Engineering Glossary

From fundamental principles to cutting-edge practices, this glossary covers the full spectrum of software engineering terminology.

DevOps
Cloud Computing
Git
Containerization & Orchestration

Behaviour-Driven Design

Approach to software design that focuses on defining system behavior through examples and scenarios.
DevOps

Bento

Lightweight Docker-based development environments for PHP applications, simplifying local development setup.
DevOps

Berkshelf

Dependency manager for Chef cookbooks, simplifying the process of managing and versioning cookbook dependencies.
DevOps

Beta Testing

Pre-release testing phase where a sample of the intended audience tries the product to uncover any bugs or issues.
DevOps

Bitbucket

Web-based version control repository hosting service for Git and Mercurial projects, owned by Atlassian.
DevOps

Black Box Testing

Testing method where the internal structure/design of the item being tested is not known to the tester.
DevOps

Blameless Postmortem

Process of analyzing incidents or failures without assigning blame, focusing on learning and improvement.
DevOps

Blast Radius

Extent of damage or impact that could result from a failure or security breach in a system.
DevOps

Blue Green Deployment

Technique for releasing applications by shifting traffic between two identical environments running different versions.
DevOps

Blue Team

Group responsible for defending against and responding to cyber attacks in an organization.
DevOps

Bot Attack

Automated attempt by malicious actors to compromise systems or steal data using software programs (bots).
DevOps

Bot Management Tools

Solutions designed to detect, prevent, and mitigate bot-related threats to websites and applications.
DevOps

Bots

Automated software applications that run scripted tasks, often used in both beneficial and malicious contexts.
DevOps

Bottleneck

Point in a system where the flow of data or processes is constrained, limiting overall system performance.
DevOps

Bounded Context

Core concept in Domain-Driven Design, defining the limits within which a particular model is applicable.
DevOps

Branching

Creating a divergent copy of source code to develop features or fix bugs without affecting the main codebase.
DevOps

Broken Access Control

Security vulnerability where restrictions on authenticated users are not properly enforced.
DevOps

Broken Authentication

Security flaw allowing attackers to compromise passwords, keys, or session tokens to assume user identities.
DevOps

Broken Function Level Authorization

Vulnerability where an application does not restrict function access to appropriate users.
DevOps

Broken Object Level Authorization

Security issue where an application does not verify if the user has permission to access a specific object.
DevOps

Broken User Authentication

Security vulnerability where flaws in the authentication process allow unauthorized access to user accounts.
DevOps

Brooklyn

Framework for modeling, deploying, and managing distributed applications across cloud environments.
DevOps

Bucket

Container for storing objects in cloud storage services like Amazon S3 or Google Cloud Storage.
DevOps

Bug Bounty Program

Initiative offering rewards to individuals for discovering and reporting software bugs or vulnerabilities.
DevOps

Build

Process of converting source code files into standalone software artifacts that can be run on a computer.
DevOps

Build Agent

Component in a CI/CD system that executes build and test processes on behalf of the build server.
DevOps

Build Artifact Repository

Central storage location for managing and distributing software build outputs and dependencies.
DevOps

Build Automation

Process of scripting or automating the creation of compiled code and related processes.
DevOps

Build Cache

Mechanism to store and reuse the output of previous build steps to speed up subsequent builds.
DevOps

Build Pipelines

Automated processes for compiling, testing, and deploying code changes through various stages.
DevOps

Build Service

System that automates the process of compiling source code into executable programs.
DevOps

Build System

Set of tools and processes used to compile, assemble, and package software from source code.
DevOps

BuildMaster

Application release automation platform for creating and managing software delivery pipelines.
DevOps

Buildbot

Continuous integration framework written in Python, allowing automation of build, test, and release processes across multiple platforms.
DevOps

Business Acceptance

Process of verifying that a software solution meets the business requirements and is ready for use.
DevOps

Business Analytics (BA)

Practice of iterative exploration of an organization's data to gain insights and drive business planning.
DevOps

Business Intelligence (BI)

Technologies and practices for collecting, integrating, analyzing, and presenting business information.
DevOps

Business Logic Attack

Exploitation of flaws in the business logic of an application to perform unauthorized actions.
DevOps

CALMS Model

Framework for DevOps culture emphasizing Collaboration, Automation, Lean, Measurement, and Sharing.
DevOps

CASB

Cloud Access Security Broker; software that mediates between cloud service users and cloud applications.
DevOps

CD Pipeline

Continuous Delivery Pipeline; automated system for moving code changes through build, test, and deployment stages.
DevOps

CI Pipeline

Continuous Integration Pipeline; automated sequence of steps for building, testing, and validating code changes.
DevOps

CI Service

System that automates the integration of code changes from multiple contributors into a single software project.
DevOps

CI/CD (Continuous Integration and Continuous Delivery)

Continuous Integration and Continuous Delivery; practices of frequently integrating code changes and delivering to production.
DevOps

CI/CD Server

Platform that facilitates the automation of building, testing, and deploying code changes.
DevOps

CLI (Command Line Interface)

Command Line Interface; text-based interface for interacting with computer programs or operating systems.
DevOps

CMB (Cloud Message Bus)

Messaging infrastructure that enables communication between different parts of a cloud-based application.
DevOps

CPU Limit

Restriction on the amount of processing power allocated to a particular process or container.
DevOps

CRUD (Create, Read, Update and Delete)

Four basic functions of persistent storage, fundamental to database operations and RESTful API design.
DevOps

CaaS

Containers as a Service; cloud-based service that provides container orchestration and management.
DevOps

Cadence

Regular rhythm or pattern of work or processes, often used in the context of software development and release cycles.
DevOps

Canary Deployment

Technique of rolling out changes to a small subset of users before a full deployment.
DevOps

Canary Release

Gradual rollout of new features to a subset of users to test in production with reduced risk.
DevOps

Capacity Test

Performance test to determine how many users or transactions a system can handle before performance degrades.
DevOps

Capistrano

Remote server automation and deployment tool, primarily used for deploying web applications by scripting arbitrary deployment tasks.
DevOps

Certificate Authority (CA)

Trusted entity that issues digital certificates for secure communication over networks.
DevOps

CfEngine

Open-source configuration management system for managing large numbers of computers.
DevOps

Chain of Custody

Documentation of the movement and handling of evidence in security incidents or investigations.
DevOps

Change Failure Rate

Percentage of changes to production or released to users that result in degraded service or require remediation.
DevOps

Chaos Engineering

Practice of intentionally introducing failures in a system to test its resilience and identify weaknesses.
DevOps

Chaos Monkey

Tool developed by Netflix to randomly terminate instances in production to test system fault tolerance.
DevOps

Chaos Testing

Deliberate introduction of faults into a system to verify its ability to withstand turbulent conditions.
DevOps

ChatOps

Approach to managing IT operations and workflows through conversation-driven development.
DevOps

Chef

Configuration management tool that uses a pure-Ruby domain-specific language for writing system configurations.
DevOps

Chocolatey

Package manager for Windows, automating software installation, upgrade, and configuration.
DevOps

Clean Code Prinzipien

Set of principles aimed at producing readable, maintainable, and efficient code, promoting software quality and developer productivity.
DevOps

Click Fraud

Fraudulent clicks on pay-per-click advertisements to generate charges for advertisers.
DevOps

Clickjacking

Malicious technique of tricking users into clicking on hidden or disguised elements on a webpage.
DevOps

Client Side Attacks

Security threats that target vulnerabilities in web browsers or other client applications.
DevOps

Cloud Application

Software program where cloud-based and local components work together, primarily processed on remote servers.
DevOps

Cloud Automation

Use of tools and processes to reduce manual efforts in deploying and managing cloud computing workloads.
DevOps

Cloud Computing

Delivery of computing services over the internet, including servers, storage, databases, and software.
DevOps

Cloud Infrastructure

Hardware and software components required to support cloud computing delivery model.
DevOps

Cloud Infrastructure Security

Measures and controls to protect data, applications, and infrastructure associated with cloud computing.
DevOps

Cloud Management

Control and oversight of cloud computing resources, often through automated tools.
DevOps

Cloud Migration

Process of moving data, applications, or other business elements from an on-premises environment to the cloud.
DevOps

Cloud Native Computing Foundation (CNCF)

Organization promoting cloud native technologies and practices to shape the evolution of cloud computing.
DevOps

Cloud Native DevOps

Practices combining cloud native technologies with DevOps principles for faster, more flexible software delivery.
DevOps

Cloud Orchestration

Arrangement and coordination of automated tasks resulting in a consolidated process or workflow.
DevOps

Cloud Security Alliance (CSA)

Organization that defines best practices to help ensure a secure cloud computing environment.
DevOps

Cloud Security Monitoring

Continuous monitoring of cloud-based assets and services to detect security threats and vulnerabilities.
DevOps

Cloud Security Posture Management

Continuous monitoring of cloud infrastructure to identify misconfigurations and compliance risks.
DevOps

Cloud-native

Designed to take full advantage of cloud computing frameworks, beyond simple rehosting in the cloud.
DevOps

Cloud-native Security

Security practices and tools designed specifically for cloud-native applications and infrastructure.
DevOps

CloudWatch

Amazon Web Services' monitoring and observability service for cloud resources and applications.
DevOps

Code All Your Resources

Practice of managing all aspects of infrastructure and operations through code, enabling version control and automation.
DevOps

Code Dependencies

External libraries, modules, or packages that a software project relies on to function properly.
DevOps

Code Injection

Security vulnerability where an attacker inserts malicious code into a vulnerable application.
DevOps

Code Promotion

Process of moving code through various stages of development, testing, and deployment.
DevOps

Code Signing

Process of digitally signing executables and scripts to confirm the software author and guarantee it hasn't been altered.
DevOps

Code-first Workflow

Development approach where code is written before database schemas or other structures are defined.
DevOps

Coding Standards

Set of guidelines for programming style and practices within a project or organization.
DevOps

Cognitive Load

Mental effort required to learn new information or complete tasks, important in user experience design and learning theory.
DevOps

Collectd

System statistics collection daemon that collects, transfers, and stores performance data of computers and network equipment.
DevOps

Common Vulnerabilities and Exposures (CVE)

List of publicly disclosed cybersecurity vulnerabilities, providing a standardized identifier for known issues.
DevOps

Common Weakness Enumeration (CWE)

Comprehensive list of common software and hardware weakness types, serving as a common language for describing security vulnerabilities.
DevOps

Complex-Adaptive System (CAS)

System of interconnected components that can adapt and self-organize in response to changes.
DevOps

Complex-Adaptive Systems

Systems of interconnected components that can adapt and evolve in response to changes in their environment.
DevOps

Compliance

Adherence to laws, regulations, guidelines, and specifications relevant to a business.
DevOps

Compliance Level

Degree to which an organization meets regulatory or industry-specific requirements.
DevOps
Pull/Pull Request

Pull/Pull Request

Alternative terms for the same concept of proposing and reviewing changes in Git-based collaboration.
Push

Push

A Git command used to upload local repository changes to a remote repository, sharing updates with collaborators.
README

README

A file in a Git repository that provides information about the project, its purpose, and how to use or contribute to it.
Rebase

Rebase

A Git operation that moves or combines a sequence of commits to a new base commit, often used to maintain a linear history.
Rebase Interactive

Rebase Interactive

A Git rebase mode allowing users to modify, reorder, or squash commits before applying them to the target branch.
RefLog

RefLog

A Git mechanism that records updates to branch tips and other references in a repository.
Refspec

Refspec

A string that specifies the mapping between remote and local references when fetching or pushing in Git.
Release branching

Release branching

A strategy where a separate branch is created for release preparation, allowing continued development on the main branch.
Remote

Remote

A Git repository hosted on a server, allowing collaboration and synchronization between multiple developers.
Repository

Repository

Centralized location where software packages or modules are stored and managed, facilitating version control and collaboration.
Repository ("Repo")

Repository ("Repo")

A data structure containing all the files, history, and metadata for a Git-managed project.
SCM

SCM

Source Control Management, a system for tracking and managing changes to code, of which Git is an example.
SHA-1

SHA-1

The cryptographic hash function used by Git to generate unique identifiers for objects in the repository.
SSH key

SSH key

A secure authentication method using a pair of cryptographic keys for accessing remote systems or services.
Shallow Clone

Shallow Clone

A Git clone that only fetches a limited number of recent commits, reducing download size for large repositories.
Squash

Squash

The process of combining multiple commits into a single commit in Git, often used to simplify history.
Staging

Staging

The process of preparing changes to be committed in Git, also known as "adding to the index."
Stash

Stash

A Git feature for temporarily storing uncommitted changes, allowing you to switch branches without committing work in progress.
Stashing

Stashing

A Git feature for temporarily saving uncommitted changes, allowing you to switch contexts without committing incomplete work.
Status

Status

A Git command that shows the state of the working directory and staging area, indicating which files are modified or staged.
SubModule

SubModule

A Git repository nested within another repository, allowing you to include external projects in your own project.
Tag

Tag

A named reference to a specific point in Git history, typically used to mark release points or important milestones.
Team plan

Team plan

A subscription level for GitHub designed for collaborative groups or small organizations.
Upstream

Upstream

The original repository from which a fork is created, or the branch that a local branch is tracking.
Upstream and Downstream

Upstream and Downstream

Terms describing the flow of changes in Git, with upstream being the source and downstream the destination.
Work in Progress (WIP) Commit

Work in Progress (WIP) Commit

A temporary commit indicating unfinished work, often used to save progress or facilitate code reviews.
access token

access token

A secure alternative to passwords, used for authentication in Git operations, providing limited access to specific resources or actions.
alternate object database

alternate object database

A secondary location where Git stores object files, useful for optimizing storage and performance in large repositories.
appliance

appliance

A dedicated hardware or virtual machine optimized for running Git services, often used in enterprise environments for improved performance.
assignee

assignee

The person responsible for addressing an issue or pull request in a Git repository, helping to organize and prioritize tasks.
authentication code

authentication code

A temporary code used in two-factor authentication to verify a user's identity when accessing Git repositories or services.
base branch

base branch

The primary branch in a Git repository from which feature branches are created and into which they are merged after development.
basic authentication

basic authentication

A simple authentication method in Git using a username and password, often discouraged in favor of more secure methods.
billing cycle

billing cycle

The recurring period for which Git hosting services charge users or organizations for their subscriptions and usage.
billing email

billing email

The email address associated with a Git account or organization for receiving invoices and billing-related communications.
billing manager

billing manager

A user role in Git hosting platforms responsible for managing billing information, subscriptions, and payments for an organization.
billing plan

billing plan

A subscription package offered by Git hosting services, defining features, storage limits, and pricing for users or organizations.
bio

bio

A brief description of a user's profile on Git platforms, typically including their role, interests, or expertise in software development.
blob object

blob object

A Git object type representing the contents of a file, stored as a sequence of bytes without any metadata or file attributes.
block

block

An action on Git platforms to restrict a user's ability to interact with a repository, often used to manage disruptive behavior.
branch restriction

branch restriction

A set of rules applied to Git branches to control who can push changes, merge, or perform certain actions, enhancing code quality.
cURL

cURL

A command-line tool often used with Git to transfer data and interact with APIs, supporting various protocols including HTTPS.
card

card

A visual representation of an issue or pull request in Git project management tools, used for organizing and prioritizing work.
chain

chain

A series of connected commits in Git, representing a sequence of changes that build upon each other in a repository's history.
changeset

changeset

A group of changes made to files in a Git repository, typically represented by a commit and including additions, modifications, and deletions.
check

check

An automated test or verification process run on Git repositories to ensure code quality, security, or compliance with project standards.
child team

child team

A nested team within a Git organization's hierarchy, inheriting permissions and access rights from its parent team.
clean

clean

A Git command used to remove untracked files and directories from a working directory, helping to maintain a tidy repository.
clustering

clustering

A technique used in Git hosting services to distribute repository data across multiple servers for improved performance and reliability.
code frequency graph

code frequency graph

A visual representation of code additions and deletions over time in a Git repository, useful for tracking project activity.
code of conduct

code of conduct

A document outlining expected behavior and guidelines for contributors in a Git repository, promoting a positive community.
code owner

code owner

A designated person or team responsible for reviewing and approving changes to specific files or directories in a Git repository.
collaborator

collaborator

A user with read and write access to a Git repository, able to contribute code and participate in project discussions.
commit ID

commit ID

A unique identifier (SHA-1 hash) assigned to each commit in Git, used to reference specific points in a repository's history.
commit author

commit author

The person who originally created a commit in Git, distinct from the committer who may have applied the changes on behalf of the author.
commit graph

commit graph

A visual representation of the commit history in a Git repository, showing the relationships between different branches and merges.
commit graph concept, representations and usage

commit graph concept, representations and usage

The underlying structure and visual representations of Git's commit history, used for understanding project evolution.
commit message

commit message

A descriptive text associated with a Git commit, explaining the purpose and details of the changes made in that commit.
commit object

commit object

A Git object type containing metadata about a commit, including the author, committer, date, and a pointer to the tree object.
commit-graph file

commit-graph file

A file used by Git to store commit graph information, optimizing performance for operations that traverse the commit history.
commit-ish (also committish)

commit-ish (also committish)

A term referring to any Git object that can be resolved to a commit, including commit IDs, branch names, and tags.
compare branch

compare branch

A Git feature allowing users to view differences between two branches, often used before merging to review changes.
contribution graph

contribution graph

A visual representation of a user's Git activity over time, showing the frequency and distribution of their contributions to repositories.
contribution guidelines

contribution guidelines

A document in a Git repository outlining best practices, coding standards, and procedures for contributors to follow when submitting changes.
contributions

contributions

The collective changes, commits, issues, and pull requests made by a user to Git repositories, showcasing their involvement in projects.
contributor

contributor

Any person who has made contributions to a Git repository, whether through code, documentation, or other forms of project support.
contributors graph

contributors graph

A visual representation of all contributors to a Git repository, showing their relative contributions over time and by type.
core Git

core Git

The fundamental set of Git commands and functionality, excluding third-party extensions or hosting platform-specific features.
coupon

coupon

A promotional code offering discounts or credits for Git hosting services, often used to attract new users or upgrade existing accounts.
cron

cron

A time-based job scheduler used in Git hosting platforms to automate tasks such as backups, notifications, or periodic code checks.
dangling object

dangling object

A Git object not reachable from any reference (branch, tag, etc.), often created during rebasing or other history-altering operations.
dashboard

dashboard

A central interface in Git platforms providing an overview of a user's repositories, activities, and notifications.
default branch

default branch

The primary branch in a Git repository, typically named "main" or "master," serving as the base for new branches and deployments.
dependency graph

dependency graph

A visual representation of a project's dependencies, showing relationships between different components or external libraries.
dependents graph

dependents graph

A visualization of other projects or repositories that depend on a given Git repository, useful for understanding its impact.
deploy key

deploy key

An SSH key granting read-only access to a specific Git repository, commonly used for automated deployments or CI/CD processes.
dereference

dereference

The process of resolving a Git reference (like a branch or tag) to its corresponding commit object or SHA-1 hash.
detached HEAD

detached HEAD

A state in Git where the HEAD pointer references a specific commit rather than a branch, often used for temporary work.
diagnostics

diagnostics

Tools and features in Git used to identify and troubleshoot issues with repositories, commits, or configuration settings.
directory

directory

A folder within a Git repository containing files and potentially other subdirectories, organized hierarchically.
dirty

dirty

A term describing a Git working directory that contains uncommitted changes, indicating modifications that haven't been saved to the repository.
email notifications

email notifications

Alerts sent via email by Git platforms to inform users about repository activities, mentions, or updates.
enterprise account

enterprise account

A high-tier account type offered by Git hosting services, providing advanced features and support for large organizations.
evil merge

evil merge

A problematic merge in Git where conflicts are resolved incorrectly, potentially introducing subtle bugs or inconsistencies.
fast-forward

fast-forward

A type of Git merge where the target branch's pointer is simply moved to the latest commit of the source branch, without creating a new commit.
feature branch

feature branch

A temporary branch in Git created to develop a specific feature or fix, typically merged back into the main branch upon completion.
fenced code block

fenced code block

A markdown syntax used in Git documentation and comments to display formatted code snippets with syntax highlighting.
file system

file system

The underlying structure used by Git to store repository data, including objects, refs, and configuration files.
following (users)

following (users)

A feature in Git platforms allowing users to receive updates and notifications about other users' activities.
gitfile

gitfile

A file containing a Git repository's object database, used in certain Git operations.
gitignore

gitignore

A text file specifying intentionally untracked files that Git should ignore, customizable for different project types.
graft

graft

A technique in Git to join two unrelated commit histories, typically used for repository repair or history modification.
hash

hash

A unique identifier (SHA-1) for Git objects, used to ensure data integrity and create content-addressable storage.
head branch

head branch

The default branch that is checked out when a repository is cloned, typically 'main' or 'master'.
head ref

head ref

A reference to the tip of a branch, representing the most recent commit in that branch's history.
high-availability

high-availability

A characteristic of Git hosting systems designed to ensure continuous operation and minimal downtime.
hook

hook

A script that Git executes before or after events such as commit, push, and receive, used for automating or controlling Git processes.
hostname

hostname

The unique name assigned to a device on a network, used for identification and communication purposes.
identicon

identicon

A visual representation of a hash value, often used as a default avatar in Git platforms.
identity provider

identity provider

A service that creates, maintains, and manages identity information for users, often integrated with Git platforms.

Blockchain Interoperability

Capability of different blockchain networks to exchange and use information across cloud platforms.

Blockchain as a Service

Cloud-based blockchain infrastructure and management tools offered as a service, simplifying blockchain adoption.

Blockchain as a Service (BaaS)

Cloud platforms offering blockchain infrastructure and tools as a managed service for easy deployment and scaling.

Blockchain-Based Audit Trails for Cloud Resources

Immutable, distributed ledgers recording all actions and changes to cloud resources for enhanced accountability.

Blockchain-Based Databases

Distributed databases using blockchain for data storage and validation in cloud environments.

Blockchain-Based Networking

Use of blockchain technology for secure, decentralized network management and routing in cloud infrastructures.

Blockchain-Based Security Audit Trails

Immutable records of security events and access logs in cloud systems using blockchain technology.

Blockchain-based Cloud Security

Use of blockchain technology to enhance security, integrity, and transparency of cloud services and data.

Blockchain-based Supply Chain

Cloud-hosted blockchain networks for tracking and verifying supply chain transactions and product provenance.

Blue-Green Deployment

Cloud deployment strategy using two identical environments to minimize downtime and risk during updates.

Blue-Green Deployments

Technique using two identical production environments to reduce downtime and risk when deploying new versions of cloud applications.

Border Gateway Protocol (BGP)

Internet routing protocol used in cloud networking to exchange routing information between autonomous systems.

Brain-Computer Interfaces (BCI) for Cloud Interaction

Experimental systems allowing direct neural control of cloud resources and services.

Budget Alerts

Notifications triggered when cloud spending reaches predefined thresholds to help control costs.

Budget Management

Tools and practices for setting, tracking, and controlling cloud service expenditures.

Business Intelligence Tools (e.g., Amazon QuickSight, Power BI)

Cloud-based platforms for data analysis and visualization, e.g., Amazon QuickSight, Power BI.

CQRS (Command Query Responsibility Segregation)

Architectural pattern separating read and write operations in cloud-based applications.

Calico

Open-source networking and security solution for containers and Kubernetes in cloud environments.

Canary Deployments

Technique of rolling out changes to a small subset of users before full deployment in cloud environments.

Carbon Footprint Calculation for Cloud Services

Tools and methods for estimating the environmental impact of cloud resource usage.

Carbon Usage Effectiveness (CUE)

Metric measuring the carbon emissions associated with data center energy consumption in cloud facilities.

Carbon-Aware Computing

Cloud computing practices that consider and optimize for carbon emissions in resource allocation and usage.

Carbon-Intelligent Computing

Cloud infrastructure and algorithms designed to minimize carbon footprint by optimizing energy use and sourcing.

Carbon-Intelligent Workload Scheduling

Cloud resource management that schedules tasks based on availability of low-carbon energy sources.

Centralized Logging

Consolidation of log data from various cloud services and applications into a single, searchable repository.

Chaos Engineering Platforms

Cloud-based systems for designing, running, and analyzing controlled experiments to test system resilience.

Chaos Engineering Tools

Software used to intentionally introduce failures in cloud systems to test and improve their resilience.

Chaos Engineering as a Service

Cloud-based platforms for designing and executing controlled experiments to test system resilience.

Chargeback Models

Frameworks for allocating and billing cloud service costs to different departments or projects within an organization.

Chargeback and Showback

Methods for allocating cloud costs to business units, showing actual charges or usage without billing.

Chatbot Services

Cloud-based platforms for building, deploying, and managing conversational AI agents.

Cilium

Open-source, eBPF-based networking, observability, and security solution for container and Kubernetes environments.

Circuit Breaker Pattern

Design pattern that prevents cascading failures in distributed cloud systems by temporarily disabling failing components.

Circular Economy in Cloud Hardware

Practices promoting reuse, refurbishment, and recycling of cloud infrastructure components.

Cloud Abstraction Layer

Software that provides a unified interface to multiple cloud providers, simplifying multi-cloud management.

Cloud Access Security Broker (CASB)

Service that mediates between cloud users and providers, enforcing security policies and monitoring usage.

Cloud Adoption Framework

Structured approach for planning and implementing cloud migration and optimization strategies.

Cloud Analytics

Tools and services for processing and analyzing large datasets using cloud-based resources.

Cloud Asset Intelligence

Systems for discovering, classifying, and managing cloud resources across an organization's infrastructure.

Cloud Asset Management

Processes and tools for tracking, optimizing, and governing cloud resources throughout their lifecycle.

Cloud Broker

Intermediary service that helps organizations select, integrate, and manage multiple cloud services.

Cloud Bursting

Technique of extending on-premises infrastructure into the cloud to handle peak workloads.

Cloud CDN

Content Delivery Network services that distribute data from cloud origins to global edge locations for faster access.

Cloud Carbon Footprint Monitoring

Tools and practices for measuring and reporting the environmental impact of cloud resource consumption.

Cloud Center of Excellence (CCoE)

Cross-functional team responsible for cloud strategy, governance, and best practices within an organization.

Cloud Configuration Optimization

Process of adjusting cloud resource settings to improve performance, security, and cost-efficiency.

Cloud Cost Anomaly Detection

Automated identification of unusual or unexpected changes in cloud spending patterns.

Cloud Cost Optimization

Strategies and tools for reducing cloud expenses while maintaining performance and meeting business needs.

Cloud Custodian

Open-source tool for managing and enforcing cloud security, compliance, and cost optimization policies.

Cloud DNS

Scalable, managed Domain Name System service for translating domain names to IP addresses in cloud environments.

Cloud Data Sovereignty Solutions

Services ensuring data storage and processing comply with regional data residency and privacy laws.

Cloud Development Kit (CDK)

Framework for defining cloud infrastructure using familiar programming languages instead of configuration files.

Cloud Financial Operations

Practices and tools for managing, optimizing, and reporting on cloud spending and resource utilization.

Cloud Functions (Google Cloud)

Serverless compute platform for running event-driven code without managing infrastructure.

Cloud Gaming

Service that streams video games from cloud servers to user devices, reducing hardware requirements.

Cloud Governance Framework

Set of policies, processes, and tools for managing and controlling cloud resource usage and compliance.

Cloud Infrastructure Entitlement Management (CIEM)

Tools for managing access rights and permissions across multi-cloud environments.

Cloud Interconnect (Google Cloud)

Service providing direct, private network connections between on-premises networks and Google Cloud.

Cloud License Optimization

Strategies and tools for managing software licenses in cloud environments to reduce costs and ensure compliance.

Cloud Management Platform

Integrated suite of tools for monitoring, managing, and optimizing multi-cloud and hybrid cloud environments.

Cloud Migration Assessment

Evaluation of on-premises IT assets to determine feasibility, strategy, and costs for moving to the cloud.

Cloud Monitoring

Tools and services for tracking performance, availability, and health of cloud resources and applications.

Cloud Native Application Performance Management (APM)

Tools for monitoring and optimizing performance of applications built for cloud environments.

Cloud Native Buildpacks

Standardized way to transform application source code into container images for cloud deployment.

Cloud Native CI/CD

Continuous integration and delivery practices optimized for cloud-native application development and deployment.

Cloud Native Databases

Database systems designed to leverage cloud infrastructure for scalability, resilience, and performance.

Cloud Native Networking

Network architectures and technologies optimized for cloud-native application environments.

Cloud Native Observability

Practices and tools for monitoring, logging, and tracing cloud-native applications and infrastructure.

Cloud Native Security

Security practices and tools designed specifically for protecting cloud-native applications and infrastructure.

Cloud Native Storage

Storage systems designed to integrate seamlessly with cloud-native applications and container orchestrators.

Cloud Network Automation

Tools and practices for automating the deployment, configuration, and management of cloud network resources.

Cloud Network Function Virtualization (NFV)

Virtualizing network functions like firewalls and load balancers in cloud environments.

Cloud Network Intelligence

AI-driven tools for optimizing and securing cloud network performance and operations.

Cloud Performance Benchmarking Tools

Services for measuring and comparing performance metrics across different cloud providers and configurations.

Cloud Rendering

Use of cloud computing resources for processing and generating complex graphics or animations.

Cloud Repatriation

Process of moving applications or data from public cloud environments back to on-premises or private cloud infrastructure.

Cloud Robotics

Integration of cloud computing with robotics, enabling robots to leverage cloud resources for processing and data storage.

Cloud Robotics Data Analytics

Cloud-based tools for processing and analyzing large datasets generated by robotic systems.

Cloud Robotics Security

Measures and tools to protect cloud-connected robotic systems from cyber threats and unauthorized access.

Cloud Robotics Simulation Environments

Cloud-based platforms for testing and training robotic systems in virtual environments.

Cloud Run (Google Cloud)

Fully managed platform for deploying and scaling containerized applications in a serverless environment.

Cloud Security

Comprehensive measures and tools to protect data, applications, and infrastructure in cloud computing environments.

Cloud Security Posture Management (CSPM)

Tools for continuously monitoring and improving security risks in cloud infrastructure configurations.

Cloud Service Catalog

Centralized repository of available cloud services and resources within an organization.

Cloud Spend Analysis

Tools and practices for analyzing and optimizing cloud expenditures across an organization.

Cloud Spend Anomaly Detection

Automated identification of unusual or unexpected patterns in cloud service usage and costs.

Cloud Spend Forecasting

Predictive analytics tools for estimating future cloud costs based on historical usage and trends.

Cloud WAN

Wide Area Network service that connects and manages global network resources using cloud infrastructure.

Cloud WAN (Wide Area Network)

Managed service for connecting and managing global network resources using cloud infrastructure.

Cloud Workload Protection Platform (CWPP)

Security solutions designed to protect cloud-native applications and workloads across multiple environments.

Cloud-Based 3D Asset Management

Services for storing, versioning, and collaborating on 3D models and assets in the cloud.

Cloud-Based Computer Vision for Robotics

Services providing image and video analysis capabilities for cloud-connected robotic systems.

Cloud-Based Data Labeling Services

Platforms offering human-powered or AI-assisted data annotation for machine learning models.

Cloud-Based Digital Twins

Virtual representations of physical objects or systems, powered by cloud computing and IoT data.

Cloud-Based Distributed Operating Systems

OS designed to manage resources across multiple cloud environments as a single system.

Cloud-Based Generative AI Services

Platforms offering pre-trained or customizable generative AI models as cloud services.

Cloud-Based Haptic Feedback

Services using cloud computing to generate and deliver tactile sensations for virtual or augmented reality experiences.

Cloud-Based Motion Capture

Services utilizing cloud resources to process and analyze motion capture data for animation or biomechanics.

Cloud-Based Reinforcement Learning

Platforms offering scalable environments and resources for training AI agents using reinforcement learning algorithms.

Cloud-Based Robot Learning

Services enabling robots to learn and improve their capabilities using cloud-based AI and machine learning resources.

5G MEC Integration

Integration of 5G mobile edge computing with container platforms for low-latency applications and services at network edges.

AIOps for Container Environments

Application of AI and machine learning for automated operations, monitoring, and management of containerized environments.

API Deprecation Policy

Guidelines for phasing out older API versions in Kubernetes, ensuring smooth transitions for users.

API Extensions

Mechanisms to extend the Kubernetes API with custom resources and functionalities, enhancing platform capabilities.

API Gateway Pattern

Containerized service that acts as a single entry point for all client requests to a microservices architecture.

API Server

Core component of Kubernetes that exposes the cluster's API and handles all administrative operations.

API Server Aggregation

Kubernetes feature allowing the API server to be extended with additional APIs without modifying core Kubernetes code.

API-First Development

Approach prioritizing API design before implementation, crucial for developing scalable containerized microservices.

AWS Fargate

Serverless compute engine for containers, allowing you to run containers without managing the underlying infrastructure.

Adapter Pattern

Design pattern in containerized microservices that wraps a service's interface to make it compatible with other services.

Admission Controllers

Plugins that intercept requests to the Kubernetes API server before object persistence, enforcing policies or modifying objects.

Admission Controllers for Security

Admission controllers specifically focused on enforcing security policies and validating security-related configurations.

Admission Webhooks

HTTP callbacks that receive admission requests and can modify or validate objects before they are persisted.

Admission Webhooks in Operators

Use of admission webhooks within Kubernetes operators to enforce custom policies or modify resources.

Advanced Audit

Kubernetes feature providing detailed logging of all requests processed by the API server for security and compliance.

Aggregated API Servers

Extension of the Kubernetes API server to include custom resources and functionalities without modifying core Kubernetes.

Aggregated ClusterRoles

Combination of multiple ClusterRoles into a single role, simplifying RBAC management in Kubernetes.

Air-gapped Registries

Container registries isolated from public networks, used in secure or restricted environments.

Akri

Open-source project for exposing heterogeneous leaf devices as resources in Kubernetes clusters.

Alertmanager Configuration

Setup and management of Prometheus Alertmanager for handling alerts from monitoring systems.

Amazon Elastic Container Registry (ECR)

Fully managed Docker container registry provided by AWS for storing, managing, and deploying container images.

Ambassador Pattern

Microservices design pattern where a dedicated service acts as an API gateway for other services.

Ambient Mesh

Service mesh implementation that doesn't require sidecars, reducing resource overhead and simplifying deployment.

Anchore Engine for Image Scanning

Open-source tool for deep inspection of container images, including vulnerability scanning and policy enforcement.

Ansible-based Operators

Kubernetes operators implemented using Ansible for automating application lifecycle management.

Antrea Network Policies

Network policies specific to the Antrea CNI plugin, offering fine-grained control over pod-to-pod communication.

Antrea for Open vSwitch-based Networking

Kubernetes networking solution using Open vSwitch for improved performance and advanced networking features.

Apache OpenWhisk

Open-source serverless platform that executes functions in response to events or direct invocations.

AppArmor Profiles

Security profiles for Linux that restrict program capabilities, enhancing container isolation and security.

Application-level Logging

Logging implemented within applications, providing detailed insights into application behavior and performance.

Aqua Security

Platform providing security and compliance for container-based and cloud-native applications throughout their lifecycle.

Aqua Security Platform

Comprehensive security solution for containerized and cloud-native environments, offering vulnerability management and runtime protection.

Argo CD

GitOps continuous delivery tool for Kubernetes, automating application deployment and lifecycle management.

Argo Rollouts

Kubernetes controller for advanced deployment strategies like canary and blue-green deployments.

ArgoCD

Declarative GitOps tool for Kubernetes, automating application deployment and synchronization with Git repositories.

Artifact Management

Process of storing, organizing, and managing container images and related artifacts in container registries.

Athenz for Fine-grained Access Control

Open-source platform for fine-grained access control and authentication in distributed systems.

Attribute-Based Access Control (ABAC)

Access control paradigm where authorization decisions are based on attributes of users, resources, and environment.

Audit Annotations

Additional metadata added to Kubernetes audit events for enhanced context and analysis, improving audit trails.

Audit Backends

Components responsible for processing and storing Kubernetes audit logs, supporting various storage and analysis options.

Audit Events

Records of requests and activities within a Kubernetes cluster, used for security monitoring and compliance.

Audit Levels

Configurable detail levels for Kubernetes audit logs, ranging from metadata-only to full request and response details.

Audit Logging

Process of recording API server requests and responses for security, troubleshooting, and compliance purposes.

Audit Logs

Detailed records of activities and operations within a Kubernetes cluster, used for security and compliance monitoring.

Audit Policy

Configuration defining which events should be recorded in Kubernetes audit logs and at what level of detail.

Audit Profile

Predefined set of audit policy rules for common use cases in Kubernetes, simplifying audit configuration.

Audit Stages

Different phases of request processing where audit events can be generated in Kubernetes, providing comprehensive auditing.

Audit Webhook Configuration

Setup for sending Kubernetes audit events to external webhook endpoints for processing or analysis.

Auditing

Process of systematically recording and examining activities within a Kubernetes cluster for security and compliance purposes.

Authenticating Proxy

Intermediary service that handles authentication before forwarding requests to the Kubernetes API server.

Authentication Modules

Pluggable components in container orchestration platforms for verifying user identities using various methods.

Authorization Policies

Rules defining access permissions for users and services in container orchestration platforms.

Azure Container Instances

Serverless container hosting service in Azure, offering rapid deployment of containers without cluster management.

Azure Container Registry

Managed Docker registry service for storing and managing container images in Azure cloud environments.

BGP (Border Gateway Protocol) in Containers

Implementation of Border Gateway Protocol within containerized network environments for advanced routing.

BGP in Container Networks

In container networks, BGP (Border Gateway Protocol) manages routing information between containers and external networks for efficient traffic routing.

Backend for Frontend (BFF) Pattern

Microservices design pattern where a dedicated service acts as an API gateway for specific frontend needs.

Backup and Restore

Processes for preserving and recovering container data and configurations in orchestration platforms.

Base Image

Foundation Docker image upon which other images are built, containing core OS and runtime components.

Base Image Selection

Process of choosing appropriate foundation images for container builds, balancing size, security, and functionality.

Best Effort QoS

Kubernetes quality of service class for pods with no resource guarantees, scheduled when resources are available.

Blue-Green Deployments

Deployment strategy using two identical environments to minimize downtime and risk during updates.

Bootstrap Tokens

Temporary tokens used for secure cluster initialization and node joining in Kubernetes, simplifying cluster setup.

Bottlerocket OS

Minimalist Linux-based operating system optimized for running containers in cloud environments.

BuildKit

Advanced container image building toolkit offering improved performance and caching capabilities.

BuildKit for Advanced Image Building

Use of BuildKit for efficient, concurrent, and cache-optimized container image creation, improving build performance.

Bulkhead Pattern

Isolation technique in microservices to contain failures and prevent system-wide cascading failures.

Bulkhead Pattern in Microservices

The Bulkhead Pattern in microservices isolates failures by dividing services into separate compartments, preventing issues in one from affecting others.

Burstable QoS

Kubernetes quality of service class for pods that can use more resources than requested when available.

CIS Benchmarks for Containers

Security configuration guidelines for deploying containers securely in various environments.

CNI Plugin Chaining

Technique of using multiple Container Network Interface plugins together for advanced networking capabilities.

CPU Manager

Kubernetes feature for fine-grained CPU resource management and allocation to containers, optimizing performance.

CPU Throttling

Technique to limit CPU usage of containers to prevent resource monopolization and ensure fair allocation.

CQRS (Command Query Responsibility Segregation)

Architectural pattern separating read and write operations in distributed systems, often used in microservices.

CQRS (Command Query Responsibility Segregation) Pattern

Architectural pattern separating read and write operations in distributed systems, often used in microservices.

CRI (Container Runtime Interface) Specification

Standard interface between container runtimes and Kubernetes, allowing pluggable runtime implementations.

CRI Image Management

Functionality within CRI for pulling, inspecting, and removing container images, standardizing image operations.

CRI Logging

Standardized logging interface for container runtimes implementing the Container Runtime Interface.

CRI Metrics

Performance and resource usage data exposed by container runtimes adhering to the CRI specification.

CRI Runtime Class

Kubernetes feature allowing selection of different runtime configurations for containers, enabling specialized runtimes.

CRI Socket

Unix domain socket used for communication between Kubelet and the CRI-compatible container runtime.

CRI Validation Testing

Process of verifying that a container runtime correctly implements the CRI specification, ensuring compatibility.

CRI-O

Lightweight container runtime specifically designed for Kubernetes, implementing the CRI specification.

CRI-O Internals

Core components and architecture of the CRI-O container runtime, including its interaction with Kubernetes.

CRI-O as Container Runtime

Use of CRI-O, a lightweight container runtime, as the primary runtime in a Kubernetes cluster.

CSI Controller Plugin

Component of CSI responsible for volume provisioning and attachment operations in container orchestration systems.

CSI Drivers

Plugins implementing the Container Storage Interface for various storage systems in Kubernetes.

CSI Ephemeral Volumes

Short-lived volumes in Kubernetes, created and deleted alongside a pod using CSI drivers, for temporary storage.

CSI Migration

Process of transitioning from in-tree volume plugins to CSI drivers in Kubernetes, improving storage extensibility.

CSI Node Plugin

Component of CSI responsible for mounting volumes and making them available to containers.

CSI Topology

Feature allowing storage provisioning based on topology constraints in Kubernetes, optimizing data locality.

Cache-Aside Pattern

Caching strategy where the application checks the cache before retrieving data from the main data store.

Caching Strategies for Containers

Techniques for implementing and managing caches in containerized applications for improved performance.

Calico

Open-source networking and network security solution for containers, providing a rich set of security policies.

Calico eBPF Datapath

High-performance networking mode in Calico using extended Berkeley Packet Filter for packet processing.

Canary Deployments

Technique of releasing new versions to a subset of users or servers to minimize risk and gather feedback.

Capabilities

Fine-grained privileges that can be assigned to containers, enhancing security by limiting root-level access.

Capability Controls

Mechanisms for managing and restricting Linux capabilities assigned to containers for improved security.

Categories

Groupings or classifications of container-related resources or components for easier management and discovery.

Ceph RBD

Ceph's block storage system, often used for persistent volumes in container orchestration platforms.