threat of substitutes operations management digital subscriber lines (DSL) switching costs wifi data- driven decision making legacy systems programming language virtualization system software wavelength application software software as a service (SaaS) e- discovery random access memory (RAM) utility software user- generated content (UGC) optical scanners Moore's Law circuit- switched network ASCII code optical character recognition (OCR) support activities network effects business intelligence microwave transmission benchmark crisis management team Web 2.0 business process sustaining technologies byte power of buyers object- oriented programming private branch exchange (PBX) primary activities information client- server network product differentiation strategy threat of new entrants voice over IP (VoIP) information technology (IT) e- government enterprise architecture (EA) WiMax central processing unit (CPU) strategic enabler operating system (OS) software source code twisted pair wires management information systems (MIS) customer relationship management (CRM) system optical fiber commercial off-the- shelf (COTS) ecosystem local area network (LAN) peer-to- peer network rivalry among existing competitors bandwidth Bluetooth information and communications technology (ICT) disruptive innovation TCP/IP wireless router n-tier value chain model business process management (BPM) Internet Protocol Version 6 (IPv6) competitive advantage focused niche strategy data- driven decision making chief information officer (CIO) transistor information system radio frequency identification (RFID) creative destruction social networking sites open source software low cost leadership strategy network computer in- memory computing coaxial cables bits per second (bps) power of suppliers cloud computing Ethernet packet switching hertz (Hz) threat of substitutes operations management digital subscriber lines (DSL) switching costs wifi data- driven decision making legacy systems programming language virtualization system software wavelength application software software as a service (SaaS) e- discovery random access memory (RAM) utility software user- generated content (UGC) optical scanners Moore's Law circuit- switched network ASCII code optical character recognition (OCR) support activities network effects business intelligence microwave transmission benchmark crisis management team Web 2.0 business process sustaining technologies byte power of buyers object- oriented programming private branch exchange (PBX) primary activities information client- server network product differentiation strategy threat of new entrants voice over IP (VoIP) information technology (IT) e- government enterprise architecture (EA) WiMax central processing unit (CPU) strategic enabler operating system (OS) software source code twisted pair wires management information systems (MIS) customer relationship management (CRM) system optical fiber commercial off-the- shelf (COTS) ecosystem local area network (LAN) peer-to- peer network rivalry among existing competitors bandwidth Bluetooth information and communications technology (ICT) disruptive innovation TCP/IP wireless router n-tier value chain model business process management (BPM) Internet Protocol Version 6 (IPv6) competitive advantage focused niche strategy data- driven decision making chief information officer (CIO) transistor information system radio frequency identification (RFID) creative destruction social networking sites open source software low cost leadership strategy network computer in- memory computing coaxial cables bits per second (bps) power of suppliers cloud computing Ethernet packet switching hertz (Hz)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
threat of substitutes
operations management
digital subscriber lines (DSL)
switching costs
wifi
data-driven decision making
legacy systems
programming language
virtualization
system software
wavelength
application software
software as a service (SaaS)
e-discovery
random access memory (RAM)
utility software
user-generated content (UGC)
optical scanners
Moore's Law
circuit-switched network
ASCII code
optical character recognition (OCR)
support activities
network effects
business intelligence
microwave transmission
benchmark
crisis management team
Web 2.0
business process
sustaining technologies
byte
power of buyers
object-oriented programming
private branch exchange (PBX)
primary activities
information
client-server network
product differentiation strategy
threat of new entrants
voice over IP (VoIP)
information technology (IT)
e-government
enterprise architecture (EA)
WiMax
central processing unit (CPU)
strategic enabler
operating system (OS)
software
source code
twisted pair wires
management information systems (MIS)
customer relationship management (CRM) system
optical fiber
commercial off-the-shelf (COTS)
ecosystem
local area network (LAN)
peer-to-peer network
rivalry among existing competitors
bandwidth
Bluetooth
information and communications technology (ICT)
disruptive innovation
TCP/IP
wireless router
n-tier
value chain model
business process management (BPM)
Internet Protocol Version 6 (IPv6)
competitive advantage
focused niche strategy
data-driven decision making
chief information officer (CIO)
transistor
information system
radio frequency identification (RFID)
creative destruction
social networking sites
open source software
low cost leadership strategy
network
computer
in-memory computing
coaxial cables
bits per second (bps)
power of suppliers
cloud computing
Ethernet
packet switching
hertz (Hz)