Engineering Glossary

From fundamental principles to cutting-edge practices, this glossary covers the full spectrum of software engineering terminology.

DevOps
Cloud Computing
Git
Containerization & Orchestration

Compliance as Code

Approach to maintaining regulatory compliance by defining compliance requirements as code, enabling automation and consistency.
DevOps

Complicated-subsystem Team

Team responsible for a specific complex component within a larger system, requiring specialized knowledge.
DevOps

ConDep

Open-source tool for automating continuous deployment and server provisioning, simplifying infrastructure management.
DevOps

Configuration Drift

Inconsistencies between the desired configuration state and the actual state of a system.
DevOps

Configuration Management

Process of maintaining systems, such as computer servers, in a desired, consistent state across time.
DevOps

Configuration as Code (CaC)

Managing and provisioning computing infrastructure through machine-readable definition files.
DevOps

Constraint

Limitation or restriction in a system that affects its performance or capacity, often a focus in optimization efforts.
DevOps

Consul

Service networking platform to connect and secure services across any runtime platform and cloud.
DevOps

Container Image

Lightweight, standalone, executable package of software that includes everything needed to run an application.
DevOps

Container Registry

Centralized repository for storing, managing, and distributing container images, crucial for container-based development and deployment.
DevOps

Containerization

Encapsulating an application and its environment to ensure consistent operation across different computing environments.
DevOps

Containers

Lightweight, standalone executable packages of software that include everything needed to run an application.
DevOps

Containers-as-a-Service (CaaS)

Model where container engines, orchestration and underlying compute resources are provided on-demand.
DevOps

Content Delivery Network (CDN)

Geographically distributed network of proxy servers to provide high availability and performance.
DevOps

Continuous Compliance

Ongoing process of adhering to regulatory and security standards throughout the development lifecycle.
DevOps

Continuous Delivery (CD)

Approach where teams produce software in short cycles, ensuring it can be reliably released at any time.
DevOps

Continuous Delivery Pipeline

Automated implementation of an application's build, deploy, test, and release process.
DevOps

Continuous Deployment (CD)

Practice of automatically deploying every change that passes all stages of the production pipeline.
DevOps

Continuous Feedback

Constant flow of information about a product or process to facilitate continuous improvement.
DevOps

Continuous Governance

Ongoing process of implementing and monitoring policies and controls in software development.
DevOps

Continuous Improvement

Ongoing effort to enhance products, services, or processes, central to many management philosophies including Lean and Six Sigma.
DevOps

Continuous Integration (CI)

Development practice where code changes are automatically built, tested, and prepared for a release.
DevOps

Continuous Integration and Deployment (CI/CD)

Combined practices of Continuous Integration and either Continuous Delivery or Continuous Deployment.
DevOps

Continuous Intelligence

Real-time analytics embedded into business operations, processing current and historical data.
DevOps

Continuous Learning Culture

Organizational approach that encourages ongoing skill development and knowledge sharing.
DevOps

Continuous Monitoring

Automated process of identifying compliance and security risks in an IT infrastructure.
DevOps

Continuous Quality

Ongoing process of building quality assurance into every step of the development lifecycle.
DevOps

Continuous Quality Improvement (CQI)

Systematic approach to enhancing processes and products to achieve better performance.
DevOps

Continuous Reliability

Practice of building and maintaining reliable systems through constant monitoring and improvement.
DevOps

Continuous Security

Integrating security practices throughout the entire software development and deployment lifecycle.
DevOps

Continuous Testing

Process of executing automated tests as part of the software delivery pipeline to obtain feedback on business risks.
DevOps

Contract Testing

Testing method that verifies interactions at the boundary of an external service meet expectations.
DevOps

Cordova

Mobile application development framework that allows developers to build mobile apps using web technologies like HTML, CSS, and JavaScript.
DevOps

CoreOS

Lightweight Linux operating system designed for providing infrastructure to clustered deployments, now part of Red Hat.
DevOps

Coupon Scraping

Automated collection of online coupon codes, often to exploit promotional offers.
DevOps

Create Test for Every Bug

Practice of writing a test that reproduces a bug before fixing the issue, ensuring the bug doesn't recur.
DevOps

Credential Abuse

Unauthorized use of valid credentials to gain access to systems or data, often resulting from poor password practices or stolen credentials.
DevOps

Credential Stuffing

Cyberattack method where stolen account credentials are used to gain unauthorized access to user accounts through large-scale automated login requests.
DevOps

Credmgr

Credential manager tool for securely storing and managing passwords and other secrets.
DevOps

Cron Job

Time-based job scheduler in Unix-like operating systems, used to automate system maintenance or administration tasks.
DevOps

Cross Platform

Ability of software or hardware to work across different types of platforms or operating systems.
DevOps

Cross-Functional Team

Group of people with different functional expertise working toward a common goal.
DevOps

Cross-Site Scripting (XSS)

Security vulnerability allowing attackers to inject client-side scripts into web pages viewed by others.
DevOps

CruiseControl

Java-based framework for creating a custom continuous integration and deployment environment, popular in early CI/CD implementations.
DevOps

Cryptomining Malware

Malicious software that uses system resources to mine cryptocurrency without user consent.
DevOps

Culture

Shared values, beliefs, and practices that characterize an organization, crucial in shaping DevOps and Agile transformations.
DevOps

Cumulative Layout Shift (CLS)

Web performance metric measuring visual stability, quantifying how much page content unexpectedly shifts during loading.
DevOps

Cybersecurity

Practice of protecting systems, networks, and programs from digital attacks, crucial in today's interconnected world.
DevOps

DAST

Dynamic Application Security Testing; analyzes running applications to find vulnerabilities.
DevOps

DDoS

Distributed Denial of Service; cyberattack that floods a system with traffic to make it unavailable.
DevOps

DNS Lookup Time

Time taken to query the Domain Name System to translate a domain name into an IP address.
DevOps

DORA Metrics

Four key metrics (deployment frequency, lead time for changes, time to restore service, change failure rate) used to measure software delivery performance.
DevOps

Dark Launch

Technique of releasing features to production that are invisible to users until activated, allowing for testing in real environments.
DevOps

Dark Launching

Deploying code or feature flags to production without making them visible to users.
DevOps

Dark Release

Releasing new features to production that are invisible to users until activated.
DevOps

Dashboards

Visual displays of key performance indicators and metrics, providing at-a-glance views of business performance or system status.
DevOps

Data Breach

Incident where sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by unauthorized individuals.
DevOps

Data Leakage

Unauthorized transmission of data from within an organization to an external destination or recipient.
DevOps

Data Loss Prevention (DLP)

Set of tools and processes to ensure sensitive data is not lost, misused, or accessed by unauthorized users.
DevOps

Data Security

Protective measures applied to prevent unauthorized access to databases, websites, and computers.
DevOps

Database Management

Process of storing, organizing, and managing data in databases, ensuring data integrity, security, and accessibility.
DevOps

Database Versioning

Practice of keeping different versions of database schemas, often in conjunction with application versioning.
DevOps

Datadog

Monitoring and analytics platform for cloud-scale applications, providing full-stack observability for IT infrastructure and application performance.
DevOps

Dead Code

Source code that's never executed or has no effect on program output, often a target for removal to improve maintainability and performance.
DevOps

Declarative Infrastructure

Defining infrastructure using a descriptive model, focusing on what should be deployed rather than how.
DevOps

Dedicated Environment

Computing resources exclusively allocated to a single user, project, or organization.
DevOps

Defense-in-Depth (DiD)

Cybersecurity strategy that employs multiple layers of security controls to protect assets and data from various types of threats.
DevOps

Definition of Done

Agreed-upon set of items that must be completed before a project or user story can be considered complete.
DevOps

Deis

Open-source Platform-as-a-Service (PaaS) that makes it easy to deploy and manage applications.
DevOps

Denial of Service (DoS)

Cyberattack aimed at making a machine or network resource unavailable to its intended users.
DevOps

Deploykit

Tool designed to simplify and automate the process of deploying software applications across different environments and platforms.
DevOps

Deployment

Process of making software available and ready for use in a specific environment.
DevOps

Deployment Frequency

Rate at which new code or features are deployed to production, often used as a key metric in DevOps practices.
DevOps

Deployment Pattern

Standardized approach to rolling out software updates or changes, ensuring consistency and reliability in the deployment process.
DevOps

Deployment Pipeline

Automated manifestation of the process for getting software from version control to users.
DevOps

Deployment Target

Specific environment or infrastructure where software is deployed, such as development, staging, or production environments.
DevOps

Design Patterns

Reusable solutions to commonly occurring problems in software design, providing tested, proven development paradigms.
DevOps

Dev (from DevOps)

Represents the development aspects in the DevOps methodology, focusing on software creation and testing processes.
DevOps

DevOps

Set of practices combining software development (Dev) and IT operations (Ops) to shorten the development lifecycle.
DevOps

DevOps Assembly Line

Series of automated steps for building, testing, and deploying software in a DevOps environment.
DevOps

DevOps Culture

Organizational culture that bridges the gap between development and operation teams.
DevOps

DevOps Engineer

Professional combining software development and IT operations skills to improve collaboration and productivity.
DevOps

DevOps Lifecycle

Continuous cycle of development, testing, deployment, and monitoring in DevOps practices.
DevOps

DevOps Model

Conceptual framework for integrating development and operations teams and practices.
DevOps

DevOps Pipeline

Automated processes and tools used to move code from development to production in DevOps.
DevOps

DevOps Team

Cross-functional team responsible for the entire software delivery process in a DevOps environment.
DevOps

DevOps-as-a-Service

Outsourcing of DevOps functions to a third-party provider, offering expertise and tools to improve software delivery processes.
DevOps

DevSecOps

Approach integrating security practices within the DevOps process, ensuring security is considered throughout the software development lifecycle.
DevOps

DevSecOps Pipeline

Automated workflow that integrates security at every phase of the software development lifecycle.
DevOps

DevXOps

Extension of DevOps principles to include all teams involved in delivering software.
DevOps

Developer Experience

Overall experience developers have when using tools, platforms, or processes in their work.
DevOps

Device Fingerprinting

Technique of collecting information about a device for identification purposes, used in security and fraud prevention.
DevOps

Diamond

Ruby-based system monitoring tool that collects metrics and allows configuring custom collectors.
DevOps

Digital Customer Experience

Overall experience a customer has with a brand through digital channels and touchpoints.
DevOps

Directory Traversal

Security vulnerability allowing attackers to access unauthorized directories, potentially exposing sensitive files.
DevOps

Distributed Tracing

Method of tracking application requests as they flow through distributed systems.
DevOps

Distributed Version Control System (DVCS)

Version control system where the complete codebase, including its full history, is mirrored on every developer's computer.
DevOps

Django Framework

High-level Python web framework that encourages rapid development and clean, pragmatic design.
DevOps

Djangy

Platform-as-a-Service specifically designed for hosting and scaling Django web applications, simplifying deployment and management.
DevOps

Docker

Platform for developing, shipping, and running applications in containers, enabling consistent deployment across different environments.
DevOps
@mention

@mention

A feature in Git platforms that allows users to notify specific team members or reference issues by using the @ symbol followed by a username.
API preview

API preview

A feature allowing developers to test and provide feedback on new Git API functionality before it's officially released.
Bare Repository

Bare Repository

A Git repository containing version control information without a working directory, typically used as a central repository for collaboration.
Bisect

Bisect

A Git command used to perform a binary search through a repository's history to identify the commit that introduced a bug or issue.
Bitbucket Pipelines

Bitbucket Pipelines

An integrated CI/CD service in Bitbucket for automating builds, tests, and deployments.
Blame

Blame

A Git feature that shows which user last modified each line of a file, helping developers trace changes and understand code history.
Blamestorming

Blamestorming

A collaborative process of analyzing Git blame information to identify the source of bugs or issues in a codebase.
Branch

Branch

A parallel version of a repository, allowing developers to work on different features or experiments without affecting the main codebase.
Branch policies

Branch policies

Rules enforced on Git branches to ensure code quality, require reviews, or restrict certain actions before merging.
Business plan

Business plan

A premium subscription tier offered by Git hosting services, providing advanced features and support for enterprise users.
CA certificate

CA certificate

A digital certificate issued by a Certificate Authority, used in Git to establish secure HTTPS connections and verify server identities.
Cache

Cache

A temporary storage area that holds frequently accessed data for quick retrieval, improving system performance.
Checkout

Checkout

A Git command used to switch between different branches or restore files from a specific commit in a repository's history.
Cherry-Pick

Cherry-Pick

A Git operation that applies the changes from a specific commit to the current branch, useful for selective code integration.
Cherry-picking

Cherry-picking

The practice of selecting and applying specific commits from one branch to another in Git, often used for targeted bug fixes.
Clone

Clone

The process of creating a local copy of a remote Git repository, allowing developers to work on the codebase independently.
Code owners file

Code owners file

A file specifying individuals or teams responsible for code in different parts of a repository.
Commit

Commit

Operation in version control systems that saves changes to the local repository, creating a new revision with a unique identifier.
Conflict

Conflict

A situation in Git where incompatible changes have been made to the same part of a file, requiring manual resolution before merging.
Continuous Integration

Continuous Integration

Practice of merging all developer working copies to a shared mainline several times a day.
DAG (Directed Acyclic Graph)

DAG (Directed Acyclic Graph)

Directed Acyclic Graph, the underlying data structure used by Git to represent the commit history and relationships between commits.
Detach HEAD

Detach HEAD

A Git operation that moves the HEAD pointer to a specific commit, allowing for temporary exploration of historical states.
Diff

Diff

A Git command or operation that shows the differences between two commits, branches, files, or other Git objects.
Downstream

Downstream

Refers to the direction of change propagation in Git, typically from a parent branch to its child branches or forks.
Explorer

Explorer

A feature in Git platforms for browsing repository contents, viewing files, and navigating through different branches.
Feature branch workflow

Feature branch workflow

A Git pattern where each new feature is developed in a dedicated branch, then merged back to the main branch.
Fetch

Fetch

A Git command that retrieves changes from a remote repository without automatically merging them into the local branch.
Force Push

Force Push

A Git push operation that overwrites the remote branch's history with the local branch, potentially causing data loss if used carelessly.
Fork

Fork

A personal copy of another user's repository on a Git hosting platform, allowing independent development without affecting the original project.
Free plan

Free plan

A no-cost tier offered by Git hosting services, typically with limited features and storage for individual users or small projects.
GPG (GNU Privacy Guard)

GPG (GNU Privacy Guard)

An encryption software used with Git for signing commits and tags, enhancing security and verification.
Gist

Gist

A simple way to share code snippets, notes, or small files using Git, often integrated into Git platforms.
Git

Git

Distributed version control system for tracking changes in source code during software development.
Git Alias

Git Alias

A custom shortcut command defined by users to simplify complex or frequently used Git operations.
Git Alternates

Git Alternates

A mechanism in Git allowing a repository to borrow objects from another repository, useful for saving disk space in large projects.
Git Annotate

Git Annotate

A Git command that shows the author and commit information for each line in a file, similar to the "blame" feature.
Git Assume Unchanged

Git Assume Unchanged

A Git feature that tells the system to temporarily ignore changes to a tracked file, useful for local configuration files.
Git Attributes

Git Attributes

A mechanism in Git for defining attributes on a per-path basis, controlling how Git handles certain files or directories.
Git Bisect

Git Bisect

A Git command used to perform a binary search through the commit history to find the commit that introduced a bug.
Git Bisect Run

Git Bisect Run

An automated version of Git Bisect that uses a script to determine if each checked-out commit is "good" or "bad".
Git Blame -C (Copy Detection)

Git Blame -C (Copy Detection)

An enhanced version of Git Blame that detects lines moved or copied from other files, providing better change tracking.
Git Bundle

Git Bundle

A Git command that creates a single file containing all the data needed to recreate a repository's branch or history.
Git Bundle Create/Verify

Git Bundle Create/Verify

Commands to create and verify Git bundles, useful for transferring repository data without using a network.
Git Cheat Sheet

Git Cheat Sheet

A quick reference guide summarizing common Git commands and their usage, helpful for both beginners and experienced users.
Git Cherry

Git Cherry

A Git command used to find commits that haven't been merged upstream, useful for identifying changes to be applied to another branch.
Git Clean

Git Clean

A command to remove untracked files from the working directory, helping to maintain a clean repository state.
Git Commit --amend

Git Commit --amend

A command that allows you to modify the most recent commit, adding new changes or updating the commit message.
Git Commit Amend

Git Commit Amend

A command that allows you to modify the most recent commit, changing its message or contents, and update it without creating a new commit.
Git Commit Hooks

Git Commit Hooks

Scripts that run automatically before or after a commit, allowing you to enforce rules, format code, or perform checks on changes.
Git Commit Templates

Git Commit Templates

Predefined structures for commit messages, helping maintain consistency and include necessary information in commits.
Git Commit Trailers

Git Commit Trailers

Metadata added to the end of commit messages, often used for things like issue references or sign-offs.
Git Commit-graph

Git Commit-graph

A file format used to store commit graph structure, improving performance for operations that traverse commit history.
Git Commit-graph Verify

Git Commit-graph Verify

A command to check the integrity and validity of the commit-graph file in a Git repository.
Git Commit-tree

Git Commit-tree

A low-level Git command used to create a new commit object from an existing tree object.
Git Config

Git Config

A command and system for setting configuration options for Git on a global, local, or repository level.
Git Count-objects

Git Count-objects

A diagnostic command that provides statistics about the number and size of objects in a Git repository.
Git Credential Helper

Git Credential Helper

A system that securely stores and retrieves credentials for Git operations, reducing the need for manual authentication.
Git Daemon

Git Daemon

A lightweight server for the Git protocol, allowing anonymous read access to Git repositories.
Git Dangling Objects

Git Dangling Objects

Objects in Git that are not reachable from any reference, often created during rebasing or other history-altering operations.
Git Describe

Git Describe

A command that generates a human-readable name for a commit based on the most recent tag and additional commit information.
Git Diff

Git Diff

A command that shows changes between commits, branches, files, or the working directory and the index.
Git Diff Algorithms

Git Diff Algorithms

Various methods used by Git to compute differences between versions of files, optimizing for different scenarios.
Git Diff Tool

Git Diff Tool

An external program or interface used to visualize differences between files or commits in a more user-friendly manner.
Git Fetch --All

Git Fetch --All

A command that fetches updates from all remote repositories configured in a Git project.
Git Filter-branch

Git Filter-branch

A powerful tool for rewriting Git history, allowing for large-scale changes across many commits.
Git Flow

Git Flow

A branching model for Git that defines a strict branching structure designed to support multiple parallel developments.
Git Fork

Git Fork

The process of creating a personal copy of someone else's project, allowing for independent development without affecting the original.
Git Fsck

Git Fsck

A command that verifies the connectivity and validity of objects in the Git database.
Git Fsck (File System Check)

Git Fsck (File System Check)

Verifies the integrity of objects in the Git database, checking for corruption and inconsistencies.
Git GPG verification

Git GPG verification

A security feature in Git that uses GPG to sign and verify commits and tags, ensuring authenticity.
Git Garbage Collection (gc)

Git Garbage Collection (gc)

A process that optimizes the Git repository by removing unnecessary files and compressing objects.
Git Gc (Garbage Collection)

Git Gc (Garbage Collection)

Short for Git Garbage Collection, a command to clean up unnecessary files and optimize the repository.
Git Grep

Git Grep

A command for searching files in a Git repository using regular expressions or simple string matching.
Git Hook

Git Hook

A script that Git automatically runs before or after specific events, like commits or merges, to customize workflows and enforce rules.
Git Hooks

Git Hooks

Same as Git Hook, scripts triggered by various Git actions to automate tasks or enforce policies.
Git Ignore

Git Ignore

A mechanism to specify intentionally untracked files that Git should ignore, typically defined in a .gitignore file.
Git Index Format

Git Index Format

The internal format used by Git to store the staging area information, representing the next commit to be made.
Git Init

Git Init

A command used to initialize a new Git repository, creating the necessary directory structure for version control.
Git Interactive Rebase

Git Interactive Rebase

A feature allowing users to modify commits in their branch history, useful for cleaning up before merging.
Git Internals (objects, refs, etc.)

Git Internals (objects, refs, etc.)

The underlying data structures and mechanisms Git uses to store and manage version control information.
Git Interpret-trailers

Git Interpret-trailers

A command to parse and manipulate the trailer lines typically found at the end of commit messages.
Git LFS (Large File Storage)

Git LFS (Large File Storage)

A system that manages large files by storing them outside the main repository, replacing them with lightweight pointers to improve performance and efficiency.
Git Large File Storage (LFS)

Git Large File Storage (LFS)

An extension that replaces large files with text pointers in Git, while storing the file contents on a remote server.
Git Log

Git Log

A command to display the commit history of a repository, showing details like author, date, and commit message.
Git Maintenance

Git Maintenance

A set of tasks performed to keep a Git repository in good condition, including garbage collection and optimization.
Git Merge Strategies

Git Merge Strategies

Different algorithms used by Git to combine separate development histories when merging branches.
Git Merge Tools

Git Merge Tools

External programs or interfaces used to resolve merge conflicts in a more visual and user-friendly manner.
Git Merge-base

Git Merge-base

A command that finds the best common ancestor between two commits, useful for determining the point where branches diverged.
Git Multi-pack Index (MIDX)

Git Multi-pack Index (MIDX)

A feature that improves performance for repositories with many pack files by creating an index across multiple packs.
Git Namespaces

Git Namespaces

A feature allowing multiple references (like branches or tags) with the same name to coexist by separating them into different namespaces.
Git Notes

Git Notes

A way to add or inspect object notes, allowing additional information to be attached to Git objects without changing their SHA-1 hash.
Git Object Storage

Git Object Storage

The system Git uses to store all the versions of files, commits, and other objects in a content-addressable filesystem.
Git Pack Files

Git Pack Files

Compressed files containing Git objects, used to efficiently store and transfer repository data.
Git Packfile Format

Git Packfile Format

The internal format used by Git to store multiple objects efficiently in a single file, reducing disk usage and improving performance.
Git Partial Clone

Git Partial Clone

A feature allowing users to clone a repository without downloading all of its objects, saving bandwidth and storage.
Git Patch

Git Patch

A file format representing changes between versions, used for sharing and applying modifications across different repositories.
Git Plumbing Commands

Git Plumbing Commands

Low-level Git commands that expose the internal workings of Git, primarily used for scripting and advanced operations.
Git Porcelain Commands

Git Porcelain Commands

User-friendly commands for everyday tasks, like git status and git commit, designed for ease of use and clear output.
Git Protocol

Git Protocol

The native network protocol used by Git for efficient data transfer between repositories.
Git Prune

Git Prune

A command that removes objects that are no longer reachable from any references in the repository.

Serverless Containers

Container-based applications run on serverless platforms, combining containerization with auto-scaling.

Serverless Cost Optimization

Strategies to minimize expenses in serverless architectures while maintaining performance.

Serverless Data Analytics

Processing and analyzing data using serverless compute resources in the cloud, providing scalable and cost-effective insights.

Serverless Data Processing

Handling and transforming data using auto-scaling, event-driven cloud services, eliminating infrastructure management overhead.

Serverless Databases

Fully managed database services that scale automatically based on demand, eliminating the need for manual provisioning and management.

Serverless DevOps

Practices combining serverless architectures with DevOps principles for efficient cloud development.

Serverless ETL

Extract, Transform, Load processes using serverless compute for data integration in the cloud.

Serverless Integration

Connecting applications and data sources using serverless compute in cloud environments.

Serverless Microservices

Building application components as independent, auto-scaling functions in the cloud.

Serverless Networking

Network management and routing tailored for serverless architectures in cloud environments.

Serverless Resource Optimization

Techniques for efficient use of compute, storage, and network resources in serverless systems.

Serverless Security

Protecting serverless applications from vulnerabilities and attacks in cloud environments.

Serverless Security Frameworks

Tools and practices for implementing security in serverless cloud architectures.

Serverless Security Platforms

Comprehensive solutions for protecting serverless applications and data in the cloud.

Serverless Web Applications

Websites built and hosted using serverless cloud services for automatic scaling.

Serverless Workflows

Orchestrating sequences of serverless functions to create complex, scalable processes.

Service Control Policies (AWS)

Rules for managing permissions in AWS Organizations across multiple accounts, enforcing security and compliance standards.

Service Discovery

Automated detection of services and their network locations in cloud environments.

Service Level Objectives (SLOs)

Targets for service performance and availability in cloud environments, defining quality standards for cloud services.

Service Mesh Control Plane

Central component managing configuration and policies in a service mesh architecture.

Service Mesh Data Plane

Component handling inter-service communication in a service mesh architecture, managing traffic flow and security.

Service Mesh Interface

Standardized APIs for interacting with service mesh technologies in cloud environments.

Service Mesh Observability

Monitoring and analyzing traffic and behavior within a service mesh architecture.

Service Mesh Security

Protecting inter-service communication within a service mesh in cloud environments.

Sharding

Distributing data across multiple database instances to improve performance and scalability in cloud environments.

Showback and Chargeback

Systems for tracking and allocating cloud resource costs within an organization.

Sidecar Pattern

Deploying components of an application as separate containers alongside the main container in cloud environments.

Sidecars

Helper containers deployed alongside main application containers to provide additional functionality in cloud environments.

Silicon Photonics in Cloud Networking

Using light-based chips for high-speed data transmission in cloud data centers, improving network performance and efficiency.

Site Reliability Engineering (SRE) Platforms

Tools for implementing SRE practices in cloud environments, focusing on automation and reliability.

Smart Contract Platforms

Cloud-based systems for creating, deploying, and managing self-executing digital contracts.

Software-Defined Networking (SDN)

Approach to cloud network management using software-based controllers instead of hardware.

Software-Defined Power Distribution

Managing and optimizing power allocation in cloud data centers through software control.

Software-Defined Storage (SDS)

Abstracting storage services from underlying hardware in cloud environments for flexible management.

Software-Defined Wide Area Network (SD-WAN)

Technology for efficiently routing traffic between cloud and on-premises resources.

Spatial Computing

Integrating digital information with the physical world in cloud-based augmented and virtual reality systems.

Spatial Databases

Cloud databases optimized for storing and querying location-based data, essential for geospatial applications and analytics.

Speech Recognition

Cloud-based service for converting spoken language into text, enabling voice-controlled interfaces and transcription.

Spot Instance Management

Strategies for efficiently using and monitoring discounted, interruptible cloud compute resources.

Spot Instance Management Platforms

Tools for optimizing the use of discounted, interruptible cloud compute resources.

Spot Instance Optimization

Techniques for maximizing cost savings and availability when using discounted, interruptible cloud resources.

Spot Instances

Discounted, interruptible cloud compute resources available for bidding, offering cost savings for flexible workloads.

State Management

Techniques for maintaining application data consistency in distributed cloud environments.

Stateful Serverless Computing

Serverless architectures that maintain state between function invocations in the cloud.

Stateless Functions

Cloud-based functions that don't retain state between invocations, enhancing scalability.

Step Functions (AWS)

AWS service for coordinating multiple Lambda functions into serverless workflows.

Storage Class Memory (SCM)

High-performance, low-latency memory technology bridging DRAM and SSDs in cloud infrastructure.

Storage QoS (Quality of Service)

Mechanisms to ensure consistent performance levels for storage resources in cloud environments.

Storage Tiering Optimization

Automatically moving data between storage tiers based on access patterns to balance cost and performance.

Stream Processing (e.g., Amazon Kinesis, Azure Stream Analytics)

Real-time analysis of continuously flowing data in cloud environments, enabling instant insights and rapid decision-making.

Stream Processing at Scale

Handling and analyzing large volumes of real-time data streams in cloud environments.

Streaming SQL Engines

Cloud-based systems for querying continuous data streams using SQL-like syntax, enabling real-time data analysis.

Subnet

Segmented portion of a cloud network with its own IP address range, allowing for improved security and traffic management.

Sustainability Reporting Platforms

Tools for tracking and reporting environmental metrics of cloud resource usage, promoting eco-friendly cloud computing.

Sustainability Reporting for Cloud Services

Documenting environmental impact and energy efficiency of cloud operations, promoting transparency and accountability.

Sustainability-Aware Resource Scheduling

Allocating cloud resources with consideration for environmental impact, optimizing for energy efficiency.

Sustainability-Driven Optimization

Improving cloud resource efficiency to minimize environmental impact while maintaining performance and reliability.

Sustainable Cloud Computing

Practices and technologies minimizing the environmental impact of cloud operations.

Sustainable Cloud Migration

Moving to the cloud with strategies to minimize environmental impact, optimizing resource usage and energy efficiency.

Sustainable Data Center Design

Creating cloud facilities with minimal environmental impact and maximum energy efficiency.

Swarm Intelligence for Cloud Optimization

Using collective behavior algorithms to optimize cloud resource allocation, improving efficiency and performance.

Swarm Robotics in the Cloud

Coordinating multiple robots using cloud-based swarm intelligence algorithms, enabling scalable and adaptive robotic systems.

Synthetic Data Generation

Creating artificial datasets for testing and development in cloud environments, preserving privacy and expanding data availability.

Synthetic Media Generation Platforms

Cloud services for creating AI-generated images, videos, and audio, enabling content creation at scale.

Tactile Internet Interfaces

Ultra-low latency network interfaces for real-time tactile feedback in cloud applications.

Tagging Strategies

Methods for labeling cloud resources to improve organization, management, and cost allocation.

Telco Cloud

Cloud infrastructure specifically designed for telecommunications service providers.

Telepresence Robotics Control Systems

Cloud-based platforms for remotely operating robots with real-time feedback, enabling distant manipulation and interaction.

Text-to-Speech

Cloud service converting written text into spoken words, often used in accessibility and voice interface applications.

Time Series Forecasting as a Service

Cloud-based predictive analytics for time-dependent data, used for trend analysis and future projections.

Time-Series Databases

Cloud databases optimized for storing and querying time-stamped data, essential for IoT and monitoring applications.

TinyML

Deploying machine learning models on resource-constrained IoT devices connected to the cloud.

Tokenization Services

Cloud-based tools for replacing sensitive data with non-sensitive tokens to enhance security.

Total Cost of Ownership (TCO)

Comprehensive assessment of direct and indirect costs associated with cloud adoption and usage.

Transfer Learning

Technique of using pre-trained AI models for new tasks, reducing training time and data requirements in the cloud.

Transit Gateway

Cloud networking service that connects VPCs, on-premises networks, and other cloud services.

Twelve-Factor App Methodology

Set of best practices for building scalable, maintainable cloud-native applications.

Unikernels

Lightweight, single-purpose machine images for running cloud applications with minimal overhead.

Unit Economics in the Cloud

Analysis of costs and revenues associated with individual cloud service units or transactions.

Universal Cloud API Standards

Efforts to create standardized interfaces for interacting with various cloud services.

VPN Connection

Secure, encrypted link between a local network and cloud resources, enabling private access to cloud services over public networks.

VR Streaming

Cloud-based delivery of virtual reality content to end-user devices, enabling immersive experiences without local processing.

Vector Databases

Cloud databases optimized for storing and querying high-dimensional vector data, often used in AI applications.

Version Control in the Cloud

Managing and tracking changes to code and configurations in cloud-based repositories.

Vertical Scaling (Scale Up)

Increasing the capacity of a single cloud resource by adding more power (CPU, RAM, etc.).

Virtual Cloud Network (VCN)

Software-defined network providing connectivity for cloud resources, enabling secure and flexible communication.

Virtual Environments as a Service

Cloud-based platforms offering customizable, isolated development and testing environments.

Virtual Machines (e.g., Amazon EC2, Azure Virtual Machines)

Emulations of computer systems providing scalable, isolated environments in the cloud.

Virtual Network Appliances

Software-based network devices deployed in cloud environments for various networking functions.

Virtual Network Functions (VNF)

Software implementations of network functions running on cloud infrastructure, replacing traditional hardware appliances.

Virtual Reality (VR) Cloud

Cloud-based services for creating, rendering, and delivering virtual reality experiences.

Virtual Reality Cloud Workspaces

Cloud-hosted VR environments for collaborative work and data visualization, enabling immersive remote collaboration.

Voice User Interfaces (VUI) for Cloud Services

Speech-based interfaces for interacting with cloud applications and services, enhancing accessibility and user experience.

Volumetric Display Computation Services

Cloud-based processing for generating 3D holographic or volumetric images, enabling immersive visualization applications.

Volumetric Video Streaming

Cloud services for delivering 3D video content for immersive viewing experiences.

Water Usage Effectiveness (WUE)

Metric measuring water consumption efficiency in cloud data centers, promoting sustainable resource management.

Water Usage Effectiveness (WUE) Monitoring

Tracking water consumption and efficiency in cloud data center operations, promoting sustainable resource management.

Web Application Firewall (WAF)

Cloud-based security service that filters and monitors HTTP traffic between web applications and the Internet.

WebAssembly (Wasm) in the Cloud

Low-level language for running high-performance applications in cloud-based web browsers.

WebAssembly in the Cloud

Binary instruction format enabling high-performance execution of code in cloud-based web environments.

Init Containers

Specialized containers that run to completion before other containers in a Kubernetes pod, used for initialization tasks.

Init Containers Resources

Specification of CPU and memory limits for initialization containers in Kubernetes pods, ensuring efficient resource utilization.

Initializers

Deprecated Kubernetes feature for dynamically modifying resource configurations before they become visible to the system.

Inter-Container Communication

Methods and patterns for containers within a pod to exchange data and signals, utilizing shared volumes or localhost networking.

IoT Edge Patterns

Architectural designs for deploying and managing containerized applications on edge devices in Internet of Things scenarios.

Istio

Open-source service mesh providing traffic management, security, and observability for cloud-native applications.

Istio Control Plane Components

Core services of the Istio service mesh responsible for configuring proxies and implementing policies.

Istio Destination Rules

Istio traffic management resource defining policies that apply to traffic intended for a service after routing has occurred.

Istio Gateways

Istio resources managing inbound and outbound traffic for the service mesh, providing fine-grained control over traffic flow.

Istio Mixerless Architecture

Istio design that removes the Mixer component, improving performance and scalability of the service mesh.

Istio Service Entries

Istio resources allowing the addition of entries to the service registry, enabling traffic to external dependencies.

Istio Virtual Services

Istio traffic management resources defining a set of traffic routing rules to apply when a host is addressed.

Istio's Ambient Mesh

Istio feature providing a sidecar-less service mesh implementation, reducing resource overhead and simplifying deployment.

Jaeger

Open-source, end-to-end distributed tracing system for monitoring and troubleshooting microservices-based distributed systems.

Jaeger Operator

Kubernetes operator for automated deployment and management of Jaeger tracing infrastructure in container environments.

Jaeger Tracing

Implementation of distributed tracing using Jaeger to monitor and optimize performance in microservices architectures.

Jenkins X

Cloud-native CI/CD solution for Kubernetes, automating the entire software development lifecycle for containerized applications.

Jib

Tool for building optimized Docker and OCI images for Java applications without the need for a Docker daemon.

Job

Kubernetes resource that creates one or more pods to perform a specific task and ensures they successfully complete, ideal for batch processes.

K3s

Lightweight Kubernetes distribution designed for edge, IoT, and resource-constrained environments, simplifying cluster deployment.

K9s CLI

Terminal-based UI for managing and monitoring Kubernetes clusters, providing an intuitive interface for cluster operations.

KEDA (Kubernetes Event-driven Autoscaling)

Kubernetes-based Event Driven Autoscaling, enabling fine-grained autoscaling for event-driven workloads based on event sources.

KUDO (Kubernetes Universal Declarative Operator)

Kubernetes Universal Declarative Operator, a toolkit for writing operators using a declarative spec, simplifying complex application management.

Kaniko

Tool for building container images from a Dockerfile inside a container or Kubernetes cluster, without requiring a Docker daemon.

Kanister for Application-Consistent Backups

Framework for application-level data management in Kubernetes, ensuring consistent backups of stateful apps.

Karmada

Open-source project for multi-cluster application management in Kubernetes, facilitating resource distribution across clusters.

Kata Containers

Lightweight virtual machines that feel and perform like containers, but provide the workload isolation and security of VMs.

Kata Containers 2.0

Major update to Kata Containers, introducing improved performance, reduced footprint, and enhanced security features.

Keptn

Cloud-native application lifecycle orchestration tool, automating deployment, testing, and remediation for containerized apps.

Kernel Bypass Networking

Technique allowing network packets to bypass the kernel, improving performance in container networking scenarios.

Kernel Namespaces

Linux feature providing isolation for system resources, fundamental to container implementation and resource separation.

Kilo for WireGuard-based Overlay Network

CNI plugin using WireGuard to create a mesh overlay network for Kubernetes, enhancing security and simplicity.

Knative

Kubernetes-based platform for building, deploying, and managing serverless workloads, simplifying serverless application development.

Knative Eventing

Knative component providing tools for routing events between publishers and subscribers in cloud-native applications.

Knative Serving

Knative component for deploying and managing serverless workloads, handling scaling and routing of containerized applications.

Krustlet for WebAssembly in Kubernetes

Tool allowing WebAssembly modules to run in Kubernetes clusters, enabling language-agnostic workloads.

Kube-OVN

Network virtualization solution for Kubernetes integrating the Open vSwitch software switch to provide advanced networking features.

Kube-OVN for Open vSwitch-based Networking

Implementation of Kube-OVN to leverage Open vSwitch for flexible, high-performance container networking.

Kube-bench for CIS Benchmarks

Tool for checking whether Kubernetes deployments adhere to Center for Internet Security (CIS) best practices.

Kube-bench for Security Auditing

Use of kube-bench to perform automated security audits of Kubernetes clusters against established benchmarks.

Kube-router for Direct Container Routing

Kubernetes networking solution providing direct container-to-container networking with BGP-based routing.

Kube-score for Kubernetes Object Analysis

Tool for static code analysis of Kubernetes object definitions, identifying misconfigurations and potential issues.

Kube-state-metrics

Service that listens to the Kubernetes API server and generates metrics about the state of Kubernetes objects.

KubeEdge

Open-source system extending native containerized application orchestration capabilities to hosts at Edge.

Kubeadm

Tool for bootstrapping a minimum viable Kubernetes cluster, simplifying the process of setting up a production-grade cluster.

Kubeaudit for Kubernetes Auditing

Open-source tool for auditing Kubernetes clusters and workloads for potential security issues and best practice violations.

Kubebuilder

Framework for building Kubernetes APIs using custom resource definitions (CRDs), simplifying the creation of operators and controllers.

Kubecost for Cost Monitoring

Tool providing real-time cost visibility and insights for running applications on Kubernetes, optimizing resource allocation.

Kubefed

Kubernetes Cluster Federation, enabling resource management across multiple Kubernetes clusters from a single control plane.

Kubeless

Kubernetes-native serverless framework, allowing deployment of small bits of code (functions) without managing underlying infrastructure.

Kubernetes API Versioning

System for evolving the Kubernetes API over time, allowing for backwards compatibility and gradual feature deprecation.

Kubernetes Admission Controllers

Plugins intercepting requests to the Kubernetes API server before object persistence, enforcing policies.

Kubernetes Aggregation Layer

Feature allowing the Kubernetes API to be extended with additional APIs, enabling custom resources and controllers.

Kubernetes Annotations

Key-value pairs for attaching non-identifying metadata to objects, used for tooling and client retrieval.

Kubernetes Autoscaling (HPA, VPA, Cluster Autoscaler)

Mechanisms (HPA, VPA, Cluster Autoscaler) for automatically adjusting resources based on demand and metrics.

Kubernetes Conformance Program

CNCF initiative ensuring consistency and portability across Kubernetes distributions and installations.

Kubernetes Events

API objects automatically created when other objects change state, providing a cluster activity audit trail.

Kubernetes Federation

Mechanism for coordinating multiple Kubernetes clusters, enabling multi-cluster application deployment and management.

Kubernetes Finalizers

Field on resources preventing accidental deletion, ensuring proper cleanup of related resources or external dependencies.

Kubernetes Garbage Collection

Process of automatically deleting objects that no longer have owners, preventing resource leaks.

Kubernetes Gateway API

Evolved ingress and service networking, providing a more expressive, extensible way to configure traffic routing.

Kubernetes Labels

Key-value pairs attached to objects for identification and selection, crucial for organizing and selecting object subsets.

Kubernetes Metrics Server

Cluster-wide aggregator of resource usage data, providing CPU and memory metrics for Horizontal Pod Autoscaler.

Kubernetes Operators

Software extensions to Kubernetes that use custom resources to manage applications and their components.

Kubernetes Owners and Dependents

Relationship between API objects where one object owns another, used for cascading deletion and orphan handling.

Kubernetes Selectors

Label query over a set of resources, used for identifying and grouping API objects based on their labels.

Kubernetes Version Lifecycle

Policies and timelines for Kubernetes version releases, support, and deprecation, guiding upgrade planning.

Kubernetes Virtual Clusters

Fully functional Kubernetes clusters running on top of other Kubernetes clusters, enabling multi-tenancy.

Kubesec.io for Kubernetes Manifests Scanning

Web-based tool for security risk analysis of Kubernetes resource manifests, identifying vulnerabilities.

Kustomize

Kubernetes native configuration management tool that allows customization of YAML manifests without templating.

Kustomize Overlays

Technique in Kustomize for creating variations of a common base of Kubernetes resources, enabling environment-specific configs.

Kustomize Patches

Method in Kustomize for modifying existing Kubernetes resources without directly editing the original YAML files.

Lacework for Container Compliance

Cloud security platform providing compliance monitoring and threat detection for containerized environments.

Layer

Unit of a container image representing a set of files or changes, crucial for image building and optimization.

Layered File System

Storage mechanism used by container runtimes, allowing efficient storage and quick updates of container images.

Leader Election Pattern

Design pattern ensuring only one instance of a distributed application component is active at a time.

Leader Election in Operators

Process where multiple instances of an operator elect a leader to prevent conflicts in resource management.

Least Privilege Principle

Security concept of giving a user or process only the minimum levels of access necessary to perform its function.

Lens IDE for Kubernetes

User-friendly, open-source IDE for managing Kubernetes clusters, providing a unified interface for multiple clusters.

Lightstep

Observability platform providing insights into the behavior of highly distributed software systems and microservices.

Limit Ranges

Kubernetes policy for constraining resource allocations (CPU and memory) for pods or containers in a namespace.

LimitRange

Kubernetes object defining the min, max, and default compute resources for pods and containers in a namespace.

Linkerd

Lightweight service mesh for Kubernetes, providing observability, reliability, and security for microservices.

Linkerd Data Plane

Component of Linkerd responsible for proxying traffic between services, implementing service mesh functionality.

Linkerd Service Profiles

Linkerd resource providing service-specific traffic metrics and control, enhancing observability and management.

Linkerd's Ultra-lightweight Proxy

High-performance, minimal-footprint proxy used in Linkerd's data plane for efficient service mesh operations.

Linux Security Modules (LSM)

Framework allowing various security models to be plugged into the Linux kernel, enhancing container isolation.

Load Balancer Integration

Process of connecting external load balancers with Kubernetes services for distributing incoming traffic.

Load Balancing Algorithms

Methods used by load balancers to distribute traffic across multiple container instances or pods.

LoadBalancer

Kubernetes service type that provisions an external load balancer in cloud environments for routing external traffic to services.

Local Persistent Volumes

Kubernetes volume type for locally attached storage, providing high-performance storage options for stateful workloads.

Locality Load Balancing

Technique for routing traffic to geographically or topologically closer endpoints in distributed container deployments.

Log Aggregation Patterns

Techniques for collecting, processing, and storing logs from distributed containerized applications for centralized analysis.

Logging Architecture

Design of systems for capturing, storing, and analyzing logs from containers and orchestration platforms.

Loki

Horizontally-scalable, multi-tenant log aggregation system designed for use with Prometheus and Kubernetes.

Longhorn

Cloud-native distributed block storage system for Kubernetes, providing persistent storage for stateful workloads.

Longhorn Distributed Block Storage

Implementation of Longhorn for providing resilient, replicated block storage in Kubernetes clusters.

Materialized View Pattern

Technique for precomputing and storing query results, improving performance in microservices architectures.

Memory Pressure

Condition where a node or container is running low on available memory, potentially triggering evictions or OOM kills.

Mesh Expansion

Process of extending service mesh capabilities to workloads running outside the primary container orchestration platform.