RecrutLabs
Créer un entretienMes entretiensTarifsBlogContact
Glossaire

Dictionnaire Technique

Ne restez plus muet face à un acronyme inconnu. Maîtrisez le jargon de votre futur métier.

A

68 Termes
A/B Testing
Access Control
Access Control List (ACL)
Accessibility
Accessibility (a11y)
Accessibility (WCAG)
Account-Based Marketing (ABM)
ACID
ACID Properties
ACID Transactions
Active Listening
Ad Retargeting
Adaptability
Adaptive Planning
Adobe XD
Advanced Encryption Standard (AES)
Advanced Persistent Threat (APT)
Adware
AdWords
Affiliate Marketing
Affinity Diagramming
Affordance
Agile
Agile Mindset
Agility
AI in Marketing
AJAX
Algorithmic Bias
Alt Text
Amazon CloudWatch
Amazon EC2
Amazon RDS
Amazon S3
Amazon VPC
Angular
Animation Principles
Anomaly Detection
Ansible
Anthropomorphism
API-first-design
Argo CD
Artificial Intelligence (AI)
Artificial Neural Networks
Assertiveness
Association Rule Learning
Atomic Design
Attribution Modeling
Attribution Models
Augmented Reality Design
Auto Scaling
Autoencoders
AutoML
AWS Auto Scaling
AWS CloudFormation
AWS CloudTrail
AWS CloudWatch
AWS CodePipeline
AWS EC2
AWS ECS
AWS EKS
AWS Elastic Beanstalk
AWS Fargate
AWS IAM
AWS Lambda
AWS RDS
AWS Route 53
AWS S3
AWS VPC

B

34 Termes
B2B (Business to Business)
B2B Sales
B2C (Business to Consumer)
B2C Sales
Babel
Backlinking
Backlog Grooming
Balanced Scorecard
Bastion Host
Bayesian Inference
Behavioral Targeting
BEM
BEM (Block Element Modifier)
Benchmarking
Bias-Variance Tradeoff
Big Data
Biometric Authentication
Black Hat SEO
Blockchain Security
Blue Teaming
Blue-Green Deployment
Blue-ocean-strategy
Bounce Rate
Branching Strategy
Brand Awareness
Brand Equity
Brand Positioning
Breach and Attack Simulation
Breadcrumb Navigation
Brute Force Attack
Bug Bounty Programs
Business Continuity Plan
Business-model-canvas
Buyer Persona

C

109 Termes
Cache
Caching
Caching Strategies
Call to Action (CTA)
Canary Release
Canary Releases
Canonical Tags
Card Sorting
CDN
Change Management
Chaos Engineering
Chef
Churn
Churn Prediction
Churn Rate
Churn-analysis
CI/CD
Click-Through Rate (CTR)
Client Relationship Management
Cloud Access Security Broker (CASB)
Cloud Security
Cloud Security Posture Management (CSPM)
CloudFormation
CloudTrail
CloudWatch
Cluster Autoscaler
Cognitive Flexibility
Cognitive Load
Cohort-analysis
Cold Calling
Collaborative Work
Color Theory
Competitive Analysis
Computer Vision
ConfigMap
Conflict Resolution
Confusion Matrix
Consultative Selling
Container Orchestration
Containers as a Service (CaaS)
Content Curation
Content Delivery Network (CDN)
Content Gap Analysis
Content Marketing
Content Security Policy (CSP)
Content Strategy
Content Syndication
Contextual Inquiry
Continuous Deployment
Continuous Integration
Continuous Monitoring
Conversion Funnel
Conversion Rate Optimization
Conversion Rate Optimization (CRO)
Convolutional Neural Networks
Core Web Vitals
CORS
CORS (Cross-Origin Resource Sharing)
Cost Per Acquisition
Cost Per Acquisition (CPA)
CPA
CPC
CPC-Cost-Per-Click
Creative Problem Solving
Crisis Management
Critical Thinking
CRM - Customer Relationship Management
CRO
CRO-Conversion Rate Optimization
Cross-Browser Compatibility
Cross-Cultural Communication
Cross-functional Collaboration
Cross-Functional Team
Cross-Functional Teams
Cross-functional Teamwork
Cross-Origin Resource Sharing (CORS)
Cross-Selling
Cross-Site Scripting (XSS)
Cross-validation
Cryptographic Hash Function
CSR
CSS3
CTR
CTR-Click-Through Rate
Cultural Awareness
Cultural Competence
Cultural Intelligence
Customer Acquisition Cost
Customer Acquisition Cost (CAC)
Customer Churn Rate
Customer Data Platform (CDP)
Customer Empathy
Customer Experience (CX)
Customer Feedback Loop
Customer Journey
Customer Journey Mapping
Customer Lifetime Value
Customer Lifetime Value (CLV)
Customer Onboarding
Customer Persona
Customer Relationship Management (CRM)
Customer Retention
Customer Retention Rate
Customer Segmentation
Customer Success
Customer-development
CVE (Common Vulnerabilities and Exposures)
Cyber Threat Hunting
Cyber Threat Intelligence

D

40 Termes
Dark Patterns
Dark Web Monitoring
Data Augmentation
Data Breach Notification
Data Cleaning
Data Encryption
Data Encryption Standard (DES)
Data Imputation
Data Loss Prevention (DLP)
Data Normalization
Data Visualization
Data Warehousing
Data Wrangling
Data-Driven Marketing
Deal Size
Decision Trees
Decision-Making
Decision-Making Models
Deep Learning
Delegation
Demand Generation
Denial of Service (DoS)
Denial-of-Service (DoS) Attack
Design System
Design Systems
Design Tokens
Design-thinking
Digital Forensics
Digital PR
Dimensionality Reduction
Distributed Denial of Service (DDoS)
Distributed Tracing
Diversity and Inclusion
Diversity and Inclusion Metrics
Django
DLP (Data Loss Prevention)
Docker
Docker Compose
Domain Authority
DRY Principle

E

48 Termes
E-A-T - Expertise, Authoritativeness, Trustworthiness
Earned Media
EC2
EC2 Auto Scaling
ECR
ECR (Elastic Container Registry)
EKS
EKS (Elastic Kubernetes Service)
Elastic Beanstalk
Elastic Block Store (EBS)
Elastic Kubernetes Service (EKS)
Elastic Load Balancing (ELB)
ELK Stack
Email Automation
Email Deliverability
Email Marketing
Email Marketing Automation
Emotional Design
Emotional Intelligence
Emotional Intelligence (EI)
Emotional Regulation
Emotional Resilience
Empathy
Empathy Map
Empathy Mapping
Encryption
End-to-End Testing
End-User Feedback
Endpoint Detection and Response (EDR)
Endpoint Protection Platform (EPP)
Endpoint Security
Engagement Rate
Ensemble Learning
ESLint
ETCD
Ethical Leadership
Ethics in AI
Ethnographic Research
ETL
ETL (Extract, Transform, Load)
ETL Processes
Event Tracking
Event-Driven Architecture
Evergreen Content
Explainability in AI
Explainable AI
Exploratory Data Analysis (EDA)
Express.js

F

24 Termes
F1 Score
Facilitation
Fargate
Feature Engineering
Feature-prioritization
Feedback Culture
Feedback Loops
Feedback Mechanisms
Feedback Techniques
Fibonacci Sequence
Figma
Firebase
Firewall
Firewall Configuration
Firewalls
Fishbone Diagram
Fitts's Law
Five Whys
Flask
Flat Design
Forensic Analysis
Forensics Analysis
Funnel Optimization
Funnel-analysis

G

19 Termes
Gantt Chart
Gantt Charts
Gatsby
GDPR (General Data Protection Regulation)
Geo-Targeting
Gestalt Principles
git
GitOps
Go-to-Market Strategy
Goal Setting
Google Analytics
Gradient Boosting
Gradient Descent
Grafana
GraphQL
Grid Systems
Growth Hacking
Growth Metrics
Growth Mindset

H

17 Termes
Hard Skills
Headless CMS
Heatmap Analysis
Heatmaps
Helm
Helm Charts
Heroku
Heuristic Evaluation
Hick's Law
Horizontal Scaling
HTML5
HTTP Protocol
HTTP/2
Human-Centered Design
Human-Computer Interaction (HCI)
Hyperparameter Optimization
Hyperparameter Tuning

I

30 Termes
IAM
IAM (Identity and Access Management)
Identity and Access Management (IAM)
IDS/IPS (Intrusion Detection/Prevention Systems)
Immutable Infrastructure
Impact-mapping
Impressions
Inbound Marketing
Inbound Sales
Incident Response
Incident Response Plan
Influence
Influence and Persuasion
Influencer Collaboration
Influencer Collaborations
Influencer Marketing
Influencer Outreach
Influencer Partnerships
Information Architecture
Information Architecture (IA)
Infrastructure as Code
Infrastructure as Code (IaC)
Innovation Accounting
Insider Threat
Integration Testing
Interaction Design
Interaction Design (IxD)
Intrusion Detection System (IDS)
Intrusion Prevention System (IPS)
Istio

J

9 Termes
Jamstack
JavaScript
Jenkins
Jobs to be Done (JTBD)
Journey Mapping
JSON
JTBD-jobs-to-be-done
JWT
JWT (JSON Web Token)

K

20 Termes
K-Means Clustering
k-Nearest Neighbors (k-NN)
Kanban
Kano Model
Key Performance Indicators (KPI)
Keyword Cannibalization
Keyword Research
Kibana
KPI
KPI-key-performance-indicators
KPIs (Key Performance Indicators)
Kubelet
Kubernetes
Kubernetes Helm
Kubernetes Ingress
Kubernetes Operators
Kubernetes RBAC
Kubernetes StatefulSet
Kubernetes StatefulSets
Kustomize

L

25 Termes
Lambda
Laravel
Latent Semantic Indexing
Latent Semantic Indexing (LSI)
Lazy Loading
Lead Generation
Lead Nurturing
Lead Scoring
Leadership Styles
LEAN Management
Lean Thinking
Lean UX
Lean-canvas
Lean-startup
LESS
Lighthouse
Link Building
Link Equity
Load Balancing
Load Testing
Local SEO
Long-tail Keywords
Lookalike Audiences
LTV-Lifetime Value
LTV/CAC Ratio

M

51 Termes
Machine Learning
Malware Analysis
Man-in-the-Middle Attack
Man-in-the-Middle Attack (MitM)
Market Penetration
Market Penetration Strategy
Market Segmentation
Marketing Automation
Marketing Funnel
Markov Chains
MarTech
Mental Model
Mentoring
Meta Tags
Méthode STAR
Microinteractions
Microservices
Microservices Architecture
Mind Mapping
Mindfulness
Minimum Viable Product
Minimum Viable Product (MVP)
Mobile Device Management (MDM)
Mobile First
Mobile First Design
Mobile Optimization
Mobile-First Indexing
Model Deployment
Model-View-Controller (MVC)
MongoDB
Monorepo
Monte Carlo Simulation
Mood Boards
MoSCoW-method
Motion Design
Motivational Interviewing
Motivational Skills
Motivational Techniques
Multi-Channel Marketing
Multi-Factor Authentication
Multi-factor Authentication (MFA)
Multichannel Marketing
MVC
MVC Architecture
MVC Pattern
MVP
MVP (Minimum Viable Product)
MVP-minimal-viable-product
MVVM
MVVM Pattern
MySQL

N

20 Termes
Natural Language Processing
Natural Language Processing (NLP)
Negotiation
Negotiation Skills
Negotiation Tactics
Net Promoter Score
Net Promoter Score (NPS)
Netlify
Network Segmentation
Networking
Neural Networks
Next.js
NLP (Natural Language Processing)
Node.js
NodePort
North Star Metric
NoSQL
NoSQL Databases
npm
NPS - Net Promoter Score

O

17 Termes
OAuth
OAuth 2.0
Observability
Off-Page SEO
OKR
OKR-objectives-and-key-results
OKRs
OKRs (Objectives and Key Results)
Omnichannel Marketing
On-Page SEO
Organic Traffic
Organizational Culture
Organizational Development
ORM (Object-Relational Mapping)
Outbound Marketing
Outbound Sales
Overfitting

P

53 Termes
Packer
Page Authority
Page Speed
Page Speed Optimization
Paid Traffic
Pareto Principle
Patch Management
Pay-Per-Click (PPC)
Penetration Testing
Performance Appraisal
Performance Management
Performance Metrics
Persona-development
Personalization
Persuasion
PESTLE Analysis
Phishing
Phishing Scams
PHP
Pillar Content
Pivot
Pivoting
Pod
Pod Security Policies
Porter's-five-forces
PostgreSQL
PPC
PPC Advertising
PPC-Pay-Per-Click
Precision and Recall
Predictive Analytics
Principal Component Analysis
Principal Component Analysis (PCA)
Privacy by Design
Problem-solving
Process Optimization
Product Backlog
Product Lifecycle Management
Product-Market Fit
Product-roadmap
Programmatic Advertising
Progressive Web App (PWA)
Project Lifecycle
Project Management
Prometheus
Prototype
Prototyping
Public Key Certificate
Public Key Cryptography
Public Key Infrastructure (PKI)
Puppet
Purple Teaming
PyTorch

R

32 Termes
RACI Matrix
Random Forest
Ransomware
Ransomware Protection
Rate Limiting
React
Real-Time Bidding
Real-Time Bidding (RTB)
Recurrent Neural Networks
Red Teaming
Redux
Reinforcement Learning
Relational Database
Remarketing
Remote Team Management
Resilience
Resource Allocation
Responsive Design
REST
RESTful API
Retargeting
Return on Ad Spend (ROAS)
Revenue Operations (RevOps)
Revenue Recognition
RICE-scoring-model
Risk Assessment
Risk Management
ROC Curve
ROI-Return on Investment
Rolling Updates
Root Cause Analysis
Ruby on Rails

S

85 Termes
S3
SaaS (Software as a Service)
SaaS Metrics
Sales Enablement
Sales Forecasting
Sales Funnel
Sales Pipeline
Sales Quota
Sass
Scalability
Scenario Analysis
Schema Markup
Scikit-learn
Scrum
SCSS
Search Engine Marketing (SEM)
Search Engine Results Page (SERP)
Search Intent
Secrets Management
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)/Transport Layer Security (TLS)
Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
Secure Software Development Lifecycle (SSDLC)
Security Awareness Training
Security Information and Event Management (SIEM)
Security Operations Center (SOC)
Security Orchestration, Automation, and Response (SOAR)
Security Policy
Self-Awareness
SEM-Search Engine Marketing
SEO
SEO Audits
SERP
SERP Features
Servant Leadership
Server-Side Rendering (SSR)
Serverless Architecture
Serverless Computing
Service Design
Service Mesh
Session Management
Session Replay
SIEM (Security Information and Event Management)
Single Page Application (SPA)
Site Reliability Engineering
Situational Leadership
Six Sigma
Sketch
Sketching
Skeuomorphism
SOC (Security Operations Center)
SOC (Service Organization Control) Reports
SOC 2 Compliance
Social Commerce
Social Engineering
Social Listening
Social Media Analytics
Social Media Marketing
Social Media Metrics
Social Proof
Social Selling
Soft Skills
SOLID
SOLID Principles
Sprint Planning
Spyware
SQL
SQL Injection
SRE - Site Reliability Engineering
SSL/TLS
SSR
SSR (Server-Side Rendering)
Stakeholder Interviews
Stakeholder-management
State Management
Storytelling
Strategic Alignment
Strategic Planning
Strategic Thinking
Supervised Learning
Support Vector Machine
Support Vector Machine (SVM)
Support Vector Machines
Svelte
SWOT-analysis

T

22 Termes
Tailwind CSS
Task Analysis
TDD (Test Driven Development)
Team Building
Technical Debt
Technical SEO
TensorFlow
Terraform
Threat Hunting
Threat Intelligence
Throttling
Time Management
Time Series Analysis
TLS/SSL
TLS/SSL Encryption
Total Addressable Market (TAM)
Touchpoint Analysis
Transfer Learning
Transport Layer Security (TLS)
Trust Building
TypeScript
Typography

U

27 Termes
Underfitting
Unique Selling Proposition (USP)
Unit Economics
Unit Testing
Unsupervised Learning
Upselling
Usability Heuristics
Usability Testing
User Empathy
User Engagement
User Experience (UX)
User Flow
User Flows
User Intent
User Interface Design
User Journey Mapping
User Onboarding
User Persona
User Personas
User Research
User Story Mapping
User-Centered Design
User-experience-research
User-Generated Content
User-Generated Content (UGC)
User-stories
User-testing

V

24 Termes
Value Proposition
Value Proposition Canvas
Value Selling
Version Control
Vertical Scaling
Video Marketing
Video SEO
Viral Marketing
Virtual Collaboration
Virtual Private Network (VPN)
Vision Statement
Visionary Leadership
Visionary Thinking
Visual Hierarchy
Voice of Customer
Voice of Customer (VoC)
Voice of the Customer (VoC)
Voice Search Optimization
VPC
VPN (Virtual Private Network)
VRIO Framework
Vue.js
Vulnerability Assessment
Vulnerability Scanning

W

11 Termes
Web Accessibility
Web Analytics
Web Components
WebAssembly
Webpack
WebRTC
WebSocket
WebSockets
White Hat SEO
Wireframing
Work-Life Balance

X

2 Termes
XDR (Extended Detection and Response)
XML

Y

1 Termes
Yarn

Z

3 Termes
Zero Trust Architecture
Zero-Click Search
Zero-Day Exploits

Index Alphabétique Unifié

Retrouvez tous nos métiers, compétences, définitions et comparatifs classés par ordre alphabétique.

ABCDEFGHIJKLMNOPQRSTUVWXYZ

Top Métiers

  • Product Owner / Scrum Master
  • Médiateur Scientifique (Musée, CCSTI)
  • Professeur de Mathématiques (CAPES/Agrég)
  • Professeur de Physique-Chimie (CAPES/Agrég)
  • Professeur de SVT (Sciences de la Vie et de la Terre)
  • Professeur d'Informatique (NSI/SNT)
  • Voir tout

Compétences

  • Technologies de données
  • Sensibilisation aux affaires
  • Logiciels actuariels
  • Connaissance réglementaire
  • Connaissance des Marchés Financiers
  • Utilisation de Logiciels Financiers
  • Voir tout

Glossaire

  • Flat Design
  • Augmented Reality Design
  • PHP
  • Laravel
  • LESS
  • HTML5
  • Voir tout

Certifications

  • PCAP – Certified Associate in Python Programming
  • MongoDB Certified Developer Associate
  • Elastic Certified Engineer
  • Redis Certified Developer
  • Unity Certified User: Programmer
  • TensorFlow Developer Certificate
  • Voir tout

Comparatifs

  • Ingénieur Vision Industrielle vs Ingénieur Télécoms / Radiofréquences
  • Ingénieur Vision Industrielle vs Architecte Réseaux
  • Ingénieur Vision Industrielle vs Ingénieur 5G / Réseaux Mobiles
  • Ingénieur Vision Industrielle vs Ingénieur Traitement du Signal
  • Ingénieur Vision Industrielle vs Ingénieur IoT (Connectivité)
  • Ingénieur Télécoms / Radiofréquences vs Architecte Réseaux
  • Voir tout
RecrutLabs

L'IA qui vous prépare à décrocher le job de vos rêves. Simulations d'entretiens techniques et comportementaux.

Navigation

  • Accueil
  • Tarifs
  • Blog
  • Contact

Secteurs Clés

  • Informatique & Data
  • Finance & Maths
  • Biologie & Santé
  • Énergie & Télécoms
  • Physique & Espace
  • Chimie & Cosmétique
  • Environnement
  • Gestion & MIAGE
  • Enseignement

Légal

  • Confidentialité
  • CGU
  • CGV
  • Mentions Légales

© 2026 RecrutLabs. All rights reserved.