Engineering Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.

DevOps
Git
Cloud Computing
Containerization & Orchestration

Hybrid Cloud

Computing environment that uses a mix of on-premises, private cloud and third-party, public cloud services.
DevOps

Hypothesis-Driven Development

Approach where features are treated as experiments to validate business outcomes.
DevOps

I/O Throughput

Measure of the amount of data processed by a system's input/output operations in a given amount of time.
DevOps

IAST

Interactive Application Security Testing; security testing methodology that analyzes code for security vulnerabilities while the app is run.
DevOps

IDE

Integrated Development Environment; software application that provides comprehensive facilities to computer programmers for software development.
DevOps

IIS Log Viewer

Tool for analyzing and troubleshooting logs from Microsoft Internet Information Services.
DevOps

IIS Server

Microsoft's web server for hosting websites, web applications, and services on Windows operating systems, offering various features and security options.
DevOps

IOPS (Input/Output Operations per Second)

Performance measurement for storage devices, indicating how many read/write operations can be performed in one second.
DevOps

IT Infrastructure

Composite hardware, software, network resources, and services required for the existence, operation, and management of an enterprise IT environment.
DevOps

IT Operations

Daily work of managing the IT infrastructure and systems that support an organization's business operations.
DevOps

IT Operations Management (ITOM)

Practices and processes for operating, administering, and maintaining IT infrastructure and services.
DevOps

ITSI

IT Service Intelligence; uses machine learning for monitoring, anomaly detection, and service health.
DevOps

IaC (Infrastructure as Code)

Infrastructure as Code; managing and provisioning infrastructure through code instead of manual processes.
DevOps

IaaS (Infrastructure-as-a-Service)

Infrastructure as a Service; cloud-computing service in which compute, storage, and networking resources are provided on-demand.
DevOps

Icinga

Open source monitoring system checking availability and performance of network resources.
DevOps

Identity and Access Management (IAM)

Framework of policies and technologies for ensuring that the right users have the appropriate access to resources.
DevOps

Improper Assets Management

Security issue where an organization fails to properly inventory, update, and manage its IT assets.
DevOps

Incident

Any unplanned interruption or reduction in quality of a service, requiring prompt response and resolution to minimize impact.
DevOps

Incident Management

Structured approach to responding to and resolving IT service disruptions, minimizing their impact on business operations.
DevOps

Incident Prozess

The Incident Prozess involves identifying, managing, and resolving unexpected disruptions to restore normal service, minimizing impact and preventing recurrence.
DevOps

Incident Response

Organized approach to addressing and managing the aftermath of a security breach or attack.
DevOps

Indicators of Compromise (IoC)

Pieces of forensic data that identify potentially malicious activity on a network or system.
DevOps

InfluxDB

Open-source time series database designed to handle high write and query loads, often used for monitoring and metrics.
DevOps

Information Security Management

Set of policies and procedures for systematically managing an organization's sensitive data.
DevOps

Infrastructure

Composite of all DevOps components that make up an organization's environment, including hardware, software, and networking.
DevOps

Infrastructure Drift

Unplanned changes to infrastructure over time, deviating from the desired state.
DevOps

Infrastructure Management (IM)

Process of managing essential operation components, such as policies, processes, equipment, data, human resources, and external contacts.
DevOps

Infrastructure Metrics

Measurements used to assess the performance, health, and efficiency of IT infrastructure components.
DevOps

Infrastructure Monitoring

Process of collecting and analyzing data from infrastructure to ensure optimal performance.
DevOps

Infrastructure Resilience

Ability of IT infrastructure to withstand and recover from disruptions and disasters.
DevOps

Infrastructure as Code (IaC)

Managing and provisioning infrastructure through code instead of manual processes. Enables version control, automation, and consistent environments.
DevOps

Infrastructure as Code (IaC) Framework

Set of tools and practices for managing infrastructure through machine-readable definition files.
DevOps

Infrastructure as Data

Approach to infrastructure management where the desired state is described as data, not procedural code.
DevOps

Infrastructure as Software

Treating infrastructure configuration and management as a software development problem.
DevOps

Infrastructure on Demand

Ability to provision and de-provision infrastructure resources as needed, often in cloud environments.
DevOps

Infrastructure-as-a-Service (IaaS)

Cloud computing model providing virtualized computing resources over the internet. Users can rent servers, storage, networks, and operating systems.
DevOps

Ingress Controller

Kubernetes resource managing external access to services in a cluster, typically HTTP.
DevOps

Injection

Security vulnerability where untrusted data is sent to an interpreter as part of a command or query.
DevOps

Inner Loop vs Outer Loop

Inner loop is local development cycle; outer loop involves CI/CD processes for team collaboration and deployment.
DevOps

Insecure Deserialization

Security vulnerability occurring when untrusted data is used to abuse the logic of an application.
DevOps

Insecure Direct Object Reference (IDOR)

Security flaw allowing attackers to bypass authorization and access resources directly by modifying the value of a parameter.
DevOps

Instance

Single copy of a running computer program, often referring to a virtual server in cloud computing.
DevOps

Insufficient Logging & Monitoring

Security weakness where systems lack adequate logging and real-time monitoring, hindering threat detection and forensics.
DevOps

Integration Testing

Phase in software testing where individual modules are combined and tested as a group.
DevOps

Intelligent Automation

Use of AI and machine learning to automate complex business processes and decisions.
DevOps

Interactive Application Security Testing (IAST)

Security testing tool that combines static and dynamic testing methods to detect vulnerabilities in running applications.
DevOps

Internal Developer Platform (IDP)

Set of tools and practices that improve developer experience and productivity within an organization.
DevOps

Internal Threat Intelligence

Process of gathering, analyzing, and disseminating information about potential internal security threats.
DevOps

Inventory Hoarding

Excessive accumulation of IT resources, often in cloud environments, leading to waste and inefficiency.
DevOps

Ionic

Open-source SDK for developing hybrid mobile applications using web technologies.
DevOps

Issue Tracking

Process of recording and following the progress of problems or tasks in a project.
DevOps

Iterations

Fixed time periods in Agile development during which a team completes a set amount of work.
DevOps

JVM Heap

Portion of memory where the Java Virtual Machine stores objects, crucial for application performance and garbage collection processes.
DevOps

JVM Threads

Lightweight processes within the Java Virtual Machine that allow concurrent execution of tasks in Java applications.
DevOps

Jamstack

Web development architecture based on client-side JavaScript, reusable APIs, and prebuilt Markup.
DevOps

Jcloud

Java library providing a multi-cloud abstraction layer, simplifying cloud platform interactions.
DevOps

Jenkins

Open-source automation server that enables developers to build, test, and deploy their software reliably.
DevOps

Jenkins Job

Runnable task configured in Jenkins, defining a series of related steps to be executed.
DevOps

Jenkins Pipeline

Suite of plugins supporting implementation and integration of continuous delivery pipelines into Jenkins.
DevOps

Jest

JavaScript testing framework designed to ensure correctness of any JavaScript codebase.
DevOps

Jetpack Compose

Modern toolkit for building native Android UI, using a declarative and composable approach.
DevOps

Jira

Project management tool used for issue tracking, bug tracking, and agile project management.
DevOps

Juju

Open-source application modeling tool for deploying, configuring, scaling, and operating software.
DevOps

KISS (Keep it simple, stupid)

Design principle stating that systems perform best when kept simple rather than made complicated.
DevOps

Kafka

Distributed event streaming platform capable of handling trillions of events a day.
DevOps

Kaizen

Japanese business philosophy of continuous improvement of working practices and personal efficiency.
DevOps

Kanban

Visual system for managing work as it moves through a process, emphasizing continuous delivery.
DevOps

Kanban Board

Visual representation of work items as they progress through different stages of a process.
DevOps

Kata

Programming exercise aimed at honing coding skills through practice and repetition, often used in coding dojos and training sessions.
DevOps

Keystroke Loggers

Software or hardware that records keyboard inputs, often used maliciously to capture sensitive information.
DevOps

Kibana

Data visualization and exploration tool for Elasticsearch, allowing users to create interactive dashboards and analyze large volumes of data.
DevOps

Kickstart

Method of performing automatic installation and configuration of operating systems, particularly in Linux.
DevOps

Kubernetes

Open-source system for automating deployment, scaling, and management of containerized applications.
DevOps

Kubernetes (K8s)

Alternative abbreviation for Kubernetes, where 8 replaces the eight letters between K and s.
DevOps

Kubernetes (Ks)

Alternate abbreviation for Kubernetes, the open-source container orchestration platform for automating application deployment and scaling.
DevOps

Kubernetes Cronjobs

Kubernetes object for creating recurring scheduled tasks, allowing automated execution of jobs at specified intervals.
DevOps

Kubernetes Monitoring

Observing and tracking the health, performance, and resource usage of Kubernetes clusters and applications.
DevOps

Kubernetes Operator

Method of packaging, deploying, and managing a Kubernetes application using custom resources and controllers.
DevOps

Kubernetes Pod

Smallest deployable unit in Kubernetes, consisting of one or more containers sharing storage and network resources.
DevOps

Kubernetes QoS

Quality of Service classes in Kubernetes that determine how pods are scheduled and evicted based on resource requirements.
DevOps

Kubernetes Replica

Identical copy of a pod, used to ensure specified number of pod instances are running at any given time.
DevOps

Kubernetes Workloads

Objects in Kubernetes that manage a set of pods, such as Deployments, StatefulSets, and DaemonSets.
DevOps

Lack of Resources

Insufficient tools, infrastructure, skills, or personnel needed to implement and maintain efficient CI/CD pipelines and automation processes.
DevOps

Largest Contentful Paint (LCP)

Metric measuring the render time of the largest image or text block visible within the viewport.
DevOps

Lead Time

Time between the initiation and completion of a process, often used in software development to measure efficiency.
DevOps

Lead Time for Changes

Metric measuring the time it takes for a commit to be deployed to production, indicating the efficiency of the development process.
DevOps

Leaking API

API that unintentionally exposes sensitive data or functionality, potentially leading to security vulnerabilities and data breaches.
DevOps

Lean

Methodology aimed at maximizing customer value while minimizing waste, applicable to various industries including software development.
DevOps

Lean IT

Application of lean manufacturing principles to IT operations, focusing on eliminating waste and improving efficiency in IT processes.
DevOps

Legacy Application

Outdated computer system, programming language or application software that is still in use.
DevOps

Linux

Open-source, Unix-like operating system kernel that forms the basis of many popular distributions, known for its stability and flexibility.
DevOps

Linux Out of Memory Killer (OOM Killer)

Linux kernel process that terminates applications in low memory situations to prevent system crashes.
DevOps

Load Balancer

Device that distributes network or application traffic across multiple servers to ensure no single server bears too much demand.
DevOps

Load Balancing

Process of distributing network traffic across multiple servers to ensure no single server bears too much demand.
DevOps

Local File Inclusion (LFI)

Vulnerability allowing an attacker to include files on a server through the web browser.
DevOps

Log Aggregation

Process of collecting and centralizing log data from multiple sources into a single, searchable repository for analysis and monitoring.
DevOps

Log Analysis

Process of examining log files to identify events, patterns, or anomalies, crucial for troubleshooting and security monitoring.
DevOps

Log Drain

Process of forwarding log data from its origin to a centralized log management system.
DevOps

Log Every Change

Practice of recording all modifications made to a system or application, crucial for auditing and troubleshooting.
DevOps

Log File

Record of events occurring within an organization's systems and networks, crucial for troubleshooting and security analysis.
DevOps
identicon

identicon

A visual representation of a hash value, often used as a default avatar in Git platforms.
identity provider

identity provider

A service that creates, maintains, and manages identity information for users, often integrated with Git platforms.
index entry

index entry

A record in Git's index file representing the state of a file in the repository.
integration

integration

A connection between Git and other tools or services to enhance functionality and workflow.
key fingerprint

key fingerprint

A short sequence of bytes used to identify a longer public key in Git's GPG signing process.
keychain

keychain

A secure storage system for passwords and keys, often integrated with Git clients for credential management.
keyword

keyword

A reserved word in Git commands or configurations with a specific meaning or function.
label

label

A way to categorize and organize issues and pull requests in GitHub repositories.
license

license

A document in a Git repository specifying how the project can be used, modified, and distributed.
line comment

line comment

A feature in Git platforms allowing users to comment on specific lines of code in pull requests or commits.
line ending

line ending

Characters marking the end of a line, which can cause issues in Git when collaborating across different operating systems.
locked personal account

locked personal account

A GitHub account that has been restricted due to a violation of terms of service or suspicious activity.
main

main

The default name for the primary branch in many Git repositories, replacing 'master' in recent conventions.
management console

management console

An administrative interface for managing Git hosting services, often used in enterprise environments.
markup

markup

A system of annotation used to format text, often used in Git documentation and comments.
members graph

members graph

A visual representation of an organization's membership on Git hosting platforms.
mention

mention

A way to notify a user on Git platforms by using the @ symbol followed by their username.
merge conflict

merge conflict

A situation in Git where incompatible changes have been made to the same part of a file, requiring manual resolution.
milestone

milestone

A way to track progress on groups of issues or pull requests in GitHub projects.
mirror

mirror

A complete copy of a repository, including all branches and history, often used for backup or as a full replica.
nested team

nested team

A team within a GitHub organization that is a subset of a larger team, inheriting its permissions.
network graph

network graph

A visual representation of the commit history and branch structure of a Git repository.
news feed

news feed

A personalized list of recent activity on Git platforms, showing updates from followed users and repositories.
non-fast-forward

non-fast-forward

A Git push that introduces new commits to the remote branch that aren't direct descendants of the current remote HEAD.
notification

notification

An alert system on Git platforms to inform users about relevant activities and mentions.
object

object

A fundamental unit in Git's data model, representing content, commits, trees, or tags, identified by a unique SHA-1 hash.
object database

object database

The storage system in Git that contains all versions of project files and metadata, organized by SHA-1 hashes.
object identifier (oid)

object identifier (oid)

A unique SHA-1 hash that identifies a Git object, ensuring data integrity and enabling content-addressable storage.
object name

object name

Another term for the SHA-1 hash that uniquely identifies a Git object in the repository.
object type

object type

The classification of Git objects, including blob (file content), tree (directory structure), commit, and tag.
octopus

octopus

A Git merge involving more than two branches simultaneously, creating a commit with multiple parents.
organization

organization

A shared account on Git hosting platforms where businesses and open-source projects can collaborate across many projects.
organization owner

organization owner

A user with administrative privileges for an organization account on Git hosting platforms.
orphan

orphan

A branch in Git with no parent commit, typically used to start a new history unrelated to existing branches.
outside collaborator

outside collaborator

A user granted access to a repository but not a member of the organization that owns the repository.
overlay

overlay

A Git feature that allows files from one branch to temporarily override files in another branch without merging.
owner

owner

The user or organization with administrative rights to a Git repository, controlling access and settings.
pack

pack

A compressed file format used by Git to store multiple objects efficiently, reducing repository size.
pack index

pack index

A file that provides fast random access to objects stored within a packfile in Git.
parent

parent

A commit from which another commit is derived, establishing the hierarchical relationship in Git history.
parent team

parent team

A team in a Git platform that grants its permissions to nested sub-teams within an organization.
participating notifications

participating notifications

Alerts received when you're directly involved in repository activities like being assigned or mentioned.
pathspec

pathspec

A pattern used in Git commands to limit the scope of operations to specific files or directories.
peel

peel

The process of recursively dereferencing a Git object to reveal its underlying object type.
per-worktree ref

per-worktree ref

A reference specific to a particular working tree in a Git repository with multiple worktrees.
permalink

permalink

A URL that points to a specific version of a file or directory in a Git repository, ensuring consistent reference.
personal account

personal account

An individual account on Git platforms, used for personal projects and contributions.
pickaxe

pickaxe

A Git feature for searching the repository history to find when a particular change was introduced.
pinned repository

pinned repository

A featured repository prominently displayed on a user's or organization's profile page on their Git hosting platform of choice.
plumbing

plumbing

Low-level Git commands that expose internal workings, primarily used for scripting and advanced operations.
porcelain

porcelain

High-level Git commands designed for everyday use, providing a user-friendly interface to common version control tasks.
pre-receive hooks

pre-receive hooks

Server-side scripts that run before pushed commits are accepted, used to enforce policies or perform checks.
primary email address

primary email address

The main email associated with a Git account, used for communications and commit author identification.
private contributions

private contributions

Contributions made to private repositories, typically only visible to repository collaborators.
private repository

private repository

A Git repository with restricted access, visible only to the owner and explicitly granted collaborators.
production branch

production branch

A Git branch that represents the stable, deployed version of a project, often protected from direct changes.
profile

profile

A user's public page on a Git platform, displaying information about their activity and repositories.
profile photo

profile photo

An image representing a user on a Git platform, displayed alongside their contributions and activities.
project board

project board

A kanban-style board in Git platforms for organizing and prioritizing project issues and pull requests.
protected branch

protected branch

A branch with rules enforcing certain conditions before changes can be pushed, merged, or deleted.
pseudoref

pseudoref

A Git reference that doesn't follow the standard refs format but is treated similarly, like HEAD or MERGE_HEAD.
public contributions

public contributions

Contributions made to public repositories, visible on a user's profile and activity feed.
public repository

public repository

A Git repository that is openly accessible to anyone, allowing viewing and often cloning without authentication.
pull access

pull access

Permission level in Git allowing a user to clone a repository and fetch updates, but not push changes.
pull request review

pull request review

The process of examining proposed changes in a pull request before they are merged into the main codebase.
pulse graph

pulse graph

A visual representation of a GitHub repository's recent activity, including commits, issues, and pull requests.
punch graph

punch graph

A visualization of commit frequency over time, often displayed as a heatmap on Git platforms.
push a branch

push a branch

The act of uploading commits from a local branch to a corresponding branch in a remote Git repository.
push access

push access

Permission to upload local changes to a remote Git repository, allowing direct modification of shared branches.
reachability bitmaps

reachability bitmaps

Data structures used to optimize Git operations by quickly determining which objects are reachable from a given commit.
reachable

reachable

Git objects that can be accessed by following the commit history from a given reference point.
read access

read access

Permission to view and clone a Git repository without the ability to make changes or push commits.
recovery code

recovery code

A backup method for accessing a Git account if two-factor authentication is enabled but unavailable.
ref

ref

A name that points to a specific Git object, typically a commit, such as branches or tags.
refs

refs

The collection of references in a Git repository, including branches, tags, and other named pointers to commits.
remote URL

remote URL

The address of a remote Git repository, used for fetching and pushing changes between local and remote repositories.
remote repository

remote repository

A version of a Git project hosted on a server, serving as a central point for collaboration and backup.
remote-tracking branch

remote-tracking branch

A local reference that represents the state of a corresponding branch in a remote repository.
replica

replica

A copy of a Git repository, often used in distributed systems for redundancy and load balancing.
repository cache

repository cache

A local storage of repository data used to improve performance in Git operations.
repository graph

repository graph

A visual representation of the commit history and branch structure in a Git repository.
repository maintainer

repository maintainer

A person responsible for managing a Git repository, reviewing contributions, and maintaining project quality.
required pull request review

required pull request review

A protection rule requiring one or more reviewers to approve changes before merging in Git platforms.
required status check

required status check

A condition that must be met, such as passing tests, before changes can be merged into a protected branch.
resolve

resolve

The process of addressing and fixing merge conflicts in Git, typically done manually by the developer.
revert

revert

A Git operation that creates a new commit that undoes the changes made by a previous commit.
review

review

The process of examining proposed changes in a pull request before merging them into the main codebase.
revision

revision

A specific version of a file, directory, or entire repository in Git, often referenced by a commit hash.
rewind

rewind

The act of moving a branch pointer to an earlier commit in Git, effectively undoing more recent commits.
root directory

root directory

The top-level directory of a Git repository, containing all project files and the .git subdirectory.
root filesystem

root filesystem

The base filesystem of a Git repository, from which all other directories and files are organized.
saved reply

saved reply

A pre-written response that can be quickly inserted into issues or pull request comments on Git platforms.
scope

scope

The range of access or permissions granted to a token or application in Git-based systems.
seat

seat

A licensed user in enterprise Git hosting plans, typically representing a single user account.
secret team

secret team

A team in a Git organization that is hidden from non-members and other teams within the organization.
security log

security log

A record of security-related events and actions in a system, used for monitoring and auditing purposes.
server-to-server request

server-to-server request

An authenticated request between Git servers, often used in integrations or automated processes.
service hook

service hook

A mechanism for Git platforms to send event notifications to external services or applications.
shallow repository

shallow repository

A Git repository with an intentionally truncated history, often created through shallow cloning.
single sign-on

single sign-on

An authentication process allowing users to access multiple Git-related services with one set of credentials.

Cloud-Based Robot Operating System (ROS)

Cloud-hosted version of ROS, providing robotics middleware and tools as a service.

Cloud-Based Robot Simulation

Platforms for simulating and testing robotic systems using cloud computing resources.

Cloud-Based Spatial Audio

Services for processing and rendering 3D audio experiences using cloud computing resources.

Cloud-Connected Industrial Robots

Factory automation systems leveraging cloud resources for data processing, analytics, and remote management.

Cloud-Enabled Autonomous Navigation

Systems using cloud computing to enhance navigation capabilities of autonomous vehicles or robots.

Cloud-Integrated Storage

Systems using cloud computing to enhance navigation capabilities of autonomous vehicles or robots.

Cloud-Native ACID Transactions

Implementations of ACID properties for database transactions in distributed cloud environments.

Cloud-Native Application Protection Platform (CNAPP)

Integrated security solutions designed to protect cloud-native applications throughout their lifecycle.

Cloud-Native Debugging Tools

Specialized software for identifying and resolving issues in cloud-native applications and microservices.

Cloud-Native Deep Learning

Frameworks and services optimized for training and deploying deep learning models in cloud environments.

Cloud-Native FPGAs and ASICs

Specialized hardware accelerators optimized for cloud-native workloads and accessible as cloud services.

Cloud-Native Firewalls

Network security tools designed specifically for protecting cloud-native applications and infrastructure.

Cloud-Native Hardware Security Module (HSM)

Cloud-based services providing hardware-level encryption key management and cryptographic operations.

Cloud-Native IDEs

Integrated development environments optimized for building and deploying cloud-native applications.

Cloud-Native Jupyter Notebooks

Interactive computing environments for data analysis and machine learning, designed for cloud deployment.

Cloud-Native Load Balancing

Traffic distribution services designed specifically for cloud-native applications and microservices architectures.

Cloud-Native Network Functions (CNF)

Virtualized network services designed to run in containerized environments, optimized for cloud infrastructure.

Cloud-Native Network Functions (CNFs)

Network services built as microservices, optimized for deployment in cloud-native environments.

Cloud-Native Reinforcement Learning Environments

Scalable platforms for training AI agents using reinforcement learning algorithms in cloud environments.

Cloud-Native Security Information and Event Management (SIEM)

SIEM solutions designed for collecting and analyzing security data from cloud-native applications.

Cloud-Native Security Orchestration

Automated coordination of security tools and processes in cloud-native environments.

Cloud-Native Transformation

Process of redesigning applications and infrastructure to fully leverage cloud-native technologies and practices.

Cloud-Powered Brain-Computer Interfaces

BCI systems that use cloud computing for data processing and AI-driven interpretation of brain signals.

Cloud-agnostic Architecture

Design approach for building applications that can run on multiple cloud platforms without significant modifications.

Cloud-based AI Chipset Virtualization

Technology enabling virtual access to specialized AI hardware accelerators in the cloud.

Cloud-based Augmented Reality (AR)

Services for processing and delivering AR experiences using cloud computing resources.

Cloud-based Cognitive Architectures

Frameworks for building AI systems that mimic human cognitive processes using cloud resources.

Cloud-based Cryptocurrency Mining

Using cloud computing resources to perform complex calculations required for mining digital currencies.

Cloud-based IoT Platforms

Managed services for connecting, monitoring, and controlling Internet of Things devices using cloud infrastructure.

Cloud-based Robotic Process Automation (RPA)

Services for automating repetitive tasks and workflows using software robots hosted in the cloud.

Cloud-based Visual Programming Environments

Platforms offering drag-and-drop interfaces for creating applications without traditional coding, hosted in the cloud.

Cloud-native AI Development

Practices and tools for building, training, and deploying AI models optimized for cloud environments.

Cloud-native GPU Programming

Techniques and tools for leveraging cloud-based GPUs to accelerate computational tasks in cloud-native applications.

Cloud-to-Cloud Migration

Process of moving applications and data from one cloud provider to another, optimizing for cost, performance, or features.

Cloud-to-Edge-to-Fog Seamless Integration

Unified computing paradigm combining cloud, edge, and fog computing for optimal data processing and latency.

CloudFormation (AWS)

Infrastructure-as-Code service for defining and provisioning AWS infrastructure using declarative templates.

CloudFormation Designer

Visual tool for creating, viewing, and modifying AWS CloudFormation templates, simplifying infrastructure-as-code development.

Cloudlets

Small-scale cloud data centers located at the edge of the network to support low-latency applications.

CoAP Protocol

Lightweight application layer protocol designed for constrained devices in Internet of Things (IoT) environments.

Cold Start

Delay in executing serverless functions when they haven't been used recently and need to be initialized.

Collaborative Cloud Robotics

Multiple robots working together, leveraging cloud resources for coordination and shared learning.

Collaborative Data Modeling

Cloud-based tools enabling teams to jointly design and refine data models for applications.

Collaborative Data Science Environments

Cloud platforms supporting team-based data analysis, model development, and knowledge sharing.

Collaborative Filtering at Scale

Cloud-based recommendation systems processing large datasets to suggest items based on user preferences.

Columnar Storage

Database storage format optimized for analytical queries in cloud data warehouses.

Command Query Responsibility Segregation (CQRS)

Architectural pattern separating read and write operations in cloud-based applications.

Complex Event Processing (CEP)

Real-time analysis of data streams to identify and respond to specific patterns or events in cloud environments.

Compliance Frameworks

Standardized guidelines for ensuring cloud systems meet regulatory requirements (e.g., GDPR, HIPAA, PCI DSS).

Compliance Frameworks (GDPR, HIPAA, PCI DSS, etc.)

Regulatory standards guiding data protection and security practices in cloud computing.

Compliance Monitoring

Continuous assessment of cloud systems and practices to ensure adherence to regulatory standards.

Composable Infrastructure as a Service

Cloud service allowing dynamic assembly of virtualized compute, storage, and networking resources.

Computational Storage

Storage devices with built-in processing capabilities, enabling data processing within the storage subsystem.

Computational Storage Devices

Storage hardware with integrated computing resources for in-situ data processing in cloud environments.

Computer Vision

AI technology that enables machines to interpret and understand visual information from images or videos.

Computer Vision APIs

Cloud services offering pre-built models and tools for image and video analysis tasks.

Concurrency

Simultaneous execution of multiple computations or processes in cloud environments.

Confidential Computing

Technology protecting data in use by performing computation in a hardware-based trusted execution environment.

Confidential Computing Enclaves

Isolated environments in cloud infrastructure for secure processing of sensitive data.

Configuration Drift Detection

Monitoring and identifying unintended changes in cloud resource configurations over time.

Consortium Blockchain

Permissioned blockchain network operated by a group of organizations in a cloud environment.

Container Instances (e.g., Amazon ECS, Azure Container Instances)

Serverless compute platforms for running containers without managing the underlying infrastructure.

Container Networking

Optimizing container resource allocations to improve efficiency and reduce costs in cloud environments.

Container Rightsizing

Technologies and practices for managing network connectivity between containerized applications in the cloud.

Container Runtime Security

Tools and practices for protecting containerized applications during execution in cloud environments.

Container Security

Measures and tools for protecting containerized applications and their data in cloud environments.

Context-Aware Cloud Interfaces

User interfaces that adapt based on user context, device capabilities, and environmental factors.

Continuous Adaptive Risk and Trust Assessment (CARTA)

Dynamic approach to security that continuously analyzes and adapts to changing risks in cloud environments.

Continuous Cloud Security Posture Management

Ongoing process of assessing and improving security risks in cloud infrastructure configurations.

Continuous Compliance Monitoring and Reporting

Automated, real-time tracking and reporting of compliance status for cloud resources and applications.

Continuous Data Testing

Ongoing validation of data quality, integrity, and consistency in cloud-based data pipelines and storage systems.

Continuous Deployment

Automated process of releasing code changes to production environments in cloud infrastructure.

Continuous Integration/Continuous Deployment (CI/CD) in the Cloud

Automated pipeline for building, testing, and deploying applications in cloud environments.

Continuous Optimization

Ongoing process of improving cloud resource utilization, performance, and cost-efficiency.

Continuous Profiling

Constant monitoring and analysis of application performance in cloud environments to identify bottlenecks.

Continuous Rightsizing

Ongoing process of adjusting cloud resource allocations to match actual usage and demand.

Continuous Training

Automated process of regularly updating machine learning models with new data in cloud environments.

Continuous Verification

Ongoing process of validating cloud infrastructure and applications against defined policies and configurations.

Cost Allocation

Process of distributing cloud expenses across different departments, projects, or cost centers within an organization.

Cost Anomaly Detection

Automated identification of unusual or unexpected patterns in cloud spending, helping optimize resource allocation and budgeting.

Cost Attribution

Associating cloud expenses with specific resources, services, or business units for accurate accounting.

Cost Explorer

Tool for visualizing and analyzing cloud spending patterns and trends, helping optimize resource allocation and budgeting.

Cost Optimization Recommendations

Automated suggestions for reducing cloud expenses while maintaining performance and reliability.

Cost-aware Autoscaling

Intelligent scaling of cloud resources considering both performance requirements and cost implications.

Cross-Border Data Transfer Compliance

Ensuring cloud data transfers comply with international data protection regulations.

Cross-Cloud Data Replication

Synchronizing data across multiple cloud providers for redundancy and disaster recovery.

Cross-Cloud Smart Contracts

Blockchain-based agreements executable across different cloud platforms, enabling multi-cloud decentralized applications.

Cross-Platform Cloud Native Runtimes

Execution environments for cloud-native applications that work across multiple cloud providers.

Cryptographic Key Management

Services for securely generating, storing, and rotating encryption keys in cloud environments.

DDoS Protection

Services defending against Distributed Denial of Service attacks on cloud-based applications and infrastructure.

DNA Data Storage

Experimental technology using DNA molecules to store digital data, potentially leveraging cloud for processing.

DNA-Based Data Storage

Experimental technique using DNA molecules to store digital data, potentially integrated with cloud for processing and retrieval.

DNS in the Cloud

Managed Domain Name System services provided by cloud platforms for translating domain names to IP addresses.

Dapr (Distributed Application Runtime)

Portable runtime for building microservices-based applications across cloud and edge environments.

Dashboards and Visualization

Tools for creating interactive, visual representations of cloud data and metrics.

Data Catalog

Centralized repository for metadata about an organization's data assets in the cloud.

Data Catalogs and Data Discovery

Tools for organizing, indexing, and searching data assets across cloud environments.

Data Classification

Categorizing data based on sensitivity and importance for appropriate handling in cloud storage.

Data Drift Detection

Monitoring changes in data distributions that may affect machine learning model performance in cloud environments.

Data Fabric

Integrated architecture for managing and accessing data across diverse cloud and on-premises environments.

Data Fabric Architecture

Unified data management framework spanning multiple cloud and on-premises environments.

5G MEC Integration

Integration of 5G mobile edge computing with container platforms for low-latency applications and services at network edges.

AIOps for Container Environments

Application of AI and machine learning for automated operations, monitoring, and management of containerized environments.

API Deprecation Policy

Guidelines for phasing out older API versions in Kubernetes, ensuring smooth transitions for users.

API Extensions

Mechanisms to extend the Kubernetes API with custom resources and functionalities, enhancing platform capabilities.

API Gateway Pattern

Containerized service that acts as a single entry point for all client requests to a microservices architecture.

API Server

Core component of Kubernetes that exposes the cluster's API and handles all administrative operations.

API Server Aggregation

Kubernetes feature allowing the API server to be extended with additional APIs without modifying core Kubernetes code.

API-First Development

Approach prioritizing API design before implementation, crucial for developing scalable containerized microservices.

AWS Fargate

Serverless compute engine for containers, allowing you to run containers without managing the underlying infrastructure.

Adapter Pattern

Design pattern in containerized microservices that wraps a service's interface to make it compatible with other services.

Admission Controllers

Plugins that intercept requests to the Kubernetes API server before object persistence, enforcing policies or modifying objects.

Admission Controllers for Security

Admission controllers specifically focused on enforcing security policies and validating security-related configurations.

Admission Webhooks

HTTP callbacks that receive admission requests and can modify or validate objects before they are persisted.

Admission Webhooks in Operators

Use of admission webhooks within Kubernetes operators to enforce custom policies or modify resources.

Advanced Audit

Kubernetes feature providing detailed logging of all requests processed by the API server for security and compliance.

Aggregated API Servers

Extension of the Kubernetes API server to include custom resources and functionalities without modifying core Kubernetes.

Aggregated ClusterRoles

Combination of multiple ClusterRoles into a single role, simplifying RBAC management in Kubernetes.

Air-gapped Registries

Container registries isolated from public networks, used in secure or restricted environments.

Akri

Open-source project for exposing heterogeneous leaf devices as resources in Kubernetes clusters.

Alertmanager Configuration

Setup and management of Prometheus Alertmanager for handling alerts from monitoring systems.

Amazon Elastic Container Registry (ECR)

Fully managed Docker container registry provided by AWS for storing, managing, and deploying container images.

Ambassador Pattern

Microservices design pattern where a dedicated service acts as an API gateway for other services.

Ambient Mesh

Service mesh implementation that doesn't require sidecars, reducing resource overhead and simplifying deployment.

Anchore Engine for Image Scanning

Open-source tool for deep inspection of container images, including vulnerability scanning and policy enforcement.

Ansible-based Operators

Kubernetes operators implemented using Ansible for automating application lifecycle management.

Antrea Network Policies

Network policies specific to the Antrea CNI plugin, offering fine-grained control over pod-to-pod communication.

Antrea for Open vSwitch-based Networking

Kubernetes networking solution using Open vSwitch for improved performance and advanced networking features.

Apache OpenWhisk

Open-source serverless platform that executes functions in response to events or direct invocations.

AppArmor Profiles

Security profiles for Linux that restrict program capabilities, enhancing container isolation and security.

Application-level Logging

Logging implemented within applications, providing detailed insights into application behavior and performance.

Aqua Security

Platform providing security and compliance for container-based and cloud-native applications throughout their lifecycle.

Aqua Security Platform

Comprehensive security solution for containerized and cloud-native environments, offering vulnerability management and runtime protection.

Argo CD

GitOps continuous delivery tool for Kubernetes, automating application deployment and lifecycle management.

Argo Rollouts

Kubernetes controller for advanced deployment strategies like canary and blue-green deployments.

ArgoCD

Declarative GitOps tool for Kubernetes, automating application deployment and synchronization with Git repositories.

Artifact Management

Process of storing, organizing, and managing container images and related artifacts in container registries.

Athenz for Fine-grained Access Control

Open-source platform for fine-grained access control and authentication in distributed systems.

Attribute-Based Access Control (ABAC)

Access control paradigm where authorization decisions are based on attributes of users, resources, and environment.

Audit Annotations

Additional metadata added to Kubernetes audit events for enhanced context and analysis, improving audit trails.

Audit Backends

Components responsible for processing and storing Kubernetes audit logs, supporting various storage and analysis options.

Audit Events

Records of requests and activities within a Kubernetes cluster, used for security monitoring and compliance.

Audit Levels

Configurable detail levels for Kubernetes audit logs, ranging from metadata-only to full request and response details.

Audit Logging

Process of recording API server requests and responses for security, troubleshooting, and compliance purposes.

Audit Logs

Detailed records of activities and operations within a Kubernetes cluster, used for security and compliance monitoring.

Audit Policy

Configuration defining which events should be recorded in Kubernetes audit logs and at what level of detail.

Audit Profile

Predefined set of audit policy rules for common use cases in Kubernetes, simplifying audit configuration.

Audit Stages

Different phases of request processing where audit events can be generated in Kubernetes, providing comprehensive auditing.

Audit Webhook Configuration

Setup for sending Kubernetes audit events to external webhook endpoints for processing or analysis.

Auditing

Process of systematically recording and examining activities within a Kubernetes cluster for security and compliance purposes.

Authenticating Proxy

Intermediary service that handles authentication before forwarding requests to the Kubernetes API server.

Authentication Modules

Pluggable components in container orchestration platforms for verifying user identities using various methods.

Authorization Policies

Rules defining access permissions for users and services in container orchestration platforms.

Azure Container Instances

Serverless container hosting service in Azure, offering rapid deployment of containers without cluster management.

Azure Container Registry

Managed Docker registry service for storing and managing container images in Azure cloud environments.

BGP (Border Gateway Protocol) in Containers

Implementation of Border Gateway Protocol within containerized network environments for advanced routing.

BGP in Container Networks

In container networks, BGP (Border Gateway Protocol) manages routing information between containers and external networks for efficient traffic routing.

Backend for Frontend (BFF) Pattern

Microservices design pattern where a dedicated service acts as an API gateway for specific frontend needs.

Backup and Restore

Processes for preserving and recovering container data and configurations in orchestration platforms.

Base Image

Foundation Docker image upon which other images are built, containing core OS and runtime components.

Base Image Selection

Process of choosing appropriate foundation images for container builds, balancing size, security, and functionality.

Best Effort QoS

Kubernetes quality of service class for pods with no resource guarantees, scheduled when resources are available.

Blue-Green Deployments

Deployment strategy using two identical environments to minimize downtime and risk during updates.

Bootstrap Tokens

Temporary tokens used for secure cluster initialization and node joining in Kubernetes, simplifying cluster setup.

Bottlerocket OS

Minimalist Linux-based operating system optimized for running containers in cloud environments.

BuildKit

Advanced container image building toolkit offering improved performance and caching capabilities.

BuildKit for Advanced Image Building

Use of BuildKit for efficient, concurrent, and cache-optimized container image creation, improving build performance.

Bulkhead Pattern

Isolation technique in microservices to contain failures and prevent system-wide cascading failures.

Bulkhead Pattern in Microservices

The Bulkhead Pattern in microservices isolates failures by dividing services into separate compartments, preventing issues in one from affecting others.

Burstable QoS

Kubernetes quality of service class for pods that can use more resources than requested when available.

CIS Benchmarks for Containers

Security configuration guidelines for deploying containers securely in various environments.

CNI Plugin Chaining

Technique of using multiple Container Network Interface plugins together for advanced networking capabilities.

CPU Manager

Kubernetes feature for fine-grained CPU resource management and allocation to containers, optimizing performance.

CPU Throttling

Technique to limit CPU usage of containers to prevent resource monopolization and ensure fair allocation.

CQRS (Command Query Responsibility Segregation)

Architectural pattern separating read and write operations in distributed systems, often used in microservices.

CQRS (Command Query Responsibility Segregation) Pattern

Architectural pattern separating read and write operations in distributed systems, often used in microservices.

CRI (Container Runtime Interface) Specification

Standard interface between container runtimes and Kubernetes, allowing pluggable runtime implementations.

CRI Image Management

Functionality within CRI for pulling, inspecting, and removing container images, standardizing image operations.

CRI Logging

Standardized logging interface for container runtimes implementing the Container Runtime Interface.

CRI Metrics

Performance and resource usage data exposed by container runtimes adhering to the CRI specification.

CRI Runtime Class

Kubernetes feature allowing selection of different runtime configurations for containers, enabling specialized runtimes.

CRI Socket

Unix domain socket used for communication between Kubelet and the CRI-compatible container runtime.

CRI Validation Testing

Process of verifying that a container runtime correctly implements the CRI specification, ensuring compatibility.

CRI-O

Lightweight container runtime specifically designed for Kubernetes, implementing the CRI specification.

CRI-O Internals

Core components and architecture of the CRI-O container runtime, including its interaction with Kubernetes.

CRI-O as Container Runtime

Use of CRI-O, a lightweight container runtime, as the primary runtime in a Kubernetes cluster.

CSI Controller Plugin

Component of CSI responsible for volume provisioning and attachment operations in container orchestration systems.

CSI Drivers

Plugins implementing the Container Storage Interface for various storage systems in Kubernetes.

CSI Ephemeral Volumes

Short-lived volumes in Kubernetes, created and deleted alongside a pod using CSI drivers, for temporary storage.

CSI Migration

Process of transitioning from in-tree volume plugins to CSI drivers in Kubernetes, improving storage extensibility.

CSI Node Plugin

Component of CSI responsible for mounting volumes and making them available to containers.

CSI Topology

Feature allowing storage provisioning based on topology constraints in Kubernetes, optimizing data locality.

Cache-Aside Pattern

Caching strategy where the application checks the cache before retrieving data from the main data store.

Caching Strategies for Containers

Techniques for implementing and managing caches in containerized applications for improved performance.

Calico

Open-source networking and network security solution for containers, providing a rich set of security policies.

Calico eBPF Datapath

High-performance networking mode in Calico using extended Berkeley Packet Filter for packet processing.

Canary Deployments

Technique of releasing new versions to a subset of users or servers to minimize risk and gather feedback.

Capabilities

Fine-grained privileges that can be assigned to containers, enhancing security by limiting root-level access.

Capability Controls

Mechanisms for managing and restricting Linux capabilities assigned to containers for improved security.

Categories

Groupings or classifications of container-related resources or components for easier management and discovery.

Ceph RBD

Ceph's block storage system, often used for persistent volumes in container orchestration platforms.