Engineering Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.

DevOps
Git
Cloud Computing
Containerization & Orchestration

Djangy

Platform-as-a-Service specifically designed for hosting and scaling Django web applications, simplifying deployment and management.
DevOps

Docker

Platform for developing, shipping, and running applications in containers, enabling consistent deployment across different environments.
DevOps

Docker Container

A lightweight, portable unit that packages an application and its dependencies, allowing it to run consistently across different environments.
DevOps

Docker Log Management

Process of collecting, storing, and analyzing logs generated by Docker containers.
DevOps

Dokku

Mini-Heroku powered by Docker, helping developers quickly deploy their applications.
DevOps

Domain Drive Design (DDD)

Software design approach focusing on modeling software to match a domain according to input from domain experts.
DevOps

Drone

Cloud-native continuous integration and delivery platform that uses a simple YAML configuration file to define and execute pipelines.
DevOps

Dynamic Application Security Testing (DAST)

Security testing methodology that analyzes a running application to find vulnerabilities.
DevOps

Dynamic Infrastructure

IT infrastructure that can be programmatically allocated and managed, often associated with cloud computing and Infrastructure as Code.
DevOps

Dynatrace

Platform for application performance management, AI operations, cloud infrastructure monitoring, and digital experience management.
DevOps

EC2

Amazon Elastic Compute Cloud; web service providing resizable compute capacity in the cloud.
DevOps

EKS

Managed Kubernetes service for easy deployment on AWS without the need to install and operate your own Kubernetes clusters.
DevOps

Edge Computing

Distributed computing paradigm that brings computation and data storage closer to the location where it is needed.
DevOps

ElasticSearch

Distributed, RESTful search and analytics engine capable of addressing a growing number of use cases.
DevOps

Elasticity

Ability of a system to automatically scale up or down based on demand, crucial for efficient resource utilization in cloud environments.
DevOps

Emergent Design

Design approach where the architecture of a system evolves gradually as the system is developed.
DevOps

Enabling Team

Group that helps other teams to deliver software more effectively, often by providing tools and platforms.
DevOps

Encapsulation

Bundling of data with the methods that operate on that data, restricting direct access to some of an object's components.
DevOps

End-to-End Testing (EE Testing)

Methodology used to test whether the flow of an application is performing as designed from start to finish.
DevOps

Endpoint Security

Approach to protecting computer networks that are remotely bridged to client devices.
DevOps

Enterprise Application Integration (EAI)

Use of software and architectural principles to integrate enterprise applications.
DevOps

Enterprise Security

Overarching strategy and implementation of security measures across an entire organization.
DevOps

Environment

Set of conditions under which a piece of software is developed, tested, or run, including hardware, configuration, and other software.
DevOps

Environment Variable

Dynamic-named value that can affect the way running processes will behave on a computer.
DevOps

Environments

Different setups where software can be run, such as development, testing, staging, and production.
DevOps

Envoy

High-performance distributed proxy designed for cloud-native applications, often used as a service mesh component.
DevOps

Ephemeral Environments

Temporary, disposable environments created on-demand for testing or development, ensuring consistency and isolation.
DevOps

Error Budget

Acceptable amount of unplanned downtime or errors a service can experience without consequences.
DevOps

Error Log

Record of error messages generated by a software application or system, crucial for troubleshooting and monitoring.
DevOps

Error Tracking

Process of identifying, recording, and analyzing errors in software applications to improve reliability and user experience.
DevOps

Eucalyptus

Open-source software for building AWS-compatible private and hybrid cloud computing environments.
DevOps

Event Log

Record of events taking place in the execution of a system to provide an audit trail.
DevOps

Event-Driven Architecture (EDA)

Design paradigm in which the flow of the program is determined by events such as user actions, sensor outputs, or messages from other programs.
DevOps

Everything as Code (EaC)

Approach to managing all aspects of IT infrastructure and operations through code.
DevOps

Excessive Data Exposure

Security issue where an API returns more data than necessary, potentially revealing sensitive information.
DevOps

Exploratory Testing

Approach to software testing that emphasizes the tester's freedom and creativity to uncover issues.
DevOps

FAI (Fully Automatic Installer)

Tool for unattended mass installation of Linux systems, streamlining the process of setting up multiple machines.
DevOps

Fabric

Python library and command-line tool for streamlining the use of SSH for application deployment or systems administration tasks.
DevOps

Fail Fast

Design principle promoting immediate reporting of failures to enable quick detection and resolution of issues.
DevOps

Failed Builds

Instances where the compilation or integration process of software fails due to errors.
DevOps

False Positive

Error in evaluation where a condition is mistakenly flagged as true when it is actually false.
DevOps

Fargate

AWS serverless compute engine for containers that works with both Amazon ECS and Amazon EKS.
DevOps

Fault Tolerance

Property that enables a system to continue operating properly in the event of the failure of some of its components.
DevOps

Fear-driven Development

Anti-pattern where developers make decisions based on fear rather than best practices or data.
DevOps

Feature Branching

Practice of creating a separate branch in version control for each feature during development.
DevOps

Feature Flagging

Technique allowing teams to modify system behavior without changing code, enabling gradual rollouts and A/B testing.
DevOps

Feature Flags

Technique in software development that turns certain functionality on and off during runtime, without deploying new code.
DevOps

Feature Management

Practice of using feature flags to control and manage the lifecycle of features in software applications.
DevOps

Feature Toggle

Technique in software development for turning features on or off quickly without changing code.
DevOps

Fig

Tool for defining and running multi-container Docker applications, now replaced by Docker Compose.
DevOps

File Inclusion

Vulnerability that allows an attacker to include a file, usually exploiting dynamic file inclusion mechanisms implemented in the target application.
DevOps

FinDevOps

Application of DevOps principles to financial services, emphasizing security and compliance.
DevOps

FinOps

Practice bringing financial accountability to cloud spending, enabling teams to balance speed, cost, and quality in business decisions.
DevOps

First Input Delay (FID)

Measure of responsiveness that quantifies the experience users feel when trying to interact with unresponsive pages.
DevOps

Five Nines

Discover the gold standard of system reliability: "five nines" uptime. Learn what 99.999% availability means, its importance, and the challenges in achieving this elite DevOps goal.
DevOps

Flaky Test

Test that sometimes passes and sometimes fails without any code changes, often causing frustration in CI/CD pipelines.
DevOps

Flow

The smooth, continuous movement of code from development to production, emphasizing automation, collaboration, and rapid feedback to optimize software delivery.
DevOps

Flow Metrics

Measurements used to understand and optimize the flow of work through a system, crucial in lean and agile methodologies.
DevOps

Flutter

Google's UI toolkit for building natively compiled applications for mobile, web, and desktop from a single codebase.
DevOps

Flynn

Open-source platform designed to simplify deploying and maintaining applications, offering a heroku-like experience using Docker containers.
DevOps

Foreman

Open-source tool for complete lifecycle management of physical and virtual servers, automating repetitive tasks and simplifying provisioning.
DevOps

Four Key Metrics

Set of metrics (lead time, deployment frequency, mean time to restore, change failure rate) used to measure software delivery performance.
DevOps

Four Nines

Explore the concept of "four nines" in system reliability. Learn what 99.99% uptime means, its importance in DevOps, and strategies to achieve this high availability standard.
DevOps

Four-eyes Principle

Security measure requiring two individuals to approve or perform an action, reducing the risk of fraud or errors.
DevOps

Fpm

Tool to easily build packages such as rpms, debs, and more, simplifying the process of creating software packages for different systems.
DevOps

Full Stack Observability

Comprehensive visibility into all parts of a software system, from front-end to back-end.
DevOps

Function-as-a-Service (FaaS)

Cloud computing service that allows execution of code in response to events without complex infrastructure.
DevOps

Functional Testing

Type of testing that verifies that each function of the software application operates according to the specification.
DevOps

Functions as a Service

Cloud computing execution model where developers run and manage application functionalities without the complexity of building and maintaining infrastructure.
DevOps

Fuzz Testing

Automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program.
DevOps

Gain Privileges

Process or action of obtaining higher levels of access or permissions in a system.
DevOps

Ganglia

Scalable distributed monitoring system for high-performance computing systems such as clusters and grids.
DevOps

Gemba

Japanese term meaning "the actual place," used in management to emphasize the importance of direct observation.
DevOps

General Data Protection Regulation (GDPR)

EU law on data protection and privacy for all individuals within the European Union and the European Economic Area.
DevOps

Gift Card Fraud

Unauthorized or deceptive use of gift cards for financial gain, often involving stolen card numbers or exploitation of card systems.
DevOps

Git Branch

Lightweight movable pointer to a commit in Git version control, allowing for parallel development and experimentation.
DevOps

Git Repository

Storage location for a Git project, containing all the files and their revision history.
DevOps

GitHub

Web-based hosting service for version control using Git, offering collaboration features, code review, and integration with various development tools.
DevOps

GitHub Actions

GitHub's built-in continuous integration and continuous delivery (CI/CD) platform, allowing automated build, test, and deployment workflows.
DevOps

GitLab

Web-based DevOps lifecycle tool that provides a Git-repository manager with wiki, issue-tracking and CI/CD pipeline features.
DevOps

GitOps

Framework applying DevOps best practices like version control, collaboration, compliance, and CI/CD to infrastructure automation.
DevOps

GitOps Operator

Software agent that implements GitOps practices, reconciling the desired state in Git with the actual state of the system.
DevOps

Gitflow Workflow

Git workflow that defines a strict branching model designed around the project release.
DevOps

Gitlab CI

GitLab's built-in Continuous Integration/Continuous Deployment tool, allowing automated testing and deployment of code changes.
DevOps

GoCD

Open-source continuous delivery server to model and visualize complex workflows.
DevOps

Golden Image

Pre-configured template for a virtual machine, used to create standardized instances.
DevOps

Google App Engine

Platform as a Service for developing and hosting web applications in Google-managed data centers.
DevOps

Google Cloud Platform (GCP)

Suite of cloud computing services running on the same infrastructure that Google uses internally.
DevOps

Governance

The policies, controls, and standards to ensure compliance, security, and quality across the software delivery pipeline while maintaining agility and efficiency.
DevOps

Gradle

Powerful build automation tool that supports multi-language development and offers a flexible, plugin-based architecture for customization.
DevOps

Grafana

Open-source platform for monitoring and observability, allowing users to visualize, alert on, and understand metrics from various data sources.
DevOps

Graphite

Monitoring tool that stores numeric time-series data and renders graphs of this data on demand.
DevOps

HIPAA

Health Insurance Portability and Accountability Act; U.S. legislation that provides data privacy and security provisions for safeguarding medical information.
DevOps

HTTP Requests

Messages sent by clients to initiate actions on servers, forming the foundation of data communication on the World Wide Web.
DevOps

Hadoop Architecture

Framework that allows for the distributed processing of large data sets across clusters of computers.
DevOps

HashiCorp Vault

Tool for securely accessing secrets like API keys, passwords, and certificates, central to modern secret management strategies.
DevOps

Heartbeat Monitoring

Continuous monitoring of a system or service to check if it's operational, often used in high-availability setups.
DevOps

Helm Chart

Package format for defining, installing, and upgrading complex Kubernetes applications, simplifying the deployment process.
DevOps

Heroku

Cloud platform as a service (PaaS) supporting several programming languages, used for deploying, managing, and scaling modern apps.
DevOps

High Availability

Characteristic of a system designed to avoid loss of service by reducing or managing failures.
DevOps
identicon

identicon

A visual representation of a hash value, often used as a default avatar in Git platforms.
identity provider

identity provider

A service that creates, maintains, and manages identity information for users, often integrated with Git platforms.
index entry

index entry

A record in Git's index file representing the state of a file in the repository.
integration

integration

A connection between Git and other tools or services to enhance functionality and workflow.
key fingerprint

key fingerprint

A short sequence of bytes used to identify a longer public key in Git's GPG signing process.
keychain

keychain

A secure storage system for passwords and keys, often integrated with Git clients for credential management.
keyword

keyword

A reserved word in Git commands or configurations with a specific meaning or function.
label

label

A way to categorize and organize issues and pull requests in GitHub repositories.
license

license

A document in a Git repository specifying how the project can be used, modified, and distributed.
line comment

line comment

A feature in Git platforms allowing users to comment on specific lines of code in pull requests or commits.
line ending

line ending

Characters marking the end of a line, which can cause issues in Git when collaborating across different operating systems.
locked personal account

locked personal account

A GitHub account that has been restricted due to a violation of terms of service or suspicious activity.
main

main

The default name for the primary branch in many Git repositories, replacing 'master' in recent conventions.
management console

management console

An administrative interface for managing Git hosting services, often used in enterprise environments.
markup

markup

A system of annotation used to format text, often used in Git documentation and comments.
members graph

members graph

A visual representation of an organization's membership on Git hosting platforms.
mention

mention

A way to notify a user on Git platforms by using the @ symbol followed by their username.
merge conflict

merge conflict

A situation in Git where incompatible changes have been made to the same part of a file, requiring manual resolution.
milestone

milestone

A way to track progress on groups of issues or pull requests in GitHub projects.
mirror

mirror

A complete copy of a repository, including all branches and history, often used for backup or as a full replica.
nested team

nested team

A team within a GitHub organization that is a subset of a larger team, inheriting its permissions.
network graph

network graph

A visual representation of the commit history and branch structure of a Git repository.
news feed

news feed

A personalized list of recent activity on Git platforms, showing updates from followed users and repositories.
non-fast-forward

non-fast-forward

A Git push that introduces new commits to the remote branch that aren't direct descendants of the current remote HEAD.
notification

notification

An alert system on Git platforms to inform users about relevant activities and mentions.
object

object

A fundamental unit in Git's data model, representing content, commits, trees, or tags, identified by a unique SHA-1 hash.
object database

object database

The storage system in Git that contains all versions of project files and metadata, organized by SHA-1 hashes.
object identifier (oid)

object identifier (oid)

A unique SHA-1 hash that identifies a Git object, ensuring data integrity and enabling content-addressable storage.
object name

object name

Another term for the SHA-1 hash that uniquely identifies a Git object in the repository.
object type

object type

The classification of Git objects, including blob (file content), tree (directory structure), commit, and tag.
octopus

octopus

A Git merge involving more than two branches simultaneously, creating a commit with multiple parents.
organization

organization

A shared account on Git hosting platforms where businesses and open-source projects can collaborate across many projects.
organization owner

organization owner

A user with administrative privileges for an organization account on Git hosting platforms.
orphan

orphan

A branch in Git with no parent commit, typically used to start a new history unrelated to existing branches.
outside collaborator

outside collaborator

A user granted access to a repository but not a member of the organization that owns the repository.
overlay

overlay

A Git feature that allows files from one branch to temporarily override files in another branch without merging.
owner

owner

The user or organization with administrative rights to a Git repository, controlling access and settings.
pack

pack

A compressed file format used by Git to store multiple objects efficiently, reducing repository size.
pack index

pack index

A file that provides fast random access to objects stored within a packfile in Git.
parent

parent

A commit from which another commit is derived, establishing the hierarchical relationship in Git history.
parent team

parent team

A team in a Git platform that grants its permissions to nested sub-teams within an organization.
participating notifications

participating notifications

Alerts received when you're directly involved in repository activities like being assigned or mentioned.
pathspec

pathspec

A pattern used in Git commands to limit the scope of operations to specific files or directories.
peel

peel

The process of recursively dereferencing a Git object to reveal its underlying object type.
per-worktree ref

per-worktree ref

A reference specific to a particular working tree in a Git repository with multiple worktrees.
permalink

permalink

A URL that points to a specific version of a file or directory in a Git repository, ensuring consistent reference.
personal account

personal account

An individual account on Git platforms, used for personal projects and contributions.
pickaxe

pickaxe

A Git feature for searching the repository history to find when a particular change was introduced.
pinned repository

pinned repository

A featured repository prominently displayed on a user's or organization's profile page on their Git hosting platform of choice.
plumbing

plumbing

Low-level Git commands that expose internal workings, primarily used for scripting and advanced operations.
porcelain

porcelain

High-level Git commands designed for everyday use, providing a user-friendly interface to common version control tasks.
pre-receive hooks

pre-receive hooks

Server-side scripts that run before pushed commits are accepted, used to enforce policies or perform checks.
primary email address

primary email address

The main email associated with a Git account, used for communications and commit author identification.
private contributions

private contributions

Contributions made to private repositories, typically only visible to repository collaborators.
private repository

private repository

A Git repository with restricted access, visible only to the owner and explicitly granted collaborators.
production branch

production branch

A Git branch that represents the stable, deployed version of a project, often protected from direct changes.
profile

profile

A user's public page on a Git platform, displaying information about their activity and repositories.
profile photo

profile photo

An image representing a user on a Git platform, displayed alongside their contributions and activities.
project board

project board

A kanban-style board in Git platforms for organizing and prioritizing project issues and pull requests.
protected branch

protected branch

A branch with rules enforcing certain conditions before changes can be pushed, merged, or deleted.
pseudoref

pseudoref

A Git reference that doesn't follow the standard refs format but is treated similarly, like HEAD or MERGE_HEAD.
public contributions

public contributions

Contributions made to public repositories, visible on a user's profile and activity feed.
public repository

public repository

A Git repository that is openly accessible to anyone, allowing viewing and often cloning without authentication.
pull access

pull access

Permission level in Git allowing a user to clone a repository and fetch updates, but not push changes.
pull request review

pull request review

The process of examining proposed changes in a pull request before they are merged into the main codebase.
pulse graph

pulse graph

A visual representation of a GitHub repository's recent activity, including commits, issues, and pull requests.
punch graph

punch graph

A visualization of commit frequency over time, often displayed as a heatmap on Git platforms.
push a branch

push a branch

The act of uploading commits from a local branch to a corresponding branch in a remote Git repository.
push access

push access

Permission to upload local changes to a remote Git repository, allowing direct modification of shared branches.
reachability bitmaps

reachability bitmaps

Data structures used to optimize Git operations by quickly determining which objects are reachable from a given commit.
reachable

reachable

Git objects that can be accessed by following the commit history from a given reference point.
read access

read access

Permission to view and clone a Git repository without the ability to make changes or push commits.
recovery code

recovery code

A backup method for accessing a Git account if two-factor authentication is enabled but unavailable.
ref

ref

A name that points to a specific Git object, typically a commit, such as branches or tags.
refs

refs

The collection of references in a Git repository, including branches, tags, and other named pointers to commits.
remote URL

remote URL

The address of a remote Git repository, used for fetching and pushing changes between local and remote repositories.
remote repository

remote repository

A version of a Git project hosted on a server, serving as a central point for collaboration and backup.
remote-tracking branch

remote-tracking branch

A local reference that represents the state of a corresponding branch in a remote repository.
replica

replica

A copy of a Git repository, often used in distributed systems for redundancy and load balancing.
repository cache

repository cache

A local storage of repository data used to improve performance in Git operations.
repository graph

repository graph

A visual representation of the commit history and branch structure in a Git repository.
repository maintainer

repository maintainer

A person responsible for managing a Git repository, reviewing contributions, and maintaining project quality.
required pull request review

required pull request review

A protection rule requiring one or more reviewers to approve changes before merging in Git platforms.
required status check

required status check

A condition that must be met, such as passing tests, before changes can be merged into a protected branch.
resolve

resolve

The process of addressing and fixing merge conflicts in Git, typically done manually by the developer.
revert

revert

A Git operation that creates a new commit that undoes the changes made by a previous commit.
review

review

The process of examining proposed changes in a pull request before merging them into the main codebase.
revision

revision

A specific version of a file, directory, or entire repository in Git, often referenced by a commit hash.
rewind

rewind

The act of moving a branch pointer to an earlier commit in Git, effectively undoing more recent commits.
root directory

root directory

The top-level directory of a Git repository, containing all project files and the .git subdirectory.
root filesystem

root filesystem

The base filesystem of a Git repository, from which all other directories and files are organized.
saved reply

saved reply

A pre-written response that can be quickly inserted into issues or pull request comments on Git platforms.
scope

scope

The range of access or permissions granted to a token or application in Git-based systems.
seat

seat

A licensed user in enterprise Git hosting plans, typically representing a single user account.
secret team

secret team

A team in a Git organization that is hidden from non-members and other teams within the organization.
security log

security log

A record of security-related events and actions in a system, used for monitoring and auditing purposes.
server-to-server request

server-to-server request

An authenticated request between Git servers, often used in integrations or automated processes.
service hook

service hook

A mechanism for Git platforms to send event notifications to external services or applications.
shallow repository

shallow repository

A Git repository with an intentionally truncated history, often created through shallow cloning.
single sign-on

single sign-on

An authentication process allowing users to access multiple Git-related services with one set of credentials.

3D Stacked Memory for Cloud Servers

High-density memory architecture using vertically stacked chips, enhancing performance and capacity in cloud server hardware.

5G Cloud

Cloud infrastructure optimized for 5G networks, supporting high-speed, low-latency services and applications.

5G Network Slicing

Technique to create multiple virtual networks on a shared physical 5G infrastructure, each optimized for specific use cases.

5G and Edge Computing

Integration of 5G networks with edge computing to enable low-latency, high-bandwidth applications closer to end-users.

6G Cloud Integration

Future convergence of 6G networks with cloud computing, promising ultra-high speeds and advanced capabilities.

ACID Compliance

Database transaction properties (Atomicity, Consistency, Isolation, Durability) ensuring data integrity in cloud environments.

AI Ethics Compliance Tools

Software ensuring AI systems adhere to ethical guidelines and regulations in cloud deployments.

AI Ethics and Bias Detection Tools

Software for identifying and mitigating ethical issues and biases in AI models deployed in cloud environments.

AI Ethics and Governance Tools

Solutions for managing ethical considerations and regulatory compliance in cloud-based AI systems.

AI Governance Frameworks

Structured approaches for managing AI development, deployment, and use in cloud environments.

AI Model Governance Platforms

Comprehensive solutions for managing, monitoring, and controlling AI models in cloud-based systems.

AI Model Interpretability Services

Cloud-based tools for explaining and understanding the decision-making processes of AI models.

AI Model Interpretability Tools

Software for analyzing and explaining AI model decisions, crucial for transparency in cloud AI services.

AI Model Marketplaces

Cloud platforms for discovering, sharing, and monetizing pre-trained AI models and algorithms.

AI Model Monitoring and Drift Detection

Tools for tracking AI model performance and identifying deviations from expected behavior in cloud environments.

AI Model Versioning and Governance

Systems for managing different versions of AI models and enforcing governance policies in cloud deployments.

AI-Assisted Coding Platforms

Cloud-based development environments that use AI to assist programmers in writing and optimizing code.

AI-Augmented Analytics

Integration of AI capabilities into data analytics processes in cloud environments for enhanced insights.

AI-Driven Capacity Planning

Use of AI algorithms to predict and optimize resource allocation in cloud infrastructures.

AI-Driven Cloud Optimization

Application of AI techniques to improve efficiency, performance, and cost-effectiveness of cloud resources.

AI-Driven Cloud Resource Allocation

Automated distribution of cloud resources using AI to optimize performance and cost-efficiency.

AI-Driven Cloud Service Composition

AI-based automation of cloud service selection and integration for complex workflows.

AI-Driven Code Generation

Automated creation of source code using AI models, often integrated into cloud development platforms.

AI-Driven Data Classification

Automated categorization and labeling of data using AI algorithms in cloud storage and processing systems.

AI-Driven Network Optimization

Use of AI to improve network performance, efficiency, and security in cloud environments.

AI-Driven Resource Allocation

Intelligent distribution of computing resources in cloud environments using AI algorithms.

AI-Driven Security Information and Event Management (SIEM)

Enhanced SIEM systems using AI for improved threat detection and response in cloud environments.

AI-Driven Threat Detection

Use of AI algorithms to identify and analyze potential security threats in cloud systems.

AI-Driven Threat Hunting

Proactive search for hidden threats in cloud environments using AI-powered analytics and automation.

AI-Optimized Cloud Hardware

Cloud infrastructure components designed or configured to enhance AI workload performance.

AI-Optimized Databases

Database systems tailored for AI workloads, often featuring in-memory processing and distributed architectures.

AI-Powered Anomaly Detection

Use of AI algorithms to identify unusual patterns or behaviors in cloud systems and data.

AI-Powered Integration

Intelligent automation of data and application integration processes in cloud environments using AI.

AI-as-a-Service

Cloud-based offering of AI capabilities, allowing businesses to leverage AI without extensive in-house expertise.

AI-as-a-Service (AIaaS)

Cloud-based AI capabilities offered as a service, enabling easy integration of AI into applications.

AIOps

Application of AI for automating and enhancing IT operations management in cloud environments.

AIOps Platforms

Integrated solutions leveraging AI for automated monitoring, analysis, and management of cloud IT operations.

AIOps for Predictive Maintenance

Use of AI-driven analytics to forecast and prevent system failures in cloud infrastructure.

API Security Gateway

Service that protects APIs in cloud environments by managing access, monitoring traffic, and preventing attacks.

API Security Gateways

Dedicated services for securing and managing APIs in cloud environments, including access control and threat protection.

API-First Development

Design approach prioritizing API creation before implementation, common in cloud-native application development.

API-Led Connectivity

Integration strategy using purpose-built APIs to connect data, devices, and applications in cloud ecosystems.

AR Cloud

Persistent 3D digital content overlaid on the physical world, accessible via cloud infrastructure for augmented reality applications.

AR/VR Analytics

Cloud-based tools for analyzing user behavior and performance in augmented and virtual reality environments.

AR/VR Collaboration Platforms

Cloud-hosted services enabling multi-user interaction in shared augmented or virtual reality spaces.

AR/VR Content Delivery Network

Specialized CDN optimized for delivering AR/VR content with low latency and high bandwidth.

AR/VR Development Platforms

Cloud-based tools and services for creating, testing, and deploying augmented and virtual reality applications.

ARM Templates (Azure)

JSON-based files defining infrastructure and configuration for Azure resource deployment.

Adaptive User Interfaces for Cloud Services

Dynamic UIs that adjust based on user behavior, device capabilities, and context in cloud applications.

Adversarial Machine Learning Detection

Techniques to identify and mitigate attacks on ML models in cloud-based AI systems.

Alerting and Notification

Systems for informing administrators or users about important events or issues in cloud environments.

Algorithmic Auditing

Process of examining AI algorithms for bias, errors, or unintended consequences in cloud-based systems.

Ambient Computing Interfaces for Cloud

Seamless, context-aware interaction methods for accessing cloud services in IoT environments.

Anomaly Detection Systems

Tools for identifying unusual patterns or behaviors in cloud systems, often using machine learning techniques.

Application-Aware Networking

Network management approach that optimizes performance based on specific application requirements in cloud environments.

Approximate Query Processing

Technique for quickly estimating query results in large-scale cloud databases, trading accuracy for speed.

Archive Storage (e.g., Amazon Glacier, Azure Archive Storage)

Low-cost cloud storage for infrequently accessed data with longer retrieval times, e.g., Amazon Glacier, Azure Archive Storage.

Artifact Repository

Cloud-based storage for software build outputs, dependencies, and related metadata.

Artificial General Intelligence (AGI) as a Service

Hypothetical cloud offering of human-level AI capabilities across various domains.

Artificial General Intelligence Research Platforms

Cloud-based environments for developing and testing advanced AI systems approaching human-level intelligence.

Audit Logging

Systematic recording of actions and events in cloud systems for security and compliance purposes.

Audit Trails

Chronological records of system activities for reconstructing and examining the sequence of events in cloud environments.

Augmented Analytics

Integration of machine learning and natural language processing in cloud-based data analytics workflows.

Augmented Reality (AR) Cloud

Shared, persistent digital content overlaid on the physical world, accessible via cloud infrastructure.

Augmented Reality Cloud Interfaces

Cloud-based systems for managing and delivering AR content and experiences, enabling scalable AR applications.

Augmented Reality Cloud Rendering

Cloud-powered generation of AR graphics and content, offloading processing from end-user devices.

Auto Scaling Groups

Collections of EC2 instances that automatically adjust capacity based on defined conditions.

Auto-scaling

Automatic adjustment of cloud resources to match workload demands, ensuring optimal performance and cost-efficiency.

AutoML

Automated machine learning processes for model selection, hyperparameter tuning, and feature engineering in cloud environments.

AutoML in the Cloud

Cloud-based services automating the machine learning pipeline from data preparation to model deployment and monitoring.

Automated AI Pipeline Optimization

AI-driven tools for improving efficiency and performance of machine learning workflows in the cloud.

Automated Cloud Governance Enforcement

Systems that automatically implement and maintain cloud resource policies and compliance.

Automated Compliance Monitoring

Continuous, AI-driven assessment of cloud systems against regulatory and security standards.

Automated Data Discovery

AI-powered tools for identifying, categorizing, and mapping data assets in cloud environments.

Automated Data Governance

AI-driven systems for managing data quality, security, and compliance in cloud environments.

Automated Data Wrangling Services

Cloud-based tools using AI to clean, transform, and prepare data for analysis, streamlining data preparation processes.

Automated Feature Engineering

AI-powered generation and selection of features for machine learning models in cloud environments.

Automated Incident Response Orchestration

AI-driven coordination of security incident detection and resolution in cloud systems, automating response workflows.

Automated Machine Learning (AutoML)

Cloud services that automate the process of creating and optimizing machine learning models, from data prep to deployment.

Automated Machine Learning (AutoML) Platforms

Cloud-based systems that automate the end-to-end machine learning model development process, including feature engineering and model selection.

Automated Penetration Testing

AI-driven tools for simulating cyberattacks to identify vulnerabilities in cloud systems and applications.

Automated Threat Modeling

AI-powered analysis of cloud architectures to identify potential security risks and attack vectors.

Autonomous Systems in the Cloud

Self-managing, self-healing cloud services requiring minimal human intervention, leveraging AI for operations.

Azure Edge Zones

Ultra-low latency edge computing extensions of Azure for 5G networks, bringing cloud resources closer to users.

Azure Policy

Service for creating, assigning, and managing policies to control Azure resources and ensure compliance.

B2B Integration Platforms

Cloud-based services facilitating data exchange and process integration between business partners.

Backend for Frontend (BFF) Pattern

Architectural approach creating backend services tailored to specific frontend application needs in cloud environments.

Bare Metal Server

Physical server dedicated to a single tenant, offering direct hardware access in cloud environments.

Bare Metal Servers

Dedicated physical servers without virtualization, offered as a cloud service for high-performance workloads.

Batch Processing (e.g., AWS Batch, Azure Batch)

Execution of series of jobs without user interaction, often for large-scale data processing in the cloud (e.g., AWS Batch, Azure Batch).

Big Data Clusters

Distributed computing environments for processing and analyzing massive datasets in the cloud.

Billing Dashboard

Interface for monitoring and managing cloud service usage and costs, providing detailed breakdowns and forecasts.

Biocomputing in the Cloud

Use of cloud resources for computational biology and genomics research, enabling large-scale analysis and modeling.

Biodiversity Impact Assessment for Cloud Facilities

Evaluation of cloud data center effects on local ecosystems and wildlife to ensure sustainable operations.

Block Storage

Cloud storage that provides fixed-size raw storage volumes, typically used for databases or file systems.

Block Storage (e.g., Amazon EBS, Azure Disk Storage)

Cloud services providing persistent block-level storage volumes for use with compute instances.

Blockchain Analytics

Cloud-based tools for analyzing and visualizing blockchain data and transactions, offering insights into network activity.

Blockchain Databases

Distributed databases using blockchain technology for enhanced security and immutability in cloud environments.

Blockchain Governance Tools

Software for managing and enforcing rules, permissions, and consensus mechanisms in blockchain networks deployed on cloud platforms.

Blockchain Integration Services

Cloud-based solutions for connecting blockchain networks with existing enterprise systems and applications.

Scheduler Extender

External process allowing custom logic to be added to the Kubernetes scheduling decisions.

Scheduling Algorithms

Methods used by Kubernetes scheduler to determine the best node placement for pods based on various factors.

Scheduling Framework

Kubernetes component allowing plugins to customize the scheduling process without changing the core scheduler code.

Scheduling Plugins

Modular components in Kubernetes scheduler implementing specific scheduling behaviors and policies.

Scheduling Profiles

Configurations defining sets of scheduling plugins to be used for different scheduling scenarios in Kubernetes.

Seccomp BPF

Use of Berkeley Packet Filter programs to define fine-grained seccomp profiles for container security.

Seccomp Profiles

Security profiles defining allowed system calls for containers, enhancing isolation and reducing attack surface.

Secret

Kubernetes object for storing and managing sensitive information such as passwords, tokens, or keys.

Secrets Management

Process of securely storing, distributing, and rotating sensitive data in containerized environments.

Secure Computing Mode (seccomp)

Linux kernel feature limiting the system calls a process can make, often used to secure containers.

Secure Supply Chain

Practices ensuring the integrity and security of container images and their dependencies throughout the development lifecycle.

Security Context Constraint

OpenShift object defining a set of conditions that a pod must run with to be accepted into the system.

Security Context Constraints

OpenShift feature for fine-grained control over the actions containers can perform and the resources they can access.

Security Scanning in CI Pipeline

Integration of vulnerability and compliance scans into the continuous integration process for container images.

Serverless Frameworks

Tools and platforms for building and deploying serverless applications on container orchestration systems.

Serverless Observability

Techniques and tools for monitoring, tracing, and debugging serverless functions and applications.

Serverless Patterns

Architectural patterns for designing and implementing serverless applications in containerized environments.

Serverless Security

Practices and tools for securing serverless functions and applications in container-based infrastructures.

Serverless Workflows

Orchestration of multiple serverless functions to create complex, event-driven applications.

Service

Kubernetes abstraction defining a logical set of pods and a policy by which to access them.

Service Account Token Volume Projection

Kubernetes feature for securely delivering service account tokens to pods, enhancing security.

Service Account Tokens

Credentials automatically generated for pods to authenticate with the Kubernetes API server.

Service Discovery Pattern

Technique allowing services to locate and communicate with each other dynamically in containerized environments.

Service Mesh Control Plane

Component of a service mesh responsible for managing and configuring the data plane proxies.

Service Mesh Data Plane

Component of a service mesh consisting of proxies that intercept and control service-to-service communication.

Service Mesh Interface (SMI)

Specification defining a set of common APIs for service meshes on Kubernetes, promoting interoperability.

Service Mesh Pattern

Architectural pattern providing a dedicated infrastructure layer for handling service-to-service communication.

Service Mesh Performance (SMP)

Standard for measuring and characterizing the performance of service mesh deployments, aiding in optimization.

Service Monitors

Custom resources in Prometheus Operator for declaratively defining how services should be monitored.

Service Networking

Mechanisms and configurations for enabling network communication between services in container orchestration platforms.

Service Topology

Kubernetes feature allowing services to route traffic based on node topology for improved performance.

Service-to-Service Authentication

Process of verifying the identity of services communicating with each other in a containerized environment.

ServiceAccount

Kubernetes object providing an identity for processes running in a pod, used for authentication and authorization.

Sharding Pattern for Data Partitioning

Technique of dividing data across multiple database instances in containerized environments.

Sidecar Containers

Additional containers in a pod that enhance or extend the functionality of the main container.

Sidecar Pattern

Design pattern where a sidecar container is deployed alongside the main application container to provide supporting features.

Sidecar Proxy

Proxy container deployed alongside application containers to handle network traffic and implement service mesh functionality.

Sidecars for Service Mesh

Use of sidecar proxies to implement service mesh features like traffic management and security in Kubernetes.

SigNoz

Open-source application performance monitoring and observability platform for microservices and Kubernetes environments.

Skaffold

Tool facilitating continuous development for Kubernetes applications, handling building, pushing, and deploying application code.

Skaffold for Local Kubernetes Development

Use of Skaffold to streamline the development workflow for Kubernetes applications in local environments.

Snyk Container Security

Platform providing vulnerability scanning and security management for container images and Kubernetes deployments.

Software-Defined Networking (SDN)

Approach to network management enabling dynamic, programmatically efficient network configuration in container environments.

Source-to-Image (S2I)

Tool and workflow for building reproducible container images from source code, simplifying the build process.

Spinnaker

Open-source, multi-cloud continuous delivery platform for releasing software changes with high velocity and confidence.

Splunk for Containers

Integration of Splunk's data platform with containerized environments for logging, monitoring, and analysis.

StackRox Kubernetes Security Platform

Security platform providing vulnerability management, compliance, and runtime protection for Kubernetes.

Stateful Applications in Containers

Containerized applications that maintain data or state, requiring special considerations for persistence and scaling.

StatefulSet

Kubernetes workload API object used to manage stateful applications, providing unique network identities and stable storage.

StatefulSet Patterns

Design patterns for deploying and managing stateful applications in Kubernetes using StatefulSets.

Static Pods

Pods managed directly by the kubelet on a specific node, without the API server observing them.

Static Provisioning

Process of pre-creating storage resources in Kubernetes before they are claimed by persistent volume claims.

Static Token File

File-based method for providing authentication tokens to the Kubernetes API server, useful for bootstrap authentication.

Status Subresource

Kubernetes API feature allowing updates to an object's status without modifying its spec, enabling more granular updates.

Storage Capacity Tracking

Kubernetes feature for making scheduling decisions based on the available storage capacity of nodes.

Storage Classes

Kubernetes objects defining different classes of storage with varying performance characteristics or policies.

StorageClass

Kubernetes object describing the "classes" of storage offered by the administrator, used for dynamic provisioning.

StorageOS

Software-defined storage for cloud-native applications, providing persistent storage for containers.

Strangler Fig Pattern for Modernization

Incremental approach to modernizing legacy applications by gradually replacing components with microservices.

Streaming Protocols

Network protocols optimized for real-time data transmission in containerized environments.

SubPath

Kubernetes volume feature allowing mounting a specific directory of a volume instead of its root.

Submariner for Multi-cluster Networking

Open-source project enabling direct networking between pods and services across Kubernetes clusters.

Subresources

Kubernetes API feature representing sub-components of a resource, allowing more granular access control and operations.

SuperEdge

Open-source container management system for edge computing, extending Kubernetes to manage edge nodes efficiently.

Sysdig Secure for Runtime Protection

Security platform providing real-time threat detection and response for containerized environments.

TUF (The Update Framework) for Secure Updates

Specification for securing software update systems, applicable to container image distribution.

Taints

Kubernetes node attributes that repel certain pods from scheduling unless they have matching tolerations.

Taints and Tolerations

Kubernetes mechanism for controlling which pods can be scheduled on specific nodes, enabling node specialization.

Tekton

Cloud-native CI/CD framework for Kubernetes, providing custom resources for defining pipelines and tasks.

Tekton Pipelines

Kubernetes-native CI/CD solution using custom resources to define pipelines as a series of tasks.

Telepresence for Local Development

Tool allowing developers to run a single service locally while connecting to a remote Kubernetes cluster.

Tenable.io Container Security

Platform providing vulnerability management and compliance monitoring for container images and registries.

Tenant Isolation

Techniques for separating and securing resources belonging to different users or groups in multi-tenant Kubernetes clusters.

Terrascan for Kubernetes Security Scanning

Open-source tool for static code analysis of Infrastructure as Code, including Kubernetes manifests.

Thanos

Open-source project extending Prometheus for long-term storage and global query view in large-scale deployments.

Thanos for Long-Term Storage

Use of Thanos to provide durable storage and global query capability for Prometheus metrics.

Throttling Pattern

Technique for limiting the rate at which a containerized service processes requests to prevent overload.

Tilt for Microservices Development

Development environment as code for teams building Kubernetes microservices, streamlining local development.

Timeout Configuration

Settings controlling the maximum duration for various operations in containerized applications and infrastructure.

Tolerations

Kubernetes pod specifications that allow (but do not require) pods to be scheduled on nodes with matching taints.

Topology Manager

Kubernetes feature coordinating resource allocation decisions to provide topology-aligned resource allocations.

Traffic Mirroring

Technique of duplicating live traffic to a separate service instance for testing or debugging purposes.

Traffic Shifting

Gradual redirection of traffic from one version of a service to another, often used in canary deployments.

Traffic Splitting

Distribution of incoming requests across multiple versions of a service, enabling advanced deployment strategies.

Trivy for Vulnerability Scanning

Open-source security scanner for containers and other artifacts, finding vulnerabilities and misconfigurations.

Twelve-Factor App Methodology

Set of best practices for building software-as-a-service apps that can be easily deployed to the cloud.

Twistlock

Container security platform providing vulnerability management, compliance, and runtime protection (now part of Prisma Cloud).

Twistlock (now Prisma Cloud)

Comprehensive cloud-native security platform for containers, serverless, and cloud environments.

Underlay Networks

Physical network infrastructure upon which overlay networks for container communication are built.

Unikernels as Container Alternatives

Specialized, single-purpose machine images offering potential advantages in size and security over containers.

Union File System

Filesystem service for Linux allowing files and directories of separate filesystems to be overlaid, forming a single coherent filesystem.

User Impersonation

Kubernetes feature allowing a user to act as another user, useful for debugging and testing access controls.

User Namespaces

Linux kernel feature providing per-process isolated instances of user and group ID number spaces.

VXLAN

Network virtualization technology used in container networking for creating overlay networks.

VXLAN Overlay Networks

Virtual networks using VXLAN encapsulation to enable container communication across hosts.

Valet Key Pattern for Secure Resource Access

Design pattern for providing clients with restricted direct access to a specific resource or service.

Validating Webhooks

Admission controller webhooks in Kubernetes that validate resource requests without modifying them.

Validation Webhooks

Kubernetes admission control mechanism for validating API requests against custom logic before persistence.

Velero for Backup and Restore

Open-source tool for backing up and restoring Kubernetes cluster resources and persistent volumes.

Version Skew Policy

Guidelines defining supported version differences between Kubernetes components to ensure compatibility.