operations management wavelength management information systems (MIS) application software low cost leadership strategy information focused niche strategy network Web 2.0 enterprise architecture (EA) creative destruction software as a service (SaaS) source code business process management (BPM) switching costs central processing unit (CPU) threat of substitutes commercial off-the- shelf (COTS) random access memory (RAM) threat of new entrants packet switching information system information and communications technology (ICT) n-tier in- memory computing byte cloud computing digital subscriber lines (DSL) peer-to- peer network value chain model bits per second (bps) Bluetooth hertz (Hz) social networking sites benchmark WiMax strategic enabler support activities business intelligence programming language operating system (OS) competitive advantage system software optical character recognition (OCR) private branch exchange (PBX) object- oriented programming legacy systems customer relationship management (CRM) system transistor computer network effects e- discovery sustaining technologies virtualization twisted pair wires open source software TCP/IP bandwidth data- driven decision making microwave transmission power of suppliers local area network (LAN) product differentiation strategy rivalry among existing competitors e- government Internet Protocol Version 6 (IPv6) user- generated content (UGC) coaxial cables software chief information officer (CIO) data- driven decision making ecosystem optical fiber radio frequency identification (RFID) crisis management team voice over IP (VoIP) information technology (IT) utility software Ethernet primary activities client- server network optical scanners ASCII code business process Moore's Law circuit- switched network wifi wireless router disruptive innovation power of buyers operations management wavelength management information systems (MIS) application software low cost leadership strategy information focused niche strategy network Web 2.0 enterprise architecture (EA) creative destruction software as a service (SaaS) source code business process management (BPM) switching costs central processing unit (CPU) threat of substitutes commercial off-the- shelf (COTS) random access memory (RAM) threat of new entrants packet switching information system information and communications technology (ICT) n-tier in- memory computing byte cloud computing digital subscriber lines (DSL) peer-to- peer network value chain model bits per second (bps) Bluetooth hertz (Hz) social networking sites benchmark WiMax strategic enabler support activities business intelligence programming language operating system (OS) competitive advantage system software optical character recognition (OCR) private branch exchange (PBX) object- oriented programming legacy systems customer relationship management (CRM) system transistor computer network effects e- discovery sustaining technologies virtualization twisted pair wires open source software TCP/IP bandwidth data- driven decision making microwave transmission power of suppliers local area network (LAN) product differentiation strategy rivalry among existing competitors e- government Internet Protocol Version 6 (IPv6) user- generated content (UGC) coaxial cables software chief information officer (CIO) data- driven decision making ecosystem optical fiber radio frequency identification (RFID) crisis management team voice over IP (VoIP) information technology (IT) utility software Ethernet primary activities client- server network optical scanners ASCII code business process Moore's Law circuit- switched network wifi wireless router disruptive innovation power of buyers
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
operations management
wavelength
management information systems (MIS)
application software
low cost leadership strategy
information
focused niche strategy
network
Web 2.0
enterprise architecture (EA)
creative destruction
software as a service (SaaS)
source code
business process management (BPM)
switching costs
central processing unit (CPU)
threat of substitutes
commercial off-the-shelf (COTS)
random access memory (RAM)
threat of new entrants
packet switching
information system
information and communications technology (ICT)
n-tier
in-memory computing
byte
cloud computing
digital subscriber lines (DSL)
peer-to-peer network
value chain model
bits per second (bps)
Bluetooth
hertz (Hz)
social networking sites
benchmark
WiMax
strategic enabler
support activities
business intelligence
programming language
operating system (OS)
competitive advantage
system software
optical character recognition (OCR)
private branch exchange (PBX)
object-oriented programming
legacy systems
customer relationship management (CRM) system
transistor
computer
network effects
e-discovery
sustaining technologies
virtualization
twisted pair wires
open source software
TCP/IP
bandwidth
data-driven decision making
microwave transmission
power of suppliers
local area network (LAN)
product differentiation strategy
rivalry among existing competitors
e-government
Internet Protocol Version 6 (IPv6)
user-generated content (UGC)
coaxial cables
software
chief information officer (CIO)
data-driven decision making
ecosystem
optical fiber
radio frequency identification (RFID)
crisis management team
voice over IP (VoIP)
information technology (IT)
utility software
Ethernet
primary activities
client-server network
optical scanners
ASCII code
business process
Moore's Law
circuit-switched network
wifi
wireless router
disruptive innovation
power of buyers