Actions

Special

Short pages

Showing below up to 500 results in range #251 to #750.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎Social Intelligence ‎[1,285 bytes]
  2. (hist) ‎Bankmail Engagement ‎[1,286 bytes]
  3. (hist) ‎User Interface ‎[1,287 bytes]
  4. (hist) ‎Supervisory Control and Data Acquisition (SCADA) ‎[1,288 bytes]
  5. (hist) ‎Internet Protocol (IP) ‎[1,288 bytes]
  6. (hist) ‎Organic Growth ‎[1,289 bytes]
  7. (hist) ‎Code of Ethics ‎[1,291 bytes]
  8. (hist) ‎Behavior Driven Development (BDD) ‎[1,292 bytes]
  9. (hist) ‎World Class Manufacturing ‎[1,294 bytes]
  10. (hist) ‎Strategic Initiatives ‎[1,294 bytes]
  11. (hist) ‎Structure Chart ‎[1,294 bytes]
  12. (hist) ‎Office of Strategy Management ‎[1,297 bytes]
  13. (hist) ‎Synectics ‎[1,297 bytes]
  14. (hist) ‎Application Life Cycle Management Platform as a Service (ALM PaaS) ‎[1,298 bytes]
  15. (hist) ‎Value at Risk ‎[1,299 bytes]
  16. (hist) ‎Cannibalization ‎[1,301 bytes]
  17. (hist) ‎Strategic Architecture ‎[1,301 bytes]
  18. (hist) ‎CMN-GOMS ‎[1,301 bytes]
  19. (hist) ‎Business Rule ‎[1,301 bytes]
  20. (hist) ‎Outcome ‎[1,304 bytes]
  21. (hist) ‎Employee Turnover ‎[1,305 bytes]
  22. (hist) ‎Balance Theory ‎[1,307 bytes]
  23. (hist) ‎Bond Insurance ‎[1,307 bytes]
  24. (hist) ‎Bottom-up Approach ‎[1,307 bytes]
  25. (hist) ‎Pareto Chart ‎[1,307 bytes]
  26. (hist) ‎Reference Semantic Model (RSM) ‎[1,307 bytes]
  27. (hist) ‎Fault Tree Analysis (FTA) ‎[1,308 bytes]
  28. (hist) ‎Probability Theory ‎[1,309 bytes]
  29. (hist) ‎Straight Through Processing (STP) ‎[1,310 bytes]
  30. (hist) ‎Preboot Execution Environment (PXE) ‎[1,311 bytes]
  31. (hist) ‎Distributor ‎[1,314 bytes]
  32. (hist) ‎Social Multi Criteria Analysis (SMCA) ‎[1,314 bytes]
  33. (hist) ‎Structured Data Analysis ‎[1,315 bytes]
  34. (hist) ‎IT Productivity Paradox ‎[1,316 bytes]
  35. (hist) ‎Information Quality Management (IQM) ‎[1,317 bytes]
  36. (hist) ‎Viability Study ‎[1,319 bytes]
  37. (hist) ‎Internet Service Provider (ISP) ‎[1,319 bytes]
  38. (hist) ‎Budgeted Cost of Work Scheduled (BCWS) ‎[1,319 bytes]
  39. (hist) ‎Data Dictionary ‎[1,320 bytes]
  40. (hist) ‎Coaching ‎[1,321 bytes]
  41. (hist) ‎Direct Mail ‎[1,321 bytes]
  42. (hist) ‎Retired Services ‎[1,323 bytes]
  43. (hist) ‎Telemarketing ‎[1,325 bytes]
  44. (hist) ‎Management Buy-Out ‎[1,326 bytes]
  45. (hist) ‎Industry Life Cycle ‎[1,327 bytes]
  46. (hist) ‎Collective Intelligence ‎[1,328 bytes]
  47. (hist) ‎Channel Management ‎[1,330 bytes]
  48. (hist) ‎Service Mark ‎[1,330 bytes]
  49. (hist) ‎Break-even Point ‎[1,331 bytes]
  50. (hist) ‎Profit Motive ‎[1,331 bytes]
  51. (hist) ‎Information Mapping ‎[1,333 bytes]
  52. (hist) ‎Software Visualization ‎[1,333 bytes]
  53. (hist) ‎Design Principles ‎[1,335 bytes]
  54. (hist) ‎Risk Maturity ‎[1,337 bytes]
  55. (hist) ‎Quantitative Investment Analysis ‎[1,337 bytes]
  56. (hist) ‎Strategic Infliction Point ‎[1,337 bytes]
  57. (hist) ‎Security Management ‎[1,337 bytes]
  58. (hist) ‎Cost of Equity ‎[1,338 bytes]
  59. (hist) ‎Financial Services Data Model (FSDM) ‎[1,338 bytes]
  60. (hist) ‎Desktop Operating System ‎[1,339 bytes]
  61. (hist) ‎Executive Information System (EIS) ‎[1,340 bytes]
  62. (hist) ‎Probability Distribution ‎[1,343 bytes]
  63. (hist) ‎Systems Architecture ‎[1,343 bytes]
  64. (hist) ‎Bayes' Theorem ‎[1,344 bytes]
  65. (hist) ‎Software Sizing ‎[1,345 bytes]
  66. (hist) ‎Recurrent Neural Network (RNN) ‎[1,346 bytes]
  67. (hist) ‎Underpinning Contract (UC) ‎[1,347 bytes]
  68. (hist) ‎Simulation Modeling ‎[1,348 bytes]
  69. (hist) ‎Computerized Maintenance Management System (CMMS) ‎[1,349 bytes]
  70. (hist) ‎Enterprise Architecture Life Cycle (EALC) ‎[1,349 bytes]
  71. (hist) ‎Asset Performance Management (APM) ‎[1,350 bytes]
  72. (hist) ‎Health Insurance Portability and Accountability Act (HIPAA) ‎[1,351 bytes]
  73. (hist) ‎Project Dependencies ‎[1,352 bytes]
  74. (hist) ‎Capitalism ‎[1,353 bytes]
  75. (hist) ‎Purchase Order ‎[1,353 bytes]
  76. (hist) ‎Resource Description Framework (RDF) ‎[1,354 bytes]
  77. (hist) ‎Blake and Mouton's Managerial Grid ‎[1,354 bytes]
  78. (hist) ‎Integrative Thinking ‎[1,359 bytes]
  79. (hist) ‎Software Archeology ‎[1,359 bytes]
  80. (hist) ‎Value Creation Index ‎[1,361 bytes]
  81. (hist) ‎Cyberspace ‎[1,361 bytes]
  82. (hist) ‎Strategic Themes ‎[1,362 bytes]
  83. (hist) ‎Data Asset Framework (DAF) ‎[1,363 bytes]
  84. (hist) ‎Brand Line ‎[1,363 bytes]
  85. (hist) ‎Browser Isolation ‎[1,370 bytes]
  86. (hist) ‎Workplace Safety ‎[1,370 bytes]
  87. (hist) ‎Information as a Service (IaaS) ‎[1,371 bytes]
  88. (hist) ‎Stakeholder Engagement ‎[1,371 bytes]
  89. (hist) ‎Operating Expenses ‎[1,373 bytes]
  90. (hist) ‎Brand Reputation ‎[1,373 bytes]
  91. (hist) ‎Cost to Serve (CTS) ‎[1,378 bytes]
  92. (hist) ‎Extensible Authentication Protocol (EAP) ‎[1,379 bytes]
  93. (hist) ‎Formal Organization ‎[1,379 bytes]
  94. (hist) ‎Phishing ‎[1,380 bytes]
  95. (hist) ‎Productive Efficiency ‎[1,381 bytes]
  96. (hist) ‎Marketing Metrics ‎[1,382 bytes]
  97. (hist) ‎Subscription Right ‎[1,382 bytes]
  98. (hist) ‎Payback Period ‎[1,383 bytes]
  99. (hist) ‎CAN-SPAM Act of 2003 ‎[1,384 bytes]
  100. (hist) ‎Dependency Network ‎[1,385 bytes]
  101. (hist) ‎Health Level 7 (HL7) ‎[1,385 bytes]
  102. (hist) ‎Rätselvermehrung ‎[1,385 bytes]
  103. (hist) ‎Organizational Behavior ‎[1,385 bytes]
  104. (hist) ‎Value for Money Audit ‎[1,386 bytes]
  105. (hist) ‎Advanced Distribution Protection and Restoration Devices ‎[1,388 bytes]
  106. (hist) ‎Markup Language ‎[1,388 bytes]
  107. (hist) ‎Autonomous System Number (ASN) ‎[1,391 bytes]
  108. (hist) ‎Value-Based Business-IT Alignment (VITAL) Project ‎[1,394 bytes]
  109. (hist) ‎Strike Price ‎[1,394 bytes]
  110. (hist) ‎Total Shareholder Return (TSR) ‎[1,395 bytes]
  111. (hist) ‎Dempster Shafer (D-S) Theory ‎[1,396 bytes]
  112. (hist) ‎Investor Sentiment ‎[1,397 bytes]
  113. (hist) ‎Crescendo Model of Rejuvenation ‎[1,397 bytes]
  114. (hist) ‎Diminishing Returns (DR) ‎[1,398 bytes]
  115. (hist) ‎SMS Marketing ‎[1,400 bytes]
  116. (hist) ‎Strategic Imperatives ‎[1,401 bytes]
  117. (hist) ‎Support Activities ‎[1,401 bytes]
  118. (hist) ‎Commercial Property Insurance ‎[1,403 bytes]
  119. (hist) ‎Pricing Model ‎[1,404 bytes]
  120. (hist) ‎Infrastructure as a Service (IaaS) ‎[1,405 bytes]
  121. (hist) ‎Social Cost Benefit Analysis (SCBA) ‎[1,405 bytes]
  122. (hist) ‎Cross Training (Business) ‎[1,407 bytes]
  123. (hist) ‎Sunk Cost ‎[1,407 bytes]
  124. (hist) ‎Supply Chain Design ‎[1,407 bytes]
  125. (hist) ‎Information Privacy ‎[1,409 bytes]
  126. (hist) ‎Supply Chain Visibility (SCV) ‎[1,409 bytes]
  127. (hist) ‎Virtual Customer Premises Equipment (vCPE) ‎[1,410 bytes]
  128. (hist) ‎Request for Proposal (RFP) ‎[1,411 bytes]
  129. (hist) ‎Blogging Platform ‎[1,412 bytes]
  130. (hist) ‎Information Flow ‎[1,412 bytes]
  131. (hist) ‎Network Monitoring ‎[1,413 bytes]
  132. (hist) ‎Supplier Evaluation ‎[1,413 bytes]
  133. (hist) ‎National Change of Address (NCOA) ‎[1,415 bytes]
  134. (hist) ‎Business Transaction Protocol (BTP) ‎[1,417 bytes]
  135. (hist) ‎Hedging ‎[1,418 bytes]
  136. (hist) ‎Inventory Shrinkage ‎[1,418 bytes]
  137. (hist) ‎Business Process Simulation ‎[1,420 bytes]
  138. (hist) ‎Open Security Architecture (OSA) Framework ‎[1,420 bytes]
  139. (hist) ‎Document Modeling ‎[1,421 bytes]
  140. (hist) ‎Gantt Chart ‎[1,421 bytes]
  141. (hist) ‎Penetration Pricing ‎[1,421 bytes]
  142. (hist) ‎Cause and Effect Diagram ‎[1,422 bytes]
  143. (hist) ‎Common Alerting Protocol (CAP) ‎[1,422 bytes]
  144. (hist) ‎The Abridged Big Five-Dimensional Circumplex (AB5C) ‎[1,425 bytes]
  145. (hist) ‎Application Control ‎[1,427 bytes]
  146. (hist) ‎Bridging Epistemologies ‎[1,429 bytes]
  147. (hist) ‎Strategic Grid for IT ‎[1,431 bytes]
  148. (hist) ‎Document Object Model (DOM) ‎[1,431 bytes]
  149. (hist) ‎Information Governance Professional (IGP) Certification ‎[1,432 bytes]
  150. (hist) ‎Professional Liability Insurance ‎[1,432 bytes]
  151. (hist) ‎Strategic Synergy ‎[1,432 bytes]
  152. (hist) ‎Intrinsic Stakeholder Commitment ‎[1,434 bytes]
  153. (hist) ‎Six Webs Framework ‎[1,434 bytes]
  154. (hist) ‎Supplier Scorecard ‎[1,435 bytes]
  155. (hist) ‎Play Theory of Mass Communication ‎[1,437 bytes]
  156. (hist) ‎Storage Device ‎[1,438 bytes]
  157. (hist) ‎Primary Customer ‎[1,439 bytes]
  158. (hist) ‎Crypto Currency ‎[1,440 bytes]
  159. (hist) ‎Web Content Management ‎[1,440 bytes]
  160. (hist) ‎Information Model ‎[1,441 bytes]
  161. (hist) ‎Structured Analysis and Design Technique (SADT) ‎[1,442 bytes]
  162. (hist) ‎POSDCORB ‎[1,443 bytes]
  163. (hist) ‎Reverse Logistics ‎[1,444 bytes]
  164. (hist) ‎MoSCoW Method ‎[1,444 bytes]
  165. (hist) ‎Corporate Sustainability ‎[1,448 bytes]
  166. (hist) ‎Waste Management ‎[1,449 bytes]
  167. (hist) ‎Elasticity of Supply ‎[1,449 bytes]
  168. (hist) ‎Functional Strategy ‎[1,449 bytes]
  169. (hist) ‎Vertical Integration ‎[1,450 bytes]
  170. (hist) ‎Collaboration Protocol Profile/Agreement (CPP/A) ‎[1,450 bytes]
  171. (hist) ‎First-Mover Advantage (FMA) ‎[1,450 bytes]
  172. (hist) ‎Software Non-functional Assessment Process (SNAP) ‎[1,450 bytes]
  173. (hist) ‎User-Centered Design (UCD) ‎[1,452 bytes]
  174. (hist) ‎Strategic Window ‎[1,452 bytes]
  175. (hist) ‎Use Case Diagram ‎[1,453 bytes]
  176. (hist) ‎Web Ontology Language (OWL) ‎[1,454 bytes]
  177. (hist) ‎Requirements Analysis ‎[1,454 bytes]
  178. (hist) ‎Laswell's Communication Model ‎[1,454 bytes]
  179. (hist) ‎Representational State Transfer (REST) ‎[1,454 bytes]
  180. (hist) ‎Information Design ‎[1,455 bytes]
  181. (hist) ‎Logical Incrementalism ‎[1,455 bytes]
  182. (hist) ‎Public Relations ‎[1,457 bytes]
  183. (hist) ‎Horizontal Integration ‎[1,461 bytes]
  184. (hist) ‎Weighted Average Cost of Capital (WACC) ‎[1,464 bytes]
  185. (hist) ‎Completed-Contract Method ‎[1,465 bytes]
  186. (hist) ‎Conditional Logics ‎[1,465 bytes]
  187. (hist) ‎Virtual Desktop Infrastructure (VDI) ‎[1,466 bytes]
  188. (hist) ‎The Value Model™ (VM) ‎[1,468 bytes]
  189. (hist) ‎Domain Specific Language (DSL) ‎[1,468 bytes]
  190. (hist) ‎GeoVMM ‎[1,468 bytes]
  191. (hist) ‎Metropolitan Area Network (MAN) ‎[1,472 bytes]
  192. (hist) ‎Polymorphism ‎[1,472 bytes]
  193. (hist) ‎Simulation Governance ‎[1,473 bytes]
  194. (hist) ‎Revenue Recognition ‎[1,475 bytes]
  195. (hist) ‎Prioritization Matrix ‎[1,475 bytes]
  196. (hist) ‎Strategic CRM ‎[1,480 bytes]
  197. (hist) ‎Supervisoral Development ‎[1,483 bytes]
  198. (hist) ‎Very Large-Scale Integration (VLSI) ‎[1,484 bytes]
  199. (hist) ‎Open Systems ‎[1,485 bytes]
  200. (hist) ‎Computational Logic ‎[1,487 bytes]
  201. (hist) ‎Operating Cash Flow ‎[1,489 bytes]
  202. (hist) ‎Fast Common Gateway Interface (FastCGI) ‎[1,490 bytes]
  203. (hist) ‎Persuasion Theory ‎[1,494 bytes]
  204. (hist) ‎Planning Game ‎[1,494 bytes]
  205. (hist) ‎Application Management ‎[1,496 bytes]
  206. (hist) ‎Amdahl's Law ‎[1,498 bytes]
  207. (hist) ‎Goodwill ‎[1,499 bytes]
  208. (hist) ‎The Three Component Model of Organizational Commitment ‎[1,499 bytes]
  209. (hist) ‎Parallel Processing ‎[1,500 bytes]
  210. (hist) ‎Stretch Goals ‎[1,501 bytes]
  211. (hist) ‎Organizational Architecture ‎[1,502 bytes]
  212. (hist) ‎Supplier Selection ‎[1,503 bytes]
  213. (hist) ‎Amortization ‎[1,508 bytes]
  214. (hist) ‎SMTP (Simple Mail Transfer Protocol) ‎[1,509 bytes]
  215. (hist) ‎Cost, Insurance and Freight ‎[1,511 bytes]
  216. (hist) ‎Lean Six Sigma ‎[1,511 bytes]
  217. (hist) ‎Smart Manufacturing ‎[1,512 bytes]
  218. (hist) ‎Network Management ‎[1,513 bytes]
  219. (hist) ‎Total Quality Management (TQM) ‎[1,514 bytes]
  220. (hist) ‎Computer Integrated Manufacturing (CIM) ‎[1,514 bytes]
  221. (hist) ‎Port ‎[1,517 bytes]
  222. (hist) ‎Planning Fallacy ‎[1,518 bytes]
  223. (hist) ‎Defense Advanced Research Projects Agency (DARPA) ‎[1,518 bytes]
  224. (hist) ‎Uses and Gratifications Theory ‎[1,519 bytes]
  225. (hist) ‎Process Capability Assessment Model (PCAT) ‎[1,519 bytes]
  226. (hist) ‎Design for Six Sigma (DFSS) ‎[1,520 bytes]
  227. (hist) ‎Base Station ‎[1,523 bytes]
  228. (hist) ‎Cross-Functional Team ‎[1,524 bytes]
  229. (hist) ‎Spreadmart ‎[1,524 bytes]
  230. (hist) ‎Record Linkage ‎[1,525 bytes]
  231. (hist) ‎Own Risk and Solvency Assessment (ORSA) ‎[1,526 bytes]
  232. (hist) ‎Qualitative Investment Analysis ‎[1,530 bytes]
  233. (hist) ‎Hypermedia ‎[1,531 bytes]
  234. (hist) ‎Cross-Docking ‎[1,532 bytes]
  235. (hist) ‎Risk Maturity Model (RMM) ‎[1,533 bytes]
  236. (hist) ‎Keystroke-Level Model (KLM) ‎[1,533 bytes]
  237. (hist) ‎Theory of Reasoned Action ‎[1,538 bytes]
  238. (hist) ‎Project Management Office (PMO) ‎[1,540 bytes]
  239. (hist) ‎Logical Database Design ‎[1,542 bytes]
  240. (hist) ‎Cultural Intelligence ‎[1,545 bytes]
  241. (hist) ‎Copyright Infringement ‎[1,546 bytes]
  242. (hist) ‎Dynamical Systems Theory ‎[1,546 bytes]
  243. (hist) ‎ISO/IEC 27002:2005 ‎[1,546 bytes]
  244. (hist) ‎Local Area Network (LAN) ‎[1,547 bytes]
  245. (hist) ‎ADL Matrix ‎[1,548 bytes]
  246. (hist) ‎Change Equation ‎[1,548 bytes]
  247. (hist) ‎Underwriting ‎[1,548 bytes]
  248. (hist) ‎Beckhard-Harris Change Equation ‎[1,550 bytes]
  249. (hist) ‎Ius in re ‎[1,550 bytes]
  250. (hist) ‎Sales Model ‎[1,552 bytes]
  251. (hist) ‎Service Component Architecture (SCA) ‎[1,554 bytes]
  252. (hist) ‎Control Framework ‎[1,555 bytes]
  253. (hist) ‎Secure Sockets Layer (SSL) ‎[1,557 bytes]
  254. (hist) ‎Income Statement ‎[1,560 bytes]
  255. (hist) ‎Software Configuration Management (SCM) ‎[1,560 bytes]
  256. (hist) ‎Internet of People (IOP) ‎[1,560 bytes]
  257. (hist) ‎Organic Organization ‎[1,561 bytes]
  258. (hist) ‎Multipurpose Internet Mail Extensions (MIME) ‎[1,562 bytes]
  259. (hist) ‎Computer-Aided Process Planning (CAPP) ‎[1,566 bytes]
  260. (hist) ‎Computer Program ‎[1,568 bytes]
  261. (hist) ‎Financial Leverage ‎[1,568 bytes]
  262. (hist) ‎Extract, Transform, Load (ETL) ‎[1,569 bytes]
  263. (hist) ‎Fiduciary Responsibility ‎[1,570 bytes]
  264. (hist) ‎Reverse Takeover ‎[1,570 bytes]
  265. (hist) ‎STRATPORT Model ‎[1,570 bytes]
  266. (hist) ‎Data Deduplication ‎[1,571 bytes]
  267. (hist) ‎Context-Aware Computing ‎[1,573 bytes]
  268. (hist) ‎Eisenhower Matrix ‎[1,573 bytes]
  269. (hist) ‎Emerging Markets ‎[1,573 bytes]
  270. (hist) ‎Dynamic Data Exchange (DDE) ‎[1,574 bytes]
  271. (hist) ‎Project Management Body of Knowledge (PMBOK®) ‎[1,574 bytes]
  272. (hist) ‎Share of Wallet ‎[1,574 bytes]
  273. (hist) ‎System Integration Testing (SIT) ‎[1,575 bytes]
  274. (hist) ‎Strategic Stakeholder ‎[1,576 bytes]
  275. (hist) ‎Hypervisor ‎[1,577 bytes]
  276. (hist) ‎Time to Market ‎[1,578 bytes]
  277. (hist) ‎Cost of Revenue ‎[1,578 bytes]
  278. (hist) ‎Workforce Optimization (WFO) ‎[1,579 bytes]
  279. (hist) ‎Value Disciplines ‎[1,579 bytes]
  280. (hist) ‎Organization Chart ‎[1,579 bytes]
  281. (hist) ‎SharePoint ‎[1,579 bytes]
  282. (hist) ‎Cross-Branding ‎[1,580 bytes]
  283. (hist) ‎Database Schema ‎[1,581 bytes]
  284. (hist) ‎Second-Mover Strategy ‎[1,581 bytes]
  285. (hist) ‎Integrated Circuit (IC) ‎[1,581 bytes]
  286. (hist) ‎Evaluation ‎[1,583 bytes]
  287. (hist) ‎Integrated Behavioral Model ‎[1,583 bytes]
  288. (hist) ‎Advanced Clinical Research Information Systems (ACRIS) ‎[1,584 bytes]
  289. (hist) ‎Cone of Uncertainty ‎[1,585 bytes]
  290. (hist) ‎Collaborative Planning Methodology (CPM) ‎[1,586 bytes]
  291. (hist) ‎Stakeholder Value Perspective ‎[1,586 bytes]
  292. (hist) ‎VoIP (Voice Over Internet Protocol) ‎[1,587 bytes]
  293. (hist) ‎Strategic Change ‎[1,589 bytes]
  294. (hist) ‎Transmission Control Protocol (TCP) ‎[1,591 bytes]
  295. (hist) ‎Mobile Operating System ‎[1,591 bytes]
  296. (hist) ‎Bachman Diagram ‎[1,592 bytes]
  297. (hist) ‎Uniform Resource Identifier (URI) ‎[1,592 bytes]
  298. (hist) ‎Word of Mouth Marketing ‎[1,593 bytes]
  299. (hist) ‎Sensitivity Analysis ‎[1,593 bytes]
  300. (hist) ‎Warrant ‎[1,595 bytes]
  301. (hist) ‎Economic Margin (EM) ‎[1,595 bytes]
  302. (hist) ‎DevOps ‎[1,597 bytes]
  303. (hist) ‎Barker's Notation ‎[1,598 bytes]
  304. (hist) ‎Ceteris Paribus ‎[1,598 bytes]
  305. (hist) ‎Expected Value ‎[1,601 bytes]
  306. (hist) ‎Profitability Ratios ‎[1,601 bytes]
  307. (hist) ‎International Electro-technical Commission (IEC) ‎[1,603 bytes]
  308. (hist) ‎External Environment ‎[1,603 bytes]
  309. (hist) ‎People Pill ‎[1,603 bytes]
  310. (hist) ‎Enterprise Life Cycle ‎[1,609 bytes]
  311. (hist) ‎Managing for Results Framework ‎[1,611 bytes]
  312. (hist) ‎JavaScript Object Notation (JSON) ‎[1,612 bytes]
  313. (hist) ‎NIST Enterprise Architecture Model (NIST EA Model) ‎[1,613 bytes]
  314. (hist) ‎Behavioral Finance ‎[1,614 bytes]
  315. (hist) ‎File Transfer Protocol (FTP) ‎[1,614 bytes]
  316. (hist) ‎Cyber-Physical Systems (CPS) ‎[1,616 bytes]
  317. (hist) ‎Network Structure ‎[1,623 bytes]
  318. (hist) ‎Disk Operating System (DOS) ‎[1,624 bytes]
  319. (hist) ‎Task Dependencies ‎[1,627 bytes]
  320. (hist) ‎Archetype ‎[1,628 bytes]
  321. (hist) ‎PEG Ratio ‎[1,629 bytes]
  322. (hist) ‎Underwriters Laboratories (UL) ‎[1,630 bytes]
  323. (hist) ‎Augmented Reality (AR) ‎[1,630 bytes]
  324. (hist) ‎Supply Chain Architecture Life Cycle (SCALe) ‎[1,630 bytes]
  325. (hist) ‎Critical Path Method (CPM) ‎[1,631 bytes]
  326. (hist) ‎The Object-Oriented Hypermedia Design Model (OOHDM) ‎[1,633 bytes]
  327. (hist) ‎SMART Method ‎[1,634 bytes]
  328. (hist) ‎Business Resumption Plan ‎[1,641 bytes]
  329. (hist) ‎Outcome-Driven Innovation (ODI) ‎[1,641 bytes]
  330. (hist) ‎Ansoff Matrix ‎[1,642 bytes]
  331. (hist) ‎Trusted Computing Group (TCG) Standards ‎[1,643 bytes]
  332. (hist) ‎CRM Value Chain ‎[1,645 bytes]
  333. (hist) ‎Corporate Bond ‎[1,646 bytes]
  334. (hist) ‎Capital Lease ‎[1,647 bytes]
  335. (hist) ‎Data Wrangling ‎[1,647 bytes]
  336. (hist) ‎Theory of Constraints ‎[1,649 bytes]
  337. (hist) ‎Serverless Computing ‎[1,649 bytes]
  338. (hist) ‎Hostile Takeover ‎[1,650 bytes]
  339. (hist) ‎Leadership Development ‎[1,650 bytes]
  340. (hist) ‎Psychological Pricing ‎[1,650 bytes]
  341. (hist) ‎Social CRM ‎[1,653 bytes]
  342. (hist) ‎Corporate Charter ‎[1,654 bytes]
  343. (hist) ‎Interoperability ‎[1,655 bytes]
  344. (hist) ‎Project Plan ‎[1,658 bytes]
  345. (hist) ‎Net Operating Profit After Taxes (NOPAT) ‎[1,659 bytes]
  346. (hist) ‎IDIC Model ‎[1,659 bytes]
  347. (hist) ‎Post Merger Integration (PMI) ‎[1,660 bytes]
  348. (hist) ‎Open-System Environment Reference Model (OSERM) ‎[1,662 bytes]
  349. (hist) ‎Operating Profit Percentage ‎[1,663 bytes]
  350. (hist) ‎Manufacturing Extension Partnership (MEP) ‎[1,665 bytes]
  351. (hist) ‎Test Marketing ‎[1,666 bytes]
  352. (hist) ‎Architected, Model-Driven Development (AMD) ‎[1,667 bytes]
  353. (hist) ‎Total Cost of Risk (TCoR) ‎[1,667 bytes]
  354. (hist) ‎Portfolio Analysis ‎[1,668 bytes]
  355. (hist) ‎Project Scope ‎[1,670 bytes]
  356. (hist) ‎Data Structure ‎[1,672 bytes]
  357. (hist) ‎Bureaucratic Theory ‎[1,673 bytes]
  358. (hist) ‎The Four Stages of Learning ‎[1,673 bytes]
  359. (hist) ‎Competitive Advantage of Nations ‎[1,674 bytes]
  360. (hist) ‎Opportunity Cost ‎[1,674 bytes]
  361. (hist) ‎Action-Centered Leadership ‎[1,676 bytes]
  362. (hist) ‎Time Management ‎[1,677 bytes]
  363. (hist) ‎Cross Tabulation ‎[1,681 bytes]
  364. (hist) ‎Splay Tree ‎[1,681 bytes]
  365. (hist) ‎Business Process Engine (BPE) ‎[1,688 bytes]
  366. (hist) ‎Data as a Service (DaaS) ‎[1,689 bytes]
  367. (hist) ‎Network Organization ‎[1,689 bytes]
  368. (hist) ‎Value Analysis ‎[1,690 bytes]
  369. (hist) ‎Financial Covenants ‎[1,691 bytes]
  370. (hist) ‎Affiliate Marketing ‎[1,695 bytes]
  371. (hist) ‎Cross Process Integration ‎[1,697 bytes]
  372. (hist) ‎Shared Value ‎[1,701 bytes]
  373. (hist) ‎Bases of Social Power ‎[1,703 bytes]
  374. (hist) ‎MOST (Mission, Objectives, Strategies and Tactics) Analysis ‎[1,703 bytes]
  375. (hist) ‎Trade Marketing Mix ‎[1,704 bytes]
  376. (hist) ‎Core Architecture Data Model (CADM) ‎[1,705 bytes]
  377. (hist) ‎Change Phases ‎[1,708 bytes]
  378. (hist) ‎Framing ‎[1,708 bytes]
  379. (hist) ‎Depreciation ‎[1,712 bytes]
  380. (hist) ‎Systems Dynamics ‎[1,712 bytes]
  381. (hist) ‎Buy Out ‎[1,714 bytes]
  382. (hist) ‎Service Catalog Management ‎[1,714 bytes]
  383. (hist) ‎IT Chargeback Model ‎[1,716 bytes]
  384. (hist) ‎Adversarial Purchasing ‎[1,717 bytes]
  385. (hist) ‎IPMA Competence Baseline (ICB) ‎[1,717 bytes]
  386. (hist) ‎SLEPT Analysis ‎[1,719 bytes]
  387. (hist) ‎Market Saturation ‎[1,719 bytes]
  388. (hist) ‎Gross Domestic Product ‎[1,720 bytes]
  389. (hist) ‎Matrix Organization ‎[1,720 bytes]
  390. (hist) ‎Business-to-Business (B2B) ‎[1,721 bytes]
  391. (hist) ‎Handler's Classification ‎[1,721 bytes]
  392. (hist) ‎Functional Size Measurement (FSM) ‎[1,722 bytes]
  393. (hist) ‎Sherwood Applied Business Security Architecture (SABSA) Framework ‎[1,723 bytes]
  394. (hist) ‎Cloud Integration ‎[1,725 bytes]
  395. (hist) ‎Application Portability Profile (APP) ‎[1,726 bytes]
  396. (hist) ‎Return on Net Assets (RONA) ‎[1,729 bytes]
  397. (hist) ‎Device ‎[1,730 bytes]
  398. (hist) ‎International Financial Reporting Standards (IFRS) ‎[1,733 bytes]
  399. (hist) ‎Trusted Computing (TC) ‎[1,733 bytes]
  400. (hist) ‎Change Dimensions ‎[1,733 bytes]
  401. (hist) ‎Behavioral Targeting ‎[1,734 bytes]
  402. (hist) ‎Stock Dividend ‎[1,734 bytes]
  403. (hist) ‎Community of Interest ‎[1,736 bytes]
  404. (hist) ‎Computer-Aided Design/Computer-Aided Manufacturing (CAD/CAM) ‎[1,737 bytes]
  405. (hist) ‎Database Design ‎[1,738 bytes]
  406. (hist) ‎Root Cause ‎[1,746 bytes]
  407. (hist) ‎Data Fragmentation ‎[1,746 bytes]
  408. (hist) ‎Team Charter ‎[1,749 bytes]
  409. (hist) ‎Non Value-Added Work ‎[1,749 bytes]
  410. (hist) ‎Theory of Mechanistic and Organic Systems ‎[1,751 bytes]
  411. (hist) ‎Earnings Management ‎[1,751 bytes]
  412. (hist) ‎Expectancy Theory ‎[1,752 bytes]
  413. (hist) ‎Spiral of Silence ‎[1,756 bytes]
  414. (hist) ‎System Context Diagram (SCD) ‎[1,759 bytes]
  415. (hist) ‎Analytic Hierarchy Process (AHP) ‎[1,761 bytes]
  416. (hist) ‎IMAC (Install Move Add Change) ‎[1,761 bytes]
  417. (hist) ‎Data Consolidation ‎[1,765 bytes]
  418. (hist) ‎Deep Learning ‎[1,767 bytes]
  419. (hist) ‎Sales Funnel ‎[1,767 bytes]
  420. (hist) ‎Financial Management and Control ‎[1,771 bytes]
  421. (hist) ‎Information System Urbanization ‎[1,773 bytes]
  422. (hist) ‎Net Profit ‎[1,774 bytes]
  423. (hist) ‎STEEPLE Analysis ‎[1,776 bytes]
  424. (hist) ‎Strategic Risk Management ‎[1,777 bytes]
  425. (hist) ‎Financial Performance Management (FPM) ‎[1,779 bytes]
  426. (hist) ‎ActiveX Data Objects (ADO) ‎[1,780 bytes]
  427. (hist) ‎Takeover ‎[1,780 bytes]
  428. (hist) ‎Peter Principle ‎[1,783 bytes]
  429. (hist) ‎Competency Management System ‎[1,784 bytes]
  430. (hist) ‎Stochastic Modeling ‎[1,785 bytes]
  431. (hist) ‎Intentional Change Theory (ICT) ‎[1,785 bytes]
  432. (hist) ‎Friendly Takeover ‎[1,786 bytes]
  433. (hist) ‎Storytelling ‎[1,787 bytes]
  434. (hist) ‎Known Error Record ‎[1,788 bytes]
  435. (hist) ‎Web Content Management System (WCMS) ‎[1,789 bytes]
  436. (hist) ‎Distribution Channel ‎[1,789 bytes]
  437. (hist) ‎Project Management Maturity Model (PMMM) ‎[1,789 bytes]
  438. (hist) ‎Employee Stock Options ‎[1,793 bytes]
  439. (hist) ‎Engineering Change Order (ECO) ‎[1,794 bytes]
  440. (hist) ‎Environmental Factors ‎[1,797 bytes]
  441. (hist) ‎Strategic Fit ‎[1,797 bytes]
  442. (hist) ‎Low-code Development Platforms (LCDP) ‎[1,798 bytes]
  443. (hist) ‎Exclusive Distribution ‎[1,799 bytes]
  444. (hist) ‎Decision Model ‎[1,800 bytes]
  445. (hist) ‎Advanced Server Energy Monitoring Tools ‎[1,802 bytes]
  446. (hist) ‎Structured Systems Analysis and Design Method (SSADM) ‎[1,802 bytes]
  447. (hist) ‎Information Risk Management (IRM) ‎[1,802 bytes]
  448. (hist) ‎Return on Assets (ROA) ‎[1,806 bytes]
  449. (hist) ‎Product Information Management (PIM) ‎[1,807 bytes]
  450. (hist) ‎Metrics ‎[1,809 bytes]
  451. (hist) ‎Stakeholder Analysis ‎[1,812 bytes]
  452. (hist) ‎Base Station Controller (BSC) ‎[1,813 bytes]
  453. (hist) ‎Analytic Applications ‎[1,814 bytes]
  454. (hist) ‎Statistical Quality Control (SQC) ‎[1,814 bytes]
  455. (hist) ‎Business Process Modeling Notation (BPMN) ‎[1,815 bytes]
  456. (hist) ‎Metadata Management ‎[1,816 bytes]
  457. (hist) ‎Five W's ‎[1,817 bytes]
  458. (hist) ‎Operating Income ‎[1,818 bytes]
  459. (hist) ‎Critical Chain ‎[1,820 bytes]
  460. (hist) ‎Backbone Router ‎[1,823 bytes]
  461. (hist) ‎Systems Modeling ‎[1,824 bytes]
  462. (hist) ‎Price ‎[1,824 bytes]
  463. (hist) ‎Information Governance Initiative (IGI) ‎[1,826 bytes]
  464. (hist) ‎Strategic Altitude ‎[1,827 bytes]
  465. (hist) ‎Balance Sheet ‎[1,828 bytes]
  466. (hist) ‎Building Energy Management Systems (BEMS) ‎[1,828 bytes]
  467. (hist) ‎Financial Statement ‎[1,828 bytes]
  468. (hist) ‎Resource ‎[1,833 bytes]
  469. (hist) ‎Adsorption Chillers ‎[1,834 bytes]
  470. (hist) ‎Beyond Budgeting ‎[1,836 bytes]
  471. (hist) ‎Accounting ‎[1,838 bytes]
  472. (hist) ‎PAEI Management Model ‎[1,839 bytes]
  473. (hist) ‎Application Channel Technology and Industry (ACT I) ‎[1,842 bytes]
  474. (hist) ‎Building Lifecycle Management (BLM) ‎[1,842 bytes]
  475. (hist) ‎Business Process Standardization ‎[1,842 bytes]
  476. (hist) ‎Electronic Records Management (ERM) ‎[1,844 bytes]
  477. (hist) ‎Blended Learning ‎[1,845 bytes]
  478. (hist) ‎Return on Capital Employed (ROCE) ‎[1,845 bytes]
  479. (hist) ‎Return on Invested Capital (ROIC) ‎[1,845 bytes]
  480. (hist) ‎Virtualization ‎[1,847 bytes]
  481. (hist) ‎Organizational DNA ‎[1,848 bytes]
  482. (hist) ‎Innovation Maturity Model ‎[1,849 bytes]
  483. (hist) ‎Return on Capital (ROC) ‎[1,851 bytes]
  484. (hist) ‎Strategic Analysis ‎[1,851 bytes]
  485. (hist) ‎Integration Testing ‎[1,852 bytes]
  486. (hist) ‎FCM (Factor-Criteria-Metrics) model ‎[1,852 bytes]
  487. (hist) ‎Secure Shell (SSH) ‎[1,853 bytes]
  488. (hist) ‎International Accounting Standards Committee (IASC) ‎[1,856 bytes]
  489. (hist) ‎Non-Systemic Risk ‎[1,856 bytes]
  490. (hist) ‎Scenario Planning ‎[1,857 bytes]
  491. (hist) ‎Shareholder Value Perspective ‎[1,858 bytes]
  492. (hist) ‎Public Cloud ‎[1,859 bytes]
  493. (hist) ‎Physical Distribution ‎[1,860 bytes]
  494. (hist) ‎LAMP Software ‎[1,862 bytes]
  495. (hist) ‎Strategic Thrusts ‎[1,863 bytes]
  496. (hist) ‎Technology Appropriation ‎[1,863 bytes]
  497. (hist) ‎Future search method ‎[1,865 bytes]
  498. (hist) ‎AML/CTF Program ‎[1,869 bytes]
  499. (hist) ‎Blueprint ‎[1,870 bytes]
  500. (hist) ‎PARTS Model ‎[1,870 bytes]

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)