Engineering Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.

DevOps
Git
Cloud Computing
Containerization & Orchestration

Behaviour-Driven Design

Approach to software design that focuses on defining system behavior through examples and scenarios.
DevOps

Bento

Lightweight Docker-based development environments for PHP applications, simplifying local development setup.
DevOps

Berkshelf

Dependency manager for Chef cookbooks, simplifying the process of managing and versioning cookbook dependencies.
DevOps

Beta Testing

Pre-release testing phase where a sample of the intended audience tries the product to uncover any bugs or issues.
DevOps

Bitbucket

Web-based version control repository hosting service for Git and Mercurial projects, owned by Atlassian.
DevOps

Black Box Testing

Testing method where the internal structure/design of the item being tested is not known to the tester.
DevOps

Blameless Postmortem

Process of analyzing incidents or failures without assigning blame, focusing on learning and improvement.
DevOps

Blast Radius

Extent of damage or impact that could result from a failure or security breach in a system.
DevOps

Blue Green Deployment

Technique for releasing applications by shifting traffic between two identical environments running different versions.
DevOps

Blue Team

Group responsible for defending against and responding to cyber attacks in an organization.
DevOps

Bot Attack

Automated attempt by malicious actors to compromise systems or steal data using software programs (bots).
DevOps

Bot Management Tools

Solutions designed to detect, prevent, and mitigate bot-related threats to websites and applications.
DevOps

Bots

Automated software applications that run scripted tasks, often used in both beneficial and malicious contexts.
DevOps

Bottleneck

Point in a system where the flow of data or processes is constrained, limiting overall system performance.
DevOps

Bounded Context

Core concept in Domain-Driven Design, defining the limits within which a particular model is applicable.
DevOps

Branching

Creating a divergent copy of source code to develop features or fix bugs without affecting the main codebase.
DevOps

Broken Access Control

Security vulnerability where restrictions on authenticated users are not properly enforced.
DevOps

Broken Authentication

Security flaw allowing attackers to compromise passwords, keys, or session tokens to assume user identities.
DevOps

Broken Function Level Authorization

Vulnerability where an application does not restrict function access to appropriate users.
DevOps

Broken Object Level Authorization

Security issue where an application does not verify if the user has permission to access a specific object.
DevOps

Broken User Authentication

Security vulnerability where flaws in the authentication process allow unauthorized access to user accounts.
DevOps

Brooklyn

Framework for modeling, deploying, and managing distributed applications across cloud environments.
DevOps

Bucket

Container for storing objects in cloud storage services like Amazon S3 or Google Cloud Storage.
DevOps

Buffer vs Cache

Buffer temporarily holds data for processing; cache stores frequently accessed data for quick retrieval.
DevOps

Bug Bounty Program

Initiative offering rewards to individuals for discovering and reporting software bugs or vulnerabilities.
DevOps

Build

Process of converting source code files into standalone software artifacts that can be run on a computer.
DevOps

Build Agent

Component in a CI/CD system that executes build and test processes on behalf of the build server.
DevOps

Build Artifact Repository

Central storage location for managing and distributing software build outputs and dependencies.
DevOps

Build Automation

Process of scripting or automating the creation of compiled code and related processes.
DevOps

Build Cache

Mechanism to store and reuse the output of previous build steps to speed up subsequent builds.
DevOps

Build Pipelines

Automated processes for compiling, testing, and deploying code changes through various stages.
DevOps

Build Service

System that automates the process of compiling source code into executable programs.
DevOps

Build System

Set of tools and processes used to compile, assemble, and package software from source code.
DevOps

BuildMaster

Application release automation platform for creating and managing software delivery pipelines.
DevOps

Buildbot

Continuous integration framework written in Python, allowing automation of build, test, and release processes across multiple platforms.
DevOps

Business Acceptance

Process of verifying that a software solution meets the business requirements and is ready for use.
DevOps

Business Analytics (BA)

Practice of iterative exploration of an organization's data to gain insights and drive business planning.
DevOps

Business Intelligence (BI)

Technologies and practices for collecting, integrating, analyzing, and presenting business information.
DevOps

Business Logic Attack

Exploitation of flaws in the business logic of an application to perform unauthorized actions.
DevOps

Business Technology

Integration of business strategy and technology to improve organizational performance and outcomes.
DevOps

CALMS Model

Framework for DevOps culture emphasizing Collaboration, Automation, Lean, Measurement, and Sharing.
DevOps

CASB

Cloud Access Security Broker; software that mediates between cloud service users and cloud applications.
DevOps

CD Pipeline

Continuous Delivery Pipeline; automated system for moving code changes through build, test, and deployment stages.
DevOps

CI Pipeline

Continuous Integration Pipeline; automated sequence of steps for building, testing, and validating code changes.
DevOps

CI Service

System that automates the integration of code changes from multiple contributors into a single software project.
DevOps

CI/CD (Continuous Integration and Continuous Delivery)

Continuous Integration and Continuous Delivery; practices of frequently integrating code changes and delivering to production.
DevOps

CI/CD Server

Platform that facilitates the automation of building, testing, and deploying code changes.
DevOps

CLI (Command Line Interface)

Command Line Interface; text-based interface for interacting with computer programs or operating systems.
DevOps

CMB (Cloud Message Bus)

Messaging infrastructure that enables communication between different parts of a cloud-based application.
DevOps

CPU Limit

Restriction on the amount of processing power allocated to a particular process or container.
DevOps

CRUD (Create, Read, Update and Delete)

Four basic functions of persistent storage, fundamental to database operations and RESTful API design.
DevOps

CaaS

Containers as a Service; cloud-based service that provides container orchestration and management.
DevOps

Cadence

Regular rhythm or pattern of work or processes, often used in the context of software development and release cycles.
DevOps

Canary Deployment

Technique of rolling out changes to a small subset of users before a full deployment.
DevOps

Canary Release

Gradual rollout of new features to a subset of users to test in production with reduced risk.
DevOps

Capacity Test

Performance test to determine how many users or transactions a system can handle before performance degrades.
DevOps

Capistrano

Remote server automation and deployment tool, primarily used for deploying web applications by scripting arbitrary deployment tasks.
DevOps

Certificate Authority (CA)

Trusted entity that issues digital certificates for secure communication over networks.
DevOps

CfEngine

Open-source configuration management system for managing large numbers of computers.
DevOps

Chain of Custody

Documentation of the movement and handling of evidence in security incidents or investigations.
DevOps

Change Failure Rate

Percentage of changes to production or released to users that result in degraded service or require remediation.
DevOps

Chaos Engineering

Practice of intentionally introducing failures in a system to test its resilience and identify weaknesses.
DevOps

Chaos Monkey

Tool developed by Netflix to randomly terminate instances in production to test system fault tolerance.
DevOps

Chaos Testing

Deliberate introduction of faults into a system to verify its ability to withstand turbulent conditions.
DevOps

ChatOps

Approach to managing IT operations and workflows through conversation-driven development.
DevOps

Chef

Configuration management tool that uses a pure-Ruby domain-specific language for writing system configurations.
DevOps

Chocolatey

Package manager for Windows, automating software installation, upgrade, and configuration.
DevOps

Clean Code Prinzipien

Set of principles aimed at producing readable, maintainable, and efficient code, promoting software quality and developer productivity.
DevOps

Click Fraud

Fraudulent clicks on pay-per-click advertisements to generate charges for advertisers.
DevOps

Clickjacking

Malicious technique of tricking users into clicking on hidden or disguised elements on a webpage.
DevOps

Client Side Attacks

Security threats that target vulnerabilities in web browsers or other client applications.
DevOps

Cloud Application

Software program where cloud-based and local components work together, primarily processed on remote servers.
DevOps

Cloud Automation

Use of tools and processes to reduce manual efforts in deploying and managing cloud computing workloads.
DevOps

Cloud Computing

Delivery of computing services over the internet, including servers, storage, databases, and software.
DevOps

Cloud Infrastructure

Hardware and software components required to support cloud computing delivery model.
DevOps

Cloud Infrastructure Security

Measures and controls to protect data, applications, and infrastructure associated with cloud computing.
DevOps

Cloud Management

Control and oversight of cloud computing resources, often through automated tools.
DevOps

Cloud Migration

Process of moving data, applications, or other business elements from an on-premises environment to the cloud.
DevOps

Cloud Native Computing Foundation (CNCF)

Organization promoting cloud native technologies and practices to shape the evolution of cloud computing.
DevOps

Cloud Native DevOps

Practices combining cloud native technologies with DevOps principles for faster, more flexible software delivery.
DevOps

Cloud Orchestration

Arrangement and coordination of automated tasks resulting in a consolidated process or workflow.
DevOps

Cloud Security Alliance (CSA)

Organization that defines best practices to help ensure a secure cloud computing environment.
DevOps

Cloud Security Monitoring

Continuous monitoring of cloud-based assets and services to detect security threats and vulnerabilities.
DevOps

Cloud Security Posture Management

Continuous monitoring of cloud infrastructure to identify misconfigurations and compliance risks.
DevOps

Cloud-native

Designed to take full advantage of cloud computing frameworks, beyond simple rehosting in the cloud.
DevOps

Cloud-native Security

Security practices and tools designed specifically for cloud-native applications and infrastructure.
DevOps

CloudWatch

Amazon Web Services' monitoring and observability service for cloud resources and applications.
DevOps

Code All Your Resources

Practice of managing all aspects of infrastructure and operations through code, enabling version control and automation.
DevOps

Code Dependencies

External libraries, modules, or packages that a software project relies on to function properly.
DevOps

Code Injection

Security vulnerability where an attacker inserts malicious code into a vulnerable application.
DevOps

Code Promotion

Process of moving code through various stages of development, testing, and deployment.
DevOps

Code Signing

Process of digitally signing executables and scripts to confirm the software author and guarantee it hasn't been altered.
DevOps

Code-first Workflow

Development approach where code is written before database schemas or other structures are defined.
DevOps

Coding Standards

Set of guidelines for programming style and practices within a project or organization.
DevOps

Cognitive Load

Mental effort required to learn new information or complete tasks, important in user experience design and learning theory.
DevOps

Collectd

System statistics collection daemon that collects, transfers, and stores performance data of computers and network equipment.
DevOps

Common Vulnerabilities and Exposures (CVE)

List of publicly disclosed cybersecurity vulnerabilities, providing a standardized identifier for known issues.
DevOps

Common Weakness Enumeration (CWE)

Comprehensive list of common software and hardware weakness types, serving as a common language for describing security vulnerabilities.
DevOps

Complex-Adaptive System (CAS)

System of interconnected components that can adapt and self-organize in response to changes.
DevOps

Complex-Adaptive Systems

Systems of interconnected components that can adapt and evolve in response to changes in their environment.
DevOps
@mention

@mention

A feature in Git platforms that allows users to notify specific team members or reference issues by using the @ symbol followed by a username.
API preview

API preview

A feature allowing developers to test and provide feedback on new Git API functionality before it's officially released.
Bare Repository

Bare Repository

A Git repository containing version control information without a working directory, typically used as a central repository for collaboration.
Bisect

Bisect

A Git command used to perform a binary search through a repository's history to identify the commit that introduced a bug or issue.
Bitbucket Pipelines

Bitbucket Pipelines

An integrated CI/CD service in Bitbucket for automating builds, tests, and deployments.
Blame

Blame

A Git feature that shows which user last modified each line of a file, helping developers trace changes and understand code history.
Blamestorming

Blamestorming

A collaborative process of analyzing Git blame information to identify the source of bugs or issues in a codebase.
Branch

Branch

A parallel version of a repository, allowing developers to work on different features or experiments without affecting the main codebase.
Branch policies

Branch policies

Rules enforced on Git branches to ensure code quality, require reviews, or restrict certain actions before merging.
Business plan

Business plan

A premium subscription tier offered by Git hosting services, providing advanced features and support for enterprise users.
CA certificate

CA certificate

A digital certificate issued by a Certificate Authority, used in Git to establish secure HTTPS connections and verify server identities.
Cache

Cache

A temporary storage area that holds frequently accessed data for quick retrieval, improving system performance.
Checkout

Checkout

A Git command used to switch between different branches or restore files from a specific commit in a repository's history.
Cherry-Pick

Cherry-Pick

A Git operation that applies the changes from a specific commit to the current branch, useful for selective code integration.
Cherry-picking

Cherry-picking

The practice of selecting and applying specific commits from one branch to another in Git, often used for targeted bug fixes.
Clone

Clone

The process of creating a local copy of a remote Git repository, allowing developers to work on the codebase independently.
Code owners file

Code owners file

A file specifying individuals or teams responsible for code in different parts of a repository.
Commit

Commit

Operation in version control systems that saves changes to the local repository, creating a new revision with a unique identifier.
Conflict

Conflict

A situation in Git where incompatible changes have been made to the same part of a file, requiring manual resolution before merging.
Continuous Integration

Continuous Integration

Practice of merging all developer working copies to a shared mainline several times a day.
DAG (Directed Acyclic Graph)

DAG (Directed Acyclic Graph)

Directed Acyclic Graph, the underlying data structure used by Git to represent the commit history and relationships between commits.
Detach HEAD

Detach HEAD

A Git operation that moves the HEAD pointer to a specific commit, allowing for temporary exploration of historical states.
Diff

Diff

A Git command or operation that shows the differences between two commits, branches, files, or other Git objects.
Downstream

Downstream

Refers to the direction of change propagation in Git, typically from a parent branch to its child branches or forks.
Explorer

Explorer

A feature in Git platforms for browsing repository contents, viewing files, and navigating through different branches.
Feature branch workflow

Feature branch workflow

A Git pattern where each new feature is developed in a dedicated branch, then merged back to the main branch.
Fetch

Fetch

A Git command that retrieves changes from a remote repository without automatically merging them into the local branch.
Force Push

Force Push

A Git push operation that overwrites the remote branch's history with the local branch, potentially causing data loss if used carelessly.
Fork

Fork

A personal copy of another user's repository on a Git hosting platform, allowing independent development without affecting the original project.
Free plan

Free plan

A no-cost tier offered by Git hosting services, typically with limited features and storage for individual users or small projects.
GPG (GNU Privacy Guard)

GPG (GNU Privacy Guard)

An encryption software used with Git for signing commits and tags, enhancing security and verification.
Gist

Gist

A simple way to share code snippets, notes, or small files using Git, often integrated into Git platforms.
Git

Git

Distributed version control system for tracking changes in source code during software development.
Git Alias

Git Alias

A custom shortcut command defined by users to simplify complex or frequently used Git operations.
Git Alternates

Git Alternates

A mechanism in Git allowing a repository to borrow objects from another repository, useful for saving disk space in large projects.
Git Annotate

Git Annotate

A Git command that shows the author and commit information for each line in a file, similar to the "blame" feature.
Git Assume Unchanged

Git Assume Unchanged

A Git feature that tells the system to temporarily ignore changes to a tracked file, useful for local configuration files.
Git Attributes

Git Attributes

A mechanism in Git for defining attributes on a per-path basis, controlling how Git handles certain files or directories.
Git Bisect

Git Bisect

A Git command used to perform a binary search through the commit history to find the commit that introduced a bug.
Git Bisect Run

Git Bisect Run

An automated version of Git Bisect that uses a script to determine if each checked-out commit is "good" or "bad".
Git Blame -C (Copy Detection)

Git Blame -C (Copy Detection)

An enhanced version of Git Blame that detects lines moved or copied from other files, providing better change tracking.
Git Bundle

Git Bundle

A Git command that creates a single file containing all the data needed to recreate a repository's branch or history.
Git Bundle Create/Verify

Git Bundle Create/Verify

Commands to create and verify Git bundles, useful for transferring repository data without using a network.
Git Cheat Sheet

Git Cheat Sheet

A quick reference guide summarizing common Git commands and their usage, helpful for both beginners and experienced users.
Git Cherry

Git Cherry

A Git command used to find commits that haven't been merged upstream, useful for identifying changes to be applied to another branch.
Git Clean

Git Clean

A command to remove untracked files from the working directory, helping to maintain a clean repository state.
Git Commit --amend

Git Commit --amend

A command that allows you to modify the most recent commit, adding new changes or updating the commit message.
Git Commit Amend

Git Commit Amend

A command that allows you to modify the most recent commit, changing its message or contents, and update it without creating a new commit.
Git Commit Hooks

Git Commit Hooks

Scripts that run automatically before or after a commit, allowing you to enforce rules, format code, or perform checks on changes.
Git Commit Templates

Git Commit Templates

Predefined structures for commit messages, helping maintain consistency and include necessary information in commits.
Git Commit Trailers

Git Commit Trailers

Metadata added to the end of commit messages, often used for things like issue references or sign-offs.
Git Commit-graph

Git Commit-graph

A file format used to store commit graph structure, improving performance for operations that traverse commit history.
Git Commit-graph Verify

Git Commit-graph Verify

A command to check the integrity and validity of the commit-graph file in a Git repository.
Git Commit-tree

Git Commit-tree

A low-level Git command used to create a new commit object from an existing tree object.
Git Config

Git Config

A command and system for setting configuration options for Git on a global, local, or repository level.
Git Count-objects

Git Count-objects

A diagnostic command that provides statistics about the number and size of objects in a Git repository.
Git Credential Helper

Git Credential Helper

A system that securely stores and retrieves credentials for Git operations, reducing the need for manual authentication.
Git Daemon

Git Daemon

A lightweight server for the Git protocol, allowing anonymous read access to Git repositories.
Git Dangling Objects

Git Dangling Objects

Objects in Git that are not reachable from any reference, often created during rebasing or other history-altering operations.
Git Describe

Git Describe

A command that generates a human-readable name for a commit based on the most recent tag and additional commit information.
Git Diff

Git Diff

A command that shows changes between commits, branches, files, or the working directory and the index.
Git Diff Algorithms

Git Diff Algorithms

Various methods used by Git to compute differences between versions of files, optimizing for different scenarios.
Git Diff Tool

Git Diff Tool

An external program or interface used to visualize differences between files or commits in a more user-friendly manner.
Git Fetch --All

Git Fetch --All

A command that fetches updates from all remote repositories configured in a Git project.
Git Filter-branch

Git Filter-branch

A powerful tool for rewriting Git history, allowing for large-scale changes across many commits.
Git Flow

Git Flow

A branching model for Git that defines a strict branching structure designed to support multiple parallel developments.
Git Fork

Git Fork

The process of creating a personal copy of someone else's project, allowing for independent development without affecting the original.
Git Fsck

Git Fsck

A command that verifies the connectivity and validity of objects in the Git database.
Git Fsck (File System Check)

Git Fsck (File System Check)

Verifies the integrity of objects in the Git database, checking for corruption and inconsistencies.
Git GPG verification

Git GPG verification

A security feature in Git that uses GPG to sign and verify commits and tags, ensuring authenticity.
Git Garbage Collection (gc)

Git Garbage Collection (gc)

A process that optimizes the Git repository by removing unnecessary files and compressing objects.
Git Gc (Garbage Collection)

Git Gc (Garbage Collection)

Short for Git Garbage Collection, a command to clean up unnecessary files and optimize the repository.
Git Grep

Git Grep

A command for searching files in a Git repository using regular expressions or simple string matching.
Git Hook

Git Hook

A script that Git automatically runs before or after specific events, like commits or merges, to customize workflows and enforce rules.
Git Hooks

Git Hooks

Same as Git Hook, scripts triggered by various Git actions to automate tasks or enforce policies.
Git Ignore

Git Ignore

A mechanism to specify intentionally untracked files that Git should ignore, typically defined in a .gitignore file.
Git Index Format

Git Index Format

The internal format used by Git to store the staging area information, representing the next commit to be made.
Git Init

Git Init

A command used to initialize a new Git repository, creating the necessary directory structure for version control.
Git Interactive Rebase

Git Interactive Rebase

A feature allowing users to modify commits in their branch history, useful for cleaning up before merging.
Git Internals (objects, refs, etc.)

Git Internals (objects, refs, etc.)

The underlying data structures and mechanisms Git uses to store and manage version control information.
Git Interpret-trailers

Git Interpret-trailers

A command to parse and manipulate the trailer lines typically found at the end of commit messages.
Git LFS (Large File Storage)

Git LFS (Large File Storage)

A system that manages large files by storing them outside the main repository, replacing them with lightweight pointers to improve performance and efficiency.
Git Large File Storage (LFS)

Git Large File Storage (LFS)

An extension that replaces large files with text pointers in Git, while storing the file contents on a remote server.
Git Log

Git Log

A command to display the commit history of a repository, showing details like author, date, and commit message.
Git Maintenance

Git Maintenance

A set of tasks performed to keep a Git repository in good condition, including garbage collection and optimization.
Git Merge Strategies

Git Merge Strategies

Different algorithms used by Git to combine separate development histories when merging branches.
Git Merge Tools

Git Merge Tools

External programs or interfaces used to resolve merge conflicts in a more visual and user-friendly manner.
Git Merge-base

Git Merge-base

A command that finds the best common ancestor between two commits, useful for determining the point where branches diverged.
Git Multi-pack Index (MIDX)

Git Multi-pack Index (MIDX)

A feature that improves performance for repositories with many pack files by creating an index across multiple packs.
Git Namespaces

Git Namespaces

A feature allowing multiple references (like branches or tags) with the same name to coexist by separating them into different namespaces.
Git Notes

Git Notes

A way to add or inspect object notes, allowing additional information to be attached to Git objects without changing their SHA-1 hash.
Git Object Storage

Git Object Storage

The system Git uses to store all the versions of files, commits, and other objects in a content-addressable filesystem.
Git Pack Files

Git Pack Files

Compressed files containing Git objects, used to efficiently store and transfer repository data.
Git Packfile Format

Git Packfile Format

The internal format used by Git to store multiple objects efficiently in a single file, reducing disk usage and improving performance.
Git Partial Clone

Git Partial Clone

A feature allowing users to clone a repository without downloading all of its objects, saving bandwidth and storage.
Git Patch

Git Patch

A file format representing changes between versions, used for sharing and applying modifications across different repositories.
Git Plumbing Commands

Git Plumbing Commands

Low-level Git commands that expose the internal workings of Git, primarily used for scripting and advanced operations.
Git Porcelain Commands

Git Porcelain Commands

User-friendly commands for everyday tasks, like git status and git commit, designed for ease of use and clear output.
Git Protocol

Git Protocol

The native network protocol used by Git for efficient data transfer between repositories.
Git Prune

Git Prune

A command that removes objects that are no longer reachable from any references in the repository.

3D Stacked Memory for Cloud Servers

High-density memory architecture using vertically stacked chips, enhancing performance and capacity in cloud server hardware.

5G Cloud

Cloud infrastructure optimized for 5G networks, supporting high-speed, low-latency services and applications.

5G Network Slicing

Technique to create multiple virtual networks on a shared physical 5G infrastructure, each optimized for specific use cases.

5G and Edge Computing

Integration of 5G networks with edge computing to enable low-latency, high-bandwidth applications closer to end-users.

6G Cloud Integration

Future convergence of 6G networks with cloud computing, promising ultra-high speeds and advanced capabilities.

ACID Compliance

Database transaction properties (Atomicity, Consistency, Isolation, Durability) ensuring data integrity in cloud environments.

AI Ethics Compliance Tools

Software ensuring AI systems adhere to ethical guidelines and regulations in cloud deployments.

AI Ethics and Bias Detection Tools

Software for identifying and mitigating ethical issues and biases in AI models deployed in cloud environments.

AI Ethics and Governance Tools

Solutions for managing ethical considerations and regulatory compliance in cloud-based AI systems.

AI Governance Frameworks

Structured approaches for managing AI development, deployment, and use in cloud environments.

AI Model Governance Platforms

Comprehensive solutions for managing, monitoring, and controlling AI models in cloud-based systems.

AI Model Interpretability Services

Cloud-based tools for explaining and understanding the decision-making processes of AI models.

AI Model Interpretability Tools

Software for analyzing and explaining AI model decisions, crucial for transparency in cloud AI services.

AI Model Marketplaces

Cloud platforms for discovering, sharing, and monetizing pre-trained AI models and algorithms.

AI Model Monitoring and Drift Detection

Tools for tracking AI model performance and identifying deviations from expected behavior in cloud environments.

AI Model Versioning and Governance

Systems for managing different versions of AI models and enforcing governance policies in cloud deployments.

AI-Assisted Coding Platforms

Cloud-based development environments that use AI to assist programmers in writing and optimizing code.

AI-Augmented Analytics

Integration of AI capabilities into data analytics processes in cloud environments for enhanced insights.

AI-Driven Capacity Planning

Use of AI algorithms to predict and optimize resource allocation in cloud infrastructures.

AI-Driven Cloud Optimization

Application of AI techniques to improve efficiency, performance, and cost-effectiveness of cloud resources.

AI-Driven Cloud Resource Allocation

Automated distribution of cloud resources using AI to optimize performance and cost-efficiency.

AI-Driven Cloud Service Composition

AI-based automation of cloud service selection and integration for complex workflows.

AI-Driven Code Generation

Automated creation of source code using AI models, often integrated into cloud development platforms.

AI-Driven Data Classification

Automated categorization and labeling of data using AI algorithms in cloud storage and processing systems.

AI-Driven Network Optimization

Use of AI to improve network performance, efficiency, and security in cloud environments.

AI-Driven Resource Allocation

Intelligent distribution of computing resources in cloud environments using AI algorithms.

AI-Driven Security Information and Event Management (SIEM)

Enhanced SIEM systems using AI for improved threat detection and response in cloud environments.

AI-Driven Threat Detection

Use of AI algorithms to identify and analyze potential security threats in cloud systems.

AI-Driven Threat Hunting

Proactive search for hidden threats in cloud environments using AI-powered analytics and automation.

AI-Optimized Cloud Hardware

Cloud infrastructure components designed or configured to enhance AI workload performance.

AI-Optimized Databases

Database systems tailored for AI workloads, often featuring in-memory processing and distributed architectures.

AI-Powered Anomaly Detection

Use of AI algorithms to identify unusual patterns or behaviors in cloud systems and data.

AI-Powered Integration

Intelligent automation of data and application integration processes in cloud environments using AI.

AI-as-a-Service

Cloud-based offering of AI capabilities, allowing businesses to leverage AI without extensive in-house expertise.

AI-as-a-Service (AIaaS)

Cloud-based AI capabilities offered as a service, enabling easy integration of AI into applications.

AIOps

Application of AI for automating and enhancing IT operations management in cloud environments.

AIOps Platforms

Integrated solutions leveraging AI for automated monitoring, analysis, and management of cloud IT operations.

AIOps for Predictive Maintenance

Use of AI-driven analytics to forecast and prevent system failures in cloud infrastructure.

API Security Gateway

Service that protects APIs in cloud environments by managing access, monitoring traffic, and preventing attacks.

API Security Gateways

Dedicated services for securing and managing APIs in cloud environments, including access control and threat protection.

API-First Development

Design approach prioritizing API creation before implementation, common in cloud-native application development.

API-Led Connectivity

Integration strategy using purpose-built APIs to connect data, devices, and applications in cloud ecosystems.

AR Cloud

Persistent 3D digital content overlaid on the physical world, accessible via cloud infrastructure for augmented reality applications.

AR/VR Analytics

Cloud-based tools for analyzing user behavior and performance in augmented and virtual reality environments.

AR/VR Collaboration Platforms

Cloud-hosted services enabling multi-user interaction in shared augmented or virtual reality spaces.

AR/VR Content Delivery Network

Specialized CDN optimized for delivering AR/VR content with low latency and high bandwidth.

AR/VR Development Platforms

Cloud-based tools and services for creating, testing, and deploying augmented and virtual reality applications.

ARM Templates (Azure)

JSON-based files defining infrastructure and configuration for Azure resource deployment.

Adaptive User Interfaces for Cloud Services

Dynamic UIs that adjust based on user behavior, device capabilities, and context in cloud applications.

Adversarial Machine Learning Detection

Techniques to identify and mitigate attacks on ML models in cloud-based AI systems.

Alerting and Notification

Systems for informing administrators or users about important events or issues in cloud environments.

Algorithmic Auditing

Process of examining AI algorithms for bias, errors, or unintended consequences in cloud-based systems.

Ambient Computing Interfaces for Cloud

Seamless, context-aware interaction methods for accessing cloud services in IoT environments.

Anomaly Detection Systems

Tools for identifying unusual patterns or behaviors in cloud systems, often using machine learning techniques.

Application-Aware Networking

Network management approach that optimizes performance based on specific application requirements in cloud environments.

Approximate Query Processing

Technique for quickly estimating query results in large-scale cloud databases, trading accuracy for speed.

Archive Storage (e.g., Amazon Glacier, Azure Archive Storage)

Low-cost cloud storage for infrequently accessed data with longer retrieval times, e.g., Amazon Glacier, Azure Archive Storage.

Artifact Repository

Cloud-based storage for software build outputs, dependencies, and related metadata.

Artificial General Intelligence (AGI) as a Service

Hypothetical cloud offering of human-level AI capabilities across various domains.

Artificial General Intelligence Research Platforms

Cloud-based environments for developing and testing advanced AI systems approaching human-level intelligence.

Audit Logging

Systematic recording of actions and events in cloud systems for security and compliance purposes.

Audit Trails

Chronological records of system activities for reconstructing and examining the sequence of events in cloud environments.

Augmented Analytics

Integration of machine learning and natural language processing in cloud-based data analytics workflows.

Augmented Reality (AR) Cloud

Shared, persistent digital content overlaid on the physical world, accessible via cloud infrastructure.

Augmented Reality Cloud Interfaces

Cloud-based systems for managing and delivering AR content and experiences, enabling scalable AR applications.

Augmented Reality Cloud Rendering

Cloud-powered generation of AR graphics and content, offloading processing from end-user devices.

Auto Scaling Groups

Collections of EC2 instances that automatically adjust capacity based on defined conditions.

Auto-scaling

Automatic adjustment of cloud resources to match workload demands, ensuring optimal performance and cost-efficiency.

AutoML

Automated machine learning processes for model selection, hyperparameter tuning, and feature engineering in cloud environments.

AutoML in the Cloud

Cloud-based services automating the machine learning pipeline from data preparation to model deployment and monitoring.

Automated AI Pipeline Optimization

AI-driven tools for improving efficiency and performance of machine learning workflows in the cloud.

Automated Cloud Governance Enforcement

Systems that automatically implement and maintain cloud resource policies and compliance.

Automated Compliance Monitoring

Continuous, AI-driven assessment of cloud systems against regulatory and security standards.

Automated Data Discovery

AI-powered tools for identifying, categorizing, and mapping data assets in cloud environments.

Automated Data Governance

AI-driven systems for managing data quality, security, and compliance in cloud environments.

Automated Data Wrangling Services

Cloud-based tools using AI to clean, transform, and prepare data for analysis, streamlining data preparation processes.

Automated Feature Engineering

AI-powered generation and selection of features for machine learning models in cloud environments.

Automated Incident Response Orchestration

AI-driven coordination of security incident detection and resolution in cloud systems, automating response workflows.

Automated Machine Learning (AutoML)

Cloud services that automate the process of creating and optimizing machine learning models, from data prep to deployment.

Automated Machine Learning (AutoML) Platforms

Cloud-based systems that automate the end-to-end machine learning model development process, including feature engineering and model selection.

Automated Penetration Testing

AI-driven tools for simulating cyberattacks to identify vulnerabilities in cloud systems and applications.

Automated Threat Modeling

AI-powered analysis of cloud architectures to identify potential security risks and attack vectors.

Autonomous Systems in the Cloud

Self-managing, self-healing cloud services requiring minimal human intervention, leveraging AI for operations.

Azure Edge Zones

Ultra-low latency edge computing extensions of Azure for 5G networks, bringing cloud resources closer to users.

Azure Policy

Service for creating, assigning, and managing policies to control Azure resources and ensure compliance.

B2B Integration Platforms

Cloud-based services facilitating data exchange and process integration between business partners.

Backend for Frontend (BFF) Pattern

Architectural approach creating backend services tailored to specific frontend application needs in cloud environments.

Bare Metal Server

Physical server dedicated to a single tenant, offering direct hardware access in cloud environments.

Bare Metal Servers

Dedicated physical servers without virtualization, offered as a cloud service for high-performance workloads.

Batch Processing (e.g., AWS Batch, Azure Batch)

Execution of series of jobs without user interaction, often for large-scale data processing in the cloud (e.g., AWS Batch, Azure Batch).

Big Data Clusters

Distributed computing environments for processing and analyzing massive datasets in the cloud.

Billing Dashboard

Interface for monitoring and managing cloud service usage and costs, providing detailed breakdowns and forecasts.

Biocomputing in the Cloud

Use of cloud resources for computational biology and genomics research, enabling large-scale analysis and modeling.

Biodiversity Impact Assessment for Cloud Facilities

Evaluation of cloud data center effects on local ecosystems and wildlife to ensure sustainable operations.

Block Storage

Cloud storage that provides fixed-size raw storage volumes, typically used for databases or file systems.

Block Storage (e.g., Amazon EBS, Azure Disk Storage)

Cloud services providing persistent block-level storage volumes for use with compute instances.

Blockchain Analytics

Cloud-based tools for analyzing and visualizing blockchain data and transactions, offering insights into network activity.

Blockchain Databases

Distributed databases using blockchain technology for enhanced security and immutability in cloud environments.

Blockchain Governance Tools

Software for managing and enforcing rules, permissions, and consensus mechanisms in blockchain networks deployed on cloud platforms.

Blockchain Integration Services

Cloud-based solutions for connecting blockchain networks with existing enterprise systems and applications.

Ceph RadosGW

Object storage gateway for Ceph, providing S3-compatible API for container storage needs in Kubernetes.

Cgroup (Control Group)

Linux kernel feature for limiting, prioritizing, and isolating resource usage of container groups.

Change Data Capture (CDC)

Technique for tracking and capturing changes in databases, useful in microservices architectures.

Chaos Engineering in CI/CD

Practice of intentionally injecting failures in CI/CD pipelines to improve system resilience.

Chaos Mesh for Reliability Testing

Platform for simulating various abnormal scenarios in Kubernetes environments to test reliability.

Checkov for IaC Security Scanning

Static code analysis tool for detecting misconfigurations in Infrastructure as Code deployments.

Cilium

Open-source networking, observability, and security solution for container workloads based on eBPF.

Cilium Service Mesh

eBPF-powered service mesh offering high-performance traffic management and security for microservices.

Cilium's Hubble for Network Observability

Observability platform for Kubernetes providing deep visibility into container network flows.

Cilium's eBPF Datapath

High-performance networking mode in Cilium using extended Berkeley Packet Filter for packet processing and security.

CircleCI

Continuous integration and delivery platform supporting containerized application testing and deployment.

Circuit Breaker Pattern

Fault tolerance pattern preventing cascading failures in distributed containerized systems.

Circuit Breaking

Technique to detect failures and prevent system overload in microservices architectures, enhancing resilience.

Claim Check Pattern for Large Messages

Design pattern for handling large payloads in microservices by storing data externally, improving efficiency.

Clair for Static Image Analysis

Open-source tool for static analysis of vulnerabilities in container images, enhancing security.

Cloud Controller Manager

Kubernetes component managing interactions between cluster and cloud provider APIs, enabling cloud integration.

Cloud Native Application Bundle (CNAB)

Specification for packaging and managing distributed applications across different environments.

Cloud-Native Buildpacks

Tooling for building container images from source code without Dockerfiles, adhering to best practices.

Cloud-Native Design Patterns

Architectural patterns specifically tailored for distributed, containerized applications in cloud environments.

CloudEvents

Specification for describing event data in common formats, facilitating event-driven architectures in cloud environments.

CloudEvents Specification

Isolation technique in containerized microservices to prevent failure propagation across the system.

Cluster

Group of servers or other resources that work together as a single system to provide high availability.

Cluster API

Kubernetes project for declarative management and provisioning of clusters using Kubernetes-style APIs.

Cluster API Provider

Implementation of Cluster API for specific infrastructure providers, enabling cluster lifecycle management.

Cluster Autoscaler

Kubernetes component that automatically adjusts the size of a cluster based on resource demands.

Cluster Capacity Planning

Process of estimating and allocating resources needed for container workloads in a cluster.

Cluster Federation

Mechanism for coordinating multiple Kubernetes clusters, enabling multi-cluster application deployment and management.

Cluster Mesh

Interconnected network of container clusters, enabling cross-cluster communication and resource sharing.

Cluster Networking

Network configuration and management within and between container clusters, enabling inter-container communication.

Cluster Upgrade Process

Procedure for updating the Kubernetes version and components of a cluster while minimizing disruptions.

Cluster-level Logging

Centralized logging solution capturing logs from all containers and nodes in a cluster, aiding in troubleshooting.

ClusterAutoscaler

Kubernetes component that automatically adjusts the number of nodes in a cluster based on resource utilization.

ClusterIP

Kubernetes service type that exposes the service on an internal IP within the cluster, facilitating internal communication.

ClusterIP Services

Kubernetes services accessible only within the cluster, used for internal communication between pods.

ClusterRole

Kubernetes RBAC resource defining permissions across an entire cluster, not limited to a single namespace.

ClusterRoleBinding

Kubernetes RBAC resource that binds a ClusterRole to users, groups, or service accounts across all namespaces.

ClusterServiceVersion (CSV)

Custom resource in Operator Lifecycle Manager describing a specific version of an Operator.

Codefresh GitOps

GitOps platform for managing and automating containerized application deployments, streamlining CD workflows.

Cold Start Optimization

Techniques to reduce initialization time of containers, particularly important in serverless environments.

Compensating Transaction Pattern

Design pattern for handling failures in distributed container-based systems by reversing or compensating actions.

ConfigMap

Kubernetes API object used to store non-confidential data in key-value pairs, accessible by pods.

Consul Connect

Service mesh feature of Consul providing secure service-to-service communication with automatic TLS encryption.

Container

Standardized unit of software that packages code and all its dependencies for quick, reliable deployment.

Container Breakout Techniques

Methods used by attackers to escape container isolation and access the host system, posing security risks.

Container Engine

Software responsible for managing container lifecycle, including creation, execution, and destruction.

Container Escape

Security vulnerability allowing a process to break out of container isolation and access the host system.

Container Escape Prevention

Security measures and best practices to prevent containers from breaking out of their isolation.

Container Escape Vulnerabilities

Weaknesses in container runtimes or configurations that could allow processes to escape isolation.

Container Health Checks

Mechanisms to verify the health and readiness of containerized applications, ensuring service availability.

Container Host

Physical or virtual machine running the container runtime and hosting containers, providing the execution environment.

Container Image Promotion

Process of moving container images through different environments (e.g., dev, test, prod) in a controlled manner.

Container Image Signing

Cryptographic process of digitally signing container images to ensure their integrity and authenticity during distribution.

Container Lifecycle

Stages a container goes through from creation to termination, including running, paused, and stopped states.

Container Lifecycle Management

Processes and tools for managing containers throughout their lifecycle, from creation to deletion.

Container Logging

Process of capturing and managing log output from containerized applications for monitoring and troubleshooting.

Container Manifest

Configuration file specifying how to build a container image, including base image, commands, and environment setup.

Container Metrics

Quantitative measures of container performance, resource usage, and health, used for monitoring and optimization.

Container Network Interface (CNI)

Specification and libraries for configuring network interfaces in Linux containers, standardizing networking.

Container Network Interface (CNI) Spec

Standard for developing plugins to configure network interfaces in Linux containers, ensuring interoperability.

Container Networking Model

Architecture and principles governing how containers communicate within and across hosts in orchestrated environments.

Container Orchestration

Automated arrangement, coordination, and management of software containers, crucial in large-scale deployments.

Container Probes (Liveness, Readiness, Startup)

Kubernetes mechanisms (liveness, readiness, startup) for checking container health and controlling lifecycle.

Container Real User Monitoring (RUM)

Technique for capturing and analyzing real user interactions with containerized applications.

Container Restart Policies

Rules defining how containers should be restarted in case of failures or exits, enhancing application resilience.

Container Runtime

Software responsible for running containers, managing their lifecycle from creation to deletion.

Container Runtime Security

Measures and tools to protect containers during execution, preventing unauthorized access or malicious activities.

Container Shims

Lightweight processes that manage the lifecycle of containers and provide abstraction between runtimes.

Container Storage Interface (CSI)

Standardized interface for container orchestration platforms to interact with storage systems.

Container Storage Interface (CSI) Spec

Standard for developing storage plugins for container orchestration platforms, enabling storage extensibility.

Container Vulnerability Scanning

Process of identifying security vulnerabilities in container images and their dependencies.

Content Trust

Mechanism for verifying the integrity and authenticity of container images before deployment.

Continuous Deployment

Automated process of releasing container images to production environments after passing tests.

Continuous Verification

Ongoing process of validating deployed containers against defined policies and expectations.

Contiv-VPP for High-performance Networking

Container networking solution using VPP (Vector Packet Processing) for optimized performance.

Contract-First API Development

Approach prioritizing API definition before implementation, crucial for microservices architecture.

Control Groups (cgroups)

Linux kernel feature for limiting, prioritizing, and isolating resource usage of container groups.

Control Plane

Components managing the overall state of a container cluster, including API server, scheduler, and controllers.

Control Plane Upgrade

Process of updating the core components of a container orchestration system while maintaining cluster stability.

Controller Manager

Kubernetes component running controller processes to regulate the state of the cluster, maintaining desired state.

Controller Runtime

Software framework for building Kubernetes controllers and operators, simplifying custom resource management.

Conversion Webhooks

Kubernetes feature allowing custom resource API version conversions via external webhooks.

Copy-on-Write (CoW)

Storage optimization technique used in container filesystems to reduce duplication and improve efficiency.

Cordon

Process of marking a node as unschedulable in Kubernetes, preventing new pods from being assigned to it.

CoreDNS

Flexible, extensible DNS server used for service discovery in Kubernetes clusters, replacing kube-dns.

Cortex

Horizontally scalable, multi-tenant, long-term storage for Prometheus metrics, enhancing monitoring capabilities.

Cortex for Multi-tenant Prometheus

Use of Cortex to provide isolated Prometheus monitoring for multiple users or teams in shared environments.

CronJob

Kubernetes object for creating time-based jobs, running containers on a schedule for automated tasks.

CronJob Patterns

Kubernetes patterns for running batch processes and scheduled tasks in containerized environments.

Cross-namespace Operators

Kubernetes operators capable of managing resources across multiple namespaces, enabling broader automation.

Custom Metrics API

Kubernetes API extension allowing pods to consume custom metrics for autoscaling and monitoring.

Custom Resource

Extension of the Kubernetes API that defines new, custom resource types specific to a cluster's needs.

Custom Resource Conversion

Process of converting custom resources between different API versions in Kubernetes, enabling API evolution.

Custom Resource Definition (CRD)

Kubernetes API extension allowing the definition of custom resources, enabling cluster customization.

Custom Resource Definitions (CRDs)

Kubernetes feature for extending the API with custom resources, enabling cluster customization.

Custom Resources

User-defined API objects in Kubernetes, extending the core functionality of the platform for specific use cases.

Custom Scheduler

Alternative or additional scheduler implementation for Kubernetes, allowing custom pod placement logic.

Custom Schedulers

Alternative scheduling implementations in Kubernetes for custom pod placement strategies, enabling specialized scheduling logic.

DNS for Services and Pods

Kubernetes feature providing DNS-based service discovery for containers within the cluster.

DPDK in Container Networks

Use of Data Plane Development Kit for high-performance packet processing in container networks.

DaemonSet

Kubernetes object ensuring that all (or some) nodes run a copy of a specific pod, useful for cluster-wide services.