value chain model network effects information and communications technology (ICT) chief information officer (CIO) threat of new entrants radio frequency identification (RFID) ASCII code sustaining technologies business process TCP/IP source code user- generated content (UGC) strategic enabler information virtualization information technology (IT) microwave transmission management information systems (MIS) cloud computing open source software computer twisted pair wires enterprise architecture (EA) bits per second (bps) focused niche strategy switching costs transistor Web 2.0 legacy systems bandwidth Ethernet system software hertz (Hz) peer-to- peer network low cost leadership strategy object- oriented programming Internet Protocol Version 6 (IPv6) application software wavelength disruptive innovation network primary activities Moore's Law business intelligence software as a service (SaaS) packet switching in- memory computing rivalry among existing competitors central processing unit (CPU) data- driven decision making commercial off-the- shelf (COTS) e- discovery product differentiation strategy random access memory (RAM) private branch exchange (PBX) business process management (BPM) competitive advantage utility software power of suppliers programming language crisis management team byte support activities e- government information system optical character recognition (OCR) local area network (LAN) circuit- switched network WiMax client- server network coaxial cables threat of substitutes optical fiber power of buyers Bluetooth creative destruction software wireless router wifi data- driven decision making n-tier ecosystem optical scanners social networking sites customer relationship management (CRM) system operations management digital subscriber lines (DSL) voice over IP (VoIP) operating system (OS) benchmark value chain model network effects information and communications technology (ICT) chief information officer (CIO) threat of new entrants radio frequency identification (RFID) ASCII code sustaining technologies business process TCP/IP source code user- generated content (UGC) strategic enabler information virtualization information technology (IT) microwave transmission management information systems (MIS) cloud computing open source software computer twisted pair wires enterprise architecture (EA) bits per second (bps) focused niche strategy switching costs transistor Web 2.0 legacy systems bandwidth Ethernet system software hertz (Hz) peer-to- peer network low cost leadership strategy object- oriented programming Internet Protocol Version 6 (IPv6) application software wavelength disruptive innovation network primary activities Moore's Law business intelligence software as a service (SaaS) packet switching in- memory computing rivalry among existing competitors central processing unit (CPU) data- driven decision making commercial off-the- shelf (COTS) e- discovery product differentiation strategy random access memory (RAM) private branch exchange (PBX) business process management (BPM) competitive advantage utility software power of suppliers programming language crisis management team byte support activities e- government information system optical character recognition (OCR) local area network (LAN) circuit- switched network WiMax client- server network coaxial cables threat of substitutes optical fiber power of buyers Bluetooth creative destruction software wireless router wifi data- driven decision making n-tier ecosystem optical scanners social networking sites customer relationship management (CRM) system operations management digital subscriber lines (DSL) voice over IP (VoIP) operating system (OS) benchmark
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
value chain model
network effects
information and communications technology (ICT)
chief information officer (CIO)
threat of new entrants
radio frequency identification (RFID)
ASCII code
sustaining technologies
business process
TCP/IP
source code
user-generated content (UGC)
strategic enabler
information
virtualization
information technology (IT)
microwave transmission
management information systems (MIS)
cloud computing
open source software
computer
twisted pair wires
enterprise architecture (EA)
bits per second (bps)
focused niche strategy
switching costs
transistor
Web 2.0
legacy systems
bandwidth
Ethernet
system software
hertz (Hz)
peer-to-peer network
low cost leadership strategy
object-oriented programming
Internet Protocol Version 6 (IPv6)
application software
wavelength
disruptive innovation
network
primary activities
Moore's Law
business intelligence
software as a service (SaaS)
packet switching
in-memory computing
rivalry among existing competitors
central processing unit (CPU)
data-driven decision making
commercial off-the-shelf (COTS)
e-discovery
product differentiation strategy
random access memory (RAM)
private branch exchange (PBX)
business process management (BPM)
competitive advantage
utility software
power of suppliers
programming language
crisis management team
byte
support activities
e-government
information system
optical character recognition (OCR)
local area network (LAN)
circuit-switched network
WiMax
client-server network
coaxial cables
threat of substitutes
optical fiber
power of buyers
Bluetooth
creative destruction
software
wireless router
wifi
data-driven decision making
n-tier
ecosystem
optical scanners
social networking sites
customer relationship management (CRM) system
operations management
digital subscriber lines (DSL)
voice over IP (VoIP)
operating system (OS)
benchmark