Actions

Special

Short pages

Showing below up to 250 results in range #251 to #500.

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎Network Motif ‎[1,237 bytes]
  2. (hist) ‎Dunning-Kruger Effect ‎[1,237 bytes]
  3. (hist) ‎Compatible Time Sharing System (CTSS) ‎[1,238 bytes]
  4. (hist) ‎Binary File ‎[1,243 bytes]
  5. (hist) ‎Information Asymmetry ‎[1,243 bytes]
  6. (hist) ‎Deliberate Strategy ‎[1,244 bytes]
  7. (hist) ‎System of Record (SOR) ‎[1,246 bytes]
  8. (hist) ‎Value Proposition ‎[1,247 bytes]
  9. (hist) ‎Direct Marketing ‎[1,249 bytes]
  10. (hist) ‎Gartner's Market Share Analysis ‎[1,249 bytes]
  11. (hist) ‎Behavior Learning Engine (BLE) ‎[1,251 bytes]
  12. (hist) ‎Ring Fencing ‎[1,252 bytes]
  13. (hist) ‎Management Information System (MIS) ‎[1,255 bytes]
  14. (hist) ‎Scientific Management Theory ‎[1,258 bytes]
  15. (hist) ‎On-Demand Software ‎[1,262 bytes]
  16. (hist) ‎Supplier Relationship Management ‎[1,262 bytes]
  17. (hist) ‎Abilene Paradox ‎[1,263 bytes]
  18. (hist) ‎Economic Value ‎[1,263 bytes]
  19. (hist) ‎Straw Man Concept ‎[1,263 bytes]
  20. (hist) ‎Platform as a Service (PaaS) ‎[1,265 bytes]
  21. (hist) ‎Quality Management ‎[1,265 bytes]
  22. (hist) ‎Market Driven Organization ‎[1,265 bytes]
  23. (hist) ‎Binary Large Object (BLOB) ‎[1,269 bytes]
  24. (hist) ‎Workers Compensation Insurance ‎[1,269 bytes]
  25. (hist) ‎Value Based Management ‎[1,270 bytes]
  26. (hist) ‎Talent Management ‎[1,270 bytes]
  27. (hist) ‎Transactional Content Management (TCM) ‎[1,270 bytes]
  28. (hist) ‎Substitution Effect ‎[1,271 bytes]
  29. (hist) ‎Web Services Flow Language (WSFL) ‎[1,272 bytes]
  30. (hist) ‎Shareholders' Equity ‎[1,273 bytes]
  31. (hist) ‎Trusted Computer System Evaluation Criteria (TCSEC) ‎[1,274 bytes]
  32. (hist) ‎C-Suite ‎[1,274 bytes]
  33. (hist) ‎Concentrated Marketing ‎[1,275 bytes]
  34. (hist) ‎Large-Scale Integration (LSI) ‎[1,275 bytes]
  35. (hist) ‎Asynchronous JavaScript and XML (AJAX) ‎[1,276 bytes]
  36. (hist) ‎Forced Compliance ‎[1,278 bytes]
  37. (hist) ‎Actual Cost (AC) ‎[1,278 bytes]
  38. (hist) ‎Object Oriented Approach ‎[1,279 bytes]
  39. (hist) ‎Componentization ‎[1,281 bytes]
  40. (hist) ‎Strategic Change Momentum ‎[1,282 bytes]
  41. (hist) ‎Software Development Effort Estimation ‎[1,284 bytes]
  42. (hist) ‎Social Intelligence ‎[1,285 bytes]
  43. (hist) ‎Bankmail Engagement ‎[1,286 bytes]
  44. (hist) ‎User Interface ‎[1,287 bytes]
  45. (hist) ‎Supervisory Control and Data Acquisition (SCADA) ‎[1,288 bytes]
  46. (hist) ‎Internet Protocol (IP) ‎[1,288 bytes]
  47. (hist) ‎Organic Growth ‎[1,289 bytes]
  48. (hist) ‎Code of Ethics ‎[1,291 bytes]
  49. (hist) ‎Behavior Driven Development (BDD) ‎[1,292 bytes]
  50. (hist) ‎World Class Manufacturing ‎[1,294 bytes]
  51. (hist) ‎Strategic Initiatives ‎[1,294 bytes]
  52. (hist) ‎Structure Chart ‎[1,294 bytes]
  53. (hist) ‎Office of Strategy Management ‎[1,297 bytes]
  54. (hist) ‎Synectics ‎[1,297 bytes]
  55. (hist) ‎Application Life Cycle Management Platform as a Service (ALM PaaS) ‎[1,298 bytes]
  56. (hist) ‎Value at Risk ‎[1,299 bytes]
  57. (hist) ‎Cannibalization ‎[1,301 bytes]
  58. (hist) ‎Strategic Architecture ‎[1,301 bytes]
  59. (hist) ‎CMN-GOMS ‎[1,301 bytes]
  60. (hist) ‎Business Rule ‎[1,301 bytes]
  61. (hist) ‎Outcome ‎[1,304 bytes]
  62. (hist) ‎Employee Turnover ‎[1,305 bytes]
  63. (hist) ‎Balance Theory ‎[1,307 bytes]
  64. (hist) ‎Bond Insurance ‎[1,307 bytes]
  65. (hist) ‎Bottom-up Approach ‎[1,307 bytes]
  66. (hist) ‎Pareto Chart ‎[1,307 bytes]
  67. (hist) ‎Reference Semantic Model (RSM) ‎[1,307 bytes]
  68. (hist) ‎Fault Tree Analysis (FTA) ‎[1,308 bytes]
  69. (hist) ‎Probability Theory ‎[1,309 bytes]
  70. (hist) ‎Straight Through Processing (STP) ‎[1,310 bytes]
  71. (hist) ‎Preboot Execution Environment (PXE) ‎[1,311 bytes]
  72. (hist) ‎Distributor ‎[1,314 bytes]
  73. (hist) ‎Social Multi Criteria Analysis (SMCA) ‎[1,314 bytes]
  74. (hist) ‎Structured Data Analysis ‎[1,315 bytes]
  75. (hist) ‎IT Productivity Paradox ‎[1,316 bytes]
  76. (hist) ‎Information Quality Management (IQM) ‎[1,317 bytes]
  77. (hist) ‎Viability Study ‎[1,319 bytes]
  78. (hist) ‎Internet Service Provider (ISP) ‎[1,319 bytes]
  79. (hist) ‎Budgeted Cost of Work Scheduled (BCWS) ‎[1,319 bytes]
  80. (hist) ‎Data Dictionary ‎[1,320 bytes]
  81. (hist) ‎Coaching ‎[1,321 bytes]
  82. (hist) ‎Direct Mail ‎[1,321 bytes]
  83. (hist) ‎Retired Services ‎[1,323 bytes]
  84. (hist) ‎Telemarketing ‎[1,325 bytes]
  85. (hist) ‎Management Buy-Out ‎[1,326 bytes]
  86. (hist) ‎Industry Life Cycle ‎[1,327 bytes]
  87. (hist) ‎Collective Intelligence ‎[1,328 bytes]
  88. (hist) ‎Channel Management ‎[1,330 bytes]
  89. (hist) ‎Service Mark ‎[1,330 bytes]
  90. (hist) ‎Break-even Point ‎[1,331 bytes]
  91. (hist) ‎Profit Motive ‎[1,331 bytes]
  92. (hist) ‎Information Mapping ‎[1,333 bytes]
  93. (hist) ‎Software Visualization ‎[1,333 bytes]
  94. (hist) ‎Design Principles ‎[1,335 bytes]
  95. (hist) ‎Risk Maturity ‎[1,337 bytes]
  96. (hist) ‎Quantitative Investment Analysis ‎[1,337 bytes]
  97. (hist) ‎Strategic Infliction Point ‎[1,337 bytes]
  98. (hist) ‎Security Management ‎[1,337 bytes]
  99. (hist) ‎Cost of Equity ‎[1,338 bytes]
  100. (hist) ‎Financial Services Data Model (FSDM) ‎[1,338 bytes]
  101. (hist) ‎Desktop Operating System ‎[1,339 bytes]
  102. (hist) ‎Executive Information System (EIS) ‎[1,340 bytes]
  103. (hist) ‎Probability Distribution ‎[1,343 bytes]
  104. (hist) ‎Systems Architecture ‎[1,343 bytes]
  105. (hist) ‎Bayes' Theorem ‎[1,344 bytes]
  106. (hist) ‎Software Sizing ‎[1,345 bytes]
  107. (hist) ‎Recurrent Neural Network (RNN) ‎[1,346 bytes]
  108. (hist) ‎Underpinning Contract (UC) ‎[1,347 bytes]
  109. (hist) ‎Simulation Modeling ‎[1,348 bytes]
  110. (hist) ‎Computerized Maintenance Management System (CMMS) ‎[1,349 bytes]
  111. (hist) ‎Enterprise Architecture Life Cycle (EALC) ‎[1,349 bytes]
  112. (hist) ‎Asset Performance Management (APM) ‎[1,350 bytes]
  113. (hist) ‎Health Insurance Portability and Accountability Act (HIPAA) ‎[1,351 bytes]
  114. (hist) ‎Project Dependencies ‎[1,352 bytes]
  115. (hist) ‎Capitalism ‎[1,353 bytes]
  116. (hist) ‎Purchase Order ‎[1,353 bytes]
  117. (hist) ‎Resource Description Framework (RDF) ‎[1,354 bytes]
  118. (hist) ‎Blake and Mouton's Managerial Grid ‎[1,354 bytes]
  119. (hist) ‎Integrative Thinking ‎[1,359 bytes]
  120. (hist) ‎Software Archeology ‎[1,359 bytes]
  121. (hist) ‎Value Creation Index ‎[1,361 bytes]
  122. (hist) ‎Cyberspace ‎[1,361 bytes]
  123. (hist) ‎Strategic Themes ‎[1,362 bytes]
  124. (hist) ‎Data Asset Framework (DAF) ‎[1,363 bytes]
  125. (hist) ‎Brand Line ‎[1,363 bytes]
  126. (hist) ‎Browser Isolation ‎[1,370 bytes]
  127. (hist) ‎Workplace Safety ‎[1,370 bytes]
  128. (hist) ‎Information as a Service (IaaS) ‎[1,371 bytes]
  129. (hist) ‎Stakeholder Engagement ‎[1,371 bytes]
  130. (hist) ‎Operating Expenses ‎[1,373 bytes]
  131. (hist) ‎Brand Reputation ‎[1,373 bytes]
  132. (hist) ‎Cost to Serve (CTS) ‎[1,378 bytes]
  133. (hist) ‎Extensible Authentication Protocol (EAP) ‎[1,379 bytes]
  134. (hist) ‎Formal Organization ‎[1,379 bytes]
  135. (hist) ‎Phishing ‎[1,380 bytes]
  136. (hist) ‎Productive Efficiency ‎[1,381 bytes]
  137. (hist) ‎Marketing Metrics ‎[1,382 bytes]
  138. (hist) ‎Subscription Right ‎[1,382 bytes]
  139. (hist) ‎Payback Period ‎[1,383 bytes]
  140. (hist) ‎CAN-SPAM Act of 2003 ‎[1,384 bytes]
  141. (hist) ‎Dependency Network ‎[1,385 bytes]
  142. (hist) ‎Health Level 7 (HL7) ‎[1,385 bytes]
  143. (hist) ‎Rätselvermehrung ‎[1,385 bytes]
  144. (hist) ‎Organizational Behavior ‎[1,385 bytes]
  145. (hist) ‎Value for Money Audit ‎[1,386 bytes]
  146. (hist) ‎Advanced Distribution Protection and Restoration Devices ‎[1,388 bytes]
  147. (hist) ‎Markup Language ‎[1,388 bytes]
  148. (hist) ‎Autonomous System Number (ASN) ‎[1,391 bytes]
  149. (hist) ‎Value-Based Business-IT Alignment (VITAL) Project ‎[1,394 bytes]
  150. (hist) ‎Strike Price ‎[1,394 bytes]
  151. (hist) ‎Total Shareholder Return (TSR) ‎[1,395 bytes]
  152. (hist) ‎Dempster Shafer (D-S) Theory ‎[1,396 bytes]
  153. (hist) ‎Investor Sentiment ‎[1,397 bytes]
  154. (hist) ‎Crescendo Model of Rejuvenation ‎[1,397 bytes]
  155. (hist) ‎Diminishing Returns (DR) ‎[1,398 bytes]
  156. (hist) ‎SMS Marketing ‎[1,400 bytes]
  157. (hist) ‎Strategic Imperatives ‎[1,401 bytes]
  158. (hist) ‎Support Activities ‎[1,401 bytes]
  159. (hist) ‎Commercial Property Insurance ‎[1,403 bytes]
  160. (hist) ‎Pricing Model ‎[1,404 bytes]
  161. (hist) ‎Infrastructure as a Service (IaaS) ‎[1,405 bytes]
  162. (hist) ‎Social Cost Benefit Analysis (SCBA) ‎[1,405 bytes]
  163. (hist) ‎Cross Training (Business) ‎[1,407 bytes]
  164. (hist) ‎Sunk Cost ‎[1,407 bytes]
  165. (hist) ‎Supply Chain Design ‎[1,407 bytes]
  166. (hist) ‎Information Privacy ‎[1,409 bytes]
  167. (hist) ‎Supply Chain Visibility (SCV) ‎[1,409 bytes]
  168. (hist) ‎Virtual Customer Premises Equipment (vCPE) ‎[1,410 bytes]
  169. (hist) ‎Request for Proposal (RFP) ‎[1,411 bytes]
  170. (hist) ‎Blogging Platform ‎[1,412 bytes]
  171. (hist) ‎Information Flow ‎[1,412 bytes]
  172. (hist) ‎Network Monitoring ‎[1,413 bytes]
  173. (hist) ‎Supplier Evaluation ‎[1,413 bytes]
  174. (hist) ‎National Change of Address (NCOA) ‎[1,415 bytes]
  175. (hist) ‎Business Transaction Protocol (BTP) ‎[1,417 bytes]
  176. (hist) ‎Hedging ‎[1,418 bytes]
  177. (hist) ‎Inventory Shrinkage ‎[1,418 bytes]
  178. (hist) ‎Business Process Simulation ‎[1,420 bytes]
  179. (hist) ‎Open Security Architecture (OSA) Framework ‎[1,420 bytes]
  180. (hist) ‎Document Modeling ‎[1,421 bytes]
  181. (hist) ‎Gantt Chart ‎[1,421 bytes]
  182. (hist) ‎Penetration Pricing ‎[1,421 bytes]
  183. (hist) ‎Cause and Effect Diagram ‎[1,422 bytes]
  184. (hist) ‎Common Alerting Protocol (CAP) ‎[1,422 bytes]
  185. (hist) ‎The Abridged Big Five-Dimensional Circumplex (AB5C) ‎[1,425 bytes]
  186. (hist) ‎Application Control ‎[1,427 bytes]
  187. (hist) ‎Bridging Epistemologies ‎[1,429 bytes]
  188. (hist) ‎Strategic Grid for IT ‎[1,431 bytes]
  189. (hist) ‎Document Object Model (DOM) ‎[1,431 bytes]
  190. (hist) ‎Information Governance Professional (IGP) Certification ‎[1,432 bytes]
  191. (hist) ‎Professional Liability Insurance ‎[1,432 bytes]
  192. (hist) ‎Strategic Synergy ‎[1,432 bytes]
  193. (hist) ‎Intrinsic Stakeholder Commitment ‎[1,434 bytes]
  194. (hist) ‎Six Webs Framework ‎[1,434 bytes]
  195. (hist) ‎Supplier Scorecard ‎[1,435 bytes]
  196. (hist) ‎Crypto Currency ‎[1,436 bytes]
  197. (hist) ‎Play Theory of Mass Communication ‎[1,437 bytes]
  198. (hist) ‎Storage Device ‎[1,438 bytes]
  199. (hist) ‎Primary Customer ‎[1,439 bytes]
  200. (hist) ‎Web Content Management ‎[1,440 bytes]
  201. (hist) ‎Information Model ‎[1,441 bytes]
  202. (hist) ‎Structured Analysis and Design Technique (SADT) ‎[1,442 bytes]
  203. (hist) ‎POSDCORB ‎[1,443 bytes]
  204. (hist) ‎Reverse Logistics ‎[1,444 bytes]
  205. (hist) ‎MoSCoW Method ‎[1,444 bytes]
  206. (hist) ‎Corporate Sustainability ‎[1,448 bytes]
  207. (hist) ‎Waste Management ‎[1,449 bytes]
  208. (hist) ‎Elasticity of Supply ‎[1,449 bytes]
  209. (hist) ‎Functional Strategy ‎[1,449 bytes]
  210. (hist) ‎Vertical Integration ‎[1,450 bytes]
  211. (hist) ‎Collaboration Protocol Profile/Agreement (CPP/A) ‎[1,450 bytes]
  212. (hist) ‎First-Mover Advantage (FMA) ‎[1,450 bytes]
  213. (hist) ‎Software Non-functional Assessment Process (SNAP) ‎[1,450 bytes]
  214. (hist) ‎User-Centered Design (UCD) ‎[1,452 bytes]
  215. (hist) ‎Strategic Window ‎[1,452 bytes]
  216. (hist) ‎Use Case Diagram ‎[1,453 bytes]
  217. (hist) ‎Web Ontology Language (OWL) ‎[1,454 bytes]
  218. (hist) ‎Requirements Analysis ‎[1,454 bytes]
  219. (hist) ‎Laswell's Communication Model ‎[1,454 bytes]
  220. (hist) ‎Representational State Transfer (REST) ‎[1,454 bytes]
  221. (hist) ‎Information Design ‎[1,455 bytes]
  222. (hist) ‎Logical Incrementalism ‎[1,455 bytes]
  223. (hist) ‎Public Relations ‎[1,457 bytes]
  224. (hist) ‎Horizontal Integration ‎[1,461 bytes]
  225. (hist) ‎Weighted Average Cost of Capital (WACC) ‎[1,464 bytes]
  226. (hist) ‎Completed-Contract Method ‎[1,465 bytes]
  227. (hist) ‎Conditional Logics ‎[1,465 bytes]
  228. (hist) ‎Virtual Desktop Infrastructure (VDI) ‎[1,466 bytes]
  229. (hist) ‎The Value Model™ (VM) ‎[1,468 bytes]
  230. (hist) ‎Domain Specific Language (DSL) ‎[1,468 bytes]
  231. (hist) ‎GeoVMM ‎[1,468 bytes]
  232. (hist) ‎Metropolitan Area Network (MAN) ‎[1,472 bytes]
  233. (hist) ‎Polymorphism ‎[1,472 bytes]
  234. (hist) ‎Simulation Governance ‎[1,473 bytes]
  235. (hist) ‎Revenue Recognition ‎[1,475 bytes]
  236. (hist) ‎Prioritization Matrix ‎[1,475 bytes]
  237. (hist) ‎Strategic CRM ‎[1,480 bytes]
  238. (hist) ‎Supervisoral Development ‎[1,483 bytes]
  239. (hist) ‎Very Large-Scale Integration (VLSI) ‎[1,484 bytes]
  240. (hist) ‎Open Systems ‎[1,485 bytes]
  241. (hist) ‎Computational Logic ‎[1,487 bytes]
  242. (hist) ‎Operating Cash Flow ‎[1,489 bytes]
  243. (hist) ‎Fast Common Gateway Interface (FastCGI) ‎[1,490 bytes]
  244. (hist) ‎Persuasion Theory ‎[1,494 bytes]
  245. (hist) ‎Planning Game ‎[1,494 bytes]
  246. (hist) ‎Application Management ‎[1,496 bytes]
  247. (hist) ‎Amdahl's Law ‎[1,498 bytes]
  248. (hist) ‎Goodwill ‎[1,499 bytes]
  249. (hist) ‎The Three Component Model of Organizational Commitment ‎[1,499 bytes]
  250. (hist) ‎Parallel Processing ‎[1,500 bytes]

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)