Short pages
Showing below up to 250 results in range #251 to #500.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)
- (hist) Network Motif [1,237 bytes]
- (hist) Dunning-Kruger Effect [1,237 bytes]
- (hist) Compatible Time Sharing System (CTSS) [1,238 bytes]
- (hist) Binary File [1,243 bytes]
- (hist) Information Asymmetry [1,243 bytes]
- (hist) Deliberate Strategy [1,244 bytes]
- (hist) System of Record (SOR) [1,246 bytes]
- (hist) Value Proposition [1,247 bytes]
- (hist) Direct Marketing [1,249 bytes]
- (hist) Gartner's Market Share Analysis [1,249 bytes]
- (hist) Behavior Learning Engine (BLE) [1,251 bytes]
- (hist) Ring Fencing [1,252 bytes]
- (hist) Management Information System (MIS) [1,255 bytes]
- (hist) Scientific Management Theory [1,258 bytes]
- (hist) On-Demand Software [1,262 bytes]
- (hist) Supplier Relationship Management [1,262 bytes]
- (hist) Abilene Paradox [1,263 bytes]
- (hist) Economic Value [1,263 bytes]
- (hist) Straw Man Concept [1,263 bytes]
- (hist) Platform as a Service (PaaS) [1,265 bytes]
- (hist) Quality Management [1,265 bytes]
- (hist) Market Driven Organization [1,265 bytes]
- (hist) Binary Large Object (BLOB) [1,269 bytes]
- (hist) Workers Compensation Insurance [1,269 bytes]
- (hist) Value Based Management [1,270 bytes]
- (hist) Talent Management [1,270 bytes]
- (hist) Transactional Content Management (TCM) [1,270 bytes]
- (hist) Substitution Effect [1,271 bytes]
- (hist) Web Services Flow Language (WSFL) [1,272 bytes]
- (hist) Shareholders' Equity [1,273 bytes]
- (hist) Trusted Computer System Evaluation Criteria (TCSEC) [1,274 bytes]
- (hist) C-Suite [1,274 bytes]
- (hist) Concentrated Marketing [1,275 bytes]
- (hist) Large-Scale Integration (LSI) [1,275 bytes]
- (hist) Asynchronous JavaScript and XML (AJAX) [1,276 bytes]
- (hist) Forced Compliance [1,278 bytes]
- (hist) Actual Cost (AC) [1,278 bytes]
- (hist) Object Oriented Approach [1,279 bytes]
- (hist) Componentization [1,281 bytes]
- (hist) Strategic Change Momentum [1,282 bytes]
- (hist) Software Development Effort Estimation [1,284 bytes]
- (hist) Social Intelligence [1,285 bytes]
- (hist) Bankmail Engagement [1,286 bytes]
- (hist) User Interface [1,287 bytes]
- (hist) Supervisory Control and Data Acquisition (SCADA) [1,288 bytes]
- (hist) Internet Protocol (IP) [1,288 bytes]
- (hist) Organic Growth [1,289 bytes]
- (hist) Code of Ethics [1,291 bytes]
- (hist) Behavior Driven Development (BDD) [1,292 bytes]
- (hist) World Class Manufacturing [1,294 bytes]
- (hist) Strategic Initiatives [1,294 bytes]
- (hist) Structure Chart [1,294 bytes]
- (hist) Office of Strategy Management [1,297 bytes]
- (hist) Synectics [1,297 bytes]
- (hist) Application Life Cycle Management Platform as a Service (ALM PaaS) [1,298 bytes]
- (hist) Value at Risk [1,299 bytes]
- (hist) Cannibalization [1,301 bytes]
- (hist) Strategic Architecture [1,301 bytes]
- (hist) CMN-GOMS [1,301 bytes]
- (hist) Business Rule [1,301 bytes]
- (hist) Outcome [1,304 bytes]
- (hist) Employee Turnover [1,305 bytes]
- (hist) Balance Theory [1,307 bytes]
- (hist) Bond Insurance [1,307 bytes]
- (hist) Bottom-up Approach [1,307 bytes]
- (hist) Pareto Chart [1,307 bytes]
- (hist) Reference Semantic Model (RSM) [1,307 bytes]
- (hist) Fault Tree Analysis (FTA) [1,308 bytes]
- (hist) Probability Theory [1,309 bytes]
- (hist) Straight Through Processing (STP) [1,310 bytes]
- (hist) Preboot Execution Environment (PXE) [1,311 bytes]
- (hist) Distributor [1,314 bytes]
- (hist) Social Multi Criteria Analysis (SMCA) [1,314 bytes]
- (hist) Structured Data Analysis [1,315 bytes]
- (hist) IT Productivity Paradox [1,316 bytes]
- (hist) Information Quality Management (IQM) [1,317 bytes]
- (hist) Viability Study [1,319 bytes]
- (hist) Internet Service Provider (ISP) [1,319 bytes]
- (hist) Budgeted Cost of Work Scheduled (BCWS) [1,319 bytes]
- (hist) Data Dictionary [1,320 bytes]
- (hist) Coaching [1,321 bytes]
- (hist) Direct Mail [1,321 bytes]
- (hist) Retired Services [1,323 bytes]
- (hist) Telemarketing [1,325 bytes]
- (hist) Management Buy-Out [1,326 bytes]
- (hist) Industry Life Cycle [1,327 bytes]
- (hist) Collective Intelligence [1,328 bytes]
- (hist) Channel Management [1,330 bytes]
- (hist) Service Mark [1,330 bytes]
- (hist) Break-even Point [1,331 bytes]
- (hist) Profit Motive [1,331 bytes]
- (hist) Information Mapping [1,333 bytes]
- (hist) Software Visualization [1,333 bytes]
- (hist) Design Principles [1,335 bytes]
- (hist) Risk Maturity [1,337 bytes]
- (hist) Quantitative Investment Analysis [1,337 bytes]
- (hist) Strategic Infliction Point [1,337 bytes]
- (hist) Security Management [1,337 bytes]
- (hist) Cost of Equity [1,338 bytes]
- (hist) Financial Services Data Model (FSDM) [1,338 bytes]
- (hist) Desktop Operating System [1,339 bytes]
- (hist) Executive Information System (EIS) [1,340 bytes]
- (hist) Probability Distribution [1,343 bytes]
- (hist) Systems Architecture [1,343 bytes]
- (hist) Bayes' Theorem [1,344 bytes]
- (hist) Software Sizing [1,345 bytes]
- (hist) Recurrent Neural Network (RNN) [1,346 bytes]
- (hist) Underpinning Contract (UC) [1,347 bytes]
- (hist) Simulation Modeling [1,348 bytes]
- (hist) Computerized Maintenance Management System (CMMS) [1,349 bytes]
- (hist) Enterprise Architecture Life Cycle (EALC) [1,349 bytes]
- (hist) Asset Performance Management (APM) [1,350 bytes]
- (hist) Health Insurance Portability and Accountability Act (HIPAA) [1,351 bytes]
- (hist) Project Dependencies [1,352 bytes]
- (hist) Capitalism [1,353 bytes]
- (hist) Purchase Order [1,353 bytes]
- (hist) Resource Description Framework (RDF) [1,354 bytes]
- (hist) Blake and Mouton's Managerial Grid [1,354 bytes]
- (hist) Integrative Thinking [1,359 bytes]
- (hist) Software Archeology [1,359 bytes]
- (hist) Value Creation Index [1,361 bytes]
- (hist) Cyberspace [1,361 bytes]
- (hist) Strategic Themes [1,362 bytes]
- (hist) Data Asset Framework (DAF) [1,363 bytes]
- (hist) Brand Line [1,363 bytes]
- (hist) Browser Isolation [1,370 bytes]
- (hist) Workplace Safety [1,370 bytes]
- (hist) Information as a Service (IaaS) [1,371 bytes]
- (hist) Stakeholder Engagement [1,371 bytes]
- (hist) Operating Expenses [1,373 bytes]
- (hist) Brand Reputation [1,373 bytes]
- (hist) Cost to Serve (CTS) [1,378 bytes]
- (hist) Extensible Authentication Protocol (EAP) [1,379 bytes]
- (hist) Formal Organization [1,379 bytes]
- (hist) Phishing [1,380 bytes]
- (hist) Productive Efficiency [1,381 bytes]
- (hist) Marketing Metrics [1,382 bytes]
- (hist) Subscription Right [1,382 bytes]
- (hist) Payback Period [1,383 bytes]
- (hist) CAN-SPAM Act of 2003 [1,384 bytes]
- (hist) Dependency Network [1,385 bytes]
- (hist) Health Level 7 (HL7) [1,385 bytes]
- (hist) Rätselvermehrung [1,385 bytes]
- (hist) Organizational Behavior [1,385 bytes]
- (hist) Value for Money Audit [1,386 bytes]
- (hist) Advanced Distribution Protection and Restoration Devices [1,388 bytes]
- (hist) Markup Language [1,388 bytes]
- (hist) Autonomous System Number (ASN) [1,391 bytes]
- (hist) Value-Based Business-IT Alignment (VITAL) Project [1,394 bytes]
- (hist) Strike Price [1,394 bytes]
- (hist) Total Shareholder Return (TSR) [1,395 bytes]
- (hist) Dempster Shafer (D-S) Theory [1,396 bytes]
- (hist) Investor Sentiment [1,397 bytes]
- (hist) Crescendo Model of Rejuvenation [1,397 bytes]
- (hist) Diminishing Returns (DR) [1,398 bytes]
- (hist) SMS Marketing [1,400 bytes]
- (hist) Strategic Imperatives [1,401 bytes]
- (hist) Support Activities [1,401 bytes]
- (hist) Commercial Property Insurance [1,403 bytes]
- (hist) Pricing Model [1,404 bytes]
- (hist) Infrastructure as a Service (IaaS) [1,405 bytes]
- (hist) Social Cost Benefit Analysis (SCBA) [1,405 bytes]
- (hist) Cross Training (Business) [1,407 bytes]
- (hist) Sunk Cost [1,407 bytes]
- (hist) Supply Chain Design [1,407 bytes]
- (hist) Information Privacy [1,409 bytes]
- (hist) Supply Chain Visibility (SCV) [1,409 bytes]
- (hist) Virtual Customer Premises Equipment (vCPE) [1,410 bytes]
- (hist) Request for Proposal (RFP) [1,411 bytes]
- (hist) Blogging Platform [1,412 bytes]
- (hist) Information Flow [1,412 bytes]
- (hist) Network Monitoring [1,413 bytes]
- (hist) Supplier Evaluation [1,413 bytes]
- (hist) National Change of Address (NCOA) [1,415 bytes]
- (hist) Business Transaction Protocol (BTP) [1,417 bytes]
- (hist) Hedging [1,418 bytes]
- (hist) Inventory Shrinkage [1,418 bytes]
- (hist) Business Process Simulation [1,420 bytes]
- (hist) Open Security Architecture (OSA) Framework [1,420 bytes]
- (hist) Document Modeling [1,421 bytes]
- (hist) Gantt Chart [1,421 bytes]
- (hist) Penetration Pricing [1,421 bytes]
- (hist) Cause and Effect Diagram [1,422 bytes]
- (hist) Common Alerting Protocol (CAP) [1,422 bytes]
- (hist) The Abridged Big Five-Dimensional Circumplex (AB5C) [1,425 bytes]
- (hist) Application Control [1,427 bytes]
- (hist) Bridging Epistemologies [1,429 bytes]
- (hist) Strategic Grid for IT [1,431 bytes]
- (hist) Document Object Model (DOM) [1,431 bytes]
- (hist) Information Governance Professional (IGP) Certification [1,432 bytes]
- (hist) Professional Liability Insurance [1,432 bytes]
- (hist) Strategic Synergy [1,432 bytes]
- (hist) Intrinsic Stakeholder Commitment [1,434 bytes]
- (hist) Six Webs Framework [1,434 bytes]
- (hist) Supplier Scorecard [1,435 bytes]
- (hist) Crypto Currency [1,436 bytes]
- (hist) Play Theory of Mass Communication [1,437 bytes]
- (hist) Storage Device [1,438 bytes]
- (hist) Primary Customer [1,439 bytes]
- (hist) Web Content Management [1,440 bytes]
- (hist) Information Model [1,441 bytes]
- (hist) Structured Analysis and Design Technique (SADT) [1,442 bytes]
- (hist) POSDCORB [1,443 bytes]
- (hist) Reverse Logistics [1,444 bytes]
- (hist) MoSCoW Method [1,444 bytes]
- (hist) Corporate Sustainability [1,448 bytes]
- (hist) Waste Management [1,449 bytes]
- (hist) Elasticity of Supply [1,449 bytes]
- (hist) Functional Strategy [1,449 bytes]
- (hist) Vertical Integration [1,450 bytes]
- (hist) Collaboration Protocol Profile/Agreement (CPP/A) [1,450 bytes]
- (hist) First-Mover Advantage (FMA) [1,450 bytes]
- (hist) Software Non-functional Assessment Process (SNAP) [1,450 bytes]
- (hist) User-Centered Design (UCD) [1,452 bytes]
- (hist) Strategic Window [1,452 bytes]
- (hist) Use Case Diagram [1,453 bytes]
- (hist) Web Ontology Language (OWL) [1,454 bytes]
- (hist) Requirements Analysis [1,454 bytes]
- (hist) Laswell's Communication Model [1,454 bytes]
- (hist) Representational State Transfer (REST) [1,454 bytes]
- (hist) Information Design [1,455 bytes]
- (hist) Logical Incrementalism [1,455 bytes]
- (hist) Public Relations [1,457 bytes]
- (hist) Horizontal Integration [1,461 bytes]
- (hist) Weighted Average Cost of Capital (WACC) [1,464 bytes]
- (hist) Completed-Contract Method [1,465 bytes]
- (hist) Conditional Logics [1,465 bytes]
- (hist) Virtual Desktop Infrastructure (VDI) [1,466 bytes]
- (hist) The Value Model™ (VM) [1,468 bytes]
- (hist) Domain Specific Language (DSL) [1,468 bytes]
- (hist) GeoVMM [1,468 bytes]
- (hist) Metropolitan Area Network (MAN) [1,472 bytes]
- (hist) Polymorphism [1,472 bytes]
- (hist) Simulation Governance [1,473 bytes]
- (hist) Revenue Recognition [1,475 bytes]
- (hist) Prioritization Matrix [1,475 bytes]
- (hist) Strategic CRM [1,480 bytes]
- (hist) Supervisoral Development [1,483 bytes]
- (hist) Very Large-Scale Integration (VLSI) [1,484 bytes]
- (hist) Open Systems [1,485 bytes]
- (hist) Computational Logic [1,487 bytes]
- (hist) Operating Cash Flow [1,489 bytes]
- (hist) Fast Common Gateway Interface (FastCGI) [1,490 bytes]
- (hist) Persuasion Theory [1,494 bytes]
- (hist) Planning Game [1,494 bytes]
- (hist) Application Management [1,496 bytes]
- (hist) Amdahl's Law [1,498 bytes]
- (hist) Goodwill [1,499 bytes]
- (hist) The Three Component Model of Organizational Commitment [1,499 bytes]
- (hist) Parallel Processing [1,500 bytes]