BA520 - Summer 2017

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849
Across
  1. 3. Storage Area Network
  2. 5. Parallel areas in a BPM which separate the steps performed by different actors
  3. 6. Computer speed of one trillion floating point operations per second
  4. 8. Random Access Memory
  5. 10. Online collaboration software for creating business and technical diagrams
  6. 11. Service Level Agreement
  7. 13. Total Cost of Ownership
  8. 14. Open-source software framework that enables distributed parallel processing of a huge amount of data across inexpensive computers
  9. 16. Purposeful disruption of the activities of a state or organization using computer technology
  10. 18. The principle of treating all data on the Internet without discrimination or preference
  11. 19. Malicious software programs such as viruses, worms, and Trojan horses that can steal or destroy data
  12. 22. Internet of Things
  13. 23. Microsoft Cloud PaaS and SaaS Offering
  14. 25. Cognitive computing platform from IBM
  15. 29. Tracking click behavior history of users on websites to understand their interest/intentions and expose them to advertisements uniquely suited to them
  16. 34. Process that streamlines complex data to minimize redundancy and simplify relationships
  17. 37. Public Key Infrastructure
  18. 38. Finding hidden patterns/relationships in large databases; infers rules to predict future behavior
  19. 40. One trillion bytes of data
  20. 41. Interrelated components that collect/process/publish information for operations, innovation, decision-making
  21. 44. Enterprise Resource Planning
  22. 45. Business Process Management
  23. 48. Using social networking platforms & internal social tools to engage employees, customers, suppliers
  24. 49. Cloud-based ERP software provider to the distribution, retail, manufacturing, and service industries
Down
  1. 1. Network device that monitors & blocks allows incoming/outoging network traffic based on security rules
  2. 2. Key Key field which is the unique identifier for all information in any row of a given database table
  3. 3. Software Development Life Cycle
  4. 4. Trusted entity that issues electronic documents which verify digital entities on the Internet
  5. 7. Competitive Forces Model
  6. 9. Interlinked activities that convert inputs to outputs; add to bottom line; help create competitive advantage
  7. 12. Small file deposited on a hard drive when a user visits a website
  8. 15. Contracting out a business process and/or non-core operational function to an outside party
  9. 17. Set of processes in an organization to create, store, transfer, & apply knowledge
  10. 20. Free website that allows companies to find and compare business software using a "pay-per-click" business model
  11. 21. Software as a Service
  12. 24. Entity Relationship Diagram
  13. 26. Metaphor for the Internet
  14. 27. Radio Frequency Identification
  15. 28. Disciplined thinking that is clear, rational, open-minded, and informed by evidence
  16. 30. Stand-alone application designed to run on a specific platform & device
  17. 31. In-memory database software and analytics for fast, massive data processing
  18. 32. Free Cloud-based collaboration platform and software suite
  19. 33. Characterized by the 4 V's (volume, variety, velocity, veracity)
  20. 35. Management Information Systems
  21. 36. Virtual Private Network
  22. 39. Data Flow Diagram
  23. 42. National Institute of Standards and Technology
  24. 43. Attempting to obtain sensitive information for malicious reasons by disguising as a trustworthy entity
  25. 46. Amazon Web Services
  26. 47. Decision Support System