Engineering Glossary

From fundamental principles to cutting-edge practices, this glossary covers the full spectrum of software engineering terminology.

DevOps
Cloud Computing
Git
Containerization & Orchestration

Docker Container

A lightweight, portable unit that packages an application and its dependencies, allowing it to run consistently across different environments.
DevOps

Docker Log Management

Process of collecting, storing, and analyzing logs generated by Docker containers.
DevOps

Dokku

Mini-Heroku powered by Docker, helping developers quickly deploy their applications.
DevOps

Domain Drive Design (DDD)

Software design approach focusing on modeling software to match a domain according to input from domain experts.
DevOps

Drone

Cloud-native continuous integration and delivery platform that uses a simple YAML configuration file to define and execute pipelines.
DevOps

Dynamic Application Security Testing (DAST)

Security testing methodology that analyzes a running application to find vulnerabilities.
DevOps

Dynamic Infrastructure

IT infrastructure that can be programmatically allocated and managed, often associated with cloud computing and Infrastructure as Code.
DevOps

Dynatrace

Platform for application performance management, AI operations, cloud infrastructure monitoring, and digital experience management.
DevOps

EC2

Amazon Elastic Compute Cloud; web service providing resizable compute capacity in the cloud.
DevOps

EKS

Managed Kubernetes service for easy deployment on AWS without the need to install and operate your own Kubernetes clusters.
DevOps

Edge Computing

Distributed computing paradigm that brings computation and data storage closer to the location where it is needed.
DevOps

ElasticSearch

Distributed, RESTful search and analytics engine capable of addressing a growing number of use cases.
DevOps

Elasticity

Ability of a system to automatically scale up or down based on demand, crucial for efficient resource utilization in cloud environments.
DevOps

Emergent Design

Design approach where the architecture of a system evolves gradually as the system is developed.
DevOps

Enabling Team

Group that helps other teams to deliver software more effectively, often by providing tools and platforms.
DevOps

Encapsulation

Bundling of data with the methods that operate on that data, restricting direct access to some of an object's components.
DevOps

End-to-End Testing (EE Testing)

Methodology used to test whether the flow of an application is performing as designed from start to finish.
DevOps

Endpoint Security

Approach to protecting computer networks that are remotely bridged to client devices.
DevOps

Enterprise Application Integration (EAI)

Use of software and architectural principles to integrate enterprise applications.
DevOps

Enterprise Security

Overarching strategy and implementation of security measures across an entire organization.
DevOps

Environment

Set of conditions under which a piece of software is developed, tested, or run, including hardware, configuration, and other software.
DevOps

Environment Variable

Dynamic-named value that can affect the way running processes will behave on a computer.
DevOps

Environments

Different setups where software can be run, such as development, testing, staging, and production.
DevOps

Envoy

High-performance distributed proxy designed for cloud-native applications, often used as a service mesh component.
DevOps

Ephemeral Environments

Temporary, disposable environments created on-demand for testing or development, ensuring consistency and isolation.
DevOps

Error Budget

Acceptable amount of unplanned downtime or errors a service can experience without consequences.
DevOps

Error Log

Record of error messages generated by a software application or system, crucial for troubleshooting and monitoring.
DevOps

Error Tracking

Process of identifying, recording, and analyzing errors in software applications to improve reliability and user experience.
DevOps

Eucalyptus

Open-source software for building AWS-compatible private and hybrid cloud computing environments.
DevOps

Event Log

Record of events taking place in the execution of a system to provide an audit trail.
DevOps

Event-Driven Architecture (EDA)

Design paradigm in which the flow of the program is determined by events such as user actions, sensor outputs, or messages from other programs.
DevOps

Everything as Code (EaC)

Approach to managing all aspects of IT infrastructure and operations through code.
DevOps

Excessive Data Exposure

Security issue where an API returns more data than necessary, potentially revealing sensitive information.
DevOps

Exploratory Testing

Approach to software testing that emphasizes the tester's freedom and creativity to uncover issues.
DevOps

FAI (Fully Automatic Installer)

Tool for unattended mass installation of Linux systems, streamlining the process of setting up multiple machines.
DevOps

Fabric

Python library and command-line tool for streamlining the use of SSH for application deployment or systems administration tasks.
DevOps

Fail Fast

Design principle promoting immediate reporting of failures to enable quick detection and resolution of issues.
DevOps

Failed Builds

Instances where the compilation or integration process of software fails due to errors.
DevOps

False Positive

Error in evaluation where a condition is mistakenly flagged as true when it is actually false.
DevOps

Fargate

AWS serverless compute engine for containers that works with both Amazon ECS and Amazon EKS.
DevOps

Fault Tolerance

Property that enables a system to continue operating properly in the event of the failure of some of its components.
DevOps

Fear-driven Development

Anti-pattern where developers make decisions based on fear rather than best practices or data.
DevOps

Feature Branching

Practice of creating a separate branch in version control for each feature during development.
DevOps

Feature Flagging

Technique allowing teams to modify system behavior without changing code, enabling gradual rollouts and A/B testing.
DevOps

Feature Flags

Technique in software development that turns certain functionality on and off during runtime, without deploying new code.
DevOps

Feature Management

Practice of using feature flags to control and manage the lifecycle of features in software applications.
DevOps

Feature Toggle

Technique in software development for turning features on or off quickly without changing code.
DevOps

Fig

Tool for defining and running multi-container Docker applications, now replaced by Docker Compose.
DevOps

File Inclusion

Vulnerability that allows an attacker to include a file, usually exploiting dynamic file inclusion mechanisms implemented in the target application.
DevOps

FinDevOps

Application of DevOps principles to financial services, emphasizing security and compliance.
DevOps

FinOps

Practice bringing financial accountability to cloud spending, enabling teams to balance speed, cost, and quality in business decisions.
DevOps

First Input Delay (FID)

Measure of responsiveness that quantifies the experience users feel when trying to interact with unresponsive pages.
DevOps

Five Nines

Discover the gold standard of system reliability: "five nines" uptime. Learn what 99.999% availability means, its importance, and the challenges in achieving this elite DevOps goal.
DevOps

Flaky Test

Test that sometimes passes and sometimes fails without any code changes, often causing frustration in CI/CD pipelines.
DevOps

Flow

The smooth, continuous movement of code from development to production, emphasizing automation, collaboration, and rapid feedback to optimize software delivery.
DevOps

Flow Metrics

Measurements used to understand and optimize the flow of work through a system, crucial in lean and agile methodologies.
DevOps

Flutter

Google's UI toolkit for building natively compiled applications for mobile, web, and desktop from a single codebase.
DevOps

Flynn

Open-source platform designed to simplify deploying and maintaining applications, offering a heroku-like experience using Docker containers.
DevOps

Foreman

Open-source tool for complete lifecycle management of physical and virtual servers, automating repetitive tasks and simplifying provisioning.
DevOps

Four Key Metrics

Set of metrics (lead time, deployment frequency, mean time to restore, change failure rate) used to measure software delivery performance.
DevOps

Four Nines

Explore the concept of "four nines" in system reliability. Learn what 99.99% uptime means, its importance in DevOps, and strategies to achieve this high availability standard.
DevOps

Four-eyes Principle

Security measure requiring two individuals to approve or perform an action, reducing the risk of fraud or errors.
DevOps

Fpm

Tool to easily build packages such as rpms, debs, and more, simplifying the process of creating software packages for different systems.
DevOps

Full Stack Observability

Comprehensive visibility into all parts of a software system, from front-end to back-end.
DevOps

Function-as-a-Service (FaaS)

Cloud computing service that allows execution of code in response to events without complex infrastructure.
DevOps

Functional Testing

Type of testing that verifies that each function of the software application operates according to the specification.
DevOps

Functions as a Service

Cloud computing execution model where developers run and manage application functionalities without the complexity of building and maintaining infrastructure.
DevOps

Fuzz Testing

Automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program.
DevOps

Gain Privileges

Process or action of obtaining higher levels of access or permissions in a system.
DevOps

Ganglia

Scalable distributed monitoring system for high-performance computing systems such as clusters and grids.
DevOps

Gemba

Japanese term meaning "the actual place," used in management to emphasize the importance of direct observation.
DevOps

General Data Protection Regulation (GDPR)

EU law on data protection and privacy for all individuals within the European Union and the European Economic Area.
DevOps

Gift Card Fraud

Unauthorized or deceptive use of gift cards for financial gain, often involving stolen card numbers or exploitation of card systems.
DevOps

Git Branch

Lightweight movable pointer to a commit in Git version control, allowing for parallel development and experimentation.
DevOps

Git Repository

Storage location for a Git project, containing all the files and their revision history.
DevOps

GitHub

Web-based hosting service for version control using Git, offering collaboration features, code review, and integration with various development tools.
DevOps

GitHub Actions

GitHub's built-in continuous integration and continuous delivery (CI/CD) platform, allowing automated build, test, and deployment workflows.
DevOps

GitLab

Web-based DevOps lifecycle tool that provides a Git-repository manager with wiki, issue-tracking and CI/CD pipeline features.
DevOps

GitOps

Framework applying DevOps best practices like version control, collaboration, compliance, and CI/CD to infrastructure automation.
DevOps

GitOps Operator

Software agent that implements GitOps practices, reconciling the desired state in Git with the actual state of the system.
DevOps

Gitflow Workflow

Git workflow that defines a strict branching model designed around the project release.
DevOps

Gitlab CI

GitLab's built-in Continuous Integration/Continuous Deployment tool, allowing automated testing and deployment of code changes.
DevOps

GoCD

Open-source continuous delivery server to model and visualize complex workflows.
DevOps

Golden Image

Pre-configured template for a virtual machine, used to create standardized instances.
DevOps

Google App Engine

Platform as a Service for developing and hosting web applications in Google-managed data centers.
DevOps

Google Cloud Platform (GCP)

Suite of cloud computing services running on the same infrastructure that Google uses internally.
DevOps

Governance

The policies, controls, and standards to ensure compliance, security, and quality across the software delivery pipeline while maintaining agility and efficiency.
DevOps

Gradle

Powerful build automation tool that supports multi-language development and offers a flexible, plugin-based architecture for customization.
DevOps

Grafana

Open-source platform for monitoring and observability, allowing users to visualize, alert on, and understand metrics from various data sources.
DevOps

Graphite

Monitoring tool that stores numeric time-series data and renders graphs of this data on demand.
DevOps

HIPAA

Health Insurance Portability and Accountability Act; U.S. legislation that provides data privacy and security provisions for safeguarding medical information.
DevOps

HTTP Requests

Messages sent by clients to initiate actions on servers, forming the foundation of data communication on the World Wide Web.
DevOps

Hadoop Architecture

Framework that allows for the distributed processing of large data sets across clusters of computers.
DevOps

HashiCorp Vault

Tool for securely accessing secrets like API keys, passwords, and certificates, central to modern secret management strategies.
DevOps

Heartbeat Monitoring

Continuous monitoring of a system or service to check if it's operational, often used in high-availability setups.
DevOps

Helm Chart

Package format for defining, installing, and upgrading complex Kubernetes applications, simplifying the deployment process.
DevOps

Heroku

Cloud platform as a service (PaaS) supporting several programming languages, used for deploying, managing, and scaling modern apps.
DevOps

High Availability

Characteristic of a system designed to avoid loss of service by reducing or managing failures.
DevOps

Hybrid Cloud

Computing environment that uses a mix of on-premises, private cloud and third-party, public cloud services.
DevOps

Hypothesis-Driven Development

Approach where features are treated as experiments to validate business outcomes.
DevOps
stash entry

stash entry

A single set of stashed changes in Git, which can be reapplied later to the working directory.
status checks

status checks

Automated tests or processes that run when changes are proposed in a Git repository, ensuring code quality and compatibility.
subscription

subscription

Notifications or updates a user receives about activity in Git repositories they're interested in or contributing to.
superproject

superproject

The main Git repository that contains submodules, managing references to specific versions of nested repositories.
symref

symref

A symbolic reference in Git that points to another reference, most commonly used for HEAD pointing to the current branch.
tag object

tag object

A Git object containing metadata about a tag, including the tagger, date, and optional message.
team

team

A group of users on a Git platform with shared access permissions to repositories within an organization.
team maintainer

team maintainer

A user with administrative privileges for managing a team's membership and access rights in a Git organization.
timeline

timeline

A chronological display of events and activities in a Git repository or user profile on hosting platforms.
topic branch

topic branch

A short-lived Git branch created to develop a specific feature or fix a particular issue.
topics

topics

Keywords or categories assigned to Git repositories to help users discover related projects on hosting platforms.
traffic graph

traffic graph

A visual representation of visitor activity and clone statistics for a Git repository on hosting platforms.
transfer

transfer

The process of moving Git objects between repositories during push, fetch, or clone operations.
tree

tree

A Git object representing a directory structure, containing references to blobs (files) and other trees (subdirectories).
tree object

tree object

A Git object that stores the hierarchy of files and directories in a repository at a specific point in time.
tree-ish (also treeish)

tree-ish (also treeish)

A Git term referring to an object that resolves to a tree, such as a commit, tag, or tree.
unborn

unborn

A state of a Git branch that has no commits yet, typically seen when initializing a new repository.
unmerged index

unmerged index

The state of the Git index containing conflicting changes from different branches during a merge operation.
unreachable object

unreachable object

A Git object not accessible from any reference, potentially subject to garbage collection if not recovered.
upstream branch

upstream branch

The remote branch that a local branch is set to track, used as a reference for pull and push operations.
user

user

An individual account on a Git platform, associated with personal repositories and contributions.
user-to-server request

user-to-server request

An authenticated request from a Git client to a server, typically for operations like push or fetch.
username

username

The unique identifier for a user account on Git platforms, used for authentication and mention notifications.
visible team

visible team

A team in a Git organization that is visible to all members of the organization, as opposed to secret teams.
watch

watch

A feature allowing users to receive notifications about activity in Git repositories they're interested in.
watching notifications

watching notifications

Alerts received for all notable events in a watched Git repository, including issues, pull requests, and releases.
web notifications

web notifications

Alerts displayed on Git platforms' web interfaces, notifying users of relevant activity or mentions.
working area

working area

The directory on your local machine where you modify files before staging and committing them in Git.
working tree

working tree

The set of files and directories in your project that are currently checked out and available for editing.
worktree

worktree

A Git feature allowing multiple working directories to be associated with a single repository.
write access

write access

Permission to make changes to a Git repository, including pushing commits and modifying branches.

3D Stacked Memory for Cloud Servers

High-density memory architecture using vertically stacked chips, enhancing performance and capacity in cloud server hardware.

5G Cloud

Cloud infrastructure optimized for 5G networks, supporting high-speed, low-latency services and applications.

5G Network Slicing

Technique to create multiple virtual networks on a shared physical 5G infrastructure, each optimized for specific use cases.

5G and Edge Computing

Integration of 5G networks with edge computing to enable low-latency, high-bandwidth applications closer to end-users.

6G Cloud Integration

Future convergence of 6G networks with cloud computing, promising ultra-high speeds and advanced capabilities.

ACID Compliance

Database transaction properties (Atomicity, Consistency, Isolation, Durability) ensuring data integrity in cloud environments.

AI Ethics Compliance Tools

Software ensuring AI systems adhere to ethical guidelines and regulations in cloud deployments.

AI Ethics and Bias Detection Tools

Software for identifying and mitigating ethical issues and biases in AI models deployed in cloud environments.

AI Ethics and Governance Tools

Solutions for managing ethical considerations and regulatory compliance in cloud-based AI systems.

AI Governance Frameworks

Structured approaches for managing AI development, deployment, and use in cloud environments.

AI Model Governance Platforms

Comprehensive solutions for managing, monitoring, and controlling AI models in cloud-based systems.

AI Model Interpretability Services

Cloud-based tools for explaining and understanding the decision-making processes of AI models.

AI Model Interpretability Tools

Software for analyzing and explaining AI model decisions, crucial for transparency in cloud AI services.

AI Model Marketplaces

Cloud platforms for discovering, sharing, and monetizing pre-trained AI models and algorithms.

AI Model Monitoring and Drift Detection

Tools for tracking AI model performance and identifying deviations from expected behavior in cloud environments.

AI Model Versioning and Governance

Systems for managing different versions of AI models and enforcing governance policies in cloud deployments.

AI-Assisted Coding Platforms

Cloud-based development environments that use AI to assist programmers in writing and optimizing code.

AI-Augmented Analytics

Integration of AI capabilities into data analytics processes in cloud environments for enhanced insights.

AI-Driven Capacity Planning

Use of AI algorithms to predict and optimize resource allocation in cloud infrastructures.

AI-Driven Cloud Optimization

Application of AI techniques to improve efficiency, performance, and cost-effectiveness of cloud resources.

AI-Driven Cloud Resource Allocation

Automated distribution of cloud resources using AI to optimize performance and cost-efficiency.

AI-Driven Cloud Service Composition

AI-based automation of cloud service selection and integration for complex workflows.

AI-Driven Code Generation

Automated creation of source code using AI models, often integrated into cloud development platforms.

AI-Driven Data Classification

Automated categorization and labeling of data using AI algorithms in cloud storage and processing systems.

AI-Driven Network Optimization

Use of AI to improve network performance, efficiency, and security in cloud environments.

AI-Driven Resource Allocation

Intelligent distribution of computing resources in cloud environments using AI algorithms.

AI-Driven Security Information and Event Management (SIEM)

Enhanced SIEM systems using AI for improved threat detection and response in cloud environments.

AI-Driven Threat Detection

Use of AI algorithms to identify and analyze potential security threats in cloud systems.

AI-Driven Threat Hunting

Proactive search for hidden threats in cloud environments using AI-powered analytics and automation.

AI-Optimized Cloud Hardware

Cloud infrastructure components designed or configured to enhance AI workload performance.

AI-Optimized Databases

Database systems tailored for AI workloads, often featuring in-memory processing and distributed architectures.

AI-Powered Anomaly Detection

Use of AI algorithms to identify unusual patterns or behaviors in cloud systems and data.

AI-Powered Integration

Intelligent automation of data and application integration processes in cloud environments using AI.

AI-as-a-Service

Cloud-based offering of AI capabilities, allowing businesses to leverage AI without extensive in-house expertise.

AI-as-a-Service (AIaaS)

Cloud-based AI capabilities offered as a service, enabling easy integration of AI into applications.

AIOps

Application of AI for automating and enhancing IT operations management in cloud environments.

AIOps Platforms

Integrated solutions leveraging AI for automated monitoring, analysis, and management of cloud IT operations.

AIOps for Predictive Maintenance

Use of AI-driven analytics to forecast and prevent system failures in cloud infrastructure.

API Security Gateway

Service that protects APIs in cloud environments by managing access, monitoring traffic, and preventing attacks.

API Security Gateways

Dedicated services for securing and managing APIs in cloud environments, including access control and threat protection.

API-First Development

Design approach prioritizing API creation before implementation, common in cloud-native application development.

API-Led Connectivity

Integration strategy using purpose-built APIs to connect data, devices, and applications in cloud ecosystems.

AR Cloud

Persistent 3D digital content overlaid on the physical world, accessible via cloud infrastructure for augmented reality applications.

AR/VR Analytics

Cloud-based tools for analyzing user behavior and performance in augmented and virtual reality environments.

AR/VR Collaboration Platforms

Cloud-hosted services enabling multi-user interaction in shared augmented or virtual reality spaces.

AR/VR Content Delivery Network

Specialized CDN optimized for delivering AR/VR content with low latency and high bandwidth.

AR/VR Development Platforms

Cloud-based tools and services for creating, testing, and deploying augmented and virtual reality applications.

ARM Templates (Azure)

JSON-based files defining infrastructure and configuration for Azure resource deployment.

Adaptive User Interfaces for Cloud Services

Dynamic UIs that adjust based on user behavior, device capabilities, and context in cloud applications.

Adversarial Machine Learning Detection

Techniques to identify and mitigate attacks on ML models in cloud-based AI systems.

Alerting and Notification

Systems for informing administrators or users about important events or issues in cloud environments.

Algorithmic Auditing

Process of examining AI algorithms for bias, errors, or unintended consequences in cloud-based systems.

Ambient Computing Interfaces for Cloud

Seamless, context-aware interaction methods for accessing cloud services in IoT environments.

Anomaly Detection Systems

Tools for identifying unusual patterns or behaviors in cloud systems, often using machine learning techniques.

Application-Aware Networking

Network management approach that optimizes performance based on specific application requirements in cloud environments.

Approximate Query Processing

Technique for quickly estimating query results in large-scale cloud databases, trading accuracy for speed.

Archive Storage (e.g., Amazon Glacier, Azure Archive Storage)

Low-cost cloud storage for infrequently accessed data with longer retrieval times, e.g., Amazon Glacier, Azure Archive Storage.

Artifact Repository

Cloud-based storage for software build outputs, dependencies, and related metadata.

Artificial General Intelligence (AGI) as a Service

Hypothetical cloud offering of human-level AI capabilities across various domains.

Artificial General Intelligence Research Platforms

Cloud-based environments for developing and testing advanced AI systems approaching human-level intelligence.

Audit Logging

Systematic recording of actions and events in cloud systems for security and compliance purposes.

Audit Trails

Chronological records of system activities for reconstructing and examining the sequence of events in cloud environments.

Augmented Analytics

Integration of machine learning and natural language processing in cloud-based data analytics workflows.

Augmented Reality (AR) Cloud

Shared, persistent digital content overlaid on the physical world, accessible via cloud infrastructure.

Augmented Reality Cloud Interfaces

Cloud-based systems for managing and delivering AR content and experiences, enabling scalable AR applications.

Augmented Reality Cloud Rendering

Cloud-powered generation of AR graphics and content, offloading processing from end-user devices.

Auto Scaling Groups

Collections of EC2 instances that automatically adjust capacity based on defined conditions.

Auto-scaling

Automatic adjustment of cloud resources to match workload demands, ensuring optimal performance and cost-efficiency.

AutoML

Automated machine learning processes for model selection, hyperparameter tuning, and feature engineering in cloud environments.

AutoML in the Cloud

Cloud-based services automating the machine learning pipeline from data preparation to model deployment and monitoring.

Automated AI Pipeline Optimization

AI-driven tools for improving efficiency and performance of machine learning workflows in the cloud.

Automated Cloud Governance Enforcement

Systems that automatically implement and maintain cloud resource policies and compliance.

Automated Compliance Monitoring

Continuous, AI-driven assessment of cloud systems against regulatory and security standards.

Automated Data Discovery

AI-powered tools for identifying, categorizing, and mapping data assets in cloud environments.

Automated Data Governance

AI-driven systems for managing data quality, security, and compliance in cloud environments.

Automated Data Wrangling Services

Cloud-based tools using AI to clean, transform, and prepare data for analysis, streamlining data preparation processes.

Automated Feature Engineering

AI-powered generation and selection of features for machine learning models in cloud environments.

Automated Incident Response Orchestration

AI-driven coordination of security incident detection and resolution in cloud systems, automating response workflows.

Automated Machine Learning (AutoML)

Cloud services that automate the process of creating and optimizing machine learning models, from data prep to deployment.

Automated Machine Learning (AutoML) Platforms

Cloud-based systems that automate the end-to-end machine learning model development process, including feature engineering and model selection.

Automated Penetration Testing

AI-driven tools for simulating cyberattacks to identify vulnerabilities in cloud systems and applications.

Automated Threat Modeling

AI-powered analysis of cloud architectures to identify potential security risks and attack vectors.

Autonomous Systems in the Cloud

Self-managing, self-healing cloud services requiring minimal human intervention, leveraging AI for operations.

Azure Edge Zones

Ultra-low latency edge computing extensions of Azure for 5G networks, bringing cloud resources closer to users.

Azure Policy

Service for creating, assigning, and managing policies to control Azure resources and ensure compliance.

B2B Integration Platforms

Cloud-based services facilitating data exchange and process integration between business partners.

Backend for Frontend (BFF) Pattern

Architectural approach creating backend services tailored to specific frontend application needs in cloud environments.

Bare Metal Server

Physical server dedicated to a single tenant, offering direct hardware access in cloud environments.

Bare Metal Servers

Dedicated physical servers without virtualization, offered as a cloud service for high-performance workloads.

Batch Processing (e.g., AWS Batch, Azure Batch)

Execution of series of jobs without user interaction, often for large-scale data processing in the cloud (e.g., AWS Batch, Azure Batch).

Big Data Clusters

Distributed computing environments for processing and analyzing massive datasets in the cloud.

Billing Dashboard

Interface for monitoring and managing cloud service usage and costs, providing detailed breakdowns and forecasts.

Biocomputing in the Cloud

Use of cloud resources for computational biology and genomics research, enabling large-scale analysis and modeling.

Biodiversity Impact Assessment for Cloud Facilities

Evaluation of cloud data center effects on local ecosystems and wildlife to ensure sustainable operations.

Block Storage

Cloud storage that provides fixed-size raw storage volumes, typically used for databases or file systems.

Block Storage (e.g., Amazon EBS, Azure Disk Storage)

Cloud services providing persistent block-level storage volumes for use with compute instances.

Blockchain Analytics

Cloud-based tools for analyzing and visualizing blockchain data and transactions, offering insights into network activity.

Blockchain Databases

Distributed databases using blockchain technology for enhanced security and immutability in cloud environments.

Blockchain Governance Tools

Software for managing and enforcing rules, permissions, and consensus mechanisms in blockchain networks deployed on cloud platforms.

Blockchain Integration Services

Cloud-based solutions for connecting blockchain networks with existing enterprise systems and applications.

DaemonSet Pattern

Design pattern using DaemonSets to run system daemons or agents on every node in a cluster.

Data Backup and Recovery

Processes and tools for preserving and restoring data in containerized environments, ensuring data durability.

Data Consistency in Distributed Systems

Techniques ensuring data integrity across distributed container-based applications, maintaining reliability.

Data Fabric in Containerized Environments

Distributed data management architecture providing consistent data access across containerized applications.

Data Lakehouse Architecture

Unified data architecture combining data lake and data warehouse features in containerized environments.

Data Migration Between Containers

Process of moving data between containers or from traditional systems to containerized applications.

Data Persistence Strategies

Techniques for maintaining data across container lifecycles, including volume mounts and persistent volumes.

Data Plane

Network layer responsible for forwarding container traffic based on control plane decisions.

Data Replication in Containers

Techniques for creating and maintaining copies of data across multiple containerized instances.

Data Sharding in Containerized Databases

Partitioning data across multiple database containers for improved scalability and performance.

Database Containerization

Process of running database systems within containers for improved portability and resource utilization.

Database-per-Service Pattern

Microservices design pattern where each service has its own dedicated database, ensuring data isolation.

Datadog Container Monitoring

Platform for observability and monitoring of containerized environments and microservices.

Dead Letter Queue Pattern

Design pattern for handling failed message processing in containerized message-driven systems.

Declarative Deployments

Approach to deploying containers by specifying desired state rather than imperative commands.

Deployment Strategies

Techniques for rolling out container updates, including rolling updates, blue-green, and canary deployments.

Descheduler

Kubernetes component that evicts pods from nodes based on specific policies to optimize cluster resource usage.

DevSpace for Cloud-native Development

Standardized format defining the structure and metadata of Docker container images, ensuring portability.

Device Plugins

Kubernetes feature allowing nodes to advertise system hardware resources to the cluster, enabling specialized hardware use.

Direct Server Return (DSR)

Network optimization technique in container load balancing for improved performance by bypassing the load balancer for responses.

Distributed Tracing Integration

Implementation of tracing in containerized microservices for end-to-end request visibility.

Distributed Tracing with Jaeger

Implementation of distributed tracing using Jaeger to monitor and optimize performance in microservices architectures.

Distributed Tracing with OpenTelemetry

Implementation of OpenTelemetry for standardized observability in containerized environments.

Distroless Images

Minimal container images containing only the application and its runtime dependencies, reducing attack surface.

Docker Attach

Command to attach local standard input, output, and error streams to a running container for interaction and debugging.

Docker Build Context

Set of files located in the specified PATH or URL, used during the docker build process to create images.

Docker Buildx

Docker CLI plugin for extended build capabilities, including multi-platform builds and enhanced build options.

Docker CRI Shim

Component enabling Docker to be used as a container runtime in Kubernetes via the Container Runtime Interface.

Docker Client

Command-line tool for interacting with Docker daemon and managing containers, images, and other Docker objects.

Docker Commit

Command creating a new image from a container's changes, useful for saving modifications made to a running container.

Docker Compose

Tool for defining and running multi-container Docker applications, simplifying the process of managing complex application stacks.

Docker Container Inspection

Process of viewing detailed information about a container's configuration and state, aiding in troubleshooting.

Docker Content Trust

Feature providing digital signing and verification of Docker images, ensuring image authenticity and integrity.

Docker Content Trust Signature Verification

Process of validating the authenticity and integrity of signed Docker images before use.

Docker Contexts

Feature allowing management of multiple Docker endpoints from a single Docker client, simplifying multi-environment management.

Docker Daemon

Background service managing Docker objects like images, containers, networks, and volumes.

Docker Exec

Command allowing users to run a new process inside a running container, useful for debugging and maintenance tasks.

Docker Export/Import

Commands for exporting a container's filesystem as a tarball and importing it as an image.

Docker Hub

Cloud-based repository service for finding and sharing container images, central to the Docker ecosystem.

Docker Image History

Command showing the history of an image's layers, providing insight into how the image was built and modified.

Docker Image Inspection

Process of examining Docker image metadata, including layers, environment variables, and exposed ports.

Docker Image Specification

Standardized format defining the structure and metadata of Docker container images, ensuring portability.

Docker Network

Virtualized network providing connectivity between Docker containers, isolating container traffic from the host network.

Docker Network Driver Types (bridge, host, overlay, macvlan)

Different networking modes in Docker, including bridge, host, overlay, and macvlan, offering varied connectivity options.

Docker Prune

Command for removing unused Docker objects like containers, networks, images, and volumes.

Docker Save/Load

Commands for exporting Docker images to tar archives and importing them back, useful for image transfer and backup.

Docker Scan

Command-line tool for scanning Docker images for vulnerabilities, providing detailed reports on potential security issues.

Docker Shim

Deprecated component that provided CRI compatibility for Docker in Kubernetes, bridging Docker and CRI.

Docker Socket

Unix socket or named pipe used for communication between Docker client and daemon, enabling Docker API access.

Docker Stats

Command displaying a live stream of container resource usage statistics, including CPU, memory, and network I/O.

Docker Swarm

Native clustering and orchestration solution for Docker, allowing you to create and manage a swarm of Docker nodes as a single virtual system.

Docker System Events

Real-time stream of Docker daemon events, providing insights into container, image, volume, and network activities.

Docker Top

Command displaying the running processes of a container, similar to the Unix top command but container-specific.

Docker Volume

Persistent data storage mechanism for containers, independent of container lifecycle, enabling data persistence.

Docker Volume Driver Types

Different storage backends for Docker volumes, including local, NFS, and cloud-specific drivers.

Dockerfile

Text document containing all the commands a user could call on the command line to assemble a Docker image.

Dockerfile ARG

Instruction defining build-time variables that users can pass at build-time to the builder.

Dockerfile Best Practices

Guidelines for creating efficient, secure, and maintainable Dockerfiles, optimizing image builds and runtime performance.

Dockerfile HEALTHCHECK

Instruction telling Docker how to test a container to check its health status, improving reliability.

Dockerfile Instructions (ADD, COPY, RUN, CMD, ENTRYPOINT, etc.)

Set of commands used in Dockerfiles to build images, including ADD, COPY, RUN, CMD, and ENTRYPOINT.

Dockerfile ONBUILD

Set of commands used in Dockerfiles to build images, including ADD, COPY, RUN, CMD, and ENTRYPOINT.

Dockerfile STOPSIGNAL

Instruction setting the system call signal that will be sent to the container to exit, customizing shutdown behavior.

Dockerignore

File specifying which files and directories should be excluded when building a Docker image.

Domain-Driven Design (DDD) in Microservices

Approach to software design focusing on the core domain in containerized microservices architectures.

Dragonfly for P2P Image Distribution

P2P-based image and file distribution system to improve efficiency of image downloads in container environments.

Drain

Process of cordoning a node and evicting its pods in preparation for maintenance or decommissioning.

Dual-stack Networking

Networking configuration supporting both IPv4 and IPv6 in container environments, enabling broader connectivity options.

Dynamic Admission Control

Kubernetes feature allowing custom logic to be applied to object creation or modification requests.

Dynamic Auditing

Kubernetes feature enabling runtime configuration of audit policies without API server restart.

Dynamic Provisioning

Automatic creation of storage when persistent volume claims are made in Kubernetes, simplifying storage management.

Dynatrace OneAgent

Monitoring solution for containerized environments, providing deep visibility into application performance.

ELK Stack (Elasticsearch, Logstash, Kibana)

Combination of Elasticsearch, Logstash, and Kibana for logging and monitoring containerized environments.

East-West Traffic

Network communication between containers or services within the same cluster or data center.

Edge AI/ML

Deployment of artificial intelligence and machine learning models on edge devices using containers.

Edge Analytics

Processing and analyzing data at the network edge using containerized analytics applications.

Edge Device Management

Tools and practices for managing containerized workloads on edge devices, ensuring consistent deployment and updates.

Edge Orchestration

Management and coordination of containerized applications across distributed edge locations.

Edge Security

Security measures and practices specific to containerized edge computing environments, protecting distributed workloads.

Edge Workload Scheduling

Techniques for efficiently distributing containerized workloads across edge devices, optimizing resource usage.

Edge-Cloud Syncing

Synchronization of data and state between edge containers and cloud-based systems, ensuring consistency.

Egress Gateway

Component controlling outbound traffic from a container cluster to external services, enhancing security and traffic management.

Egress Gateways

Service mesh components managing outbound traffic from the mesh to external services, providing fine-grained control.

Egress Traffic Control

Management and policies for outbound network traffic from containers, ensuring security and compliance.

Elastic APM

Application Performance Monitoring tool for containerized applications in the Elastic Stack.

Encrypted Secrets

Sensitive data stored in an encrypted form in container orchestration platforms, enhancing security.

End-to-End Testing

Comprehensive testing of containerized applications from start to finish, validating entire system functionality.

EndpointSlices

Kubernetes API resource providing a more scalable alternative to Endpoints for service discovery.

Environment Variables in Containers

Key-value pairs passed to containers at runtime, used for configuration and runtime behavior control.

Envoy Proxy

High-performance proxy often used in service mesh implementations for containerized environments.

Ephemeral Containers

Temporary containers used for troubleshooting or debugging in Kubernetes pods, without affecting the main containers.

Ephemeral Volumes

Short-lived storage volumes in Kubernetes that share the lifecycle of a pod, useful for temporary data storage.

Equal-Cost Multi-Path (ECMP)

Routing strategy for load balancing network traffic across multiple paths in container networks.

Etcd

Distributed key-value store that provides a reliable way to store data across a cluster of machines.

Event Sinks

Destinations for cluster-level events in container orchestration platforms, used for monitoring and alerting.

Event Sources

Components or services generating events in containerized environments, often used in event-driven architectures.

Event Sourcing

Pattern of storing changes to application state as a sequence of events, often used in microservices architectures.

Event Sourcing Pattern

Design pattern capturing all changes to application state as a sequence of events, useful in distributed systems.

Event Sourcing in Containers

Implementation of event sourcing pattern in containerized microservices architectures, ensuring data consistency.

Event-driven Architectures

Design approach where containerized services produce, detect, and react to events, enabling loose coupling and scalability.

Eviction Policies

Rules determining which pods to terminate when a node is under resource pressure in Kubernetes clusters.