1,203 bytes]
  85. (hist) ‎Application Service Management (ASM) ‎[1,204 bytes]
  86. (hist) ‎Terms of Service ‎[1,205 bytes]
  87. (hist) ‎Feng's Classification ‎[1,205 bytes]
  88. (hist) ‎Infrastructure Outsourcing ‎[1,205 bytes]
  89. (hist) ‎Pareto Principle ‎[1,206 bytes]
  90. (hist) ‎Visual Analytics ‎[1,209 bytes]
  91. (hist) ‎Click-Through Rate (CTR) ‎[1,211 bytes]
  92. (hist) ‎Plug-in ‎[1,213 bytes]
  93. (hist) ‎Semantic Web ‎[1,213 bytes]
  94. (hist) ‎Availability Plan ‎[1,215 bytes]
  95. (hist) ‎Business Process Change Cycle ‎[1,217 bytes]
  96. (hist) ‎Schedule Performance Index (SPI) ‎[1,217 bytes]
  97. (hist) ‎User Interface Design (UI) ‎[1,218 bytes]
  98. (hist) ‎Subliminal Advertizing ‎[1,221 bytes]
  99. (hist) ‎Dark Web ‎[1,221 bytes]
  100. (hist) ‎Market Share ‎[1,225 bytes]
  101. (hist) ‎Reliability Block Diagram (RBD) ‎[1,226 bytes]
  102. (hist) ‎Fourier Analysis ‎[1,230 bytes]
  103. (hist) ‎Unstructured Information Management Architecture (UIMA) ‎[1,231 bytes]
  104. (hist) ‎Bandwagon Effect ‎[1,232 bytes]
  105. (hist) ‎Dynamic HTML ‎[1,232 bytes]
  106. (hist) ‎Weighted Micro Function Points (WMFP) ‎[1,233 bytes]
  107. (hist) ‎Systemic Risk ‎[1,233 bytes]
  108. (hist) ‎Atomization ‎[1,235 bytes]
  109. (hist) ‎Privacy Policy ‎[1,235 bytes]
  110. (hist) ‎Network Motif ‎[1,237 bytes]
  111. (hist) ‎Dunning-Kruger Effect ‎[1,237 bytes]
  112. (hist) ‎Compatible Time Sharing System (CTSS) ‎[1,238 bytes]
  113. (hist) ‎Binary File ‎[1,243 bytes]
  114. (hist) ‎Information Asymmetry ‎[1,243 bytes]
  115. (hist) ‎Deliberate Strategy ‎[1,244 bytes]
  116. (hist) ‎System of Record (SOR) ‎[1,246 bytes]
  117. (hist) ‎Value Proposition ‎[1,247 bytes]
  118. (hist) ‎Direct Marketing ‎[1,249 bytes]
  119. (hist) ‎Gartner's Market Share Analysis ‎[1,249 bytes]
  120. (hist) ‎Behavior Learning Engine (BLE) ‎[1,251 bytes]
  121. (hist) ‎Ring Fencing ‎[1,252 bytes]
  122. (hist) ‎Management Information System (MIS) ‎[1,255 bytes]
  123. (hist) ‎Scientific Management Theory ‎[1,258 bytes]
  124. (hist) ‎On-Demand Software ‎[1,262 bytes]
  125. (hist) ‎Supplier Relationship Management ‎[1,262 bytes]
  126. (hist) ‎Abilene Paradox ‎[1,263 bytes]
  127. (hist) ‎Economic Value ‎[1,263 bytes]
  128. (hist) ‎Straw Man Concept ‎[1,263 bytes]
  129. (hist) ‎Platform as a Service (PaaS) ‎[1,265 bytes]
  130. (hist) ‎Quality Management ‎[1,265 bytes]
  131. (hist) ‎Market Driven Organization ‎[1,265 bytes]
  132. (hist) ‎Binary Large Object (BLOB) ‎[1,269 bytes]
  133. (hist) ‎Workers Compensation Insurance ‎[1,269 bytes]
  134. (hist) ‎Value Based Management ‎[1,270 bytes]
  135. (hist) ‎Talent Management ‎[1,270 bytes]
  136. (hist) ‎Transactional Content Management (TCM) ‎[1,270 bytes]
  137. (hist) ‎Substitution Effect ‎[1,271 bytes]
  138. (hist) ‎Web Services Flow Language (WSFL) ‎[1,272 bytes]
  139. (hist) ‎Shareholders' Equity ‎[1,273 bytes]
  140. (hist) ‎Trusted Computer System Evaluation Criteria (TCSEC) ‎[1,274 bytes]
  141. (hist) ‎C-Suite ‎[1,274 bytes]
  142. (hist) ‎Concentrated Marketing ‎[1,275 bytes]
  143. (hist) ‎Large-Scale Integration (LSI) ‎[1,275 bytes]
  144. (hist) ‎Asynchronous JavaScript and XML (AJAX) ‎[1,276 bytes]
  145. (hist) ‎Forced Compliance ‎[1,278 bytes]
  146. (hist) ‎Actual Cost (AC) ‎[1,278 bytes]
  147. (hist) ‎Object Oriented Approach ‎[1,279 bytes]
  148. (hist) ‎Componentization ‎[1,281 bytes]
  149. (hist) ‎Strategic Change Momentum ‎[1,282 bytes]
  150. (hist) ‎Software Development Effort Estimation ‎[1,284 bytes]
  151. (hist) ‎Social Intelligence ‎[1,285 bytes]
  152. (hist) ‎Bankmail Engagement ‎[1,286 bytes]
  153. (hist) ‎User Interface ‎[1,287 bytes]
  154. (hist) ‎Supervisory Control and Data Acquisition (SCADA) ‎[1,288 bytes]
  155. (hist) ‎Internet Protocol (IP) ‎[1,288 bytes]
  156. (hist) ‎Organic Growth ‎[1,289 bytes]
  157. (hist) ‎Code of Ethics ‎[1,291 bytes]
  158. (hist) ‎Behavior Driven Development (BDD) ‎[1,292 bytes]
  159. (hist) ‎World Class Manufacturing ‎[1,294 bytes]
  160. (hist) ‎Strategic Initiatives ‎[1,294 bytes]
  161. (hist) ‎Structure Chart ‎[1,294 bytes]
  162. (hist) ‎Office of Strategy Management ‎[1,297 bytes]
  163. (hist) ‎Synectics ‎[1,297 bytes]
  164. (hist) ‎Application Life Cycle Management Platform as a Service (ALM PaaS) ‎[1,298 bytes]
  165. (hist) ‎Value at Risk ‎[1,299 bytes]
  166. (hist) ‎Cannibalization ‎[1,301 bytes]
  167. (hist) ‎Strategic Architecture ‎[1,301 bytes]
  168. (hist) ‎CMN-GOMS ‎[1,301 bytes]
  169. (hist) ‎Business Rule ‎[1,301 bytes]
  170. (hist) ‎Outcome ‎[1,304 bytes]
  171. (hist) ‎Employee Turnover ‎[1,305 bytes]
  172. (hist) ‎Balance Theory ‎[1,307 bytes]
  173. (hist) ‎Bond Insurance ‎[1,307 bytes]
  174. (hist) ‎Bottom-up Approach ‎[1,307 bytes]
  175. (hist) ‎Pareto Chart ‎[1,307 bytes]
  176. (hist) ‎Reference Semantic Model (RSM) ‎[1,307 bytes]
  177. (hist) ‎Fault Tree Analysis (FTA) ‎[1,308 bytes]
  178. (hist) ‎Probability Theory ‎[1,309 bytes]
  179. (hist) ‎Straight Through Processing (STP) ‎[1,310 bytes]
  180. (hist) ‎Preboot Execution Environment (PXE) ‎[1,311 bytes]
  181. (hist) ‎Distributor ‎[1,314 bytes]
  182. (hist) ‎Social Multi Criteria Analysis (SMCA) ‎[1,314 bytes]
  183. (hist) ‎Structured Data Analysis ‎[1,315 bytes]
  184. (hist) ‎IT Productivity Paradox ‎[1,316 bytes]
  185. (hist) ‎Information Quality Management (IQM) ‎[1,317 bytes]
  186. (hist) ‎Viability Study ‎[1,319 bytes]
  187. (hist) ‎Internet Service Provider (ISP) ‎[1,319 bytes]
  188. (hist) ‎Budgeted Cost of Work Scheduled (BCWS) ‎[1,319 bytes]
  189. (hist) ‎Data Dictionary ‎[1,320 bytes]
  190. (hist) ‎Coaching ‎[1,321 bytes]
  191. (hist) ‎Direct Mail ‎[1,321 bytes]
  192. (hist) ‎Retired Services ‎[1,323 bytes]
  193. (hist) ‎Telemarketing ‎[1,325 bytes]
  194. (hist) ‎Management Buy-Out ‎[1,326 bytes]
  195. (hist) ‎Industry Life Cycle ‎[1,327 bytes]
  196. (hist) ‎Collective Intelligence ‎[1,328 bytes]
  197. (hist) ‎Channel Management ‎[1,330 bytes]
  198. (hist) ‎Service Mark ‎[1,330 bytes]
  199. (hist) ‎Break-even Point ‎[1,331 bytes]
  200. (hist) ‎Profit Motive ‎[1,331 bytes]
  201. (hist) ‎Information Mapping ‎[1,333 bytes]
  202. (hist) ‎Software Visualization ‎[1,333 bytes]
  203. (hist) ‎Design Principles ‎[1,335 bytes]
  204. (hist) ‎Risk Maturity ‎[1,337 bytes]
  205. (hist) ‎Quantitative Investment Analysis ‎[1,337 bytes]
  206. (hist) ‎Strategic Infliction Point ‎[1,337 bytes]
  207. (hist) ‎Security Management ‎[1,337 bytes]
  208. (hist) ‎Cost of Equity ‎[1,338 bytes]
  209. (hist) ‎Financial Services Data Model (FSDM) ‎[1,338 bytes]
  210. (hist) ‎Desktop Operating System ‎[1,339 bytes]
  211. (hist) ‎Executive Information System (EIS) ‎[1,340 bytes]
  212. (hist) ‎Probability Distribution ‎[1,343 bytes]
  213. (hist) ‎Systems Architecture ‎[1,343 bytes]
  214. (hist) ‎Bayes' Theorem ‎[1,344 bytes]
  215. (hist) ‎Software Sizing ‎[1,345 bytes]
  216. (hist) ‎Recurrent Neural Network (RNN) ‎[1,346 bytes]
  217. (hist) ‎Underpinning Contract (UC) ‎[1,347 bytes]
  218. (hist) ‎Simulation Modeling ‎[1,348 bytes]
  219. (hist) ‎Computerized Maintenance Management System (CMMS) ‎[1,349 bytes]
  220. (hist) ‎Enterprise Architecture Life Cycle (EALC) ‎[1,349 bytes]
  221. (hist) ‎Asset Performance Management (APM) ‎[1,350 bytes]
  222. (hist) ‎Health Insurance Portability and Accountability Act (HIPAA) ‎[1,351 bytes]
  223. (hist) ‎Project Dependencies ‎[1,352 bytes]
  224. (hist) ‎Capitalism ‎[1,353 bytes]
  225. (hist) ‎Purchase Order ‎[1,353 bytes]
  226. (hist) ‎Resource Description Framework (RDF) ‎[1,354 bytes]
  227. (hist) ‎Blake and Mouton's Managerial Grid ‎[1,354 bytes]
  228. (hist) ‎Integrative Thinking ‎[1,359 bytes]
  229. (hist) ‎Software Archeology ‎[1,359 bytes]
  230. (hist) ‎Value Creation Index ‎[1,361 bytes]
  231. (hist) ‎Cyberspace ‎[1,361 bytes]
  232. (hist) ‎Strategic Themes ‎[1,362 bytes]
  233. (hist) ‎Data Asset Framework (DAF) ‎[1,363 bytes]
  234. (hist) ‎Brand Line ‎[1,363 bytes]
  235. (hist) ‎Browser Isolation ‎[1,370 bytes]
  236. (hist) ‎Workplace Safety ‎[1,370 bytes]
  237. (hist) ‎Information as a Service (IaaS) ‎[1,371 bytes]
  238. (hist) ‎Stakeholder Engagement ‎[1,371 bytes]
  239. (hist) ‎Operating Expenses ‎[1,373 bytes]
  240. (hist) ‎Brand Reputation ‎[1,373 bytes]
  241. (hist) ‎Cost to Serve (CTS) ‎[1,378 bytes]
  242. (hist) ‎Extensible Authentication Protocol (EAP) ‎[1,379 bytes]
  243. (hist) ‎Formal Organization ‎[1,379 bytes]
  244. (hist) ‎Phishing ‎[1,380 bytes]
  245. (hist) ‎Productive Efficiency ‎[1,381 bytes]
  246. (hist) ‎Marketing Metrics ‎[1,382 bytes]
  247. (hist) ‎Subscription Right ‎[1,382 bytes]
  248. (hist) ‎Payback Period ‎[1,383 bytes]
  249. (hist) ‎CAN-SPAM Act of 2003 ‎[1,384 bytes]
  250. (hist) ‎Dependency Network ‎[1,385 bytes]

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)