Glossaire
Dictionnaire Technique
Ne restez plus muet face à un acronyme inconnu. Maîtrisez le jargon de votre futur métier.
A
68 TermesA/B TestingAccess ControlAccess Control List (ACL)AccessibilityAccessibility (a11y)Accessibility (WCAG)Account-Based Marketing (ABM)ACIDACID PropertiesACID TransactionsActive ListeningAd RetargetingAdaptabilityAdaptive PlanningAdobe XDAdvanced Encryption Standard (AES)Advanced Persistent Threat (APT)AdwareAdWordsAffiliate MarketingAffinity DiagrammingAffordanceAgileAgile MindsetAgilityAI in MarketingAJAXAlgorithmic BiasAlt TextAmazon CloudWatchAmazon EC2Amazon RDSAmazon S3Amazon VPCAngularAnimation PrinciplesAnomaly DetectionAnsibleAnthropomorphismAPI-first-designArgo CDArtificial Intelligence (AI)Artificial Neural NetworksAssertivenessAssociation Rule LearningAtomic DesignAttribution ModelingAttribution ModelsAugmented Reality DesignAuto ScalingAutoencodersAutoMLAWS Auto ScalingAWS CloudFormationAWS CloudTrailAWS CloudWatchAWS CodePipelineAWS EC2AWS ECSAWS EKSAWS Elastic BeanstalkAWS FargateAWS IAMAWS LambdaAWS RDSAWS Route 53AWS S3AWS VPC
B
34 TermesB2B (Business to Business)B2B SalesB2C (Business to Consumer)B2C SalesBabelBacklinkingBacklog GroomingBalanced ScorecardBastion HostBayesian InferenceBehavioral TargetingBEMBEM (Block Element Modifier)BenchmarkingBias-Variance TradeoffBig DataBiometric AuthenticationBlack Hat SEOBlockchain SecurityBlue TeamingBlue-Green DeploymentBlue-ocean-strategyBounce RateBranching StrategyBrand AwarenessBrand EquityBrand PositioningBreach and Attack SimulationBreadcrumb NavigationBrute Force AttackBug Bounty ProgramsBusiness Continuity PlanBusiness-model-canvasBuyer Persona
C
109 TermesCacheCachingCaching StrategiesCall to Action (CTA)Canary ReleaseCanary ReleasesCanonical TagsCard SortingCDNChange ManagementChaos EngineeringChefChurnChurn PredictionChurn RateChurn-analysisCI/CDClick-Through Rate (CTR)Client Relationship ManagementCloud Access Security Broker (CASB)Cloud SecurityCloud Security Posture Management (CSPM)CloudFormationCloudTrailCloudWatchCluster AutoscalerCognitive FlexibilityCognitive LoadCohort-analysisCold CallingCollaborative WorkColor TheoryCompetitive AnalysisComputer VisionConfigMapConflict ResolutionConfusion MatrixConsultative SellingContainer OrchestrationContainers as a Service (CaaS)Content CurationContent Delivery Network (CDN)Content Gap AnalysisContent MarketingContent Security Policy (CSP)Content StrategyContent SyndicationContextual InquiryContinuous DeploymentContinuous IntegrationContinuous MonitoringConversion FunnelConversion Rate OptimizationConversion Rate Optimization (CRO)Convolutional Neural NetworksCore Web VitalsCORSCORS (Cross-Origin Resource Sharing)Cost Per AcquisitionCost Per Acquisition (CPA)CPACPCCPC-Cost-Per-ClickCreative Problem SolvingCrisis ManagementCritical ThinkingCRM - Customer Relationship ManagementCROCRO-Conversion Rate OptimizationCross-Browser CompatibilityCross-Cultural CommunicationCross-functional CollaborationCross-Functional TeamCross-Functional TeamsCross-functional TeamworkCross-Origin Resource Sharing (CORS)Cross-SellingCross-Site Scripting (XSS)Cross-validationCryptographic Hash FunctionCSRCSS3CTRCTR-Click-Through RateCultural AwarenessCultural CompetenceCultural IntelligenceCustomer Acquisition CostCustomer Acquisition Cost (CAC)Customer Churn RateCustomer Data Platform (CDP)Customer EmpathyCustomer Experience (CX)Customer Feedback LoopCustomer JourneyCustomer Journey MappingCustomer Lifetime ValueCustomer Lifetime Value (CLV)Customer OnboardingCustomer PersonaCustomer Relationship Management (CRM)Customer RetentionCustomer Retention RateCustomer SegmentationCustomer SuccessCustomer-developmentCVE (Common Vulnerabilities and Exposures)Cyber Threat HuntingCyber Threat Intelligence
D
40 TermesDark PatternsDark Web MonitoringData AugmentationData Breach NotificationData CleaningData EncryptionData Encryption Standard (DES)Data ImputationData Loss Prevention (DLP)Data NormalizationData VisualizationData WarehousingData WranglingData-Driven MarketingDeal SizeDecision TreesDecision-MakingDecision-Making ModelsDeep LearningDelegationDemand GenerationDenial of Service (DoS)Denial-of-Service (DoS) AttackDesign SystemDesign SystemsDesign TokensDesign-thinkingDigital ForensicsDigital PRDimensionality ReductionDistributed Denial of Service (DDoS)Distributed TracingDiversity and InclusionDiversity and Inclusion MetricsDjangoDLP (Data Loss Prevention)DockerDocker ComposeDomain AuthorityDRY Principle
E
48 TermesE-A-T - Expertise, Authoritativeness, TrustworthinessEarned MediaEC2EC2 Auto ScalingECRECR (Elastic Container Registry)EKSEKS (Elastic Kubernetes Service)Elastic BeanstalkElastic Block Store (EBS)Elastic Kubernetes Service (EKS)Elastic Load Balancing (ELB)ELK StackEmail AutomationEmail DeliverabilityEmail MarketingEmail Marketing AutomationEmotional DesignEmotional IntelligenceEmotional Intelligence (EI)Emotional RegulationEmotional ResilienceEmpathyEmpathy MapEmpathy MappingEncryptionEnd-to-End TestingEnd-User FeedbackEndpoint Detection and Response (EDR)Endpoint Protection Platform (EPP)Endpoint SecurityEngagement RateEnsemble LearningESLintETCDEthical LeadershipEthics in AIEthnographic ResearchETLETL (Extract, Transform, Load)ETL ProcessesEvent TrackingEvent-Driven ArchitectureEvergreen ContentExplainability in AIExplainable AIExploratory Data Analysis (EDA)Express.js
F
24 TermesF1 ScoreFacilitationFargateFeature EngineeringFeature-prioritizationFeedback CultureFeedback LoopsFeedback MechanismsFeedback TechniquesFibonacci SequenceFigmaFirebaseFirewallFirewall ConfigurationFirewallsFishbone DiagramFitts's LawFive WhysFlaskFlat DesignForensic AnalysisForensics AnalysisFunnel OptimizationFunnel-analysis
G
19 TermesH
17 TermesI
30 TermesIAMIAM (Identity and Access Management)Identity and Access Management (IAM)IDS/IPS (Intrusion Detection/Prevention Systems)Immutable InfrastructureImpact-mappingImpressionsInbound MarketingInbound SalesIncident ResponseIncident Response PlanInfluenceInfluence and PersuasionInfluencer CollaborationInfluencer CollaborationsInfluencer MarketingInfluencer OutreachInfluencer PartnershipsInformation ArchitectureInformation Architecture (IA)Infrastructure as CodeInfrastructure as Code (IaC)Innovation AccountingInsider ThreatIntegration TestingInteraction DesignInteraction Design (IxD)Intrusion Detection System (IDS)Intrusion Prevention System (IPS)Istio
J
9 TermesK
20 TermesK-Means Clusteringk-Nearest Neighbors (k-NN)KanbanKano ModelKey Performance Indicators (KPI)Keyword CannibalizationKeyword ResearchKibanaKPIKPI-key-performance-indicatorsKPIs (Key Performance Indicators)KubeletKubernetesKubernetes HelmKubernetes IngressKubernetes OperatorsKubernetes RBACKubernetes StatefulSetKubernetes StatefulSetsKustomize
L
25 TermesLambdaLaravelLatent Semantic IndexingLatent Semantic Indexing (LSI)Lazy LoadingLead GenerationLead NurturingLead ScoringLeadership StylesLEAN ManagementLean ThinkingLean UXLean-canvasLean-startupLESSLighthouseLink BuildingLink EquityLoad BalancingLoad TestingLocal SEOLong-tail KeywordsLookalike AudiencesLTV-Lifetime ValueLTV/CAC Ratio
M
51 TermesMachine LearningMalware AnalysisMan-in-the-Middle AttackMan-in-the-Middle Attack (MitM)Market PenetrationMarket Penetration StrategyMarket SegmentationMarketing AutomationMarketing FunnelMarkov ChainsMarTechMental ModelMentoringMeta TagsMéthode STARMicrointeractionsMicroservicesMicroservices ArchitectureMind MappingMindfulnessMinimum Viable ProductMinimum Viable Product (MVP)Mobile Device Management (MDM)Mobile FirstMobile First DesignMobile OptimizationMobile-First IndexingModel DeploymentModel-View-Controller (MVC)MongoDBMonorepoMonte Carlo SimulationMood BoardsMoSCoW-methodMotion DesignMotivational InterviewingMotivational SkillsMotivational TechniquesMulti-Channel MarketingMulti-Factor AuthenticationMulti-factor Authentication (MFA)Multichannel MarketingMVCMVC ArchitectureMVC PatternMVPMVP (Minimum Viable Product)MVP-minimal-viable-productMVVMMVVM PatternMySQL
N
20 TermesNatural Language ProcessingNatural Language Processing (NLP)NegotiationNegotiation SkillsNegotiation TacticsNet Promoter ScoreNet Promoter Score (NPS)NetlifyNetwork SegmentationNetworkingNeural NetworksNext.jsNLP (Natural Language Processing)Node.jsNodePortNorth Star MetricNoSQLNoSQL DatabasesnpmNPS - Net Promoter Score
O
17 TermesP
53 TermesPackerPage AuthorityPage SpeedPage Speed OptimizationPaid TrafficPareto PrinciplePatch ManagementPay-Per-Click (PPC)Penetration TestingPerformance AppraisalPerformance ManagementPerformance MetricsPersona-developmentPersonalizationPersuasionPESTLE AnalysisPhishingPhishing ScamsPHPPillar ContentPivotPivotingPodPod Security PoliciesPorter's-five-forcesPostgreSQLPPCPPC AdvertisingPPC-Pay-Per-ClickPrecision and RecallPredictive AnalyticsPrincipal Component AnalysisPrincipal Component Analysis (PCA)Privacy by DesignProblem-solvingProcess OptimizationProduct BacklogProduct Lifecycle ManagementProduct-Market FitProduct-roadmapProgrammatic AdvertisingProgressive Web App (PWA)Project LifecycleProject ManagementPrometheusPrototypePrototypingPublic Key CertificatePublic Key CryptographyPublic Key Infrastructure (PKI)PuppetPurple TeamingPyTorch
R
32 TermesRACI MatrixRandom ForestRansomwareRansomware ProtectionRate LimitingReactReal-Time BiddingReal-Time Bidding (RTB)Recurrent Neural NetworksRed TeamingReduxReinforcement LearningRelational DatabaseRemarketingRemote Team ManagementResilienceResource AllocationResponsive DesignRESTRESTful APIRetargetingReturn on Ad Spend (ROAS)Revenue Operations (RevOps)Revenue RecognitionRICE-scoring-modelRisk AssessmentRisk ManagementROC CurveROI-Return on InvestmentRolling UpdatesRoot Cause AnalysisRuby on Rails
S
85 TermesS3SaaS (Software as a Service)SaaS MetricsSales EnablementSales ForecastingSales FunnelSales PipelineSales QuotaSassScalabilityScenario AnalysisSchema MarkupScikit-learnScrumSCSSSearch Engine Marketing (SEM)Search Engine Results Page (SERP)Search IntentSecrets ManagementSecure Socket Layer (SSL)Secure Socket Layer (SSL)/Transport Layer Security (TLS)Secure Sockets Layer (SSL)/Transport Layer Security (TLS)Secure Software Development Lifecycle (SSDLC)Security Awareness TrainingSecurity Information and Event Management (SIEM)Security Operations Center (SOC)Security Orchestration, Automation, and Response (SOAR)Security PolicySelf-AwarenessSEM-Search Engine MarketingSEOSEO AuditsSERPSERP FeaturesServant LeadershipServer-Side Rendering (SSR)Serverless ArchitectureServerless ComputingService DesignService MeshSession ManagementSession ReplaySIEM (Security Information and Event Management)Single Page Application (SPA)Site Reliability EngineeringSituational LeadershipSix SigmaSketchSketchingSkeuomorphismSOC (Security Operations Center)SOC (Service Organization Control) ReportsSOC 2 ComplianceSocial CommerceSocial EngineeringSocial ListeningSocial Media AnalyticsSocial Media MarketingSocial Media MetricsSocial ProofSocial SellingSoft SkillsSOLIDSOLID PrinciplesSprint PlanningSpywareSQLSQL InjectionSRE - Site Reliability EngineeringSSL/TLSSSRSSR (Server-Side Rendering)Stakeholder InterviewsStakeholder-managementState ManagementStorytellingStrategic AlignmentStrategic PlanningStrategic ThinkingSupervised LearningSupport Vector MachineSupport Vector Machine (SVM)Support Vector MachinesSvelteSWOT-analysis
T
22 TermesTailwind CSSTask AnalysisTDD (Test Driven Development)Team BuildingTechnical DebtTechnical SEOTensorFlowTerraformThreat HuntingThreat IntelligenceThrottlingTime ManagementTime Series AnalysisTLS/SSLTLS/SSL EncryptionTotal Addressable Market (TAM)Touchpoint AnalysisTransfer LearningTransport Layer Security (TLS)Trust BuildingTypeScriptTypography
U
27 TermesUnderfittingUnique Selling Proposition (USP)Unit EconomicsUnit TestingUnsupervised LearningUpsellingUsability HeuristicsUsability TestingUser EmpathyUser EngagementUser Experience (UX)User FlowUser FlowsUser IntentUser Interface DesignUser Journey MappingUser OnboardingUser PersonaUser PersonasUser ResearchUser Story MappingUser-Centered DesignUser-experience-researchUser-Generated ContentUser-Generated Content (UGC)User-storiesUser-testing
V
24 TermesValue PropositionValue Proposition CanvasValue SellingVersion ControlVertical ScalingVideo MarketingVideo SEOViral MarketingVirtual CollaborationVirtual Private Network (VPN)Vision StatementVisionary LeadershipVisionary ThinkingVisual HierarchyVoice of CustomerVoice of Customer (VoC)Voice of the Customer (VoC)Voice Search OptimizationVPCVPN (Virtual Private Network)VRIO FrameworkVue.jsVulnerability AssessmentVulnerability Scanning