Engineering Glossary

From fundamental principles to cutting-edge practices, this glossary covers the full spectrum of software engineering terminology.

DevOps
Git
Cloud Computing
Containerization & Orchestration

Log Levels

Categories used to distinguish the importance and nature of logged messages, aiding in log analysis and troubleshooting.
DevOps

Log Management

Process of collecting, storing, analyzing, and disposing of log data generated by various IT systems and applications.
DevOps

Log Management Policy

Set of guidelines and procedures governing the collection, storage, analysis, and retention of log data within an organization.
DevOps

Log Management Process

Systematic approach to collecting, storing, analyzing, and disposing of log data.
DevOps

Log Rotation

Process of archiving filled log files and starting new ones to prevent excessive disk space usage.
DevOps

Log.io

Real-time log monitoring tool that allows users to view and search logs from multiple sources in a single web-based interface.
DevOps

LogShell Vulnerability

Critical security flaw in the Log4j library, allowing remote code execution and posing significant security risks.
DevOps

Loggly

Cloud-based log management and analytics service that helps organizations collect, analyze, and act on machine-generated data from various sources.
DevOps

Logstash

Open-source data processing pipeline that ingests data from multiple sources simultaneously.
DevOps

Logster

Utility for reading log files and generating metrics for monitoring systems like Graphite and Ganglia.
DevOps

Loom

Project aimed at adding lightweight concurrency and new programming models to Java.
DevOps

Low-code

Software development approach requiring little to no coding to build applications and processes.
DevOps

M Silicon

Apple's custom-designed ARM-based processors for Mac computers, offering improved performance and energy efficiency.
DevOps

MITRE ATT&CK

Globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.
DevOps

MLOps

Set of practices that aims to deploy and maintain machine learning models in production reliably and efficiently.
DevOps

MTTI

Mean Time to Identify; average time between the start of an incident and its discovery.
DevOps

MTTR (Mean Time To Recovery)

Average time required to repair a failed system and restore it to normal operation, a key metric for measuring system reliability.
DevOps

Machine Data

Digital information created by the activity of computers, mobile phones, embedded systems and other networked devices.
DevOps

Machine Learning (ML)

Field of study giving computers the ability to learn without being explicitly programmed.
DevOps

Magecart

Group of threat actors that specialize in stealing credit card data from online stores.
DevOps

Managed Detection and Response

Cybersecurity service that combines technology and human expertise to rapidly identify and respond to threats.
DevOps

Managed SIEM

Security Information and Event Management offered as a managed service, providing expert monitoring and threat detection.
DevOps

Managing Secrets

Process of securely storing and handling sensitive information like passwords and API keys.
DevOps

Mass Assignment

Vulnerability where an active record pattern in a web application is abused to modify data items that the user should not be allowed to access.
DevOps

Maturity Model

Structured representation of improvement across multiple dimensions of an organization or service.
DevOps

Mcollective

Framework for building server orchestration or parallel job execution systems, facilitating large-scale system management.
DevOps

Mean Time Between Failures (MTBF)

Average time between system failures, used to measure reliability and predict future failure occurrences.
DevOps

Mean Time to Recovery (MTTR)

Average time required to repair a failed system and restore it to normal operation.
DevOps

Mean Time to Resolution

Average time between the detection of an incident and its full resolution, a key metric in IT service management.
DevOps

Measure everything

Practice of collecting metrics on all aspects of software development and operations to enable data-driven decisions.
DevOps

Memcached

Distributed memory caching system designed to speed up dynamic web applications.
DevOps

Memory Bottleneck

Situation where system performance is limited by the amount or speed of available memory.
DevOps

Mezmo

Cloud-native observability platform for log management and analysis, helping organizations gain insights from their machine data.
DevOps

Micro Frontend

Architectural style where a frontend app is decomposed into individual, loosely coupled components.
DevOps

Microsegmentation

Security technique that creates secure zones in data centers and cloud deployments to isolate workloads from one another.
DevOps

Microservice-Architektur

Architectural style structuring an application as a collection of loosely coupled services.
DevOps

Microservice-Infrastruktur

Infrastructure designed to support the deployment and operation of microservices.
DevOps

Microservices

Software development technique that structures an application as a collection of loosely coupled services.
DevOps

Microservices Architecture

Architectural style that structures an application as a collection of small autonomous services.
DevOps

Microsoft Azure

Cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services.
DevOps

Mina

Network application framework which helps users develop high performance and high scalability network applications easily.
DevOps

Mobile Analytics

Tools and processes for measuring and analyzing mobile app usage and user behavior.
DevOps

Mobile App Automation

Tools and processes for measuring and analyzing mobile app usage and user behavior.
DevOps

Mobile App Testing

Process of testing mobile applications for functionality, usability, and consistency.
DevOps

Mobile Applications Security Testing (MAST)

Process of testing mobile applications for security vulnerabilities, ensuring protection of user data and app integrity.
DevOps

Mobile Artifacts

Data or files generated during mobile app development and testing, including binaries, logs, and test results.
DevOps

Mobile Testing

Process of testing mobile devices and applications to ensure proper functionality and user experience.
DevOps

Model-Based Testing (MBT)

Software testing technique in which test cases are derived from a model that describes the system under test.
DevOps

MongoDB

Popular open-source document-oriented database program classified as a NoSQL database, known for its flexibility and scalability.
DevOps

Monitoring

Continuous observation and checking of a system's performance, health, and security to ensure optimal operation and detect issues.
DevOps

Monitoring as Code (MaC)

Practice of defining and managing monitoring configurations using code and version control systems.
DevOps

Monolithic Architecture

Software design where all components of an application are interconnected and interdependent.
DevOps

Monorepo

Development approach where code for many projects is stored in the same repository.
DevOps

Muda

Japanese term for waste in lean methodologies, referring to any activity that doesn't add value to the final product or service.
DevOps

Multi-Cloud Strategy

Use of multiple cloud computing and storage services in a single heterogeneous architecture.
DevOps

Mura

Japanese term in lean methodologies referring to unevenness or irregularity in processes, which can lead to inefficiencies.
DevOps

Muri

Japanese term in lean methodologies referring to overburden or unreasonableness, which can lead to stress and inefficiencies.
DevOps

Mutable Infrastructure

Infrastructure that can be updated or modified after it is deployed, contrasting with immutable infrastructure approaches.
DevOps

NFRs

Non-Functional Requirements; requirements that specify criteria for judging the operation of a system, rather than specific behaviors.
DevOps

NIST SIEM Requirements and Standards

Guidelines set by the National Institute of Standards and Technology for Security Information and Event Management systems.
DevOps

NPM

Node Package Manager, the default package manager for Node.js, used for installing and managing JavaScript packages and dependencies.
DevOps

Nagios

Open source monitoring system for computer systems, networks and infrastructure.
DevOps

NestJS

Progressive Node.js framework for building efficient and scalable server-side applications.
DevOps

Network Bottleneck

Point in a network where bandwidth is limited, causing slowdowns in data transfer.
DevOps

Network as a Service (NaaS)

Cloud model where network services are delivered over the internet, offering flexibility and scalability.
DevOps

New Relic

Cloud-based observability platform that helps developers monitor, debug, and optimize their entire stack.
DevOps

Next Generation WAF (Web Application Firewall)

Advanced WAF that uses machine learning and behavioral analytics to protect web applications.
DevOps

Nexus

Repository manager that organizes, stores, and distributes software components, facilitating dependency management in development.
DevOps

Nexus Repository

Software repository manager for storing and distributing build artifacts, supporting various package formats and integrations.
DevOps

Nginx

Web server that can also be used as a reverse proxy, load balancer, mail proxy and HTTP cache.
DevOps

NoOps

Concept where an IT environment becomes so automated that there's no need for a dedicated team to manage software in-house.
DevOps

NoSQLi

NoSQL Injection; security exploit targeting databases that use non-SQL query languages.
DevOps

Node Logging

Process of recording events and data from individual nodes in a distributed system.
DevOps

Node Pool

Group of nodes within a cluster, typically with the same configuration, used in container orchestration platforms like Kubernetes.
DevOps

Node.js

JavaScript runtime built on Chrome's V8 JavaScript engine for building scalable network applications.
DevOps

Nomad

Flexible workload orchestrator to deploy and manage containers and non-containerized applications.
DevOps

Non-Functional Testing

Testing of non-functional aspects of software like performance, usability, and reliability.
DevOps

OSV

Open Source Vulnerabilities; database of vulnerabilities affecting open source software.
DevOps

OWASP

Open Web Application Security Project; nonprofit foundation working to improve software security.
DevOps

OWASP API Top 10

List of the ten most critical API security risks, providing awareness and guidance for developers and security professionals.
DevOps

OWASP Top 10

Standard awareness document for developers about the most critical security risks to web applications.
DevOps

Observability

Measure of how well internal states of a system can be inferred from knowledge of its external outputs.
DevOps

Observability vs Monitoring

Observability provides insights into system behavior, while monitoring tracks predefined metrics.
DevOps

On Premise Infrastructure

Computing infrastructure physically located within an organization's facilities.
DevOps

One-Stop Shop

Single location or service providing multiple resources or capabilities, often used in IT service management.
DevOps

Open Authorization (OAuth)

Open standard for access delegation, commonly used for secure authorization in web applications.
DevOps

Open Integration Framework (OIF)

Set of standards and practices for integrating different software systems, promoting interoperability and flexibility.
DevOps

Open Source

Software with source code that anyone can inspect, modify, and enhance, promoting collaboration and transparency.
DevOps

Open Source Applications

Software applications whose source code is openly available for modification and distribution.
DevOps

OpenShift

Container application platform by Red Hat that brings Docker and Kubernetes to the enterprise.
DevOps

OpenStack

Free, open-standard cloud computing platform, primarily deployed as infrastructure-as-a-service.
DevOps

OpenTelemetry

Collection of tools, APIs, and SDKs used to instrument, generate, collect, and export telemetry data.
DevOps

Operational Intelligence

Real-time dynamic business analytics that delivers visibility and insight into data, streaming events, and business operations.
DevOps

Operations Engineering (Ops)

Discipline of designing and managing systems for maximum efficiency and reliability.
DevOps

Ops (from DevOps)

Operational aspect of DevOps, focusing on system administration, infrastructure management, and deployment.
DevOps

OpsGenie

Incident management and alert notification tool designed to help teams handle critical issues quickly and efficiently.
DevOps

Opsbot

Chatbot designed to assist with operational tasks and incident management, streamlining IT operations and support.
DevOps

Opskeleton

Basic structure or framework for operations in a software project, providing a starting point for implementing DevOps practices.
DevOps

Orchestration

Automated configuration, coordination, and management of computer systems and software.
DevOps

Otto

Holistic, single command developer tool for managing development environments across multiple platforms and languages.
DevOps
identicon

identicon

A visual representation of a hash value, often used as a default avatar in Git platforms.
identity provider

identity provider

A service that creates, maintains, and manages identity information for users, often integrated with Git platforms.
index entry

index entry

A record in Git's index file representing the state of a file in the repository.
integration

integration

A connection between Git and other tools or services to enhance functionality and workflow.
key fingerprint

key fingerprint

A short sequence of bytes used to identify a longer public key in Git's GPG signing process.
keychain

keychain

A secure storage system for passwords and keys, often integrated with Git clients for credential management.
keyword

keyword

A reserved word in Git commands or configurations with a specific meaning or function.
label

label

A way to categorize and organize issues and pull requests in GitHub repositories.
license

license

A document in a Git repository specifying how the project can be used, modified, and distributed.
line comment

line comment

A feature in Git platforms allowing users to comment on specific lines of code in pull requests or commits.
line ending

line ending

Characters marking the end of a line, which can cause issues in Git when collaborating across different operating systems.
locked personal account

locked personal account

A GitHub account that has been restricted due to a violation of terms of service or suspicious activity.
main

main

The default name for the primary branch in many Git repositories, replacing 'master' in recent conventions.
management console

management console

An administrative interface for managing Git hosting services, often used in enterprise environments.
markup

markup

A system of annotation used to format text, often used in Git documentation and comments.
members graph

members graph

A visual representation of an organization's membership on Git hosting platforms.
mention

mention

A way to notify a user on Git platforms by using the @ symbol followed by their username.
merge conflict

merge conflict

A situation in Git where incompatible changes have been made to the same part of a file, requiring manual resolution.
milestone

milestone

A way to track progress on groups of issues or pull requests in GitHub projects.
mirror

mirror

A complete copy of a repository, including all branches and history, often used for backup or as a full replica.
nested team

nested team

A team within a GitHub organization that is a subset of a larger team, inheriting its permissions.
network graph

network graph

A visual representation of the commit history and branch structure of a Git repository.
news feed

news feed

A personalized list of recent activity on Git platforms, showing updates from followed users and repositories.
non-fast-forward

non-fast-forward

A Git push that introduces new commits to the remote branch that aren't direct descendants of the current remote HEAD.
notification

notification

An alert system on Git platforms to inform users about relevant activities and mentions.
object

object

A fundamental unit in Git's data model, representing content, commits, trees, or tags, identified by a unique SHA-1 hash.
object database

object database

The storage system in Git that contains all versions of project files and metadata, organized by SHA-1 hashes.
object identifier (oid)

object identifier (oid)

A unique SHA-1 hash that identifies a Git object, ensuring data integrity and enabling content-addressable storage.
object name

object name

Another term for the SHA-1 hash that uniquely identifies a Git object in the repository.
object type

object type

The classification of Git objects, including blob (file content), tree (directory structure), commit, and tag.
octopus

octopus

A Git merge involving more than two branches simultaneously, creating a commit with multiple parents.
organization

organization

A shared account on Git hosting platforms where businesses and open-source projects can collaborate across many projects.
organization owner

organization owner

A user with administrative privileges for an organization account on Git hosting platforms.
orphan

orphan

A branch in Git with no parent commit, typically used to start a new history unrelated to existing branches.
outside collaborator

outside collaborator

A user granted access to a repository but not a member of the organization that owns the repository.
overlay

overlay

A Git feature that allows files from one branch to temporarily override files in another branch without merging.
owner

owner

The user or organization with administrative rights to a Git repository, controlling access and settings.
pack

pack

A compressed file format used by Git to store multiple objects efficiently, reducing repository size.
pack index

pack index

A file that provides fast random access to objects stored within a packfile in Git.
parent

parent

A commit from which another commit is derived, establishing the hierarchical relationship in Git history.
parent team

parent team

A team in a Git platform that grants its permissions to nested sub-teams within an organization.
participating notifications

participating notifications

Alerts received when you're directly involved in repository activities like being assigned or mentioned.
pathspec

pathspec

A pattern used in Git commands to limit the scope of operations to specific files or directories.
peel

peel

The process of recursively dereferencing a Git object to reveal its underlying object type.
per-worktree ref

per-worktree ref

A reference specific to a particular working tree in a Git repository with multiple worktrees.
permalink

permalink

A URL that points to a specific version of a file or directory in a Git repository, ensuring consistent reference.
personal account

personal account

An individual account on Git platforms, used for personal projects and contributions.
pickaxe

pickaxe

A Git feature for searching the repository history to find when a particular change was introduced.
pinned repository

pinned repository

A featured repository prominently displayed on a user's or organization's profile page on their Git hosting platform of choice.
plumbing

plumbing

Low-level Git commands that expose internal workings, primarily used for scripting and advanced operations.
porcelain

porcelain

High-level Git commands designed for everyday use, providing a user-friendly interface to common version control tasks.
pre-receive hooks

pre-receive hooks

Server-side scripts that run before pushed commits are accepted, used to enforce policies or perform checks.
primary email address

primary email address

The main email associated with a Git account, used for communications and commit author identification.
private contributions

private contributions

Contributions made to private repositories, typically only visible to repository collaborators.
private repository

private repository

A Git repository with restricted access, visible only to the owner and explicitly granted collaborators.
production branch

production branch

A Git branch that represents the stable, deployed version of a project, often protected from direct changes.
profile

profile

A user's public page on a Git platform, displaying information about their activity and repositories.
profile photo

profile photo

An image representing a user on a Git platform, displayed alongside their contributions and activities.
project board

project board

A kanban-style board in Git platforms for organizing and prioritizing project issues and pull requests.
protected branch

protected branch

A branch with rules enforcing certain conditions before changes can be pushed, merged, or deleted.
pseudoref

pseudoref

A Git reference that doesn't follow the standard refs format but is treated similarly, like HEAD or MERGE_HEAD.
public contributions

public contributions

Contributions made to public repositories, visible on a user's profile and activity feed.
public repository

public repository

A Git repository that is openly accessible to anyone, allowing viewing and often cloning without authentication.
pull access

pull access

Permission level in Git allowing a user to clone a repository and fetch updates, but not push changes.
pull request review

pull request review

The process of examining proposed changes in a pull request before they are merged into the main codebase.
pulse graph

pulse graph

A visual representation of a GitHub repository's recent activity, including commits, issues, and pull requests.
punch graph

punch graph

A visualization of commit frequency over time, often displayed as a heatmap on Git platforms.
push a branch

push a branch

The act of uploading commits from a local branch to a corresponding branch in a remote Git repository.
push access

push access

Permission to upload local changes to a remote Git repository, allowing direct modification of shared branches.
reachability bitmaps

reachability bitmaps

Data structures used to optimize Git operations by quickly determining which objects are reachable from a given commit.
reachable

reachable

Git objects that can be accessed by following the commit history from a given reference point.
read access

read access

Permission to view and clone a Git repository without the ability to make changes or push commits.
recovery code

recovery code

A backup method for accessing a Git account if two-factor authentication is enabled but unavailable.
ref

ref

A name that points to a specific Git object, typically a commit, such as branches or tags.
refs

refs

The collection of references in a Git repository, including branches, tags, and other named pointers to commits.
remote URL

remote URL

The address of a remote Git repository, used for fetching and pushing changes between local and remote repositories.
remote repository

remote repository

A version of a Git project hosted on a server, serving as a central point for collaboration and backup.
remote-tracking branch

remote-tracking branch

A local reference that represents the state of a corresponding branch in a remote repository.
replica

replica

A copy of a Git repository, often used in distributed systems for redundancy and load balancing.
repository cache

repository cache

A local storage of repository data used to improve performance in Git operations.
repository graph

repository graph

A visual representation of the commit history and branch structure in a Git repository.
repository maintainer

repository maintainer

A person responsible for managing a Git repository, reviewing contributions, and maintaining project quality.
required pull request review

required pull request review

A protection rule requiring one or more reviewers to approve changes before merging in Git platforms.
required status check

required status check

A condition that must be met, such as passing tests, before changes can be merged into a protected branch.
resolve

resolve

The process of addressing and fixing merge conflicts in Git, typically done manually by the developer.
revert

revert

A Git operation that creates a new commit that undoes the changes made by a previous commit.
review

review

The process of examining proposed changes in a pull request before merging them into the main codebase.
revision

revision

A specific version of a file, directory, or entire repository in Git, often referenced by a commit hash.
rewind

rewind

The act of moving a branch pointer to an earlier commit in Git, effectively undoing more recent commits.
root directory

root directory

The top-level directory of a Git repository, containing all project files and the .git subdirectory.
root filesystem

root filesystem

The base filesystem of a Git repository, from which all other directories and files are organized.
saved reply

saved reply

A pre-written response that can be quickly inserted into issues or pull request comments on Git platforms.
scope

scope

The range of access or permissions granted to a token or application in Git-based systems.
seat

seat

A licensed user in enterprise Git hosting plans, typically representing a single user account.
secret team

secret team

A team in a Git organization that is hidden from non-members and other teams within the organization.
security log

security log

A record of security-related events and actions in a system, used for monitoring and auditing purposes.
server-to-server request

server-to-server request

An authenticated request between Git servers, often used in integrations or automated processes.
service hook

service hook

A mechanism for Git platforms to send event notifications to external services or applications.
shallow repository

shallow repository

A Git repository with an intentionally truncated history, often created through shallow cloning.
single sign-on

single sign-on

An authentication process allowing users to access multiple Git-related services with one set of credentials.

3D Stacked Memory for Cloud Servers

High-density memory architecture using vertically stacked chips, enhancing performance and capacity in cloud server hardware.

5G Cloud

Cloud infrastructure optimized for 5G networks, supporting high-speed, low-latency services and applications.

5G Network Slicing

Technique to create multiple virtual networks on a shared physical 5G infrastructure, each optimized for specific use cases.

5G and Edge Computing

Integration of 5G networks with edge computing to enable low-latency, high-bandwidth applications closer to end-users.

6G Cloud Integration

Future convergence of 6G networks with cloud computing, promising ultra-high speeds and advanced capabilities.

ACID Compliance

Database transaction properties (Atomicity, Consistency, Isolation, Durability) ensuring data integrity in cloud environments.

AI Ethics Compliance Tools

Software ensuring AI systems adhere to ethical guidelines and regulations in cloud deployments.

AI Ethics and Bias Detection Tools

Software for identifying and mitigating ethical issues and biases in AI models deployed in cloud environments.

AI Ethics and Governance Tools

Solutions for managing ethical considerations and regulatory compliance in cloud-based AI systems.

AI Governance Frameworks

Structured approaches for managing AI development, deployment, and use in cloud environments.

AI Model Governance Platforms

Comprehensive solutions for managing, monitoring, and controlling AI models in cloud-based systems.

AI Model Interpretability Services

Cloud-based tools for explaining and understanding the decision-making processes of AI models.

AI Model Interpretability Tools

Software for analyzing and explaining AI model decisions, crucial for transparency in cloud AI services.

AI Model Marketplaces

Cloud platforms for discovering, sharing, and monetizing pre-trained AI models and algorithms.

AI Model Monitoring and Drift Detection

Tools for tracking AI model performance and identifying deviations from expected behavior in cloud environments.

AI Model Versioning and Governance

Systems for managing different versions of AI models and enforcing governance policies in cloud deployments.

AI-Assisted Coding Platforms

Cloud-based development environments that use AI to assist programmers in writing and optimizing code.

AI-Augmented Analytics

Integration of AI capabilities into data analytics processes in cloud environments for enhanced insights.

AI-Driven Capacity Planning

Use of AI algorithms to predict and optimize resource allocation in cloud infrastructures.

AI-Driven Cloud Optimization

Application of AI techniques to improve efficiency, performance, and cost-effectiveness of cloud resources.

AI-Driven Cloud Resource Allocation

Automated distribution of cloud resources using AI to optimize performance and cost-efficiency.

AI-Driven Cloud Service Composition

AI-based automation of cloud service selection and integration for complex workflows.

AI-Driven Code Generation

Automated creation of source code using AI models, often integrated into cloud development platforms.

AI-Driven Data Classification

Automated categorization and labeling of data using AI algorithms in cloud storage and processing systems.

AI-Driven Network Optimization

Use of AI to improve network performance, efficiency, and security in cloud environments.

AI-Driven Resource Allocation

Intelligent distribution of computing resources in cloud environments using AI algorithms.

AI-Driven Security Information and Event Management (SIEM)

Enhanced SIEM systems using AI for improved threat detection and response in cloud environments.

AI-Driven Threat Detection

Use of AI algorithms to identify and analyze potential security threats in cloud systems.

AI-Driven Threat Hunting

Proactive search for hidden threats in cloud environments using AI-powered analytics and automation.

AI-Optimized Cloud Hardware

Cloud infrastructure components designed or configured to enhance AI workload performance.

AI-Optimized Databases

Database systems tailored for AI workloads, often featuring in-memory processing and distributed architectures.

AI-Powered Anomaly Detection

Use of AI algorithms to identify unusual patterns or behaviors in cloud systems and data.

AI-Powered Integration

Intelligent automation of data and application integration processes in cloud environments using AI.

AI-as-a-Service

Cloud-based offering of AI capabilities, allowing businesses to leverage AI without extensive in-house expertise.

AI-as-a-Service (AIaaS)

Cloud-based AI capabilities offered as a service, enabling easy integration of AI into applications.

AIOps

Application of AI for automating and enhancing IT operations management in cloud environments.

AIOps Platforms

Integrated solutions leveraging AI for automated monitoring, analysis, and management of cloud IT operations.

AIOps for Predictive Maintenance

Use of AI-driven analytics to forecast and prevent system failures in cloud infrastructure.

API Security Gateway

Service that protects APIs in cloud environments by managing access, monitoring traffic, and preventing attacks.

API Security Gateways

Dedicated services for securing and managing APIs in cloud environments, including access control and threat protection.

API-First Development

Design approach prioritizing API creation before implementation, common in cloud-native application development.

API-Led Connectivity

Integration strategy using purpose-built APIs to connect data, devices, and applications in cloud ecosystems.

AR Cloud

Persistent 3D digital content overlaid on the physical world, accessible via cloud infrastructure for augmented reality applications.

AR/VR Analytics

Cloud-based tools for analyzing user behavior and performance in augmented and virtual reality environments.

AR/VR Collaboration Platforms

Cloud-hosted services enabling multi-user interaction in shared augmented or virtual reality spaces.

AR/VR Content Delivery Network

Specialized CDN optimized for delivering AR/VR content with low latency and high bandwidth.

AR/VR Development Platforms

Cloud-based tools and services for creating, testing, and deploying augmented and virtual reality applications.

ARM Templates (Azure)

JSON-based files defining infrastructure and configuration for Azure resource deployment.

Adaptive User Interfaces for Cloud Services

Dynamic UIs that adjust based on user behavior, device capabilities, and context in cloud applications.

Adversarial Machine Learning Detection

Techniques to identify and mitigate attacks on ML models in cloud-based AI systems.

Alerting and Notification

Systems for informing administrators or users about important events or issues in cloud environments.

Algorithmic Auditing

Process of examining AI algorithms for bias, errors, or unintended consequences in cloud-based systems.

Ambient Computing Interfaces for Cloud

Seamless, context-aware interaction methods for accessing cloud services in IoT environments.

Anomaly Detection Systems

Tools for identifying unusual patterns or behaviors in cloud systems, often using machine learning techniques.

Application-Aware Networking

Network management approach that optimizes performance based on specific application requirements in cloud environments.

Approximate Query Processing

Technique for quickly estimating query results in large-scale cloud databases, trading accuracy for speed.

Archive Storage (e.g., Amazon Glacier, Azure Archive Storage)

Low-cost cloud storage for infrequently accessed data with longer retrieval times, e.g., Amazon Glacier, Azure Archive Storage.

Artifact Repository

Cloud-based storage for software build outputs, dependencies, and related metadata.

Artificial General Intelligence (AGI) as a Service

Hypothetical cloud offering of human-level AI capabilities across various domains.

Artificial General Intelligence Research Platforms

Cloud-based environments for developing and testing advanced AI systems approaching human-level intelligence.

Audit Logging

Systematic recording of actions and events in cloud systems for security and compliance purposes.

Audit Trails

Chronological records of system activities for reconstructing and examining the sequence of events in cloud environments.

Augmented Analytics

Integration of machine learning and natural language processing in cloud-based data analytics workflows.

Augmented Reality (AR) Cloud

Shared, persistent digital content overlaid on the physical world, accessible via cloud infrastructure.

Augmented Reality Cloud Interfaces

Cloud-based systems for managing and delivering AR content and experiences, enabling scalable AR applications.

Augmented Reality Cloud Rendering

Cloud-powered generation of AR graphics and content, offloading processing from end-user devices.

Auto Scaling Groups

Collections of EC2 instances that automatically adjust capacity based on defined conditions.

Auto-scaling

Automatic adjustment of cloud resources to match workload demands, ensuring optimal performance and cost-efficiency.

AutoML

Automated machine learning processes for model selection, hyperparameter tuning, and feature engineering in cloud environments.

AutoML in the Cloud

Cloud-based services automating the machine learning pipeline from data preparation to model deployment and monitoring.

Automated AI Pipeline Optimization

AI-driven tools for improving efficiency and performance of machine learning workflows in the cloud.

Automated Cloud Governance Enforcement

Systems that automatically implement and maintain cloud resource policies and compliance.

Automated Compliance Monitoring

Continuous, AI-driven assessment of cloud systems against regulatory and security standards.

Automated Data Discovery

AI-powered tools for identifying, categorizing, and mapping data assets in cloud environments.

Automated Data Governance

AI-driven systems for managing data quality, security, and compliance in cloud environments.

Automated Data Wrangling Services

Cloud-based tools using AI to clean, transform, and prepare data for analysis, streamlining data preparation processes.

Automated Feature Engineering

AI-powered generation and selection of features for machine learning models in cloud environments.

Automated Incident Response Orchestration

AI-driven coordination of security incident detection and resolution in cloud systems, automating response workflows.

Automated Machine Learning (AutoML)

Cloud services that automate the process of creating and optimizing machine learning models, from data prep to deployment.

Automated Machine Learning (AutoML) Platforms

Cloud-based systems that automate the end-to-end machine learning model development process, including feature engineering and model selection.

Automated Penetration Testing

AI-driven tools for simulating cyberattacks to identify vulnerabilities in cloud systems and applications.

Automated Threat Modeling

AI-powered analysis of cloud architectures to identify potential security risks and attack vectors.

Autonomous Systems in the Cloud

Self-managing, self-healing cloud services requiring minimal human intervention, leveraging AI for operations.

Azure Edge Zones

Ultra-low latency edge computing extensions of Azure for 5G networks, bringing cloud resources closer to users.

Azure Policy

Service for creating, assigning, and managing policies to control Azure resources and ensure compliance.

B2B Integration Platforms

Cloud-based services facilitating data exchange and process integration between business partners.

Backend for Frontend (BFF) Pattern

Architectural approach creating backend services tailored to specific frontend application needs in cloud environments.

Bare Metal Server

Physical server dedicated to a single tenant, offering direct hardware access in cloud environments.

Bare Metal Servers

Dedicated physical servers without virtualization, offered as a cloud service for high-performance workloads.

Batch Processing (e.g., AWS Batch, Azure Batch)

Execution of series of jobs without user interaction, often for large-scale data processing in the cloud (e.g., AWS Batch, Azure Batch).

Big Data Clusters

Distributed computing environments for processing and analyzing massive datasets in the cloud.

Billing Dashboard

Interface for monitoring and managing cloud service usage and costs, providing detailed breakdowns and forecasts.

Biocomputing in the Cloud

Use of cloud resources for computational biology and genomics research, enabling large-scale analysis and modeling.

Biodiversity Impact Assessment for Cloud Facilities

Evaluation of cloud data center effects on local ecosystems and wildlife to ensure sustainable operations.

Block Storage

Cloud storage that provides fixed-size raw storage volumes, typically used for databases or file systems.

Block Storage (e.g., Amazon EBS, Azure Disk Storage)

Cloud services providing persistent block-level storage volumes for use with compute instances.

Blockchain Analytics

Cloud-based tools for analyzing and visualizing blockchain data and transactions, offering insights into network activity.

Blockchain Databases

Distributed databases using blockchain technology for enhanced security and immutability in cloud environments.

Blockchain Governance Tools

Software for managing and enforcing rules, permissions, and consensus mechanisms in blockchain networks deployed on cloud platforms.

Blockchain Integration Services

Cloud-based solutions for connecting blockchain networks with existing enterprise systems and applications.

Pod Affinity

Kubernetes scheduling constraint that allows pods to be co-located with other pods based on labels.

Pod Affinity/Anti-Affinity

Kubernetes features for influencing pod scheduling based on the topology of the cluster and other pods.

Pod Anti-Affinity

Kubernetes scheduling constraint that prevents pods from being co-located with other pods based on labels.

Pod Disruption Budget

Kubernetes object that limits the number of pods of a replicated application that can be down simultaneously.

Pod Lifecycle

Stages a pod goes through from creation to termination, including pending, running, succeeded, failed, and unknown phases.

Pod Monitors

Custom resources in Prometheus Operator for declaratively defining how groups of pods should be monitored.

Pod Networking

Mechanisms and configurations for enabling network communication between pods in a Kubernetes cluster.

Pod Overhead

Additional resources consumed by pod infrastructure on top of the container requests and limits.

Pod Phase

High-level summary of where a pod is in its lifecycle, used for pod status reporting and monitoring.

Pod Priority and Preemption

Kubernetes feature allowing importance-based scheduling and eviction of pods when resources are constrained.

Pod Security Context

Kubernetes object defining privilege and access control settings for a pod or container, enhancing security.

Pod Security Policies (PSP)

Deprecated Kubernetes feature for cluster-level control over pod security sensitive aspects.

Pod Security Standards

Kubernetes-defined levels (privileged, baseline, restricted) of security settings for pods.

PodDisruptionBudget

Kubernetes object limiting the number of pods that can be down simultaneously for a given application.

PodSandbox

Isolation boundary for one or more containers in a pod, providing shared kernel namespaces and cgroups.

PodSecurityPolicy

Deprecated cluster-level resource controlling security-sensitive aspects of pod specification.

Podman for Daemonless Containers

Tool for managing containers and images without a container daemon, compatible with Docker CLI.

Polaris for Best Practices Validation

Open-source tool for checking Kubernetes resources against configurable best practices, enhancing reliability.

Polyglot Persistence

Use of multiple data storage technologies in microservices architectures to best fit varying data storage needs.

Port Address Translation (PAT)

Network address translation technique used in container networking for mapping ports, enabling external access.

Port Mapping

Process of forwarding a network port from the host to a container, enabling external access to containerized services.

Portainer for Container Management

Web-based management UI for Docker environments, simplifying container operations and monitoring.

Portworx

Cloud-native storage platform providing persistent storage for containerized applications in multi-cloud environments.

Portworx PX-Store

Software-defined storage solution by Portworx for containerized stateful applications in Kubernetes.

Predicates

Kubernetes scheduling policies that filter out nodes that cannot run a pod, based on resource requirements and constraints.

Preemption

Kubernetes process of evicting lower-priority pods to schedule higher-priority pods when resources are constrained.

PrintColumn

CustomResourceDefinition feature for defining custom columns in kubectl output for custom resources.

Priorities

Kubernetes scheduling policies that rank nodes that have passed the predicate phase, determining the best placement for a pod.

Priority Classes

Kubernetes objects defining the relative importance of pods, used in scheduling and preemption decisions.

Priority and Preemption

Kubernetes feature allowing pods to be assigned different priorities, influencing scheduling and eviction decisions.

Privileged Containers

Containers running with elevated permissions, potentially accessing host resources and devices.

Progressive Delivery

Deployment strategy gradually rolling out changes to a subset of users or servers, monitoring for issues.

Project Calico eBPF Datapath

High-performance networking mode in Calico using extended Berkeley Packet Filter for packet processing.

Projected Volumes

Kubernetes volume type that maps several existing volume sources into the same directory, combining multiple configs.

Prometheus

Open-source systems monitoring and alerting toolkit, widely used for Kubernetes and container monitoring.

Prometheus Alertmanager

Component of Prometheus handling alerts, including silencing, inhibition, aggregation, and notifications.

Prometheus Operator

Kubernetes operator that makes it easy to deploy and manage Prometheus instances, simplifying monitoring setup.

Prometheus Pushgateway

Component allowing ephemeral and batch jobs to expose their metrics to Prometheus, enhancing monitoring coverage.

Prometheus Remote Write

Feature allowing Prometheus to send samples to compatible remote storage systems, enabling long-term storage.

Prometheus Rules

Definitions for recording rules and alerting rules in Prometheus, allowing for complex queries and alert conditions.

Protocol Selection

Process of choosing the appropriate network protocol for container communication based on requirements.

Quality of Service (QoS) Classes

Kubernetes classifications (Guaranteed, Burstable, BestEffort) for pods based on resource requirements and limits.

Qualys Container Security

Platform providing vulnerability management, policy compliance, and runtime defense for containers.

Quay.io

Container registry by Red Hat offering advanced features like vulnerability scanning and fine-grained access controls.

RBAC (Role-Based Access Control)

Kubernetes authorization mechanism for fine-grained control over the actions users can perform.

RBAC Best Practices

Guidelines for implementing secure and manageable role-based access control in Kubernetes environments.

RBAC for Multitenancy

Use of role-based access control to implement isolation and access management in multi-tenant Kubernetes clusters.

RDMA in Container Networks

Integration of Remote Direct Memory Access for high-performance, low-latency container networking.

Rancher for Multi-cluster Management

Platform for managing multiple Kubernetes clusters across different cloud providers and on-premises.

Rate Limiting Pattern

Technique to control the rate of requests or traffic in distributed systems, often implemented in API gateways.

Raw Block Volumes

Kubernetes volume type providing direct access to a block device for applications requiring this capability.

Reactive Systems

Architectural approach emphasizing responsiveness, resilience, elasticity, and message-driven communication in distributed systems.

Read-only Root Filesystem

Security practice of mounting a container's root filesystem as read-only to prevent runtime modifications.

ReadOnly Volumes

Kubernetes volumes mounted with read-only access, enhancing security by preventing modifications.

Registry

Service for storing and distributing container images, crucial for managing and deploying containerized applications.

Registry API

HTTP API provided by container registries for image management, authentication, and metadata retrieval.

Registry Authentication

Process of verifying the identity of clients making requests to containerized services or APIs.

Registry Caching

Technique of locally caching container images to improve pull times and reduce network usage.

Registry Mirroring

Process of replicating container images across multiple registries for improved availability and reduced latency.

Registry Webhooks

Mechanism for registries to send notifications about events such as image pushes, pulls, or deletions.

Release Trains

Scheduled, periodic releases of software components, often used in microservices architectures for coordinated updates.

ReplicaSet

Kubernetes controller ensuring a specified number of pod replicas are running at any given time.

Request Authentication

Process of verifying the identity of clients making requests to containerized services or APIs.

Request Mirroring

Technique of duplicating incoming requests to a separate service instance for testing or debugging purposes.

Resource Bin Packing

Scheduling strategy aiming to consolidate workloads onto a minimal number of nodes for efficient resource utilization.

Resource Limits

Constraints set on the amount of compute resources (CPU, memory) a container can consume, preventing resource hogging.

Resource Quotas

Kubernetes objects for limiting aggregate resource consumption per namespace, ensuring fair resource allocation.

Resource Requests

Specifications of the minimum amount of compute resources required by a container, aiding in scheduling decisions.

Resource Requests and Limits Tuning

Process of optimizing resource allocations for containers to balance performance and efficiency.

ResourceQuota

Kubernetes object providing constraints that limit aggregate resource consumption per namespace.

Retry Budgets

Limits on the number of retry attempts for failed operations in distributed systems to prevent cascading failures.

Retry Logic

Implementation of automatic reattempts for failed operations in microservices to improve system resilience.

Retry Pattern

Design pattern for handling transient failures in distributed systems by automatically repeating failed operations.

Role

Kubernetes RBAC object defining a set of permissions within a particular namespace, controlling access to resources.

RoleBinding

Kubernetes RBAC object that binds a role to a set of users or service accounts within a namespace.

RoleBindings and ClusterRoleBindings

Kubernetes objects associating Roles and ClusterRoles with users, groups, or service accounts.

Roles and ClusterRoles

Kubernetes RBAC objects defining sets of permissions at namespace or cluster level respectively.

Rollbacks

Process of reverting a deployment to a previous version in case of issues with the current version.

Rolling Updates

Deployment strategy where new versions of an application are gradually rolled out by replacing instances incrementally.

Romana for Layer 3 Networking

Networking solution for Kubernetes providing native Layer 3 networking without overlays for improved performance.

Rook

Open-source cloud-native storage orchestrator for Kubernetes, providing the platform, framework, and support for storage solutions.

Rook Storage Orchestrator

Kubernetes operator for file, block, and object storage systems, automating deployment and management of storage services.

Rootless Containers

Containers running without root privileges, enhancing security by reducing the potential impact of container breakouts.

RunC

Lightweight, portable container runtime adhering to the OCI specification, used as a low-level runtime by container engines.

RunC Internals

Inner workings and components of the RunC container runtime, including its interaction with Linux kernel features.

Runtime Application Self-Protection (RASP)

Security technology that detects and prevents real-time attacks on containerized applications.

Runtime Security

Measures and tools for protecting containerized applications during execution, including threat detection and prevention.

Runtime Threat Detection

Process of identifying and alerting on security threats to running containers and orchestration platforms.

RuntimeService

CRI component responsible for managing the entire lifecycle of a container, including creation, execution, and deletion.

SELinux Policies

Security policies enforcing mandatory access controls on containers and pods in Linux-based systems.

SLO-based Monitoring

Monitoring approach focusing on Service Level Objectives to ensure application performance and reliability.

SMI (Service Mesh Interface)

Standard specification for service meshes on Kubernetes, providing a common interface for various implementations.

SPIFFE/SPIRE for Workload Identity

Standards and implementation for securely identifying and authenticating workloads in dynamic environments.

SR-IOV for Container Networks

Use of Single Root I/O Virtualization to provide high-performance networking for containers.

Saga Pattern

Design pattern for managing data consistency across microservices in distributed transactions.

Saga Pattern for Distributed Transactions

Implementation of the Saga pattern to maintain data consistency in microservices architectures.

Sandbox Runtimes

Container runtimes providing additional isolation between the container and the host system for enhanced security.

Sandboxing

Techniques for isolating running containers from the host system and each other to enhance security.

Scale Subresource

Kubernetes API for directly managing the number of replicas of a workload without modifying the entire object.

Scheduler

Kubernetes component responsible for assigning pods to nodes based on resource requirements, policies, and constraints.