Short pages
Showing below up to 500 results in range #501 to #1,000.
View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)
- (hist) Stretch Goals [1,501 bytes]
- (hist) Organizational Architecture [1,502 bytes]
- (hist) Supplier Selection [1,503 bytes]
- (hist) Amortization [1,508 bytes]
- (hist) SMTP (Simple Mail Transfer Protocol) [1,509 bytes]
- (hist) Cost, Insurance and Freight [1,511 bytes]
- (hist) Lean Six Sigma [1,511 bytes]
- (hist) Smart Manufacturing [1,512 bytes]
- (hist) Network Management [1,513 bytes]
- (hist) Total Quality Management (TQM) [1,514 bytes]
- (hist) Computer Integrated Manufacturing (CIM) [1,514 bytes]
- (hist) Port [1,517 bytes]
- (hist) Planning Fallacy [1,518 bytes]
- (hist) Defense Advanced Research Projects Agency (DARPA) [1,518 bytes]
- (hist) Uses and Gratifications Theory [1,519 bytes]
- (hist) Process Capability Assessment Model (PCAT) [1,519 bytes]
- (hist) Design for Six Sigma (DFSS) [1,520 bytes]
- (hist) Base Station [1,523 bytes]
- (hist) Cross-Functional Team [1,524 bytes]
- (hist) Spreadmart [1,524 bytes]
- (hist) Record Linkage [1,525 bytes]
- (hist) Own Risk and Solvency Assessment (ORSA) [1,526 bytes]
- (hist) Qualitative Investment Analysis [1,530 bytes]
- (hist) Hypermedia [1,531 bytes]
- (hist) Cross-Docking [1,532 bytes]
- (hist) Risk Maturity Model (RMM) [1,533 bytes]
- (hist) Keystroke-Level Model (KLM) [1,533 bytes]
- (hist) Theory of Reasoned Action [1,538 bytes]
- (hist) Project Management Office (PMO) [1,540 bytes]
- (hist) Logical Database Design [1,542 bytes]
- (hist) Cultural Intelligence [1,545 bytes]
- (hist) Copyright Infringement [1,546 bytes]
- (hist) Dynamical Systems Theory [1,546 bytes]
- (hist) ISO/IEC 27002:2005 [1,546 bytes]
- (hist) Local Area Network (LAN) [1,547 bytes]
- (hist) ADL Matrix [1,548 bytes]
- (hist) Change Equation [1,548 bytes]
- (hist) Underwriting [1,548 bytes]
- (hist) Beckhard-Harris Change Equation [1,550 bytes]
- (hist) Ius in re [1,550 bytes]
- (hist) Sales Model [1,552 bytes]
- (hist) Service Component Architecture (SCA) [1,554 bytes]
- (hist) Control Framework [1,555 bytes]
- (hist) Secure Sockets Layer (SSL) [1,557 bytes]
- (hist) Income Statement [1,560 bytes]
- (hist) Software Configuration Management (SCM) [1,560 bytes]
- (hist) Internet of People (IOP) [1,560 bytes]
- (hist) Organic Organization [1,561 bytes]
- (hist) Multipurpose Internet Mail Extensions (MIME) [1,562 bytes]
- (hist) Computer-Aided Process Planning (CAPP) [1,566 bytes]
- (hist) Computer Program [1,568 bytes]
- (hist) Financial Leverage [1,568 bytes]
- (hist) Extract, Transform, Load (ETL) [1,569 bytes]
- (hist) Fiduciary Responsibility [1,570 bytes]
- (hist) Reverse Takeover [1,570 bytes]
- (hist) STRATPORT Model [1,570 bytes]
- (hist) Data Deduplication [1,571 bytes]
- (hist) Context-Aware Computing [1,573 bytes]
- (hist) Eisenhower Matrix [1,573 bytes]
- (hist) Emerging Markets [1,573 bytes]
- (hist) Dynamic Data Exchange (DDE) [1,574 bytes]
- (hist) Project Management Body of Knowledge (PMBOK®) [1,574 bytes]
- (hist) Share of Wallet [1,574 bytes]
- (hist) System Integration Testing (SIT) [1,575 bytes]
- (hist) Strategic Stakeholder [1,576 bytes]
- (hist) Hypervisor [1,577 bytes]
- (hist) Time to Market [1,578 bytes]
- (hist) Cost of Revenue [1,578 bytes]
- (hist) Workforce Optimization (WFO) [1,579 bytes]
- (hist) Value Disciplines [1,579 bytes]
- (hist) Organization Chart [1,579 bytes]
- (hist) SharePoint [1,579 bytes]
- (hist) Cross-Branding [1,580 bytes]
- (hist) Database Schema [1,581 bytes]
- (hist) Second-Mover Strategy [1,581 bytes]
- (hist) Integrated Circuit (IC) [1,581 bytes]
- (hist) Evaluation [1,583 bytes]
- (hist) Integrated Behavioral Model [1,583 bytes]
- (hist) Advanced Clinical Research Information Systems (ACRIS) [1,584 bytes]
- (hist) Cone of Uncertainty [1,585 bytes]
- (hist) Collaborative Planning Methodology (CPM) [1,586 bytes]
- (hist) Stakeholder Value Perspective [1,586 bytes]
- (hist) VoIP (Voice Over Internet Protocol) [1,587 bytes]
- (hist) Strategic Change [1,589 bytes]
- (hist) Transmission Control Protocol (TCP) [1,591 bytes]
- (hist) Mobile Operating System [1,591 bytes]
- (hist) Bachman Diagram [1,592 bytes]
- (hist) Uniform Resource Identifier (URI) [1,592 bytes]
- (hist) Word of Mouth Marketing [1,593 bytes]
- (hist) Sensitivity Analysis [1,593 bytes]
- (hist) Warrant [1,595 bytes]
- (hist) Economic Margin (EM) [1,595 bytes]
- (hist) DevOps [1,597 bytes]
- (hist) Barker's Notation [1,598 bytes]
- (hist) Ceteris Paribus [1,598 bytes]
- (hist) Expected Value [1,601 bytes]
- (hist) Profitability Ratios [1,601 bytes]
- (hist) International Electro-technical Commission (IEC) [1,603 bytes]
- (hist) External Environment [1,603 bytes]
- (hist) People Pill [1,603 bytes]
- (hist) Enterprise Life Cycle [1,609 bytes]
- (hist) Managing for Results Framework [1,611 bytes]
- (hist) JavaScript Object Notation (JSON) [1,612 bytes]
- (hist) NIST Enterprise Architecture Model (NIST EA Model) [1,613 bytes]
- (hist) Behavioral Finance [1,614 bytes]
- (hist) File Transfer Protocol (FTP) [1,614 bytes]
- (hist) Cyber-Physical Systems (CPS) [1,616 bytes]
- (hist) Network Structure [1,623 bytes]
- (hist) Disk Operating System (DOS) [1,624 bytes]
- (hist) Task Dependencies [1,627 bytes]
- (hist) Archetype [1,628 bytes]
- (hist) PEG Ratio [1,629 bytes]
- (hist) Underwriters Laboratories (UL) [1,630 bytes]
- (hist) Augmented Reality (AR) [1,630 bytes]
- (hist) Supply Chain Architecture Life Cycle (SCALe) [1,630 bytes]
- (hist) Critical Path Method (CPM) [1,631 bytes]
- (hist) The Object-Oriented Hypermedia Design Model (OOHDM) [1,633 bytes]
- (hist) SMART Method [1,634 bytes]
- (hist) Business Resumption Plan [1,641 bytes]
- (hist) Outcome-Driven Innovation (ODI) [1,641 bytes]
- (hist) Ansoff Matrix [1,642 bytes]
- (hist) Trusted Computing Group (TCG) Standards [1,643 bytes]
- (hist) CRM Value Chain [1,645 bytes]
- (hist) Corporate Bond [1,646 bytes]
- (hist) Capital Lease [1,647 bytes]
- (hist) Data Wrangling [1,647 bytes]
- (hist) Theory of Constraints [1,649 bytes]
- (hist) Serverless Computing [1,649 bytes]
- (hist) Hostile Takeover [1,650 bytes]
- (hist) Leadership Development [1,650 bytes]
- (hist) Psychological Pricing [1,650 bytes]
- (hist) Social CRM [1,653 bytes]
- (hist) Corporate Charter [1,654 bytes]
- (hist) Interoperability [1,655 bytes]
- (hist) Project Plan [1,658 bytes]
- (hist) Net Operating Profit After Taxes (NOPAT) [1,659 bytes]
- (hist) IDIC Model [1,659 bytes]
- (hist) Post Merger Integration (PMI) [1,660 bytes]
- (hist) Open-System Environment Reference Model (OSERM) [1,662 bytes]
- (hist) Operating Profit Percentage [1,663 bytes]
- (hist) Manufacturing Extension Partnership (MEP) [1,665 bytes]
- (hist) Test Marketing [1,666 bytes]
- (hist) Architected, Model-Driven Development (AMD) [1,667 bytes]
- (hist) Total Cost of Risk (TCoR) [1,667 bytes]
- (hist) Portfolio Analysis [1,668 bytes]
- (hist) Project Scope [1,670 bytes]
- (hist) Data Structure [1,672 bytes]
- (hist) Bureaucratic Theory [1,673 bytes]
- (hist) The Four Stages of Learning [1,673 bytes]
- (hist) Competitive Advantage of Nations [1,674 bytes]
- (hist) Opportunity Cost [1,674 bytes]
- (hist) Action-Centered Leadership [1,676 bytes]
- (hist) Time Management [1,677 bytes]
- (hist) Cross Tabulation [1,681 bytes]
- (hist) Splay Tree [1,681 bytes]
- (hist) Business Process Engine (BPE) [1,688 bytes]
- (hist) Data as a Service (DaaS) [1,689 bytes]
- (hist) Network Organization [1,689 bytes]
- (hist) Value Analysis [1,690 bytes]
- (hist) Financial Covenants [1,691 bytes]
- (hist) Affiliate Marketing [1,695 bytes]
- (hist) Cross Process Integration [1,697 bytes]
- (hist) Shared Value [1,701 bytes]
- (hist) Bases of Social Power [1,703 bytes]
- (hist) MOST (Mission, Objectives, Strategies and Tactics) Analysis [1,703 bytes]
- (hist) Trade Marketing Mix [1,704 bytes]
- (hist) Core Architecture Data Model (CADM) [1,705 bytes]
- (hist) Change Phases [1,708 bytes]
- (hist) Framing [1,708 bytes]
- (hist) IT Organization (information technology organization) [1,710 bytes]
- (hist) Depreciation [1,712 bytes]
- (hist) Systems Dynamics [1,712 bytes]
- (hist) Buy Out [1,714 bytes]
- (hist) Service Catalog Management [1,714 bytes]
- (hist) IT Chargeback Model [1,716 bytes]
- (hist) Adversarial Purchasing [1,717 bytes]
- (hist) IPMA Competence Baseline (ICB) [1,717 bytes]
- (hist) SLEPT Analysis [1,719 bytes]
- (hist) Market Saturation [1,719 bytes]
- (hist) Gross Domestic Product [1,720 bytes]
- (hist) Matrix Organization [1,720 bytes]
- (hist) Business-to-Business (B2B) [1,721 bytes]
- (hist) Handler's Classification [1,721 bytes]
- (hist) Functional Size Measurement (FSM) [1,722 bytes]
- (hist) Sherwood Applied Business Security Architecture (SABSA) Framework [1,723 bytes]
- (hist) Cloud Integration [1,725 bytes]
- (hist) Application Portability Profile (APP) [1,726 bytes]
- (hist) Return on Net Assets (RONA) [1,729 bytes]
- (hist) Device [1,730 bytes]
- (hist) International Financial Reporting Standards (IFRS) [1,733 bytes]
- (hist) Trusted Computing (TC) [1,733 bytes]
- (hist) Change Dimensions [1,733 bytes]
- (hist) Behavioral Targeting [1,734 bytes]
- (hist) Stock Dividend [1,734 bytes]
- (hist) Community of Interest [1,736 bytes]
- (hist) Computer-Aided Design/Computer-Aided Manufacturing (CAD/CAM) [1,737 bytes]
- (hist) Database Design [1,738 bytes]
- (hist) Root Cause [1,746 bytes]
- (hist) Data Fragmentation [1,746 bytes]
- (hist) Team Charter [1,749 bytes]
- (hist) Non Value-Added Work [1,749 bytes]
- (hist) Theory of Mechanistic and Organic Systems [1,751 bytes]
- (hist) Earnings Management [1,751 bytes]
- (hist) Expectancy Theory [1,752 bytes]
- (hist) Spiral of Silence [1,756 bytes]
- (hist) System Context Diagram (SCD) [1,759 bytes]
- (hist) Analytic Hierarchy Process (AHP) [1,761 bytes]
- (hist) IMAC (Install Move Add Change) [1,761 bytes]
- (hist) Data Consolidation [1,765 bytes]
- (hist) Deep Learning [1,767 bytes]
- (hist) Sales Funnel [1,767 bytes]
- (hist) Financial Management and Control [1,771 bytes]
- (hist) Information System Urbanization [1,773 bytes]
- (hist) Net Profit [1,774 bytes]
- (hist) STEEPLE Analysis [1,776 bytes]
- (hist) Strategic Risk Management [1,777 bytes]
- (hist) Financial Performance Management (FPM) [1,779 bytes]
- (hist) ActiveX Data Objects (ADO) [1,780 bytes]
- (hist) Takeover [1,780 bytes]
- (hist) Peter Principle [1,783 bytes]
- (hist) Competency Management System [1,784 bytes]
- (hist) Stochastic Modeling [1,785 bytes]
- (hist) Intentional Change Theory (ICT) [1,785 bytes]
- (hist) Friendly Takeover [1,786 bytes]
- (hist) Storytelling [1,787 bytes]
- (hist) Known Error Record [1,788 bytes]
- (hist) Web Content Management System (WCMS) [1,789 bytes]
- (hist) Distribution Channel [1,789 bytes]
- (hist) Project Management Maturity Model (PMMM) [1,789 bytes]
- (hist) Employee Stock Options [1,793 bytes]
- (hist) Engineering Change Order (ECO) [1,794 bytes]
- (hist) Environmental Factors [1,797 bytes]
- (hist) Strategic Fit [1,797 bytes]
- (hist) Low-code Development Platforms (LCDP) [1,798 bytes]
- (hist) Exclusive Distribution [1,799 bytes]
- (hist) Decision Model [1,800 bytes]
- (hist) Advanced Server Energy Monitoring Tools [1,802 bytes]
- (hist) Structured Systems Analysis and Design Method (SSADM) [1,802 bytes]
- (hist) Information Risk Management (IRM) [1,802 bytes]
- (hist) Return on Assets (ROA) [1,806 bytes]
- (hist) Product Information Management (PIM) [1,807 bytes]
- (hist) Metrics [1,809 bytes]
- (hist) Stakeholder Analysis [1,812 bytes]
- (hist) Base Station Controller (BSC) [1,813 bytes]
- (hist) Analytic Applications [1,814 bytes]
- (hist) Statistical Quality Control (SQC) [1,814 bytes]
- (hist) Business Process Modeling Notation (BPMN) [1,815 bytes]
- (hist) Metadata Management [1,816 bytes]
- (hist) Five W's [1,817 bytes]
- (hist) Operating Income [1,818 bytes]
- (hist) Critical Chain [1,820 bytes]
- (hist) Backbone Router [1,823 bytes]
- (hist) Systems Modeling [1,824 bytes]
- (hist) Price [1,824 bytes]
- (hist) Information Governance Initiative (IGI) [1,826 bytes]
- (hist) Strategic Altitude [1,827 bytes]
- (hist) Balance Sheet [1,828 bytes]
- (hist) Building Energy Management Systems (BEMS) [1,828 bytes]
- (hist) Financial Statement [1,828 bytes]
- (hist) Resource [1,833 bytes]
- (hist) Adsorption Chillers [1,834 bytes]
- (hist) Beyond Budgeting [1,836 bytes]
- (hist) Accounting [1,838 bytes]
- (hist) PAEI Management Model [1,839 bytes]
- (hist) Application Channel Technology and Industry (ACT I) [1,842 bytes]
- (hist) Building Lifecycle Management (BLM) [1,842 bytes]
- (hist) Business Process Standardization [1,842 bytes]
- (hist) Electronic Records Management (ERM) [1,844 bytes]
- (hist) Blended Learning [1,845 bytes]
- (hist) Return on Capital Employed (ROCE) [1,845 bytes]
- (hist) Return on Invested Capital (ROIC) [1,845 bytes]
- (hist) Virtualization [1,847 bytes]
- (hist) Organizational DNA [1,848 bytes]
- (hist) Innovation Maturity Model [1,849 bytes]
- (hist) Return on Capital (ROC) [1,851 bytes]
- (hist) Strategic Analysis [1,851 bytes]
- (hist) Integration Testing [1,852 bytes]
- (hist) FCM (Factor-Criteria-Metrics) model [1,852 bytes]
- (hist) Secure Shell (SSH) [1,853 bytes]
- (hist) International Accounting Standards Committee (IASC) [1,856 bytes]
- (hist) Non-Systemic Risk [1,856 bytes]
- (hist) Scenario Planning [1,857 bytes]
- (hist) Shareholder Value Perspective [1,858 bytes]
- (hist) Public Cloud [1,859 bytes]
- (hist) Physical Distribution [1,860 bytes]
- (hist) LAMP Software [1,862 bytes]
- (hist) Strategic Thrusts [1,863 bytes]
- (hist) Technology Appropriation [1,863 bytes]
- (hist) Future search method [1,865 bytes]
- (hist) AML/CTF Program [1,869 bytes]
- (hist) Blueprint [1,870 bytes]
- (hist) PARTS Model [1,870 bytes]
- (hist) Flip-in [1,871 bytes]
- (hist) Functional Analysis [1,879 bytes]
- (hist) Technical Bankruptcy [1,880 bytes]
- (hist) Tiny Encryption Algorithm (TEA) [1,880 bytes]
- (hist) Positive Deviance [1,882 bytes]
- (hist) Constructive Cost Model (COCOMO) [1,885 bytes]
- (hist) Merchandising [1,885 bytes]
- (hist) Organizational Learning [1,886 bytes]
- (hist) NPVGO Model (Net Present Value Of Growth Opportunities) [1,886 bytes]
- (hist) Abowd and Beale Framework [1,887 bytes]
- (hist) Embedded System [1,887 bytes]
- (hist) Fundamental Analysis [1,888 bytes]
- (hist) Blue Ocean Strategy [1,890 bytes]
- (hist) Sales and Operations Planning (S&OP) [1,890 bytes]
- (hist) Data Federation [1,891 bytes]
- (hist) Nominal Value [1,891 bytes]
- (hist) Markus and Soh Process Model [1,891 bytes]
- (hist) Return on Equity (ROE) [1,893 bytes]
- (hist) Wireless WAN [1,903 bytes]
- (hist) Stakeholder Mapping [1,903 bytes]
- (hist) Capital Structure [1,906 bytes]
- (hist) Experience Curve [1,906 bytes]
- (hist) Fault Tolerance [1,907 bytes]
- (hist) IT Governance Demand/Supply Model (Gartner) [1,907 bytes]
- (hist) Data Life Cycle [1,908 bytes]
- (hist) Corporate Reputation Quotient [1,909 bytes]
- (hist) Real-Time Analytics [1,910 bytes]
- (hist) Budget [1,911 bytes]
- (hist) Performance Optimization [1,912 bytes]
- (hist) ASTM International [1,913 bytes]
- (hist) Integrated Application Lifecycle Management [1,914 bytes]
- (hist) Data Reference Model (DRM) [1,915 bytes]
- (hist) Navy Process Reference Model [1,915 bytes]
- (hist) Time-Based Model of Security [1,916 bytes]
- (hist) Focus Group [1,918 bytes]
- (hist) Return on Marketing Investment (ROMI) [1,920 bytes]
- (hist) Line of Business (LOB) [1,920 bytes]
- (hist) Calder-Moir IT Governance Framework [1,921 bytes]
- (hist) Expansion through Cooperation [1,921 bytes]
- (hist) Gross Profit [1,928 bytes]
- (hist) Globalization [1,929 bytes]
- (hist) Web Service Choreography Interface (WSCI) [1,930 bytes]
- (hist) Retailer [1,931 bytes]
- (hist) CIO Wiki:About [1,931 bytes]
- (hist) Object Model [1,932 bytes]
- (hist) Round Robin Brainstorming [1,932 bytes]
- (hist) Email Marketing [1,933 bytes]
- (hist) Capital Asset Pricing Model (CAPM) [1,934 bytes]
- (hist) Extended Enterprise Architecture Framework (E2AF) [1,939 bytes]
- (hist) Retained Earnings [1,942 bytes]
- (hist) Partner Interface Process (PIP) [1,943 bytes]
- (hist) Asian Option [1,946 bytes]
- (hist) PDCA Cycle (Plan-Do-Check-Act) [1,946 bytes]
- (hist) Non-Governmental Organization (NGO) [1,947 bytes]
- (hist) Content [1,948 bytes]
- (hist) Emotional Intelligence [1,956 bytes]
- (hist) Operating Lease [1,956 bytes]
- (hist) EPIC ADVISERS Model [1,956 bytes]
- (hist) Application Software Services [1,958 bytes]
- (hist) Package Diagram [1,959 bytes]
- (hist) Information Lifecycle Management (ILM) [1,960 bytes]
- (hist) Non-Disclosure Agreement (NDA) [1,960 bytes]
- (hist) Functional Architecture [1,961 bytes]
- (hist) Information Lifecycle [1,963 bytes]
- (hist) Technical Analysis [1,965 bytes]
- (hist) Visual Perception Theory [1,965 bytes]
- (hist) Initiative for Policy Dialogue (IPD) [1,965 bytes]
- (hist) Parenting Advantage [1,965 bytes]
- (hist) Global Management Accounting Principles (GMAPs) [1,966 bytes]
- (hist) Principle [1,967 bytes]
- (hist) WS Choreography Description Language (WS-CDL) [1,969 bytes]
- (hist) Nielsen Ratings [1,975 bytes]
- (hist) Inventory Valuation [1,975 bytes]
- (hist) Thompson’s and Martin’s Strategic Management Framework [1,979 bytes]
- (hist) Accrual Accounting [1,980 bytes]
- (hist) Organizational Configurations [1,981 bytes]
- (hist) Killer Bees [1,983 bytes]
- (hist) Stakeholder Identification [1,989 bytes]
- (hist) Selective Distribution [1,991 bytes]
- (hist) Virus [1,996 bytes]
- (hist) Perception [1,996 bytes]
- (hist) PRIDE Methodology [1,998 bytes]
- (hist) Enterprise Modeling [2,002 bytes]
- (hist) Choose Your Own Device (CYOD) [2,002 bytes]
- (hist) Design Process [2,004 bytes]
- (hist) Top-down Approach [2,005 bytes]
- (hist) Paralysis by Analysis [2,005 bytes]
- (hist) Paper Prototyping [2,009 bytes]
- (hist) Innovation Management [2,011 bytes]
- (hist) Information Systems Audit and Control Association (ISACA) [2,014 bytes]
- (hist) Exponential Smoothing [2,016 bytes]
- (hist) Liquidity Ratio [2,028 bytes]
- (hist) Performance Measurement Tools [2,030 bytes]
- (hist) ESourcing Capability Model (eSCM) [2,032 bytes]
- (hist) Parallel Programming [2,033 bytes]
- (hist) Phantom Stock Plan [2,033 bytes]
- (hist) Return on Investment (ROI) [2,034 bytes]
- (hist) Staff Management [2,038 bytes]
- (hist) Portfolio Insurance [2,040 bytes]
- (hist) Parkinson's Law [2,043 bytes]
- (hist) Point of Presence (POP) [2,044 bytes]
- (hist) Revenue Center [2,046 bytes]
- (hist) Portfolio [2,052 bytes]
- (hist) Hypodermic Needle Theory [2,055 bytes]
- (hist) Persuasion Techniques [2,055 bytes]
- (hist) Open Web Application Security Project (OWASP) [2,058 bytes]
- (hist) Profit Margin [2,059 bytes]
- (hist) Employee Development [2,061 bytes]
- (hist) Niche Marketing [2,062 bytes]
- (hist) Net Revenue [2,065 bytes]
- (hist) PRIMO-F Model [2,065 bytes]
- (hist) Cost Performance Index (CPI) [2,065 bytes]
- (hist) Anti Hostile Takeover Mechanisms [2,066 bytes]
- (hist) Business Process Framework (eTOM) [2,066 bytes]
- (hist) Executive Development [2,068 bytes]
- (hist) Malware [2,068 bytes]
- (hist) Environmental Insurance [2,070 bytes]
- (hist) Securities and Exchange Commission (SEC) [2,071 bytes]
- (hist) Franchising [2,071 bytes]
- (hist) Organizational Memory [2,073 bytes]
- (hist) Equivalence Partitioning [2,076 bytes]
- (hist) Conversion Ratio [2,078 bytes]
- (hist) Distribution [2,080 bytes]
- (hist) The Nominal Group Technique (NGT) [2,083 bytes]
- (hist) Data Stewardship [2,084 bytes]
- (hist) Objective and Key Results (OKR) [2,090 bytes]
- (hist) Computer Networking [2,096 bytes]
- (hist) Earned Value (EV) [2,096 bytes]
- (hist) Expansion through Internationalization [2,096 bytes]
- (hist) Change Factors [2,097 bytes]
- (hist) Data Vault Modeling [2,098 bytes]
- (hist) Strategic Influence [2,099 bytes]
- (hist) Organizational Infrastructure [2,104 bytes]
- (hist) Proof of Concept (POC) [2,108 bytes]
- (hist) Vendor [2,109 bytes]
- (hist) Informal Organization [2,110 bytes]
- (hist) Corporate Parenting Style [2,114 bytes]
- (hist) Enterprise Search [2,117 bytes]
- (hist) Resource Dependence Theory [2,117 bytes]
- (hist) Statistical Graphics [2,118 bytes]
- (hist) Software Program [2,119 bytes]
- (hist) Data Protection Act [2,126 bytes]
- (hist) Parallel Design [2,126 bytes]
- (hist) Revans' Formula [2,127 bytes]
- (hist) Storage Management [2,131 bytes]
- (hist) Data Model [2,134 bytes]
- (hist) Ladder of Inference [2,137 bytes]
- (hist) Competency-based Approach [2,140 bytes]
- (hist) Accounting Valuation [2,141 bytes]
- (hist) P/E Ratio [2,143 bytes]
- (hist) Software Development [2,144 bytes]
- (hist) Cash Asset Ratio [2,145 bytes]
- (hist) Von Neumann Architecture [2,147 bytes]
- (hist) Function Points [2,147 bytes]
- (hist) Principles of Reinvention [2,149 bytes]
- (hist) Item Response Theory (IRT) [2,151 bytes]
- (hist) Vendor Rating [2,153 bytes]
- (hist) Five Disciplines [2,154 bytes]
- (hist) Convergence [2,155 bytes]
- (hist) Federal Segment Architecture Methodology (FSAM) [2,155 bytes]
- (hist) Parametric Estimating [2,159 bytes]
- (hist) Service Provider [2,159 bytes]
- (hist) Organizational Resilience [2,166 bytes]
- (hist) Competitor Profile Matrix (CPM) [2,168 bytes]
- (hist) Core Group Theory [2,169 bytes]
- (hist) Laffer Curve [2,170 bytes]
- (hist) Computer-Supported Collaborative Learning [2,173 bytes]
- (hist) Research and Development (R&D) [2,178 bytes]
- (hist) Active Database Management System (ADBMS) [2,181 bytes]
- (hist) Advanced Encryption Standard (AES) [2,181 bytes]
- (hist) EProcurement [2,184 bytes]
- (hist) Federal Risk and Authorization Program (FedRAMP) [2,187 bytes]
- (hist) Stages of Team Development [2,190 bytes]
- (hist) Brooks's Law [2,195 bytes]
- (hist) Income Effect [2,196 bytes]
- (hist) Access Network [2,197 bytes]
- (hist) Cognitive Analytics [2,199 bytes]
- (hist) Hertz (Hz, MHz, GHz) [2,199 bytes]
- (hist) Enterprise Workflow [2,200 bytes]
- (hist) Abnormal Rate of Return [2,206 bytes]
- (hist) Cash Ratio [2,208 bytes]
- (hist) Flip-over [2,209 bytes]
- (hist) Innovation Adoption Curve [2,211 bytes]
- (hist) Data Manipulation [2,215 bytes]
- (hist) Required Rate of Return [2,217 bytes]
- (hist) Hierarchical Organization [2,218 bytes]
- (hist) Cash Value Added (CVA) [2,220 bytes]
- (hist) Data Preparation [2,220 bytes]
- (hist) Business Accelerator [2,221 bytes]
- (hist) Protocol Data Unit (PDU) [2,224 bytes]
- (hist) Activity Stream [2,227 bytes]
- (hist) ISO 9000 [2,231 bytes]
- (hist) Top Line [2,232 bytes]
- (hist) Object-Relational Mapping (ORM, O/RM, O/R mapping tool) [2,236 bytes]
- (hist) Net Neutrality [2,236 bytes]
- (hist) Planned Value (PV) [2,238 bytes]
- (hist) Database Marketing [2,239 bytes]
- (hist) Sales Forecasting [2,240 bytes]
- (hist) Ethernet Card [2,241 bytes]
- (hist) Lap Dog Theory [2,244 bytes]
- (hist) IT Ecosystem [2,244 bytes]
- (hist) Web Service Choreography (WS-Choreography) [2,246 bytes]
- (hist) McClelland’s Three Needs Theory [2,249 bytes]
- (hist) Earnings Statement [2,253 bytes]
- (hist) Spam [2,256 bytes]
- (hist) Application Program Interface (API) [2,257 bytes]
- (hist) Object Constraint Language (OCL) [2,257 bytes]
- (hist) WiBe Framework [2,263 bytes]