Across
- 2. Cognitive computing platform from IBM
- 7. Service Level Agreement
- 8. Parallel areas in a BPM which separate the steps performed by different actors
- 12. Interrelated components that collect/process/publish information for operations, innovation, decision-making
- 15. Computer speed of one trillion floating point operations per second
- 20. The principle of treating all data on the Internet without discrimination or preference
- 21. Enterprise Resource Planning
- 22. Interlinked activities that convert inputs to outputs; add to bottom line; help create competitive advantage
- 24. Finding hidden patterns/relationships in large databases; infers rules to predict future behavior
- 25. Stand-alone application designed to run on a specific platform & device
- 26. Set of processes in an organization to create, store, transfer, & apply knowledge
- 29. In-memory database software and analytics for fast, massive data processing
- 30. Cloud-based ERP software provider to the distribution, retail, manufacturing, and service industries
- 31. Software as a Service
- 32. Trusted entity that issues electronic documents which verify digital entities on the Internet
- 33. Key field which is the unique identifier for all information in any row of a given database table
- 37. Online collaboration software for creating business and technical diagrams
- 39. Using social networking platforms & internal social tools to engage employees, customers, suppliers
- 40. Free website that allows companies to find and compare business software using a "pay-per-click" business model
- 41. Amazon Web Services
- 44. Business Process Management
- 45. Microsoft Cloud PaaS and SaaS Offering
- 46. Internet of Things
- 47. Entity Relationship Diagram
Down
- 1. Small file deposited on a hard drive when a user visits a website
- 3. Metaphor for the Internet
- 4. Competitive Forces Model
- 5. Process that streamlines complex data to minimize redundancy and simplify relationships
- 6. Malicious software programs such as viruses, worms, and Trojan horses that can steal or destroy data
- 9. Random Access Memory
- 10. Management Information Systems
- 11. Free Cloud-based collaboration platform and software suite
- 13. Total Cost of Ownership
- 14. Open-source software framework that enables distributed parallel processing of a huge amount of data across inexpensive computers
- 16. Network device that monitors & blocks allows incoming/outoging network traffic based on security rules
- 17. Purposeful disruption of the activities of a state or organization using computer technology
- 18. Tracking click behavior history of users on websites to understand their interest/intentions and expose them to advertisements uniquely suited to them
- 19. Radio Frequency Identification
- 22. Virtual Private Network
- 23. National Institute of Standards and Technology
- 27. Attempting to obtain sensitive information for malicious reasons by disguising as a trustworthy entity
- 28. Disciplined thinking that is clear, rational, open-minded, and informed by evidence
- 34. Contracting out a business process and/or non-core operational function to an outside party
- 35. Software Development Life Cycle
- 36. Decision Support System
- 38. One trillion bytes of data
- 42. Storage Area Network
- 43. Public Key Infrastructure
- 48. Data Flow Diagram
