Link to home
Join the waitlist
DevOps Glossary
From agile to automation to analytics, unpack the toolbox of modern
DevOps terminology.
Test-doubles
Generic term for any object used in place of a real object for testing purposes.
Test-doubles
Test-driven Development (TDD)
Software development process relying on software requirements being converted to test cases before software is fully developed.
Test-driven Development (TDD)
TestFlight
Apple's platform for over-the-air installation and beta testing of mobile applications before they are submitted to the App Store.
TestFlight
Testdatenmanagement
Process of creating, managing, and maintaining test data for software testing, ensuring data quality and relevance for various test scenarios.
Testdatenmanagement
Testenvironment Self-Service
Ability for testers to provision and manage their own test environments, increasing efficiency and autonomy.
Testenvironment Self-Service
Testing-as-a-Service (TaaS)
Outsourcing of testing activities to a third-party service provider, offering specialized expertise and tools for comprehensive testing.
Testing-as-a-Service (TaaS)
The Three Pillars of Observability
Logs, metrics, and traces; key components for understanding the behavior of distributed systems.
The Three Pillars of Observability
The Three Ways
Principles underpinning DevOps movements: Flow, Feedback, Continual Learning and Experimentation.
The Three Ways
Theory of Constraints
Management paradigm that views any manageable system as being limited in achieving its goals by a small number of constraints.
Theory of Constraints
Threat Detection and Response (TDR)
Cybersecurity process of identifying, analyzing, and mitigating threats to an organization's IT infrastructure in real-time.
Threat Detection and Response (TDR)
Threat Hunting
Proactive cybersecurity technique to detect hidden threats that have evaded existing security solutions.
Threat Hunting
Threat Intelligence
Information about potential or current threats to an organization's security, used to inform better decision-making.
Threat Intelligence
Threat Landscape
Comprehensive view of potential security threats facing an organization or industry, crucial for effective risk management.
Threat Landscape
Threat Modeling
Process of identifying, understanding, and categorizing potential security threats.
Threat Modeling
Time to First Byte
Measure of responsiveness that indicates the time between a user making an HTTP request and the first byte of the page being received by the browser.
Time to First Byte
Time to Restore Service
Metric measuring how long it takes to restore a service after an incident, important for assessing system reliability.
Time to Restore Service
Time to Value
Duration between the initiation of a process and the realization of its benefits, crucial for measuring efficiency and ROI.
Time to Value
Toggle by Geo-location
Feature flag technique that enables or disables features based on geographical location.
Toggle by Geo-location
Toggle by User Rights
Feature flag technique that enables or disables features based on user permissions.
Toggle by User Rights
Toil
Manual, repetitive, automatable work in running production services that lacks long-term value and scales linearly with service growth.
Toil
Tool Sprawl
Proliferation of tools within an organization, often leading to inefficiency and integration challenges.
Tool Sprawl
Toolchain
Set of programming tools used to perform a complex software development task or to create a software product.
Toolchain
Traffic Management
Process of monitoring, controlling, and optimizing network traffic to ensure efficient data flow and prevent congestion.
Traffic Management
Travis CI
Distributed continuous integration service used to build and test software projects hosted on GitHub.
Travis CI
Trunk-Based Development
Source control branching model where developers collaborate on code in a single branch.
Trunk-Based Development
Previous
Next