Moore's Law threat of new entrants random access memory (RAM) computer product differentiation strategy twisted pair wires threat of substitutes primary activities hertz (Hz) legacy systems virtualization n-tier crisis management team power of suppliers network value chain model source code focused niche strategy social networking sites software as a service (SaaS) customer relationship management (CRM) system peer-to- peer network utility software radio frequency identification (RFID) operations management wifi chief information officer (CIO) support activities data- driven decision making commercial off-the- shelf (COTS) Web 2.0 benchmark client- server network open source software Ethernet Bluetooth creative destruction local area network (LAN) power of buyers user- generated content (UGC) byte operating system (OS) object- oriented programming strategic enabler management information systems (MIS) ecosystem in- memory computing information technology (IT) optical scanners central processing unit (CPU) digital subscriber lines (DSL) coaxial cables data- driven decision making ASCII code sustaining technologies WiMax business process network effects cloud computing low cost leadership strategy private branch exchange (PBX) programming language enterprise architecture (EA) application software packet switching bandwidth optical character recognition (OCR) microwave transmission e- government information system software switching costs transistor information system software bits per second (bps) optical fiber rivalry among existing competitors Internet Protocol Version 6 (IPv6) wireless router disruptive innovation circuit- switched network e- discovery business process management (BPM) wavelength voice over IP (VoIP) TCP/IP business intelligence information and communications technology (ICT) competitive advantage Moore's Law threat of new entrants random access memory (RAM) computer product differentiation strategy twisted pair wires threat of substitutes primary activities hertz (Hz) legacy systems virtualization n-tier crisis management team power of suppliers network value chain model source code focused niche strategy social networking sites software as a service (SaaS) customer relationship management (CRM) system peer-to- peer network utility software radio frequency identification (RFID) operations management wifi chief information officer (CIO) support activities data- driven decision making commercial off-the- shelf (COTS) Web 2.0 benchmark client- server network open source software Ethernet Bluetooth creative destruction local area network (LAN) power of buyers user- generated content (UGC) byte operating system (OS) object- oriented programming strategic enabler management information systems (MIS) ecosystem in- memory computing information technology (IT) optical scanners central processing unit (CPU) digital subscriber lines (DSL) coaxial cables data- driven decision making ASCII code sustaining technologies WiMax business process network effects cloud computing low cost leadership strategy private branch exchange (PBX) programming language enterprise architecture (EA) application software packet switching bandwidth optical character recognition (OCR) microwave transmission e- government information system software switching costs transistor information system software bits per second (bps) optical fiber rivalry among existing competitors Internet Protocol Version 6 (IPv6) wireless router disruptive innovation circuit- switched network e- discovery business process management (BPM) wavelength voice over IP (VoIP) TCP/IP business intelligence information and communications technology (ICT) competitive advantage
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Moore's Law
threat of new entrants
random access memory (RAM)
computer
product differentiation strategy
twisted pair wires
threat of substitutes
primary activities
hertz (Hz)
legacy systems
virtualization
n-tier
crisis management team
power of suppliers
network
value chain model
source code
focused niche strategy
social networking sites
software as a service (SaaS)
customer relationship management (CRM) system
peer-to-peer network
utility software
radio frequency identification (RFID)
operations management
wifi
chief information officer (CIO)
support activities
data-driven decision making
commercial off-the-shelf (COTS)
Web 2.0
benchmark
client-server network
open source software
Ethernet
Bluetooth
creative destruction
local area network (LAN)
power of buyers
user-generated content (UGC)
byte
operating system (OS)
object-oriented programming
strategic enabler
management information systems (MIS)
ecosystem
in-memory computing
information technology (IT)
optical scanners
central processing unit (CPU)
digital subscriber lines (DSL)
coaxial cables
data-driven decision making
ASCII code
sustaining technologies
WiMax
business process
network effects
cloud computing
low cost leadership strategy
private branch exchange (PBX)
programming language
enterprise architecture (EA)
application software
packet switching
bandwidth
optical character recognition (OCR)
microwave transmission
e-government
information
system software
switching costs
transistor
information system
software
bits per second (bps)
optical fiber
rivalry among existing competitors
Internet Protocol Version 6 (IPv6)
wireless router
disruptive innovation
circuit-switched network
e-discovery
business process management (BPM)
wavelength
voice over IP (VoIP)
TCP/IP
business intelligence
information and communications technology (ICT)
competitive advantage