Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
87 Cards in this Set
- Front
- Back
Social Graph |
ability to collect, express, and leverage the connections between the site’s users, or as some describe it, “the global mapping of everyone and how they’re related.” |
|
Network effects |
the value of a product or service increases as the number of users grows. |
|
Switching Costs |
The cost a consumer incurs in moving from one product to another |
|
Dark Web |
Internet content that can't be indexed by Google and other search engines |
|
APIs |
Application programming interfaces- guidelines published by firms that tell other programs how to get a service to perform a task |
|
Free Rider problem |
When others take advantage of a user or service without providing any sort of reciprocal benefit |
|
Walled Garden |
closed network or single set of services controlled by one dominant firm |
|
Content Adjacency |
concern that an advertisement will run rear offensive material, embarrassing an advertiser |
|
Cloud |
collection of resources available for access over the internet |
|
OSS |
Software that is free and whose code can be accessed and potentially modified by anyone |
|
Impressions |
each time an ad is served to a user for viewing |
|
CPM |
cost per thousand impressions
|
|
Engagement & Banner ads |
promotion technique popular with social media that attempts to get consumers to interact with an ad |
|
Crowdsourcing |
the act of taking a job traditionally performed by a designated agent and outsourcing it to an undefined generally large group of people |
|
Localization |
adapting products and services for different languages and regional differences |
|
Affiliate programs |
performance-based marketing in which a business rewards one or more affiliates for each visitor or customer brought by the affiliate's own marketing efforts. |
|
Hardware Software Layer cake |
user application operating system hardware |
|
UI |
user interface- mechanism through which users interact with a computing device |
|
Embedded systems |
special-purpose software designed and included inside physical products -smarter -diagnose problems -provide alerts |
|
Platform Independence |
Products and services that allow for the development and integration of software and complementary goods |
|
Desktop software |
Applications installed on a personal computer, typically supporting tasks performed by a single user. |
|
ERP |
Enterprise resource planning- software package that integrates the many functions of a business
|
|
CRM |
Customer relationship management- systems used to support customer-related sales and marketing activities |
|
SCM |
Supply chain management- systems that can help a firm manage aspects of its value chain, from flow of raw materials into the firm, through delivery of finished products and services |
|
BI |
Business Intelligence- use data created by other systems to provide reporting and analysis for organizational decision making
|
|
DBMS |
or database software; software for creating, maintaining, and manipulating data |
|
Distributed computing |
a form of computing where systems in different locations communicate and collaborate to complete a task |
|
server and client |
-software program that makes request of a server program -program that fulfills the requests of a client |
|
Application server |
Software that houses and serves business logic for use by multiple applications |
|
Data Sharing Formats |
EDI- electronic data interchange XML- extensible markup language |
|
Scripting Languages- VB and JAVA |
executes within an application VB- Microsoft JAVA- designed for true platform independence for application developers |
|
Cloud computing |
replacing computing resources with services provided over the internet |
|
SaaS benefits/risks |
form of cloud computing where a firm subscribes to a third-party software and receives a service that is delivered online |
|
Service oriented architecture |
robust set of Web services built around an organizations processes and procedures |
|
Virtualization |
type of software that allows a single computer to function as if it were several computers, each running its own operating system and software. |
|
Why is OSS preferred? |
open source software- preferred because free, reliable, secure, scalable, agility and time to market |
|
Private clouds |
pools of computing resources that reside inside an organization and that can be served up for specific tasks as need arrives |
|
PaaS & IaaS |
Platform as a service- cloud providers provide hardware, operating system, tools, and hosting Infrastructure as a service- cloud providers offer services that include running the remote hardware and networking |
|
Black swans |
Unpredicted, but highly impactful events. Scalable computing resources can help a firm deal with spiking impact from such events |
|
Server farm |
massive network of computer servers running software to coordinate their collective use, provide backbone for SaaS |
|
Analytics |
term describing the extensive use of data, statistical and quantitative analysis, explanatory and predictive models, and fact-based management to drive decisions and actions |
|
Difference between data/information/knowledge |
data- raw facts and figures information- data presented in a context so that it can answer a question or support decision making knowledge- insight derived from experience and expertise |
|
Database |
A single table or collections of related tables |
|
SQL |
Structured query language- language used to create and manipulate databases |
|
DB administrator |
Job title focused on directing, performing, or overseeing activities associated with a database or set of databases |
|
Legacy systems |
older information systems that are often incompatible with other systems, technologies, and ways of conducting business |
|
Data warehouse |
set of databases designed to support decision making in an organization |
|
Data mart |
database or databases focused on addressing the concerns of a specific problem or business unit |
|
Data mining |
process of using computers to identify hidden patterns in, and to build models from, large data sets |
|
Opt-in and Opt-out |
consumers are usually given benefits to opt-in to companies tracking their data such as where they use their card |
|
ISP |
Internet service provider- organization or firm that provides access to the Internet |
|
URL |
Uniform resource locator- or web address, identify resources on the Internet along with the application protocol need to retrieve it |
|
HTTP |
Hypertext transfer protocol- allows web browsers and web serves to communicate with each other |
|
FTP |
File transfer protocol- used to copy files from one computer to another |
|
IP address |
value used to identify a device that is connected to the internet |
|
Load balancing |
distributing a computing or networking workload across multiple systems to avoid congestion and slow performance |
|
Fault tolerance |
ability of a system to continue operation even if a component fails.
|
|
Cybersquatting |
acquiring the domain name that refers to a firm, individual, product, or trademark with the goal of exploiting it for financial gain |
|
HTML |
Hypertext markup language- language used to compose web pages |
|
Cache |
temporary storage space used to speed computing tasks |
|
TCP/IP |
Transmission control protocol- works at both ends of most internet communication to ensure a perfect copy of message Internet protocol- routing protocol that is in charge of forwarding packets on the internet |
|
Wi-Fi, LTE, WiMAX |
Wireless fidelity- term used to brand wireless local-area networking devices LTE- long term evolution global winner WiMAX- worldwide interoperability for microwave access |
|
WEP & WAP |
Wired Equivalent privacy- intention to provide data confidentiality comparable to traditional wired network Wireless application protocol- technical standard for accessing information over a mobile wireless network |
|
CDMA and GSM |
Code division multiple access- allows users full access to the entire spectrum of bands Global System for mobile communication- assigns time slots to multiple conversation streams |
|
Virus |
programs that infect other software or files |
|
Worms |
programs that take advantage of security vulnerability to automatically spread but unlike viruses worms do not require executable |
|
Trojans |
exploits that try to sneak in by masquerading as something they are not |
|
Hacker/hacktivist |
-someone who breaks into computer systems -protester seeking to make a political point by leveraging technology tools, often defacement or damage |
|
Phishing |
a con executed using technology, typically targeted at acquiring sensitive information |
|
Biometrics |
technologies that measure and analyze human body characteristics for identification or authentication |
|
Malware: botnets, adware, spyware |
-hordes of surreptitiously infiltrated computer, linked and controlled remotely, also known as zombie networks -programs installed without full user consent or knowledge -software that monitors user actions, network traffic, or scans for files |
|
dumpster diving and shoulder surfing |
-combing through trash to identify valuable assets -gaining compromising information through observation |
|
Encryption |
scrambling data using a code or formula |
|
firewall |
system that acts as a control for network traffic, blocking unauthorized traffic while permitting acceptable use |
|
cipher |
code used in encryption |
|
patches |
software updates that plug existing holes |
|
Query |
a search |
|
PageRank |
algorithm developed by Google cofounder Larry Page to rank Web sites |
|
SEO |
search engine optimization- process of improving a page's organic search results |
|
SEM |
search engine marketing- practice of designing, running and optimizing search engine ad campaigns |
|
PPC |
pay-per-click |
|
CPC |
cost-per-click
|
|
CTR |
click-through rate- the number of times an ad is clicked on divided by the number of time the ad is delivered |
|
CPM |
cost per thousand views |
|
Link fraud & click fraud |
-process of creating a series of bogus web sites, all linking back to the pages one is trying to promote |
|
Spiders/web crawlers |
software that traverses available Web links in an attempt to perform a given task |
|
Geotargetting |
identifying a user's physical location for the purpose of delivering tailored ads or other content |