Engineering Glossary

From fundamental principles to cutting-edge practices, this glossary covers the full spectrum of software engineering terminology.

DevOps
Cloud Computing
Git
Containerization & Orchestration

Behaviour-Driven Design

Approach to software design that focuses on defining system behavior through examples and scenarios.
DevOps

Bento

Lightweight Docker-based development environments for PHP applications, simplifying local development setup.
DevOps

Berkshelf

Dependency manager for Chef cookbooks, simplifying the process of managing and versioning cookbook dependencies.
DevOps

Beta Testing

Pre-release testing phase where a sample of the intended audience tries the product to uncover any bugs or issues.
DevOps

Bitbucket

Web-based version control repository hosting service for Git and Mercurial projects, owned by Atlassian.
DevOps

Black Box Testing

Testing method where the internal structure/design of the item being tested is not known to the tester.
DevOps

Blameless Postmortem

Process of analyzing incidents or failures without assigning blame, focusing on learning and improvement.
DevOps

Blast Radius

Extent of damage or impact that could result from a failure or security breach in a system.
DevOps

Blue Green Deployment

Technique for releasing applications by shifting traffic between two identical environments running different versions.
DevOps

Blue Team

Group responsible for defending against and responding to cyber attacks in an organization.
DevOps

Bot Attack

Automated attempt by malicious actors to compromise systems or steal data using software programs (bots).
DevOps

Bot Management Tools

Solutions designed to detect, prevent, and mitigate bot-related threats to websites and applications.
DevOps

Bots

Automated software applications that run scripted tasks, often used in both beneficial and malicious contexts.
DevOps

Bottleneck

Point in a system where the flow of data or processes is constrained, limiting overall system performance.
DevOps

Bounded Context

Core concept in Domain-Driven Design, defining the limits within which a particular model is applicable.
DevOps

Branching

Creating a divergent copy of source code to develop features or fix bugs without affecting the main codebase.
DevOps

Broken Access Control

Security vulnerability where restrictions on authenticated users are not properly enforced.
DevOps

Broken Authentication

Security flaw allowing attackers to compromise passwords, keys, or session tokens to assume user identities.
DevOps

Broken Function Level Authorization

Vulnerability where an application does not restrict function access to appropriate users.
DevOps

Broken Object Level Authorization

Security issue where an application does not verify if the user has permission to access a specific object.
DevOps

Broken User Authentication

Security vulnerability where flaws in the authentication process allow unauthorized access to user accounts.
DevOps

Brooklyn

Framework for modeling, deploying, and managing distributed applications across cloud environments.
DevOps

Bucket

Container for storing objects in cloud storage services like Amazon S3 or Google Cloud Storage.
DevOps

Bug Bounty Program

Initiative offering rewards to individuals for discovering and reporting software bugs or vulnerabilities.
DevOps

Build

Process of converting source code files into standalone software artifacts that can be run on a computer.
DevOps

Build Agent

Component in a CI/CD system that executes build and test processes on behalf of the build server.
DevOps

Build Artifact Repository

Central storage location for managing and distributing software build outputs and dependencies.
DevOps

Build Automation

Process of scripting or automating the creation of compiled code and related processes.
DevOps

Build Cache

Mechanism to store and reuse the output of previous build steps to speed up subsequent builds.
DevOps

Build Pipelines

Automated processes for compiling, testing, and deploying code changes through various stages.
DevOps

Build Service

System that automates the process of compiling source code into executable programs.
DevOps

Build System

Set of tools and processes used to compile, assemble, and package software from source code.
DevOps

BuildMaster

Application release automation platform for creating and managing software delivery pipelines.
DevOps

Buildbot

Continuous integration framework written in Python, allowing automation of build, test, and release processes across multiple platforms.
DevOps

Business Acceptance

Process of verifying that a software solution meets the business requirements and is ready for use.
DevOps

Business Analytics (BA)

Practice of iterative exploration of an organization's data to gain insights and drive business planning.
DevOps

Business Intelligence (BI)

Technologies and practices for collecting, integrating, analyzing, and presenting business information.
DevOps

Business Logic Attack

Exploitation of flaws in the business logic of an application to perform unauthorized actions.
DevOps

CALMS Model

Framework for DevOps culture emphasizing Collaboration, Automation, Lean, Measurement, and Sharing.
DevOps

CASB

Cloud Access Security Broker; software that mediates between cloud service users and cloud applications.
DevOps

CD Pipeline

Continuous Delivery Pipeline; automated system for moving code changes through build, test, and deployment stages.
DevOps

CI Pipeline

Continuous Integration Pipeline; automated sequence of steps for building, testing, and validating code changes.
DevOps

CI Service

System that automates the integration of code changes from multiple contributors into a single software project.
DevOps

CI/CD (Continuous Integration and Continuous Delivery)

Continuous Integration and Continuous Delivery; practices of frequently integrating code changes and delivering to production.
DevOps

CI/CD Server

Platform that facilitates the automation of building, testing, and deploying code changes.
DevOps

CLI (Command Line Interface)

Command Line Interface; text-based interface for interacting with computer programs or operating systems.
DevOps

CMB (Cloud Message Bus)

Messaging infrastructure that enables communication between different parts of a cloud-based application.
DevOps

CPU Limit

Restriction on the amount of processing power allocated to a particular process or container.
DevOps

CRUD (Create, Read, Update and Delete)

Four basic functions of persistent storage, fundamental to database operations and RESTful API design.
DevOps

CaaS

Containers as a Service; cloud-based service that provides container orchestration and management.
DevOps

Cadence

Regular rhythm or pattern of work or processes, often used in the context of software development and release cycles.
DevOps

Canary Deployment

Technique of rolling out changes to a small subset of users before a full deployment.
DevOps

Canary Release

Gradual rollout of new features to a subset of users to test in production with reduced risk.
DevOps

Capacity Test

Performance test to determine how many users or transactions a system can handle before performance degrades.
DevOps

Capistrano

Remote server automation and deployment tool, primarily used for deploying web applications by scripting arbitrary deployment tasks.
DevOps

Certificate Authority (CA)

Trusted entity that issues digital certificates for secure communication over networks.
DevOps

CfEngine

Open-source configuration management system for managing large numbers of computers.
DevOps

Chain of Custody

Documentation of the movement and handling of evidence in security incidents or investigations.
DevOps

Change Failure Rate

Percentage of changes to production or released to users that result in degraded service or require remediation.
DevOps

Chaos Engineering

Practice of intentionally introducing failures in a system to test its resilience and identify weaknesses.
DevOps

Chaos Monkey

Tool developed by Netflix to randomly terminate instances in production to test system fault tolerance.
DevOps

Chaos Testing

Deliberate introduction of faults into a system to verify its ability to withstand turbulent conditions.
DevOps

ChatOps

Approach to managing IT operations and workflows through conversation-driven development.
DevOps

Chef

Configuration management tool that uses a pure-Ruby domain-specific language for writing system configurations.
DevOps

Chocolatey

Package manager for Windows, automating software installation, upgrade, and configuration.
DevOps

Clean Code Prinzipien

Set of principles aimed at producing readable, maintainable, and efficient code, promoting software quality and developer productivity.
DevOps

Click Fraud

Fraudulent clicks on pay-per-click advertisements to generate charges for advertisers.
DevOps

Clickjacking

Malicious technique of tricking users into clicking on hidden or disguised elements on a webpage.
DevOps

Client Side Attacks

Security threats that target vulnerabilities in web browsers or other client applications.
DevOps

Cloud Application

Software program where cloud-based and local components work together, primarily processed on remote servers.
DevOps

Cloud Automation

Use of tools and processes to reduce manual efforts in deploying and managing cloud computing workloads.
DevOps

Cloud Computing

Delivery of computing services over the internet, including servers, storage, databases, and software.
DevOps

Cloud Infrastructure

Hardware and software components required to support cloud computing delivery model.
DevOps

Cloud Infrastructure Security

Measures and controls to protect data, applications, and infrastructure associated with cloud computing.
DevOps

Cloud Management

Control and oversight of cloud computing resources, often through automated tools.
DevOps

Cloud Migration

Process of moving data, applications, or other business elements from an on-premises environment to the cloud.
DevOps

Cloud Native Computing Foundation (CNCF)

Organization promoting cloud native technologies and practices to shape the evolution of cloud computing.
DevOps

Cloud Native DevOps

Practices combining cloud native technologies with DevOps principles for faster, more flexible software delivery.
DevOps

Cloud Orchestration

Arrangement and coordination of automated tasks resulting in a consolidated process or workflow.
DevOps

Cloud Security Alliance (CSA)

Organization that defines best practices to help ensure a secure cloud computing environment.
DevOps

Cloud Security Monitoring

Continuous monitoring of cloud-based assets and services to detect security threats and vulnerabilities.
DevOps

Cloud Security Posture Management

Continuous monitoring of cloud infrastructure to identify misconfigurations and compliance risks.
DevOps

Cloud-native

Designed to take full advantage of cloud computing frameworks, beyond simple rehosting in the cloud.
DevOps

Cloud-native Security

Security practices and tools designed specifically for cloud-native applications and infrastructure.
DevOps

CloudWatch

Amazon Web Services' monitoring and observability service for cloud resources and applications.
DevOps

Code All Your Resources

Practice of managing all aspects of infrastructure and operations through code, enabling version control and automation.
DevOps

Code Dependencies

External libraries, modules, or packages that a software project relies on to function properly.
DevOps

Code Injection

Security vulnerability where an attacker inserts malicious code into a vulnerable application.
DevOps

Code Promotion

Process of moving code through various stages of development, testing, and deployment.
DevOps

Code Signing

Process of digitally signing executables and scripts to confirm the software author and guarantee it hasn't been altered.
DevOps

Code-first Workflow

Development approach where code is written before database schemas or other structures are defined.
DevOps

Coding Standards

Set of guidelines for programming style and practices within a project or organization.
DevOps

Cognitive Load

Mental effort required to learn new information or complete tasks, important in user experience design and learning theory.
DevOps

Collectd

System statistics collection daemon that collects, transfers, and stores performance data of computers and network equipment.
DevOps

Common Vulnerabilities and Exposures (CVE)

List of publicly disclosed cybersecurity vulnerabilities, providing a standardized identifier for known issues.
DevOps

Common Weakness Enumeration (CWE)

Comprehensive list of common software and hardware weakness types, serving as a common language for describing security vulnerabilities.
DevOps

Complex-Adaptive System (CAS)

System of interconnected components that can adapt and self-organize in response to changes.
DevOps

Complex-Adaptive Systems

Systems of interconnected components that can adapt and evolve in response to changes in their environment.
DevOps

Compliance

Adherence to laws, regulations, guidelines, and specifications relevant to a business.
DevOps

Compliance Level

Degree to which an organization meets regulatory or industry-specific requirements.
DevOps
index entry

index entry

A record in Git's index file representing the state of a file in the repository.
integration

integration

A connection between Git and other tools or services to enhance functionality and workflow.
key fingerprint

key fingerprint

A short sequence of bytes used to identify a longer public key in Git's GPG signing process.
keychain

keychain

A secure storage system for passwords and keys, often integrated with Git clients for credential management.
keyword

keyword

A reserved word in Git commands or configurations with a specific meaning or function.
label

label

A way to categorize and organize issues and pull requests in GitHub repositories.
license

license

A document in a Git repository specifying how the project can be used, modified, and distributed.
line comment

line comment

A feature in Git platforms allowing users to comment on specific lines of code in pull requests or commits.
line ending

line ending

Characters marking the end of a line, which can cause issues in Git when collaborating across different operating systems.
locked personal account

locked personal account

A GitHub account that has been restricted due to a violation of terms of service or suspicious activity.
main

main

The default name for the primary branch in many Git repositories, replacing 'master' in recent conventions.
management console

management console

An administrative interface for managing Git hosting services, often used in enterprise environments.
markup

markup

A system of annotation used to format text, often used in Git documentation and comments.
members graph

members graph

A visual representation of an organization's membership on Git hosting platforms.
merge conflict

merge conflict

A situation in Git where incompatible changes have been made to the same part of a file, requiring manual resolution.
milestone

milestone

A way to track progress on groups of issues or pull requests in GitHub projects.
mirror

mirror

A complete copy of a repository, including all branches and history, often used for backup or as a full replica.
nested team

nested team

A team within a GitHub organization that is a subset of a larger team, inheriting its permissions.
network graph

network graph

A visual representation of the commit history and branch structure of a Git repository.
news feed

news feed

A personalized list of recent activity on Git platforms, showing updates from followed users and repositories.
non-fast-forward

non-fast-forward

A Git push that introduces new commits to the remote branch that aren't direct descendants of the current remote HEAD.
notification

notification

An alert system on Git platforms to inform users about relevant activities and mentions.
object

object

A fundamental unit in Git's data model, representing content, commits, trees, or tags, identified by a unique SHA-1 hash.
object database

object database

The storage system in Git that contains all versions of project files and metadata, organized by SHA-1 hashes.
object identifier (oid)

object identifier (oid)

A unique SHA-1 hash that identifies a Git object, ensuring data integrity and enabling content-addressable storage.
object name

object name

Another term for the SHA-1 hash that uniquely identifies a Git object in the repository.
object type

object type

The classification of Git objects, including blob (file content), tree (directory structure), commit, and tag.
octopus

octopus

A Git merge involving more than two branches simultaneously, creating a commit with multiple parents.
organization

organization

A shared account on Git hosting platforms where businesses and open-source projects can collaborate across many projects.
organization owner

organization owner

A user with administrative privileges for an organization account on Git hosting platforms.
orphan

orphan

A branch in Git with no parent commit, typically used to start a new history unrelated to existing branches.
outside collaborator

outside collaborator

A user granted access to a repository but not a member of the organization that owns the repository.
overlay

overlay

A Git feature that allows files from one branch to temporarily override files in another branch without merging.
owner

owner

The user or organization with administrative rights to a Git repository, controlling access and settings.
pack

pack

A compressed file format used by Git to store multiple objects efficiently, reducing repository size.
pack index

pack index

A file that provides fast random access to objects stored within a packfile in Git.
parent

parent

A commit from which another commit is derived, establishing the hierarchical relationship in Git history.
parent team

parent team

A team in a Git platform that grants its permissions to nested sub-teams within an organization.
participating notifications

participating notifications

Alerts received when you're directly involved in repository activities like being assigned or mentioned.
pathspec

pathspec

A pattern used in Git commands to limit the scope of operations to specific files or directories.
peel

peel

The process of recursively dereferencing a Git object to reveal its underlying object type.
per-worktree ref

per-worktree ref

A reference specific to a particular working tree in a Git repository with multiple worktrees.
permalink

permalink

A URL that points to a specific version of a file or directory in a Git repository, ensuring consistent reference.
personal account

personal account

An individual account on Git platforms, used for personal projects and contributions.
pickaxe

pickaxe

A Git feature for searching the repository history to find when a particular change was introduced.
pinned repository

pinned repository

A featured repository prominently displayed on a user's or organization's profile page on their Git hosting platform of choice.
plumbing

plumbing

Low-level Git commands that expose internal workings, primarily used for scripting and advanced operations.
porcelain

porcelain

High-level Git commands designed for everyday use, providing a user-friendly interface to common version control tasks.
pre-receive hooks

pre-receive hooks

Server-side scripts that run before pushed commits are accepted, used to enforce policies or perform checks.
primary email address

primary email address

The main email associated with a Git account, used for communications and commit author identification.
private contributions

private contributions

Contributions made to private repositories, typically only visible to repository collaborators.
private repository

private repository

A Git repository with restricted access, visible only to the owner and explicitly granted collaborators.
production branch

production branch

A Git branch that represents the stable, deployed version of a project, often protected from direct changes.
profile

profile

A user's public page on a Git platform, displaying information about their activity and repositories.
profile photo

profile photo

An image representing a user on a Git platform, displayed alongside their contributions and activities.
project board

project board

A kanban-style board in Git platforms for organizing and prioritizing project issues and pull requests.
protected branch

protected branch

A branch with rules enforcing certain conditions before changes can be pushed, merged, or deleted.
pseudoref

pseudoref

A Git reference that doesn't follow the standard refs format but is treated similarly, like HEAD or MERGE_HEAD.
public contributions

public contributions

Contributions made to public repositories, visible on a user's profile and activity feed.
public repository

public repository

A Git repository that is openly accessible to anyone, allowing viewing and often cloning without authentication.
pull access

pull access

Permission level in Git allowing a user to clone a repository and fetch updates, but not push changes.
pull request review

pull request review

The process of examining proposed changes in a pull request before they are merged into the main codebase.
pulse graph

pulse graph

A visual representation of a GitHub repository's recent activity, including commits, issues, and pull requests.
punch graph

punch graph

A visualization of commit frequency over time, often displayed as a heatmap on Git platforms.
push a branch

push a branch

The act of uploading commits from a local branch to a corresponding branch in a remote Git repository.
push access

push access

Permission to upload local changes to a remote Git repository, allowing direct modification of shared branches.
reachability bitmaps

reachability bitmaps

Data structures used to optimize Git operations by quickly determining which objects are reachable from a given commit.
reachable

reachable

Git objects that can be accessed by following the commit history from a given reference point.
read access

read access

Permission to view and clone a Git repository without the ability to make changes or push commits.
recovery code

recovery code

A backup method for accessing a Git account if two-factor authentication is enabled but unavailable.
ref

ref

A name that points to a specific Git object, typically a commit, such as branches or tags.
refs

refs

The collection of references in a Git repository, including branches, tags, and other named pointers to commits.
remote URL

remote URL

The address of a remote Git repository, used for fetching and pushing changes between local and remote repositories.
remote repository

remote repository

A version of a Git project hosted on a server, serving as a central point for collaboration and backup.
remote-tracking branch

remote-tracking branch

A local reference that represents the state of a corresponding branch in a remote repository.
replica

replica

A copy of a Git repository, often used in distributed systems for redundancy and load balancing.
repository cache

repository cache

A local storage of repository data used to improve performance in Git operations.
repository graph

repository graph

A visual representation of the commit history and branch structure in a Git repository.
repository maintainer

repository maintainer

A person responsible for managing a Git repository, reviewing contributions, and maintaining project quality.
required pull request review

required pull request review

A protection rule requiring one or more reviewers to approve changes before merging in Git platforms.
required status check

required status check

A condition that must be met, such as passing tests, before changes can be merged into a protected branch.
resolve

resolve

The process of addressing and fixing merge conflicts in Git, typically done manually by the developer.
revert

revert

A Git operation that creates a new commit that undoes the changes made by a previous commit.
review

review

The process of examining proposed changes in a pull request before merging them into the main codebase.
revision

revision

A specific version of a file, directory, or entire repository in Git, often referenced by a commit hash.
rewind

rewind

The act of moving a branch pointer to an earlier commit in Git, effectively undoing more recent commits.
root directory

root directory

The top-level directory of a Git repository, containing all project files and the .git subdirectory.
root filesystem

root filesystem

The base filesystem of a Git repository, from which all other directories and files are organized.
saved reply

saved reply

A pre-written response that can be quickly inserted into issues or pull request comments on Git platforms.
scope

scope

The range of access or permissions granted to a token or application in Git-based systems.
seat

seat

A licensed user in enterprise Git hosting plans, typically representing a single user account.
secret team

secret team

A team in a Git organization that is hidden from non-members and other teams within the organization.
security log

security log

A record of security-related events and actions in a system, used for monitoring and auditing purposes.
server-to-server request

server-to-server request

An authenticated request between Git servers, often used in integrations or automated processes.
service hook

service hook

A mechanism for Git platforms to send event notifications to external services or applications.
shallow repository

shallow repository

A Git repository with an intentionally truncated history, often created through shallow cloning.
single sign-on

single sign-on

An authentication process allowing users to access multiple Git-related services with one set of credentials.
special ref

special ref

A Git reference with a specific meaning or function, such as HEAD or FETCH_HEAD.
staging instance

staging instance

A deployment environment used for testing changes before releasing to production in Git-based workflows.
star

star

A feature on Git hosting platforms allowing users to bookmark repositories of interest.

Edge ML

Machine learning models deployed and executed on edge devices, often with cloud-based training or updates.

Edge Model Compression

Techniques for reducing the size of AI models to run efficiently on resource-constrained edge devices.

Edge Natural Language Processing

Performing text analysis and language understanding tasks on edge devices with cloud support.

Edge Orchestration

Managing and coordinating distributed edge computing resources and their interaction with the cloud.

Edge Predictive Maintenance

Using AI on edge devices to forecast equipment failures, with cloud-based model updates and analysis.

Edge Reinforcement Learning

Training AI agents on edge devices through interaction with the environment, supported by cloud resources.

Edge Security

Measures to protect data, devices, and applications at the network edge in cloud-connected systems.

Edge Service Mesh

Distributed network layer for managing service-to-service communication in edge computing environments.

Edge Storage

Data storage systems designed for edge devices with intermittent connectivity to cloud backends.

Edge Transfer Learning

Applying knowledge from pre-trained cloud models to new tasks on edge devices with limited data.

Edge-Native Development

Creating applications specifically designed to run on edge devices with cloud integration capabilities.

Edge-native Programming Models

Software development paradigms optimized for creating applications that run on edge devices.

Edge-to-Cloud Continuum

Seamless integration of edge computing resources with centralized cloud infrastructure and services.

Egress-only Internet Gateway

Cloud networking component allowing outbound internet communication while blocking inbound traffic.

Elastic Beanstalk (AWS)

Fully managed service for deploying and scaling web applications and services on AWS infrastructure.

Elastic IP

Static public IP address that can be dynamically assigned to cloud resources, providing consistent access points for applications.

Elastic Network Interface (ENI)

Virtual network interface that can be attached to instances in a VPC, providing flexible networking capabilities.

Elastic Network Interfaces

Virtual network cards that can be attached, detached, and moved between cloud instances.

Embedded Analytics

Integration of analytical capabilities directly into cloud-based applications and workflows.

Emotion AI Cloud Services

Cloud-based platforms for analyzing and responding to human emotions in various applications.

Emotional AI-driven Cloud Interfaces

Cloud services using AI to detect and respond to user emotions for enhanced interactions.

Encryption (at rest and in transit)

Protecting data by encoding it both when stored and while moving between cloud systems.

Encryption at Rest and in Transit

Techniques for securing data both when stored in cloud systems and while being transmitted.

Energy-Aware Auto-Scaling

Cloud resource scaling that considers energy consumption alongside performance metrics.

Energy-Aware Scheduling

Allocating cloud resources to tasks with consideration for energy consumption and efficiency.

Energy-Efficient Algorithms

Computing methods designed to minimize energy consumption in cloud environments.

Energy-aware Cloud Scheduling

Allocating cloud resources to optimize energy efficiency while meeting performance requirements.

Environmental, Social, and Governance (ESG) Cloud Reporting

Documenting cloud providers' sustainability and ethical practices for stakeholder transparency.

Envoy Proxy

Open-source edge and service proxy designed for cloud-native applications, providing features like load balancing and observability.

Ethical AI Guidelines Compliance

Adherence to principles ensuring fair and responsible use of AI in cloud environments.

Event Grid (Azure)

Fully managed event routing service for building event-driven applications in Azure.

Event Sourcing

Storing the state of a system as a sequence of events in cloud-based applications.

Event Stream Processing

Real-time analysis of data streams in cloud environments for immediate insights.

Event-Driven Architecture

System design where actions are triggered by events in cloud environments, enabling responsive and scalable applications.

Event-Driven Integration

Connecting cloud services and applications based on event occurrences, enabling real-time data flow and processing.

Event-driven APIs

APIs that trigger or respond to events in cloud-native applications, enabling real-time data processing and integration.

Event-driven Programming Models

Developing cloud applications that respond to and generate events, enabling reactive and scalable architectures.

EventBridge (AWS)

Serverless event bus for building event-driven applications in AWS, facilitating communication between various services.

Eventual Consistency

Data consistency model where all replicas eventually reach a consistent state in distributed cloud systems.

Exascale Cloud Computing

Cloud systems capable of at least one exaFLOPS, or a billion billion calculations per second.

Execution Environment

The runtime context in which cloud functions or applications operate, including libraries, dependencies, and configurations.

Experiment Tracking

Monitoring and recording parameters and results of machine learning experiments in cloud environments.

Explainable AI (XAI) Platforms

Cloud services for making AI decision-making processes more transparent and interpretable.

Explainable AI Frameworks

Tools for developing AI models with transparent decision-making processes in cloud environments.

Explainable AI Platforms

Cloud services offering tools to make AI models' decision-making processes more understandable.

ExpressRoute (Azure)

Service for creating private connections between Azure datacenters and on-premises infrastructure.

Extract, Load, Transform (ELT)

Data integration process where transformation occurs after loading data into the cloud target system.

Extract, Transform, Load (ETL)

Process of extracting data from sources, transforming it to fit operational needs, and loading into a target database in the cloud.

Far-Edge Computing

Extending cloud capabilities to devices at the extreme edge of the network, like IoT sensors.

Feature Flag Management

Tools for dynamically enabling or disabling features in cloud applications without code deployments.

Feature Store

Centralized repository for storing, managing, and serving machine learning features in cloud environments.

Federated Analytics

Analyzing data across multiple cloud or edge locations without centralizing the raw data.

Federated Databases

System allowing integrated data access across multiple autonomous database management systems in the cloud.

Federated Learning

Machine learning technique that trains algorithms across decentralized devices or servers holding local data samples.

Federated Learning Orchestration

Coordinating federated learning processes across multiple edge devices or cloud nodes.

Federated Learning Platforms

Cloud-based systems for implementing and managing federated learning across distributed datasets.

Federated Learning at the Edge

Applying federated learning techniques to train models on edge devices connected to cloud systems.

Federated Query Engines

Tools for executing queries across multiple distributed databases or data sources in cloud environments.

File Storage

Cloud service for storing and accessing file data through shared file systems, providing scalable and manageable data storage.

File Storage (e.g., Amazon EFS, Azure Files)

Cloud services providing scalable file storage accessible from multiple compute instances.

FinOps Automation

Tools and processes for automating financial operations and optimization in cloud environments.

FinOps Operating Model

Framework for managing and optimizing cloud costs across an organization, aligning financial and operational goals.

FinOps Optimization Engines

AI-driven tools for continuously optimizing cloud spend and resource allocation.

Firewall

Security system that monitors and controls incoming and outgoing network traffic in cloud environments.

Fission

Open-source, Kubernetes-native serverless framework for building microservices in the cloud, simplifying application deployment.

Fog Computing

Extending cloud computing to the edge of the network, bringing processing closer to data sources.

Forecasting

Using historical data and algorithms to predict future trends or values in cloud-based analytics.

Fully Homomorphic Encryption (FHE) Services

Cloud-based encryption allowing computations on encrypted data without decryption.

Function Composition Frameworks

Tools for building complex serverless applications by combining multiple cloud functions.

Function as a Service (FaaS)

Cloud computing model where developers run and manage application functionalities without complex infrastructure.

GDPR Compliance in the Cloud

Adhering to EU data protection regulations in cloud-based data processing and storage.

GPU Instances

Cloud compute instances equipped with Graphics Processing Units for parallel processing tasks.

Generative AI Platforms

Cloud-based services for creating AI models that can generate new content or data.

Geospatial Data Processing at Scale

Cloud-based systems for analyzing large volumes of location-based data efficiently.

Gesture-based Cloud Interfaces

User interfaces that interpret hand or body movements to interact with cloud services.

GitOps Workflows

Methodology using Git repositories as the source of truth for declarative infrastructure and applications in the cloud.

Global Accelerator

Service that improves availability and performance of applications by optimizing traffic routing across cloud regions.

Globally Distributed Databases

Database systems that replicate and distribute data across multiple geographic locations in the cloud.

Google Cloud Organization Policy

Rules and constraints applied to resources within a Google Cloud organization, enforcing governance and compliance.

Graph Analytics Platforms

Cloud services for analyzing and visualizing complex relationships in large datasets using graph structures.

Graph Databases

NoSQL databases designed to store and query data with complex relationships in cloud environments.

Green Cloud Computing

Practices and technologies aimed at reducing the environmental impact of cloud data centers and operations.

Green Software Engineering

Practices for developing cloud software that minimizes energy consumption and environmental impact.

Green Software Engineering Practices

Techniques for developing cloud applications that optimize resource usage and reduce environmental impact.

HIPAA Compliance in the Cloud

Adhering to US healthcare data protection regulations in cloud-based systems and applications.

Haptic Feedback over the Cloud

Transmitting touch and motion sensations through cloud-connected devices for immersive experiences.

Health Checks

Automated tests to verify the availability and proper functioning of cloud resources and services.

Heat Reuse from Data Centers

Utilizing excess heat generated by cloud data centers for other purposes, improving energy efficiency.

Helm Charts

Packages of pre-configured Kubernetes resources for deploying applications in cloud environments.

Heterogeneous Distributed Databases

Systems managing data across diverse database types and locations in cloud environments.

High-Performance Computing (HPC)

Using cloud resources for solving complex computational problems requiring significant processing power.

Holographic Cloud Interfaces

Advanced 3D visualization interfaces for interacting with cloud services and data.

Holographic Data Centers

Conceptual cloud data centers using holographic technology for data storage and processing.

Holographic Data Storage

Experimental technology using holograms to store data in cloud environments, potentially offering high density.

Holographic Storage

Experimental data storage technique using holograms in cloud systems for high-density, long-term preservation.

Homomorphic Encryption Services

Cloud-based offerings that enable computations on encrypted data without decryption.

Homomorphic Encryption as a Service

Cloud-based service offering encryption that allows computations on encrypted data.

Homomorphic Encryption in the Cloud

Encryption technique allowing computations on encrypted data without decryption in cloud environments.

Horizontal Scaling (Scale Out)

Adding more machines to a cloud system to distribute load and increase capacity.

Human-Robot Interaction in the Cloud

Cloud-based systems facilitating communication between humans and robots or AI agents.

5G MEC Integration

Integration of 5G mobile edge computing with container platforms for low-latency applications and services at network edges.

AIOps for Container Environments

Application of AI and machine learning for automated operations, monitoring, and management of containerized environments.

API Deprecation Policy

Guidelines for phasing out older API versions in Kubernetes, ensuring smooth transitions for users.

API Extensions

Mechanisms to extend the Kubernetes API with custom resources and functionalities, enhancing platform capabilities.

API Gateway Pattern

Containerized service that acts as a single entry point for all client requests to a microservices architecture.

API Server

Core component of Kubernetes that exposes the cluster's API and handles all administrative operations.

API Server Aggregation

Kubernetes feature allowing the API server to be extended with additional APIs without modifying core Kubernetes code.

API-First Development

Approach prioritizing API design before implementation, crucial for developing scalable containerized microservices.

AWS Fargate

Serverless compute engine for containers, allowing you to run containers without managing the underlying infrastructure.

Adapter Pattern

Design pattern in containerized microservices that wraps a service's interface to make it compatible with other services.

Admission Controllers

Plugins that intercept requests to the Kubernetes API server before object persistence, enforcing policies or modifying objects.

Admission Controllers for Security

Admission controllers specifically focused on enforcing security policies and validating security-related configurations.

Admission Webhooks

HTTP callbacks that receive admission requests and can modify or validate objects before they are persisted.

Admission Webhooks in Operators

Use of admission webhooks within Kubernetes operators to enforce custom policies or modify resources.

Advanced Audit

Kubernetes feature providing detailed logging of all requests processed by the API server for security and compliance.

Aggregated API Servers

Extension of the Kubernetes API server to include custom resources and functionalities without modifying core Kubernetes.

Aggregated ClusterRoles

Combination of multiple ClusterRoles into a single role, simplifying RBAC management in Kubernetes.

Air-gapped Registries

Container registries isolated from public networks, used in secure or restricted environments.

Akri

Open-source project for exposing heterogeneous leaf devices as resources in Kubernetes clusters.

Alertmanager Configuration

Setup and management of Prometheus Alertmanager for handling alerts from monitoring systems.

Amazon Elastic Container Registry (ECR)

Fully managed Docker container registry provided by AWS for storing, managing, and deploying container images.

Ambassador Pattern

Microservices design pattern where a dedicated service acts as an API gateway for other services.

Ambient Mesh

Service mesh implementation that doesn't require sidecars, reducing resource overhead and simplifying deployment.

Anchore Engine for Image Scanning

Open-source tool for deep inspection of container images, including vulnerability scanning and policy enforcement.

Ansible-based Operators

Kubernetes operators implemented using Ansible for automating application lifecycle management.

Antrea Network Policies

Network policies specific to the Antrea CNI plugin, offering fine-grained control over pod-to-pod communication.

Antrea for Open vSwitch-based Networking

Kubernetes networking solution using Open vSwitch for improved performance and advanced networking features.

Apache OpenWhisk

Open-source serverless platform that executes functions in response to events or direct invocations.

AppArmor Profiles

Security profiles for Linux that restrict program capabilities, enhancing container isolation and security.

Application-level Logging

Logging implemented within applications, providing detailed insights into application behavior and performance.

Aqua Security

Platform providing security and compliance for container-based and cloud-native applications throughout their lifecycle.

Aqua Security Platform

Comprehensive security solution for containerized and cloud-native environments, offering vulnerability management and runtime protection.

Argo CD

GitOps continuous delivery tool for Kubernetes, automating application deployment and lifecycle management.

Argo Rollouts

Kubernetes controller for advanced deployment strategies like canary and blue-green deployments.

ArgoCD

Declarative GitOps tool for Kubernetes, automating application deployment and synchronization with Git repositories.

Artifact Management

Process of storing, organizing, and managing container images and related artifacts in container registries.

Athenz for Fine-grained Access Control

Open-source platform for fine-grained access control and authentication in distributed systems.

Attribute-Based Access Control (ABAC)

Access control paradigm where authorization decisions are based on attributes of users, resources, and environment.

Audit Annotations

Additional metadata added to Kubernetes audit events for enhanced context and analysis, improving audit trails.

Audit Backends

Components responsible for processing and storing Kubernetes audit logs, supporting various storage and analysis options.

Audit Events

Records of requests and activities within a Kubernetes cluster, used for security monitoring and compliance.

Audit Levels

Configurable detail levels for Kubernetes audit logs, ranging from metadata-only to full request and response details.

Audit Logging

Process of recording API server requests and responses for security, troubleshooting, and compliance purposes.

Audit Logs

Detailed records of activities and operations within a Kubernetes cluster, used for security and compliance monitoring.

Audit Policy

Configuration defining which events should be recorded in Kubernetes audit logs and at what level of detail.

Audit Profile

Predefined set of audit policy rules for common use cases in Kubernetes, simplifying audit configuration.

Audit Stages

Different phases of request processing where audit events can be generated in Kubernetes, providing comprehensive auditing.

Audit Webhook Configuration

Setup for sending Kubernetes audit events to external webhook endpoints for processing or analysis.

Auditing

Process of systematically recording and examining activities within a Kubernetes cluster for security and compliance purposes.

Authenticating Proxy

Intermediary service that handles authentication before forwarding requests to the Kubernetes API server.

Authentication Modules

Pluggable components in container orchestration platforms for verifying user identities using various methods.

Authorization Policies

Rules defining access permissions for users and services in container orchestration platforms.

Azure Container Instances

Serverless container hosting service in Azure, offering rapid deployment of containers without cluster management.

Azure Container Registry

Managed Docker registry service for storing and managing container images in Azure cloud environments.

BGP (Border Gateway Protocol) in Containers

Implementation of Border Gateway Protocol within containerized network environments for advanced routing.

BGP in Container Networks

In container networks, BGP (Border Gateway Protocol) manages routing information between containers and external networks for efficient traffic routing.

Backend for Frontend (BFF) Pattern

Microservices design pattern where a dedicated service acts as an API gateway for specific frontend needs.

Backup and Restore

Processes for preserving and recovering container data and configurations in orchestration platforms.

Base Image

Foundation Docker image upon which other images are built, containing core OS and runtime components.

Base Image Selection

Process of choosing appropriate foundation images for container builds, balancing size, security, and functionality.

Best Effort QoS

Kubernetes quality of service class for pods with no resource guarantees, scheduled when resources are available.

Blue-Green Deployments

Deployment strategy using two identical environments to minimize downtime and risk during updates.

Bootstrap Tokens

Temporary tokens used for secure cluster initialization and node joining in Kubernetes, simplifying cluster setup.

Bottlerocket OS

Minimalist Linux-based operating system optimized for running containers in cloud environments.

BuildKit

Advanced container image building toolkit offering improved performance and caching capabilities.

BuildKit for Advanced Image Building

Use of BuildKit for efficient, concurrent, and cache-optimized container image creation, improving build performance.

Bulkhead Pattern

Isolation technique in microservices to contain failures and prevent system-wide cascading failures.

Bulkhead Pattern in Microservices

The Bulkhead Pattern in microservices isolates failures by dividing services into separate compartments, preventing issues in one from affecting others.

Burstable QoS

Kubernetes quality of service class for pods that can use more resources than requested when available.

CIS Benchmarks for Containers

Security configuration guidelines for deploying containers securely in various environments.

CNI Plugin Chaining

Technique of using multiple Container Network Interface plugins together for advanced networking capabilities.

CPU Manager

Kubernetes feature for fine-grained CPU resource management and allocation to containers, optimizing performance.

CPU Throttling

Technique to limit CPU usage of containers to prevent resource monopolization and ensure fair allocation.

CQRS (Command Query Responsibility Segregation)

Architectural pattern separating read and write operations in distributed systems, often used in microservices.

CQRS (Command Query Responsibility Segregation) Pattern

Architectural pattern separating read and write operations in distributed systems, often used in microservices.

CRI (Container Runtime Interface) Specification

Standard interface between container runtimes and Kubernetes, allowing pluggable runtime implementations.

CRI Image Management

Functionality within CRI for pulling, inspecting, and removing container images, standardizing image operations.

CRI Logging

Standardized logging interface for container runtimes implementing the Container Runtime Interface.

CRI Metrics

Performance and resource usage data exposed by container runtimes adhering to the CRI specification.

CRI Runtime Class

Kubernetes feature allowing selection of different runtime configurations for containers, enabling specialized runtimes.

CRI Socket

Unix domain socket used for communication between Kubelet and the CRI-compatible container runtime.

CRI Validation Testing

Process of verifying that a container runtime correctly implements the CRI specification, ensuring compatibility.

CRI-O

Lightweight container runtime specifically designed for Kubernetes, implementing the CRI specification.

CRI-O Internals

Core components and architecture of the CRI-O container runtime, including its interaction with Kubernetes.

CRI-O as Container Runtime

Use of CRI-O, a lightweight container runtime, as the primary runtime in a Kubernetes cluster.

CSI Controller Plugin

Component of CSI responsible for volume provisioning and attachment operations in container orchestration systems.

CSI Drivers

Plugins implementing the Container Storage Interface for various storage systems in Kubernetes.

CSI Ephemeral Volumes

Short-lived volumes in Kubernetes, created and deleted alongside a pod using CSI drivers, for temporary storage.

CSI Migration

Process of transitioning from in-tree volume plugins to CSI drivers in Kubernetes, improving storage extensibility.

CSI Node Plugin

Component of CSI responsible for mounting volumes and making them available to containers.

CSI Topology

Feature allowing storage provisioning based on topology constraints in Kubernetes, optimizing data locality.

Cache-Aside Pattern

Caching strategy where the application checks the cache before retrieving data from the main data store.

Caching Strategies for Containers

Techniques for implementing and managing caches in containerized applications for improved performance.

Calico

Open-source networking and network security solution for containers, providing a rich set of security policies.

Calico eBPF Datapath

High-performance networking mode in Calico using extended Berkeley Packet Filter for packet processing.

Canary Deployments

Technique of releasing new versions to a subset of users or servers to minimize risk and gather feedback.

Capabilities

Fine-grained privileges that can be assigned to containers, enhancing security by limiting root-level access.

Capability Controls

Mechanisms for managing and restricting Linux capabilities assigned to containers for improved security.

Categories

Groupings or classifications of container-related resources or components for easier management and discovery.

Ceph RBD

Ceph's block storage system, often used for persistent volumes in container orchestration platforms.