The 2020 CX Report gathers trends on how business happens in the computational era by examining the tech stacks for marketing and products in the context of digital transformation.
This version is a super-condensed summary of the CX Report. You can watch the 82-minute extended version delivered LIVE over here.
Business-related IT acronyms grew from 3 to 96 in just 8 years

For the 2020 CX.Report, I used this page on Forrester to pull out all the “buzz acronyms” (and shorthands) to put a lens on the vernacular across the 584 items that include categories and subcategories.
There are 72 major categories:
APPLICATION DEVELOPMENT PROCESSES & TOOLS, APPLICATION INFRASTRUCTURE TECHNOLOGIES, HTML5, APPLICATION MANAGEMENT, APPLICATION SECURITY, ARCHITECTURE & TECHNOLOGY STRATEGY, ARTIFICIAL INTELLIGENCE (AI), B2B, EDI, BIOMETRICS, BRANDING, BUSINESS & IT ALIGNMENT, BUSINESS INTELLIGENCE, BUSINESS PROCESS MANAGEMENT (BPM), CLOUD COMPUTING, CONSUMER MOBILITY, CUSTOMER EXPERIENCE MANAGEMENT, CUSTOMER INTELLIGENCE, CUSTOMER RELATIONSHIP MANAGEMENT (CRM), DATA & INFORMATION PROTECTION, DATA CENTERS & DATA CENTER NETWORKING, DATA MANAGEMENT, DIGITAL CUSTOMER EXPERIENCE, DIGITAL MARKETING, ECOMMERCE, EMPLOYEE EXPERIENCE, ENTERPRISE ARCHITECTURE DOMAINS & PRACTICES, ENTERPRISE COLLABORATION, ENTERPRISE CONTENT MANAGEMENT (ECM), ENTERPRISE MOBILITY, FINANCIAL MANAGEMENT, GOVERNANCE RISK & COMPLIANCE (GRC), GDPR, IDENTITY & ACCESS MANAGEMENT (IAM), INFORMATION SECURITY, INFRASTRUCTURE ARCHITECTURES, INNOVATION, INTERNET OF THINGS (IOT), IT PROCESS AUTOMATION, CMDB, ITIL, IT SERVICES, MARKET RESEARCH, MARKETING AUTOMATION, MARKETING MEASUREMENT, MARKETING METHODS, MARKETING MIX MODELING, MARKETING ORGANIZATION & CULTURE, MARKETING SERVICE PROVIDERS, MEASUREMENT, MOBILE APPLICATION DEVELOPMENT, NETWORKING, LAN/WAN, OFFICE PRODUCTIVITY, ORGANIZATION, PACKAGED SOLUTIONS, PANDEMIC, PLANNING & FULFILLMENT, PRODUCT & SOLUTIONS STRATEGIES, PROGRAM & PROJECT MANAGEMENT, SALES, SECURITY OPERATIONS & PROGRAM GOVERNANCE, SOURCING & PROCUREMENT APPLICATIONS, SOURCING STRATEGY & EXECUTION, STORAGE, STRATEGY PLANNING & GOVERNANCE, SYSTEMS MANAGEMENT, IT MOOSE, SYSTEMS OF ENGAGEMENT, TECH SECTOR ECONOMICS, TELECOMMUNICATIONS SERVICES, USER EXPERIENCE
In terms of acronyms I found 93 where all-caps signifies a category name (7 total).
Software Change & Configuration Management (SCCM), Enterprise Application Integration (EAI), Integration-Platform-As-A-Service (IPaaS), Application Life-Cycle Management (ALM), Development & Operations (DevOps), Virtual Desktop Infrastructure (VDI), Dynamic Application Security Testing (DAST), Interactive Application Security Testing (IAST), Runtime Application Self-Protection (RASP), Software Composition Analysis (SCA), Web Application Firewalls (WAF), Platform-As-A-Service (PaaS), ARTIFICIAL INTELLIGENCE (AI), Robotic Process Automation (RPA), Account-Based Marketing (ABM), Lead-To-Revenue Management (L2RM), Business Technology (BT), Continuous Business Services (CBSes), BUSINESS PROCESS MANAGEMENT (BPM), Business Process Management Suites (BPMSes), Complex Event Processing (CEP), Cloud Workload Security (CWS), Mobile Commerce (mCommerce), Near Field Communication (NFC), Customer Lifetime Value (CLV), Customer Experience Index (CX Index), Customer Feedback Management (CFM), Net Promoter Score (NPS), Voice Of The Customer (VOC), CUSTOMER RELATIONSHIP MANAGEMENT (CRM), Interactive Voice Response (IVR), Partner Relationship Management (PRM), Data Loss Prevention (DLP), Business Service Management (BSM), Data Center Infrastructure Management (DCIM), Software-Defined Data Center (SDDC), Database-As-A-Service (DbaaS), Database Management Systems (DBMSes), Extract Transform & Load (ETL), Learning Management Systems (LMSes), ENTERPRISE CONTENT MANAGEMENT (ECM), Digital Asset Management (DAM), Product Information Management (PIM), Web Content Management (WCM), Bring Your Own Device (BYOD), Enterprise Performance Management (EPM), GOVERNANCE RISK & COMPLIANCE (GRC), IDENTITY & ACCESS MANAGEMENT (IAM), Customer Identity & Access Management (CIAM), Digital & Electronic Signatures (eSignatures), Identity-As-A-Service (IDaaS), Personal Identity & Data Management (PIDM), Risk-Based Authentication (RBA), Single Sign-On (SSO), Two-Factor Authentication (2FA), Security Assertion Markup Language (SAML), Research & Development (R&D), INTERNET OF THINGS (IOT), Machine-To-Machine (M2M), IT Asset Management (ITAM), IT Service Management (ITSM), Business Process Outsourcing (BPO), Disaster-Recovery-As-A-Service (DRaaS), Infrastructure-As-A-Service (IaaS), Data Management Platforms (DMPs), Demand-Side Platforms (DSPs), Marketing Resource Management (MRM), Real-Time Interaction Management (RTIM), Key Performance Indicators (KPIs), Return On Investment (ROI), Content Delivery Networks (CDNs), Network Function Virtualization (NFV), Software-Defined Networking (SDN), Virtual Network Infrastructure (VNI), Enterprise Resource Planning Applications (ERP), Smart Process Applications (SPAs), Software-As-A-Service (SaaS), Product Development Services (PDS), Product Life-Cycle Management (PLM), Project Management Office (PMO), Project Portfolio Management (PPM), Configure Price Quote (CPQ), Sales Force Automation (SFA), Distributed Denial of Service (DDoS), Managed Security Services Providers (MSSPs), Security Information & Event Management (SIEM), Security User Behavior Analytics (SUBA), Contract Life-Cycle Management (CLM), Electronic Invoice Presentation & Payment (EIPP), Service-Level Agreements (SLAs), Software-Defined Storage (SDS), Mergers & Acquisitions (M&As), Service Delivery Platforms (SDPs)
The 7 category names worthy of acronyms:
ARTIFICIAL INTELLIGENCE (AI), BUSINESS PROCESS MANAGEMENT (BPM), CUSTOMER RELATIONSHIP MANAGEMENT (CRM), ENTERPRISE CONTENT MANAGEMENT (ECM), GOVERNANCE RISK & COMPLIANCE (GRC), IDENTITY & ACCESS MANAGEMENT (IAM), INTERNET OF THINGS (IOT)
Sign up for the Resilience Tech Briefing with no more than 2021 characters, zero images, and all in plain-text.
As a chart of 96 acronyms and shorthands:
Acronym and Shorthands | Decoded |
SCCM EAI IPaaS ALM DevOps VDI DAST IAST RASP SCA WAF PaaS AI RPA ABM L2RM BT CBSes BPM BPMSes CEP CWS mCommerce NFC CLV CX Index CFM EDI ITIL NPS VOC CRM IVR PRM DLP BSM IT MOOSE DCIM SDDC DbaaS DBMSes ETL LMSes ECM DAM PIM WCM BYOD EPM GRC IAM CIAM eSignatures IDaaS PIDM RBA SSO 2FA SAML R&D IOT M2M ITAM ITSM BPO DRaaS IaaS DMPs DSPs MRM RTIM KPIs ROI CDNs NFV SDN VNI ERP SPAs SaaS PDS PLM PMO PPM CPQ SFA DDoS MSSPs SIEM SUBA CLM EIPP SLAs SDS M&As SDPs CMDB | Software Change & Configuration Management Enterprise Application Integration Integration-Platform-As-A-Service Application Life-Cycle Management Development & Operations Virtual Desktop Infrastructure Dynamic Application Security Testing Interactive Application Security Testing Runtime Application Self-Protection Software Composition Analysis Web Application Firewalls Platform-As-A-Service ARTIFICIAL INTELLIGENCE Robotic Process Automation Account-Based Marketing Lead-To-Revenue Management Business Technology Continuous Business Services BUSINESS PROCESS MANAGEMENT Business Process Management Suites Complex Event Processing Cloud Workload Security Mobile Commerce Near Field Communication Customer Lifetime Value Customer Experience Index Customer Feedback Management ELECTRONIC DATA INTERCHANGE INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY Net Promoter Score Voice Of The Customer CUSTOMER RELATIONSHIP MANAGEMENT Interactive Voice Response Partner Relationship Management Data Loss Prevention Business Service Management IT MAINTAIN AND OPERATE THE ORGANIZATION, SYSTEMS AND EQUIPMENT Data Center Infrastructure Management Software-Defined Data Center Database-As-A-Service Database Management Systems Extract Transform & Load Learning Management Systems ENTERPRISE CONTENT MANAGEMENT Digital Asset Management Product Information Management Web Content Management Bring Your Own Device Enterprise Performance Management GOVERNANCE RISK & COMPLIANCE IDENTITY & ACCESS MANAGEMENT Customer Identity & Access Management Digital & Electronic Signatures Identity-As-A-Service Personal Identity & Data Management Risk-Based Authentication Single Sign-On Two-Factor Authentication Security Assertion Markup Language Research & Development INTERNET OF THINGS Machine-To-Machine IT Asset Management IT Service Management Business Process Outsourcing Disaster-Recovery-As-A-Service Infrastructure-As-A-Service Data Management Platforms Demand-Side Platforms Marketing Resource Management Real-Time Interaction Management Key Performance Indicators Return On Investment Content Delivery Networks Network Function Virtualization Software-Defined Networking Virtual Network Infrastructure Enterprise Resource Planning Applications Smart Process Applications Software-As-A-Service Product Development Services Product Life-Cycle Management Project Management Office Project Portfolio Management Configure Price Quote Sales Force Automation Distributed Denial of Service Managed Security Services Providers Security Information & Event Management Security User Behavior Analytics Contract Life-Cycle Management Electronic Invoice Presentation & Payment Service-Level Agreements Software-Defined Storage Mergers & Acquisitions Service Delivery Platforms Configuration Management Database |
E.N.J.O.Y.! —JM
PS my favorite reaction to this post is the idea of being “overwordened” …
You must be logged in to post a comment.