Skip to main content

Cache

A cache – is called like the English CASH – is hardware or software that is used to temporarily work data. How does cache work? When a clients need to access data, they need the right caches. This is usually the “actionable way” for...

Cache control

What does cache control mean? Cache control is an HTTP header that specifies browser caching policies in both client requests and server responses. The guidelines include how a resource is cached, where it is cached, and the maximum age it can be before expiration. The most common cache request...

Cache poisoning

What is cache poisoning? Cache poisoning is an attack vector that takes advantage of the way that Domain Name System (DNS) clients and Web servers improve performance by storing old responses for a period of time in a temporary storage area called a cache. Attackers can corrupt the cache...

Cache validator

Various resources of web pages such as images or CSS files can be cached in the cache of a browser to speed up a renewed web page retrieval. A cache validator is used to check whether the stored information is still up-to-date. What is a Cache Validator? A cache...

Call to action

What does Call to Action mean? Call to Action, or CtA for short, is a term from the field of marketing. It denotes the concrete request to a customer or interested party to carry out a certain action. Why is the Call to Action so important? It is not...

Candystorm

What does Candystorm mean? The term Candystorm describes mass expressions of sympathy in social networks and is therefore the opposite of a Shitstorm. “Candy” is derived from the English language and can be translated as “candy”. Who is the author of this designation? This term comes from Germany and...

Canonical (Canonical day)

What is a Canonical (Canonical tag)? A Canonical (Canonical-Tag), also called Canonical Link or Canonical Attribute, is a link in the source code of a web page and refers to the so-called Canonical URL, which is to be preferentially indicated in the index of Google and other search engines....

Canvas Fingerprinting

What does Canvas Fingerprinting mean? Canvas Fingerprinting is a method to clearly identify online users without the need to collect personal data. The use of cookies is not necessary. This does not necessarily have to be an advantage, because users can object to cookies. With Canvas Fingerprinting this is...

Caphyon

Caphyon is a software company that creates programs to improve as well as intelligently manage search engine

Captcha

What is a captcha? A captcha is an anti-spam technology for form fields and other interactive web page elements to distinguish human input by automated queries by spam bots. Spam bots should be prevented from placing automated advertisements. The term stands for “Completely Automated Public Turing test to tell...

Card sorting

What does Card Sorting mean? Card Sorting (CS) is a method for determining and optimizing the user-friendliness. This test is usually used after a comprehensive analysis phase and is often at the beginning of the conceptual phase of a project. It should ensure that users find a navigation structure...

Carewords

Keywords direct visitors to a website. Carewords appeal to visitors and help turn visitors into customers. What are carewords? Carewords are selected words that address the visitors of a website in a target group-oriented and emotional way. They bind visitors to a website, provide them with the information they...

Cascading Style Sheet (CSS)

What does Cascading Style Sheet mean? CSS are style instructions for the HTML elements of web pages. The specifications in CSS thus determine the design of HTML elements. The CSS instructions contain, for example, information about colors, spacing, backgrounds, fonts, styles and sizes. The CSS styles are usually stored...

Case Sensitivity

In IT, case sensitivity means that the correct entry of upper- or lower-case letters is required in text elements. This can be an input field, a password query or programming code, for example. What is the significance of case sensitivity for URLS? While domain names are usually insensitive, whether...

Catch-All

E-mail addresses are not always spelled correctly and sometimes they do not even exist. To ensure that the addressee still receives these mails, a catch-all mailbox can be set up. What is a catch-all mailbox? A catch-all mailbox is a mailbox that collects all emails sent to a non-existent...

CATI – Computer Assisted Telephone Interview

What is CATI – Computer Assisted Telephone Interview? A CATI – Computer Assisted Telephone Interview is a telephone interviewing technique where the interviewer follows a script provided by a software application. It is a structured system of microdata collection over the telephone that speeds up the collection and processing...

CcTLD

Each country has its own domain endings. These so-called ccTLDs are important for visitors, search engines and SEO. What does ccTLD mean? ccTLD is used as an abbreviation for “Country Code Top Level Domain” and means “country-specific Top Level Domain Name”. ccTLDs show users and search engines in which...

CERT – Computer Emergency Response Team

A CERT – Computer Emergency Response Team is a group of experts who respond to cybersecurity incidents. These teams deal with malware, viruses and other cyber attacks. What are the responsibilities of a CERT – Computer Emergency Response Team? 1. protect This refers to...

CERT-Bund

CERT-Bund is the name given to a team of security experts based at the Federal Office for Information Security. This team has the task of supporting the authorities in preventing as well as combating security problems relating to information technology (IT). CERT-Bund – the main tasks The main tasks...

Certificate policy

A certificate policy is a set of rules that specifies the applicability of a certificate to a particular community and/or application class with common security requirements. What are the main points of a Certificate Policy (CP)? 1. the architecture: The CP must describe the general structure of the relevant...

Certified Senders Alliance (CSA)

What does Certified Senders Alliance mean? The Certified Senders Alliance is a project of the Internet industry association eco, which is working together with the German Dialogue Marketing Association for this purpose. The CSA has been certifying companies that send advertising mail since 2004. It includes all certified companies...

Chatbot

What is a chatbot? A chatbot is a program that serves the communication with people. It uses natural language and should be able to answer more complicated questions. Chatbots are therefore also called text-based dialogue systems. The simplest form of how a chatbot works online is, for example, the...

Check box

What is a check box? A check box is an HTML < input> element that appears by default as a square box in a form on a Web page. A check box can be activated or deactivated by clicking on it to select or not select individual values for...

Chip card terminal

What is a chip card terminal? A smart card terminal (also known as a smart card reader or smart card reader) is an electronic device that reads data from a card-shaped storage medium and may also be able to write to it. Typically, the cards are plastic cards that...

CHMOD

What does CHMOD mean? CHMOD is one of the most important and oldest commands in the Linux environment and has existed since the first AT&T UNIX version from the 1970s. The command is entered directly in the shell or bash window. It changes the access rights of files and...

Chosen Ciphertext Attack

What does Chosen Ciphertext Attack mean? The Chosen Ciphertext attack is a method of cryptanalysis. The goal is to obtain the key of an encrypted connection or single file. The attacker must be in possession of an encoded data set (Chosen Ciphertext) and the corresponding plaintext. With this knowledge...

Chosen plaintext attack

Encrypted, i.e. coded texts, are intended to prevent the contents from being read by anyone. One way to find out how texts were encrypted is the Chosen plaintext attack. What is a Chosen plaintext attack? A Chosen plaintext attack is a term from cryptanalysis. The purpose of the attack...

Chunk

Definition – What is a Chunk? A chunk is a fragment of information used in many multimedia formats such as PNG, IFF, MP3 and AVI. Each block contains a header that specifies some parameters (e.g. the type of block, comments, size, etc.). In the middle is a variable area...

CIDR

CIDR (Classless Inter-Domain Routing) CIDR (Classless Inter-Domain Routing), sometimes referred to as supernetting, allows for more flexible allocation of IP addresses than was possible with the original system of IP address classes. As a result, the number of available Internet addresses has been greatly increased, which, along with the...

Claim

The term claim originates from the English language, but is now absolutely common in the marketing industry. Claim is very often used without translation as a synonym for slogan. Just like a slogan or a logo, claims can also be an essential part of a brand. Unlike a slogan,...

Clean URL

Meaning A Clean URL, also known as a semantic URL, is directly readable by a search engine. It briefly summarizes the content of a web page and helps the user to orientate himself as well as to classify the meaning of a web page. The dynamic URL A clean...

Clear Web

The Clear Web refers to that part of the Internet that search engines can index using web crawlers. Other terms for Clear Web are Surface Web and Visible Web. The Deep Web represents the opposite. Web pages that users can only access after entering a password, for example, are...

Click fraud

What is Click Fraud? Click fraud is a type of fraud that can occur with cost-per-click (CPC) online advertising. In CPC advertising, owners of websites that publish ads are paid according to how many visitors click on the ads. Advertising sites and competitors can be beneficiaries of such fraud....

Click Path

The click path shows how visitors navigate on a website. An analysis of the click path provides website operators with information for search engine optimization. What is a click path? The click path is the path that visitors choose when clicking or navigating on a web page. The click...

Click Popularity

Click Popular ity is a ranking system for determining the order of results in search engines. The determined click popularity is used to improve the relevance of the search results. The algorithm for determining click popularity is usually kept secret by the search engine operator. The search engine results...

Click spamming

What is click spamming? Click spamming, also referred to as “organics poaching,” is a type of fraud that occurs when a scammer performs clicks for users who did not make them. It starts when a user lands on a mobile website or app that a scammer is running. From...

Click-through rate (CTR)

What does click-through rate mean? The CTR or click-through rate is the percentage of ad impressions that have led to a click on an ad. Ad Impression or “Ad View” refers to the number of ads on a website. CTR also refers to the percentage of page impressions that...

Click-to-call

Click-to-Call refers to a type of Google Ads (formerly AdWords) ad that, when clicked, calls the business directly instead of linking to the website. These ads can only be served on mobile devices. Therefore, they are crucial for mobile marketing campaigns. How does click-to-call...

Clickbaiting

What is clickbaiting? Clickbaiting is a form of misleading, sensational advertising on websites to attract attention and entice users to follow a link. A teaser in the form of text or a thumbnail (preview image) aims to exploit curiosity by providing just enough information to make readers curious to...

Clickjacking

Clickjacking is when a cybercriminal tricks a user into clicking on a link that appears to take them to a specific location, but redirects them to a destination chosen by the attacker for malicious reasons. It is also referred to as IFRAME overlay referred to as. In many cases,...

Clickstream

What is a clickstream? A clickstream is a record that contains data about a website user’s clicks on a computer screen via a mouse or touchpad. This type of information provides a visual overview of user activity with detailed feedback. Such data and related analytics facilitate market research and...

Client

What is a client? A client, as part of a client-server model, is hardware or software that accesses and receives data from a service provided by a so-called server. Servers are often located on a remote computer system. In this case, the client accesses the service over a network,...

Cloaking

The contents of a website that visitors see and that are evaluated by the search engine crawlers are not always identical. Cloaking is a technique that deceives visitors and search engines. What does cloaking mean? Cloaking is an SEO technique that is used to show search engines a different...

Closed-Loop Marketing

Closed-loop marketing is marketing that relies on data and insights from closed-loop reporting.“Closing the loop” simply means that sales teams report to marketing on what happened to the leads they received. This helps marketing understand the best and worst lead sources. The 4 steps of closed loop marketing:

Cloud

Cloud is a term from the field of modern IT infrastructure. It is a model for the storage of computer data (cloud storage) or applications (cloud computing), in which the files and programs are kept in a storage and computer system that is remote from the place of application....

Cloud Computing

What does cloud computing mean? If several PCs are connected to a computer or data cloud, one speaks of Cloud Computing. In essence, servers, storage devices, databases and applications are then no longer available locally. Access is provided via interfaces and protocols. The cloud can consist of one or...

Cloudinary

What is Cloudinary? The US company Cloudinary, based in Santa Clara, California, offers image and video management on a cloud basis. Users upload files to Cloudinary and can then embed them on their websites and blogs. The service provider exists since 2011. How does Cloudinary work? After uploading the...

Cluster analysis

What is cluster analysis? Cluster analysis is a statistical classification technique in which a set of objects or points with similar characteristics are grouped into clusters. It involves a number of different algorithms and methods, all of which are used to group objects of a similar nature into appropriate...

CMD commands

What are CMD commands? The CMD commands were first used in the 86-DOS operating system. Microsoft bought 86-DOS in the early 1980s and developed it further to MS-DOS. This system was enormously well received in professional circles and laid the foundation for Microsoft’s future success. The CMD commands in...

Co-Citation

What is co-citation? Co-citation is when a website or brand is mentioned (not linked to) by two different sources. In the context of reciprocal mentions of a single website, and not because of actual links between websites in the form of links, there is a strong content-driven connection between...

Co-Occurence

The term Co-Occurence describes the presence, frequency and proximity of similar keywords on different websites. Co-Occurence logically includes keywords that are currently relevant but not exactly the same. Meaning The idea for Co-Occurence came from the observation that search engines refer to “relevant answers” to a query posed by...

COBOL

What does COBOL mean? The abbreviation COBOL stands for Common Business Oriented Language and describes one of the first standardized programming languages in the world. What was it used for? In contrast to the simultaneously booming mathematical-scientific language FORTRAN, it covered the commercial and business management aspects of programming....

Cognitive computing

What does Cognitive Computing mean? Cognitive Computing (CC) describes technologies that mimic the way the human mind functions with the aim of improving human decision making. CC is based on the science of artificial intelligence and signal processing. The term includes machine learning, logical reasoning, speech and object recognition...

Cognitive load

Cognitive Load (CL) or Cognitive Load Theory is the concept that information should be presented at a pace and level of difficulty that corresponds to the way the human brain processes information. CL, according to Cognitive Load Theory, equates to the cognitive load that information causes in the human...

Cognitive walkthrough

What is Cognitive Walkthrough? Cognitive Walkthrough is a usability evaluation method in which one or more evaluators complete a series of tasks and ask a series of questions from the user’s perspective. The focus of Cognitive Walkthrough is on understanding the system’s ability to learn for new or infrequent...

Collaborative filtering

What is Collaborative Filtering? Collaborativefiltering is a technique that is often used to create personalized recommendations on the web. Some popular websites that use collaborative filtering technology include Amazon, Netflix, iTunes, and IMDB. Collaborative filtering uses algorithms to make automatic predictions about a customer’s interests by combining preferences from...

Color Management System (CMS)

What is a Color Management System (CMS) ? A Color Management System (CMS) is a collection of software tools used to ensure that colors remain the same regardless of the medium or device used to display them. Since colors are device dependent and different devices use different technologies to...

Command and Control Server

What is Command and Control Server? Command and control servers are computers that issue directives to devices that have been infected with ransomware or other types of malware such as rootkits. C & C servers can be used to create powerful networks of infected devices capable of performing distributed...

Commission Junction (CJ)

What is Commission Junction? Commission Junction (CJ) is one of the oldest affiliate marketing networks in the world. Founded in 1998 and headquartered in Santa Barbara, California, it became part of the public company Alliance Data in 2014, which renamed it CJ Affiliate. Due to the long tradition, the...

Common Criteria

Common Criteria also known as CC is an international set of guidelines and specifications for evaluating information security products specifically designed to ensure that they meet an agreed upon security standard for government activities. CC is also more formally known as Common Criteria for Information Technology Security Evaluation. How...

Common gateway interface

The data exchange between an application program and a server should be as simple and smooth as possible. The Common Gateway Interface is the standard solution for this task. What is a Common Gateway Interface? The Common Gateway Interface, abbreviated CGI, is a standard interface through which a web...

CommonJS

CommonJS (CJS) is a complement to the JavaScript scripting language. With CommonJS, JavaScript can also be used outside the traditional browser environment. This use is made possible by newly developed interfaces, libraries and modules that create a uniform basis for the integration of JavaScript in different environments. [su_list icon=”icon:...

Compiler

What does compiler mean? A compiler is a computer program that translates computer code written in one programming language (the source language) into another programming language (the target language). The term compiler is mainly used for programs that translate source code from a higher programming language (e.g. C++, Java...

Conceptual User Interface Design

What is the Conceptual User Interface Design? In a competitive market, it is particularly important to make the user interface of products as simple as possible so that it is easily understood by users. Hardly anyone is prepared to familiarise themselves with a cumbersome surface when there are products...

Connected TV

Connected TV(CTV) is simply a television that connects to the internet. Unlike traditional TV, CTV includes Smart TVs, Apple TVs, devices like Tivo and Roku, and gaming consoles like X-Boxes and PlayStations. One of the reasons CTV is so attractive to advertisers is that it already has incredible market...

Container Tag

What is a Container Tag? A container tag is a short JavaScript code that is used to add, delete or change tags (in English “keywords” (literally “labels”)) on a website in a centrally controlled manner. Container Tags are inserted into the source code of web pages. The code controls...

Contao

What is Conta Contao is an open source CMS that allows users to design and manage websites and blogs of any size. Meanwhile there are about 2,000 extensions available. It is based on the PHP programming language and uses MySQL as database. The CMS exists since 2006, the Contao-Association,...

Content caching

Websites can be optimized with different methods for a better user experience. One of these methods is the so-called content caching. What is content caching? Content caching is the process of caching the content of Web pages on different servers, called cache servers. This has the advantage that when...

Content curation

The content of a website is one of the most important ranking factors for Google. Content curation is a method that allows website operators to provide new content on their website at short intervals. What does content curation mean? Content curation is the process of finding, collecting and presenting...

Content Delivery Network (CDN)

For the user experience, the loading time of mobile websites in particular plays an important role. With the help of the Content Delivery Network, the loading time can be shortened considerably. What is the Content Delivery Network? The Content Delivery Network is a system of globally distributed servers called...

Content encoding

The speed at which a web page loads plays an important role in the user experience. Content encoding can significantly reduce the transfer time. What does Content Encoding mean? Content encoding is used to compress large HTML documents before they are sent to the user. For example, if a...

Content farming

Content farming is the provision of large amounts of mostly low-quality content on websites with the aim of attracting users and generating revenue through online advertising. Often news about , advice texts or instructions on everyday issues are published. Characteristic is a high degree of search engine optimization, which...

Content governance

Content governance describes, a set of policies that govern how an organization’s content is created and published. At the most basic level, it can help them avoid being sued or embarrassed, or both. However, when a content governance program realizes its true potential, it can revolutionize the content creation...

Content management system (CMS)

CMS are systems for creating and editing websites and other digital content. In a CMS, content and design are strictly separated. Therefore content can be edited without changing the design of the web pages. In a CMS the content is stored in a database. Frequently used content management systems:...

Content score

What is Content Score? Content Score is a key figure for the evaluation of texts. Google evaluates texts on the internet with the Content Score. Thus, the Content Score is used to evaluate the relevance and the weighting of texts on a website. The aim of the evaluation is...

Content syndication

News, interviews and radio broadcasts are usually published several times in different media. This procedure is widespread both offline and online and is known as content syndication What is content syndication? Content Syndication is the term used to describe the multiple publication of content – for example news, blog...

Contextual Inquiry

Contextual Inquiry is an interview method for gathering information about the context of use by first asking users a series of standard questions and then observing and interviewing them as they work in their own environment. The meaning Because users are interviewed in their own environment, the analysis data...

Continuous integration

Continuous Integration (CI) is a software development practice for regularly integrating code changes into a shared software project. Typically, this happens at least once or more a day (depending on the number of developers involved in the project), and this practice encourages small changes to be made more frequently...

Controllability

Controllability is an important property of a control system, and controllability plays a crucial role in many problems, such as stabilizing unstable systems through feedback. The concept roughly refers to the ability to move a system throughout its configuration space with only certain allowable manipulations. The exact definition varies...

Conversational commerce

Conversational commerce refers to any communication with the user or customer. This basically involves the use of natural language in real time as opposed to traditional written and formal communication. The conversation usually starts from the customer, who can contact the company using any device (web, app, mobile). Requirements...

Conversational search

The term Conversational Search describes a relatively new type of interaction between humans and computers. The basic idea of Conversational Search is that a user can speak a sentence into a device and that device can respond with a complete sentence. This principle is also applied to search queries:...

Conversion

Most websites are published with the aim that visitors take a certain action. Through the action a conversion of the visitor takes place, the so-called conversion. What does conversion mean? Conversion is the term used to describe the change in the visitor’s relationship with the website visited or the...

Conversion funnel

Not every visitor to a website becomes a customer. The conversion funnel shows where potential customers drop off in the sales process. What is a conversion funnel? A conversion funnel describes the E-commerce the individual phases that a potential customer goes through when he or she becomes a customer...

Conversion rate

The performance of a website can be measured and analyzed in online marketing using various key figures. Here, the conversion rate is one of the important key figures. What is a conversion rate? The conversion rate is a key performance indicator(KPI) used in online marketing. It is a ratio...

Cookie

What is a cookie? A cookie is a small data package that is exchanged between computer applications. The most common form is the HTTP cookie, which is used to recognize a user when they return to a website. So-called tracking cookies are used to record browser history. Function Authentication...

Cookie dropping

With cookie dropping, cookies are already set by affiliate networks when the user merely visits the page (view). Usually, an affiliate link or banner must be clicked to place the cookie. Cookie dropping is therefore referred to as a “black hat” technique (fraud method) in affiliate marketing. The cookie...

Cookie Matching

The collection and aggregation of users’ digital traces is called cookie matching. Users leave digital traces on the websites they visit. By merging these different user IDs, cookie matching achieves a more targeted approach. Each cookie has its own universe Websites distribute their cookies to visitors. Cookie matching is...

Cookie spreading

What is Cookie Spreading? At cookie spreading (spreading of cookies) fake cookies are deposited with visitors of websites. The fake cookie overwrites cookies from other affiliates. If the user actually buys from the shop registered in the cookie, the commission is not credited to the original affiliate, but to...

Copy approach

What is the Copy Approach approach? In order to bring a product closer to the customer, it is not enough to inform him objectively about its advantages. For successful product marketing, it is necessary to advertise the product in such a way that the customer has quick and emotional...

Copyscape

Copyscape is an online plagiarism checker from Indigo Stream Technologies for detecting duplicate text (“duplicate content”). Copyscape can be used to check the uniqueness of texts. To do this, the URL of the relevant web page is entered on the provider’s site. A listing shows where duplicate content exists....

Core update

A Core Update at Google is an update that does not clearly focus on a specific type of search query or specific site characteristics. Instead, they make more subtle changes to the algorithm. While other well-known Google updates such as Panda or Penguin specifically target features such as quality...

Corporate blog

What is a corporate blog? A corporate blog is a company blog that complements other online services such as the homepage and appearances in social networks. What kind of content can be used? A blog offers companies a wide range of options for designing content. One advantage compared to...

Cortana

If you use the Windows 10 operating system, you have certainly noticed the Cortana feature. The artificial intelligence (AI) can analyze and answer your search queries that you enter via keyboard or voice command. Cortana not only improves the user experience, but also the way you operate a Windows...

Cost per click

What does Cost per Click mean? CPC (also pay-per-click, PPC) is a model for internet advertising. The advertiser pays the publisher (usually a search engine, website owner or network) for clicks on the ad. Bid price Cost-per-click is often associated with advertising on search engines such as Google Ads...

Cost Per Mille (CPM)

What is Cost Per Mille (CPM)? Cost per Mille, also called Cost Per Thousand, is a marketing term used to refer to the price of 1,000 ad impressions on a website. If a website publisher charges 2.00 CPM, an advertiser must pay 2.00 for every 1,000 impressions of their...

Cost per Sale (CPS)

Cost per sale (CPS), or cost per order, is a model for charging commissions on online purchases. The model is used in online marketing to calculate all costs incurred during an order or lead generation. This includes costs for different advertising measures such as taking out a subscription or...

Cost per View (CPV)

What is Cost per View (CPV)? As Cost Per View (CPV). is the term used to describe a method of charging for video ads. The cost is based on the number of views or interactions with a video ad. Businesses that want to increase their visibility online can use...

Cost-per-click (CPC)

What is Cost per Click (CPC)? Cost-per-click (CPC) (also Pay-per-Click, PPC) is a model for internet advertising. The advertiser pays the publisher (usually a search engine, website owner or network) for clicks on the ad. Bid price Cost-per-click is often associated with advertising on search engines such as Google...

CPG (Cost per GRP)

What does Cost per GRP mean? CPG is a measure of cost effectiveness that allows companies to compare the cost of an ad or campaign plan with other ads. CPG (Cost per GRP) represents the gross reach of an ad or marketing campaign as a percentage within a target...

Crash reporting

What is Crash Reporting? CrashReporting informs the operator of a program about program crashes. If crash reporting does not exist for a software program, programmers cannot log why individual software crashes occur. This makes it very difficult to troubleshoot the problem because they do not know when the crash...

Crawl budget

Before a web page can appear in Google search engine results, it must be captured and indexed. Google allocates a specific crawl budget to each web page for this purpose. What is the crawl budget? The crawl budget refers to the time and resources invested by the Google search...

Credit scoring

What is credit scoring? Credit scoring refers to a statistical method used to assess the creditworthiness of consumers. A score value indicates the probability with which a customer will settle a debt. It is used by banks as an important basis for their lending decisions; in the case of...

Critical infrastructures (CRITIS)

The term Critical Infrastructures (KRITIS) refers to companies and facilities whose functionality is essential for the supply of the population. It also includes institutions that are of particular importance for public safety and order. These should be given special protection. For those responsible, however, there are also obligations arising,...

CRM

The more a company knows about its prospects and customers, the more targeted marketing measures can be carried out. CRM systems support marketers in building and maintaining customer relationships. What does CRM mean? CRM is an abbreviation for Customer Relationship Managementthe English term for customer relationship management. Customer Relationship...

Cronjob

The administration of servers, databases and the software environment includes regularly recurring tasks that can be executed automatically at certain times with a cronjob What’s a cronjob? Cron jobs are scheduled tasks that are executed by a software utility called Cron. Cron is a time-based Job Scheduler for Unix...

Cross Channel Analytics

What is Cross Channel Analytics? Cross channel analytics is a business analysis process in which multiple data sets from different channels or sources are linked or merged and then analyzed to provide customer and marketing information that the business can use. This can provide insight into which path the...

Cross Device Ad Targeting

What is Cross Device Ad Targeting? Cross device ad targeting allows businesses to target ads to consumers on multiple platforms or devices. In most cases, messaging and advertising should be sent to a specific audience across platforms so that businesses can reach their audience at times and places where...

Cross Device Programmatic Attribution

What is Cross Device Programmatic Attribution? Cross device program matic attribution is determining which events and touchpoints in a customer’s journey contributed the most to a conversion when they are distributed across multiple devices. What is the challenge with cross device Programmatic Attrib ution? Attributing purchase-influencing events and touchpoints...

Cross linking

What is Cross Linking? Cross Linking Refers to the process of linking between two websites. Whether they are owned by the same person or not, cross linking is the process on which the Internet is built. Users can link to websites whose content is similar to what they are...

Cross-Certificate

A cross-certificate enables the use of certificates across the boundaries of different public key infrastructures (PKI). Digital communication is secured by certificates issued in this way. What is a cross-certificate? A mutual trust relationship between two certification authorities requires that each certification authority issues a certificate to the other...

Cross-Cultural User Concepts

What is Cross-Cultural User Concepts? Cross-Cultural User Concept is an approach that takes into account the different cultural backgrounds of potential customers. Such cross-cultural concepts are playing an increasing role in many areas of business management, including international human resource management, in light of advancing globalization. Cross-Cultural User Concepts...

Cross-device tracking

What does cross-device tracking mean? Cross-device tracking refers to the creation of user profiles based on data from different devices used by a user. This makes it possible to identify individual users regardless of the device and applications they use and target them at the right time. Importance of...

Cross-Domain Tracking

What is Cross Domain Tracking? Cross Domain Tracking is a feature of Google Analytics that allows a visitor to be tracked as a continuous session on two or more websites. With this feature, a visitor can be tracked on www.beispielseite-a.de and on www.beispielseite-b.de in the same Google Analytics web...

Cross-Site Request Forgery (CSRF)

Internet users often do not notice that they have become the target of a cyber attack . Cross-site request forgery (CSRF) is an attack method that forces users to perform unwanted actions without their knowledge. What is Cross-Site Request Forgery (CSRF)? Cross-site request forgery (CSRF) refers to a criminal...

Cross-site scripting

Cross-site scripting (XSS) is a type of security attack in which an attacker inserts data, such as a malicious script, into content on otherwise trusted websites. These attacks occur when an untrusted source is allowed to inject its own code into a web application, and this malicious code is...

Crossmedia

What is crossmedia? The term crossmedia is often explained as something that involves the distribution of content (e.g. music, text, images, videos, etc.) across different media. Crossmedia is usually seen as an innovative use of traditional media. However, the term can be used in different ways; cross-media concepts are...

Crossposting

What is crossposting? Crossposting (multiple posting) is the simultaneous posting of an online contribution to different web forums, mailing lists or newsgroups. The goal of crossposting is to reach a larger number of readers. At the same time, the discussion of the post is spread across different venues or...

Crowd Eye Tracking

What is crowd eye tracking? Crowd-Eyetracking is the extension of eye-tracking, the recording of where a person looks, to a larger number of test persons. The registration of eye movements includes the analysis of three different eye movements. These are: Fixations Saccades Regressions Fixations are points on which the...

Crowdsourcing

What does crowdsourcing mean? Crowdsourcing means that a multitude of users provide their skills for a certain project. The purposes of crowdsourcing are different, the principle is identical: The swarm intelligence comes into play. For which cases is crowdsourcing suitable? This method is recommended when the participation of as...

Crowdtesting

What is crowdtesting? Crowdtesting is the testing of unpublished software by many users. Most of them are web-based programs like online games and apps. Some developers also use this method for offline software. In the first step, the programmers subject the programs to in-house testing. Crowdtesting can represent the...

CSMA/CA

What does CSMA/CA mean? The term CSMA/CA stands for Carrier Sense Multiple Access/Collision Avoidance. This is a procedure that enables the use of a physical network connection with several end devices. The data packets of a subscriber are sent in such a way that a collision with packets from...

CSS clip path

For an appealing web design, elements sometimes have to be cut in a certain way. With CSS clip path this is relatively easy to do. What is a CSS clip path? CSS clip path is a so-called CSS property that allows to show or hide certain areas of an...

CSS3

CSS3 (Cascading Style Sheets) is the latest version of a web standard that plays a major role in the design of websites. Style sheets are responsible for the visual design of a website – completely independent of the page structure, which is defined by the use of HTML (Hypertext...

Cubernets

What’s cubernet? Kubernetes is an extensible, portable open source platform that is primarily used to manage containerized services. By using this platform, both declarative configuration and the process of automation are simplified. Kubernetes (software) has a gigantic ecosystem and a huge user community. What can you do with it?...

Curated shopping

Some consumers like to get advice when shopping for a variety of reasons. Curated shopping fulfills this consumer desire when shopping online. What is Curated Shopping? Curated shopping is a relatively new trend in online shopping that was first observed in 2012. The aim of this form of online...

CURL

What does cURL mean? The name cURL is an abbreviation of the term “Client for URL”. It is a software for sending files between networked computers. The target computer is identified by the address in the network, the URL. What is special about cURL? The software is open source...

Custom fields

What are custom fields? Custom Fields are delimited areas that can be added to a website created with the WordPress CMS. These custom fields can be used to display additional content on a WordPress website. It is also possible to individualize and automate the page using the additional fields....

Customer centricity

Customer Centricity describes creating a positive consumer experience from the point of sale through the actual sales process to after the sale. A customer-centric approach can elevate a business by allowing it to stand out from competitors that don’t offer the same experience. Customer-centricity is nothing new, but it...

Customer life cycle

The Customer Life Cycle describes the different phases of the customer relationship with the company. The term originates from Customer Relationship Management (CRM), alternative terms are the customer loyalty circle and the customer life cycle. What goals does Customer Life Cycle Management define? The goal of marketing is to...

Customer lifetime value

In marketing, customer lifetime value (CLV) is a metric that represents a company’s total net profit from a particular customer. CLV is an important metric for determining how much financial resources a company is willing to spend to acquire new customers and how much repeat business is expected from...

Customer satisfaction score

The Customer Satisfaction Score (CSAT) describes a basic measurement of customer satisfaction with a brand’s products and/or services. CSAT allows marketers and brands to measure the level of customer satisfaction at key interaction times, such as the time of purchase, the Onboarding process, or the exchange of support tickets....

Cyber activists

What are cyber activists? Cyber activists pursue political goals and use the Internet as a platform for protest. For example, they stand up for environmental protection, criticize authoritarian regimes or fight right-wing extremist tendencies. The protest forms range from the dissemination of information to cyber attacks. What categories can...

Cyber criminals

What are cyber criminals? Cyber criminals are defined as persons who commit crimes such as fraud using the Internet or other data networks. A common means is identity theft. Internet crime: what types are there? In principle, cybercrime covers a wide range of offences. The greatest importance is attached...

Cyber defence

What is cyber defence A powerful and comprehensive cyber defence is designed to prevent cyber attacks from causing economic, political or military damage. Preventive measures ensure that there are no points of attack. In the event of an attack, early detection and appropriate countermeasures are essential. What methods are...

Cyber Security

What does cyber security mean? The topic of cyber-security deals with measures that can be used to protect the entire information and communication technology, including the Internet and other networks, against threats. Potential risks emanate from cyber criminals, cyber terrorists and spies. What are the risks? The increasing digitalisation...

Cyber Space

What is cyberspace? The term cyberspace refers to worlds of experience, communication and work generated by computers. More commonly, the term cyberspace is used. In practice, it is used in different ways; a narrow and a broad definition can be distinguished: narrow sense: cyber space is a three-dimensional, artificially...

Cyber terrorists

Cyberterrorists are terrorists who attack computer systems in different ways. Unlike cyber criminals with financial interests, they pursue political goals. As a rule, they work for the purpose of terrorist organisations, which also carry out actions such as attacks outside the Internet. Possible attack strategies of cyber-terrorists Cyber-terrorism in...

Cyberspace

What does cyberspace mean? Cyberspace refers to a virtual space for work, leisure and communication based on networked digital technology. The word first appeared in a short story by science fiction author William Gibson in 1982. The description of the concept goes back further to Stanislav Lem’s 1964 book...

Cybersquatting

What does cybersquatting mean? In cybersquatting, users register domains that contain a brand name (brandjacking) or personal name (namejacking). The cybersquatters have no own reference to this name. Instead, they offer the domains to these persons or holders of rights to trademarks at usually high prices. They speculate that...

Cyclic Redundancy Check (CRC)

Cyclic Redundancy Check (CRC) is a technique for detecting errors in digital data. CRC is a hash function that detects accidental changes to raw computer data commonly used in digital telecommunications networks and storage devices such as hard disk drives. A Cyclic Redundancy Check (CRC) can be implemented without...