Simulated Transactions
- See Virtual Transactions. |
SLA - Service Level
Agreement; an agreement between the service provider and
its customer outlining specific service requirement and
quality of service goals. Fines and other punitive measures
may be required of the service provider if it fails to
mean those objectives. |
SLM - Service Level
Management; the management of a service providers resources
and operation designed to ensure compliance with SLAs
and the optimal quality of services delivered. |
SNMP - Simple Network
Management Protocol; a set of protocols designed communicate
immediate problems on complex networks via traps. |
State - All the information
about a process, application, a device, or other element;
the information that is needed to start and stop its operation. |
Static Content - Pages
contain standard information and look the same to everyone
that views them. |
Swapping - a technique
for replacing pages or data in
memory that enables a computer to more easily process
large data files. |
Switching Delay - The
amount of time it takes a switch to process a packet.
Switching delays are often caused by queuing delays. |
Synthetic Transactions -
See Virtual Transactions. |
TCP - Transmission Control
Protocol; the method used between two communicating systems
to ensure correct sequences, reliable delivery and to
control the rate of traffic flow between them. |
Thrashing - A loss of
efficiency caused by switching tasks too frequently. For
example, if a server has limited memory it may waste considerable
time constantly swapping processes in and out. |
Threshold - A value
that defines an area of acceptable and unacceptable behavior.
When a threshold is crossed, there is an alarm forwarded
to alert the management team. |
Throughput - Another
capacity metrics, usually expressed as bandwidth, or transactions
per second. |
ToS - Type of Service;
an IP datagram field that defines the service each packet
receives; it has had only limited usage and is being replaced
by DiffServ. |
Transactions - An interchange
between a user and a
service. It may be a simple exchange of packets to retrieve
a message, or a complex interaction to order a product. |
Transaction Rate - A
measure of the transaction
volume handled by a set of servers. |
Trap - A message from
an agent indicating a situation that requires immediate
attention. |
Trusted Relationship -
A secured relationship with
strong authentication that allows both parties to identify
their partners and exchange information based upon a
specified level of trust. |
Tunneling - The foundation
for Virtual Private
Networks, they are basic TCP/IP connections that carry
encrypted information through the public Internet.
Information is secured through various encryption
procedures so that intercepted traffic is protected from
access or modification. |
UDP - User Datagram
Protocol; a connectionless, or "no state," protocol
that operates over an IP network. |
permission marketing -
Many mass marketing
techniques use a variety of attention-getting techniques.
This generally consitutes an intrusive approach that distracts
readers from other activities in order to get them to
view advertisements. While many mass marketing campaigns
are targeted to audiences that may have an interest in
the product, a more efficient approach is to use Permission
Marketing to engage in a long-term series of mutually-beneficial
personalized interactions in which prospects learn about
a company and its products. With Permission Marketing,
information is provided within the context of each
individual's interests, thus eliminating the wasted effort
of trying to gain their attention. In addition, Permission
Marketing takes advantage of each person's information
gathering process as they look for products and services
in which they have a genuine interest. |
Profile - Data about
a person's activity on a Web site
comes from the server's log. It's also possible to collect
profile data about a person's activities across multiple
Web sites. Many advertisements displayed on Web pages
are served by a central ad server that is used by many
different sites. Each time the central ad server inserts
an ad into a page it is also reading a unique identification
code on the user's computer (a "cookie"). By
storing information about the viewing habits of a particular
user, it's possible to determine what products that Many
of the automated marketing techniques used today relay
on databases to store
information about individuals. Whether it's a simple mailing
list or a complex personalization system, profile data
is stored, updated, and used throughout marketing and
customer service operations. A variety of information
is collected when people visit a Web site. However, much
of the traditional traffic data stored in log files provides
only a high-level overview of the site's audience. When
individuals are uniquely identified, the value of the
data collected increases tremendously. When demographic
and lifestyle interest profile data is combined with Web
site traffic data, a wide variety of questions can be
answered about an audience - and individuals within the
audience. For instance, when the raw data is available,
it's possible to determine how many women in California
who play golf viewed a particular Web page. In general,
two types of profile data are collected about Web visitors:
answers to
questions explicitly provided by individuals, and
observations implicit in an individual's Web activity.
Answers to questions are gathered using forms of all types,
from simple newsletter subscription forms to shopping
cart data about product purchases. Most Web personalization
systems can store profile data collected over a number
of pages, and over several sessions on the Web site. Data
about a person's activity on a Web site comes from the
server's log. It's also possible to collect profile data
about a
person's activities across multiple Web sites. Many
advertisements displayed on Web pages are served by a
central ad server that is used by many different sites.
Each time the central ad server inserts an ad into a page
it is also reading a unique identification code on the
user's computer (a "cookie"). By storing information
about the viewing habits of a particular user, it's possible
to determine what products that person may be interested
in, which allows the central ad server to select ads that
person is more likely to respond to. |
|
|
URL - Uniform
Resource Locator; the address used to
access sites and resources located on the Web. The URL
indicates both the protocol (such as "http"
or "www") to use and the IP address or domain
name or the resource (such as "concord.com.") |
Virtual Transactions -
Activities that simulate actual
application flows and transactions within the e-business
environment. Since the transaction is repeated consistently
it is useful for generating baselines and planning information.
Response time variations can be an early warning signal
of potential problems. |
VoIP - Voice over Internet
Protocol; a developing
standard for transmitting voice communications over data
networks. |
WAN - Wide Area Network;
a system of LANs connected over any distance, typically
via telephone lines. |
Web Hoster - A Service
Provider that manages and
monitors a customer's Web server and possibly back-end
database and applications servers. |
XML - eXtensible Markup
Language; an emerging
specification for formatting Web documents and pages.
XML enables standardized transmission and interpretation
of data between various applications and organizations |
relationship marketing -
Companies generally strive to develop ongoing relationships
with customers in order to encourage repeat business.
The activities that marketing management uses to increase
loyalty or affinity toward the company fall into the broad
category of relationship marketing. Traditional marketing
research is frequently used to identify segments within
the overall market where mass marketing can be refined
by using different marketing messages for each market
segment. |
one-to-one marketing -
After a company has
maximized marketing results through mass marketing and
market segmentation, it becomes clear that further
improvements will require some of the techniques used
by the company's best salespeople who develop relationships
with individual people. These relationships allow the
company to learn the needs and interests of individuals,
however the high cost of maintaining a sales force makes
it desirable to automate these one-to-one relationships.
There are many techniques companies can use to communicate
one-to-one with individual customers, such as through
telephone call centers and individual letters, however
the most efficient medium is the Internet. |
Personalization - By
using Web and e-mail
personalization to tailor each page seen by customers,
marketers can now achieve the benefits of using individual
salespeople but with the cost of traditional mass marketing.
Today's personalization products can learn a great deal
about the interests and needs of each individual by asking
questions and observing behavior. Personalization can
help form lasting relationships with customers by providing
individualized content, information, and services. |
Customization - As a
Web marketer begins to move from static, non-changing
Web pages to database-driven dynamic pages that are created
"on the fly," features are frequently added
to allow Web visitors to select how certain pages are
displayed. Examples of this technique include MyYahoo,
MyExcite, etc. While this is sometimes called personalization,
it is actually "customization" because the user
is in control of
the content, not the content creator at the Web site.
It's
sometimes difficult to tell when a site is customized
and when it's personalized. What makes this differentiation
difficult is that a customized site can provide personalized
content.When you add Amazon.com to your MyPortal stock
portfolio you know you'll see that stock (customization),
but you don't know what today's price will be (personalization).
As additional features are added to that provide new or
unexpected content - as opposed to a site using customization
to allow the user to control content - the site moves
more toward true one-to-one personalization. |
customer relationship management
- Customer
Relationship Management ideally brings together all
information about each customer into a central repository
to help serve individual customers and understand larger
trends in the market. CRM software applications integrate
every area of a company's operations that touches the
customer, such as
marketing, sales and customer service. In addition, all
of the customer "touch points" use this common
database, allowing Internet, call center, direct mail,
and other interactions to share information through a
central repository. |
|
|
|
|
|