Engineering Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.

DevOps
Git
Cloud Computing
Containerization & Orchestration

Out-of-the-Box

Feature or functionality that works immediately after installation without any modification.
DevOps

Out-of-the-Box Tools

Tools that are ready to use immediately without additional configuration or customization.
DevOps

Overcast

Tool for spinning up and tearing down multi-VM Vagrant environments, facilitating the creation of reproducible development setups.
DevOps

PCI Compliance

Adherence to the Payment Card Industry Data Security Standard for organizations that handle credit card information.
DevOps

PCI DSS

Payment Card Industry Data Security Standard; information security standard for organizations that handle credit card data.
DevOps

PaaS (Platform-as-a-Service)

Category of cloud computing services providing a platform for developers to build, run, and manage applications.
DevOps

Packer

Tool for creating identical machine images for multiple platforms from a single source configuration.
DevOps

Page Load Time

Duration it takes for a web page to fully load in a user's browser, a crucial metric for web performance and user experience.
DevOps

Pagerduty

Digital operations management platform that helps organizations respond to critical incidents and manage on-call schedules effectively.
DevOps

Pair Programming

Agile software development technique where two programmers work together at one workstation.
DevOps

Papertrail

Cloud-hosted log management service for collecting, analyzing, and storing logs from applications, servers, and devices.
DevOps

Passwordless Authentication

Security method that allows users to access systems without traditional passwords, often using biometrics or security tokens.
DevOps

Paved Road

Standardized set of tools and processes for software development within an organization.
DevOps

Pen Testing

Penetration Testing; authorized simulated cyberattack on a computer system to evaluate its security.
DevOps

Penetration Testing

Method of evaluating the security of a computer system or network by simulating an attack from malicious outsiders.
DevOps

Performance Testing

Process of determining the speed, responsiveness, and stability of a computer, network, software program or device under workload.
DevOps

Perimeter Security

Defense strategy focusing on securing the boundaries of an organization's network from external threats and unauthorized access.
DevOps

Persistent Volume Claim (PVC)

Kubernetes resource that requests specific storage resources, allowing pods to access persistent storage in a cluster.
DevOps

Personally Identifiable Information (PII)

Any data that could potentially identify a specific individual, subject to strict privacy and security regulations.
DevOps

Pets vs Cattle

Concept in DevOps where "pets" are unique, indispensable servers, while "cattle" are identical, replaceable instances.
DevOps

Pingdom

Website monitoring service that checks the availability and performance of websites and web applications, providing alerts and detailed reports.
DevOps

Pipeline

Series of automated processes for delivering software from development to production.
DevOps

Pipeline Management

Practice of overseeing and optimizing the processes involved in software delivery pipelines.
DevOps

Pivotal Cloud Foundry (PCF)

Open-source cloud application platform providing a choice of clouds, developer frameworks, and application services.
DevOps

Platform Engineering

Discipline of designing and building toolchains and workflows that enable self-service capabilities for software engineering organizations.
DevOps

Platform Team

Group responsible for building and maintaining the platform that other teams use to build and run applications.
DevOps

Platform as a Service (PaaS)

Cloud computing model where a third-party provider delivers hardware and software tools to users over the internet.
DevOps

Playbook

Pre-defined set of procedures to be carried out in response to specific DevOps events or incidents.
DevOps

Policy Decision Point (PDP)

Entity that makes authorization decisions for itself or other entities that request such decisions.
DevOps

Policy Enforcement Point (PEP)

Entity in a network that enforces security policies for resource access, typically working in conjunction with a Policy Decision Point.
DevOps

Policy as Code

Practice of defining and managing policies using code, enabling version control, automation, and consistent policy enforcement.
DevOps

Polymorphism

Ability of an object to take on many forms in object-oriented programming, enabling flexible and extensible code design.
DevOps

Poni

Tool for defining and running multi-container Docker applications, similar to Docker Compose but with additional features.
DevOps

Positive Security Model

Approach to security that specifies what is allowed and rejects everything else.
DevOps

Predictive Analytics

Use of data, statistical algorithms and machine learning techniques to identify the likelihood of future outcomes based on historical data.
DevOps

Private Cloud

Cloud computing services offered either over the Internet or a private internal network to select users.
DevOps

Product Owner

Person responsible for maximizing the value of the product resulting from the work of the development team.
DevOps

Production

Environment where software and other products are actually used by end users or consumers.
DevOps

Production Environment

Setting where software and other products operate to perform their intended functions for end users.
DevOps

Protected Health Information (PHI)

Any information about health status, provision of health care, or payment for health care that can be linked to a specific individual.
DevOps

Provisioning

Process of setting up IT infrastructure, including servers, networking, and storage.
DevOps

Provisioning Profile

File used to code sign iOS apps, containing information about the app ID, allowed devices, and other settings.
DevOps

ProxMox

Open-source server virtualization management platform that combines KVM hypervisor and LXC containers, offering a comprehensive solution.
DevOps

Public Cloud

Computing services offered by third-party providers over the public Internet, available to anyone who wants to use or purchase them.
DevOps

Pull Request (PR)

Mechanism in version control systems for notifying team members that a feature or fix is ready for review and integration.
DevOps

Pulp

Platform for managing repositories of software packages, facilitating the aggregation, mirroring, and distribution of software content.
DevOps

Puppet

Configuration management tool for centralizing and automating configuration management.
DevOps

Purple Team

Security team that functions as a combined red team (offensive) and blue team (defensive) to maximize effectiveness.
DevOps

Python

High-level, interpreted language known for readability and versatility, widely used in web development, data science, and other domains.
DevOps

Quality Gate

Set of threshold conditions that must be met in order to move on to the next stage in a software delivery process.
DevOps

Queue

Data structure that follows the First In First Out (FIFO) principle, commonly used in programming for task scheduling and data buffering.
DevOps

Quiescence

State of a system or component when it's inactive or in a state of rest, often used in database systems for consistent backups.
DevOps

Quota

Predefined limit on the amount of resources that can be consumed by a user, process, or system to prevent overuse and ensure fair allocation.
DevOps

RAML Files

RESTful API Modeling Language files used for describing RESTful APIs, facilitating API design and documentation.
DevOps

RASP (Runtime Application Self Protection)

Security technology that is built into an application to detect and prevent real-time attacks.
DevOps

RDS

Amazon Relational Database Service, a distributed relational database service by Amazon Web Services.
DevOps

RabbitMQ

Open source message broker software that implements the Advanced Message Queuing Protocol (AMQP).
DevOps

Radiator

Large, visible display of key project metrics and statuses, providing immediate feedback on the state of a project or system.
DevOps

Rate Limiting

Technique used to control the rate of requests sent or received by a network interface controller.
DevOps

React Native

Open-source mobile application development framework created by Facebook for building native apps using React and JavaScript.
DevOps

Real User Monitoring (RUM)

Passive monitoring technique that captures and analyzes every transaction of every user of a website or application.
DevOps

Real-time Big Data Analytics

Process of analyzing large volumes of data as it is generated, providing immediate insights for decision-making.
DevOps

Real-time Dashboard

Visual display providing immediate updates on key performance indicators and metrics for quick decision-making.
DevOps

Recovery with Rollforward

Technique in database systems to recover data by reapplying transactions from log files.
DevOps

Red Team

Group that plays the role of an adversary to provide security testing for an organization.
DevOps

Refactoring

Process of restructuring existing computer code without changing its external behavior.
DevOps

Regression Testing

Type of software testing to confirm that a recent program or code change has not adversely affected existing features.
DevOps

Release

Process of making a software product available for use, including planning, scheduling, and controlling the build through different stages.
DevOps

Release Automation

Use of automation in the software delivery process to deploy software across various environments.
DevOps

Release Management

Process of managing, planning, scheduling and controlling a software build through different stages and environments.
DevOps

Release Management Dashboard

Visual interface for tracking and managing software releases, providing insights into release progress and status.
DevOps

Release Orchestration

Coordination and management of complex software releases across multiple teams, tools, and environments.
DevOps

Release on Click by Business

Practice allowing business stakeholders to initiate releases with a simple action.
DevOps

Reliability

Ability of a system or component to perform its required functions under stated conditions for a specified period of time.
DevOps

Remote Code Execution (RCE)

Vulnerability that allows an attacker to run arbitrary code on a target machine.
DevOps

Render Time

Duration it takes for a browser to display the contents of a web page after receiving data from the server.
DevOps

Resilience

Ability of a system to withstand and recover from failures and disruptions, crucial for maintaining service availability.
DevOps

Response Time

Duration between a user's action and the system's reaction, a critical metric for measuring application performance and user experience.
DevOps

Rest API Security

Practices and measures taken to protect REST APIs from various security threats.
DevOps

Reverse Conway Maneuver

Organizational restructuring strategy aimed at aligning team structures with the desired software architecture.
DevOps

Rex

Configuration management and application deployment tool written in Perl, designed for simplicity and flexibility.
DevOps

Riemann

Monitoring system designed for distributed systems, focusing on collecting events from servers and applications for processing and analysis.
DevOps

Risk Assessment

Systematic process of evaluating potential risks and their impact on an organization, crucial for effective security management.
DevOps

Risk Management

Forecasting and evaluation of financial risks together with the identification of procedures to avoid or minimize their impact.
DevOps

Role-based Access Control (RBAC)

Approach to restricting system access to authorized users based on their role within an organization.
DevOps

Rollback

Process of restoring a database, program, or system to a previous state, often used when issues arise after an update or change.
DevOps

Rolling Deployments

Deployment strategy where new versions of an application are gradually rolled out to a subset of users.
DevOps

Rolling Update

Deployment strategy where an application's containers are updated in a rolling fashion, one after the other.
DevOps

Root Cause Analysis

Method of problem solving used for identifying the root causes of faults or problems.
DevOps

Rubberducking

Debugging technique where a programmer explains the code line-by-line to an inanimate object.
DevOps

Rudder

Open-source IT automation and compliance tool that helps manage large-scale, complex IT infrastructures across various environments.
DevOps

Run From Your Repository

Practice of executing code directly from a version control repository, often used in continuous integration workflows.
DevOps

Runbook

Compilation of routine procedures and operations that a system administrator or operator carries out.
DevOps

Runbooks

Collection of procedures and operations that describe how to run a computer system or network, crucial for IT operations.
DevOps

Rundeck

Open-source operations management and automation platform, designed to streamline routine and ad-hoc tasks across various systems.
DevOps

Runner

Component in CI/CD systems responsible for executing jobs and reporting results back to the CI/CD server, often customizable for different environments.
DevOps

S3 (Amazon Simple Storage Service)

Scalable object storage service from AWS, designed for durability, availability, and performance across various use cases.
DevOps

SAML

Security Assertion Markup Language; XML-based open-standard for exchanging authentication and authorization data.
DevOps

SAST

Static Application Security Testing; method of testing applications without executing them.
DevOps

SDK

Software Development Kit; set of software development tools for creating applications for a specific platform.
DevOps
@mention

@mention

A feature in Git platforms that allows users to notify specific team members or reference issues by using the @ symbol followed by a username.
API preview

API preview

A feature allowing developers to test and provide feedback on new Git API functionality before it's officially released.
Bare Repository

Bare Repository

A Git repository containing version control information without a working directory, typically used as a central repository for collaboration.
Bisect

Bisect

A Git command used to perform a binary search through a repository's history to identify the commit that introduced a bug or issue.
Bitbucket Pipelines

Bitbucket Pipelines

An integrated CI/CD service in Bitbucket for automating builds, tests, and deployments.
Blame

Blame

A Git feature that shows which user last modified each line of a file, helping developers trace changes and understand code history.
Blamestorming

Blamestorming

A collaborative process of analyzing Git blame information to identify the source of bugs or issues in a codebase.
Branch

Branch

A parallel version of a repository, allowing developers to work on different features or experiments without affecting the main codebase.
Branch policies

Branch policies

Rules enforced on Git branches to ensure code quality, require reviews, or restrict certain actions before merging.
Business plan

Business plan

A premium subscription tier offered by Git hosting services, providing advanced features and support for enterprise users.
CA certificate

CA certificate

A digital certificate issued by a Certificate Authority, used in Git to establish secure HTTPS connections and verify server identities.
Cache

Cache

A temporary storage area that holds frequently accessed data for quick retrieval, improving system performance.
Checkout

Checkout

A Git command used to switch between different branches or restore files from a specific commit in a repository's history.
Cherry-Pick

Cherry-Pick

A Git operation that applies the changes from a specific commit to the current branch, useful for selective code integration.
Cherry-picking

Cherry-picking

The practice of selecting and applying specific commits from one branch to another in Git, often used for targeted bug fixes.
Clone

Clone

The process of creating a local copy of a remote Git repository, allowing developers to work on the codebase independently.
Code owners file

Code owners file

A file specifying individuals or teams responsible for code in different parts of a repository.
Commit

Commit

Operation in version control systems that saves changes to the local repository, creating a new revision with a unique identifier.
Conflict

Conflict

A situation in Git where incompatible changes have been made to the same part of a file, requiring manual resolution before merging.
Continuous Integration

Continuous Integration

Practice of merging all developer working copies to a shared mainline several times a day.
DAG (Directed Acyclic Graph)

DAG (Directed Acyclic Graph)

Directed Acyclic Graph, the underlying data structure used by Git to represent the commit history and relationships between commits.
Detach HEAD

Detach HEAD

A Git operation that moves the HEAD pointer to a specific commit, allowing for temporary exploration of historical states.
Diff

Diff

A Git command or operation that shows the differences between two commits, branches, files, or other Git objects.
Downstream

Downstream

Refers to the direction of change propagation in Git, typically from a parent branch to its child branches or forks.
Explorer

Explorer

A feature in Git platforms for browsing repository contents, viewing files, and navigating through different branches.
Feature branch workflow

Feature branch workflow

A Git pattern where each new feature is developed in a dedicated branch, then merged back to the main branch.
Fetch

Fetch

A Git command that retrieves changes from a remote repository without automatically merging them into the local branch.
Force Push

Force Push

A Git push operation that overwrites the remote branch's history with the local branch, potentially causing data loss if used carelessly.
Fork

Fork

A personal copy of another user's repository on a Git hosting platform, allowing independent development without affecting the original project.
Free plan

Free plan

A no-cost tier offered by Git hosting services, typically with limited features and storage for individual users or small projects.
GPG (GNU Privacy Guard)

GPG (GNU Privacy Guard)

An encryption software used with Git for signing commits and tags, enhancing security and verification.
Gist

Gist

A simple way to share code snippets, notes, or small files using Git, often integrated into Git platforms.
Git

Git

Distributed version control system for tracking changes in source code during software development.
Git Alias

Git Alias

A custom shortcut command defined by users to simplify complex or frequently used Git operations.
Git Alternates

Git Alternates

A mechanism in Git allowing a repository to borrow objects from another repository, useful for saving disk space in large projects.
Git Annotate

Git Annotate

A Git command that shows the author and commit information for each line in a file, similar to the "blame" feature.
Git Assume Unchanged

Git Assume Unchanged

A Git feature that tells the system to temporarily ignore changes to a tracked file, useful for local configuration files.
Git Attributes

Git Attributes

A mechanism in Git for defining attributes on a per-path basis, controlling how Git handles certain files or directories.
Git Bisect

Git Bisect

A Git command used to perform a binary search through the commit history to find the commit that introduced a bug.
Git Bisect Run

Git Bisect Run

An automated version of Git Bisect that uses a script to determine if each checked-out commit is "good" or "bad".
Git Blame -C (Copy Detection)

Git Blame -C (Copy Detection)

An enhanced version of Git Blame that detects lines moved or copied from other files, providing better change tracking.
Git Bundle

Git Bundle

A Git command that creates a single file containing all the data needed to recreate a repository's branch or history.
Git Bundle Create/Verify

Git Bundle Create/Verify

Commands to create and verify Git bundles, useful for transferring repository data without using a network.
Git Cheat Sheet

Git Cheat Sheet

A quick reference guide summarizing common Git commands and their usage, helpful for both beginners and experienced users.
Git Cherry

Git Cherry

A Git command used to find commits that haven't been merged upstream, useful for identifying changes to be applied to another branch.
Git Clean

Git Clean

A command to remove untracked files from the working directory, helping to maintain a clean repository state.
Git Commit --amend

Git Commit --amend

A command that allows you to modify the most recent commit, adding new changes or updating the commit message.
Git Commit Amend

Git Commit Amend

A command that allows you to modify the most recent commit, changing its message or contents, and update it without creating a new commit.
Git Commit Hooks

Git Commit Hooks

Scripts that run automatically before or after a commit, allowing you to enforce rules, format code, or perform checks on changes.
Git Commit Templates

Git Commit Templates

Predefined structures for commit messages, helping maintain consistency and include necessary information in commits.
Git Commit Trailers

Git Commit Trailers

Metadata added to the end of commit messages, often used for things like issue references or sign-offs.
Git Commit-graph

Git Commit-graph

A file format used to store commit graph structure, improving performance for operations that traverse commit history.
Git Commit-graph Verify

Git Commit-graph Verify

A command to check the integrity and validity of the commit-graph file in a Git repository.
Git Commit-tree

Git Commit-tree

A low-level Git command used to create a new commit object from an existing tree object.
Git Config

Git Config

A command and system for setting configuration options for Git on a global, local, or repository level.
Git Count-objects

Git Count-objects

A diagnostic command that provides statistics about the number and size of objects in a Git repository.
Git Credential Helper

Git Credential Helper

A system that securely stores and retrieves credentials for Git operations, reducing the need for manual authentication.
Git Daemon

Git Daemon

A lightweight server for the Git protocol, allowing anonymous read access to Git repositories.
Git Dangling Objects

Git Dangling Objects

Objects in Git that are not reachable from any reference, often created during rebasing or other history-altering operations.
Git Describe

Git Describe

A command that generates a human-readable name for a commit based on the most recent tag and additional commit information.
Git Diff

Git Diff

A command that shows changes between commits, branches, files, or the working directory and the index.
Git Diff Algorithms

Git Diff Algorithms

Various methods used by Git to compute differences between versions of files, optimizing for different scenarios.
Git Diff Tool

Git Diff Tool

An external program or interface used to visualize differences between files or commits in a more user-friendly manner.
Git Fetch --All

Git Fetch --All

A command that fetches updates from all remote repositories configured in a Git project.
Git Filter-branch

Git Filter-branch

A powerful tool for rewriting Git history, allowing for large-scale changes across many commits.
Git Flow

Git Flow

A branching model for Git that defines a strict branching structure designed to support multiple parallel developments.
Git Fork

Git Fork

The process of creating a personal copy of someone else's project, allowing for independent development without affecting the original.
Git Fsck

Git Fsck

A command that verifies the connectivity and validity of objects in the Git database.
Git Fsck (File System Check)

Git Fsck (File System Check)

Verifies the integrity of objects in the Git database, checking for corruption and inconsistencies.
Git GPG verification

Git GPG verification

A security feature in Git that uses GPG to sign and verify commits and tags, ensuring authenticity.
Git Garbage Collection (gc)

Git Garbage Collection (gc)

A process that optimizes the Git repository by removing unnecessary files and compressing objects.
Git Gc (Garbage Collection)

Git Gc (Garbage Collection)

Short for Git Garbage Collection, a command to clean up unnecessary files and optimize the repository.
Git Grep

Git Grep

A command for searching files in a Git repository using regular expressions or simple string matching.
Git Hook

Git Hook

A script that Git automatically runs before or after specific events, like commits or merges, to customize workflows and enforce rules.
Git Hooks

Git Hooks

Same as Git Hook, scripts triggered by various Git actions to automate tasks or enforce policies.
Git Ignore

Git Ignore

A mechanism to specify intentionally untracked files that Git should ignore, typically defined in a .gitignore file.
Git Index Format

Git Index Format

The internal format used by Git to store the staging area information, representing the next commit to be made.
Git Init

Git Init

A command used to initialize a new Git repository, creating the necessary directory structure for version control.
Git Interactive Rebase

Git Interactive Rebase

A feature allowing users to modify commits in their branch history, useful for cleaning up before merging.
Git Internals (objects, refs, etc.)

Git Internals (objects, refs, etc.)

The underlying data structures and mechanisms Git uses to store and manage version control information.
Git Interpret-trailers

Git Interpret-trailers

A command to parse and manipulate the trailer lines typically found at the end of commit messages.
Git LFS (Large File Storage)

Git LFS (Large File Storage)

A system that manages large files by storing them outside the main repository, replacing them with lightweight pointers to improve performance and efficiency.
Git Large File Storage (LFS)

Git Large File Storage (LFS)

An extension that replaces large files with text pointers in Git, while storing the file contents on a remote server.
Git Log

Git Log

A command to display the commit history of a repository, showing details like author, date, and commit message.
Git Maintenance

Git Maintenance

A set of tasks performed to keep a Git repository in good condition, including garbage collection and optimization.
Git Merge Strategies

Git Merge Strategies

Different algorithms used by Git to combine separate development histories when merging branches.
Git Merge Tools

Git Merge Tools

External programs or interfaces used to resolve merge conflicts in a more visual and user-friendly manner.
Git Merge-base

Git Merge-base

A command that finds the best common ancestor between two commits, useful for determining the point where branches diverged.
Git Multi-pack Index (MIDX)

Git Multi-pack Index (MIDX)

A feature that improves performance for repositories with many pack files by creating an index across multiple packs.
Git Namespaces

Git Namespaces

A feature allowing multiple references (like branches or tags) with the same name to coexist by separating them into different namespaces.
Git Notes

Git Notes

A way to add or inspect object notes, allowing additional information to be attached to Git objects without changing their SHA-1 hash.
Git Object Storage

Git Object Storage

The system Git uses to store all the versions of files, commits, and other objects in a content-addressable filesystem.
Git Pack Files

Git Pack Files

Compressed files containing Git objects, used to efficiently store and transfer repository data.
Git Packfile Format

Git Packfile Format

The internal format used by Git to store multiple objects efficiently in a single file, reducing disk usage and improving performance.
Git Partial Clone

Git Partial Clone

A feature allowing users to clone a repository without downloading all of its objects, saving bandwidth and storage.
Git Patch

Git Patch

A file format representing changes between versions, used for sharing and applying modifications across different repositories.
Git Plumbing Commands

Git Plumbing Commands

Low-level Git commands that expose the internal workings of Git, primarily used for scripting and advanced operations.
Git Porcelain Commands

Git Porcelain Commands

User-friendly commands for everyday tasks, like git status and git commit, designed for ease of use and clear output.
Git Protocol

Git Protocol

The native network protocol used by Git for efficient data transfer between repositories.
Git Prune

Git Prune

A command that removes objects that are no longer reachable from any references in the repository.

Data Governance

Policies and processes for ensuring data quality, security, and compliance in cloud environments.

Data Integration as a Service

Cloud-based tools for combining data from various sources into a unified view, enabling comprehensive data analysis.

Data Lake

Centralized repository storing structured and unstructured data at scale in its native format.

Data Lake (e.g., AWS Lake Formation, Azure Data Lake)

Large-scale storage repository for raw data in various formats in cloud environments.

Data Lake Houses

Hybrid architecture combining data lake storage with data warehouse query capabilities in cloud environments.

Data Lineage

Tracking the origin, movement, and transformations of data throughout its lifecycle in cloud systems.

Data Lineage and Provenance Tracking

Monitoring data origins, transformations, and usage across cloud environments for compliance and analysis.

Data Mart

Subset of a data warehouse focused on specific business functions or departments in cloud environments.

Data Masking and Anonymization

Techniques to protect sensitive information by obscuring or replacing identifiable data in cloud storage.

Data Mesh Architecture

Decentralized approach to data management, treating data as a product owned by domain teams in cloud environments.

Data Mesh Platforms

Tools supporting implementation of data mesh principles in cloud-based data architectures.

Data Migration

Process of transferring data between storage types, formats, or systems in cloud environments.

Data Pipeline (e.g., AWS Data Pipeline, Azure Data Factory)

Automated process for extracting, transforming, and loading data between cloud systems or services.

Data Protection Impact Assessment (DPIA)

Systematic analysis of how data processing activities affect privacy in cloud environments.

Data Quality as a Service

Cloud-based tools for assessing, improving, and maintaining the quality of data assets.

Data Residency

Specifying the physical location where cloud-stored data resides for compliance with regulations.

Data Rights Management

Controls for protecting intellectual property and sensitive information in cloud-based data sharing.

Data Science Marketplaces

Platforms for sharing and monetizing data science models and algorithms in the cloud.

Data Science Version Control

Tools for tracking changes and collaborating on data science projects in cloud environments.

Data Skew Handling in Distributed Systems

Techniques for managing uneven data distribution in cloud-based parallel processing.

Data Sovereignty

Concept that data is subject to the laws of the country in which it is stored in cloud environments.

Data Tokenization Services

Cloud-based tools for replacing sensitive data with non-sensitive equivalents for security purposes.

Data Versioning and Time Travel

Capability to access and restore previous versions of data in cloud storage systems.

Data Virtualization

Technology that provides a unified view of data from multiple cloud and on-premises sources without moving it.

Data Visualization

Tools and techniques for creating visual representations of data stored in cloud environments.

Data Warehouse (e.g., Amazon Redshift, Azure Synapse Analytics)

Centralized repository optimized for analytics and business intelligence in cloud environments.

Data Warehousing

Process of collecting, storing, and managing data from varied sources in a central cloud repository for analysis.

Database Auditing

Monitoring and recording database activities in cloud environments for security and compliance purposes.

Database Backup and Restore

Process of creating copies of databases and recovering them in cloud environments for data protection.

Database Caching

Technique to store frequently accessed data in memory for faster retrieval in cloud databases.

Database Encryption

Process of encoding data to protect sensitive information in cloud-based databases.

Database Failover

Automatic switching to a redundant database when the primary system fails in cloud environments.

Database High Availability

Techniques ensuring continuous database operation in cloud environments, minimizing downtime.

Database Migration

Process of moving databases from on-premises or other cloud environments to a target cloud platform.

Database Migration Service

Managed service for migrating databases to cloud platforms with minimal downtime.

Database Performance Tuning

Optimizing database operations for improved speed and efficiency in cloud environments.

Database Proxy

Intermediary service managing connections between applications and cloud databases for improved security and performance.

Database Scaling (Vertical and Horizontal)

Adjusting database resources vertically (more powerful hardware) or horizontally (more instances) in cloud environments.

Database Sharding

Distributing data across multiple database instances for improved performance and scalability in the cloud.

Database Version Upgrades

Process of updating database software to newer versions in cloud environments, improving performance and security.

Database as a Service (DBaaS)

Managed cloud service providing database functionality without the need for infrastructure management.

Dead Letter Queues

Storage for messages that can't be processed successfully in cloud-based message queuing systems.

Decentralized Cloud (Web3)

Distributed cloud computing model leveraging blockchain technology for increased security and user control.

Decentralized Cloud Resource Markets

Blockchain-based platforms for trading compute resources across distributed cloud networks.

Decentralized Identity

Self-sovereign identity management using blockchain technology in cloud environments.

Decentralized Identity Management

Systems for user authentication and authorization using blockchain in cloud environments.

Decentralized Storage

Distributed file storage systems using peer-to-peer networks in cloud computing environments.

Deception Technology in the Cloud

Security approach using decoys to detect, deceive, and deflect attackers in cloud environments.

Declarative vs. Imperative IaC

Contrasting approaches to defining cloud infrastructure, focusing on desired state vs. step-by-step instructions.

Deep Learning

Subset of machine learning using neural networks with multiple layers for complex pattern recognition in cloud environments.

Deployment Automation

Tools and practices for automatically releasing and updating applications in cloud environments.

Deployment Manager (Google Cloud)

Service for declaratively managing and deploying cloud resources on Google Cloud Platform.

DevOps Assembly Lines

Automated, end-to-end pipelines for software delivery in cloud environments, streamlining development and deployment processes.

DevOps Culture and Practices

Collaborative approach integrating development and operations teams for efficient cloud-based software delivery.

DevOps Metrics and KPIs

Measurements for assessing the performance and efficiency of DevOps processes in cloud environments.

DevSecOps Automation

Integration of security practices into DevOps processes using automated tools in cloud environments.

DevSecOps Automation Platforms

Integrated tools for implementing security throughout the DevOps lifecycle in cloud environments.

Device Management

Tools and practices for configuring, monitoring, and securing IoT devices connected to cloud platforms.

Device Provisioning

Process of setting up and configuring IoT devices for secure connection to cloud platforms.

Differential Privacy as a Service

Cloud-based tools for adding noise to data to protect individual privacy while maintaining overall accuracy.

Digital Experience Monitoring (DEM)

Tools for tracking and optimizing user interactions with cloud-based applications and services.

Digital Twin Technology

Virtual representations of physical objects or systems, often leveraging cloud resources for simulation and analysis.

Digital Twins

Virtual models of physical assets or processes, often using cloud computing for data processing and simulation.

Digital Twins in the Cloud

Cloud-based virtual representations of physical entities for monitoring, simulation, and optimization.

Direct Connect

Dedicated network connection between on-premises infrastructure and cloud service providers.

Disaggregated Server Architectures

Cloud infrastructure designs separating compute, storage, and networking for flexible resource allocation.

Disaggregated Storage

Cloud storage architecture separating storage management functions from physical storage devices.

Disaster Recovery

Strategies and tools for recovering data and systems after a catastrophic event in cloud environments.

Distributed AI Training

Process of training machine learning models across multiple cloud nodes for improved speed and efficiency.

Distributed Cloud

Cloud services distributed across multiple physical locations but managed centrally.

Distributed Constraint Optimization

Techniques for solving complex problems across multiple cloud nodes while satisfying various constraints.

Distributed Data Science Workflows

Cloud-based systems for running data analysis and machine learning tasks across multiple nodes.

Distributed Deception Platforms

Cloud-based security systems deploying decoys across multiple points to detect and mislead attackers.

Distributed Edge AI Training

Process of training AI models across multiple edge devices and cloud resources, enabling decentralized learning at scale.

Distributed Hyperparameter Optimization

Technique for tuning machine learning models across multiple cloud nodes for improved performance.

Distributed Ledger Orchestration

Managing and coordinating blockchain networks across multiple cloud environments.

Distributed Tracing for Microservices

Tracking and analyzing requests as they flow through cloud-based microservices architectures.

Domain-Specific Languages (DSLs) for Cloud

Specialized programming languages designed for efficient cloud resource management and deployment.

Drift Detection

Monitoring and identifying unauthorized or unintended changes in cloud infrastructure configurations.

Durable Functions (Azure)

Extension of Azure Functions that enables stateful operations in serverless compute environments.

Dynamic Access Control

Adaptive security measures that adjust permissions based on context in cloud environments.

E-Waste Management for Cloud Infrastructure

Responsible disposal and recycling of outdated or decommissioned cloud hardware.

E-Waste Management in Cloud Computing

Strategies for sustainably disposing of and recycling obsolete cloud computing hardware.

ETL (Extract, Transform, Load)

Process of moving data from source systems into a data warehouse in cloud environments.

Eco-Friendly Cloud Migration Strategies

Approaches to moving to the cloud that minimize environmental impact and energy consumption.

Edge AI

Artificial intelligence algorithms running on devices at the network edge, often integrated with cloud backends.

Edge AI Model Compression Techniques

Methods for reducing the size of AI models to run efficiently on edge devices with cloud support.

Edge AI Model Versioning

Managing and updating AI model versions across distributed edge devices and cloud systems.

Edge AI Security

Measures to protect AI models and data on edge devices connected to cloud networks.

Edge AI/ML

Artificial intelligence and machine learning capabilities deployed on edge devices, often with cloud integration.

Edge Analytics

Processing and analyzing data near its source on edge devices before sending insights to the cloud.

Edge Analytics Frameworks

Software platforms for developing and deploying analytics applications on edge devices with cloud connectivity.

Edge Anomaly Detection

Identifying unusual patterns or behaviors in data at the network edge before sending alerts to the cloud.

Edge Caching

Storing frequently accessed data on edge devices or servers to reduce latency and cloud bandwidth usage.

Edge Compute Networking

Network architectures optimized for connecting edge computing devices to cloud resources.

Edge Computer Vision

Processing and analyzing visual data on edge devices before sending results to the cloud.

Edge Content Delivery

Distributing and caching content on edge servers to reduce latency and cloud bandwidth consumption.

Edge Databases

Database systems designed to run on edge devices with intermittent connectivity to cloud backends.

Edge Generative AI

Creating AI-generated content on edge devices with potential cloud-based model updates and synchronization.

Edge Inference Optimization

Techniques to improve AI model performance on edge devices, reducing latency and cloud dependence.

Extended Resources

Custom, cluster-level resources in Kubernetes that can be allocated to containers, such as GPUs or FPGAs.

Extender

Kubernetes component allowing custom logic to be added to the scheduling process for advanced pod placement strategies.

External Admission Webhooks

HTTP callbacks that receive admission requests and can modify or reject objects before persistence in Kubernetes.

External Secrets Management Integration

Incorporation of external secret management systems like HashiCorp Vault with container platforms.

ExternalName

Kubernetes service type that maps a service to a DNS name, useful for representing external services within a cluster.

ExternalName Services

Kubernetes services that reference external resources by DNS name, facilitating access to external dependencies.

FPGA Scheduling

Allocation and management of Field-Programmable Gate Arrays as resources in container orchestration platforms.

FaaS on Kubernetes

Implementation of Function-as-a-Service platforms on Kubernetes, enabling serverless architectures in container environments.

Falco

Open-source cloud-native runtime security project, providing real-time threat detection for containerized environments.

Falco for Runtime Security

Use of Falco to monitor and alert on unexpected behavior in running containers and Kubernetes clusters.

Fault Injection

Technique of intentionally introducing failures in containerized systems to test resilience and error handling capabilities.

Feature Gates

Flags in Kubernetes used to enable or disable specific features, allowing for fine-grained control over cluster functionality.

Federated Service Mesh

Implementation of service mesh across multiple Kubernetes clusters, enabling cross-cluster service communication.

Federation

Technique for managing multiple Kubernetes clusters from a single control plane, useful for multi-cloud or hybrid deployments.

Finalizers

Kubernetes feature allowing controllers to implement asynchronous pre-delete hooks, ensuring proper resource cleanup.

Finalizers in Operators

Use of finalizers in Kubernetes operators to perform cleanup operations before custom resource deletion.

Firecracker

Lightweight virtualization technology used for creating and managing secure, multi-tenant container environments.

Firecracker MicroVMs

Minimal virtual machines used by Firecracker to provide strong isolation for containers or functions.

Fission

Open-source, Kubernetes-native serverless framework for running functions, supporting multiple languages and event triggers.

Flagger

Progressive delivery tool for Kubernetes, automating canary releases and A/B testing of containerized applications.

Flannel

Network fabric for containers designed to give a consistent, easily configured layer 3 network across multiple hosts for Kubernetes.

Flannel for Simple Overlay Networking

CNI plugin providing a simple overlay network for container communication across hosts, enabling basic networking.

FlexVolume

Out-of-tree plugin mechanism in Kubernetes for interfacing with third-party storage systems, predating CSI.

FluentD

Open-source data collector for unified logging layer, enabling efficient data collection and consumption for better use of data.

Fluentd DaemonSet

Kubernetes deployment ensuring Fluentd log collectors run on every node for comprehensive log aggregation.

Fluentd Input Plugins

Modular components in Fluentd for ingesting logs from various sources in containerized environments.

Fluentd Output Plugins

Modular components in Fluentd for sending processed logs to various destinations from containerized environments.

Fluentd vs Fluent Bit

Comparison of two popular log processors for containerized environments, with Fluent Bit being more lightweight.

Flux CD

GitOps toolkit for deploying applications to Kubernetes, automating the deployment pipeline from Git repositories.

Flux v2

Next generation of Flux, providing a set of continuous delivery solutions for Kubernetes with improved modularity and features.

Function Autoscaling

Automatic adjustment of function instances based on demand in serverless container environments.

Function Buildpacks

Standardized way of building function containers, abstracting away infrastructure concerns for developers.

GPU Scheduling in Kubernetes

Process of allocating and managing GPU resources for containers running machine learning workloads.

Garden.io for Remote Kubernetes Development

Tool facilitating development and testing of Kubernetes applications in remote clusters.

Generic Ephemeral Volumes

Kubernetes feature allowing for dynamic provisioning of short-lived volumes for containers.

Geneve Overlay Networks

Network virtualization technology used in some container networking solutions for multi-tenant environments.

GitLab CI/CD

Integrated CI/CD platform with native container and Kubernetes support for building, testing, and deploying applications.

GitOps Toolkit

Set of composable APIs and specialized tools for building continuous delivery systems on top of Kubernetes.

GitOps Workflow

Operational model where the desired state of a Kubernetes cluster is version controlled and automated from a Git repository.

GlusterFS

Distributed file system that can be used for providing persistent storage to containerized applications in Kubernetes.

Go-based Operators

Kubernetes operators written in Go, leveraging the client-go library for interacting with the Kubernetes API.

Goldilocks for Resource Recommendation

Tool that provides recommendations for resource requests and limits for Kubernetes deployments.

Google Cloud Run

Managed compute platform for deploying containerized applications in a serverless environment.

Google Container Registry (GCR)

Managed Docker registry service by Google for storing, managing, and securing container images.

Grafana Dashboards

Customizable visualization panels for monitoring containerized environments and applications.

Grafana Data Sources

Configurable backends in Grafana for retrieving metrics and logs from various container monitoring systems.

Grafana Loki

Horizontally-scalable, multi-tenant log aggregation system designed for use in containerized environments.

Grafana Provisioning

Automated setup and configuration of Grafana dashboards and data sources in container deployments.

GraphQL in Containerized Environments

Implementation of GraphQL APIs in microservices architectures for flexible data querying and manipulation.

Guaranteed QoS

Kubernetes Quality of Service class ensuring pods receive the exact amount of requested resources, ideal for critical workloads.

Harbor

Open-source container registry providing content trust, vulnerability scanning, and RBAC for storing and distributing container images.

Harness CD

Continuous Delivery platform supporting various deployment strategies for containerized applications in Kubernetes environments.

Headless Services

Kubernetes services that don't allocate a cluster IP, used for direct pod-to-pod communication in stateful applications.

Helm

Package manager for Kubernetes that helps you define, install, and upgrade even the most complex Kubernetes applications.

Helm Charts

Packages of pre-configured Kubernetes resources, facilitating the deployment and management of complex applications.

Helm Hooks

Helm feature allowing custom actions to be performed at specific points in a release's lifecycle, enhancing deployment flexibility.

Helm Operator

Kubernetes operator that manages Helm releases, automating the deployment and lifecycle of Helm-based applications.

Helm Repositories

Storage locations for packaged Helm charts, enabling version control and distribution of containerized application configurations.

Helm Values

Mechanism in Helm for parameterizing chart templates, allowing for customization of deployments across different environments.

Helm-based Operators

Kubernetes operators leveraging Helm charts for managing the lifecycle of complex, stateful applications.

Hierarchical Namespaces

Kubernetes feature allowing nested namespaces, providing finer-grained resource isolation and multi-tenancy capabilities.

Horizontal Pod Autoscaler

Kubernetes controller that automatically adjusts the number of pods in a deployment based on observed metrics.

Horizontal Pod Autoscaler Metrics

Metrics used by HPA to determine when to scale containerized applications, including CPU, memory, and custom metrics.

Horizontal Pod Autoscaler with Custom Metrics

Extended HPA functionality allowing scaling decisions based on application-specific or external metrics.

HorizontalPodAutoscaler

Kubernetes resource defining the behavior for automatically scaling the number of pods in a replication controller or deployment.

Host Networking

Container networking mode where pods use the host's network namespace, bypassing virtual networks for improved performance.

HugePages

Linux kernel feature for managing large memory pages, improving performance for memory-intensive containerized applications.

IPVS

IP Virtual Server, a transport-layer load balancing technology used in Kubernetes for efficient service proxying and load distribution.

IPsec for Container Networks

Implementation of IPsec protocols to secure container-to-container communications across hosts and clusters.

IPv4/IPv6 Dual-Stack

Kubernetes feature enabling pods and services to be assigned both IPv4 and IPv6 addresses, facilitating transition to IPv6.

IPv6 in Kubernetes

Support and configuration for using IPv6 addressing in Kubernetes clusters, enabling large-scale container deployments.

Idempotent API Design

Approach to designing APIs that can be called multiple times without changing the result, crucial for reliable microservices.

Image

Lightweight, standalone, executable package that includes everything needed to run a piece of software.

Image Digests

Unique identifiers for container images, ensuring consistency and integrity across different environments and registries.

Image Index (Fat Manifest)

OCI specification for multi-architecture container images, allowing a single image to support multiple platforms.

Image Layer Caching

Technique for reusing unchanged layers when building or pulling container images, improving build and deployment speed.

Image Layer Optimization

Strategies for reducing the size and number of layers in container images, improving storage efficiency and pull times.

Image Manifest

Metadata file describing the contents and configuration of a container image, crucial for image distribution and deployment.

Image Manifest V2 Schema 2

Standardized format for container image manifests, supporting multi-architecture images and content-addressable layers.

Image Promotion

Process of moving container images through different environments (e.g., dev, staging, production) in a controlled manner.

Image Pulling

Process of downloading container images from a registry to a local environment or container runtime.

Image Pushing

Process of uploading locally built container images to a remote registry for distribution and deployment.

Image Retention Policies

Rules defining how long container images are kept in a registry, balancing storage costs with availability needs.

Image Scanning

Automated process of analyzing container images for vulnerabilities, misconfigurations, and compliance issues.

Image Signing

Cryptographic process of digitally signing container images to ensure their integrity and authenticity during distribution.

Image Signing and Verification

End-to-end process of cryptographically signing container images and verifying their authenticity before deployment.

Image Squashing

Technique of combining multiple layers of a container image into a single layer, potentially reducing image size and complexity.

Image Tagging

Process of assigning human-readable labels to container images, facilitating version management and deployment workflows.

Image Vulnerability Scanning

Automated security analysis of container images to identify known vulnerabilities in installed packages and dependencies.

ImageService

Component in container runtimes responsible for managing image-related operations like pulling, pushing, and local storage.

Immutable Infrastructure

Practice of replacing entire container instances instead of modifying existing ones, enhancing consistency and reliability.

Imperative Deployments

Approach to deploying containerized applications by directly specifying the desired actions, as opposed to declarative methods.

In-Memory Data Grids

Distributed data management systems optimized for high-performance data processing in containerized environments.

In-Place Upgrades

Technique for updating containerized applications or infrastructure components without full redeployment, minimizing downtime.

In-Tree Plugins

Built-in plugins in Kubernetes for various functionalities, as opposed to out-of-tree or external plugins.

Incremental Image Transfer (eStargz)

Technique for optimizing container image distribution by allowing partial and on-demand loading of image layers.

Infrastructure as Code (IaC) Testing

Automated testing of infrastructure definitions, ensuring consistency and reliability in container deployments.

Ingress

Kubernetes API object managing external access to services in a cluster, typically HTTP, providing load balancing and SSL termination.

Ingress Controllers

Components implementing the Ingress resource in Kubernetes, managing the routing of external traffic to internal services.

Ingress Gateway

Entry point for external traffic in service mesh architectures, providing routing, security, and observability for incoming requests.