Actions

Special

Short pages

Showing below up to 500 results in range #1,001 to #1,500.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎Digital Technology ‎[2,330 bytes]
  2. (hist) ‎Entity Relationship Model ‎[2,342 bytes]
  3. (hist) ‎Cash Flow from Operations ‎[2,343 bytes]
  4. (hist) ‎Consumer Privacy ‎[2,343 bytes]
  5. (hist) ‎Performance-Based Earned Value® (PBEVSM) ‎[2,345 bytes]
  6. (hist) ‎Real-Time System (RTS) ‎[2,345 bytes]
  7. (hist) ‎Gilder's Law ‎[2,347 bytes]
  8. (hist) ‎Voice of the Customer (VOC) ‎[2,348 bytes]
  9. (hist) ‎Earnings Before Interest and Tax (EBIT) ‎[2,349 bytes]
  10. (hist) ‎Bounded Rationality ‎[2,351 bytes]
  11. (hist) ‎Liabilities ‎[2,354 bytes]
  12. (hist) ‎Profit Maximization ‎[2,355 bytes]
  13. (hist) ‎Voluntary Interindustry Commerce Standards (VICS) Association ‎[2,356 bytes]
  14. (hist) ‎Data Transformation ‎[2,356 bytes]
  15. (hist) ‎Economic Planning ‎[2,358 bytes]
  16. (hist) ‎Web Services Description Language (WSDL) ‎[2,363 bytes]
  17. (hist) ‎Cisco EnergyWise ‎[2,369 bytes]
  18. (hist) ‎Loss Aversion Bias ‎[2,373 bytes]
  19. (hist) ‎Production ‎[2,373 bytes]
  20. (hist) ‎Management Metaphors ‎[2,375 bytes]
  21. (hist) ‎Depletion ‎[2,378 bytes]
  22. (hist) ‎Web Browser ‎[2,383 bytes]
  23. (hist) ‎Productive Capacity ‎[2,388 bytes]
  24. (hist) ‎Virtual Function ‎[2,393 bytes]
  25. (hist) ‎Total Value of Opportunity ‎[2,393 bytes]
  26. (hist) ‎ASEAN Integration ‎[2,394 bytes]
  27. (hist) ‎Monte Carlo Method ‎[2,398 bytes]
  28. (hist) ‎Agency Theory ‎[2,400 bytes]
  29. (hist) ‎Usability Inspection ‎[2,400 bytes]
  30. (hist) ‎Centralized Control ‎[2,401 bytes]
  31. (hist) ‎Consultant ‎[2,402 bytes]
  32. (hist) ‎Cash Flow Return on Investment (CFROI) ‎[2,403 bytes]
  33. (hist) ‎Off-Balance Sheet Financing ‎[2,404 bytes]
  34. (hist) ‎Best Practice ‎[2,411 bytes]
  35. (hist) ‎Mainframe ‎[2,413 bytes]
  36. (hist) ‎Capital Output Ratio ‎[2,415 bytes]
  37. (hist) ‎E-Marketing ‎[2,415 bytes]
  38. (hist) ‎Function Hierarchy Diagram ‎[2,417 bytes]
  39. (hist) ‎Fluid Mechanics ‎[2,420 bytes]
  40. (hist) ‎Holacratic Organizational Structure ‎[2,422 bytes]
  41. (hist) ‎Leadership Continuum ‎[2,423 bytes]
  42. (hist) ‎Early Case Assessment (ECA) ‎[2,424 bytes]
  43. (hist) ‎Contextual Collaboration ‎[2,428 bytes]
  44. (hist) ‎Handheld Device ‎[2,428 bytes]
  45. (hist) ‎3rd Party Logistics (3PL) ‎[2,433 bytes]
  46. (hist) ‎Price Skimming ‎[2,433 bytes]
  47. (hist) ‎Interpretive Strategy ‎[2,434 bytes]
  48. (hist) ‎Pricing Strategy ‎[2,436 bytes]
  49. (hist) ‎Cyber Crime ‎[2,443 bytes]
  50. (hist) ‎Post Implementation Review ‎[2,443 bytes]
  51. (hist) ‎Financial Accounting Standards Board (FASB) ‎[2,445 bytes]
  52. (hist) ‎Scareware ‎[2,446 bytes]
  53. (hist) ‎Cash Conversion Cycle (CCC) ‎[2,448 bytes]
  54. (hist) ‎Trade Union ‎[2,448 bytes]
  55. (hist) ‎Early Data Assessment (EDA) ‎[2,451 bytes]
  56. (hist) ‎Security Architecture ‎[2,452 bytes]
  57. (hist) ‎Entity Relationship Diagram (ERD) ‎[2,452 bytes]
  58. (hist) ‎ISO 27000 ‎[2,453 bytes]
  59. (hist) ‎Statistics ‎[2,459 bytes]
  60. (hist) ‎Capitalization Ratio ‎[2,459 bytes]
  61. (hist) ‎Quick Ratio ‎[2,462 bytes]
  62. (hist) ‎Pre-Employment Screening ‎[2,464 bytes]
  63. (hist) ‎Zombie Funds ‎[2,465 bytes]
  64. (hist) ‎OBASHI ‎[2,465 bytes]
  65. (hist) ‎Service-Level Management (SLM) ‎[2,466 bytes]
  66. (hist) ‎Patent ‎[2,466 bytes]
  67. (hist) ‎Cybernetics ‎[2,471 bytes]
  68. (hist) ‎Pension Parachute ‎[2,475 bytes]
  69. (hist) ‎Architecture Review Board (ARB) ‎[2,475 bytes]
  70. (hist) ‎Factor Analysis ‎[2,477 bytes]
  71. (hist) ‎Performance Management ‎[2,484 bytes]
  72. (hist) ‎Java Message Service (JMS) ‎[2,484 bytes]
  73. (hist) ‎Latent Variable ‎[2,487 bytes]
  74. (hist) ‎Application Outsourcing ‎[2,488 bytes]
  75. (hist) ‎Employee Stock Ownership Plan (ESOP) ‎[2,490 bytes]
  76. (hist) ‎Compliance Audit ‎[2,498 bytes]
  77. (hist) ‎Cartel ‎[2,500 bytes]
  78. (hist) ‎Operational Data Store (ODS) ‎[2,500 bytes]
  79. (hist) ‎VUCA (Volatility, Uncertainty, Complexity, Ambiguity) ‎[2,501 bytes]
  80. (hist) ‎AIDA Model ‎[2,503 bytes]
  81. (hist) ‎FIPS (Federal Information Processing Standards) ‎[2,505 bytes]
  82. (hist) ‎Centralization ‎[2,505 bytes]
  83. (hist) ‎ICT Investment Framework ‎[2,511 bytes]
  84. (hist) ‎Performance-Risk-Valuation Investment Technology (PRVit) ‎[2,514 bytes]
  85. (hist) ‎Ethernet Industrial Protocol (Ethernet/IP) ‎[2,521 bytes]
  86. (hist) ‎Handheld Device Markup Language (HDML) ‎[2,521 bytes]
  87. (hist) ‎OPC Unified Architecture ‎[2,521 bytes]
  88. (hist) ‎Empirical Process ‎[2,522 bytes]
  89. (hist) ‎Revenue ‎[2,522 bytes]
  90. (hist) ‎Right to Work ‎[2,522 bytes]
  91. (hist) ‎Anti-Spam ‎[2,523 bytes]
  92. (hist) ‎SOC 2 ‎[2,523 bytes]
  93. (hist) ‎Virtual Method Table (VMT) ‎[2,527 bytes]
  94. (hist) ‎Capital Budgeting ‎[2,530 bytes]
  95. (hist) ‎Bricks and Clicks ‎[2,533 bytes]
  96. (hist) ‎Platform Independent Model (PIM) ‎[2,536 bytes]
  97. (hist) ‎Fiscal Year ‎[2,537 bytes]
  98. (hist) ‎Coalface ‎[2,540 bytes]
  99. (hist) ‎Yield ‎[2,546 bytes]
  100. (hist) ‎Classical Test Theory ‎[2,546 bytes]
  101. (hist) ‎Information Systems Architecture (ISA) ‎[2,547 bytes]
  102. (hist) ‎Profit Distribution ‎[2,547 bytes]
  103. (hist) ‎Demand and Value Assessment Methodology (DAM and VAM) ‎[2,548 bytes]
  104. (hist) ‎Continuous Delivery ‎[2,548 bytes]
  105. (hist) ‎New Public Management (NPM) ‎[2,550 bytes]
  106. (hist) ‎Objective Analysis Tree ‎[2,551 bytes]
  107. (hist) ‎Frugal Innovation ‎[2,554 bytes]
  108. (hist) ‎Marketing Mix 4P's 5P's ‎[2,554 bytes]
  109. (hist) ‎Navier-Stokes Equations ‎[2,555 bytes]
  110. (hist) ‎Alternative Card Network (ACN) ‎[2,557 bytes]
  111. (hist) ‎Current Ratio ‎[2,560 bytes]
  112. (hist) ‎Systems Analysis ‎[2,563 bytes]
  113. (hist) ‎Direct Manipulation Interface ‎[2,563 bytes]
  114. (hist) ‎Electronic Government (E-Government) ‎[2,563 bytes]
  115. (hist) ‎Clusters ‎[2,567 bytes]
  116. (hist) ‎Chen's Notation ‎[2,569 bytes]
  117. (hist) ‎Data Science ‎[2,572 bytes]
  118. (hist) ‎Asset LifeCycle Management (ALM) ‎[2,573 bytes]
  119. (hist) ‎Risk Communication ‎[2,574 bytes]
  120. (hist) ‎Security Reference Model (SRM) ‎[2,575 bytes]
  121. (hist) ‎False Acceptance Ratio (FAR) ‎[2,575 bytes]
  122. (hist) ‎Precedence Diagram Method (PDM) ‎[2,577 bytes]
  123. (hist) ‎Capacity Utilization ‎[2,580 bytes]
  124. (hist) ‎Principal Component Analysis ‎[2,580 bytes]
  125. (hist) ‎Face Value ‎[2,581 bytes]
  126. (hist) ‎Systems Development ‎[2,581 bytes]
  127. (hist) ‎Golden Hello ‎[2,583 bytes]
  128. (hist) ‎Laissez-Faire Leadership ‎[2,585 bytes]
  129. (hist) ‎Java Database Connectivity (JDBC) ‎[2,588 bytes]
  130. (hist) ‎Cost of Goods Sold (COGS) ‎[2,589 bytes]
  131. (hist) ‎Dialectical Enquiry ‎[2,591 bytes]
  132. (hist) ‎Project Planning Matrix ‎[2,598 bytes]
  133. (hist) ‎Version Control System (VCS) ‎[2,598 bytes]
  134. (hist) ‎Spyware ‎[2,600 bytes]
  135. (hist) ‎Learning Cycle ‎[2,601 bytes]
  136. (hist) ‎Chinese Wall ‎[2,602 bytes]
  137. (hist) ‎Foot in the Door ‎[2,603 bytes]
  138. (hist) ‎Daemon ‎[2,605 bytes]
  139. (hist) ‎Debt Restructuring ‎[2,609 bytes]
  140. (hist) ‎Index Fund ‎[2,611 bytes]
  141. (hist) ‎Unified Profile for DoDAF/MODAF (UPDM) ‎[2,614 bytes]
  142. (hist) ‎Goal Setting Theory ‎[2,614 bytes]
  143. (hist) ‎Indicator ‎[2,614 bytes]
  144. (hist) ‎Career Limiting Move ‎[2,615 bytes]
  145. (hist) ‎Open Data-link Interface (ODI) ‎[2,616 bytes]
  146. (hist) ‎Circular Economy ‎[2,616 bytes]
  147. (hist) ‎Loyalty Program ‎[2,617 bytes]
  148. (hist) ‎Software Engineering ‎[2,617 bytes]
  149. (hist) ‎Communication Diagram ‎[2,619 bytes]
  150. (hist) ‎Interface Definition Language (IDL) ‎[2,619 bytes]
  151. (hist) ‎Content Strategy ‎[2,619 bytes]
  152. (hist) ‎Expected Value of Perfect Information ‎[2,620 bytes]
  153. (hist) ‎Disaggregation ‎[2,622 bytes]
  154. (hist) ‎Last-In First-Out ‎[2,622 bytes]
  155. (hist) ‎Decision Matrix ‎[2,623 bytes]
  156. (hist) ‎Directed Acyclic Graph ‎[2,625 bytes]
  157. (hist) ‎Profile Diagram ‎[2,626 bytes]
  158. (hist) ‎Corporate Transparency ‎[2,627 bytes]
  159. (hist) ‎Leveraged Buy-out ‎[2,627 bytes]
  160. (hist) ‎Data Structure Diagram ‎[2,630 bytes]
  161. (hist) ‎Federal Acquisition Regulations (FAR) ‎[2,630 bytes]
  162. (hist) ‎Management Model ‎[2,630 bytes]
  163. (hist) ‎Local Land and Property Gazetteer (LLPG) ‎[2,635 bytes]
  164. (hist) ‎Cause and Effect Analysis ‎[2,637 bytes]
  165. (hist) ‎Advanced Threat Detection (ATD) Appliances ‎[2,639 bytes]
  166. (hist) ‎Learning Management System (LMS) ‎[2,647 bytes]
  167. (hist) ‎Workaround ‎[2,647 bytes]
  168. (hist) ‎Management Style ‎[2,648 bytes]
  169. (hist) ‎Chairman of the Board ‎[2,649 bytes]
  170. (hist) ‎Dynamic Dispatch ‎[2,649 bytes]
  171. (hist) ‎Main Page ‎[2,650 bytes]
  172. (hist) ‎Distinctive Capabilities ‎[2,651 bytes]
  173. (hist) ‎Fatal Exception ‎[2,652 bytes]
  174. (hist) ‎Directors and Officers Liability Insurance ‎[2,654 bytes]
  175. (hist) ‎Accounts Receivable ‎[2,654 bytes]
  176. (hist) ‎Financial Services ‎[2,656 bytes]
  177. (hist) ‎AOL Instant Messenger (AIM) ‎[2,660 bytes]
  178. (hist) ‎Binary Synchronous Communications (BSC) ‎[2,660 bytes]
  179. (hist) ‎Data Driven Organization ‎[2,662 bytes]
  180. (hist) ‎Foreign Account Tax Compliance Act (FATCA) ‎[2,664 bytes]
  181. (hist) ‎Public–Private Partnership (PPP) ‎[2,666 bytes]
  182. (hist) ‎Open Database Connectivity (ODBC) ‎[2,666 bytes]
  183. (hist) ‎Discounted Cash Flow (DCF) ‎[2,667 bytes]
  184. (hist) ‎Distributed Computing Environment (DCE) ‎[2,667 bytes]
  185. (hist) ‎Dutch Auction ‎[2,667 bytes]
  186. (hist) ‎Economic Profit ‎[2,670 bytes]
  187. (hist) ‎Allocative Efficiency ‎[2,670 bytes]
  188. (hist) ‎Distribution Strategy ‎[2,671 bytes]
  189. (hist) ‎Incentives ‎[2,674 bytes]
  190. (hist) ‎Sales Order ‎[2,674 bytes]
  191. (hist) ‎Return Over Time (ROT) ‎[2,675 bytes]
  192. (hist) ‎Structural Equation Modeling (SEM) ‎[2,675 bytes]
  193. (hist) ‎Large Group Capacitation ‎[2,678 bytes]
  194. (hist) ‎Expense Center ‎[2,680 bytes]
  195. (hist) ‎Unsolicited Commercial Email (UCE) ‎[2,684 bytes]
  196. (hist) ‎Hawthorne Effect ‎[2,684 bytes]
  197. (hist) ‎Discount Pricing ‎[2,685 bytes]
  198. (hist) ‎Gustafson's Law ‎[2,687 bytes]
  199. (hist) ‎Results Based Management (RBM) ‎[2,689 bytes]
  200. (hist) ‎Statement of Changes in Equity ‎[2,690 bytes]
  201. (hist) ‎Application-Capability Reference Model (ARM) ‎[2,693 bytes]
  202. (hist) ‎Virtual Inheritance ‎[2,693 bytes]
  203. (hist) ‎.EXE ‎[2,694 bytes]
  204. (hist) ‎Forget, Borrow, Learn ‎[2,695 bytes]
  205. (hist) ‎Operating System (OS) ‎[2,695 bytes]
  206. (hist) ‎Horizontal Merger ‎[2,698 bytes]
  207. (hist) ‎Profit Center ‎[2,699 bytes]
  208. (hist) ‎State Diagram ‎[2,699 bytes]
  209. (hist) ‎Virtualization Architecture ‎[2,700 bytes]
  210. (hist) ‎Agile Business Analysis (AgileBA) ‎[2,701 bytes]
  211. (hist) ‎Employment Contract ‎[2,703 bytes]
  212. (hist) ‎Federal Intrusion Detection Network (FIDNET) ‎[2,705 bytes]
  213. (hist) ‎Hospitality Management ‎[2,705 bytes]
  214. (hist) ‎Community of Practice ‎[2,706 bytes]
  215. (hist) ‎Performance Based Budgeting (PBB) ‎[2,706 bytes]
  216. (hist) ‎Heatmap ‎[2,708 bytes]
  217. (hist) ‎Abductive Reasoning ‎[2,712 bytes]
  218. (hist) ‎Strategy Articulation Map (SAM) ‎[2,714 bytes]
  219. (hist) ‎Digital Device ‎[2,715 bytes]
  220. (hist) ‎Promotional Pricing ‎[2,716 bytes]
  221. (hist) ‎Brand Management ‎[2,717 bytes]
  222. (hist) ‎Free Cash Flow ‎[2,718 bytes]
  223. (hist) ‎Efficiency Wage ‎[2,723 bytes]
  224. (hist) ‎Lexical Hypothesis ‎[2,723 bytes]
  225. (hist) ‎Asset Stripping ‎[2,726 bytes]
  226. (hist) ‎Product Management ‎[2,726 bytes]
  227. (hist) ‎Levers of Control ‎[2,728 bytes]
  228. (hist) ‎Dataflow ‎[2,730 bytes]
  229. (hist) ‎Email Management (EMM) ‎[2,731 bytes]
  230. (hist) ‎SOSTAC Model ‎[2,733 bytes]
  231. (hist) ‎Bond ‎[2,733 bytes]
  232. (hist) ‎Mid-Point Differential ‎[2,739 bytes]
  233. (hist) ‎Metcalf's Law ‎[2,744 bytes]
  234. (hist) ‎Industry Change ‎[2,746 bytes]
  235. (hist) ‎Object Oriented Programming (OOP) ‎[2,747 bytes]
  236. (hist) ‎Adjusted Book Value ‎[2,748 bytes]
  237. (hist) ‎Blog ‎[2,750 bytes]
  238. (hist) ‎Enterprise Function Diagram (EFD) ‎[2,750 bytes]
  239. (hist) ‎Software as a Service (SaaS) ‎[2,755 bytes]
  240. (hist) ‎Linear Strategy ‎[2,755 bytes]
  241. (hist) ‎Rule of Three ‎[2,755 bytes]
  242. (hist) ‎Business Case ‎[2,759 bytes]
  243. (hist) ‎Gross Revenue ‎[2,760 bytes]
  244. (hist) ‎Distributed System Object Model (DSOM) ‎[2,761 bytes]
  245. (hist) ‎Structure Follows Strategy ‎[2,761 bytes]
  246. (hist) ‎Confirmatory Factor Analysis ‎[2,761 bytes]
  247. (hist) ‎Value Stream Management (VSM) ‎[2,763 bytes]
  248. (hist) ‎Hagberg Model of Personal Power ‎[2,764 bytes]
  249. (hist) ‎People Analytics ‎[2,764 bytes]
  250. (hist) ‎PURE Method ‎[2,764 bytes]
  251. (hist) ‎Real-Time Data ‎[2,765 bytes]
  252. (hist) ‎Virtual Private Network (VPN) ‎[2,769 bytes]
  253. (hist) ‎EbXML (Electronic Business XML) ‎[2,769 bytes]
  254. (hist) ‎Cash Burn Rate ‎[2,771 bytes]
  255. (hist) ‎Harvest Strategy ‎[2,771 bytes]
  256. (hist) ‎Proprietary Software ‎[2,774 bytes]
  257. (hist) ‎Gartner Market Forecast ‎[2,774 bytes]
  258. (hist) ‎Enterprise Application ‎[2,774 bytes]
  259. (hist) ‎Economic Impact Assessment (EIA) ‎[2,775 bytes]
  260. (hist) ‎Linked Data ‎[2,776 bytes]
  261. (hist) ‎ROT (Redundant, Outdated, Trivial Information) ‎[2,776 bytes]
  262. (hist) ‎Application Delivery Controller (ADC) ‎[2,779 bytes]
  263. (hist) ‎Point-To-Point Integration ‎[2,779 bytes]
  264. (hist) ‎Legitimate Power ‎[2,780 bytes]
  265. (hist) ‎Helper Application ‎[2,781 bytes]
  266. (hist) ‎Design Thinking ‎[2,782 bytes]
  267. (hist) ‎Downsizing ‎[2,782 bytes]
  268. (hist) ‎Low Ball Technique ‎[2,785 bytes]
  269. (hist) ‎Distributed Management Task Force (DMTF) ‎[2,788 bytes]
  270. (hist) ‎Income Stock ‎[2,790 bytes]
  271. (hist) ‎Multilevel Modeling ‎[2,794 bytes]
  272. (hist) ‎Backbone Network ‎[2,795 bytes]
  273. (hist) ‎Systems Design ‎[2,797 bytes]
  274. (hist) ‎Active Data Dictionary ‎[2,798 bytes]
  275. (hist) ‎Dynamic Capabilities ‎[2,798 bytes]
  276. (hist) ‎Value Net ‎[2,800 bytes]
  277. (hist) ‎Currency Carry Trade ‎[2,800 bytes]
  278. (hist) ‎Game Theory ‎[2,801 bytes]
  279. (hist) ‎Weisbord’s Six-Box Model ‎[2,801 bytes]
  280. (hist) ‎Composite Applications ‎[2,802 bytes]
  281. (hist) ‎Cash ‎[2,802 bytes]
  282. (hist) ‎Data Proliferation ‎[2,803 bytes]
  283. (hist) ‎Marketing Operations Management (MOM) ‎[2,804 bytes]
  284. (hist) ‎Start-Up ‎[2,804 bytes]
  285. (hist) ‎Equity Market ‎[2,804 bytes]
  286. (hist) ‎Theoretical Method ‎[2,805 bytes]
  287. (hist) ‎Access Media Gateways (AMG) ‎[2,806 bytes]
  288. (hist) ‎Word Processor ‎[2,808 bytes]
  289. (hist) ‎Limited Effects Theory ‎[2,810 bytes]
  290. (hist) ‎Dual Inline Memory Module (DIMM) ‎[2,812 bytes]
  291. (hist) ‎Cash Flow Management ‎[2,813 bytes]
  292. (hist) ‎Discretionary Access Control (DAC) ‎[2,816 bytes]
  293. (hist) ‎Span of Control ‎[2,816 bytes]
  294. (hist) ‎Business Value Index (BVI) ‎[2,818 bytes]
  295. (hist) ‎Dynamic Programming ‎[2,818 bytes]
  296. (hist) ‎Cost Drivers ‎[2,820 bytes]
  297. (hist) ‎Domain Name System (DNS) ‎[2,822 bytes]
  298. (hist) ‎Application Development ‎[2,823 bytes]
  299. (hist) ‎Float (Project Management) ‎[2,824 bytes]
  300. (hist) ‎Process Hierarchy Diagram ‎[2,824 bytes]
  301. (hist) ‎FireWire ‎[2,825 bytes]
  302. (hist) ‎Horizontal Agreement ‎[2,825 bytes]
  303. (hist) ‎Visionary Leadership ‎[2,826 bytes]
  304. (hist) ‎Growth Phase ‎[2,826 bytes]
  305. (hist) ‎Heisenberg's Uncertainty Principle ‎[2,828 bytes]
  306. (hist) ‎Mediation ‎[2,828 bytes]
  307. (hist) ‎Asset ‎[2,829 bytes]
  308. (hist) ‎Hofstadter's Law ‎[2,831 bytes]
  309. (hist) ‎E3Value Methodology ‎[2,832 bytes]
  310. (hist) ‎Economic Integration ‎[2,832 bytes]
  311. (hist) ‎Standardization ‎[2,833 bytes]
  312. (hist) ‎Corporate Accountability ‎[2,835 bytes]
  313. (hist) ‎IT Service Portfolio ‎[2,836 bytes]
  314. (hist) ‎Differential Equations ‎[2,838 bytes]
  315. (hist) ‎Market Forces ‎[2,840 bytes]
  316. (hist) ‎Leadership Pipeline ‎[2,842 bytes]
  317. (hist) ‎The Bowtie Method ‎[2,845 bytes]
  318. (hist) ‎Validity Effect ‎[2,846 bytes]
  319. (hist) ‎WYSIWYG (What You See Is What You Get) ‎[2,848 bytes]
  320. (hist) ‎Gigascale Integration (GSI) ‎[2,853 bytes]
  321. (hist) ‎Johari Window ‎[2,853 bytes]
  322. (hist) ‎Industrial Relations ‎[2,853 bytes]
  323. (hist) ‎Advanced Web Services ‎[2,860 bytes]
  324. (hist) ‎Data Element ‎[2,862 bytes]
  325. (hist) ‎Accounting Equation ‎[2,864 bytes]
  326. (hist) ‎Coaching Leadership ‎[2,864 bytes]
  327. (hist) ‎Just-in-time (JIT) ‎[2,866 bytes]
  328. (hist) ‎Reference Model ‎[2,869 bytes]
  329. (hist) ‎Inferior Goods ‎[2,869 bytes]
  330. (hist) ‎Storyboard ‎[2,870 bytes]
  331. (hist) ‎Stakeholder Theory ‎[2,872 bytes]
  332. (hist) ‎Open Source Hardware ‎[2,872 bytes]
  333. (hist) ‎Failure Mode and Effects Analysis (FMEA) ‎[2,873 bytes]
  334. (hist) ‎Fixed Assets ‎[2,879 bytes]
  335. (hist) ‎Trademark ‎[2,880 bytes]
  336. (hist) ‎Semantic Business Process Management (SBPM) ‎[2,882 bytes]
  337. (hist) ‎Information Technology Security Assessment ‎[2,883 bytes]
  338. (hist) ‎Golden Parachute ‎[2,885 bytes]
  339. (hist) ‎Principal Component Analysis (PCA) ‎[2,885 bytes]
  340. (hist) ‎Distance Learning ‎[2,888 bytes]
  341. (hist) ‎Earnings Before Interest After Taxes (EBIAT) ‎[2,894 bytes]
  342. (hist) ‎Short Message Service (SMS) ‎[2,894 bytes]
  343. (hist) ‎Application Management Outsourcing (AMO) ‎[2,896 bytes]
  344. (hist) ‎Continuous Architecture ‎[2,896 bytes]
  345. (hist) ‎Cost Center ‎[2,897 bytes]
  346. (hist) ‎Lobster Trap ‎[2,897 bytes]
  347. (hist) ‎Peak-End Rule ‎[2,899 bytes]
  348. (hist) ‎Leveraged Recapitalization ‎[2,900 bytes]
  349. (hist) ‎Differentiation Strategy ‎[2,901 bytes]
  350. (hist) ‎Mirroring and Matching ‎[2,904 bytes]
  351. (hist) ‎5P's Model ‎[2,906 bytes]
  352. (hist) ‎Unified Endpoint Management (UEM) ‎[2,908 bytes]
  353. (hist) ‎Computer Fraud and Abuse Act (CFAA) ‎[2,909 bytes]
  354. (hist) ‎Zero Interest Rates ‎[2,910 bytes]
  355. (hist) ‎Interest Rate Parity ‎[2,911 bytes]
  356. (hist) ‎Decision Engineering ‎[2,915 bytes]
  357. (hist) ‎Layered Architecture ‎[2,916 bytes]
  358. (hist) ‎4P's of Persuasion ‎[2,917 bytes]
  359. (hist) ‎Case-Based Reasoning (CBR) ‎[2,917 bytes]
  360. (hist) ‎Know Your Customer (KYC) ‎[2,917 bytes]
  361. (hist) ‎Decentralized Control ‎[2,917 bytes]
  362. (hist) ‎Implementation Management ‎[2,919 bytes]
  363. (hist) ‎Non Relational Database (NoSQL) ‎[2,920 bytes]
  364. (hist) ‎Impression Management ‎[2,921 bytes]
  365. (hist) ‎Fixed Costs ‎[2,922 bytes]
  366. (hist) ‎Seven Stages of Action ‎[2,922 bytes]
  367. (hist) ‎Recovery Point Objective (RPO) ‎[2,923 bytes]
  368. (hist) ‎Rate of Profit ‎[2,923 bytes]
  369. (hist) ‎Greyware ‎[2,926 bytes]
  370. (hist) ‎Freedom of Information Act (FOIA) ‎[2,926 bytes]
  371. (hist) ‎Discussion Leadership ‎[2,932 bytes]
  372. (hist) ‎Incremental Development ‎[2,934 bytes]
  373. (hist) ‎Distributed Relational Database Architecture (DRDA) ‎[2,935 bytes]
  374. (hist) ‎Divestiture ‎[2,935 bytes]
  375. (hist) ‎VMOST Analysis ‎[2,939 bytes]
  376. (hist) ‎Defragmentation ‎[2,941 bytes]
  377. (hist) ‎Organizational Culture Assessment Instrument (OCAI) ‎[2,942 bytes]
  378. (hist) ‎SLA Management ‎[2,944 bytes]
  379. (hist) ‎Black Scholes Model ‎[2,946 bytes]
  380. (hist) ‎Inclusive Value Measurement (IVM) ‎[2,946 bytes]
  381. (hist) ‎Independent Verification and Validation (IV&V) ‎[2,950 bytes]
  382. (hist) ‎Interprocess Communication (IPC) ‎[2,952 bytes]
  383. (hist) ‎Grid Analysis ‎[2,952 bytes]
  384. (hist) ‎Multi Messaging Service (MMS) ‎[2,952 bytes]
  385. (hist) ‎Arbitrage ‎[2,952 bytes]
  386. (hist) ‎Unbranding ‎[2,954 bytes]
  387. (hist) ‎Rule of 72 ‎[2,954 bytes]
  388. (hist) ‎SG&A (Selling, General & Administrative Expense) ‎[2,954 bytes]
  389. (hist) ‎Linear Economy ‎[2,954 bytes]
  390. (hist) ‎Chief Risk Officer (CRO) ‎[2,958 bytes]
  391. (hist) ‎IT Metrics (Information Technology Metrics) ‎[2,959 bytes]
  392. (hist) ‎Time Triggered Protocol (TTP) ‎[2,960 bytes]
  393. (hist) ‎Organizational Management ‎[2,960 bytes]
  394. (hist) ‎Capital Assets ‎[2,961 bytes]
  395. (hist) ‎European-Style Option ‎[2,963 bytes]
  396. (hist) ‎Concentration Strategy ‎[2,966 bytes]
  397. (hist) ‎Latent Trait Theory ‎[2,967 bytes]
  398. (hist) ‎Document Management (DM) ‎[2,968 bytes]
  399. (hist) ‎Path Analysis ‎[2,968 bytes]
  400. (hist) ‎Excess Return (ER) ‎[2,971 bytes]
  401. (hist) ‎Computer Assisted Ordering (CAO) ‎[2,972 bytes]
  402. (hist) ‎Errors and Omissions Insurance ‎[2,972 bytes]
  403. (hist) ‎In-Transit Visiblity ‎[2,976 bytes]
  404. (hist) ‎Adapters ‎[2,977 bytes]
  405. (hist) ‎Vesting of Stock or Options ‎[2,977 bytes]
  406. (hist) ‎Capitalization Rate ‎[2,978 bytes]
  407. (hist) ‎Liquidation Value ‎[2,981 bytes]
  408. (hist) ‎NATO Architecture Framework (NAF) ‎[2,985 bytes]
  409. (hist) ‎Contract Lifecycle Management (CLM) ‎[2,986 bytes]
  410. (hist) ‎Undifferentiated Marketing ‎[2,988 bytes]
  411. (hist) ‎Folksonomy ‎[2,989 bytes]
  412. (hist) ‎Management Succession Planning ‎[2,989 bytes]
  413. (hist) ‎Denial-Of-Service Attack ‎[2,992 bytes]
  414. (hist) ‎Shotgun Surgery ‎[2,997 bytes]
  415. (hist) ‎Cash Flow ‎[3,000 bytes]
  416. (hist) ‎Computer Science ‎[3,000 bytes]
  417. (hist) ‎Homoiconicity ‎[3,001 bytes]
  418. (hist) ‎Inductive Bias ‎[3,001 bytes]
  419. (hist) ‎Activity Network Diagram ‎[3,002 bytes]
  420. (hist) ‎Foreign Exchange Market ‎[3,002 bytes]
  421. (hist) ‎Golden Handshake ‎[3,006 bytes]
  422. (hist) ‎Just-World Effect ‎[3,008 bytes]
  423. (hist) ‎Enterprise Information Technology (EIT) ‎[3,011 bytes]
  424. (hist) ‎Harvard Architecture ‎[3,012 bytes]
  425. (hist) ‎Indemnity ‎[3,012 bytes]
  426. (hist) ‎Percentage-of-Completion Method ‎[3,013 bytes]
  427. (hist) ‎Goals ‎[3,014 bytes]
  428. (hist) ‎Convolutional Neural Network (CNN) ‎[3,014 bytes]
  429. (hist) ‎Seven Basic Tools of Quality ‎[3,015 bytes]
  430. (hist) ‎Shore's Classification ‎[3,015 bytes]
  431. (hist) ‎Client Maturity Model ‎[3,017 bytes]
  432. (hist) ‎Peripheral Technology ‎[3,018 bytes]
  433. (hist) ‎Brand Recall ‎[3,022 bytes]
  434. (hist) ‎Binary Runtime Environment for Wireless (BREW) ‎[3,024 bytes]
  435. (hist) ‎Cost Optimization ‎[3,025 bytes]
  436. (hist) ‎Accelerated Depreciation ‎[3,026 bytes]
  437. (hist) ‎Net Promoter Score (NPS) ‎[3,030 bytes]
  438. (hist) ‎Case Management ‎[3,032 bytes]
  439. (hist) ‎Gross Profit Percentage ‎[3,032 bytes]
  440. (hist) ‎Retainer ‎[3,035 bytes]
  441. (hist) ‎Implementation Design ‎[3,039 bytes]
  442. (hist) ‎Channel Partner Value ‎[3,040 bytes]
  443. (hist) ‎Clarkson Principles ‎[3,043 bytes]
  444. (hist) ‎Data Entry ‎[3,045 bytes]
  445. (hist) ‎Office of Foreign Assets Control (OFAC) ‎[3,046 bytes]
  446. (hist) ‎IT Audit (Information Technology Audit) ‎[3,048 bytes]
  447. (hist) ‎Graphic Design ‎[3,050 bytes]
  448. (hist) ‎Cache ‎[3,050 bytes]
  449. (hist) ‎Deployment Diagram ‎[3,054 bytes]
  450. (hist) ‎Infrastructure Reference Model (IRM) ‎[3,055 bytes]
  451. (hist) ‎Short Selling ‎[3,055 bytes]
  452. (hist) ‎Due Diligence ‎[3,057 bytes]
  453. (hist) ‎Trade Secret ‎[3,059 bytes]
  454. (hist) ‎Agent Portal Solutions ‎[3,060 bytes]
  455. (hist) ‎Coercive Power ‎[3,061 bytes]
  456. (hist) ‎Business Administration ‎[3,062 bytes]
  457. (hist) ‎Career Management ‎[3,065 bytes]
  458. (hist) ‎Real-Time Monitoring ‎[3,066 bytes]
  459. (hist) ‎Distributed Data Management Architecture (DDM) ‎[3,067 bytes]
  460. (hist) ‎False Consensus Bias ‎[3,071 bytes]
  461. (hist) ‎Knowledge Organization Systems (KOS) ‎[3,073 bytes]
  462. (hist) ‎Prospector Strategy ‎[3,074 bytes]
  463. (hist) ‎Data Health Check ‎[3,075 bytes]
  464. (hist) ‎ASCII File ‎[3,076 bytes]
  465. (hist) ‎Drakon Chart ‎[3,082 bytes]
  466. (hist) ‎Efficient Market Hypothesis ‎[3,082 bytes]
  467. (hist) ‎Grey Knight ‎[3,083 bytes]
  468. (hist) ‎Baldrige Award ‎[3,084 bytes]
  469. (hist) ‎Multidimensional Expressions (MDX) ‎[3,087 bytes]
  470. (hist) ‎Promotion ‎[3,087 bytes]
  471. (hist) ‎Job Specialization ‎[3,088 bytes]
  472. (hist) ‎Executive Compensation ‎[3,091 bytes]
  473. (hist) ‎Korey's Model ‎[3,095 bytes]
  474. (hist) ‎Employee Value ‎[3,099 bytes]
  475. (hist) ‎Recovery Time Objective (RTO) ‎[3,103 bytes]
  476. (hist) ‎Electronic Identity Verification (eIDV) ‎[3,104 bytes]
  477. (hist) ‎Information Management Body of Knowledge (IMBOK) ‎[3,104 bytes]
  478. (hist) ‎Organizational Development ‎[3,105 bytes]
  479. (hist) ‎Cox's Risk Matrix Theorem ‎[3,109 bytes]
  480. (hist) ‎Unit Cost ‎[3,111 bytes]
  481. (hist) ‎Probabilistic Risk Assessment (PRA) ‎[3,111 bytes]
  482. (hist) ‎Cost Overrun ‎[3,114 bytes]
  483. (hist) ‎Flynn's Taxonomy ‎[3,114 bytes]
  484. (hist) ‎Continuous Quality Improvement (CQI) ‎[3,119 bytes]
  485. (hist) ‎Employee Selection ‎[3,122 bytes]
  486. (hist) ‎Source Lines of Code ‎[3,124 bytes]
  487. (hist) ‎Medium-Scale Integration (MSI) ‎[3,126 bytes]
  488. (hist) ‎Graves Value Theory ‎[3,129 bytes]
  489. (hist) ‎Adhocracy ‎[3,133 bytes]
  490. (hist) ‎First-In First-Out ‎[3,135 bytes]
  491. (hist) ‎Cascade-Correlation Learning Architecture ‎[3,136 bytes]
  492. (hist) ‎Seven Surprises for New CEOs ‎[3,137 bytes]
  493. (hist) ‎Soft Systems Methodology ‎[3,141 bytes]
  494. (hist) ‎Universal Data Element Framework (UDEF) ‎[3,143 bytes]
  495. (hist) ‎Managerial Value ‎[3,143 bytes]
  496. (hist) ‎Moore's Law ‎[3,143 bytes]
  497. (hist) ‎Global System for Mobile Communications (GSM) ‎[3,144 bytes]
  498. (hist) ‎Feedback Loops ‎[3,146 bytes]
  499. (hist) ‎Whisper Number ‎[3,147 bytes]
  500. (hist) ‎Ultramobiles ‎[3,147 bytes]

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)