Engineering Glossary

From fundamental principles to cutting-edge practices, this glossary covers the full spectrum of software engineering terminology.

DevOps
Cloud Computing
Git
Containerization & Orchestration

I/O Throughput

Measure of the amount of data processed by a system's input/output operations in a given amount of time.
DevOps

IAST

Interactive Application Security Testing; security testing methodology that analyzes code for security vulnerabilities while the app is run.
DevOps

IDE

Integrated Development Environment; software application that provides comprehensive facilities to computer programmers for software development.
DevOps

IIS Log Viewer

Tool for analyzing and troubleshooting logs from Microsoft Internet Information Services.
DevOps

IIS Server

Microsoft's web server for hosting websites, web applications, and services on Windows operating systems, offering various features and security options.
DevOps

IOPS (Input/Output Operations per Second)

Performance measurement for storage devices, indicating how many read/write operations can be performed in one second.
DevOps

IT Infrastructure

Composite hardware, software, network resources, and services required for the existence, operation, and management of an enterprise IT environment.
DevOps

IT Operations

Daily work of managing the IT infrastructure and systems that support an organization's business operations.
DevOps

IT Operations Management (ITOM)

Practices and processes for operating, administering, and maintaining IT infrastructure and services.
DevOps

ITSI

IT Service Intelligence; uses machine learning for monitoring, anomaly detection, and service health.
DevOps

IaC (Infrastructure as Code)

Infrastructure as Code; managing and provisioning infrastructure through code instead of manual processes.
DevOps

IaaS (Infrastructure-as-a-Service)

Infrastructure as a Service; cloud-computing service in which compute, storage, and networking resources are provided on-demand.
DevOps

Icinga

Open source monitoring system checking availability and performance of network resources.
DevOps

Identity and Access Management (IAM)

Framework of policies and technologies for ensuring that the right users have the appropriate access to resources.
DevOps

Improper Assets Management

Security issue where an organization fails to properly inventory, update, and manage its IT assets.
DevOps

Incident

Any unplanned interruption or reduction in quality of a service, requiring prompt response and resolution to minimize impact.
DevOps

Incident Management

Structured approach to responding to and resolving IT service disruptions, minimizing their impact on business operations.
DevOps

Incident Prozess

The Incident Prozess involves identifying, managing, and resolving unexpected disruptions to restore normal service, minimizing impact and preventing recurrence.
DevOps

Incident Response

Organized approach to addressing and managing the aftermath of a security breach or attack.
DevOps

Indicators of Compromise (IoC)

Pieces of forensic data that identify potentially malicious activity on a network or system.
DevOps

InfluxDB

Open-source time series database designed to handle high write and query loads, often used for monitoring and metrics.
DevOps

Information Security Management

Set of policies and procedures for systematically managing an organization's sensitive data.
DevOps

Infrastructure

Composite of all DevOps components that make up an organization's environment, including hardware, software, and networking.
DevOps

Infrastructure Drift

Unplanned changes to infrastructure over time, deviating from the desired state.
DevOps

Infrastructure Management (IM)

Process of managing essential operation components, such as policies, processes, equipment, data, human resources, and external contacts.
DevOps

Infrastructure Metrics

Measurements used to assess the performance, health, and efficiency of IT infrastructure components.
DevOps

Infrastructure Monitoring

Process of collecting and analyzing data from infrastructure to ensure optimal performance.
DevOps

Infrastructure Resilience

Ability of IT infrastructure to withstand and recover from disruptions and disasters.
DevOps

Infrastructure as Code (IaC)

Managing and provisioning infrastructure through code instead of manual processes. Enables version control, automation, and consistent environments.
DevOps

Infrastructure as Code (IaC) Framework

Set of tools and practices for managing infrastructure through machine-readable definition files.
DevOps

Infrastructure as Data

Approach to infrastructure management where the desired state is described as data, not procedural code.
DevOps

Infrastructure as Software

Treating infrastructure configuration and management as a software development problem.
DevOps

Infrastructure on Demand

Ability to provision and de-provision infrastructure resources as needed, often in cloud environments.
DevOps

Infrastructure-as-a-Service (IaaS)

Cloud computing model providing virtualized computing resources over the internet. Users can rent servers, storage, networks, and operating systems.
DevOps

Ingress Controller

Kubernetes resource managing external access to services in a cluster, typically HTTP.
DevOps

Injection

Security vulnerability where untrusted data is sent to an interpreter as part of a command or query.
DevOps

Insecure Deserialization

Security vulnerability occurring when untrusted data is used to abuse the logic of an application.
DevOps

Insecure Direct Object Reference (IDOR)

Security flaw allowing attackers to bypass authorization and access resources directly by modifying the value of a parameter.
DevOps

Instance

Single copy of a running computer program, often referring to a virtual server in cloud computing.
DevOps

Insufficient Logging & Monitoring

Security weakness where systems lack adequate logging and real-time monitoring, hindering threat detection and forensics.
DevOps

Integration Testing

Phase in software testing where individual modules are combined and tested as a group.
DevOps

Intelligent Automation

Use of AI and machine learning to automate complex business processes and decisions.
DevOps

Interactive Application Security Testing (IAST)

Security testing tool that combines static and dynamic testing methods to detect vulnerabilities in running applications.
DevOps

Internal Developer Platform (IDP)

Set of tools and practices that improve developer experience and productivity within an organization.
DevOps

Internal Threat Intelligence

Process of gathering, analyzing, and disseminating information about potential internal security threats.
DevOps

Inventory Hoarding

Excessive accumulation of IT resources, often in cloud environments, leading to waste and inefficiency.
DevOps

Ionic

Open-source SDK for developing hybrid mobile applications using web technologies.
DevOps

Issue Tracking

Process of recording and following the progress of problems or tasks in a project.
DevOps

Iterations

Fixed time periods in Agile development during which a team completes a set amount of work.
DevOps

JVM Heap

Portion of memory where the Java Virtual Machine stores objects, crucial for application performance and garbage collection processes.
DevOps

JVM Threads

Lightweight processes within the Java Virtual Machine that allow concurrent execution of tasks in Java applications.
DevOps

Jamstack

Web development architecture based on client-side JavaScript, reusable APIs, and prebuilt Markup.
DevOps

Jcloud

Java library providing a multi-cloud abstraction layer, simplifying cloud platform interactions.
DevOps

Jenkins

Open-source automation server that enables developers to build, test, and deploy their software reliably.
DevOps

Jenkins Job

Runnable task configured in Jenkins, defining a series of related steps to be executed.
DevOps

Jenkins Pipeline

Suite of plugins supporting implementation and integration of continuous delivery pipelines into Jenkins.
DevOps

Jest

JavaScript testing framework designed to ensure correctness of any JavaScript codebase.
DevOps

Jetpack Compose

Modern toolkit for building native Android UI, using a declarative and composable approach.
DevOps

Jira

Project management tool used for issue tracking, bug tracking, and agile project management.
DevOps

Juju

Open-source application modeling tool for deploying, configuring, scaling, and operating software.
DevOps

KISS (Keep it simple, stupid)

Design principle stating that systems perform best when kept simple rather than made complicated.
DevOps

Kafka

Distributed event streaming platform capable of handling trillions of events a day.
DevOps

Kaizen

Japanese business philosophy of continuous improvement of working practices and personal efficiency.
DevOps

Kanban

Visual system for managing work as it moves through a process, emphasizing continuous delivery.
DevOps

Kanban Board

Visual representation of work items as they progress through different stages of a process.
DevOps

Kata

Programming exercise aimed at honing coding skills through practice and repetition, often used in coding dojos and training sessions.
DevOps

Keystroke Loggers

Software or hardware that records keyboard inputs, often used maliciously to capture sensitive information.
DevOps

Kibana

Data visualization and exploration tool for Elasticsearch, allowing users to create interactive dashboards and analyze large volumes of data.
DevOps

Kickstart

Method of performing automatic installation and configuration of operating systems, particularly in Linux.
DevOps

Kubernetes

Open-source system for automating deployment, scaling, and management of containerized applications.
DevOps

Kubernetes (K8s)

Alternative abbreviation for Kubernetes, where 8 replaces the eight letters between K and s.
DevOps

Kubernetes (Ks)

Alternate abbreviation for Kubernetes, the open-source container orchestration platform for automating application deployment and scaling.
DevOps

Kubernetes Cronjobs

Kubernetes object for creating recurring scheduled tasks, allowing automated execution of jobs at specified intervals.
DevOps

Kubernetes Monitoring

Observing and tracking the health, performance, and resource usage of Kubernetes clusters and applications.
DevOps

Kubernetes Operator

Method of packaging, deploying, and managing a Kubernetes application using custom resources and controllers.
DevOps

Kubernetes Pod

Smallest deployable unit in Kubernetes, consisting of one or more containers sharing storage and network resources.
DevOps

Kubernetes QoS

Quality of Service classes in Kubernetes that determine how pods are scheduled and evicted based on resource requirements.
DevOps

Kubernetes Replica

Identical copy of a pod, used to ensure specified number of pod instances are running at any given time.
DevOps

Kubernetes Workloads

Objects in Kubernetes that manage a set of pods, such as Deployments, StatefulSets, and DaemonSets.
DevOps

Lack of Resources

Insufficient tools, infrastructure, skills, or personnel needed to implement and maintain efficient CI/CD pipelines and automation processes.
DevOps

Largest Contentful Paint (LCP)

Metric measuring the render time of the largest image or text block visible within the viewport.
DevOps

Lead Time

Time between the initiation and completion of a process, often used in software development to measure efficiency.
DevOps

Lead Time for Changes

Metric measuring the time it takes for a commit to be deployed to production, indicating the efficiency of the development process.
DevOps

Leaking API

API that unintentionally exposes sensitive data or functionality, potentially leading to security vulnerabilities and data breaches.
DevOps

Lean

Methodology aimed at maximizing customer value while minimizing waste, applicable to various industries including software development.
DevOps

Lean IT

Application of lean manufacturing principles to IT operations, focusing on eliminating waste and improving efficiency in IT processes.
DevOps

Legacy Application

Outdated computer system, programming language or application software that is still in use.
DevOps

Linux

Open-source, Unix-like operating system kernel that forms the basis of many popular distributions, known for its stability and flexibility.
DevOps

Linux Out of Memory Killer (OOM Killer)

Linux kernel process that terminates applications in low memory situations to prevent system crashes.
DevOps

Load Balancer

Device that distributes network or application traffic across multiple servers to ensure no single server bears too much demand.
DevOps

Load Balancing

Process of distributing network traffic across multiple servers to ensure no single server bears too much demand.
DevOps

Local File Inclusion (LFI)

Vulnerability allowing an attacker to include files on a server through the web browser.
DevOps

Log Aggregation

Process of collecting and centralizing log data from multiple sources into a single, searchable repository for analysis and monitoring.
DevOps

Log Analysis

Process of examining log files to identify events, patterns, or anomalies, crucial for troubleshooting and security monitoring.
DevOps

Log Drain

Process of forwarding log data from its origin to a centralized log management system.
DevOps

Log Every Change

Practice of recording all modifications made to a system or application, crucial for auditing and troubleshooting.
DevOps

Log File

Record of events occurring within an organization's systems and networks, crucial for troubleshooting and security analysis.
DevOps

Log Levels

Categories used to distinguish the importance and nature of logged messages, aiding in log analysis and troubleshooting.
DevOps

Log Management

Process of collecting, storing, analyzing, and disposing of log data generated by various IT systems and applications.
DevOps

Log Management Policy

Set of guidelines and procedures governing the collection, storage, analysis, and retention of log data within an organization.
DevOps
Git Pull --Rebase

Git Pull --Rebase

A variation of Git pull that fetches remote changes and rebases local commits on top of them instead of merging.
Git Push --Force-with-Lease

Git Push --Force-with-Lease

A safer alternative to force push, which only updates the branch if it hasn't been modified since your last fetch.
Git Range-diff

Git Range-diff

A command that compares the changes between two commit ranges, useful for reviewing rebased branches.
Git Read-tree

Git Read-tree

A low-level command that reads tree objects into the index, used in complex merging scenarios.
Git Reflog

Git Reflog

A log of all reference updates in a repository, useful for recovering lost commits or branches.
Git Reflogs

Git Reflogs

Same as Git Reflog, logs that record when the tips of branches and other references were updated in the repository.
Git Refs Storage

Git Refs Storage

The system Git uses to store references (like branches and tags) as files in the .git directory.
Git Refspec

Git Refspec

A string that specifies the mapping between remote and local references when fetching or pushing.
Git Remote Add

Git Remote Add

Adds a new remote repository to your local Git configuration, associating a name with a URL.
Git Remote Prune

Git Remote Prune

A command that removes remote-tracking branches that no longer exist on the remote repository.
Git Remote Remove

Git Remote Remove

Removes a remote repository from your local Git configuration, deleting its associated references.
Git Replace

Git Replace

A feature allowing one Git object to be transparently used in place of another, useful for history rewriting.
Git Rerere (Reuse Recorded Resolution)

Git Rerere (Reuse Recorded Resolution)

A feature that remembers how you resolved merge conflicts and automatically reapplies the resolution.
Git Reset

Git Reset

A command used to undo changes by moving the current branch head to a specific commit.
Git Reset --Hard

Git Reset --Hard

A Git reset option that updates the working directory and staging area to match the specified commit.
Git Reset --Soft

Git Reset --Soft

A Git reset option that moves the HEAD to a specified commit without changing the working directory or staging area.
Git Rev-list

Git Rev-list

A command that lists commit objects in reverse chronological order, often used as a basis for other commands.
Git Rev-parse

Git Rev-parse

A command used to parse Git revision syntax and return the corresponding object name.
Git Revert

Git Revert

A command that creates a new commit that undoes the changes made by a previous commit.
Git Rm

Git Rm

A command to remove files from both the working directory and the Git repository.
Git Shallow Clone

Git Shallow Clone

A clone that only fetches a limited number of commits, reducing download size and time for large repositories.
Git Shortlog

Git Shortlog

A command that summarizes git log output, typically used to create release announcements.
Git Signed Commits

Git Signed Commits

Commits that are cryptographically signed to verify the identity of the committer and ensure integrity.
Git Signed Tags

Git Signed Tags

Tags that are cryptographically signed to verify the identity of the tagger and ensure the tag's integrity.
Git Squash

Git Squash

The process of combining multiple commits into a single commit, often used to simplify history before merging.
Git Stash Apply

Git Stash Apply

A command that applies a stored stash to the working directory without removing it from the stash list.
Git Stash Pop

Git Stash Pop

A command that applies a stored stash to the working directory and removes it from the stash list.
Git Status

Git Status

A command that displays the state of the working directory and the staging area.
Git Submodule

Git Submodule

A repository embedded within another repository, allowing you to keep a Git repository as a subdirectory of another Git repository.
Git Submodule Foreach

Git Submodule Foreach

A command that executes a specified shell command for each initialized submodule in a Git repository.
Git Subtree

Git Subtree

A feature for managing nested repositories as subdirectories of a parent repository, an alternative to submodules.
Git Update-index

Git Update-index

A low-level Git command that manipulates the staging area, updating file information and preparing changes for commit.
Git Wire Protocol

Git Wire Protocol

The communication protocol used between Git clients and servers for efficient data transfer.
Git Worktree

Git Worktree

A feature allowing multiple working trees to be attached to the same repository, useful for working on different branches simultaneously.
Git Worktree Add

Git Worktree Add

Creates a new working tree associated with the repository, allowing work on multiple branches simultaneously.
Git Worktree List

Git Worktree List

A command to list details of each working tree associated with the repository, showing paths and branch information.
Git Write-tree

Git Write-tree

A low-level Git command that creates a tree object from the current index, representing a directory structure.
Git archive

Git archive

A Git command used to create an archive (zip or tar) of files from a specified commit, useful for creating release packages.
Git branch naming conventions

Git branch naming conventions

Agreed-upon patterns for naming branches to improve organization and clarity in collaborative projects.
Git cat-file

Git cat-file

A command to examine the contents and type of Git objects, useful for inspecting repository internals.
Git cherry-pick --continue

Git cherry-pick --continue

A command to resume the cherry-pick process after resolving conflicts in a paused cherry-pick operation.
Git config scopes (system, global, local)

Git config scopes (system, global, local)

Levels at which Git configuration can be set: system (all users), global (user), and local (repository).
Git count-objects -v

Git count-objects -v

A command providing detailed statistics about the number and size of objects in a Git repository.
Git credential helpers

Git credential helpers

Mechanisms to securely store and retrieve credentials for Git operations, reducing manual authentication.
Git diff drivers

Git diff drivers

Custom scripts that determine how Git should generate diffs for specific file types.
Git filter-repo

Git filter-repo

A versatile tool for rewriting Git repository history, offering more power and flexibility than git filter-branch.
Git gc aggressive

Git gc aggressive

A more thorough garbage collection process in Git, optimizing repository storage and performance.
Git hash-object

Git hash-object

A low-level Git command that computes the object ID (SHA-1 hash) for a given file or string, used in Git's internal storage.
Git hooks (client-side and server-side)

Git hooks (client-side and server-side)

Scripts triggered by specific events in Git workflows, used to automate tasks or enforce policies.
Git index (staging area)

Git index (staging area)

The intermediate area in Git where changes are prepared before committing, also known as the staging area.
Git loose objects

Git loose objects

Individual, uncompressed Git objects stored separately in the object database before being packed.
Git ls-tree

Git ls-tree

A command to list the contents of a tree object in Git, showing files and subdirectories.
Git merge drivers

Git merge drivers

Custom scripts defining how Git should handle merges for specific file types or patterns.
Git mktree

Git mktree

A low-level Git command that creates a tree object from a specific index or tree listing.
Git object types (blob, tree, commit, tag)

Git object types (blob, tree, commit, tag)

The four fundamental object types used by Git to store repository data and history.
Git pack-refs

Git pack-refs

A command to pack references into a single file for improved performance in repositories with many references.
Git packfiles

Git packfiles

Compressed files containing multiple Git objects, optimizing storage and transfer efficiency in repositories.
Git post-receive hooks (server-side)

Git post-receive hooks (server-side)

Server-side scripts that run after commits have been accepted, often used for notifications or deployments.
Git pre-receive hooks (server-side)

Git pre-receive hooks (server-side)

Server-side scripts that run before pushed commits are accepted, used to enforce policies or checks.
Git protocol v2

Git protocol v2

An improved version of the Git transfer protocol, offering better performance and feature negotiation.
Git rebase --onto

Git rebase --onto

A command to move a series of commits to a new base commit, useful for changing the parent of a branch.
Git reflog expire

Git reflog expire

A command to remove old entries from the reflog, useful for cleaning up Git history and freeing space.
Git repack

Git repack

A command to combine all loose objects in a repository into packfiles, improving storage efficiency.
Git reset (soft, mixed, hard)

Git reset (soft, mixed, hard)

Commands to undo changes in Git, with varying impacts on the working directory and staging area.
Git secret management

Git secret management

Techniques and tools for securely storing and accessing sensitive information in Git repositories.
Git show-ref

Git show-ref

A command that lists references in a Git repository along with their associated commit hashes.
Git sparse-checkout

Git sparse-checkout

A feature allowing users to check out only a subset of files from a repository, saving space and time.
Git verify-pack

Git verify-pack

A command to validate the contents of Git pack files, ensuring data integrity in the object database.
GitHub App

GitHub App

An application that can be installed directly on organizations and user accounts to extend GitHub's functionality.
GitHub Flavored Markdown

GitHub Flavored Markdown

A version of Markdown with additional features specifically supported on GitHub.
GitHub Importer

GitHub Importer

A tool for importing repositories to GitHub from other version control systems or source code hosts.
GitHub Issues

GitHub Issues

A feature in GitHub for tracking tasks, enhancements, and bugs for a project.
GitHub Jobs

GitHub Jobs

A platform for posting and finding software development jobs, integrated with GitHub profiles, that was discontinued in 2021.
GitHub Marketplace

GitHub Marketplace

A platform for developers to sell and buy integrations for GitHub, enhancing workflow and productivity.
GitHub Pages

GitHub Pages

A static site hosting service that takes files directly from a GitHub repository to publish websites.
GitHub Wiki

GitHub Wiki

A collaborative documentation feature in GitHub repositories, allowing easy creation and editing of project documentation.
GitHub flow

GitHub flow

A lightweight, branch-based workflow that supports teams and projects where deployments are made regularly.
GitLab flow

GitLab flow

A version control workflow that combines feature-driven development and feature branches with issue tracking.
Gitflow

Gitflow

Branching model for Git that defines a strict branching model designed around project releases.
Gitk (Git Repository Browser)

Gitk (Git Repository Browser)

A graphical interface for viewing Git repositories, providing a visual representation of commit history.
GraphQL

GraphQL

Query language for APIs and a runtime for executing those queries with existing data.
HEAD

HEAD

A pointer in Git that refers to the latest commit in the current checked-out branch.
Hello, World

Hello, World

A simple program often used as an introduction to a new programming language or environment, including Git tutorials.
Hotfix branching

Hotfix branching

A method for quickly patching production releases by branching directly from the main branch or a tag.
Index

Index

Also known as the staging area, where changes are prepared before committing in Git.
Issue templates

Issue templates

Predefined structures for creating new issues in Git repositories, ensuring consistent and complete information.
Jekyll

Jekyll

A static site generator often used with GitHub Pages to create websites from Markdown files in a Git repository.
Jekyll Theme Chooser

Jekyll Theme Chooser

A tool in GitHub Pages that allows users to easily select and apply pre-designed themes to their Jekyll sites.
LFS

LFS

Git Large File Storage, an extension for versioning large files in Git repositories.
Linguist

Linguist

A library used by GitHub to detect the programming languages used in repositories.
Markdown

Markdown

A lightweight markup language commonly used for documentation in Git repositories.
Master

Master

Formerly the default name for the primary branch in Git repositories, now often replaced by 'main'.
Merge

Merge

The process of combining changes from different branches into a single branch, integrating multiple lines of development.
OAuth app

OAuth app

An application that uses the OAuth protocol to access Git platform APIs on behalf of users.
OAuth token

OAuth token

A secure string used for authentication in Git operations, allowing access to resources without sharing passwords.
Origin

Origin

The default name for the remote repository from which a local repository was cloned.
Patch

Patch

A file describing changes between versions, used to share and apply modifications across different Git repositories.
Pull

Pull

A Git command that fetches changes from a remote repository and merges them into the current branch.
Pull Request

Pull Request

A method of submitting contributions to a Git project, proposing changes from a forked repository or branch.
Pull request templates

Pull request templates

Customizable files that automatically populate the body of new pull requests, guiding contributors.

3D Stacked Memory for Cloud Servers

High-density memory architecture using vertically stacked chips, enhancing performance and capacity in cloud server hardware.

5G Cloud

Cloud infrastructure optimized for 5G networks, supporting high-speed, low-latency services and applications.

5G Network Slicing

Technique to create multiple virtual networks on a shared physical 5G infrastructure, each optimized for specific use cases.

5G and Edge Computing

Integration of 5G networks with edge computing to enable low-latency, high-bandwidth applications closer to end-users.

6G Cloud Integration

Future convergence of 6G networks with cloud computing, promising ultra-high speeds and advanced capabilities.

ACID Compliance

Database transaction properties (Atomicity, Consistency, Isolation, Durability) ensuring data integrity in cloud environments.

AI Ethics Compliance Tools

Software ensuring AI systems adhere to ethical guidelines and regulations in cloud deployments.

AI Ethics and Bias Detection Tools

Software for identifying and mitigating ethical issues and biases in AI models deployed in cloud environments.

AI Ethics and Governance Tools

Solutions for managing ethical considerations and regulatory compliance in cloud-based AI systems.

AI Governance Frameworks

Structured approaches for managing AI development, deployment, and use in cloud environments.

AI Model Governance Platforms

Comprehensive solutions for managing, monitoring, and controlling AI models in cloud-based systems.

AI Model Interpretability Services

Cloud-based tools for explaining and understanding the decision-making processes of AI models.

AI Model Interpretability Tools

Software for analyzing and explaining AI model decisions, crucial for transparency in cloud AI services.

AI Model Marketplaces

Cloud platforms for discovering, sharing, and monetizing pre-trained AI models and algorithms.

AI Model Monitoring and Drift Detection

Tools for tracking AI model performance and identifying deviations from expected behavior in cloud environments.

AI Model Versioning and Governance

Systems for managing different versions of AI models and enforcing governance policies in cloud deployments.

AI-Assisted Coding Platforms

Cloud-based development environments that use AI to assist programmers in writing and optimizing code.

AI-Augmented Analytics

Integration of AI capabilities into data analytics processes in cloud environments for enhanced insights.

AI-Driven Capacity Planning

Use of AI algorithms to predict and optimize resource allocation in cloud infrastructures.

AI-Driven Cloud Optimization

Application of AI techniques to improve efficiency, performance, and cost-effectiveness of cloud resources.

AI-Driven Cloud Resource Allocation

Automated distribution of cloud resources using AI to optimize performance and cost-efficiency.

AI-Driven Cloud Service Composition

AI-based automation of cloud service selection and integration for complex workflows.

AI-Driven Code Generation

Automated creation of source code using AI models, often integrated into cloud development platforms.

AI-Driven Data Classification

Automated categorization and labeling of data using AI algorithms in cloud storage and processing systems.

AI-Driven Network Optimization

Use of AI to improve network performance, efficiency, and security in cloud environments.

AI-Driven Resource Allocation

Intelligent distribution of computing resources in cloud environments using AI algorithms.

AI-Driven Security Information and Event Management (SIEM)

Enhanced SIEM systems using AI for improved threat detection and response in cloud environments.

AI-Driven Threat Detection

Use of AI algorithms to identify and analyze potential security threats in cloud systems.

AI-Driven Threat Hunting

Proactive search for hidden threats in cloud environments using AI-powered analytics and automation.

AI-Optimized Cloud Hardware

Cloud infrastructure components designed or configured to enhance AI workload performance.

AI-Optimized Databases

Database systems tailored for AI workloads, often featuring in-memory processing and distributed architectures.

AI-Powered Anomaly Detection

Use of AI algorithms to identify unusual patterns or behaviors in cloud systems and data.

AI-Powered Integration

Intelligent automation of data and application integration processes in cloud environments using AI.

AI-as-a-Service

Cloud-based offering of AI capabilities, allowing businesses to leverage AI without extensive in-house expertise.

AI-as-a-Service (AIaaS)

Cloud-based AI capabilities offered as a service, enabling easy integration of AI into applications.

AIOps

Application of AI for automating and enhancing IT operations management in cloud environments.

AIOps Platforms

Integrated solutions leveraging AI for automated monitoring, analysis, and management of cloud IT operations.

AIOps for Predictive Maintenance

Use of AI-driven analytics to forecast and prevent system failures in cloud infrastructure.

API Security Gateway

Service that protects APIs in cloud environments by managing access, monitoring traffic, and preventing attacks.

API Security Gateways

Dedicated services for securing and managing APIs in cloud environments, including access control and threat protection.

API-First Development

Design approach prioritizing API creation before implementation, common in cloud-native application development.

API-Led Connectivity

Integration strategy using purpose-built APIs to connect data, devices, and applications in cloud ecosystems.

AR Cloud

Persistent 3D digital content overlaid on the physical world, accessible via cloud infrastructure for augmented reality applications.

AR/VR Analytics

Cloud-based tools for analyzing user behavior and performance in augmented and virtual reality environments.

AR/VR Collaboration Platforms

Cloud-hosted services enabling multi-user interaction in shared augmented or virtual reality spaces.

AR/VR Content Delivery Network

Specialized CDN optimized for delivering AR/VR content with low latency and high bandwidth.

AR/VR Development Platforms

Cloud-based tools and services for creating, testing, and deploying augmented and virtual reality applications.

ARM Templates (Azure)

JSON-based files defining infrastructure and configuration for Azure resource deployment.

Adaptive User Interfaces for Cloud Services

Dynamic UIs that adjust based on user behavior, device capabilities, and context in cloud applications.

Adversarial Machine Learning Detection

Techniques to identify and mitigate attacks on ML models in cloud-based AI systems.

Alerting and Notification

Systems for informing administrators or users about important events or issues in cloud environments.

Algorithmic Auditing

Process of examining AI algorithms for bias, errors, or unintended consequences in cloud-based systems.

Ambient Computing Interfaces for Cloud

Seamless, context-aware interaction methods for accessing cloud services in IoT environments.

Anomaly Detection Systems

Tools for identifying unusual patterns or behaviors in cloud systems, often using machine learning techniques.

Application-Aware Networking

Network management approach that optimizes performance based on specific application requirements in cloud environments.

Approximate Query Processing

Technique for quickly estimating query results in large-scale cloud databases, trading accuracy for speed.

Archive Storage (e.g., Amazon Glacier, Azure Archive Storage)

Low-cost cloud storage for infrequently accessed data with longer retrieval times, e.g., Amazon Glacier, Azure Archive Storage.

Artifact Repository

Cloud-based storage for software build outputs, dependencies, and related metadata.

Artificial General Intelligence (AGI) as a Service

Hypothetical cloud offering of human-level AI capabilities across various domains.

Artificial General Intelligence Research Platforms

Cloud-based environments for developing and testing advanced AI systems approaching human-level intelligence.

Audit Logging

Systematic recording of actions and events in cloud systems for security and compliance purposes.

Audit Trails

Chronological records of system activities for reconstructing and examining the sequence of events in cloud environments.

Augmented Analytics

Integration of machine learning and natural language processing in cloud-based data analytics workflows.

Augmented Reality (AR) Cloud

Shared, persistent digital content overlaid on the physical world, accessible via cloud infrastructure.

Augmented Reality Cloud Interfaces

Cloud-based systems for managing and delivering AR content and experiences, enabling scalable AR applications.

Augmented Reality Cloud Rendering

Cloud-powered generation of AR graphics and content, offloading processing from end-user devices.

Auto Scaling Groups

Collections of EC2 instances that automatically adjust capacity based on defined conditions.

Auto-scaling

Automatic adjustment of cloud resources to match workload demands, ensuring optimal performance and cost-efficiency.

AutoML

Automated machine learning processes for model selection, hyperparameter tuning, and feature engineering in cloud environments.

AutoML in the Cloud

Cloud-based services automating the machine learning pipeline from data preparation to model deployment and monitoring.

Automated AI Pipeline Optimization

AI-driven tools for improving efficiency and performance of machine learning workflows in the cloud.

Automated Cloud Governance Enforcement

Systems that automatically implement and maintain cloud resource policies and compliance.

Automated Compliance Monitoring

Continuous, AI-driven assessment of cloud systems against regulatory and security standards.

Automated Data Discovery

AI-powered tools for identifying, categorizing, and mapping data assets in cloud environments.

Automated Data Governance

AI-driven systems for managing data quality, security, and compliance in cloud environments.

Automated Data Wrangling Services

Cloud-based tools using AI to clean, transform, and prepare data for analysis, streamlining data preparation processes.

Automated Feature Engineering

AI-powered generation and selection of features for machine learning models in cloud environments.

Automated Incident Response Orchestration

AI-driven coordination of security incident detection and resolution in cloud systems, automating response workflows.

Automated Machine Learning (AutoML)

Cloud services that automate the process of creating and optimizing machine learning models, from data prep to deployment.

Automated Machine Learning (AutoML) Platforms

Cloud-based systems that automate the end-to-end machine learning model development process, including feature engineering and model selection.

Automated Penetration Testing

AI-driven tools for simulating cyberattacks to identify vulnerabilities in cloud systems and applications.

Automated Threat Modeling

AI-powered analysis of cloud architectures to identify potential security risks and attack vectors.

Autonomous Systems in the Cloud

Self-managing, self-healing cloud services requiring minimal human intervention, leveraging AI for operations.

Azure Edge Zones

Ultra-low latency edge computing extensions of Azure for 5G networks, bringing cloud resources closer to users.

Azure Policy

Service for creating, assigning, and managing policies to control Azure resources and ensure compliance.

B2B Integration Platforms

Cloud-based services facilitating data exchange and process integration between business partners.

Backend for Frontend (BFF) Pattern

Architectural approach creating backend services tailored to specific frontend application needs in cloud environments.

Bare Metal Server

Physical server dedicated to a single tenant, offering direct hardware access in cloud environments.

Bare Metal Servers

Dedicated physical servers without virtualization, offered as a cloud service for high-performance workloads.

Batch Processing (e.g., AWS Batch, Azure Batch)

Execution of series of jobs without user interaction, often for large-scale data processing in the cloud (e.g., AWS Batch, Azure Batch).

Big Data Clusters

Distributed computing environments for processing and analyzing massive datasets in the cloud.

Billing Dashboard

Interface for monitoring and managing cloud service usage and costs, providing detailed breakdowns and forecasts.

Biocomputing in the Cloud

Use of cloud resources for computational biology and genomics research, enabling large-scale analysis and modeling.

Biodiversity Impact Assessment for Cloud Facilities

Evaluation of cloud data center effects on local ecosystems and wildlife to ensure sustainable operations.

Block Storage

Cloud storage that provides fixed-size raw storage volumes, typically used for databases or file systems.

Block Storage (e.g., Amazon EBS, Azure Disk Storage)

Cloud services providing persistent block-level storage volumes for use with compute instances.

Blockchain Analytics

Cloud-based tools for analyzing and visualizing blockchain data and transactions, offering insights into network activity.

Blockchain Databases

Distributed databases using blockchain technology for enhanced security and immutability in cloud environments.

Blockchain Governance Tools

Software for managing and enforcing rules, permissions, and consensus mechanisms in blockchain networks deployed on cloud platforms.

Blockchain Integration Services

Cloud-based solutions for connecting blockchain networks with existing enterprise systems and applications.

Scheduling Framework

Kubernetes component allowing plugins to customize the scheduling process without changing the core scheduler code.

Scheduling Plugins

Modular components in Kubernetes scheduler implementing specific scheduling behaviors and policies.

Scheduling Profiles

Configurations defining sets of scheduling plugins to be used for different scheduling scenarios in Kubernetes.

Seccomp BPF

Use of Berkeley Packet Filter programs to define fine-grained seccomp profiles for container security.

Seccomp Profiles

Security profiles defining allowed system calls for containers, enhancing isolation and reducing attack surface.

Secret

Kubernetes object for storing and managing sensitive information such as passwords, tokens, or keys.

Secrets Management

Process of securely storing, distributing, and rotating sensitive data in containerized environments.

Secure Computing Mode (seccomp)

Linux kernel feature limiting the system calls a process can make, often used to secure containers.

Secure Supply Chain

Practices ensuring the integrity and security of container images and their dependencies throughout the development lifecycle.

Security Context Constraint

OpenShift object defining a set of conditions that a pod must run with to be accepted into the system.

Security Context Constraints

OpenShift feature for fine-grained control over the actions containers can perform and the resources they can access.

Security Scanning in CI Pipeline

Integration of vulnerability and compliance scans into the continuous integration process for container images.

Serverless Frameworks

Tools and platforms for building and deploying serverless applications on container orchestration systems.

Serverless Observability

Techniques and tools for monitoring, tracing, and debugging serverless functions and applications.

Serverless Patterns

Architectural patterns for designing and implementing serverless applications in containerized environments.

Serverless Security

Practices and tools for securing serverless functions and applications in container-based infrastructures.

Serverless Workflows

Orchestration of multiple serverless functions to create complex, event-driven applications.

Service

Kubernetes abstraction defining a logical set of pods and a policy by which to access them.

Service Account Token Volume Projection

Kubernetes feature for securely delivering service account tokens to pods, enhancing security.

Service Account Tokens

Credentials automatically generated for pods to authenticate with the Kubernetes API server.

Service Discovery Pattern

Technique allowing services to locate and communicate with each other dynamically in containerized environments.

Service Mesh Control Plane

Component of a service mesh responsible for managing and configuring the data plane proxies.

Service Mesh Data Plane

Component of a service mesh consisting of proxies that intercept and control service-to-service communication.

Service Mesh Interface (SMI)

Specification defining a set of common APIs for service meshes on Kubernetes, promoting interoperability.

Service Mesh Pattern

Architectural pattern providing a dedicated infrastructure layer for handling service-to-service communication.

Service Mesh Performance (SMP)

Standard for measuring and characterizing the performance of service mesh deployments, aiding in optimization.

Service Monitors

Custom resources in Prometheus Operator for declaratively defining how services should be monitored.

Service Networking

Mechanisms and configurations for enabling network communication between services in container orchestration platforms.

Service Topology

Kubernetes feature allowing services to route traffic based on node topology for improved performance.

Service-to-Service Authentication

Process of verifying the identity of services communicating with each other in a containerized environment.

ServiceAccount

Kubernetes object providing an identity for processes running in a pod, used for authentication and authorization.

Sharding Pattern for Data Partitioning

Technique of dividing data across multiple database instances in containerized environments.

Sidecar Containers

Additional containers in a pod that enhance or extend the functionality of the main container.

Sidecar Pattern

Design pattern where a sidecar container is deployed alongside the main application container to provide supporting features.

Sidecar Proxy

Proxy container deployed alongside application containers to handle network traffic and implement service mesh functionality.

Sidecars for Service Mesh

Use of sidecar proxies to implement service mesh features like traffic management and security in Kubernetes.

SigNoz

Open-source application performance monitoring and observability platform for microservices and Kubernetes environments.

Skaffold

Tool facilitating continuous development for Kubernetes applications, handling building, pushing, and deploying application code.

Skaffold for Local Kubernetes Development

Use of Skaffold to streamline the development workflow for Kubernetes applications in local environments.

Snyk Container Security

Platform providing vulnerability scanning and security management for container images and Kubernetes deployments.

Software-Defined Networking (SDN)

Approach to network management enabling dynamic, programmatically efficient network configuration in container environments.

Source-to-Image (S2I)

Tool and workflow for building reproducible container images from source code, simplifying the build process.

Spinnaker

Open-source, multi-cloud continuous delivery platform for releasing software changes with high velocity and confidence.

Splunk for Containers

Integration of Splunk's data platform with containerized environments for logging, monitoring, and analysis.

StackRox Kubernetes Security Platform

Security platform providing vulnerability management, compliance, and runtime protection for Kubernetes.

Stateful Applications in Containers

Containerized applications that maintain data or state, requiring special considerations for persistence and scaling.

StatefulSet

Kubernetes workload API object used to manage stateful applications, providing unique network identities and stable storage.

StatefulSet Patterns

Design patterns for deploying and managing stateful applications in Kubernetes using StatefulSets.

Static Pods

Pods managed directly by the kubelet on a specific node, without the API server observing them.

Static Provisioning

Process of pre-creating storage resources in Kubernetes before they are claimed by persistent volume claims.

Static Token File

File-based method for providing authentication tokens to the Kubernetes API server, useful for bootstrap authentication.

Status Subresource

Kubernetes API feature allowing updates to an object's status without modifying its spec, enabling more granular updates.

Storage Capacity Tracking

Kubernetes feature for making scheduling decisions based on the available storage capacity of nodes.

Storage Classes

Kubernetes objects defining different classes of storage with varying performance characteristics or policies.

StorageClass

Kubernetes object describing the "classes" of storage offered by the administrator, used for dynamic provisioning.

StorageOS

Software-defined storage for cloud-native applications, providing persistent storage for containers.

Strangler Fig Pattern for Modernization

Incremental approach to modernizing legacy applications by gradually replacing components with microservices.

Streaming Protocols

Network protocols optimized for real-time data transmission in containerized environments.

SubPath

Kubernetes volume feature allowing mounting a specific directory of a volume instead of its root.

Submariner for Multi-cluster Networking

Open-source project enabling direct networking between pods and services across Kubernetes clusters.

Subresources

Kubernetes API feature representing sub-components of a resource, allowing more granular access control and operations.

SuperEdge

Open-source container management system for edge computing, extending Kubernetes to manage edge nodes efficiently.

Sysdig Secure for Runtime Protection

Security platform providing real-time threat detection and response for containerized environments.

TUF (The Update Framework) for Secure Updates

Specification for securing software update systems, applicable to container image distribution.

Taints

Kubernetes node attributes that repel certain pods from scheduling unless they have matching tolerations.

Taints and Tolerations

Kubernetes mechanism for controlling which pods can be scheduled on specific nodes, enabling node specialization.

Tekton

Cloud-native CI/CD framework for Kubernetes, providing custom resources for defining pipelines and tasks.

Tekton Pipelines

Kubernetes-native CI/CD solution using custom resources to define pipelines as a series of tasks.

Telepresence for Local Development

Tool allowing developers to run a single service locally while connecting to a remote Kubernetes cluster.

Tenable.io Container Security

Platform providing vulnerability management and compliance monitoring for container images and registries.

Tenant Isolation

Techniques for separating and securing resources belonging to different users or groups in multi-tenant Kubernetes clusters.

Terrascan for Kubernetes Security Scanning

Open-source tool for static code analysis of Infrastructure as Code, including Kubernetes manifests.

Thanos

Open-source project extending Prometheus for long-term storage and global query view in large-scale deployments.

Thanos for Long-Term Storage

Use of Thanos to provide durable storage and global query capability for Prometheus metrics.

Throttling Pattern

Technique for limiting the rate at which a containerized service processes requests to prevent overload.

Tilt for Microservices Development

Development environment as code for teams building Kubernetes microservices, streamlining local development.

Timeout Configuration

Settings controlling the maximum duration for various operations in containerized applications and infrastructure.

Tolerations

Kubernetes pod specifications that allow (but do not require) pods to be scheduled on nodes with matching taints.

Topology Manager

Kubernetes feature coordinating resource allocation decisions to provide topology-aligned resource allocations.

Traffic Mirroring

Technique of duplicating live traffic to a separate service instance for testing or debugging purposes.

Traffic Shifting

Gradual redirection of traffic from one version of a service to another, often used in canary deployments.

Traffic Splitting

Distribution of incoming requests across multiple versions of a service, enabling advanced deployment strategies.

Trivy for Vulnerability Scanning

Open-source security scanner for containers and other artifacts, finding vulnerabilities and misconfigurations.

Twelve-Factor App Methodology

Set of best practices for building software-as-a-service apps that can be easily deployed to the cloud.

Twistlock

Container security platform providing vulnerability management, compliance, and runtime protection (now part of Prisma Cloud).

Twistlock (now Prisma Cloud)

Comprehensive cloud-native security platform for containers, serverless, and cloud environments.

Underlay Networks

Physical network infrastructure upon which overlay networks for container communication are built.

Unikernels as Container Alternatives

Specialized, single-purpose machine images offering potential advantages in size and security over containers.

Union File System

Filesystem service for Linux allowing files and directories of separate filesystems to be overlaid, forming a single coherent filesystem.

User Impersonation

Kubernetes feature allowing a user to act as another user, useful for debugging and testing access controls.

User Namespaces

Linux kernel feature providing per-process isolated instances of user and group ID number spaces.

VXLAN

Network virtualization technology used in container networking for creating overlay networks.

VXLAN Overlay Networks

Virtual networks using VXLAN encapsulation to enable container communication across hosts.

Valet Key Pattern for Secure Resource Access

Design pattern for providing clients with restricted direct access to a specific resource or service.

Validating Webhooks

Admission controller webhooks in Kubernetes that validate resource requests without modifying them.

Validation Webhooks

Kubernetes admission control mechanism for validating API requests against custom logic before persistence.

Velero for Backup and Restore

Open-source tool for backing up and restoring Kubernetes cluster resources and persistent volumes.

Version Skew Policy

Guidelines defining supported version differences between Kubernetes components to ensure compatibility.

Vertical Pod Autoscaler

Kubernetes component that automatically adjusts the CPU and memory reservations for pods to optimize resource utilization.

Vertical Pod Autoscaler Metrics

Resource utilization data used by VPA to make decisions on adjusting pod resource allocations.