Engineering Glossary

From fundamental principles to cutting-edge practices, this glossary covers the full spectrum of software engineering terminology.

DevOps
Cloud Computing
Git
Containerization & Orchestration

Behaviour-Driven Design

Approach to software design that focuses on defining system behavior through examples and scenarios.
DevOps

Bento

Lightweight Docker-based development environments for PHP applications, simplifying local development setup.
DevOps

Berkshelf

Dependency manager for Chef cookbooks, simplifying the process of managing and versioning cookbook dependencies.
DevOps

Beta Testing

Pre-release testing phase where a sample of the intended audience tries the product to uncover any bugs or issues.
DevOps

Bitbucket

Web-based version control repository hosting service for Git and Mercurial projects, owned by Atlassian.
DevOps

Black Box Testing

Testing method where the internal structure/design of the item being tested is not known to the tester.
DevOps

Blameless Postmortem

Process of analyzing incidents or failures without assigning blame, focusing on learning and improvement.
DevOps

Blast Radius

Extent of damage or impact that could result from a failure or security breach in a system.
DevOps

Blue Green Deployment

Technique for releasing applications by shifting traffic between two identical environments running different versions.
DevOps

Blue Team

Group responsible for defending against and responding to cyber attacks in an organization.
DevOps

Bot Attack

Automated attempt by malicious actors to compromise systems or steal data using software programs (bots).
DevOps

Bot Management Tools

Solutions designed to detect, prevent, and mitigate bot-related threats to websites and applications.
DevOps

Bots

Automated software applications that run scripted tasks, often used in both beneficial and malicious contexts.
DevOps

Bottleneck

Point in a system where the flow of data or processes is constrained, limiting overall system performance.
DevOps

Bounded Context

Core concept in Domain-Driven Design, defining the limits within which a particular model is applicable.
DevOps

Branching

Creating a divergent copy of source code to develop features or fix bugs without affecting the main codebase.
DevOps

Broken Access Control

Security vulnerability where restrictions on authenticated users are not properly enforced.
DevOps

Broken Authentication

Security flaw allowing attackers to compromise passwords, keys, or session tokens to assume user identities.
DevOps

Broken Function Level Authorization

Vulnerability where an application does not restrict function access to appropriate users.
DevOps

Broken Object Level Authorization

Security issue where an application does not verify if the user has permission to access a specific object.
DevOps

Broken User Authentication

Security vulnerability where flaws in the authentication process allow unauthorized access to user accounts.
DevOps

Brooklyn

Framework for modeling, deploying, and managing distributed applications across cloud environments.
DevOps

Bucket

Container for storing objects in cloud storage services like Amazon S3 or Google Cloud Storage.
DevOps

Bug Bounty Program

Initiative offering rewards to individuals for discovering and reporting software bugs or vulnerabilities.
DevOps

Build

Process of converting source code files into standalone software artifacts that can be run on a computer.
DevOps

Build Agent

Component in a CI/CD system that executes build and test processes on behalf of the build server.
DevOps

Build Artifact Repository

Central storage location for managing and distributing software build outputs and dependencies.
DevOps

Build Automation

Process of scripting or automating the creation of compiled code and related processes.
DevOps

Build Cache

Mechanism to store and reuse the output of previous build steps to speed up subsequent builds.
DevOps

Build Pipelines

Automated processes for compiling, testing, and deploying code changes through various stages.
DevOps

Build Service

System that automates the process of compiling source code into executable programs.
DevOps

Build System

Set of tools and processes used to compile, assemble, and package software from source code.
DevOps

BuildMaster

Application release automation platform for creating and managing software delivery pipelines.
DevOps

Buildbot

Continuous integration framework written in Python, allowing automation of build, test, and release processes across multiple platforms.
DevOps

Business Acceptance

Process of verifying that a software solution meets the business requirements and is ready for use.
DevOps

Business Analytics (BA)

Practice of iterative exploration of an organization's data to gain insights and drive business planning.
DevOps

Business Intelligence (BI)

Technologies and practices for collecting, integrating, analyzing, and presenting business information.
DevOps

Business Logic Attack

Exploitation of flaws in the business logic of an application to perform unauthorized actions.
DevOps

CALMS Model

Framework for DevOps culture emphasizing Collaboration, Automation, Lean, Measurement, and Sharing.
DevOps

CASB

Cloud Access Security Broker; software that mediates between cloud service users and cloud applications.
DevOps

CD Pipeline

Continuous Delivery Pipeline; automated system for moving code changes through build, test, and deployment stages.
DevOps

CI Pipeline

Continuous Integration Pipeline; automated sequence of steps for building, testing, and validating code changes.
DevOps

CI Service

System that automates the integration of code changes from multiple contributors into a single software project.
DevOps

CI/CD (Continuous Integration and Continuous Delivery)

Continuous Integration and Continuous Delivery; practices of frequently integrating code changes and delivering to production.
DevOps

CI/CD Server

Platform that facilitates the automation of building, testing, and deploying code changes.
DevOps

CLI (Command Line Interface)

Command Line Interface; text-based interface for interacting with computer programs or operating systems.
DevOps

CMB (Cloud Message Bus)

Messaging infrastructure that enables communication between different parts of a cloud-based application.
DevOps

CPU Limit

Restriction on the amount of processing power allocated to a particular process or container.
DevOps

CRUD (Create, Read, Update and Delete)

Four basic functions of persistent storage, fundamental to database operations and RESTful API design.
DevOps

CaaS

Containers as a Service; cloud-based service that provides container orchestration and management.
DevOps

Cadence

Regular rhythm or pattern of work or processes, often used in the context of software development and release cycles.
DevOps

Canary Deployment

Technique of rolling out changes to a small subset of users before a full deployment.
DevOps

Canary Release

Gradual rollout of new features to a subset of users to test in production with reduced risk.
DevOps

Capacity Test

Performance test to determine how many users or transactions a system can handle before performance degrades.
DevOps

Capistrano

Remote server automation and deployment tool, primarily used for deploying web applications by scripting arbitrary deployment tasks.
DevOps

Certificate Authority (CA)

Trusted entity that issues digital certificates for secure communication over networks.
DevOps

CfEngine

Open-source configuration management system for managing large numbers of computers.
DevOps

Chain of Custody

Documentation of the movement and handling of evidence in security incidents or investigations.
DevOps

Change Failure Rate

Percentage of changes to production or released to users that result in degraded service or require remediation.
DevOps

Chaos Engineering

Practice of intentionally introducing failures in a system to test its resilience and identify weaknesses.
DevOps

Chaos Monkey

Tool developed by Netflix to randomly terminate instances in production to test system fault tolerance.
DevOps

Chaos Testing

Deliberate introduction of faults into a system to verify its ability to withstand turbulent conditions.
DevOps

ChatOps

Approach to managing IT operations and workflows through conversation-driven development.
DevOps

Chef

Configuration management tool that uses a pure-Ruby domain-specific language for writing system configurations.
DevOps

Chocolatey

Package manager for Windows, automating software installation, upgrade, and configuration.
DevOps

Clean Code Prinzipien

Set of principles aimed at producing readable, maintainable, and efficient code, promoting software quality and developer productivity.
DevOps

Click Fraud

Fraudulent clicks on pay-per-click advertisements to generate charges for advertisers.
DevOps

Clickjacking

Malicious technique of tricking users into clicking on hidden or disguised elements on a webpage.
DevOps

Client Side Attacks

Security threats that target vulnerabilities in web browsers or other client applications.
DevOps

Cloud Application

Software program where cloud-based and local components work together, primarily processed on remote servers.
DevOps

Cloud Automation

Use of tools and processes to reduce manual efforts in deploying and managing cloud computing workloads.
DevOps

Cloud Computing

Delivery of computing services over the internet, including servers, storage, databases, and software.
DevOps

Cloud Infrastructure

Hardware and software components required to support cloud computing delivery model.
DevOps

Cloud Infrastructure Security

Measures and controls to protect data, applications, and infrastructure associated with cloud computing.
DevOps

Cloud Management

Control and oversight of cloud computing resources, often through automated tools.
DevOps

Cloud Migration

Process of moving data, applications, or other business elements from an on-premises environment to the cloud.
DevOps

Cloud Native Computing Foundation (CNCF)

Organization promoting cloud native technologies and practices to shape the evolution of cloud computing.
DevOps

Cloud Native DevOps

Practices combining cloud native technologies with DevOps principles for faster, more flexible software delivery.
DevOps

Cloud Orchestration

Arrangement and coordination of automated tasks resulting in a consolidated process or workflow.
DevOps

Cloud Security Alliance (CSA)

Organization that defines best practices to help ensure a secure cloud computing environment.
DevOps

Cloud Security Monitoring

Continuous monitoring of cloud-based assets and services to detect security threats and vulnerabilities.
DevOps

Cloud Security Posture Management

Continuous monitoring of cloud infrastructure to identify misconfigurations and compliance risks.
DevOps

Cloud-native

Designed to take full advantage of cloud computing frameworks, beyond simple rehosting in the cloud.
DevOps

Cloud-native Security

Security practices and tools designed specifically for cloud-native applications and infrastructure.
DevOps

CloudWatch

Amazon Web Services' monitoring and observability service for cloud resources and applications.
DevOps

Code All Your Resources

Practice of managing all aspects of infrastructure and operations through code, enabling version control and automation.
DevOps

Code Dependencies

External libraries, modules, or packages that a software project relies on to function properly.
DevOps

Code Injection

Security vulnerability where an attacker inserts malicious code into a vulnerable application.
DevOps

Code Promotion

Process of moving code through various stages of development, testing, and deployment.
DevOps

Code Signing

Process of digitally signing executables and scripts to confirm the software author and guarantee it hasn't been altered.
DevOps

Code-first Workflow

Development approach where code is written before database schemas or other structures are defined.
DevOps

Coding Standards

Set of guidelines for programming style and practices within a project or organization.
DevOps

Cognitive Load

Mental effort required to learn new information or complete tasks, important in user experience design and learning theory.
DevOps

Collectd

System statistics collection daemon that collects, transfers, and stores performance data of computers and network equipment.
DevOps

Common Vulnerabilities and Exposures (CVE)

List of publicly disclosed cybersecurity vulnerabilities, providing a standardized identifier for known issues.
DevOps

Common Weakness Enumeration (CWE)

Comprehensive list of common software and hardware weakness types, serving as a common language for describing security vulnerabilities.
DevOps

Complex-Adaptive System (CAS)

System of interconnected components that can adapt and self-organize in response to changes.
DevOps

Complex-Adaptive Systems

Systems of interconnected components that can adapt and evolve in response to changes in their environment.
DevOps

Compliance

Adherence to laws, regulations, guidelines, and specifications relevant to a business.
DevOps

Compliance Level

Degree to which an organization meets regulatory or industry-specific requirements.
DevOps
index entry

index entry

A record in Git's index file representing the state of a file in the repository.
integration

integration

A connection between Git and other tools or services to enhance functionality and workflow.
key fingerprint

key fingerprint

A short sequence of bytes used to identify a longer public key in Git's GPG signing process.
keychain

keychain

A secure storage system for passwords and keys, often integrated with Git clients for credential management.
keyword

keyword

A reserved word in Git commands or configurations with a specific meaning or function.
label

label

A way to categorize and organize issues and pull requests in GitHub repositories.
license

license

A document in a Git repository specifying how the project can be used, modified, and distributed.
line comment

line comment

A feature in Git platforms allowing users to comment on specific lines of code in pull requests or commits.
line ending

line ending

Characters marking the end of a line, which can cause issues in Git when collaborating across different operating systems.
locked personal account

locked personal account

A GitHub account that has been restricted due to a violation of terms of service or suspicious activity.
main

main

The default name for the primary branch in many Git repositories, replacing 'master' in recent conventions.
management console

management console

An administrative interface for managing Git hosting services, often used in enterprise environments.
markup

markup

A system of annotation used to format text, often used in Git documentation and comments.
members graph

members graph

A visual representation of an organization's membership on Git hosting platforms.
merge conflict

merge conflict

A situation in Git where incompatible changes have been made to the same part of a file, requiring manual resolution.
milestone

milestone

A way to track progress on groups of issues or pull requests in GitHub projects.
mirror

mirror

A complete copy of a repository, including all branches and history, often used for backup or as a full replica.
nested team

nested team

A team within a GitHub organization that is a subset of a larger team, inheriting its permissions.
network graph

network graph

A visual representation of the commit history and branch structure of a Git repository.
news feed

news feed

A personalized list of recent activity on Git platforms, showing updates from followed users and repositories.
non-fast-forward

non-fast-forward

A Git push that introduces new commits to the remote branch that aren't direct descendants of the current remote HEAD.
notification

notification

An alert system on Git platforms to inform users about relevant activities and mentions.
object

object

A fundamental unit in Git's data model, representing content, commits, trees, or tags, identified by a unique SHA-1 hash.
object database

object database

The storage system in Git that contains all versions of project files and metadata, organized by SHA-1 hashes.
object identifier (oid)

object identifier (oid)

A unique SHA-1 hash that identifies a Git object, ensuring data integrity and enabling content-addressable storage.
object name

object name

Another term for the SHA-1 hash that uniquely identifies a Git object in the repository.
object type

object type

The classification of Git objects, including blob (file content), tree (directory structure), commit, and tag.
octopus

octopus

A Git merge involving more than two branches simultaneously, creating a commit with multiple parents.
organization

organization

A shared account on Git hosting platforms where businesses and open-source projects can collaborate across many projects.
organization owner

organization owner

A user with administrative privileges for an organization account on Git hosting platforms.
orphan

orphan

A branch in Git with no parent commit, typically used to start a new history unrelated to existing branches.
outside collaborator

outside collaborator

A user granted access to a repository but not a member of the organization that owns the repository.
overlay

overlay

A Git feature that allows files from one branch to temporarily override files in another branch without merging.
owner

owner

The user or organization with administrative rights to a Git repository, controlling access and settings.
pack

pack

A compressed file format used by Git to store multiple objects efficiently, reducing repository size.
pack index

pack index

A file that provides fast random access to objects stored within a packfile in Git.
parent

parent

A commit from which another commit is derived, establishing the hierarchical relationship in Git history.
parent team

parent team

A team in a Git platform that grants its permissions to nested sub-teams within an organization.
participating notifications

participating notifications

Alerts received when you're directly involved in repository activities like being assigned or mentioned.
pathspec

pathspec

A pattern used in Git commands to limit the scope of operations to specific files or directories.
peel

peel

The process of recursively dereferencing a Git object to reveal its underlying object type.
per-worktree ref

per-worktree ref

A reference specific to a particular working tree in a Git repository with multiple worktrees.
permalink

permalink

A URL that points to a specific version of a file or directory in a Git repository, ensuring consistent reference.
personal account

personal account

An individual account on Git platforms, used for personal projects and contributions.
pickaxe

pickaxe

A Git feature for searching the repository history to find when a particular change was introduced.
pinned repository

pinned repository

A featured repository prominently displayed on a user's or organization's profile page on their Git hosting platform of choice.
plumbing

plumbing

Low-level Git commands that expose internal workings, primarily used for scripting and advanced operations.
porcelain

porcelain

High-level Git commands designed for everyday use, providing a user-friendly interface to common version control tasks.
pre-receive hooks

pre-receive hooks

Server-side scripts that run before pushed commits are accepted, used to enforce policies or perform checks.
primary email address

primary email address

The main email associated with a Git account, used for communications and commit author identification.
private contributions

private contributions

Contributions made to private repositories, typically only visible to repository collaborators.
private repository

private repository

A Git repository with restricted access, visible only to the owner and explicitly granted collaborators.
production branch

production branch

A Git branch that represents the stable, deployed version of a project, often protected from direct changes.
profile

profile

A user's public page on a Git platform, displaying information about their activity and repositories.
profile photo

profile photo

An image representing a user on a Git platform, displayed alongside their contributions and activities.
project board

project board

A kanban-style board in Git platforms for organizing and prioritizing project issues and pull requests.
protected branch

protected branch

A branch with rules enforcing certain conditions before changes can be pushed, merged, or deleted.
pseudoref

pseudoref

A Git reference that doesn't follow the standard refs format but is treated similarly, like HEAD or MERGE_HEAD.
public contributions

public contributions

Contributions made to public repositories, visible on a user's profile and activity feed.
public repository

public repository

A Git repository that is openly accessible to anyone, allowing viewing and often cloning without authentication.
pull access

pull access

Permission level in Git allowing a user to clone a repository and fetch updates, but not push changes.
pull request review

pull request review

The process of examining proposed changes in a pull request before they are merged into the main codebase.
pulse graph

pulse graph

A visual representation of a GitHub repository's recent activity, including commits, issues, and pull requests.
punch graph

punch graph

A visualization of commit frequency over time, often displayed as a heatmap on Git platforms.
push a branch

push a branch

The act of uploading commits from a local branch to a corresponding branch in a remote Git repository.
push access

push access

Permission to upload local changes to a remote Git repository, allowing direct modification of shared branches.
reachability bitmaps

reachability bitmaps

Data structures used to optimize Git operations by quickly determining which objects are reachable from a given commit.
reachable

reachable

Git objects that can be accessed by following the commit history from a given reference point.
read access

read access

Permission to view and clone a Git repository without the ability to make changes or push commits.
recovery code

recovery code

A backup method for accessing a Git account if two-factor authentication is enabled but unavailable.
ref

ref

A name that points to a specific Git object, typically a commit, such as branches or tags.
refs

refs

The collection of references in a Git repository, including branches, tags, and other named pointers to commits.
remote URL

remote URL

The address of a remote Git repository, used for fetching and pushing changes between local and remote repositories.
remote repository

remote repository

A version of a Git project hosted on a server, serving as a central point for collaboration and backup.
remote-tracking branch

remote-tracking branch

A local reference that represents the state of a corresponding branch in a remote repository.
replica

replica

A copy of a Git repository, often used in distributed systems for redundancy and load balancing.
repository cache

repository cache

A local storage of repository data used to improve performance in Git operations.
repository graph

repository graph

A visual representation of the commit history and branch structure in a Git repository.
repository maintainer

repository maintainer

A person responsible for managing a Git repository, reviewing contributions, and maintaining project quality.
required pull request review

required pull request review

A protection rule requiring one or more reviewers to approve changes before merging in Git platforms.
required status check

required status check

A condition that must be met, such as passing tests, before changes can be merged into a protected branch.
resolve

resolve

The process of addressing and fixing merge conflicts in Git, typically done manually by the developer.
revert

revert

A Git operation that creates a new commit that undoes the changes made by a previous commit.
review

review

The process of examining proposed changes in a pull request before merging them into the main codebase.
revision

revision

A specific version of a file, directory, or entire repository in Git, often referenced by a commit hash.
rewind

rewind

The act of moving a branch pointer to an earlier commit in Git, effectively undoing more recent commits.
root directory

root directory

The top-level directory of a Git repository, containing all project files and the .git subdirectory.
root filesystem

root filesystem

The base filesystem of a Git repository, from which all other directories and files are organized.
saved reply

saved reply

A pre-written response that can be quickly inserted into issues or pull request comments on Git platforms.
scope

scope

The range of access or permissions granted to a token or application in Git-based systems.
seat

seat

A licensed user in enterprise Git hosting plans, typically representing a single user account.
secret team

secret team

A team in a Git organization that is hidden from non-members and other teams within the organization.
security log

security log

A record of security-related events and actions in a system, used for monitoring and auditing purposes.
server-to-server request

server-to-server request

An authenticated request between Git servers, often used in integrations or automated processes.
service hook

service hook

A mechanism for Git platforms to send event notifications to external services or applications.
shallow repository

shallow repository

A Git repository with an intentionally truncated history, often created through shallow cloning.
single sign-on

single sign-on

An authentication process allowing users to access multiple Git-related services with one set of credentials.
special ref

special ref

A Git reference with a specific meaning or function, such as HEAD or FETCH_HEAD.
staging instance

staging instance

A deployment environment used for testing changes before releasing to production in Git-based workflows.
star

star

A feature on Git hosting platforms allowing users to bookmark repositories of interest.

3D Stacked Memory for Cloud Servers

High-density memory architecture using vertically stacked chips, enhancing performance and capacity in cloud server hardware.

5G Cloud

Cloud infrastructure optimized for 5G networks, supporting high-speed, low-latency services and applications.

5G Network Slicing

Technique to create multiple virtual networks on a shared physical 5G infrastructure, each optimized for specific use cases.

5G and Edge Computing

Integration of 5G networks with edge computing to enable low-latency, high-bandwidth applications closer to end-users.

6G Cloud Integration

Future convergence of 6G networks with cloud computing, promising ultra-high speeds and advanced capabilities.

ACID Compliance

Database transaction properties (Atomicity, Consistency, Isolation, Durability) ensuring data integrity in cloud environments.

AI Ethics Compliance Tools

Software ensuring AI systems adhere to ethical guidelines and regulations in cloud deployments.

AI Ethics and Bias Detection Tools

Software for identifying and mitigating ethical issues and biases in AI models deployed in cloud environments.

AI Ethics and Governance Tools

Solutions for managing ethical considerations and regulatory compliance in cloud-based AI systems.

AI Governance Frameworks

Structured approaches for managing AI development, deployment, and use in cloud environments.

AI Model Governance Platforms

Comprehensive solutions for managing, monitoring, and controlling AI models in cloud-based systems.

AI Model Interpretability Services

Cloud-based tools for explaining and understanding the decision-making processes of AI models.

AI Model Interpretability Tools

Software for analyzing and explaining AI model decisions, crucial for transparency in cloud AI services.

AI Model Marketplaces

Cloud platforms for discovering, sharing, and monetizing pre-trained AI models and algorithms.

AI Model Monitoring and Drift Detection

Tools for tracking AI model performance and identifying deviations from expected behavior in cloud environments.

AI Model Versioning and Governance

Systems for managing different versions of AI models and enforcing governance policies in cloud deployments.

AI-Assisted Coding Platforms

Cloud-based development environments that use AI to assist programmers in writing and optimizing code.

AI-Augmented Analytics

Integration of AI capabilities into data analytics processes in cloud environments for enhanced insights.

AI-Driven Capacity Planning

Use of AI algorithms to predict and optimize resource allocation in cloud infrastructures.

AI-Driven Cloud Optimization

Application of AI techniques to improve efficiency, performance, and cost-effectiveness of cloud resources.

AI-Driven Cloud Resource Allocation

Automated distribution of cloud resources using AI to optimize performance and cost-efficiency.

AI-Driven Cloud Service Composition

AI-based automation of cloud service selection and integration for complex workflows.

AI-Driven Code Generation

Automated creation of source code using AI models, often integrated into cloud development platforms.

AI-Driven Data Classification

Automated categorization and labeling of data using AI algorithms in cloud storage and processing systems.

AI-Driven Network Optimization

Use of AI to improve network performance, efficiency, and security in cloud environments.

AI-Driven Resource Allocation

Intelligent distribution of computing resources in cloud environments using AI algorithms.

AI-Driven Security Information and Event Management (SIEM)

Enhanced SIEM systems using AI for improved threat detection and response in cloud environments.

AI-Driven Threat Detection

Use of AI algorithms to identify and analyze potential security threats in cloud systems.

AI-Driven Threat Hunting

Proactive search for hidden threats in cloud environments using AI-powered analytics and automation.

AI-Optimized Cloud Hardware

Cloud infrastructure components designed or configured to enhance AI workload performance.

AI-Optimized Databases

Database systems tailored for AI workloads, often featuring in-memory processing and distributed architectures.

AI-Powered Anomaly Detection

Use of AI algorithms to identify unusual patterns or behaviors in cloud systems and data.

AI-Powered Integration

Intelligent automation of data and application integration processes in cloud environments using AI.

AI-as-a-Service

Cloud-based offering of AI capabilities, allowing businesses to leverage AI without extensive in-house expertise.

AI-as-a-Service (AIaaS)

Cloud-based AI capabilities offered as a service, enabling easy integration of AI into applications.

AIOps

Application of AI for automating and enhancing IT operations management in cloud environments.

AIOps Platforms

Integrated solutions leveraging AI for automated monitoring, analysis, and management of cloud IT operations.

AIOps for Predictive Maintenance

Use of AI-driven analytics to forecast and prevent system failures in cloud infrastructure.

API Security Gateway

Service that protects APIs in cloud environments by managing access, monitoring traffic, and preventing attacks.

API Security Gateways

Dedicated services for securing and managing APIs in cloud environments, including access control and threat protection.

API-First Development

Design approach prioritizing API creation before implementation, common in cloud-native application development.

API-Led Connectivity

Integration strategy using purpose-built APIs to connect data, devices, and applications in cloud ecosystems.

AR Cloud

Persistent 3D digital content overlaid on the physical world, accessible via cloud infrastructure for augmented reality applications.

AR/VR Analytics

Cloud-based tools for analyzing user behavior and performance in augmented and virtual reality environments.

AR/VR Collaboration Platforms

Cloud-hosted services enabling multi-user interaction in shared augmented or virtual reality spaces.

AR/VR Content Delivery Network

Specialized CDN optimized for delivering AR/VR content with low latency and high bandwidth.

AR/VR Development Platforms

Cloud-based tools and services for creating, testing, and deploying augmented and virtual reality applications.

ARM Templates (Azure)

JSON-based files defining infrastructure and configuration for Azure resource deployment.

Adaptive User Interfaces for Cloud Services

Dynamic UIs that adjust based on user behavior, device capabilities, and context in cloud applications.

Adversarial Machine Learning Detection

Techniques to identify and mitigate attacks on ML models in cloud-based AI systems.

Alerting and Notification

Systems for informing administrators or users about important events or issues in cloud environments.

Algorithmic Auditing

Process of examining AI algorithms for bias, errors, or unintended consequences in cloud-based systems.

Ambient Computing Interfaces for Cloud

Seamless, context-aware interaction methods for accessing cloud services in IoT environments.

Anomaly Detection Systems

Tools for identifying unusual patterns or behaviors in cloud systems, often using machine learning techniques.

Application-Aware Networking

Network management approach that optimizes performance based on specific application requirements in cloud environments.

Approximate Query Processing

Technique for quickly estimating query results in large-scale cloud databases, trading accuracy for speed.

Archive Storage (e.g., Amazon Glacier, Azure Archive Storage)

Low-cost cloud storage for infrequently accessed data with longer retrieval times, e.g., Amazon Glacier, Azure Archive Storage.

Artifact Repository

Cloud-based storage for software build outputs, dependencies, and related metadata.

Artificial General Intelligence (AGI) as a Service

Hypothetical cloud offering of human-level AI capabilities across various domains.

Artificial General Intelligence Research Platforms

Cloud-based environments for developing and testing advanced AI systems approaching human-level intelligence.

Audit Logging

Systematic recording of actions and events in cloud systems for security and compliance purposes.

Audit Trails

Chronological records of system activities for reconstructing and examining the sequence of events in cloud environments.

Augmented Analytics

Integration of machine learning and natural language processing in cloud-based data analytics workflows.

Augmented Reality (AR) Cloud

Shared, persistent digital content overlaid on the physical world, accessible via cloud infrastructure.

Augmented Reality Cloud Interfaces

Cloud-based systems for managing and delivering AR content and experiences, enabling scalable AR applications.

Augmented Reality Cloud Rendering

Cloud-powered generation of AR graphics and content, offloading processing from end-user devices.

Auto Scaling Groups

Collections of EC2 instances that automatically adjust capacity based on defined conditions.

Auto-scaling

Automatic adjustment of cloud resources to match workload demands, ensuring optimal performance and cost-efficiency.

AutoML

Automated machine learning processes for model selection, hyperparameter tuning, and feature engineering in cloud environments.

AutoML in the Cloud

Cloud-based services automating the machine learning pipeline from data preparation to model deployment and monitoring.

Automated AI Pipeline Optimization

AI-driven tools for improving efficiency and performance of machine learning workflows in the cloud.

Automated Cloud Governance Enforcement

Systems that automatically implement and maintain cloud resource policies and compliance.

Automated Compliance Monitoring

Continuous, AI-driven assessment of cloud systems against regulatory and security standards.

Automated Data Discovery

AI-powered tools for identifying, categorizing, and mapping data assets in cloud environments.

Automated Data Governance

AI-driven systems for managing data quality, security, and compliance in cloud environments.

Automated Data Wrangling Services

Cloud-based tools using AI to clean, transform, and prepare data for analysis, streamlining data preparation processes.

Automated Feature Engineering

AI-powered generation and selection of features for machine learning models in cloud environments.

Automated Incident Response Orchestration

AI-driven coordination of security incident detection and resolution in cloud systems, automating response workflows.

Automated Machine Learning (AutoML)

Cloud services that automate the process of creating and optimizing machine learning models, from data prep to deployment.

Automated Machine Learning (AutoML) Platforms

Cloud-based systems that automate the end-to-end machine learning model development process, including feature engineering and model selection.

Automated Penetration Testing

AI-driven tools for simulating cyberattacks to identify vulnerabilities in cloud systems and applications.

Automated Threat Modeling

AI-powered analysis of cloud architectures to identify potential security risks and attack vectors.

Autonomous Systems in the Cloud

Self-managing, self-healing cloud services requiring minimal human intervention, leveraging AI for operations.

Azure Edge Zones

Ultra-low latency edge computing extensions of Azure for 5G networks, bringing cloud resources closer to users.

Azure Policy

Service for creating, assigning, and managing policies to control Azure resources and ensure compliance.

B2B Integration Platforms

Cloud-based services facilitating data exchange and process integration between business partners.

Backend for Frontend (BFF) Pattern

Architectural approach creating backend services tailored to specific frontend application needs in cloud environments.

Bare Metal Server

Physical server dedicated to a single tenant, offering direct hardware access in cloud environments.

Bare Metal Servers

Dedicated physical servers without virtualization, offered as a cloud service for high-performance workloads.

Batch Processing (e.g., AWS Batch, Azure Batch)

Execution of series of jobs without user interaction, often for large-scale data processing in the cloud (e.g., AWS Batch, Azure Batch).

Big Data Clusters

Distributed computing environments for processing and analyzing massive datasets in the cloud.

Billing Dashboard

Interface for monitoring and managing cloud service usage and costs, providing detailed breakdowns and forecasts.

Biocomputing in the Cloud

Use of cloud resources for computational biology and genomics research, enabling large-scale analysis and modeling.

Biodiversity Impact Assessment for Cloud Facilities

Evaluation of cloud data center effects on local ecosystems and wildlife to ensure sustainable operations.

Block Storage

Cloud storage that provides fixed-size raw storage volumes, typically used for databases or file systems.

Block Storage (e.g., Amazon EBS, Azure Disk Storage)

Cloud services providing persistent block-level storage volumes for use with compute instances.

Blockchain Analytics

Cloud-based tools for analyzing and visualizing blockchain data and transactions, offering insights into network activity.

Blockchain Databases

Distributed databases using blockchain technology for enhanced security and immutability in cloud environments.

Blockchain Governance Tools

Software for managing and enforcing rules, permissions, and consensus mechanisms in blockchain networks deployed on cloud platforms.

Blockchain Integration Services

Cloud-based solutions for connecting blockchain networks with existing enterprise systems and applications.

DaemonSet Pattern

Design pattern using DaemonSets to run system daemons or agents on every node in a cluster.

Data Backup and Recovery

Processes and tools for preserving and restoring data in containerized environments, ensuring data durability.

Data Consistency in Distributed Systems

Techniques ensuring data integrity across distributed container-based applications, maintaining reliability.

Data Fabric in Containerized Environments

Distributed data management architecture providing consistent data access across containerized applications.

Data Lakehouse Architecture

Unified data architecture combining data lake and data warehouse features in containerized environments.

Data Migration Between Containers

Process of moving data between containers or from traditional systems to containerized applications.

Data Persistence Strategies

Techniques for maintaining data across container lifecycles, including volume mounts and persistent volumes.

Data Plane

Network layer responsible for forwarding container traffic based on control plane decisions.

Data Replication in Containers

Techniques for creating and maintaining copies of data across multiple containerized instances.

Data Sharding in Containerized Databases

Partitioning data across multiple database containers for improved scalability and performance.

Database Containerization

Process of running database systems within containers for improved portability and resource utilization.

Database-per-Service Pattern

Microservices design pattern where each service has its own dedicated database, ensuring data isolation.

Datadog Container Monitoring

Platform for observability and monitoring of containerized environments and microservices.

Dead Letter Queue Pattern

Design pattern for handling failed message processing in containerized message-driven systems.

Declarative Deployments

Approach to deploying containers by specifying desired state rather than imperative commands.

Deployment Strategies

Techniques for rolling out container updates, including rolling updates, blue-green, and canary deployments.

Descheduler

Kubernetes component that evicts pods from nodes based on specific policies to optimize cluster resource usage.

DevSpace for Cloud-native Development

Standardized format defining the structure and metadata of Docker container images, ensuring portability.

Device Plugins

Kubernetes feature allowing nodes to advertise system hardware resources to the cluster, enabling specialized hardware use.

Direct Server Return (DSR)

Network optimization technique in container load balancing for improved performance by bypassing the load balancer for responses.

Distributed Tracing Integration

Implementation of tracing in containerized microservices for end-to-end request visibility.

Distributed Tracing with Jaeger

Implementation of distributed tracing using Jaeger to monitor and optimize performance in microservices architectures.

Distributed Tracing with OpenTelemetry

Implementation of OpenTelemetry for standardized observability in containerized environments.

Distroless Images

Minimal container images containing only the application and its runtime dependencies, reducing attack surface.

Docker Attach

Command to attach local standard input, output, and error streams to a running container for interaction and debugging.

Docker Build Context

Set of files located in the specified PATH or URL, used during the docker build process to create images.

Docker Buildx

Docker CLI plugin for extended build capabilities, including multi-platform builds and enhanced build options.

Docker CRI Shim

Component enabling Docker to be used as a container runtime in Kubernetes via the Container Runtime Interface.

Docker Client

Command-line tool for interacting with Docker daemon and managing containers, images, and other Docker objects.

Docker Commit

Command creating a new image from a container's changes, useful for saving modifications made to a running container.

Docker Compose

Tool for defining and running multi-container Docker applications, simplifying the process of managing complex application stacks.

Docker Container Inspection

Process of viewing detailed information about a container's configuration and state, aiding in troubleshooting.

Docker Content Trust

Feature providing digital signing and verification of Docker images, ensuring image authenticity and integrity.

Docker Content Trust Signature Verification

Process of validating the authenticity and integrity of signed Docker images before use.

Docker Contexts

Feature allowing management of multiple Docker endpoints from a single Docker client, simplifying multi-environment management.

Docker Daemon

Background service managing Docker objects like images, containers, networks, and volumes.

Docker Exec

Command allowing users to run a new process inside a running container, useful for debugging and maintenance tasks.

Docker Export/Import

Commands for exporting a container's filesystem as a tarball and importing it as an image.

Docker Hub

Cloud-based repository service for finding and sharing container images, central to the Docker ecosystem.

Docker Image History

Command showing the history of an image's layers, providing insight into how the image was built and modified.

Docker Image Inspection

Process of examining Docker image metadata, including layers, environment variables, and exposed ports.

Docker Image Specification

Standardized format defining the structure and metadata of Docker container images, ensuring portability.

Docker Network

Virtualized network providing connectivity between Docker containers, isolating container traffic from the host network.

Docker Network Driver Types (bridge, host, overlay, macvlan)

Different networking modes in Docker, including bridge, host, overlay, and macvlan, offering varied connectivity options.

Docker Prune

Command for removing unused Docker objects like containers, networks, images, and volumes.

Docker Save/Load

Commands for exporting Docker images to tar archives and importing them back, useful for image transfer and backup.

Docker Scan

Command-line tool for scanning Docker images for vulnerabilities, providing detailed reports on potential security issues.

Docker Shim

Deprecated component that provided CRI compatibility for Docker in Kubernetes, bridging Docker and CRI.

Docker Socket

Unix socket or named pipe used for communication between Docker client and daemon, enabling Docker API access.

Docker Stats

Command displaying a live stream of container resource usage statistics, including CPU, memory, and network I/O.

Docker Swarm

Native clustering and orchestration solution for Docker, allowing you to create and manage a swarm of Docker nodes as a single virtual system.

Docker System Events

Real-time stream of Docker daemon events, providing insights into container, image, volume, and network activities.

Docker Top

Command displaying the running processes of a container, similar to the Unix top command but container-specific.

Docker Volume

Persistent data storage mechanism for containers, independent of container lifecycle, enabling data persistence.

Docker Volume Driver Types

Different storage backends for Docker volumes, including local, NFS, and cloud-specific drivers.

Dockerfile

Text document containing all the commands a user could call on the command line to assemble a Docker image.

Dockerfile ARG

Instruction defining build-time variables that users can pass at build-time to the builder.

Dockerfile Best Practices

Guidelines for creating efficient, secure, and maintainable Dockerfiles, optimizing image builds and runtime performance.

Dockerfile HEALTHCHECK

Instruction telling Docker how to test a container to check its health status, improving reliability.

Dockerfile Instructions (ADD, COPY, RUN, CMD, ENTRYPOINT, etc.)

Set of commands used in Dockerfiles to build images, including ADD, COPY, RUN, CMD, and ENTRYPOINT.

Dockerfile ONBUILD

Set of commands used in Dockerfiles to build images, including ADD, COPY, RUN, CMD, and ENTRYPOINT.

Dockerfile STOPSIGNAL

Instruction setting the system call signal that will be sent to the container to exit, customizing shutdown behavior.

Dockerignore

File specifying which files and directories should be excluded when building a Docker image.

Domain-Driven Design (DDD) in Microservices

Approach to software design focusing on the core domain in containerized microservices architectures.

Dragonfly for P2P Image Distribution

P2P-based image and file distribution system to improve efficiency of image downloads in container environments.

Drain

Process of cordoning a node and evicting its pods in preparation for maintenance or decommissioning.

Dual-stack Networking

Networking configuration supporting both IPv4 and IPv6 in container environments, enabling broader connectivity options.

Dynamic Admission Control

Kubernetes feature allowing custom logic to be applied to object creation or modification requests.

Dynamic Auditing

Kubernetes feature enabling runtime configuration of audit policies without API server restart.

Dynamic Provisioning

Automatic creation of storage when persistent volume claims are made in Kubernetes, simplifying storage management.

Dynatrace OneAgent

Monitoring solution for containerized environments, providing deep visibility into application performance.

ELK Stack (Elasticsearch, Logstash, Kibana)

Combination of Elasticsearch, Logstash, and Kibana for logging and monitoring containerized environments.

East-West Traffic

Network communication between containers or services within the same cluster or data center.

Edge AI/ML

Deployment of artificial intelligence and machine learning models on edge devices using containers.

Edge Analytics

Processing and analyzing data at the network edge using containerized analytics applications.

Edge Device Management

Tools and practices for managing containerized workloads on edge devices, ensuring consistent deployment and updates.

Edge Orchestration

Management and coordination of containerized applications across distributed edge locations.

Edge Security

Security measures and practices specific to containerized edge computing environments, protecting distributed workloads.

Edge Workload Scheduling

Techniques for efficiently distributing containerized workloads across edge devices, optimizing resource usage.

Edge-Cloud Syncing

Synchronization of data and state between edge containers and cloud-based systems, ensuring consistency.

Egress Gateway

Component controlling outbound traffic from a container cluster to external services, enhancing security and traffic management.

Egress Gateways

Service mesh components managing outbound traffic from the mesh to external services, providing fine-grained control.

Egress Traffic Control

Management and policies for outbound network traffic from containers, ensuring security and compliance.

Elastic APM

Application Performance Monitoring tool for containerized applications in the Elastic Stack.

Encrypted Secrets

Sensitive data stored in an encrypted form in container orchestration platforms, enhancing security.

End-to-End Testing

Comprehensive testing of containerized applications from start to finish, validating entire system functionality.

EndpointSlices

Kubernetes API resource providing a more scalable alternative to Endpoints for service discovery.

Environment Variables in Containers

Key-value pairs passed to containers at runtime, used for configuration and runtime behavior control.

Envoy Proxy

High-performance proxy often used in service mesh implementations for containerized environments.

Ephemeral Containers

Temporary containers used for troubleshooting or debugging in Kubernetes pods, without affecting the main containers.

Ephemeral Volumes

Short-lived storage volumes in Kubernetes that share the lifecycle of a pod, useful for temporary data storage.

Equal-Cost Multi-Path (ECMP)

Routing strategy for load balancing network traffic across multiple paths in container networks.

Etcd

Distributed key-value store that provides a reliable way to store data across a cluster of machines.

Event Sinks

Destinations for cluster-level events in container orchestration platforms, used for monitoring and alerting.

Event Sources

Components or services generating events in containerized environments, often used in event-driven architectures.

Event Sourcing

Pattern of storing changes to application state as a sequence of events, often used in microservices architectures.

Event Sourcing Pattern

Design pattern capturing all changes to application state as a sequence of events, useful in distributed systems.

Event Sourcing in Containers

Implementation of event sourcing pattern in containerized microservices architectures, ensuring data consistency.

Event-driven Architectures

Design approach where containerized services produce, detect, and react to events, enabling loose coupling and scalability.

Eviction Policies

Rules determining which pods to terminate when a node is under resource pressure in Kubernetes clusters.