301 Redirect
Permanent redirection of an old URL to a new one. Essential for retaining SEO rankings during a migration.
Over 194 technical terms from IT, AI, SEO & E-Commerce – directly linked to our expert articles.
194 terms displayed
Permanent redirection of an old URL to a new one. Essential for retaining SEO rankings during a migration.
A mobile network based entirely on 5G technology (even in the core network) and no longer based on 4G infrastructure. Enables Network Slicing and extremely low latencies.
A scientifically grounded marketing method where a target audience is presented with two or more slightly divergent variations of a specific element (e.g., an ad text, a landing page structure, a video). These variations are shown in a strictly randomized fashion to determine with hard statistical significance which variation best fulfills the business objective.
An advanced, sustained attack in which an unauthorized user gains access to a network and stays there undetected for a prolonged period. The goal is usually data theft rather than immediate destruction. AI tools help APTs blend in better.
A technique where attackers attempt to fool machine learning models by providing manipulated input data. This is an attempt to confuse the AI's "senses."
Autonomous systems that pursue goals and use tools.
A commerce model in which autonomous AI agents (bots) search for, compare, and buy products on behalf of consumers.
A process in which AI agents autonomously make decisions and use tools (APIs, browsers, scripts) to achieve a predefined goal.
The use of AI to mathematically calculate the contribution of various marketing channels to a purchase.
A photorealistic, digitally generated presenter who speaks based on a text or audio input. Modern avatars (HeyGen, Synthesia) are deceptively real and perfectly lip-synced.
AI-generated summaries displayed directly at the top of search results, providing direct answers to queries.
Programming interface that allows different software systems to communicate and exchange data with each other.
The standardized connection through which n8n talks to other programs like Slack, CRM, or ERP.
Technical interface that allows different software systems to exchange data and communicate with each other.
A design principle where APIs are defined as the primary interface between systems before frontends or other consumers are developed. Enables maximum flexibility and scalability.
Software for applicant management that digitally maps the recruiting process from job posting to hiring.
Grouping multiple state updates into a single re-render to save performance. Now active everywhere.
The ability of an automated voice system to recognize when the human speaker interrupts it, to immediately pause and listen.
The use of data analysis to recognize patterns in the behavior of users or entities. Deviations from the norm often indicate security incidents. This is the core of many modern AI security solutions.
A network of private computers infected with malware and controlled remotely by criminals without the owners' knowledge. Botnets are often used for DDoS attacks or sending spam.
A management process designed to ensure that business processes can be continued even in crisis situations.
Monthly evaluation of financial data showing the entrepreneur the earnings position and liquidity.
HTML tag (rel="canonical") that tells Google which version of a page to treat as the "original" – essential in pSEO to prevent duplicate content conflicts.
Capital Expenditures for fixed assets like server hardware vs. Operational Expenditures for running costs like cloud subscriptions.
The amount of greenhouse gas emissions caused by a website or IT infrastructure.
Automated processes that ensure code changes are immediately tested and loaded onto the server.
A model aimed at sharing, leasing, reusing, repairing, refurbishing, and recycling products and materials for as long as possible.
The senior executive in a company responsible for information security. They bear the strategic responsibility for protecting corporate data.
The new metric for success in Answer Engines: The percentage of mentions as a source in AI-generated answers.
The provision of IT infrastructure and software over the internet, enabling high flexibility and scalability without owning hardware.
Software like WordPress that allows content to be created and managed on a website without programming knowledge.
Collaborative robots that work directly with humans without safety cages.
"Server Housing". A company rents space (racks) in a professional data center for its own hardware, but uses the operator's power, cooling, and security.
A subfield of AI that enables computers to understand visual information from the world (images, videos).
React's ability to prepare multiple versions of the UI simultaneously and interrupt rendering processes to maintain responsiveness.
A mandatory feature enforced by Google in the EU interface since early 2024 that has gained massive significance. It facilitates the dynamic adaptation of the behavior of various tracking tags exactly according to the consent preferences expressed by users in your cookie banner, notably without sacrificing the AI's ability to logically model conversions.
Percentage of visitors/contacts who perform a desired action (e.g., purchase, registration, download).
A set of three metrics (LCP, INP, CLS) with which Google measures and evaluates the user experience of a website.
The cost incurred to acquire a new customer or lead. This is often the most critical metric for service providers and lead-gen businesses.
Customer Relationship Management. Software for managing all customer interactions and data in a central location.
System for managing customer relationships that centrally stores all interactions and data.
Corporate Sustainability Reporting Directive – an EU directive requiring companies to report on their sustainability performance.
The sum of all touchpoints a customer has with your company – from the first contact to purchase and beyond.
A small, often automated warehouse in inner cities used exclusively for the fast delivery of online orders (Quick Commerce), not for public foot traffic.
The ability of a natural or legal person to retain full control over their own data. Also: The concept that data is subject to the laws and regulations of the country in which it is stored.
The standard software provider for tax consultants in Germany. A "DATEV interface" is essential for collaboration.
An attack that overwhelms a server or network with a flood of requests so it is no longer accessible to legitimate users. AI can help to intelligently manage or repel these attacks.
A specific ML process based on artificial neural networks, particularly good for complex pattern recognition.
Synthetic media generated using artificial intelligence, where one person in an existing image or video is replaced with the likeness of another person. Often used in security for fraud (CEO fraud).
AI-based technology to identify manipulated or fully generated videos. Deployed by platforms and authorities to prevent misuse and maintain content integrity.
Automated process to bring changes to the code to the live server. With static pages often manual (FTP), with modern setups (CI/CD) fully automated and error-checked.
A digital dataset that stores all sustainability-relevant information of a product across its entire lifecycle, accessible to customers (e.g., via QR code).
No, the notification duty in the EU database applies primarily to high-risk systems and GPAI models with systemic risks.
Yes, as soon as an AI service is offered or used in the EU, it must be compliant, regardless of the developer's headquarters.
Email series sent automatically over a defined period of time to gradually lead prospects to a purchase.
Experience, Expertise, Authoritativeness, Trustworthiness. A Google evaluation concept for content quality.
Decentralized data processing at the edge of the network, close to the data source (e.g., IoT sensor). Drastically reduces latency times and relieves the central cloud. Essential for autonomous driving and Industry 4.0.
Security technology that monitors endpoint devices (computers, smartphones) to detect and respond to cyber threats. EDR goes beyond pure antivirus software.
A content structuring method where concepts are organized not by search terms, but by “things” (entities, e.g., “Web Security”), which drastically simplifies machine understanding by AIs.
The prominence and uniqueness of an entity (person, place, brand) within a text, making it easier for AI models to correctly attribute facts.
Sectors with high criticality (e.g., energy, health) that are subject to stricter controls.
A piece of software, a chunk of data, or a sequence of commands that takes advantage of a security vulnerability (bug) in an application or system to force unintended behavior.
Data that a company collects directly from its customers or users.
Frontend is what the user sees (design, interaction). Backend is the logic in the background (databases, servers).
The most powerful AI models on the market (such as GPT-5.4 or Claude 4.6) that are at the boundary of current technical performance.
A developer who masters both the frontend and the backend and can thus build the entire web application.
AI models trained to generate new content such as text, images, or code (e.g., LLMs).
The practice of optimizing content specifically for AI-powered search engines and LLMs to be cited as the primary, trustworthy source in generated answers (AI Overviews, chatbots).
Optimization of content specifically for AI-driven search engines so they are cited as sources in generated answers.
A Next.js function that defines all dynamic routes at build time and generates static HTML pages from them – the heart of many pSEO implementations.
German principles for the proper keeping and storage of books, records, and documents in electronic form, as well as for data access.
The modern block editor from WordPress, introduced in 2018, which allows the creation of complex layouts without code.
A phenomenon where an AI invents facts that sound plausible but are incorrect. RAG is the most effective antidote.
The central search topic in the pSEO formula (e.g., "tax advisor"), which is combined with a modifier to generate the page matrix.
An architectural approach where the backend (data management) is separated from the frontend (presentation). Enables highest security and the serving of multiple channels (Web, App, IoT) from one source.
A Content Management System that only manages the content (backend) and provides it via an API without a fixed design.
An e-commerce architecture where the frontend (presentation) is separated from the backend (logic). Enables maximum flexibility for various output channels.
H1, subtitle, and clear call-to-action in the directly visible area.
A decoy system intentionally configured insecurely to attract attackers. The goal is to study their methods and distract them from the real network.
Through statistical testing methods that measure whether certain groups (e.g., by age, gender, or origin) are disadvantaged by the system.
The seamless transfer process from a bot to a real human support employee during an ongoing conversation.
A safety concept where humans validate critical agent decisions.
A hybrid form of Private Cloud (or On-Premise) and Public Cloud, allowing data exchange and app portability between both.
The process by which a static HTML page in the user's browser is made "alive" and interactive by JavaScript.
Renting virtual hardware (servers, storage) on which you install your own operating systems and applications. Example: AWS EC2.
Sectors such as mechanical engineering, food, or digital services that are also NIS2-obligated.
The additional utility a piece of content offers compared to already existing content on the web.
Devices or software applications that monitor a network or systems for malicious activity (IDS) and, if necessary, actively block them (IPS).
Yes, through programs like "Digital Europe," the EU provides funds for the implementation of trustworthy AI.
Merging information technology (ERP, Cloud) with operational technology (machinery, sensors).
The data format in which information flows between nodes in n8n. Compact and machine-readable.
JavaScript Object Notation for Linked Data. The preferred format for structured data to provide context to search engines and LLMs.
Google's knowledge base that stores entities (people, places, companies) and their relationships to one another.
Performance indicators used to measure the success of measures or the development of the company (e.g., Customer Acquisition Cost).
The technological basis of WordPress: Linux (operating system), Apache (web server), MySQL (database), PHP (programming language).
The delay time in data transmission. For real-time applications (e.g., machine control), low latency (on-premise or edge) is crucial.
A Google Core Web Vital that measures how fast the main element of the page is loaded. Critical for SEO.
Systematic process of guiding prospects to a purchase decision through relevant content and communication.
Automated evaluation of contacts based on behavior and characteristics. Higher score = more ready-to-buy lead.
"Old burdens". Program code that is outdated, often no longer documented, and difficult to maintain or expand.
Outdated software or hardware that is still in use but is difficult to maintain, poorly documented, and often incompatible with modern technology. A high security risk.
The precise alignment of mouth movements with spoken audio. In AI avatars, realized by neural networks – enabling convincingly natural presenters in real time.
Large Language Model - The technological basis for natural language understanding.
An AI model trained on massive amounts of text to generate context-aware, human-like responses.
The installation and operation of AI models on your own servers or in private clouds to ensure maximum data sovereignty.
An audience created by Meta based on your existing customer data. The algorithm searches for profiles that exhibit behaviors and interests extremely similar (look-alike) to your best customers.
Development with minimal manual coding effort, mostly through visual editors.
A subset of AI where algorithms learn from data without being explicitly programmed.
A subfield of AI where algorithms learn from data to recognize patterns and make decisions.
A portmanteau for "malicious software". This includes viruses, worms, trojans, ransomware, spyware, and adware.
Software-supported method to automate and personalize marketing processes (e.g., email campaigns, lead scoring).
The varying dimension in the pSEO formula, e.g., city names, product categories, or industries, combined with the head term.
Coordinated marketing activities across multiple channels (Email, Social, Web, Ads) for a consistent customer experience.
A security process in which users must provide two or more different factors for identification.
The ability of computers to understand and process human language.
EU directive to strengthen cybersecurity. Extends obligations (risk management, reporting) to significantly more sectors and introduces personal liability for executives.
The "Network and Information Security Directive 2" is an EU law to strengthen cybersecurity in critical sectors.
Technology that enables machines to understand and process human language (written or spoken).
A single functional building block in n8n that takes over a specific task.
Technology for automatic text recognition in images/scans. Turns a "dumb" image into searchable text and extracts data like invoice numbers.
The structured process of hiring and training new employees to integrate them socially and professionally as quickly as possible.
Software whose source code is publicly accessible and can be viewed, modified, and used by third parties. Usually free of charge and royalty-free.
A technique where only specific parts of a web page are made interactive with JavaScript, instead of loading the entire page.
The most modern Google Ads campaign type, leveraging AI to serve ads across all Google networks (Search, Display, YouTube, Maps) from a single campaign.
The attempt to obtain personal data from an internet user via fake websites, emails, or short messages. Spear phishing is the targeted variant against specific individuals.
An artificial word combining "Physical" and "Digital". Describes the seamless blending of online shopping and the brick-and-mortar shopping experience.
AI that interacts with and learns from the physical world.
A software module that is "plugged" into an existing program (in this case WordPress) to expand its functionality without changing the core code.
The use of data and algorithms to predict the probability of future outcomes based on historical data.
Foresighted maintenance based on real-time data analysis.
A method for the automated creation of SEO pages from structured datasets and templates, enabling hundreds to thousands of pages to be created at scale.
A web application that offers native app-like features (offline operation, push notifications, home screen installation) via modern web APIs, without requiring an app store.
The art and science of structuring input commands so that the AI delivers precise, correct, and useful results.
Key figure for the energy efficiency of a data center. The closer the value is to 1.0, the more efficiently the DC operates. A value of 1.2 is the new target standard for Green IT.
A business model where robots are rented rather than purchased, often including maintenance and software.
Subscription model for robot hardware including maintenance and software updates.
Retrieval Augmented Generation - Technique enabling AI to access proprietary company knowledge.
A technique where the LLM is enriched with external, specific knowledge bases to make hallucination-free, precise statements.
Malicious software that blocks access to a computer system or its data or encrypts it, demanding a ransom from the victim for the release.
The AI's ability to draw logical conclusions and solve problems.
An interface that allows different software systems to communicate with each other. In WordPress, it enables the exchange of data with external applications.
A marketing strategy wherein warm contacts — specifically users who have previously engaged with a brand's digital presence (e.g., visited a website, viewed a video on social media) — are intelligently segmented and re-engaged with personalized, behavior-based ads. This is the ultimate key to achieving conversion rates well exceeding the 10% benchmark.
An AI architecture where the base AI model (LLM) is “fed” with information from external databases (like the live internet) before generating an answer for the user. This is the process behind all modern AI search engines.
Enhanced search results that display additional information such as stars, images, or prices directly in the Google results.
The ratio between advertising spend and the resulting revenue. A ROAS of 400% means that for every 1€ of ad spend, you generate 4€ in revenue.
Key figure to measure profitability. Ratio between profit/benefit and the investment costs.
Business metrics where ROAS (Return On Ad Spend) highlights the direct ratio between the immediate revenue born of an ad campaign and the pure advertising costs. ROI is fundamentally broader, additionally accounting for all other agency fees and production costs, making it the most reliable overarching metric for C-Level decision-making.
Software robots that take over rule-based, repetitive tasks in user interfaces.
Software is provided and used over the internet instead of being installed locally. Example: Microsoft 365, Salesforce.
A system's ability to grow with increasing demands (more users, more data) without losing performance.
The ability of a company to significantly increase sales without costs (especially personnel & administration) growing to the same extent.
The advanced use of Schema.org (JSON-LD) to create deep, interconnected Knowledge Graphs on websites. Directly links authority, content context, and entities, so autonomous AI agents can read, interpret, and use data flawlessly.
A central unit in a company responsible for all security issues at organizational and technical levels. All threads and alarms converge here.
Running software on your own servers – the gold standard for data protection.
Measures to bring websites to higher positions in the organic search engine ranking (e.g., on Google).
An advanced tracking method where data is sent from your own server (e.g., Google Cloud) to ad networks, rather than from the user's browser. This circumvents ad blockers and iOS tracking restrictions.
A revolutionary tracking methodology. User data is no longer gathered error-prone locally in the user's browser, but is captured highly encrypted on a secure First-Party server and then systematically forwarded in a controlled manner. This entirely circumvents ad blockers, drastically bolsters data security, improves page load speeds, and secures reliable data quality for AI algorithms to process.
A JavaScript script running in the browser background that intercepts network requests. Enables offline functionality, background synchronization, and push notifications for PWAs.
The direct sale of products via social networks, often integrated seamlessly into the content feed or live streams ("Live Shopping").
The psychological effect of customer reviews and references on the trust of new visitors.
Static Site Generation – creating complete HTML pages before user access for maximum efficiency.
Process in which websites are already completely rendered during the build to achieve maximum loading speed.
A test environment that is an exact copy of the live website. Changes are safely tested here.
The establishment of uniform procedures and processes to ensure consistent results and quality.
Information that is available in a standardized format (such as JSON-LD) to make it easier for machines to understand content.
Component that allows displaying a fallback (e.g., spinner) while the content is still loading (data or code).
The total cost of an investment over its entire useful life, including acquisition, operation, maintenance, personnel, and disposal.
The combination of programming languages, frameworks, and tools used to build the product.
Technology that creates fully AI-generated video footage from a text description. Key players: OpenAI Sora, Runway Gen-3, Kling AI.
Pick up the user at their pain point. What problem do you solve?
Present your service as the logical answer to the problem.
A collection of files that determine the visual appearance (design) of a WordPress website.
Pages with insufficient unique content. Google deindexes or penalizes such pages under the Helpful Content System.
The duration from idea to publication. Modern CMSs drastically reduce this for marketing campaigns.
Techniques for reducing the amount of data sent to the AI to lower costs and increase processing speed.
Internal linking strategy: A pillar page covers a broad topic and links to many specific sub-pages (cluster content) to build topical authority.
The status of a website or author as a recognized expert in a specific field, achieved through extraordinary content depth, semantic networking, and comprehensive coverage of all facets of that niche topic.
A method by Google to enable interest-based advertising without tracking browsing history.
Testimonials, case studies, and trust seals to build trust.
The time span between the user's request and the reception of the very first byte of data from the web server.
The actual intention of the user behind a search query.
A specialized database that stores information mathematically to enable the AI to search through millions of documents in a flash.
The dependence on a specific provider, making it technically or economically difficult to switch to another provider.
The automatic adaptation of video content for specific viewers – e.g., through spoken names, individual product recommendations, or country-specific versions.
An AI system that analyzes spoken language in real-time (Speech-to-Text), generates a response, and speaks it with a natural voice.
The creation of a synthetic copy of a human voice based on speech samples. Used to enable consistent, natural-sounding narrators in AI videos without repeated recording sessions.
A method for sending real-time data from one software to another (the "call" when something happens).
GDPR protects personal data. The AI Act protects safety and fundamental rights from the risks of algorithmic decisions. They complement each other.
The entire logical chain of steps that automates a business task.
A security concept that assumes no user or device is trusted by default, even if they are inside the corporate network. "Never trust, always verify."
A model where products are delivered automatically and predictively without the customer needing to trigger an active order (e.g., via IoT sensors or AI predictions).
A query where the user does not leave the search results page because the answer is already displayed there (e.g., via a Featured Snippet or AI Overview).
An attack that exploits a security vulnerability that is not yet known to the software vendor (they had "zero days" to fix it).
From AI & Automation to E-Commerce & SEO – we implement modern technologies for SMEs.
Free Consultation