Actions

Special

Orphaned pages

The following pages are not linked from or transcluded into other pages in CIO Wiki.

Showing below up to 500 results in range #1 to #500.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

  1. 7MP (7 Management and Planning Tools)
  2. AML/CTF Program
  3. ASEAN Integration
  4. Algorithmic Business
  5. All-in-One (AIO) PCs
  6. Alternative Card Network (ACN)
  7. Alternative Delivery Models
  8. Ambient Advertising
  9. Ambient and Glanceable Displays
  10. American-Style Option
  11. American Medical Informatics Association (AMIA)
  12. Answer Marketplace
  13. Anti-Pattern
  14. Anti-Spam
  15. Anti Hostile Takeover Mechanisms
  16. Applied Analytics
  17. Applied Behavior Analysis (ABA)
  18. Arbitrage Pricing Theory
  19. Archetype
  20. ArchiMate
  21. Asian Option
  22. Atomization
  23. Attention Model
  24. Attribute-Driven Design Method
  25. Attributes of Management Excellence
  26. Attribution
  27. Audio Messaging Interchange Specification (AMIS)
  28. Automated Storage Tiering (Auto-Tiering)
  29. Autoregressive Integrated Moving Average (ARIMA) Model
  30. Availability Plan
  31. Average Cost Pricing
  32. Bachman Diagram
  33. Back-End
  34. Back-End Plan
  35. Backbone Router
  36. Background Intelligent Transfer Service (BITS)
  37. Backward Integration
  38. Bait and Switch
  39. Balanced Technology Extended (BTX)
  40. Bandwagon Effect
  41. Bankmail Engagement
  42. Barcode
  43. Barker's Notation
  44. Base Station Controller (BSC)
  45. Bases of Social Power
  46. Behavior Learning Engine (BLE)
  47. Behavioral Finance
  48. Behavioral Pattern
  49. Behavioral Targeting
  50. Belbin Team Roles
  51. Benefit Dependency Network
  52. Beyond Budgeting
  53. Binary Runtime Environment for Wireless (BREW)
  54. Binary Synchronous Communications (BSC)
  55. Blake and Mouton's Managerial Grid
  56. Blind Spot Analysis
  57. Boil the Ocean
  58. Bond Insurance
  59. Book Value
  60. Bottom-up Approach
  61. Bottom of the Pyramid (BOP)
  62. Bounded Rationality
  63. Box-Jenkins Method
  64. Bridging Epistemologies
  65. Bubble Diagram
  66. Building Lifecycle Management (BLM)
  67. Buy-Side Analyst
  68. Buyback Insurance
  69. Buzzword Quotient (BWQ)
  70. CDL (WS Choreography Description Language)
  71. CIMOSA (Computer Integrated Manufacturing Open Systems Architecture)
  72. CIO Wiki:About
  73. CIO Wiki:General disclaimer
  74. CIO Wiki:Privacy policy
  75. COPE Model (Corporate-Owned, Personally-Enabled Model)
  76. COSMIC Software Sizing
  77. Cannibalization
  78. Canonical Data Model (CDM)
  79. Capacity Plan
  80. Capacity Utilization
  81. Card Sorting
  82. Career Limiting Move
  83. Career Management
  84. Cascade-Correlation Learning Architecture
  85. Case-Based Reasoning (CBR)
  86. Case Management
  87. Case Method
  88. Catalytic Mechanisms
  89. Centralization and Decentralization
  90. Ceteris Paribus
  91. Chairman of the Board
  92. Channel Partner Value
  93. Chen's Notation
  94. Chief Information Governance Officer (CIGO)
  95. Chinese Wall
  96. Choose Your Own Device (CYOD)
  97. Circular Economy
  98. Cisco EnergyWise
  99. Clarkson Principles
  100. Click Network
  101. Clicks and Mortar
  102. Client Server Model
  103. Clinical Decision Support (CDS)
  104. Cloud Service Architecture (CSA)
  105. Clusters
  106. Co-Creation
  107. Co-opetition
  108. Coalface
  109. Coalition
  110. Coercive Power
  111. Collaboration Diagram
  112. Collaboration Protocol Profile/Agreement (CPP/A)
  113. Collaborative Commerce (C-Commerce)
  114. Collaborative Computing
  115. Collaborative Master Data Management (CMDM)
  116. Collection Analytics
  117. Command-line Interface (CLI)
  118. Command and Control (C&C)
  119. Commodity Hardware
  120. CommonKADS
  121. Common Lisp Object System (CLOS)
  122. Common Vulnerabilities and Exposures (CVE)
  123. Competency Management System
  124. Competitive Research
  125. Competitor Profile Matrix (CPM)
  126. Completed-Contract Method
  127. Complex Event Processing (CEP)
  128. Compliance Officer
  129. Componentization
  130. Composable Infrastructure
  131. Composite Applications
  132. Composite Structure Diagram
  133. Computer-Aided Facilities Management (CAFM)
  134. Computer Aided Software Engineering (CASE)
  135. Computer Monitor
  136. Computer Vision
  137. Computer Worm
  138. Concentrated Marketing
  139. Concentration Strategy
  140. Concept Driven Strategy
  141. Concept Programming
  142. Concept Statement
  143. Concept of Operations (CONOP)
  144. Conceptual Design
  145. Conceptual Schema
  146. Conditional Logics
  147. Conditional Probability
  148. Configuration Management System (CMS)
  149. Congruent Strategy
  150. Connected Home
  151. Connection Power
  152. Construct Modeling
  153. Consumer Confidence
  154. Consumer Privacy
  155. Content Assembly Mechanism (CAM)
  156. Content Regulation
  157. Content Strategy
  158. Context-Aware Computing
  159. Context of Use (CoU) Analysis
  160. Contextual Collaboration
  161. Continuous Architecture
  162. Contribution Pricing
  163. Control Activities
  164. Control Environment
  165. Control Framework
  166. Controlled Vocabulary
  167. Convertible Preferred Stock
  168. Conway's Law
  169. Core Architecture Data Model (CADM)
  170. Core Group Theory
  171. Corporate Charter
  172. Corporate Image
  173. Corporate Parenting Style
  174. Corporate Reputation Quotient
  175. Corporate Transparency
  176. Correlation Architecture
  177. Cost, Insurance and Freight
  178. Cost-Plus Pricing
  179. Cost Allocation
  180. Cost Dynamics
  181. Cost Justification
  182. Cost Overrun
  183. Cost Recovery Method
  184. Cost of Revenue
  185. Covert Leadership
  186. Crawford's Slip Writing Method
  187. Creative Accounting
  188. Creative Destruction
  189. Cross-Branding
  190. Cross-Docking
  191. Cross-Functional Team
  192. Cross-Sell
  193. Cross-Selling
  194. Cross Process Integration
  195. Cross Tabulation
  196. Cross Training (Business)
  197. Crown Jewel Defense
  198. Culture Levels
  199. Culture Types
  200. Current Good Manufacturing Practice (cGMP)
  201. DICE Framework
  202. DIKW Pyramid
  203. Data Asset Framework (DAF)
  204. Data Buffer
  205. Data Deduplication
  206. Data Delivery Platform (DDP)
  207. Data Enrichment
  208. Data Federation
  209. Data Health Check
  210. Data Hierarchy
  211. Data Independence
  212. Data Integration Framework (DIF)
  213. Data Island
  214. Data Item
  215. Data Minimization
  216. Data Munging
  217. Data Preparation
  218. Data Presentation Architecture
  219. Data Propagation
  220. Data Prototyping
  221. Data Reconciliation
  222. Data Suppression
  223. Data Value Chain
  224. Data Vault Modeling
  225. Data Wrangling
  226. Data as a Service (DaaS)
  227. Database Design Methodology
  228. Database Marketing
  229. Debt Restructuring
  230. Deferred Shares
  231. Definitive Media Library (DML)
  232. Defragmentation
  233. Deliberate Strategy
  234. Delta Model
  235. Demand Planning
  236. Demand and Value Assessment Methodology (DAM and VAM)
  237. Deming Chain Reaction
  238. Deming Cycle (PDSA Cycle)
  239. Departmentalization
  240. Dependency Network
  241. Depletion
  242. Deployment Diagram
  243. Descriptive Model
  244. Deutsch limit
  245. Development Environment
  246. Dialectical Enquiry
  247. Diamond Model
  248. Dimension Reduction
  249. Dimensions of Relational Work
  250. Diminishing Marginal Productivity
  251. Diminishing Marginal Returns
  252. Diminishing Marginal Utility
  253. Diminishing Returns (DR)
  254. Direct Manipulation Interface
  255. Directed Acyclic Graph
  256. Directors and Officers Liability Insurance
  257. Disaggregation
  258. Discount
  259. Discretionary Access Control (DAC)
  260. Discussion Leadership
  261. Distributed Data Management Architecture (DDM)
  262. Distributed Management Task Force (DMTF)
  263. Distributed Relational Database Architecture (DRDA)
  264. Distributed System Object Model (DSOM)
  265. Document Modeling
  266. Downsizing
  267. Drakon Chart
  268. Dual Commitment
  269. Dual Inline Memory Module (DIMM)
  270. Dutch Auction
  271. Dynamic Data Exchange (DDE)
  272. Dynamic Dispatch
  273. Dynamic HTML
  274. Dynamic Link Library (DLL)
  275. Dynamic Pricing
  276. Dynamic Regression
  277. E3Value Methodology
  278. EFE Matrix (External Factor Evaluation Matrix)
  279. EProcurement
  280. ESourcing Capability Model (eSCM)
  281. ETOM
  282. Early Case Assessment (ECA)
  283. Early Data Assessment (EDA)
  284. Earnings Before Interest After Taxes (EBIAT)
  285. Economic Integration
  286. Economic Margin (EM)
  287. Economic Profit
  288. Effectiveness
  289. Efficiency Wage
  290. Efficient Consumer Response (ECR)
  291. Electronic Discovery (eDiscovery)
  292. Electronic Identity Verification (eIDV)
  293. Email Management (EMM)
  294. Emergent Strategy
  295. Empirical Process
  296. End-to-End Principle
  297. Enhanced Entity Relationship Model (EER Model)
  298. Enterprise Application
  299. Enterprise Feedback Management (EFM)
  300. Enterprise Function Diagram (EFD)
  301. Enterprise Goals
  302. Enterprise Information Portal (EIP)
  303. Enterprise Life Cycle
  304. Enterprise Ontology
  305. Enterprise Performance Life Cycle (EPLC)
  306. Enterprise Project Management (EPM)
  307. Enterprise Relationship Management (ERM)
  308. Enterprise Search
  309. Enterprise Workflow
  310. Entrepreneurial Government
  311. Environmental Factors
  312. Environmental Insurance
  313. Equivalence Partitioning
  314. Errors and Omissions Insurance
  315. Ethernet Card
  316. Event-Driven Process Chain (EPC)
  317. Everyday Low Pricing (EDLP)
  318. Excess Return (ER)
  319. Execution - Evaluation Cycle
  320. Execution as Learning
  321. Executive Compensation
  322. Executive Information System (EIS)
  323. Expected Value of Perfect Information
  324. Expense Center
  325. Experiential Learning
  326. Exponential Smoothing
  327. Extended Backus–Naur Form (EBNF)
  328. Extended Enterprise
  329. FCM (Factor-Criteria-Metrics) model
  330. FIPS (Federal Information Processing Standards)
  331. Face Value
  332. Facilitation Styles
  333. Facility Management
  334. Fact Based Modeling (FBM)
  335. Factory Gate Pricing
  336. Fair Value Accounting
  337. False Acceptance Ratio (FAR)
  338. False Consensus Bias
  339. Fatal Exception
  340. Fault Tree Analysis (FTA)
  341. Feature Detection
  342. Federal Internet Exchange (FIX)
  343. Federal Intrusion Detection Network (FIDNET)
  344. Feng's Classification
  345. Field Service Management (FSM)
  346. Financial Covenants
  347. FireWire
  348. Firmware
  349. First-In First-Out
  350. Fiscal Year
  351. Fixed Asset Management
  352. Flexible Organization
  353. Float (Project Management)
  354. Flow Control
  355. Flynn's Taxonomy
  356. Focus Group
  357. Folksonomy
  358. Foot in the Door
  359. Forced Compliance
  360. Forget, Borrow, Learn
  361. Formalization
  362. Forward Integration
  363. Fourteen Points of Management
  364. Free Cash Flow
  365. Free On Board
  366. Freeware
  367. French and Raven's Five Forms of Power
  368. Full Costing
  369. Function Hierarchy Diagram
  370. Function Points
  371. Functional Analysis
  372. Functional Economic Analysis (FEA)
  373. Functional Model
  374. Functional Size Measurement (FSM)
  375. Functional Software Architecture (FSA)
  376. Functional Team
  377. Future Pull
  378. Futures Contract
  379. GE Business Screen
  380. Garbage Can Model
  381. Gearing Ratio
  382. Generic Data Model
  383. GeoVMM
  384. Gigascale Integration (GSI)
  385. Gilder's Law
  386. Global Positioning System (GPS)
  387. Globalization Management System (GMS)
  388. Glocalization
  389. Graceful Degradation
  390. Green Computing
  391. Grey Knight
  392. Greyware
  393. Gross Revenue
  394. Growth-Share Matrix
  395. Growth Phase
  396. Guard Dog Theory
  397. Guerrilla Marketing
  398. Hagberg Model of Personal Power
  399. Handheld Device
  400. Handler's Classification
  401. Harvard Architecture
  402. Harvest Strategy
  403. Hawthorne Effect
  404. Heart Framework
  405. Hedge
  406. Hedging
  407. Heisenberg's Uncertainty Principle
  408. Helper Application
  409. Hertz (Hz, MHz, GHz)
  410. Heterogeneous Computing
  411. Heterogeneous Network
  412. Heterogeneous System Architecture
  413. Hierarchical-Input-Process-Output (HIPO) Mode
  414. Hierarchical Internetworking Model
  415. High Performance Workplace
  416. Hofstadter's Law
  417. Homogeneous Network
  418. Homoiconicity
  419. Horizontal Agreement
  420. Horizontal Merger
  421. Hospitality Management
  422. Hosted Virtual Desktops (HVD)
  423. Hub-and-Spoke Integration
  424. Human Performance Technology (HPT)
  425. Hypervisor
  426. Hypodermic Needle Theory
  427. IBM Academy of Technology (AoT)
  428. IFE Matrix (Internal Factor Evaluation Matrix)
  429. IPMA Competence Baseline (ICB)
  430. IS Strategy
  431. IT Chargeback Model
  432. IT Help Desk
  433. IT Productivity Paradox
  434. IT Value Model
  435. IUnknown Interface (COM)
  436. Identity Life Cycle Management (ILM)
  437. Illusion of Control Bias
  438. Impala Architecture
  439. Implementation Design
  440. Implementation Management
  441. Impression Management
  442. In-Transit Visiblity
  443. Incident
  444. Inclusive Value Measurement (IVM)
  445. Income Stock
  446. Independent Verification and Validation (IV&V)
  447. Index Fund
  448. Indicator
  449. Inductive Bias
  450. Inferior Goods
  451. Infomercial
  452. Informative Modeling
  453. Infrastructure Outsourcing
  454. Initiative for Policy Dialogue (IPD)
  455. Input-Output Model (I/O Model)
  456. Input-Process-Output (IPO) Model
  457. Inquiry Based Learning
  458. Insider Trading
  459. Institute of Electrical and Electronics Engineers (IEEE)
  460. Institutional Investors
  461. Instrumental Approach of Stakeholder Theory
  462. Insurance Application Architecture (IAA)
  463. Intangible Assets Monitor
  464. Integrated Application Lifecycle Management
  465. Integrated Business Planning (IBP)
  466. Integrated DEFinition Methods (IDEF)
  467. Integrated Marketing Communications
  468. Integration Appliance
  469. Integration Competency Center (ICC)
  470. Integration DEFinition for Information Modeling (IDEF1X)
  471. Integrative Thinking
  472. Intelligent ERP (i-ERP)
  473. Intelligent Process Automation (IPA)
  474. Intentional Change Theory (ICT)
  475. Interaction Overview Diagram
  476. Interaction Technique
  477. Intermediate Outcome
  478. Internal Systems
  479. International Electrotechnical Commission (IEC)
  480. International Telecommunication Union (ITU)
  481. Interpretive Strategy
  482. Interrelationship Diagraph
  483. Interrupt Request (IRQ)
  484. Invasion of Privacy
  485. Invested Capital
  486. Investment Center
  487. Iterative Design
  488. Iterative Development
  489. Ius in re
  490. JICNARS Scale
  491. Java Database Connectivity (JDBC)
  492. Java Message Service (JMS)
  493. Job Characteristics Theory
  494. Job Enlargement
  495. Job Enrichment
  496. Job Rotation
  497. Job Specialization
  498. Jour Fixe
  499. Just-World Effect
  500. Key Global Indicator (KGI)

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)