Engineering Glossary

From fundamental principles to cutting-edge practices, this glossary covers the full spectrum of software engineering terminology.

DevOps
Git
Cloud Computing
Containerization & Orchestration

Log Levels

Categories used to distinguish the importance and nature of logged messages, aiding in log analysis and troubleshooting.
DevOps

Log Management

Process of collecting, storing, analyzing, and disposing of log data generated by various IT systems and applications.
DevOps

Log Management Policy

Set of guidelines and procedures governing the collection, storage, analysis, and retention of log data within an organization.
DevOps

Log Management Process

Systematic approach to collecting, storing, analyzing, and disposing of log data.
DevOps

Log Rotation

Process of archiving filled log files and starting new ones to prevent excessive disk space usage.
DevOps

Log.io

Real-time log monitoring tool that allows users to view and search logs from multiple sources in a single web-based interface.
DevOps

LogShell Vulnerability

Critical security flaw in the Log4j library, allowing remote code execution and posing significant security risks.
DevOps

Loggly

Cloud-based log management and analytics service that helps organizations collect, analyze, and act on machine-generated data from various sources.
DevOps

Logstash

Open-source data processing pipeline that ingests data from multiple sources simultaneously.
DevOps

Logster

Utility for reading log files and generating metrics for monitoring systems like Graphite and Ganglia.
DevOps

Loom

Project aimed at adding lightweight concurrency and new programming models to Java.
DevOps

Low-code

Software development approach requiring little to no coding to build applications and processes.
DevOps

M Silicon

Apple's custom-designed ARM-based processors for Mac computers, offering improved performance and energy efficiency.
DevOps

MITRE ATT&CK

Globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.
DevOps

MLOps

Set of practices that aims to deploy and maintain machine learning models in production reliably and efficiently.
DevOps

MTTI

Mean Time to Identify; average time between the start of an incident and its discovery.
DevOps

MTTR (Mean Time To Recovery)

Average time required to repair a failed system and restore it to normal operation, a key metric for measuring system reliability.
DevOps

Machine Data

Digital information created by the activity of computers, mobile phones, embedded systems and other networked devices.
DevOps

Machine Learning (ML)

Field of study giving computers the ability to learn without being explicitly programmed.
DevOps

Magecart

Group of threat actors that specialize in stealing credit card data from online stores.
DevOps

Managed Detection and Response

Cybersecurity service that combines technology and human expertise to rapidly identify and respond to threats.
DevOps

Managed SIEM

Security Information and Event Management offered as a managed service, providing expert monitoring and threat detection.
DevOps

Managing Secrets

Process of securely storing and handling sensitive information like passwords and API keys.
DevOps

Mass Assignment

Vulnerability where an active record pattern in a web application is abused to modify data items that the user should not be allowed to access.
DevOps

Maturity Model

Structured representation of improvement across multiple dimensions of an organization or service.
DevOps

Mcollective

Framework for building server orchestration or parallel job execution systems, facilitating large-scale system management.
DevOps

Mean Time Between Failures (MTBF)

Average time between system failures, used to measure reliability and predict future failure occurrences.
DevOps

Mean Time to Recovery (MTTR)

Average time required to repair a failed system and restore it to normal operation.
DevOps

Mean Time to Resolution

Average time between the detection of an incident and its full resolution, a key metric in IT service management.
DevOps

Measure everything

Practice of collecting metrics on all aspects of software development and operations to enable data-driven decisions.
DevOps

Memcached

Distributed memory caching system designed to speed up dynamic web applications.
DevOps

Memory Bottleneck

Situation where system performance is limited by the amount or speed of available memory.
DevOps

Mezmo

Cloud-native observability platform for log management and analysis, helping organizations gain insights from their machine data.
DevOps

Micro Frontend

Architectural style where a frontend app is decomposed into individual, loosely coupled components.
DevOps

Microsegmentation

Security technique that creates secure zones in data centers and cloud deployments to isolate workloads from one another.
DevOps

Microservice-Architektur

Architectural style structuring an application as a collection of loosely coupled services.
DevOps

Microservice-Infrastruktur

Infrastructure designed to support the deployment and operation of microservices.
DevOps

Microservices

Software development technique that structures an application as a collection of loosely coupled services.
DevOps

Microservices Architecture

Architectural style that structures an application as a collection of small autonomous services.
DevOps

Microsoft Azure

Cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services.
DevOps

Mina

Network application framework which helps users develop high performance and high scalability network applications easily.
DevOps

Mobile Analytics

Tools and processes for measuring and analyzing mobile app usage and user behavior.
DevOps

Mobile App Automation

Tools and processes for measuring and analyzing mobile app usage and user behavior.
DevOps

Mobile App Testing

Process of testing mobile applications for functionality, usability, and consistency.
DevOps

Mobile Applications Security Testing (MAST)

Process of testing mobile applications for security vulnerabilities, ensuring protection of user data and app integrity.
DevOps

Mobile Artifacts

Data or files generated during mobile app development and testing, including binaries, logs, and test results.
DevOps

Mobile Testing

Process of testing mobile devices and applications to ensure proper functionality and user experience.
DevOps

Model-Based Testing (MBT)

Software testing technique in which test cases are derived from a model that describes the system under test.
DevOps

MongoDB

Popular open-source document-oriented database program classified as a NoSQL database, known for its flexibility and scalability.
DevOps

Monitoring

Continuous observation and checking of a system's performance, health, and security to ensure optimal operation and detect issues.
DevOps

Monitoring as Code (MaC)

Practice of defining and managing monitoring configurations using code and version control systems.
DevOps

Monolithic Architecture

Software design where all components of an application are interconnected and interdependent.
DevOps

Monorepo

Development approach where code for many projects is stored in the same repository.
DevOps

Muda

Japanese term for waste in lean methodologies, referring to any activity that doesn't add value to the final product or service.
DevOps

Multi-Cloud Strategy

Use of multiple cloud computing and storage services in a single heterogeneous architecture.
DevOps

Mura

Japanese term in lean methodologies referring to unevenness or irregularity in processes, which can lead to inefficiencies.
DevOps

Muri

Japanese term in lean methodologies referring to overburden or unreasonableness, which can lead to stress and inefficiencies.
DevOps

Mutable Infrastructure

Infrastructure that can be updated or modified after it is deployed, contrasting with immutable infrastructure approaches.
DevOps

NFRs

Non-Functional Requirements; requirements that specify criteria for judging the operation of a system, rather than specific behaviors.
DevOps

NIST SIEM Requirements and Standards

Guidelines set by the National Institute of Standards and Technology for Security Information and Event Management systems.
DevOps

NPM

Node Package Manager, the default package manager for Node.js, used for installing and managing JavaScript packages and dependencies.
DevOps

Nagios

Open source monitoring system for computer systems, networks and infrastructure.
DevOps

NestJS

Progressive Node.js framework for building efficient and scalable server-side applications.
DevOps

Network Bottleneck

Point in a network where bandwidth is limited, causing slowdowns in data transfer.
DevOps

Network as a Service (NaaS)

Cloud model where network services are delivered over the internet, offering flexibility and scalability.
DevOps

New Relic

Cloud-based observability platform that helps developers monitor, debug, and optimize their entire stack.
DevOps

Next Generation WAF (Web Application Firewall)

Advanced WAF that uses machine learning and behavioral analytics to protect web applications.
DevOps

Nexus

Repository manager that organizes, stores, and distributes software components, facilitating dependency management in development.
DevOps

Nexus Repository

Software repository manager for storing and distributing build artifacts, supporting various package formats and integrations.
DevOps

Nginx

Web server that can also be used as a reverse proxy, load balancer, mail proxy and HTTP cache.
DevOps

NoOps

Concept where an IT environment becomes so automated that there's no need for a dedicated team to manage software in-house.
DevOps

NoSQLi

NoSQL Injection; security exploit targeting databases that use non-SQL query languages.
DevOps

Node Logging

Process of recording events and data from individual nodes in a distributed system.
DevOps

Node Pool

Group of nodes within a cluster, typically with the same configuration, used in container orchestration platforms like Kubernetes.
DevOps

Node.js

JavaScript runtime built on Chrome's V8 JavaScript engine for building scalable network applications.
DevOps

Nomad

Flexible workload orchestrator to deploy and manage containers and non-containerized applications.
DevOps

Non-Functional Testing

Testing of non-functional aspects of software like performance, usability, and reliability.
DevOps

OSV

Open Source Vulnerabilities; database of vulnerabilities affecting open source software.
DevOps

OWASP

Open Web Application Security Project; nonprofit foundation working to improve software security.
DevOps

OWASP API Top 10

List of the ten most critical API security risks, providing awareness and guidance for developers and security professionals.
DevOps

OWASP Top 10

Standard awareness document for developers about the most critical security risks to web applications.
DevOps

Observability

Measure of how well internal states of a system can be inferred from knowledge of its external outputs.
DevOps

Observability vs Monitoring

Observability provides insights into system behavior, while monitoring tracks predefined metrics.
DevOps

On Premise Infrastructure

Computing infrastructure physically located within an organization's facilities.
DevOps

One-Stop Shop

Single location or service providing multiple resources or capabilities, often used in IT service management.
DevOps

Open Authorization (OAuth)

Open standard for access delegation, commonly used for secure authorization in web applications.
DevOps

Open Integration Framework (OIF)

Set of standards and practices for integrating different software systems, promoting interoperability and flexibility.
DevOps

Open Source

Software with source code that anyone can inspect, modify, and enhance, promoting collaboration and transparency.
DevOps

Open Source Applications

Software applications whose source code is openly available for modification and distribution.
DevOps

OpenShift

Container application platform by Red Hat that brings Docker and Kubernetes to the enterprise.
DevOps

OpenStack

Free, open-standard cloud computing platform, primarily deployed as infrastructure-as-a-service.
DevOps

OpenTelemetry

Collection of tools, APIs, and SDKs used to instrument, generate, collect, and export telemetry data.
DevOps

Operational Intelligence

Real-time dynamic business analytics that delivers visibility and insight into data, streaming events, and business operations.
DevOps

Operations Engineering (Ops)

Discipline of designing and managing systems for maximum efficiency and reliability.
DevOps

Ops (from DevOps)

Operational aspect of DevOps, focusing on system administration, infrastructure management, and deployment.
DevOps

OpsGenie

Incident management and alert notification tool designed to help teams handle critical issues quickly and efficiently.
DevOps

Opsbot

Chatbot designed to assist with operational tasks and incident management, streamlining IT operations and support.
DevOps

Opskeleton

Basic structure or framework for operations in a software project, providing a starting point for implementing DevOps practices.
DevOps

Orchestration

Automated configuration, coordination, and management of computer systems and software.
DevOps

Otto

Holistic, single command developer tool for managing development environments across multiple platforms and languages.
DevOps
Pull Request

Pull Request

A method of submitting contributions to a Git project, proposing changes from a forked repository or branch.
Pull request templates

Pull request templates

Customizable files that automatically populate the body of new pull requests, guiding contributors.
Pull/Pull Request

Pull/Pull Request

Alternative terms for the same concept of proposing and reviewing changes in Git-based collaboration.
Push

Push

A Git command used to upload local repository changes to a remote repository, sharing updates with collaborators.
README

README

A file in a Git repository that provides information about the project, its purpose, and how to use or contribute to it.
Rebase

Rebase

A Git operation that moves or combines a sequence of commits to a new base commit, often used to maintain a linear history.
Rebase Interactive

Rebase Interactive

A Git rebase mode allowing users to modify, reorder, or squash commits before applying them to the target branch.
RefLog

RefLog

A Git mechanism that records updates to branch tips and other references in a repository.
Refspec

Refspec

A string that specifies the mapping between remote and local references when fetching or pushing in Git.
Release branching

Release branching

A strategy where a separate branch is created for release preparation, allowing continued development on the main branch.
Remote

Remote

A Git repository hosted on a server, allowing collaboration and synchronization between multiple developers.
Repository

Repository

Centralized location where software packages or modules are stored and managed, facilitating version control and collaboration.
Repository ("Repo")

Repository ("Repo")

A data structure containing all the files, history, and metadata for a Git-managed project.
SCM

SCM

Source Control Management, a system for tracking and managing changes to code, of which Git is an example.
SHA-1

SHA-1

The cryptographic hash function used by Git to generate unique identifiers for objects in the repository.
SSH key

SSH key

A secure authentication method using a pair of cryptographic keys for accessing remote systems or services.
Shallow Clone

Shallow Clone

A Git clone that only fetches a limited number of recent commits, reducing download size for large repositories.
Squash

Squash

The process of combining multiple commits into a single commit in Git, often used to simplify history.
Staging

Staging

The process of preparing changes to be committed in Git, also known as "adding to the index."
Stash

Stash

A Git feature for temporarily storing uncommitted changes, allowing you to switch branches without committing work in progress.
Stashing

Stashing

A Git feature for temporarily saving uncommitted changes, allowing you to switch contexts without committing incomplete work.
Status

Status

A Git command that shows the state of the working directory and staging area, indicating which files are modified or staged.
SubModule

SubModule

A Git repository nested within another repository, allowing you to include external projects in your own project.
Tag

Tag

A named reference to a specific point in Git history, typically used to mark release points or important milestones.
Team plan

Team plan

A subscription level for GitHub designed for collaborative groups or small organizations.
Upstream

Upstream

The original repository from which a fork is created, or the branch that a local branch is tracking.
Upstream and Downstream

Upstream and Downstream

Terms describing the flow of changes in Git, with upstream being the source and downstream the destination.
Work in Progress (WIP) Commit

Work in Progress (WIP) Commit

A temporary commit indicating unfinished work, often used to save progress or facilitate code reviews.
access token

access token

A secure alternative to passwords, used for authentication in Git operations, providing limited access to specific resources or actions.
alternate object database

alternate object database

A secondary location where Git stores object files, useful for optimizing storage and performance in large repositories.
appliance

appliance

A dedicated hardware or virtual machine optimized for running Git services, often used in enterprise environments for improved performance.
assignee

assignee

The person responsible for addressing an issue or pull request in a Git repository, helping to organize and prioritize tasks.
authentication code

authentication code

A temporary code used in two-factor authentication to verify a user's identity when accessing Git repositories or services.
base branch

base branch

The primary branch in a Git repository from which feature branches are created and into which they are merged after development.
basic authentication

basic authentication

A simple authentication method in Git using a username and password, often discouraged in favor of more secure methods.
billing cycle

billing cycle

The recurring period for which Git hosting services charge users or organizations for their subscriptions and usage.
billing email

billing email

The email address associated with a Git account or organization for receiving invoices and billing-related communications.
billing manager

billing manager

A user role in Git hosting platforms responsible for managing billing information, subscriptions, and payments for an organization.
billing plan

billing plan

A subscription package offered by Git hosting services, defining features, storage limits, and pricing for users or organizations.
bio

bio

A brief description of a user's profile on Git platforms, typically including their role, interests, or expertise in software development.
blob object

blob object

A Git object type representing the contents of a file, stored as a sequence of bytes without any metadata or file attributes.
block

block

An action on Git platforms to restrict a user's ability to interact with a repository, often used to manage disruptive behavior.
branch restriction

branch restriction

A set of rules applied to Git branches to control who can push changes, merge, or perform certain actions, enhancing code quality.
cURL

cURL

A command-line tool often used with Git to transfer data and interact with APIs, supporting various protocols including HTTPS.
card

card

A visual representation of an issue or pull request in Git project management tools, used for organizing and prioritizing work.
chain

chain

A series of connected commits in Git, representing a sequence of changes that build upon each other in a repository's history.
changeset

changeset

A group of changes made to files in a Git repository, typically represented by a commit and including additions, modifications, and deletions.
check

check

An automated test or verification process run on Git repositories to ensure code quality, security, or compliance with project standards.
child team

child team

A nested team within a Git organization's hierarchy, inheriting permissions and access rights from its parent team.
clean

clean

A Git command used to remove untracked files and directories from a working directory, helping to maintain a tidy repository.
clustering

clustering

A technique used in Git hosting services to distribute repository data across multiple servers for improved performance and reliability.
code frequency graph

code frequency graph

A visual representation of code additions and deletions over time in a Git repository, useful for tracking project activity.
code of conduct

code of conduct

A document outlining expected behavior and guidelines for contributors in a Git repository, promoting a positive community.
code owner

code owner

A designated person or team responsible for reviewing and approving changes to specific files or directories in a Git repository.
collaborator

collaborator

A user with read and write access to a Git repository, able to contribute code and participate in project discussions.
commit ID

commit ID

A unique identifier (SHA-1 hash) assigned to each commit in Git, used to reference specific points in a repository's history.
commit author

commit author

The person who originally created a commit in Git, distinct from the committer who may have applied the changes on behalf of the author.
commit graph

commit graph

A visual representation of the commit history in a Git repository, showing the relationships between different branches and merges.
commit graph concept, representations and usage

commit graph concept, representations and usage

The underlying structure and visual representations of Git's commit history, used for understanding project evolution.
commit message

commit message

A descriptive text associated with a Git commit, explaining the purpose and details of the changes made in that commit.
commit object

commit object

A Git object type containing metadata about a commit, including the author, committer, date, and a pointer to the tree object.
commit-graph file

commit-graph file

A file used by Git to store commit graph information, optimizing performance for operations that traverse the commit history.
commit-ish (also committish)

commit-ish (also committish)

A term referring to any Git object that can be resolved to a commit, including commit IDs, branch names, and tags.
compare branch

compare branch

A Git feature allowing users to view differences between two branches, often used before merging to review changes.
contribution graph

contribution graph

A visual representation of a user's Git activity over time, showing the frequency and distribution of their contributions to repositories.
contribution guidelines

contribution guidelines

A document in a Git repository outlining best practices, coding standards, and procedures for contributors to follow when submitting changes.
contributions

contributions

The collective changes, commits, issues, and pull requests made by a user to Git repositories, showcasing their involvement in projects.
contributor

contributor

Any person who has made contributions to a Git repository, whether through code, documentation, or other forms of project support.
contributors graph

contributors graph

A visual representation of all contributors to a Git repository, showing their relative contributions over time and by type.
core Git

core Git

The fundamental set of Git commands and functionality, excluding third-party extensions or hosting platform-specific features.
coupon

coupon

A promotional code offering discounts or credits for Git hosting services, often used to attract new users or upgrade existing accounts.
cron

cron

A time-based job scheduler used in Git hosting platforms to automate tasks such as backups, notifications, or periodic code checks.
dangling object

dangling object

A Git object not reachable from any reference (branch, tag, etc.), often created during rebasing or other history-altering operations.
dashboard

dashboard

A central interface in Git platforms providing an overview of a user's repositories, activities, and notifications.
default branch

default branch

The primary branch in a Git repository, typically named "main" or "master," serving as the base for new branches and deployments.
dependency graph

dependency graph

A visual representation of a project's dependencies, showing relationships between different components or external libraries.
dependents graph

dependents graph

A visualization of other projects or repositories that depend on a given Git repository, useful for understanding its impact.
deploy key

deploy key

An SSH key granting read-only access to a specific Git repository, commonly used for automated deployments or CI/CD processes.
dereference

dereference

The process of resolving a Git reference (like a branch or tag) to its corresponding commit object or SHA-1 hash.
detached HEAD

detached HEAD

A state in Git where the HEAD pointer references a specific commit rather than a branch, often used for temporary work.
diagnostics

diagnostics

Tools and features in Git used to identify and troubleshoot issues with repositories, commits, or configuration settings.
directory

directory

A folder within a Git repository containing files and potentially other subdirectories, organized hierarchically.
dirty

dirty

A term describing a Git working directory that contains uncommitted changes, indicating modifications that haven't been saved to the repository.
email notifications

email notifications

Alerts sent via email by Git platforms to inform users about repository activities, mentions, or updates.
enterprise account

enterprise account

A high-tier account type offered by Git hosting services, providing advanced features and support for large organizations.
evil merge

evil merge

A problematic merge in Git where conflicts are resolved incorrectly, potentially introducing subtle bugs or inconsistencies.
fast-forward

fast-forward

A type of Git merge where the target branch's pointer is simply moved to the latest commit of the source branch, without creating a new commit.
feature branch

feature branch

A temporary branch in Git created to develop a specific feature or fix, typically merged back into the main branch upon completion.
fenced code block

fenced code block

A markdown syntax used in Git documentation and comments to display formatted code snippets with syntax highlighting.
file system

file system

The underlying structure used by Git to store repository data, including objects, refs, and configuration files.
following (users)

following (users)

A feature in Git platforms allowing users to receive updates and notifications about other users' activities.
gitfile

gitfile

A file containing a Git repository's object database, used in certain Git operations.
gitignore

gitignore

A text file specifying intentionally untracked files that Git should ignore, customizable for different project types.
graft

graft

A technique in Git to join two unrelated commit histories, typically used for repository repair or history modification.
hash

hash

A unique identifier (SHA-1) for Git objects, used to ensure data integrity and create content-addressable storage.
head branch

head branch

The default branch that is checked out when a repository is cloned, typically 'main' or 'master'.
head ref

head ref

A reference to the tip of a branch, representing the most recent commit in that branch's history.
high-availability

high-availability

A characteristic of Git hosting systems designed to ensure continuous operation and minimal downtime.
hook

hook

A script that Git executes before or after events such as commit, push, and receive, used for automating or controlling Git processes.
hostname

hostname

The unique name assigned to a device on a network, used for identification and communication purposes.

3D Stacked Memory for Cloud Servers

High-density memory architecture using vertically stacked chips, enhancing performance and capacity in cloud server hardware.

5G Cloud

Cloud infrastructure optimized for 5G networks, supporting high-speed, low-latency services and applications.

5G Network Slicing

Technique to create multiple virtual networks on a shared physical 5G infrastructure, each optimized for specific use cases.

5G and Edge Computing

Integration of 5G networks with edge computing to enable low-latency, high-bandwidth applications closer to end-users.

6G Cloud Integration

Future convergence of 6G networks with cloud computing, promising ultra-high speeds and advanced capabilities.

ACID Compliance

Database transaction properties (Atomicity, Consistency, Isolation, Durability) ensuring data integrity in cloud environments.

AI Ethics Compliance Tools

Software ensuring AI systems adhere to ethical guidelines and regulations in cloud deployments.

AI Ethics and Bias Detection Tools

Software for identifying and mitigating ethical issues and biases in AI models deployed in cloud environments.

AI Ethics and Governance Tools

Solutions for managing ethical considerations and regulatory compliance in cloud-based AI systems.

AI Governance Frameworks

Structured approaches for managing AI development, deployment, and use in cloud environments.

AI Model Governance Platforms

Comprehensive solutions for managing, monitoring, and controlling AI models in cloud-based systems.

AI Model Interpretability Services

Cloud-based tools for explaining and understanding the decision-making processes of AI models.

AI Model Interpretability Tools

Software for analyzing and explaining AI model decisions, crucial for transparency in cloud AI services.

AI Model Marketplaces

Cloud platforms for discovering, sharing, and monetizing pre-trained AI models and algorithms.

AI Model Monitoring and Drift Detection

Tools for tracking AI model performance and identifying deviations from expected behavior in cloud environments.

AI Model Versioning and Governance

Systems for managing different versions of AI models and enforcing governance policies in cloud deployments.

AI-Assisted Coding Platforms

Cloud-based development environments that use AI to assist programmers in writing and optimizing code.

AI-Augmented Analytics

Integration of AI capabilities into data analytics processes in cloud environments for enhanced insights.

AI-Driven Capacity Planning

Use of AI algorithms to predict and optimize resource allocation in cloud infrastructures.

AI-Driven Cloud Optimization

Application of AI techniques to improve efficiency, performance, and cost-effectiveness of cloud resources.

AI-Driven Cloud Resource Allocation

Automated distribution of cloud resources using AI to optimize performance and cost-efficiency.

AI-Driven Cloud Service Composition

AI-based automation of cloud service selection and integration for complex workflows.

AI-Driven Code Generation

Automated creation of source code using AI models, often integrated into cloud development platforms.

AI-Driven Data Classification

Automated categorization and labeling of data using AI algorithms in cloud storage and processing systems.

AI-Driven Network Optimization

Use of AI to improve network performance, efficiency, and security in cloud environments.

AI-Driven Resource Allocation

Intelligent distribution of computing resources in cloud environments using AI algorithms.

AI-Driven Security Information and Event Management (SIEM)

Enhanced SIEM systems using AI for improved threat detection and response in cloud environments.

AI-Driven Threat Detection

Use of AI algorithms to identify and analyze potential security threats in cloud systems.

AI-Driven Threat Hunting

Proactive search for hidden threats in cloud environments using AI-powered analytics and automation.

AI-Optimized Cloud Hardware

Cloud infrastructure components designed or configured to enhance AI workload performance.

AI-Optimized Databases

Database systems tailored for AI workloads, often featuring in-memory processing and distributed architectures.

AI-Powered Anomaly Detection

Use of AI algorithms to identify unusual patterns or behaviors in cloud systems and data.

AI-Powered Integration

Intelligent automation of data and application integration processes in cloud environments using AI.

AI-as-a-Service

Cloud-based offering of AI capabilities, allowing businesses to leverage AI without extensive in-house expertise.

AI-as-a-Service (AIaaS)

Cloud-based AI capabilities offered as a service, enabling easy integration of AI into applications.

AIOps

Application of AI for automating and enhancing IT operations management in cloud environments.

AIOps Platforms

Integrated solutions leveraging AI for automated monitoring, analysis, and management of cloud IT operations.

AIOps for Predictive Maintenance

Use of AI-driven analytics to forecast and prevent system failures in cloud infrastructure.

API Security Gateway

Service that protects APIs in cloud environments by managing access, monitoring traffic, and preventing attacks.

API Security Gateways

Dedicated services for securing and managing APIs in cloud environments, including access control and threat protection.

API-First Development

Design approach prioritizing API creation before implementation, common in cloud-native application development.

API-Led Connectivity

Integration strategy using purpose-built APIs to connect data, devices, and applications in cloud ecosystems.

AR Cloud

Persistent 3D digital content overlaid on the physical world, accessible via cloud infrastructure for augmented reality applications.

AR/VR Analytics

Cloud-based tools for analyzing user behavior and performance in augmented and virtual reality environments.

AR/VR Collaboration Platforms

Cloud-hosted services enabling multi-user interaction in shared augmented or virtual reality spaces.

AR/VR Content Delivery Network

Specialized CDN optimized for delivering AR/VR content with low latency and high bandwidth.

AR/VR Development Platforms

Cloud-based tools and services for creating, testing, and deploying augmented and virtual reality applications.

ARM Templates (Azure)

JSON-based files defining infrastructure and configuration for Azure resource deployment.

Adaptive User Interfaces for Cloud Services

Dynamic UIs that adjust based on user behavior, device capabilities, and context in cloud applications.

Adversarial Machine Learning Detection

Techniques to identify and mitigate attacks on ML models in cloud-based AI systems.

Alerting and Notification

Systems for informing administrators or users about important events or issues in cloud environments.

Algorithmic Auditing

Process of examining AI algorithms for bias, errors, or unintended consequences in cloud-based systems.

Ambient Computing Interfaces for Cloud

Seamless, context-aware interaction methods for accessing cloud services in IoT environments.

Anomaly Detection Systems

Tools for identifying unusual patterns or behaviors in cloud systems, often using machine learning techniques.

Application-Aware Networking

Network management approach that optimizes performance based on specific application requirements in cloud environments.

Approximate Query Processing

Technique for quickly estimating query results in large-scale cloud databases, trading accuracy for speed.

Archive Storage (e.g., Amazon Glacier, Azure Archive Storage)

Low-cost cloud storage for infrequently accessed data with longer retrieval times, e.g., Amazon Glacier, Azure Archive Storage.

Artifact Repository

Cloud-based storage for software build outputs, dependencies, and related metadata.

Artificial General Intelligence (AGI) as a Service

Hypothetical cloud offering of human-level AI capabilities across various domains.

Artificial General Intelligence Research Platforms

Cloud-based environments for developing and testing advanced AI systems approaching human-level intelligence.

Audit Logging

Systematic recording of actions and events in cloud systems for security and compliance purposes.

Audit Trails

Chronological records of system activities for reconstructing and examining the sequence of events in cloud environments.

Augmented Analytics

Integration of machine learning and natural language processing in cloud-based data analytics workflows.

Augmented Reality (AR) Cloud

Shared, persistent digital content overlaid on the physical world, accessible via cloud infrastructure.

Augmented Reality Cloud Interfaces

Cloud-based systems for managing and delivering AR content and experiences, enabling scalable AR applications.

Augmented Reality Cloud Rendering

Cloud-powered generation of AR graphics and content, offloading processing from end-user devices.

Auto Scaling Groups

Collections of EC2 instances that automatically adjust capacity based on defined conditions.

Auto-scaling

Automatic adjustment of cloud resources to match workload demands, ensuring optimal performance and cost-efficiency.

AutoML

Automated machine learning processes for model selection, hyperparameter tuning, and feature engineering in cloud environments.

AutoML in the Cloud

Cloud-based services automating the machine learning pipeline from data preparation to model deployment and monitoring.

Automated AI Pipeline Optimization

AI-driven tools for improving efficiency and performance of machine learning workflows in the cloud.

Automated Cloud Governance Enforcement

Systems that automatically implement and maintain cloud resource policies and compliance.

Automated Compliance Monitoring

Continuous, AI-driven assessment of cloud systems against regulatory and security standards.

Automated Data Discovery

AI-powered tools for identifying, categorizing, and mapping data assets in cloud environments.

Automated Data Governance

AI-driven systems for managing data quality, security, and compliance in cloud environments.

Automated Data Wrangling Services

Cloud-based tools using AI to clean, transform, and prepare data for analysis, streamlining data preparation processes.

Automated Feature Engineering

AI-powered generation and selection of features for machine learning models in cloud environments.

Automated Incident Response Orchestration

AI-driven coordination of security incident detection and resolution in cloud systems, automating response workflows.

Automated Machine Learning (AutoML)

Cloud services that automate the process of creating and optimizing machine learning models, from data prep to deployment.

Automated Machine Learning (AutoML) Platforms

Cloud-based systems that automate the end-to-end machine learning model development process, including feature engineering and model selection.

Automated Penetration Testing

AI-driven tools for simulating cyberattacks to identify vulnerabilities in cloud systems and applications.

Automated Threat Modeling

AI-powered analysis of cloud architectures to identify potential security risks and attack vectors.

Autonomous Systems in the Cloud

Self-managing, self-healing cloud services requiring minimal human intervention, leveraging AI for operations.

Azure Edge Zones

Ultra-low latency edge computing extensions of Azure for 5G networks, bringing cloud resources closer to users.

Azure Policy

Service for creating, assigning, and managing policies to control Azure resources and ensure compliance.

B2B Integration Platforms

Cloud-based services facilitating data exchange and process integration between business partners.

Backend for Frontend (BFF) Pattern

Architectural approach creating backend services tailored to specific frontend application needs in cloud environments.

Bare Metal Server

Physical server dedicated to a single tenant, offering direct hardware access in cloud environments.

Bare Metal Servers

Dedicated physical servers without virtualization, offered as a cloud service for high-performance workloads.

Batch Processing (e.g., AWS Batch, Azure Batch)

Execution of series of jobs without user interaction, often for large-scale data processing in the cloud (e.g., AWS Batch, Azure Batch).

Big Data Clusters

Distributed computing environments for processing and analyzing massive datasets in the cloud.

Billing Dashboard

Interface for monitoring and managing cloud service usage and costs, providing detailed breakdowns and forecasts.

Biocomputing in the Cloud

Use of cloud resources for computational biology and genomics research, enabling large-scale analysis and modeling.

Biodiversity Impact Assessment for Cloud Facilities

Evaluation of cloud data center effects on local ecosystems and wildlife to ensure sustainable operations.

Block Storage

Cloud storage that provides fixed-size raw storage volumes, typically used for databases or file systems.

Block Storage (e.g., Amazon EBS, Azure Disk Storage)

Cloud services providing persistent block-level storage volumes for use with compute instances.

Blockchain Analytics

Cloud-based tools for analyzing and visualizing blockchain data and transactions, offering insights into network activity.

Blockchain Databases

Distributed databases using blockchain technology for enhanced security and immutability in cloud environments.

Blockchain Governance Tools

Software for managing and enforcing rules, permissions, and consensus mechanisms in blockchain networks deployed on cloud platforms.

Blockchain Integration Services

Cloud-based solutions for connecting blockchain networks with existing enterprise systems and applications.

Scheduler Extender

External process allowing custom logic to be added to the Kubernetes scheduling decisions.

Scheduling Algorithms

Methods used by Kubernetes scheduler to determine the best node placement for pods based on various factors.

Scheduling Framework

Kubernetes component allowing plugins to customize the scheduling process without changing the core scheduler code.

Scheduling Plugins

Modular components in Kubernetes scheduler implementing specific scheduling behaviors and policies.

Scheduling Profiles

Configurations defining sets of scheduling plugins to be used for different scheduling scenarios in Kubernetes.

Seccomp BPF

Use of Berkeley Packet Filter programs to define fine-grained seccomp profiles for container security.

Seccomp Profiles

Security profiles defining allowed system calls for containers, enhancing isolation and reducing attack surface.

Secret

Kubernetes object for storing and managing sensitive information such as passwords, tokens, or keys.

Secrets Management

Process of securely storing, distributing, and rotating sensitive data in containerized environments.

Secure Computing Mode (seccomp)

Linux kernel feature limiting the system calls a process can make, often used to secure containers.

Secure Supply Chain

Practices ensuring the integrity and security of container images and their dependencies throughout the development lifecycle.

Security Context Constraint

OpenShift object defining a set of conditions that a pod must run with to be accepted into the system.

Security Context Constraints

OpenShift feature for fine-grained control over the actions containers can perform and the resources they can access.

Security Scanning in CI Pipeline

Integration of vulnerability and compliance scans into the continuous integration process for container images.

Serverless Frameworks

Tools and platforms for building and deploying serverless applications on container orchestration systems.

Serverless Observability

Techniques and tools for monitoring, tracing, and debugging serverless functions and applications.

Serverless Patterns

Architectural patterns for designing and implementing serverless applications in containerized environments.

Serverless Security

Practices and tools for securing serverless functions and applications in container-based infrastructures.

Serverless Workflows

Orchestration of multiple serverless functions to create complex, event-driven applications.

Service

Kubernetes abstraction defining a logical set of pods and a policy by which to access them.

Service Account Token Volume Projection

Kubernetes feature for securely delivering service account tokens to pods, enhancing security.

Service Account Tokens

Credentials automatically generated for pods to authenticate with the Kubernetes API server.

Service Discovery Pattern

Technique allowing services to locate and communicate with each other dynamically in containerized environments.

Service Mesh Control Plane

Component of a service mesh responsible for managing and configuring the data plane proxies.

Service Mesh Data Plane

Component of a service mesh consisting of proxies that intercept and control service-to-service communication.

Service Mesh Interface (SMI)

Specification defining a set of common APIs for service meshes on Kubernetes, promoting interoperability.

Service Mesh Pattern

Architectural pattern providing a dedicated infrastructure layer for handling service-to-service communication.

Service Mesh Performance (SMP)

Standard for measuring and characterizing the performance of service mesh deployments, aiding in optimization.

Service Monitors

Custom resources in Prometheus Operator for declaratively defining how services should be monitored.

Service Networking

Mechanisms and configurations for enabling network communication between services in container orchestration platforms.

Service Topology

Kubernetes feature allowing services to route traffic based on node topology for improved performance.

Service-to-Service Authentication

Process of verifying the identity of services communicating with each other in a containerized environment.

ServiceAccount

Kubernetes object providing an identity for processes running in a pod, used for authentication and authorization.

Sharding Pattern for Data Partitioning

Technique of dividing data across multiple database instances in containerized environments.

Sidecar Containers

Additional containers in a pod that enhance or extend the functionality of the main container.

Sidecar Pattern

Design pattern where a sidecar container is deployed alongside the main application container to provide supporting features.

Sidecar Proxy

Proxy container deployed alongside application containers to handle network traffic and implement service mesh functionality.

Sidecars for Service Mesh

Use of sidecar proxies to implement service mesh features like traffic management and security in Kubernetes.

SigNoz

Open-source application performance monitoring and observability platform for microservices and Kubernetes environments.

Skaffold

Tool facilitating continuous development for Kubernetes applications, handling building, pushing, and deploying application code.

Skaffold for Local Kubernetes Development

Use of Skaffold to streamline the development workflow for Kubernetes applications in local environments.

Snyk Container Security

Platform providing vulnerability scanning and security management for container images and Kubernetes deployments.

Software-Defined Networking (SDN)

Approach to network management enabling dynamic, programmatically efficient network configuration in container environments.

Source-to-Image (S2I)

Tool and workflow for building reproducible container images from source code, simplifying the build process.

Spinnaker

Open-source, multi-cloud continuous delivery platform for releasing software changes with high velocity and confidence.

Splunk for Containers

Integration of Splunk's data platform with containerized environments for logging, monitoring, and analysis.

StackRox Kubernetes Security Platform

Security platform providing vulnerability management, compliance, and runtime protection for Kubernetes.

Stateful Applications in Containers

Containerized applications that maintain data or state, requiring special considerations for persistence and scaling.

StatefulSet

Kubernetes workload API object used to manage stateful applications, providing unique network identities and stable storage.

StatefulSet Patterns

Design patterns for deploying and managing stateful applications in Kubernetes using StatefulSets.

Static Pods

Pods managed directly by the kubelet on a specific node, without the API server observing them.

Static Provisioning

Process of pre-creating storage resources in Kubernetes before they are claimed by persistent volume claims.

Static Token File

File-based method for providing authentication tokens to the Kubernetes API server, useful for bootstrap authentication.

Status Subresource

Kubernetes API feature allowing updates to an object's status without modifying its spec, enabling more granular updates.

Storage Capacity Tracking

Kubernetes feature for making scheduling decisions based on the available storage capacity of nodes.

Storage Classes

Kubernetes objects defining different classes of storage with varying performance characteristics or policies.

StorageClass

Kubernetes object describing the "classes" of storage offered by the administrator, used for dynamic provisioning.

StorageOS

Software-defined storage for cloud-native applications, providing persistent storage for containers.

Strangler Fig Pattern for Modernization

Incremental approach to modernizing legacy applications by gradually replacing components with microservices.

Streaming Protocols

Network protocols optimized for real-time data transmission in containerized environments.

SubPath

Kubernetes volume feature allowing mounting a specific directory of a volume instead of its root.

Submariner for Multi-cluster Networking

Open-source project enabling direct networking between pods and services across Kubernetes clusters.

Subresources

Kubernetes API feature representing sub-components of a resource, allowing more granular access control and operations.

SuperEdge

Open-source container management system for edge computing, extending Kubernetes to manage edge nodes efficiently.

Sysdig Secure for Runtime Protection

Security platform providing real-time threat detection and response for containerized environments.

TUF (The Update Framework) for Secure Updates

Specification for securing software update systems, applicable to container image distribution.

Taints

Kubernetes node attributes that repel certain pods from scheduling unless they have matching tolerations.

Taints and Tolerations

Kubernetes mechanism for controlling which pods can be scheduled on specific nodes, enabling node specialization.

Tekton

Cloud-native CI/CD framework for Kubernetes, providing custom resources for defining pipelines and tasks.

Tekton Pipelines

Kubernetes-native CI/CD solution using custom resources to define pipelines as a series of tasks.

Telepresence for Local Development

Tool allowing developers to run a single service locally while connecting to a remote Kubernetes cluster.

Tenable.io Container Security

Platform providing vulnerability management and compliance monitoring for container images and registries.

Tenant Isolation

Techniques for separating and securing resources belonging to different users or groups in multi-tenant Kubernetes clusters.

Terrascan for Kubernetes Security Scanning

Open-source tool for static code analysis of Infrastructure as Code, including Kubernetes manifests.

Thanos

Open-source project extending Prometheus for long-term storage and global query view in large-scale deployments.

Thanos for Long-Term Storage

Use of Thanos to provide durable storage and global query capability for Prometheus metrics.

Throttling Pattern

Technique for limiting the rate at which a containerized service processes requests to prevent overload.

Tilt for Microservices Development

Development environment as code for teams building Kubernetes microservices, streamlining local development.

Timeout Configuration

Settings controlling the maximum duration for various operations in containerized applications and infrastructure.

Tolerations

Kubernetes pod specifications that allow (but do not require) pods to be scheduled on nodes with matching taints.

Topology Manager

Kubernetes feature coordinating resource allocation decisions to provide topology-aligned resource allocations.

Traffic Mirroring

Technique of duplicating live traffic to a separate service instance for testing or debugging purposes.

Traffic Shifting

Gradual redirection of traffic from one version of a service to another, often used in canary deployments.

Traffic Splitting

Distribution of incoming requests across multiple versions of a service, enabling advanced deployment strategies.

Trivy for Vulnerability Scanning

Open-source security scanner for containers and other artifacts, finding vulnerabilities and misconfigurations.

Twelve-Factor App Methodology

Set of best practices for building software-as-a-service apps that can be easily deployed to the cloud.

Twistlock

Container security platform providing vulnerability management, compliance, and runtime protection (now part of Prisma Cloud).

Twistlock (now Prisma Cloud)

Comprehensive cloud-native security platform for containers, serverless, and cloud environments.

Underlay Networks

Physical network infrastructure upon which overlay networks for container communication are built.

Unikernels as Container Alternatives

Specialized, single-purpose machine images offering potential advantages in size and security over containers.

Union File System

Filesystem service for Linux allowing files and directories of separate filesystems to be overlaid, forming a single coherent filesystem.

User Impersonation

Kubernetes feature allowing a user to act as another user, useful for debugging and testing access controls.

User Namespaces

Linux kernel feature providing per-process isolated instances of user and group ID number spaces.

VXLAN

Network virtualization technology used in container networking for creating overlay networks.

VXLAN Overlay Networks

Virtual networks using VXLAN encapsulation to enable container communication across hosts.

Valet Key Pattern for Secure Resource Access

Design pattern for providing clients with restricted direct access to a specific resource or service.

Validating Webhooks

Admission controller webhooks in Kubernetes that validate resource requests without modifying them.

Validation Webhooks

Kubernetes admission control mechanism for validating API requests against custom logic before persistence.

Velero for Backup and Restore

Open-source tool for backing up and restoring Kubernetes cluster resources and persistent volumes.

Version Skew Policy

Guidelines defining supported version differences between Kubernetes components to ensure compatibility.