Short pages
Showing below up to 250 results in range #501 to #750.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)
- (hist) Service Component Architecture (SCA) [1,554 bytes]
- (hist) Control Framework [1,555 bytes]
- (hist) Secure Sockets Layer (SSL) [1,557 bytes]
- (hist) Income Statement [1,560 bytes]
- (hist) Software Configuration Management (SCM) [1,560 bytes]
- (hist) Internet of People (IOP) [1,560 bytes]
- (hist) Organic Organization [1,561 bytes]
- (hist) Multipurpose Internet Mail Extensions (MIME) [1,562 bytes]
- (hist) Computer-Aided Process Planning (CAPP) [1,566 bytes]
- (hist) Computer Program [1,568 bytes]
- (hist) Financial Leverage [1,568 bytes]
- (hist) Extract, Transform, Load (ETL) [1,569 bytes]
- (hist) Fiduciary Responsibility [1,570 bytes]
- (hist) Reverse Takeover [1,570 bytes]
- (hist) STRATPORT Model [1,570 bytes]
- (hist) Data Deduplication [1,571 bytes]
- (hist) Context-Aware Computing [1,573 bytes]
- (hist) Eisenhower Matrix [1,573 bytes]
- (hist) Emerging Markets [1,573 bytes]
- (hist) Dynamic Data Exchange (DDE) [1,574 bytes]
- (hist) Project Management Body of Knowledge (PMBOK®) [1,574 bytes]
- (hist) Share of Wallet [1,574 bytes]
- (hist) System Integration Testing (SIT) [1,575 bytes]
- (hist) Strategic Stakeholder [1,576 bytes]
- (hist) Hypervisor [1,577 bytes]
- (hist) Time to Market [1,578 bytes]
- (hist) Cost of Revenue [1,578 bytes]
- (hist) Workforce Optimization (WFO) [1,579 bytes]
- (hist) Value Disciplines [1,579 bytes]
- (hist) Organization Chart [1,579 bytes]
- (hist) SharePoint [1,579 bytes]
- (hist) Cross-Branding [1,580 bytes]
- (hist) Database Schema [1,581 bytes]
- (hist) Second-Mover Strategy [1,581 bytes]
- (hist) Integrated Circuit (IC) [1,581 bytes]
- (hist) Evaluation [1,583 bytes]
- (hist) Integrated Behavioral Model [1,583 bytes]
- (hist) Advanced Clinical Research Information Systems (ACRIS) [1,584 bytes]
- (hist) Cone of Uncertainty [1,585 bytes]
- (hist) Collaborative Planning Methodology (CPM) [1,586 bytes]
- (hist) Stakeholder Value Perspective [1,586 bytes]
- (hist) VoIP (Voice Over Internet Protocol) [1,587 bytes]
- (hist) Strategic Change [1,589 bytes]
- (hist) Transmission Control Protocol (TCP) [1,591 bytes]
- (hist) Mobile Operating System [1,591 bytes]
- (hist) Bachman Diagram [1,592 bytes]
- (hist) Uniform Resource Identifier (URI) [1,592 bytes]
- (hist) Word of Mouth Marketing [1,593 bytes]
- (hist) Sensitivity Analysis [1,593 bytes]
- (hist) Warrant [1,595 bytes]
- (hist) Economic Margin (EM) [1,595 bytes]
- (hist) DevOps [1,597 bytes]
- (hist) Barker's Notation [1,598 bytes]
- (hist) Ceteris Paribus [1,598 bytes]
- (hist) Expected Value [1,601 bytes]
- (hist) Profitability Ratios [1,601 bytes]
- (hist) International Electro-technical Commission (IEC) [1,603 bytes]
- (hist) External Environment [1,603 bytes]
- (hist) People Pill [1,603 bytes]
- (hist) Enterprise Life Cycle [1,609 bytes]
- (hist) Managing for Results Framework [1,611 bytes]
- (hist) JavaScript Object Notation (JSON) [1,612 bytes]
- (hist) NIST Enterprise Architecture Model (NIST EA Model) [1,613 bytes]
- (hist) Behavioral Finance [1,614 bytes]
- (hist) File Transfer Protocol (FTP) [1,614 bytes]
- (hist) Cyber-Physical Systems (CPS) [1,616 bytes]
- (hist) Network Structure [1,623 bytes]
- (hist) Disk Operating System (DOS) [1,624 bytes]
- (hist) Task Dependencies [1,627 bytes]
- (hist) Archetype [1,628 bytes]
- (hist) PEG Ratio [1,629 bytes]
- (hist) Underwriters Laboratories (UL) [1,630 bytes]
- (hist) Augmented Reality (AR) [1,630 bytes]
- (hist) Supply Chain Architecture Life Cycle (SCALe) [1,630 bytes]
- (hist) Critical Path Method (CPM) [1,631 bytes]
- (hist) The Object-Oriented Hypermedia Design Model (OOHDM) [1,633 bytes]
- (hist) SMART Method [1,634 bytes]
- (hist) Business Resumption Plan [1,641 bytes]
- (hist) Outcome-Driven Innovation (ODI) [1,641 bytes]
- (hist) Ansoff Matrix [1,642 bytes]
- (hist) Trusted Computing Group (TCG) Standards [1,643 bytes]
- (hist) CRM Value Chain [1,645 bytes]
- (hist) Corporate Bond [1,646 bytes]
- (hist) Capital Lease [1,647 bytes]
- (hist) Data Wrangling [1,647 bytes]
- (hist) Theory of Constraints [1,649 bytes]
- (hist) Serverless Computing [1,649 bytes]
- (hist) Hostile Takeover [1,650 bytes]
- (hist) Leadership Development [1,650 bytes]
- (hist) Psychological Pricing [1,650 bytes]
- (hist) Social CRM [1,653 bytes]
- (hist) Corporate Charter [1,654 bytes]
- (hist) Interoperability [1,655 bytes]
- (hist) Project Plan [1,658 bytes]
- (hist) Net Operating Profit After Taxes (NOPAT) [1,659 bytes]
- (hist) IDIC Model [1,659 bytes]
- (hist) Post Merger Integration (PMI) [1,660 bytes]
- (hist) Open-System Environment Reference Model (OSERM) [1,662 bytes]
- (hist) Operating Profit Percentage [1,663 bytes]
- (hist) Manufacturing Extension Partnership (MEP) [1,665 bytes]
- (hist) Test Marketing [1,666 bytes]
- (hist) Architected, Model-Driven Development (AMD) [1,667 bytes]
- (hist) Total Cost of Risk (TCoR) [1,667 bytes]
- (hist) Portfolio Analysis [1,668 bytes]
- (hist) Project Scope [1,670 bytes]
- (hist) Data Structure [1,672 bytes]
- (hist) Bureaucratic Theory [1,673 bytes]
- (hist) The Four Stages of Learning [1,673 bytes]
- (hist) Competitive Advantage of Nations [1,674 bytes]
- (hist) Opportunity Cost [1,674 bytes]
- (hist) Action-Centered Leadership [1,676 bytes]
- (hist) Time Management [1,677 bytes]
- (hist) Cross Tabulation [1,681 bytes]
- (hist) Splay Tree [1,681 bytes]
- (hist) Business Process Engine (BPE) [1,688 bytes]
- (hist) Data as a Service (DaaS) [1,689 bytes]
- (hist) Network Organization [1,689 bytes]
- (hist) Value Analysis [1,690 bytes]
- (hist) Financial Covenants [1,691 bytes]
- (hist) Affiliate Marketing [1,695 bytes]
- (hist) Cross Process Integration [1,697 bytes]
- (hist) Shared Value [1,701 bytes]
- (hist) Bases of Social Power [1,703 bytes]
- (hist) MOST (Mission, Objectives, Strategies and Tactics) Analysis [1,703 bytes]
- (hist) Trade Marketing Mix [1,704 bytes]
- (hist) Core Architecture Data Model (CADM) [1,705 bytes]
- (hist) Change Phases [1,708 bytes]
- (hist) Framing [1,708 bytes]
- (hist) Depreciation [1,712 bytes]
- (hist) Systems Dynamics [1,712 bytes]
- (hist) Buy Out [1,714 bytes]
- (hist) Service Catalog Management [1,714 bytes]
- (hist) IT Chargeback Model [1,716 bytes]
- (hist) Adversarial Purchasing [1,717 bytes]
- (hist) IPMA Competence Baseline (ICB) [1,717 bytes]
- (hist) SLEPT Analysis [1,719 bytes]
- (hist) Market Saturation [1,719 bytes]
- (hist) Gross Domestic Product [1,720 bytes]
- (hist) Matrix Organization [1,720 bytes]
- (hist) Business-to-Business (B2B) [1,721 bytes]
- (hist) Handler's Classification [1,721 bytes]
- (hist) Functional Size Measurement (FSM) [1,722 bytes]
- (hist) Sherwood Applied Business Security Architecture (SABSA) Framework [1,723 bytes]
- (hist) Cloud Integration [1,725 bytes]
- (hist) Application Portability Profile (APP) [1,726 bytes]
- (hist) Return on Net Assets (RONA) [1,729 bytes]
- (hist) Device [1,730 bytes]
- (hist) International Financial Reporting Standards (IFRS) [1,733 bytes]
- (hist) Trusted Computing (TC) [1,733 bytes]
- (hist) Change Dimensions [1,733 bytes]
- (hist) Behavioral Targeting [1,734 bytes]
- (hist) Stock Dividend [1,734 bytes]
- (hist) Community of Interest [1,736 bytes]
- (hist) Computer-Aided Design/Computer-Aided Manufacturing (CAD/CAM) [1,737 bytes]
- (hist) Database Design [1,738 bytes]
- (hist) Root Cause [1,746 bytes]
- (hist) Data Fragmentation [1,746 bytes]
- (hist) Team Charter [1,749 bytes]
- (hist) Non Value-Added Work [1,749 bytes]
- (hist) Theory of Mechanistic and Organic Systems [1,751 bytes]
- (hist) Earnings Management [1,751 bytes]
- (hist) Expectancy Theory [1,752 bytes]
- (hist) Spiral of Silence [1,756 bytes]
- (hist) System Context Diagram (SCD) [1,759 bytes]
- (hist) Analytic Hierarchy Process (AHP) [1,761 bytes]
- (hist) IMAC (Install Move Add Change) [1,761 bytes]
- (hist) Data Consolidation [1,765 bytes]
- (hist) Deep Learning [1,767 bytes]
- (hist) Sales Funnel [1,767 bytes]
- (hist) Financial Management and Control [1,771 bytes]
- (hist) Information System Urbanization [1,773 bytes]
- (hist) Net Profit [1,774 bytes]
- (hist) STEEPLE Analysis [1,776 bytes]
- (hist) Strategic Risk Management [1,777 bytes]
- (hist) Financial Performance Management (FPM) [1,779 bytes]
- (hist) ActiveX Data Objects (ADO) [1,780 bytes]
- (hist) Takeover [1,780 bytes]
- (hist) Peter Principle [1,783 bytes]
- (hist) Competency Management System [1,784 bytes]
- (hist) Stochastic Modeling [1,785 bytes]
- (hist) Intentional Change Theory (ICT) [1,785 bytes]
- (hist) Friendly Takeover [1,786 bytes]
- (hist) Storytelling [1,787 bytes]
- (hist) Known Error Record [1,788 bytes]
- (hist) Web Content Management System (WCMS) [1,789 bytes]
- (hist) Distribution Channel [1,789 bytes]
- (hist) Project Management Maturity Model (PMMM) [1,789 bytes]
- (hist) Employee Stock Options [1,793 bytes]
- (hist) Engineering Change Order (ECO) [1,794 bytes]
- (hist) Environmental Factors [1,797 bytes]
- (hist) Strategic Fit [1,797 bytes]
- (hist) Low-code Development Platforms (LCDP) [1,798 bytes]
- (hist) Exclusive Distribution [1,799 bytes]
- (hist) Decision Model [1,800 bytes]
- (hist) Advanced Server Energy Monitoring Tools [1,802 bytes]
- (hist) Structured Systems Analysis and Design Method (SSADM) [1,802 bytes]
- (hist) Information Risk Management (IRM) [1,802 bytes]
- (hist) Return on Assets (ROA) [1,806 bytes]
- (hist) Product Information Management (PIM) [1,807 bytes]
- (hist) Metrics [1,809 bytes]
- (hist) Stakeholder Analysis [1,812 bytes]
- (hist) Base Station Controller (BSC) [1,813 bytes]
- (hist) Analytic Applications [1,814 bytes]
- (hist) Statistical Quality Control (SQC) [1,814 bytes]
- (hist) Business Process Modeling Notation (BPMN) [1,815 bytes]
- (hist) Metadata Management [1,816 bytes]
- (hist) Five W's [1,817 bytes]
- (hist) Operating Income [1,818 bytes]
- (hist) Critical Chain [1,820 bytes]
- (hist) Backbone Router [1,823 bytes]
- (hist) Systems Modeling [1,824 bytes]
- (hist) Price [1,824 bytes]
- (hist) Information Governance Initiative (IGI) [1,826 bytes]
- (hist) Strategic Altitude [1,827 bytes]
- (hist) Balance Sheet [1,828 bytes]
- (hist) Building Energy Management Systems (BEMS) [1,828 bytes]
- (hist) Financial Statement [1,828 bytes]
- (hist) Resource [1,833 bytes]
- (hist) Adsorption Chillers [1,834 bytes]
- (hist) Beyond Budgeting [1,836 bytes]
- (hist) Accounting [1,838 bytes]
- (hist) PAEI Management Model [1,839 bytes]
- (hist) Application Channel Technology and Industry (ACT I) [1,842 bytes]
- (hist) Building Lifecycle Management (BLM) [1,842 bytes]
- (hist) Business Process Standardization [1,842 bytes]
- (hist) Electronic Records Management (ERM) [1,844 bytes]
- (hist) Blended Learning [1,845 bytes]
- (hist) Return on Capital Employed (ROCE) [1,845 bytes]
- (hist) Return on Invested Capital (ROIC) [1,845 bytes]
- (hist) Virtualization [1,847 bytes]
- (hist) Organizational DNA [1,848 bytes]
- (hist) Innovation Maturity Model [1,849 bytes]
- (hist) Return on Capital (ROC) [1,851 bytes]
- (hist) Strategic Analysis [1,851 bytes]
- (hist) Integration Testing [1,852 bytes]
- (hist) FCM (Factor-Criteria-Metrics) model [1,852 bytes]
- (hist) Secure Shell (SSH) [1,853 bytes]
- (hist) International Accounting Standards Committee (IASC) [1,856 bytes]
- (hist) Non-Systemic Risk [1,856 bytes]
- (hist) Scenario Planning [1,857 bytes]
- (hist) Shareholder Value Perspective [1,858 bytes]
- (hist) Public Cloud [1,859 bytes]
- (hist) Physical Distribution [1,860 bytes]
- (hist) LAMP Software [1,862 bytes]
- (hist) Strategic Thrusts [1,863 bytes]
- (hist) Technology Appropriation [1,863 bytes]
- (hist) Future search method [1,865 bytes]
- (hist) AML/CTF Program [1,869 bytes]
- (hist) Blueprint [1,870 bytes]
- (hist) PARTS Model [1,870 bytes]