Engineering Glossary

From fundamental principles to cutting-edge practices, this glossary covers the full spectrum of software engineering terminology.

DevOps
Cloud Computing
Git
Containerization & Orchestration

PCI DSS

Payment Card Industry Data Security Standard; information security standard for organizations that handle credit card data.
DevOps

PaaS (Platform-as-a-Service)

Category of cloud computing services providing a platform for developers to build, run, and manage applications.
DevOps

Packer

Tool for creating identical machine images for multiple platforms from a single source configuration.
DevOps

Page Load Time

Duration it takes for a web page to fully load in a user's browser, a crucial metric for web performance and user experience.
DevOps

Pagerduty

Digital operations management platform that helps organizations respond to critical incidents and manage on-call schedules effectively.
DevOps

Pair Programming

Agile software development technique where two programmers work together at one workstation.
DevOps

Papertrail

Cloud-hosted log management service for collecting, analyzing, and storing logs from applications, servers, and devices.
DevOps

Passwordless Authentication

Security method that allows users to access systems without traditional passwords, often using biometrics or security tokens.
DevOps

Paved Road

Standardized set of tools and processes for software development within an organization.
DevOps

Pen Testing

Penetration Testing; authorized simulated cyberattack on a computer system to evaluate its security.
DevOps

Penetration Testing

Method of evaluating the security of a computer system or network by simulating an attack from malicious outsiders.
DevOps

Performance Testing

Process of determining the speed, responsiveness, and stability of a computer, network, software program or device under workload.
DevOps

Perimeter Security

Defense strategy focusing on securing the boundaries of an organization's network from external threats and unauthorized access.
DevOps

Persistent Volume Claim (PVC)

Kubernetes resource that requests specific storage resources, allowing pods to access persistent storage in a cluster.
DevOps

Personally Identifiable Information (PII)

Any data that could potentially identify a specific individual, subject to strict privacy and security regulations.
DevOps

Pingdom

Website monitoring service that checks the availability and performance of websites and web applications, providing alerts and detailed reports.
DevOps

Pipeline

Series of automated processes for delivering software from development to production.
DevOps

Pipeline Management

Practice of overseeing and optimizing the processes involved in software delivery pipelines.
DevOps

Pivotal Cloud Foundry (PCF)

Open-source cloud application platform providing a choice of clouds, developer frameworks, and application services.
DevOps

Platform Engineering

Discipline of designing and building toolchains and workflows that enable self-service capabilities for software engineering organizations.
DevOps

Platform Team

Group responsible for building and maintaining the platform that other teams use to build and run applications.
DevOps

Platform as a Service (PaaS)

Cloud computing model where a third-party provider delivers hardware and software tools to users over the internet.
DevOps

Playbook

Pre-defined set of procedures to be carried out in response to specific DevOps events or incidents.
DevOps

Policy Decision Point (PDP)

Entity that makes authorization decisions for itself or other entities that request such decisions.
DevOps

Policy Enforcement Point (PEP)

Entity in a network that enforces security policies for resource access, typically working in conjunction with a Policy Decision Point.
DevOps

Policy as Code

Practice of defining and managing policies using code, enabling version control, automation, and consistent policy enforcement.
DevOps

Polymorphism

Ability of an object to take on many forms in object-oriented programming, enabling flexible and extensible code design.
DevOps

Poni

Tool for defining and running multi-container Docker applications, similar to Docker Compose but with additional features.
DevOps

Positive Security Model

Approach to security that specifies what is allowed and rejects everything else.
DevOps

Predictive Analytics

Use of data, statistical algorithms and machine learning techniques to identify the likelihood of future outcomes based on historical data.
DevOps

Private Cloud

Cloud computing services offered either over the Internet or a private internal network to select users.
DevOps

Product Owner

Person responsible for maximizing the value of the product resulting from the work of the development team.
DevOps

Production

Environment where software and other products are actually used by end users or consumers.
DevOps

Production Environment

Setting where software and other products operate to perform their intended functions for end users.
DevOps

Protected Health Information (PHI)

Any information about health status, provision of health care, or payment for health care that can be linked to a specific individual.
DevOps

Provisioning

Process of setting up IT infrastructure, including servers, networking, and storage.
DevOps

Provisioning Profile

File used to code sign iOS apps, containing information about the app ID, allowed devices, and other settings.
DevOps

ProxMox

Open-source server virtualization management platform that combines KVM hypervisor and LXC containers, offering a comprehensive solution.
DevOps

Public Cloud

Computing services offered by third-party providers over the public Internet, available to anyone who wants to use or purchase them.
DevOps

Pull Request (PR)

Mechanism in version control systems for notifying team members that a feature or fix is ready for review and integration.
DevOps

Pulp

Platform for managing repositories of software packages, facilitating the aggregation, mirroring, and distribution of software content.
DevOps

Puppet

Configuration management tool for centralizing and automating configuration management.
DevOps

Purple Team

Security team that functions as a combined red team (offensive) and blue team (defensive) to maximize effectiveness.
DevOps

Python

High-level, interpreted language known for readability and versatility, widely used in web development, data science, and other domains.
DevOps

Quality Gate

Set of threshold conditions that must be met in order to move on to the next stage in a software delivery process.
DevOps

Queue

Data structure that follows the First In First Out (FIFO) principle, commonly used in programming for task scheduling and data buffering.
DevOps

Quiescence

State of a system or component when it's inactive or in a state of rest, often used in database systems for consistent backups.
DevOps

Quota

Predefined limit on the amount of resources that can be consumed by a user, process, or system to prevent overuse and ensure fair allocation.
DevOps

RAML Files

RESTful API Modeling Language files used for describing RESTful APIs, facilitating API design and documentation.
DevOps

RASP (Runtime Application Self Protection)

Security technology that is built into an application to detect and prevent real-time attacks.
DevOps

RDS

Amazon Relational Database Service, a distributed relational database service by Amazon Web Services.
DevOps

RabbitMQ

Open source message broker software that implements the Advanced Message Queuing Protocol (AMQP).
DevOps

Radiator

Large, visible display of key project metrics and statuses, providing immediate feedback on the state of a project or system.
DevOps

Rate Limiting

Technique used to control the rate of requests sent or received by a network interface controller.
DevOps

React Native

Open-source mobile application development framework created by Facebook for building native apps using React and JavaScript.
DevOps

Real User Monitoring (RUM)

Passive monitoring technique that captures and analyzes every transaction of every user of a website or application.
DevOps

Real-time Big Data Analytics

Process of analyzing large volumes of data as it is generated, providing immediate insights for decision-making.
DevOps

Real-time Dashboard

Visual display providing immediate updates on key performance indicators and metrics for quick decision-making.
DevOps

Recovery with Rollforward

Technique in database systems to recover data by reapplying transactions from log files.
DevOps

Red Team

Group that plays the role of an adversary to provide security testing for an organization.
DevOps

Refactoring

Process of restructuring existing computer code without changing its external behavior.
DevOps

Regression Testing

Type of software testing to confirm that a recent program or code change has not adversely affected existing features.
DevOps

Release

Process of making a software product available for use, including planning, scheduling, and controlling the build through different stages.
DevOps

Release Automation

Use of automation in the software delivery process to deploy software across various environments.
DevOps

Release Management

Process of managing, planning, scheduling and controlling a software build through different stages and environments.
DevOps

Release Management Dashboard

Visual interface for tracking and managing software releases, providing insights into release progress and status.
DevOps

Release Orchestration

Coordination and management of complex software releases across multiple teams, tools, and environments.
DevOps

Release on Click by Business

Practice allowing business stakeholders to initiate releases with a simple action.
DevOps

Reliability

Ability of a system or component to perform its required functions under stated conditions for a specified period of time.
DevOps

Remote Code Execution (RCE)

Vulnerability that allows an attacker to run arbitrary code on a target machine.
DevOps

Render Time

Duration it takes for a browser to display the contents of a web page after receiving data from the server.
DevOps

Resilience

Ability of a system to withstand and recover from failures and disruptions, crucial for maintaining service availability.
DevOps

Response Time

Duration between a user's action and the system's reaction, a critical metric for measuring application performance and user experience.
DevOps

Rest API Security

Practices and measures taken to protect REST APIs from various security threats.
DevOps

Reverse Conway Maneuver

Organizational restructuring strategy aimed at aligning team structures with the desired software architecture.
DevOps

Rex

Configuration management and application deployment tool written in Perl, designed for simplicity and flexibility.
DevOps

Riemann

Monitoring system designed for distributed systems, focusing on collecting events from servers and applications for processing and analysis.
DevOps

Risk Assessment

Systematic process of evaluating potential risks and their impact on an organization, crucial for effective security management.
DevOps

Risk Management

Forecasting and evaluation of financial risks together with the identification of procedures to avoid or minimize their impact.
DevOps

Role-based Access Control (RBAC)

Approach to restricting system access to authorized users based on their role within an organization.
DevOps

Rollback

Process of restoring a database, program, or system to a previous state, often used when issues arise after an update or change.
DevOps

Rolling Deployments

Deployment strategy where new versions of an application are gradually rolled out to a subset of users.
DevOps

Rolling Update

Deployment strategy where an application's containers are updated in a rolling fashion, one after the other.
DevOps

Root Cause Analysis

Method of problem solving used for identifying the root causes of faults or problems.
DevOps

Rubberducking

Debugging technique where a programmer explains the code line-by-line to an inanimate object.
DevOps

Rudder

Open-source IT automation and compliance tool that helps manage large-scale, complex IT infrastructures across various environments.
DevOps

Run From Your Repository

Practice of executing code directly from a version control repository, often used in continuous integration workflows.
DevOps

Runbook

Compilation of routine procedures and operations that a system administrator or operator carries out.
DevOps

Runbooks

Collection of procedures and operations that describe how to run a computer system or network, crucial for IT operations.
DevOps

Rundeck

Open-source operations management and automation platform, designed to streamline routine and ad-hoc tasks across various systems.
DevOps

Runner

Component in CI/CD systems responsible for executing jobs and reporting results back to the CI/CD server, often customizable for different environments.
DevOps

S3 (Amazon Simple Storage Service)

Scalable object storage service from AWS, designed for durability, availability, and performance across various use cases.
DevOps

SAML

Security Assertion Markup Language; XML-based open-standard for exchanging authentication and authorization data.
DevOps

SAST

Static Application Security Testing; method of testing applications without executing them.
DevOps

SDK

Software Development Kit; set of software development tools for creating applications for a specific platform.
DevOps

SIEM

Security Information and Event Management; provides real-time analysis of security alerts.
DevOps

SIEM Environment

Infrastructure and configuration supporting a Security Information and Event Management system for comprehensive security monitoring.
DevOps

SIEM Solutions

Software products providing security information and event management capabilities.
DevOps

SIEM Tools

Software used for collecting, analyzing, and reporting on log data for security purposes.
DevOps

SIEM-log

Log data specifically collected, analyzed, and managed within a Security Information and Event Management system for security monitoring.
DevOps
Git Pull --Rebase

Git Pull --Rebase

A variation of Git pull that fetches remote changes and rebases local commits on top of them instead of merging.
Git Push --Force-with-Lease

Git Push --Force-with-Lease

A safer alternative to force push, which only updates the branch if it hasn't been modified since your last fetch.
Git Range-diff

Git Range-diff

A command that compares the changes between two commit ranges, useful for reviewing rebased branches.
Git Read-tree

Git Read-tree

A low-level command that reads tree objects into the index, used in complex merging scenarios.
Git Reflog

Git Reflog

A log of all reference updates in a repository, useful for recovering lost commits or branches.
Git Reflogs

Git Reflogs

Same as Git Reflog, logs that record when the tips of branches and other references were updated in the repository.
Git Refs Storage

Git Refs Storage

The system Git uses to store references (like branches and tags) as files in the .git directory.
Git Refspec

Git Refspec

A string that specifies the mapping between remote and local references when fetching or pushing.
Git Remote Add

Git Remote Add

Adds a new remote repository to your local Git configuration, associating a name with a URL.
Git Remote Prune

Git Remote Prune

A command that removes remote-tracking branches that no longer exist on the remote repository.
Git Remote Remove

Git Remote Remove

Removes a remote repository from your local Git configuration, deleting its associated references.
Git Replace

Git Replace

A feature allowing one Git object to be transparently used in place of another, useful for history rewriting.
Git Rerere (Reuse Recorded Resolution)

Git Rerere (Reuse Recorded Resolution)

A feature that remembers how you resolved merge conflicts and automatically reapplies the resolution.
Git Reset

Git Reset

A command used to undo changes by moving the current branch head to a specific commit.
Git Reset --Hard

Git Reset --Hard

A Git reset option that updates the working directory and staging area to match the specified commit.
Git Reset --Soft

Git Reset --Soft

A Git reset option that moves the HEAD to a specified commit without changing the working directory or staging area.
Git Rev-list

Git Rev-list

A command that lists commit objects in reverse chronological order, often used as a basis for other commands.
Git Rev-parse

Git Rev-parse

A command used to parse Git revision syntax and return the corresponding object name.
Git Revert

Git Revert

A command that creates a new commit that undoes the changes made by a previous commit.
Git Rm

Git Rm

A command to remove files from both the working directory and the Git repository.
Git Shallow Clone

Git Shallow Clone

A clone that only fetches a limited number of commits, reducing download size and time for large repositories.
Git Shortlog

Git Shortlog

A command that summarizes git log output, typically used to create release announcements.
Git Signed Commits

Git Signed Commits

Commits that are cryptographically signed to verify the identity of the committer and ensure integrity.
Git Signed Tags

Git Signed Tags

Tags that are cryptographically signed to verify the identity of the tagger and ensure the tag's integrity.
Git Squash

Git Squash

The process of combining multiple commits into a single commit, often used to simplify history before merging.
Git Stash Apply

Git Stash Apply

A command that applies a stored stash to the working directory without removing it from the stash list.
Git Stash Pop

Git Stash Pop

A command that applies a stored stash to the working directory and removes it from the stash list.
Git Status

Git Status

A command that displays the state of the working directory and the staging area.
Git Submodule

Git Submodule

A repository embedded within another repository, allowing you to keep a Git repository as a subdirectory of another Git repository.
Git Submodule Foreach

Git Submodule Foreach

A command that executes a specified shell command for each initialized submodule in a Git repository.
Git Subtree

Git Subtree

A feature for managing nested repositories as subdirectories of a parent repository, an alternative to submodules.
Git Update-index

Git Update-index

A low-level Git command that manipulates the staging area, updating file information and preparing changes for commit.
Git Wire Protocol

Git Wire Protocol

The communication protocol used between Git clients and servers for efficient data transfer.
Git Worktree

Git Worktree

A feature allowing multiple working trees to be attached to the same repository, useful for working on different branches simultaneously.
Git Worktree Add

Git Worktree Add

Creates a new working tree associated with the repository, allowing work on multiple branches simultaneously.
Git Worktree List

Git Worktree List

A command to list details of each working tree associated with the repository, showing paths and branch information.
Git Write-tree

Git Write-tree

A low-level Git command that creates a tree object from the current index, representing a directory structure.
Git archive

Git archive

A Git command used to create an archive (zip or tar) of files from a specified commit, useful for creating release packages.
Git branch naming conventions

Git branch naming conventions

Agreed-upon patterns for naming branches to improve organization and clarity in collaborative projects.
Git cat-file

Git cat-file

A command to examine the contents and type of Git objects, useful for inspecting repository internals.
Git cherry-pick --continue

Git cherry-pick --continue

A command to resume the cherry-pick process after resolving conflicts in a paused cherry-pick operation.
Git config scopes (system, global, local)

Git config scopes (system, global, local)

Levels at which Git configuration can be set: system (all users), global (user), and local (repository).
Git count-objects -v

Git count-objects -v

A command providing detailed statistics about the number and size of objects in a Git repository.
Git credential helpers

Git credential helpers

Mechanisms to securely store and retrieve credentials for Git operations, reducing manual authentication.
Git diff drivers

Git diff drivers

Custom scripts that determine how Git should generate diffs for specific file types.
Git filter-repo

Git filter-repo

A versatile tool for rewriting Git repository history, offering more power and flexibility than git filter-branch.
Git gc aggressive

Git gc aggressive

A more thorough garbage collection process in Git, optimizing repository storage and performance.
Git hash-object

Git hash-object

A low-level Git command that computes the object ID (SHA-1 hash) for a given file or string, used in Git's internal storage.
Git hooks (client-side and server-side)

Git hooks (client-side and server-side)

Scripts triggered by specific events in Git workflows, used to automate tasks or enforce policies.
Git index (staging area)

Git index (staging area)

The intermediate area in Git where changes are prepared before committing, also known as the staging area.
Git loose objects

Git loose objects

Individual, uncompressed Git objects stored separately in the object database before being packed.
Git ls-tree

Git ls-tree

A command to list the contents of a tree object in Git, showing files and subdirectories.
Git merge drivers

Git merge drivers

Custom scripts defining how Git should handle merges for specific file types or patterns.
Git mktree

Git mktree

A low-level Git command that creates a tree object from a specific index or tree listing.
Git object types (blob, tree, commit, tag)

Git object types (blob, tree, commit, tag)

The four fundamental object types used by Git to store repository data and history.
Git pack-refs

Git pack-refs

A command to pack references into a single file for improved performance in repositories with many references.
Git packfiles

Git packfiles

Compressed files containing multiple Git objects, optimizing storage and transfer efficiency in repositories.
Git post-receive hooks (server-side)

Git post-receive hooks (server-side)

Server-side scripts that run after commits have been accepted, often used for notifications or deployments.
Git pre-receive hooks (server-side)

Git pre-receive hooks (server-side)

Server-side scripts that run before pushed commits are accepted, used to enforce policies or checks.
Git protocol v2

Git protocol v2

An improved version of the Git transfer protocol, offering better performance and feature negotiation.
Git rebase --onto

Git rebase --onto

A command to move a series of commits to a new base commit, useful for changing the parent of a branch.
Git reflog expire

Git reflog expire

A command to remove old entries from the reflog, useful for cleaning up Git history and freeing space.
Git repack

Git repack

A command to combine all loose objects in a repository into packfiles, improving storage efficiency.
Git reset (soft, mixed, hard)

Git reset (soft, mixed, hard)

Commands to undo changes in Git, with varying impacts on the working directory and staging area.
Git secret management

Git secret management

Techniques and tools for securely storing and accessing sensitive information in Git repositories.
Git show-ref

Git show-ref

A command that lists references in a Git repository along with their associated commit hashes.
Git sparse-checkout

Git sparse-checkout

A feature allowing users to check out only a subset of files from a repository, saving space and time.
Git verify-pack

Git verify-pack

A command to validate the contents of Git pack files, ensuring data integrity in the object database.
GitHub App

GitHub App

An application that can be installed directly on organizations and user accounts to extend GitHub's functionality.
GitHub Flavored Markdown

GitHub Flavored Markdown

A version of Markdown with additional features specifically supported on GitHub.
GitHub Importer

GitHub Importer

A tool for importing repositories to GitHub from other version control systems or source code hosts.
GitHub Issues

GitHub Issues

A feature in GitHub for tracking tasks, enhancements, and bugs for a project.
GitHub Jobs

GitHub Jobs

A platform for posting and finding software development jobs, integrated with GitHub profiles, that was discontinued in 2021.
GitHub Marketplace

GitHub Marketplace

A platform for developers to sell and buy integrations for GitHub, enhancing workflow and productivity.
GitHub Pages

GitHub Pages

A static site hosting service that takes files directly from a GitHub repository to publish websites.
GitHub Wiki

GitHub Wiki

A collaborative documentation feature in GitHub repositories, allowing easy creation and editing of project documentation.
GitHub flow

GitHub flow

A lightweight, branch-based workflow that supports teams and projects where deployments are made regularly.
GitLab flow

GitLab flow

A version control workflow that combines feature-driven development and feature branches with issue tracking.
Gitflow

Gitflow

Branching model for Git that defines a strict branching model designed around project releases.
Gitk (Git Repository Browser)

Gitk (Git Repository Browser)

A graphical interface for viewing Git repositories, providing a visual representation of commit history.
GraphQL

GraphQL

Query language for APIs and a runtime for executing those queries with existing data.
HEAD

HEAD

A pointer in Git that refers to the latest commit in the current checked-out branch.
Hello, World

Hello, World

A simple program often used as an introduction to a new programming language or environment, including Git tutorials.
Hotfix branching

Hotfix branching

A method for quickly patching production releases by branching directly from the main branch or a tag.
Index

Index

Also known as the staging area, where changes are prepared before committing in Git.
Issue templates

Issue templates

Predefined structures for creating new issues in Git repositories, ensuring consistent and complete information.
Jekyll

Jekyll

A static site generator often used with GitHub Pages to create websites from Markdown files in a Git repository.
Jekyll Theme Chooser

Jekyll Theme Chooser

A tool in GitHub Pages that allows users to easily select and apply pre-designed themes to their Jekyll sites.
LFS

LFS

Git Large File Storage, an extension for versioning large files in Git repositories.
Linguist

Linguist

A library used by GitHub to detect the programming languages used in repositories.
Markdown

Markdown

A lightweight markup language commonly used for documentation in Git repositories.
Master

Master

Formerly the default name for the primary branch in Git repositories, now often replaced by 'main'.
Merge

Merge

The process of combining changes from different branches into a single branch, integrating multiple lines of development.
OAuth app

OAuth app

An application that uses the OAuth protocol to access Git platform APIs on behalf of users.
OAuth token

OAuth token

A secure string used for authentication in Git operations, allowing access to resources without sharing passwords.
Origin

Origin

The default name for the remote repository from which a local repository was cloned.
Patch

Patch

A file describing changes between versions, used to share and apply modifications across different Git repositories.
Pull

Pull

A Git command that fetches changes from a remote repository and merges them into the current branch.
Pull Request

Pull Request

A method of submitting contributions to a Git project, proposing changes from a forked repository or branch.
Pull request templates

Pull request templates

Customizable files that automatically populate the body of new pull requests, guiding contributors.

Blockchain Interoperability

Capability of different blockchain networks to exchange and use information across cloud platforms.

Blockchain as a Service

Cloud-based blockchain infrastructure and management tools offered as a service, simplifying blockchain adoption.

Blockchain as a Service (BaaS)

Cloud platforms offering blockchain infrastructure and tools as a managed service for easy deployment and scaling.

Blockchain-Based Audit Trails for Cloud Resources

Immutable, distributed ledgers recording all actions and changes to cloud resources for enhanced accountability.

Blockchain-Based Databases

Distributed databases using blockchain for data storage and validation in cloud environments.

Blockchain-Based Networking

Use of blockchain technology for secure, decentralized network management and routing in cloud infrastructures.

Blockchain-Based Security Audit Trails

Immutable records of security events and access logs in cloud systems using blockchain technology.

Blockchain-based Cloud Security

Use of blockchain technology to enhance security, integrity, and transparency of cloud services and data.

Blockchain-based Supply Chain

Cloud-hosted blockchain networks for tracking and verifying supply chain transactions and product provenance.

Blue-Green Deployment

Cloud deployment strategy using two identical environments to minimize downtime and risk during updates.

Blue-Green Deployments

Technique using two identical production environments to reduce downtime and risk when deploying new versions of cloud applications.

Border Gateway Protocol (BGP)

Internet routing protocol used in cloud networking to exchange routing information between autonomous systems.

Brain-Computer Interfaces (BCI) for Cloud Interaction

Experimental systems allowing direct neural control of cloud resources and services.

Budget Alerts

Notifications triggered when cloud spending reaches predefined thresholds to help control costs.

Budget Management

Tools and practices for setting, tracking, and controlling cloud service expenditures.

Business Intelligence Tools (e.g., Amazon QuickSight, Power BI)

Cloud-based platforms for data analysis and visualization, e.g., Amazon QuickSight, Power BI.

CQRS (Command Query Responsibility Segregation)

Architectural pattern separating read and write operations in cloud-based applications.

Calico

Open-source networking and security solution for containers and Kubernetes in cloud environments.

Canary Deployments

Technique of rolling out changes to a small subset of users before full deployment in cloud environments.

Carbon Footprint Calculation for Cloud Services

Tools and methods for estimating the environmental impact of cloud resource usage.

Carbon Usage Effectiveness (CUE)

Metric measuring the carbon emissions associated with data center energy consumption in cloud facilities.

Carbon-Aware Computing

Cloud computing practices that consider and optimize for carbon emissions in resource allocation and usage.

Carbon-Intelligent Computing

Cloud infrastructure and algorithms designed to minimize carbon footprint by optimizing energy use and sourcing.

Carbon-Intelligent Workload Scheduling

Cloud resource management that schedules tasks based on availability of low-carbon energy sources.

Centralized Logging

Consolidation of log data from various cloud services and applications into a single, searchable repository.

Chaos Engineering Platforms

Cloud-based systems for designing, running, and analyzing controlled experiments to test system resilience.

Chaos Engineering Tools

Software used to intentionally introduce failures in cloud systems to test and improve their resilience.

Chaos Engineering as a Service

Cloud-based platforms for designing and executing controlled experiments to test system resilience.

Chargeback Models

Frameworks for allocating and billing cloud service costs to different departments or projects within an organization.

Chargeback and Showback

Methods for allocating cloud costs to business units, showing actual charges or usage without billing.

Chatbot Services

Cloud-based platforms for building, deploying, and managing conversational AI agents.

Cilium

Open-source, eBPF-based networking, observability, and security solution for container and Kubernetes environments.

Circuit Breaker Pattern

Design pattern that prevents cascading failures in distributed cloud systems by temporarily disabling failing components.

Circular Economy in Cloud Hardware

Practices promoting reuse, refurbishment, and recycling of cloud infrastructure components.

Cloud Abstraction Layer

Software that provides a unified interface to multiple cloud providers, simplifying multi-cloud management.

Cloud Access Security Broker (CASB)

Service that mediates between cloud users and providers, enforcing security policies and monitoring usage.

Cloud Adoption Framework

Structured approach for planning and implementing cloud migration and optimization strategies.

Cloud Analytics

Tools and services for processing and analyzing large datasets using cloud-based resources.

Cloud Asset Intelligence

Systems for discovering, classifying, and managing cloud resources across an organization's infrastructure.

Cloud Asset Management

Processes and tools for tracking, optimizing, and governing cloud resources throughout their lifecycle.

Cloud Broker

Intermediary service that helps organizations select, integrate, and manage multiple cloud services.

Cloud Bursting

Technique of extending on-premises infrastructure into the cloud to handle peak workloads.

Cloud CDN

Content Delivery Network services that distribute data from cloud origins to global edge locations for faster access.

Cloud Carbon Footprint Monitoring

Tools and practices for measuring and reporting the environmental impact of cloud resource consumption.

Cloud Center of Excellence (CCoE)

Cross-functional team responsible for cloud strategy, governance, and best practices within an organization.

Cloud Configuration Optimization

Process of adjusting cloud resource settings to improve performance, security, and cost-efficiency.

Cloud Cost Anomaly Detection

Automated identification of unusual or unexpected changes in cloud spending patterns.

Cloud Cost Optimization

Strategies and tools for reducing cloud expenses while maintaining performance and meeting business needs.

Cloud Custodian

Open-source tool for managing and enforcing cloud security, compliance, and cost optimization policies.

Cloud DNS

Scalable, managed Domain Name System service for translating domain names to IP addresses in cloud environments.

Cloud Data Sovereignty Solutions

Services ensuring data storage and processing comply with regional data residency and privacy laws.

Cloud Development Kit (CDK)

Framework for defining cloud infrastructure using familiar programming languages instead of configuration files.

Cloud Financial Operations

Practices and tools for managing, optimizing, and reporting on cloud spending and resource utilization.

Cloud Functions (Google Cloud)

Serverless compute platform for running event-driven code without managing infrastructure.

Cloud Gaming

Service that streams video games from cloud servers to user devices, reducing hardware requirements.

Cloud Governance Framework

Set of policies, processes, and tools for managing and controlling cloud resource usage and compliance.

Cloud Infrastructure Entitlement Management (CIEM)

Tools for managing access rights and permissions across multi-cloud environments.

Cloud Interconnect (Google Cloud)

Service providing direct, private network connections between on-premises networks and Google Cloud.

Cloud License Optimization

Strategies and tools for managing software licenses in cloud environments to reduce costs and ensure compliance.

Cloud Management Platform

Integrated suite of tools for monitoring, managing, and optimizing multi-cloud and hybrid cloud environments.

Cloud Migration Assessment

Evaluation of on-premises IT assets to determine feasibility, strategy, and costs for moving to the cloud.

Cloud Monitoring

Tools and services for tracking performance, availability, and health of cloud resources and applications.

Cloud Native Application Performance Management (APM)

Tools for monitoring and optimizing performance of applications built for cloud environments.

Cloud Native Buildpacks

Standardized way to transform application source code into container images for cloud deployment.

Cloud Native CI/CD

Continuous integration and delivery practices optimized for cloud-native application development and deployment.

Cloud Native Databases

Database systems designed to leverage cloud infrastructure for scalability, resilience, and performance.

Cloud Native Networking

Network architectures and technologies optimized for cloud-native application environments.

Cloud Native Observability

Practices and tools for monitoring, logging, and tracing cloud-native applications and infrastructure.

Cloud Native Security

Security practices and tools designed specifically for protecting cloud-native applications and infrastructure.

Cloud Native Storage

Storage systems designed to integrate seamlessly with cloud-native applications and container orchestrators.

Cloud Network Automation

Tools and practices for automating the deployment, configuration, and management of cloud network resources.

Cloud Network Function Virtualization (NFV)

Virtualizing network functions like firewalls and load balancers in cloud environments.

Cloud Network Intelligence

AI-driven tools for optimizing and securing cloud network performance and operations.

Cloud Performance Benchmarking Tools

Services for measuring and comparing performance metrics across different cloud providers and configurations.

Cloud Rendering

Use of cloud computing resources for processing and generating complex graphics or animations.

Cloud Repatriation

Process of moving applications or data from public cloud environments back to on-premises or private cloud infrastructure.

Cloud Robotics

Integration of cloud computing with robotics, enabling robots to leverage cloud resources for processing and data storage.

Cloud Robotics Data Analytics

Cloud-based tools for processing and analyzing large datasets generated by robotic systems.

Cloud Robotics Security

Measures and tools to protect cloud-connected robotic systems from cyber threats and unauthorized access.

Cloud Robotics Simulation Environments

Cloud-based platforms for testing and training robotic systems in virtual environments.

Cloud Run (Google Cloud)

Fully managed platform for deploying and scaling containerized applications in a serverless environment.

Cloud Security

Comprehensive measures and tools to protect data, applications, and infrastructure in cloud computing environments.

Cloud Security Posture Management (CSPM)

Tools for continuously monitoring and improving security risks in cloud infrastructure configurations.

Cloud Service Catalog

Centralized repository of available cloud services and resources within an organization.

Cloud Spend Analysis

Tools and practices for analyzing and optimizing cloud expenditures across an organization.

Cloud Spend Anomaly Detection

Automated identification of unusual or unexpected patterns in cloud service usage and costs.

Cloud Spend Forecasting

Predictive analytics tools for estimating future cloud costs based on historical usage and trends.

Cloud WAN

Wide Area Network service that connects and manages global network resources using cloud infrastructure.

Cloud WAN (Wide Area Network)

Managed service for connecting and managing global network resources using cloud infrastructure.

Cloud Workload Protection Platform (CWPP)

Security solutions designed to protect cloud-native applications and workloads across multiple environments.

Cloud-Based 3D Asset Management

Services for storing, versioning, and collaborating on 3D models and assets in the cloud.

Cloud-Based Computer Vision for Robotics

Services providing image and video analysis capabilities for cloud-connected robotic systems.

Cloud-Based Data Labeling Services

Platforms offering human-powered or AI-assisted data annotation for machine learning models.

Cloud-Based Digital Twins

Virtual representations of physical objects or systems, powered by cloud computing and IoT data.

Cloud-Based Distributed Operating Systems

OS designed to manage resources across multiple cloud environments as a single system.

Cloud-Based Generative AI Services

Platforms offering pre-trained or customizable generative AI models as cloud services.

Cloud-Based Haptic Feedback

Services using cloud computing to generate and deliver tactile sensations for virtual or augmented reality experiences.

Cloud-Based Motion Capture

Services utilizing cloud resources to process and analyze motion capture data for animation or biomechanics.

Cloud-Based Reinforcement Learning

Platforms offering scalable environments and resources for training AI agents using reinforcement learning algorithms.

Cloud-Based Robot Learning

Services enabling robots to learn and improve their capabilities using cloud-based AI and machine learning resources.

5G MEC Integration

Integration of 5G mobile edge computing with container platforms for low-latency applications and services at network edges.

AIOps for Container Environments

Application of AI and machine learning for automated operations, monitoring, and management of containerized environments.

API Deprecation Policy

Guidelines for phasing out older API versions in Kubernetes, ensuring smooth transitions for users.

API Extensions

Mechanisms to extend the Kubernetes API with custom resources and functionalities, enhancing platform capabilities.

API Gateway Pattern

Containerized service that acts as a single entry point for all client requests to a microservices architecture.

API Server

Core component of Kubernetes that exposes the cluster's API and handles all administrative operations.

API Server Aggregation

Kubernetes feature allowing the API server to be extended with additional APIs without modifying core Kubernetes code.

API-First Development

Approach prioritizing API design before implementation, crucial for developing scalable containerized microservices.

AWS Fargate

Serverless compute engine for containers, allowing you to run containers without managing the underlying infrastructure.

Adapter Pattern

Design pattern in containerized microservices that wraps a service's interface to make it compatible with other services.

Admission Controllers

Plugins that intercept requests to the Kubernetes API server before object persistence, enforcing policies or modifying objects.

Admission Controllers for Security

Admission controllers specifically focused on enforcing security policies and validating security-related configurations.

Admission Webhooks

HTTP callbacks that receive admission requests and can modify or validate objects before they are persisted.

Admission Webhooks in Operators

Use of admission webhooks within Kubernetes operators to enforce custom policies or modify resources.

Advanced Audit

Kubernetes feature providing detailed logging of all requests processed by the API server for security and compliance.

Aggregated API Servers

Extension of the Kubernetes API server to include custom resources and functionalities without modifying core Kubernetes.

Aggregated ClusterRoles

Combination of multiple ClusterRoles into a single role, simplifying RBAC management in Kubernetes.

Air-gapped Registries

Container registries isolated from public networks, used in secure or restricted environments.

Akri

Open-source project for exposing heterogeneous leaf devices as resources in Kubernetes clusters.

Alertmanager Configuration

Setup and management of Prometheus Alertmanager for handling alerts from monitoring systems.

Amazon Elastic Container Registry (ECR)

Fully managed Docker container registry provided by AWS for storing, managing, and deploying container images.

Ambassador Pattern

Microservices design pattern where a dedicated service acts as an API gateway for other services.

Ambient Mesh

Service mesh implementation that doesn't require sidecars, reducing resource overhead and simplifying deployment.

Anchore Engine for Image Scanning

Open-source tool for deep inspection of container images, including vulnerability scanning and policy enforcement.

Ansible-based Operators

Kubernetes operators implemented using Ansible for automating application lifecycle management.

Antrea Network Policies

Network policies specific to the Antrea CNI plugin, offering fine-grained control over pod-to-pod communication.

Antrea for Open vSwitch-based Networking

Kubernetes networking solution using Open vSwitch for improved performance and advanced networking features.

Apache OpenWhisk

Open-source serverless platform that executes functions in response to events or direct invocations.

AppArmor Profiles

Security profiles for Linux that restrict program capabilities, enhancing container isolation and security.

Application-level Logging

Logging implemented within applications, providing detailed insights into application behavior and performance.

Aqua Security

Platform providing security and compliance for container-based and cloud-native applications throughout their lifecycle.

Aqua Security Platform

Comprehensive security solution for containerized and cloud-native environments, offering vulnerability management and runtime protection.

Argo CD

GitOps continuous delivery tool for Kubernetes, automating application deployment and lifecycle management.

Argo Rollouts

Kubernetes controller for advanced deployment strategies like canary and blue-green deployments.

ArgoCD

Declarative GitOps tool for Kubernetes, automating application deployment and synchronization with Git repositories.

Artifact Management

Process of storing, organizing, and managing container images and related artifacts in container registries.

Athenz for Fine-grained Access Control

Open-source platform for fine-grained access control and authentication in distributed systems.

Attribute-Based Access Control (ABAC)

Access control paradigm where authorization decisions are based on attributes of users, resources, and environment.

Audit Annotations

Additional metadata added to Kubernetes audit events for enhanced context and analysis, improving audit trails.

Audit Backends

Components responsible for processing and storing Kubernetes audit logs, supporting various storage and analysis options.

Audit Events

Records of requests and activities within a Kubernetes cluster, used for security monitoring and compliance.

Audit Levels

Configurable detail levels for Kubernetes audit logs, ranging from metadata-only to full request and response details.

Audit Logging

Process of recording API server requests and responses for security, troubleshooting, and compliance purposes.

Audit Logs

Detailed records of activities and operations within a Kubernetes cluster, used for security and compliance monitoring.

Audit Policy

Configuration defining which events should be recorded in Kubernetes audit logs and at what level of detail.

Audit Profile

Predefined set of audit policy rules for common use cases in Kubernetes, simplifying audit configuration.

Audit Stages

Different phases of request processing where audit events can be generated in Kubernetes, providing comprehensive auditing.

Audit Webhook Configuration

Setup for sending Kubernetes audit events to external webhook endpoints for processing or analysis.

Auditing

Process of systematically recording and examining activities within a Kubernetes cluster for security and compliance purposes.

Authenticating Proxy

Intermediary service that handles authentication before forwarding requests to the Kubernetes API server.

Authentication Modules

Pluggable components in container orchestration platforms for verifying user identities using various methods.

Authorization Policies

Rules defining access permissions for users and services in container orchestration platforms.

Azure Container Instances

Serverless container hosting service in Azure, offering rapid deployment of containers without cluster management.

Azure Container Registry

Managed Docker registry service for storing and managing container images in Azure cloud environments.

BGP (Border Gateway Protocol) in Containers

Implementation of Border Gateway Protocol within containerized network environments for advanced routing.

BGP in Container Networks

In container networks, BGP (Border Gateway Protocol) manages routing information between containers and external networks for efficient traffic routing.

Backend for Frontend (BFF) Pattern

Microservices design pattern where a dedicated service acts as an API gateway for specific frontend needs.

Backup and Restore

Processes for preserving and recovering container data and configurations in orchestration platforms.

Base Image

Foundation Docker image upon which other images are built, containing core OS and runtime components.

Base Image Selection

Process of choosing appropriate foundation images for container builds, balancing size, security, and functionality.

Best Effort QoS

Kubernetes quality of service class for pods with no resource guarantees, scheduled when resources are available.

Blue-Green Deployments

Deployment strategy using two identical environments to minimize downtime and risk during updates.

Bootstrap Tokens

Temporary tokens used for secure cluster initialization and node joining in Kubernetes, simplifying cluster setup.

Bottlerocket OS

Minimalist Linux-based operating system optimized for running containers in cloud environments.

BuildKit

Advanced container image building toolkit offering improved performance and caching capabilities.

BuildKit for Advanced Image Building

Use of BuildKit for efficient, concurrent, and cache-optimized container image creation, improving build performance.

Bulkhead Pattern

Isolation technique in microservices to contain failures and prevent system-wide cascading failures.

Bulkhead Pattern in Microservices

The Bulkhead Pattern in microservices isolates failures by dividing services into separate compartments, preventing issues in one from affecting others.

Burstable QoS

Kubernetes quality of service class for pods that can use more resources than requested when available.

CIS Benchmarks for Containers

Security configuration guidelines for deploying containers securely in various environments.

CNI Plugin Chaining

Technique of using multiple Container Network Interface plugins together for advanced networking capabilities.

CPU Manager

Kubernetes feature for fine-grained CPU resource management and allocation to containers, optimizing performance.

CPU Throttling

Technique to limit CPU usage of containers to prevent resource monopolization and ensure fair allocation.

CQRS (Command Query Responsibility Segregation)

Architectural pattern separating read and write operations in distributed systems, often used in microservices.

CQRS (Command Query Responsibility Segregation) Pattern

Architectural pattern separating read and write operations in distributed systems, often used in microservices.

CRI (Container Runtime Interface) Specification

Standard interface between container runtimes and Kubernetes, allowing pluggable runtime implementations.

CRI Image Management

Functionality within CRI for pulling, inspecting, and removing container images, standardizing image operations.

CRI Logging

Standardized logging interface for container runtimes implementing the Container Runtime Interface.

CRI Metrics

Performance and resource usage data exposed by container runtimes adhering to the CRI specification.

CRI Runtime Class

Kubernetes feature allowing selection of different runtime configurations for containers, enabling specialized runtimes.

CRI Socket

Unix domain socket used for communication between Kubelet and the CRI-compatible container runtime.

CRI Validation Testing

Process of verifying that a container runtime correctly implements the CRI specification, ensuring compatibility.

CRI-O

Lightweight container runtime specifically designed for Kubernetes, implementing the CRI specification.

CRI-O Internals

Core components and architecture of the CRI-O container runtime, including its interaction with Kubernetes.

CRI-O as Container Runtime

Use of CRI-O, a lightweight container runtime, as the primary runtime in a Kubernetes cluster.

CSI Controller Plugin

Component of CSI responsible for volume provisioning and attachment operations in container orchestration systems.

CSI Drivers

Plugins implementing the Container Storage Interface for various storage systems in Kubernetes.

CSI Ephemeral Volumes

Short-lived volumes in Kubernetes, created and deleted alongside a pod using CSI drivers, for temporary storage.

CSI Migration

Process of transitioning from in-tree volume plugins to CSI drivers in Kubernetes, improving storage extensibility.

CSI Node Plugin

Component of CSI responsible for mounting volumes and making them available to containers.

CSI Topology

Feature allowing storage provisioning based on topology constraints in Kubernetes, optimizing data locality.

Cache-Aside Pattern

Caching strategy where the application checks the cache before retrieving data from the main data store.

Caching Strategies for Containers

Techniques for implementing and managing caches in containerized applications for improved performance.

Calico

Open-source networking and network security solution for containers, providing a rich set of security policies.

Calico eBPF Datapath

High-performance networking mode in Calico using extended Berkeley Packet Filter for packet processing.

Canary Deployments

Technique of releasing new versions to a subset of users or servers to minimize risk and gather feedback.

Capabilities

Fine-grained privileges that can be assigned to containers, enhancing security by limiting root-level access.

Capability Controls

Mechanisms for managing and restricting Linux capabilities assigned to containers for improved security.

Categories

Groupings or classifications of container-related resources or components for easier management and discovery.

Ceph RBD

Ceph's block storage system, often used for persistent volumes in container orchestration platforms.