Browse Definitions :

Contact Us

Send us your comments

WhatIs.com welcomes your feedback. Our goal is to create the best Computer Dictionary-specific site on the web. One way we can do that is by listening to your feedback. We will try to address all feedback on a case-by-case basis. Please be patient.

Thank you for your interest in WhatIs.com.

Thank you for your feedback.

* Indicates field is required

Incorrect please try again

Write

WhatIs.com

c/o TechTarget

275 Grove Street

Newton, MA 02466

Phone: (617) 431-9200

Fax: (617) 431-9201

SearchNetworking
SearchSecurity
  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • parameter tampering

    Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's ...

  • SYN flood attack

    A SYN flood attack is a type of denial-of-service (DoS) attack on a computer server.

SearchCIO
  • Lean Six Sigma

    Lean Six Sigma is a data-driven approach to improving efficiency, customer satisfaction and profits.

  • change management

    Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes...

  • business transformation

    Business transformation is a term used to describe what happens when a company makes fundamental changes to how it operates.

SearchHRSoftware
SearchCustomerExperience
  • clickstream data (clickstream analytics)

    Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...

  • neuromarketing

    Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by scientifically ...

  • contextual marketing

    Contextual marketing is an online marketing strategy model in which people are served with targeted advertising based on their ...

Close