Engineering Glossary

From fundamental principles to cutting-edge practices, this glossary covers the full spectrum of software engineering terminology.

DevOps
Git
Cloud Computing
Containerization & Orchestration

SIEM

Security Information and Event Management; provides real-time analysis of security alerts.
DevOps

SIEM Environment

Infrastructure and configuration supporting a Security Information and Event Management system for comprehensive security monitoring.
DevOps

SIEM Solutions

Software products providing security information and event management capabilities.
DevOps

SIEM Tools

Software used for collecting, analyzing, and reporting on log data for security purposes.
DevOps

SIEM-log

Log data specifically collected, analyzed, and managed within a Security Information and Event Management system for security monitoring.
DevOps

SLA (Service Level Agreement)

Contract between a service provider and customer defining expected service levels.
DevOps

SOAR

Security Orchestration, Automation and Response; platforms that enable organizations to collect security data and perform security operations.
DevOps

SOC

Security Operations Center; centralized unit dealing with security issues on an organizational and technical level.
DevOps

SQL Injection

Code injection technique used to attack data-driven applications by inserting malicious SQL statements into application queries.
DevOps

SQLi

Abbreviation for SQL Injection, a code injection technique used to attack data-driven applications by inserting malicious SQL statements.
DevOps

SSL Certificate

Digital document that authenticates a website's identity and enables encrypted connections between servers and browsers, ensuring secure data transmission.
DevOps

SSL Certificate Chain

Series of certificates needed to verify the authenticity of a website's SSL certificate.
DevOps

SSL Certificate Expiry

Date when an SSL certificate is no longer valid and needs to be renewed to maintain secure connections.
DevOps

SSL/TLS Handshake

Process by which a client and server establish a secure encrypted connection, crucial for secure data transmission over the internet.
DevOps

SaltStack

Python-based, open-source configuration management software and remote execution engine.
DevOps

Sanity Testing

Subset of regression testing to verify that code changes don't impact critical functionalities.
DevOps

Scalability

Ability of a system, network, or process to handle a growing amount of work or its potential to be enlarged.
DevOps

Scaled Agile Framework (SAFe)

Set of organization and workflow patterns for implementing agile practices at enterprise scale.
DevOps

Schatten-IT

German term for "Shadow IT"; IT systems deployed outside of the organization's formal IT department.
DevOps

Scrubbing Center

Facility used to filter malicious traffic from a network, often used in DDoS mitigation.
DevOps

Scrum

Agile framework for project management emphasizing iterative progress, team collaboration, and flexibility.
DevOps

SecOps

Practice of integrating security processes with IT operations, aiming to reduce vulnerabilities and improve overall system security.
DevOps

Secure SDLC

Software Development Life Cycle that integrates security at every stage of the development process.
DevOps

Security Analytics

Use of data collection, aggregation, and analysis tools for security monitoring and threat detection.
DevOps

Security Champions

Individuals within development teams who act as the first point of contact for security-related matters.
DevOps

Security Information and Event Management (SIEM)

System providing real-time analysis of security alerts generated by applications and network hardware.
DevOps

Security Intelligence

Evidence-based knowledge about existing or emerging threats to assets, crucial for effective cybersecurity strategies.
DevOps

Security Misconfiguration

Improper configuration of security controls, often leading to vulnerabilities and potential security breaches.
DevOps

Security Observability

Practice of gaining insight into the security posture of systems through the collection and analysis of security-relevant data.
DevOps

Security Operation Center (SOC)

Centralized unit dealing with security issues on an organizational and technical level.
DevOps

Security Posture

Overall security status of an organization's systems, networks, and data, reflecting its ability to protect from cyber threats.
DevOps

Security Remediation

Process of addressing and fixing identified security vulnerabilities or weaknesses in systems, applications, or networks.
DevOps

Security as Code

Practice of building and operating security controls as code to ensure consistent and repeatable security processes.
DevOps

Selbstheilende Systeme

German for "self-healing systems"; systems that can detect and recover from failures automatically.
DevOps

Selenium

Popular open-source tool for automating web browsers, primarily used for testing web applications across various platforms.
DevOps

Self-Healing Systems

Systems capable of detecting and recovering from failures without human intervention.
DevOps

Self-Service Deployment

Capability allowing users to deploy applications or services independently, without IT intervention.
DevOps

Semaphore

Lightweight, cloud-native continuous integration and delivery platform designed for speed and simplicity in software development workflows.
DevOps

Sensitive Data Exposure

Security vulnerability where an application does not adequately protect sensitive information from unauthorized access.
DevOps

Sensu

Open-source monitoring framework designed to empower organizations with flexible and scalable monitoring for their infrastructure and applications.
DevOps

Sequencer

Tool used in network security for analyzing and manipulating network protocols, often employed in penetration testing and vulnerability assessment.
DevOps

Serf

Decentralized solution for cluster membership, failure detection, and orchestration, designed for service discovery and orchestration.
DevOps

Server Monitoring

Process of reviewing and analyzing a server for availability, operations, performance, security and other operations-related processes.
DevOps

Serverless

Cloud computing execution model where the cloud provider manages server infrastructure.
DevOps

Serverless Computing

Cloud computing model where the cloud provider manages server infrastructure, allowing developers to focus solely on code.
DevOps

Serverless Framework

Open-source tool for building and deploying serverless applications across various cloud providers, simplifying serverless development.
DevOps

Serverless Monitoring

Process of observing and managing the performance, availability, and cost of serverless applications and functions.
DevOps

Service Level Agreement (SLA)

Contract between a service provider and the end user defining the expected level of service.
DevOps

Service Level Indicator (SLI)

Quantitative measure of the level of service provided, used to evaluate whether a Service Level Objective is being met.
DevOps

Service Level Indicators (SLIs)

Quantitative measures of the level of service provided, used to evaluate whether Service Level Objectives are being met.
DevOps

Service Level Objective (SLO)

Target value or range of values for a service level that is measured by one or more Service Level Indicators.
DevOps

Service Mesh

Infrastructure layer for facilitating service-to-service communications between microservices.
DevOps

Service Reliability

Measure of a service's ability to perform its intended function consistently and without failure.
DevOps

Service Virtualisation

Practice of simulating the behavior of system components to enable continuous testing.
DevOps

Shadow APIs

Undocumented or unofficial APIs within an organization that may pose security risks or lead to inefficiencies if not properly managed.
DevOps

Shadow CD

Unofficial or unapproved continuous delivery practices within an organization, potentially bypassing established processes.
DevOps

Shadow IT

IT systems and solutions built and used inside organizations without explicit approval.
DevOps

Shared Responsibility Model

Cloud security framework that delineates security obligations of a cloud provider and its users.
DevOps

Shift Left

Practice of moving testing, quality, and performance evaluation earlier in the development process.
DevOps

Shift Right

Practice of extending testing and quality assurance into production environments.
DevOps

Shift-Left Security

Practice of integrating security earlier in the software development lifecycle, improving overall application security.
DevOps

Shift-Left Testing

Practice of performing testing earlier in the software development lifecycle to catch and fix issues sooner.
DevOps

Shift-Right Testing

Approach that extends testing into production environments, allowing for real-world validation and continuous improvement.
DevOps

SignalFx

Cloud monitoring and observability platform for infrastructure, microservices, and applications, enabling real-time analytics.
DevOps

Siloed Security

Approach where security is treated as a separate concern, not integrated with development and operations.
DevOps

Simian Army

Suite of tools created by Netflix to test the resiliency of its AWS infrastructure.
DevOps

Single Branch Development

Development practice where all work is done on a single branch in version control.
DevOps

Site Reliability Engineer (SRE)

IT professional who combines software and systems engineering to create scalable and reliable software systems.
DevOps

Site Reliability Engineering (SRE)

Discipline that incorporates aspects of software engineering and applies them to infrastructure and operations problems.
DevOps

Sitex

Tool for automating the setup and teardown of temporary environments, useful for testing and development purposes.
DevOps

Six Nines

Explore the pinnacle of system reliability: "six nines" uptime. Discover what 99.9999% availability means, its rarity, and the extreme measures required to achieve this DevOps feat.
DevOps

Slaughter

System administration tool designed for automating repetitive tasks across multiple servers, improving efficiency and consistency in IT operations.
DevOps

Smoke Testing

Preliminary testing to reveal simple failures severe enough to reject a prospective software release.
DevOps

Snapshot

Capture of the state of a system at a particular point in time, often used for backups.
DevOps

Snort

Open-source network intrusion detection and prevention system, capable of real-time traffic analysis and packet logging on IP networks.
DevOps

Soak Testing

Testing to determine system performance over an extended period of continuous use.
DevOps

Software Composition Analysis (SCA)

Model of software delivery where software is licensed on a subscription basis and centrally hosted.
DevOps

Software Deployment

Process of making software available and ready for use in a specific environment, including installation and configuration.
DevOps

Software Development Lifecycle (SDLC)

Structured process for planning, creating, testing, deploying, and maintaining software applications.
DevOps

Software Lifecycle

Entire process of software development from inception to retirement, including planning, development, testing, deployment, and maintenance.
DevOps

Software Stack

Set of software subsystems or components needed to create a complete platform for developing and running applications.
DevOps

Software as a Service (SaaS)

Model of software delivery where software is licensed on a subscription basis and centrally hosted.
DevOps

Source Control

Management of changes to documents, programs, and other information stored as computer files.
DevOps

Spaghetti Code

Code that is hard to read, understand, or maintain due to its complex and tangled structure.
DevOps

Spike Testing

Testing to determine how a system behaves under a sudden large increase in load.
DevOps

Sprint

Time-boxed iteration in Agile methodologies, typically 1-4 weeks long, during which a potentially shippable product increment is created.
DevOps

StackStorm

Open-source automation platform that connects all your apps, services, and workflows, enabling auto-remediation and security responses.
DevOps

Staging Environment

Pre-production environment that closely mimics the production environment, used for final testing before deployment.
DevOps

Standard Operating Procedures (SOPs)

Established procedures to be followed in carrying out a given operation or situation.
DevOps

Static Application Security Testing (SAST)

Process of analyzing source code to identify security vulnerabilities without executing the program.
DevOps

Status Page

Webpage displaying the current state of system's services and any known issues, crucial for transparent communication.
DevOps

Step

Individual task or action within a larger process or workflow, often used in the context of CI/CD pipelines or automation scripts.
DevOps

Strangler Fig Pattern

Technique for gradually migrating a legacy system by replacing pieces of functionality with new applications and services.
DevOps

Stream-aligned Team

Team organized around the flow of work, capable of delivering value directly to customers or users.
DevOps

Streamline Releases

Process of optimizing and simplifying the software release cycle to increase efficiency and reduce time-to-market.
DevOps

Structured Logging

Practice of implementing a consistent, predetermined message format for application logs.
DevOps

Stubs

Pieces of code used to stand in for some other programming functionality, often used in testing to simulate complex objects or processes.
DevOps

Sublime Text

Sophisticated text editor for code, markup, and prose, known for its speed, cross-platform support, and powerful features.
DevOps

SumoLogic

Cloud-native, machine data analytics platform that helps organizations gain real-time insights from logs, metrics, and other machine data.
DevOps

Sunzi

Lightweight server provisioning tool that simplifies the process of setting up and configuring servers using simple YAML files.
DevOps
Pull Request

Pull Request

A method of submitting contributions to a Git project, proposing changes from a forked repository or branch.
Pull request templates

Pull request templates

Customizable files that automatically populate the body of new pull requests, guiding contributors.
Pull/Pull Request

Pull/Pull Request

Alternative terms for the same concept of proposing and reviewing changes in Git-based collaboration.
Push

Push

A Git command used to upload local repository changes to a remote repository, sharing updates with collaborators.
README

README

A file in a Git repository that provides information about the project, its purpose, and how to use or contribute to it.
Rebase

Rebase

A Git operation that moves or combines a sequence of commits to a new base commit, often used to maintain a linear history.
Rebase Interactive

Rebase Interactive

A Git rebase mode allowing users to modify, reorder, or squash commits before applying them to the target branch.
RefLog

RefLog

A Git mechanism that records updates to branch tips and other references in a repository.
Refspec

Refspec

A string that specifies the mapping between remote and local references when fetching or pushing in Git.
Release branching

Release branching

A strategy where a separate branch is created for release preparation, allowing continued development on the main branch.
Remote

Remote

A Git repository hosted on a server, allowing collaboration and synchronization between multiple developers.
Repository

Repository

Centralized location where software packages or modules are stored and managed, facilitating version control and collaboration.
Repository ("Repo")

Repository ("Repo")

A data structure containing all the files, history, and metadata for a Git-managed project.
SCM

SCM

Source Control Management, a system for tracking and managing changes to code, of which Git is an example.
SHA-1

SHA-1

The cryptographic hash function used by Git to generate unique identifiers for objects in the repository.
SSH key

SSH key

A secure authentication method using a pair of cryptographic keys for accessing remote systems or services.
Shallow Clone

Shallow Clone

A Git clone that only fetches a limited number of recent commits, reducing download size for large repositories.
Squash

Squash

The process of combining multiple commits into a single commit in Git, often used to simplify history.
Staging

Staging

The process of preparing changes to be committed in Git, also known as "adding to the index."
Stash

Stash

A Git feature for temporarily storing uncommitted changes, allowing you to switch branches without committing work in progress.
Stashing

Stashing

A Git feature for temporarily saving uncommitted changes, allowing you to switch contexts without committing incomplete work.
Status

Status

A Git command that shows the state of the working directory and staging area, indicating which files are modified or staged.
SubModule

SubModule

A Git repository nested within another repository, allowing you to include external projects in your own project.
Tag

Tag

A named reference to a specific point in Git history, typically used to mark release points or important milestones.
Team plan

Team plan

A subscription level for GitHub designed for collaborative groups or small organizations.
Upstream

Upstream

The original repository from which a fork is created, or the branch that a local branch is tracking.
Upstream and Downstream

Upstream and Downstream

Terms describing the flow of changes in Git, with upstream being the source and downstream the destination.
Work in Progress (WIP) Commit

Work in Progress (WIP) Commit

A temporary commit indicating unfinished work, often used to save progress or facilitate code reviews.
access token

access token

A secure alternative to passwords, used for authentication in Git operations, providing limited access to specific resources or actions.
alternate object database

alternate object database

A secondary location where Git stores object files, useful for optimizing storage and performance in large repositories.
appliance

appliance

A dedicated hardware or virtual machine optimized for running Git services, often used in enterprise environments for improved performance.
assignee

assignee

The person responsible for addressing an issue or pull request in a Git repository, helping to organize and prioritize tasks.
authentication code

authentication code

A temporary code used in two-factor authentication to verify a user's identity when accessing Git repositories or services.
base branch

base branch

The primary branch in a Git repository from which feature branches are created and into which they are merged after development.
basic authentication

basic authentication

A simple authentication method in Git using a username and password, often discouraged in favor of more secure methods.
billing cycle

billing cycle

The recurring period for which Git hosting services charge users or organizations for their subscriptions and usage.
billing email

billing email

The email address associated with a Git account or organization for receiving invoices and billing-related communications.
billing manager

billing manager

A user role in Git hosting platforms responsible for managing billing information, subscriptions, and payments for an organization.
billing plan

billing plan

A subscription package offered by Git hosting services, defining features, storage limits, and pricing for users or organizations.
bio

bio

A brief description of a user's profile on Git platforms, typically including their role, interests, or expertise in software development.
blob object

blob object

A Git object type representing the contents of a file, stored as a sequence of bytes without any metadata or file attributes.
block

block

An action on Git platforms to restrict a user's ability to interact with a repository, often used to manage disruptive behavior.
branch restriction

branch restriction

A set of rules applied to Git branches to control who can push changes, merge, or perform certain actions, enhancing code quality.
cURL

cURL

A command-line tool often used with Git to transfer data and interact with APIs, supporting various protocols including HTTPS.
card

card

A visual representation of an issue or pull request in Git project management tools, used for organizing and prioritizing work.
chain

chain

A series of connected commits in Git, representing a sequence of changes that build upon each other in a repository's history.
changeset

changeset

A group of changes made to files in a Git repository, typically represented by a commit and including additions, modifications, and deletions.
check

check

An automated test or verification process run on Git repositories to ensure code quality, security, or compliance with project standards.
child team

child team

A nested team within a Git organization's hierarchy, inheriting permissions and access rights from its parent team.
clean

clean

A Git command used to remove untracked files and directories from a working directory, helping to maintain a tidy repository.
clustering

clustering

A technique used in Git hosting services to distribute repository data across multiple servers for improved performance and reliability.
code frequency graph

code frequency graph

A visual representation of code additions and deletions over time in a Git repository, useful for tracking project activity.
code of conduct

code of conduct

A document outlining expected behavior and guidelines for contributors in a Git repository, promoting a positive community.
code owner

code owner

A designated person or team responsible for reviewing and approving changes to specific files or directories in a Git repository.
collaborator

collaborator

A user with read and write access to a Git repository, able to contribute code and participate in project discussions.
commit ID

commit ID

A unique identifier (SHA-1 hash) assigned to each commit in Git, used to reference specific points in a repository's history.
commit author

commit author

The person who originally created a commit in Git, distinct from the committer who may have applied the changes on behalf of the author.
commit graph

commit graph

A visual representation of the commit history in a Git repository, showing the relationships between different branches and merges.
commit graph concept, representations and usage

commit graph concept, representations and usage

The underlying structure and visual representations of Git's commit history, used for understanding project evolution.
commit message

commit message

A descriptive text associated with a Git commit, explaining the purpose and details of the changes made in that commit.
commit object

commit object

A Git object type containing metadata about a commit, including the author, committer, date, and a pointer to the tree object.
commit-graph file

commit-graph file

A file used by Git to store commit graph information, optimizing performance for operations that traverse the commit history.
commit-ish (also committish)

commit-ish (also committish)

A term referring to any Git object that can be resolved to a commit, including commit IDs, branch names, and tags.
compare branch

compare branch

A Git feature allowing users to view differences between two branches, often used before merging to review changes.
contribution graph

contribution graph

A visual representation of a user's Git activity over time, showing the frequency and distribution of their contributions to repositories.
contribution guidelines

contribution guidelines

A document in a Git repository outlining best practices, coding standards, and procedures for contributors to follow when submitting changes.
contributions

contributions

The collective changes, commits, issues, and pull requests made by a user to Git repositories, showcasing their involvement in projects.
contributor

contributor

Any person who has made contributions to a Git repository, whether through code, documentation, or other forms of project support.
contributors graph

contributors graph

A visual representation of all contributors to a Git repository, showing their relative contributions over time and by type.
core Git

core Git

The fundamental set of Git commands and functionality, excluding third-party extensions or hosting platform-specific features.
coupon

coupon

A promotional code offering discounts or credits for Git hosting services, often used to attract new users or upgrade existing accounts.
cron

cron

A time-based job scheduler used in Git hosting platforms to automate tasks such as backups, notifications, or periodic code checks.
dangling object

dangling object

A Git object not reachable from any reference (branch, tag, etc.), often created during rebasing or other history-altering operations.
dashboard

dashboard

A central interface in Git platforms providing an overview of a user's repositories, activities, and notifications.
default branch

default branch

The primary branch in a Git repository, typically named "main" or "master," serving as the base for new branches and deployments.
dependency graph

dependency graph

A visual representation of a project's dependencies, showing relationships between different components or external libraries.
dependents graph

dependents graph

A visualization of other projects or repositories that depend on a given Git repository, useful for understanding its impact.
deploy key

deploy key

An SSH key granting read-only access to a specific Git repository, commonly used for automated deployments or CI/CD processes.
dereference

dereference

The process of resolving a Git reference (like a branch or tag) to its corresponding commit object or SHA-1 hash.
detached HEAD

detached HEAD

A state in Git where the HEAD pointer references a specific commit rather than a branch, often used for temporary work.
diagnostics

diagnostics

Tools and features in Git used to identify and troubleshoot issues with repositories, commits, or configuration settings.
directory

directory

A folder within a Git repository containing files and potentially other subdirectories, organized hierarchically.
dirty

dirty

A term describing a Git working directory that contains uncommitted changes, indicating modifications that haven't been saved to the repository.
email notifications

email notifications

Alerts sent via email by Git platforms to inform users about repository activities, mentions, or updates.
enterprise account

enterprise account

A high-tier account type offered by Git hosting services, providing advanced features and support for large organizations.
evil merge

evil merge

A problematic merge in Git where conflicts are resolved incorrectly, potentially introducing subtle bugs or inconsistencies.
fast-forward

fast-forward

A type of Git merge where the target branch's pointer is simply moved to the latest commit of the source branch, without creating a new commit.
feature branch

feature branch

A temporary branch in Git created to develop a specific feature or fix, typically merged back into the main branch upon completion.
fenced code block

fenced code block

A markdown syntax used in Git documentation and comments to display formatted code snippets with syntax highlighting.
file system

file system

The underlying structure used by Git to store repository data, including objects, refs, and configuration files.
following (users)

following (users)

A feature in Git platforms allowing users to receive updates and notifications about other users' activities.
gitfile

gitfile

A file containing a Git repository's object database, used in certain Git operations.
gitignore

gitignore

A text file specifying intentionally untracked files that Git should ignore, customizable for different project types.
graft

graft

A technique in Git to join two unrelated commit histories, typically used for repository repair or history modification.
hash

hash

A unique identifier (SHA-1) for Git objects, used to ensure data integrity and create content-addressable storage.
head branch

head branch

The default branch that is checked out when a repository is cloned, typically 'main' or 'master'.
head ref

head ref

A reference to the tip of a branch, representing the most recent commit in that branch's history.
high-availability

high-availability

A characteristic of Git hosting systems designed to ensure continuous operation and minimal downtime.
hook

hook

A script that Git executes before or after events such as commit, push, and receive, used for automating or controlling Git processes.
hostname

hostname

The unique name assigned to a device on a network, used for identification and communication purposes.

Serverless Computing (e.g., AWS Lambda, Azure Functions)

Cloud execution model where providers manage infrastructure, automatically scaling resources as needed.

Serverless Containers

Container-based applications run on serverless platforms, combining containerization with auto-scaling.

Serverless Cost Optimization

Strategies to minimize expenses in serverless architectures while maintaining performance.

Serverless Data Analytics

Processing and analyzing data using serverless compute resources in the cloud, providing scalable and cost-effective insights.

Serverless Data Processing

Handling and transforming data using auto-scaling, event-driven cloud services, eliminating infrastructure management overhead.

Serverless Databases

Fully managed database services that scale automatically based on demand, eliminating the need for manual provisioning and management.

Serverless DevOps

Practices combining serverless architectures with DevOps principles for efficient cloud development.

Serverless ETL

Extract, Transform, Load processes using serverless compute for data integration in the cloud.

Serverless Integration

Connecting applications and data sources using serverless compute in cloud environments.

Serverless Microservices

Building application components as independent, auto-scaling functions in the cloud.

Serverless Networking

Network management and routing tailored for serverless architectures in cloud environments.

Serverless Resource Optimization

Techniques for efficient use of compute, storage, and network resources in serverless systems.

Serverless Security

Protecting serverless applications from vulnerabilities and attacks in cloud environments.

Serverless Security Frameworks

Tools and practices for implementing security in serverless cloud architectures.

Serverless Security Platforms

Comprehensive solutions for protecting serverless applications and data in the cloud.

Serverless Web Applications

Websites built and hosted using serverless cloud services for automatic scaling.

Serverless Workflows

Orchestrating sequences of serverless functions to create complex, scalable processes.

Service Control Policies (AWS)

Rules for managing permissions in AWS Organizations across multiple accounts, enforcing security and compliance standards.

Service Discovery

Automated detection of services and their network locations in cloud environments.

Service Level Objectives (SLOs)

Targets for service performance and availability in cloud environments, defining quality standards for cloud services.

Service Mesh Control Plane

Central component managing configuration and policies in a service mesh architecture.

Service Mesh Data Plane

Component handling inter-service communication in a service mesh architecture, managing traffic flow and security.

Service Mesh Interface

Standardized APIs for interacting with service mesh technologies in cloud environments.

Service Mesh Observability

Monitoring and analyzing traffic and behavior within a service mesh architecture.

Service Mesh Security

Protecting inter-service communication within a service mesh in cloud environments.

Sharding

Distributing data across multiple database instances to improve performance and scalability in cloud environments.

Showback and Chargeback

Systems for tracking and allocating cloud resource costs within an organization.

Sidecar Pattern

Deploying components of an application as separate containers alongside the main container in cloud environments.

Sidecars

Helper containers deployed alongside main application containers to provide additional functionality in cloud environments.

Silicon Photonics in Cloud Networking

Using light-based chips for high-speed data transmission in cloud data centers, improving network performance and efficiency.

Site Reliability Engineering (SRE) Platforms

Tools for implementing SRE practices in cloud environments, focusing on automation and reliability.

Smart Contract Platforms

Cloud-based systems for creating, deploying, and managing self-executing digital contracts.

Software-Defined Networking (SDN)

Approach to cloud network management using software-based controllers instead of hardware.

Software-Defined Power Distribution

Managing and optimizing power allocation in cloud data centers through software control.

Software-Defined Storage (SDS)

Abstracting storage services from underlying hardware in cloud environments for flexible management.

Software-Defined Wide Area Network (SD-WAN)

Technology for efficiently routing traffic between cloud and on-premises resources.

Spatial Computing

Integrating digital information with the physical world in cloud-based augmented and virtual reality systems.

Spatial Databases

Cloud databases optimized for storing and querying location-based data, essential for geospatial applications and analytics.

Speech Recognition

Cloud-based service for converting spoken language into text, enabling voice-controlled interfaces and transcription.

Spot Instance Management

Strategies for efficiently using and monitoring discounted, interruptible cloud compute resources.

Spot Instance Management Platforms

Tools for optimizing the use of discounted, interruptible cloud compute resources.

Spot Instance Optimization

Techniques for maximizing cost savings and availability when using discounted, interruptible cloud resources.

Spot Instances

Discounted, interruptible cloud compute resources available for bidding, offering cost savings for flexible workloads.

State Management

Techniques for maintaining application data consistency in distributed cloud environments.

Stateful Serverless Computing

Serverless architectures that maintain state between function invocations in the cloud.

Stateless Functions

Cloud-based functions that don't retain state between invocations, enhancing scalability.

Step Functions (AWS)

AWS service for coordinating multiple Lambda functions into serverless workflows.

Storage Class Memory (SCM)

High-performance, low-latency memory technology bridging DRAM and SSDs in cloud infrastructure.

Storage QoS (Quality of Service)

Mechanisms to ensure consistent performance levels for storage resources in cloud environments.

Storage Tiering Optimization

Automatically moving data between storage tiers based on access patterns to balance cost and performance.

Stream Processing (e.g., Amazon Kinesis, Azure Stream Analytics)

Real-time analysis of continuously flowing data in cloud environments, enabling instant insights and rapid decision-making.

Stream Processing at Scale

Handling and analyzing large volumes of real-time data streams in cloud environments.

Streaming SQL Engines

Cloud-based systems for querying continuous data streams using SQL-like syntax, enabling real-time data analysis.

Subnet

Segmented portion of a cloud network with its own IP address range, allowing for improved security and traffic management.

Sustainability Reporting Platforms

Tools for tracking and reporting environmental metrics of cloud resource usage, promoting eco-friendly cloud computing.

Sustainability Reporting for Cloud Services

Documenting environmental impact and energy efficiency of cloud operations, promoting transparency and accountability.

Sustainability-Aware Resource Scheduling

Allocating cloud resources with consideration for environmental impact, optimizing for energy efficiency.

Sustainability-Driven Optimization

Improving cloud resource efficiency to minimize environmental impact while maintaining performance and reliability.

Sustainable Cloud Computing

Practices and technologies minimizing the environmental impact of cloud operations.

Sustainable Cloud Migration

Moving to the cloud with strategies to minimize environmental impact, optimizing resource usage and energy efficiency.

Sustainable Data Center Design

Creating cloud facilities with minimal environmental impact and maximum energy efficiency.

Swarm Intelligence for Cloud Optimization

Using collective behavior algorithms to optimize cloud resource allocation, improving efficiency and performance.

Swarm Robotics in the Cloud

Coordinating multiple robots using cloud-based swarm intelligence algorithms, enabling scalable and adaptive robotic systems.

Synthetic Data Generation

Creating artificial datasets for testing and development in cloud environments, preserving privacy and expanding data availability.

Synthetic Media Generation Platforms

Cloud services for creating AI-generated images, videos, and audio, enabling content creation at scale.

Tactile Internet Interfaces

Ultra-low latency network interfaces for real-time tactile feedback in cloud applications.

Tagging Strategies

Methods for labeling cloud resources to improve organization, management, and cost allocation.

Telco Cloud

Cloud infrastructure specifically designed for telecommunications service providers.

Telepresence Robotics Control Systems

Cloud-based platforms for remotely operating robots with real-time feedback, enabling distant manipulation and interaction.

Text-to-Speech

Cloud service converting written text into spoken words, often used in accessibility and voice interface applications.

Time Series Forecasting as a Service

Cloud-based predictive analytics for time-dependent data, used for trend analysis and future projections.

Time-Series Databases

Cloud databases optimized for storing and querying time-stamped data, essential for IoT and monitoring applications.

TinyML

Deploying machine learning models on resource-constrained IoT devices connected to the cloud.

Tokenization Services

Cloud-based tools for replacing sensitive data with non-sensitive tokens to enhance security.

Total Cost of Ownership (TCO)

Comprehensive assessment of direct and indirect costs associated with cloud adoption and usage.

Transfer Learning

Technique of using pre-trained AI models for new tasks, reducing training time and data requirements in the cloud.

Transit Gateway

Cloud networking service that connects VPCs, on-premises networks, and other cloud services.

Twelve-Factor App Methodology

Set of best practices for building scalable, maintainable cloud-native applications.

Unikernels

Lightweight, single-purpose machine images for running cloud applications with minimal overhead.

Unit Economics in the Cloud

Analysis of costs and revenues associated with individual cloud service units or transactions.

Universal Cloud API Standards

Efforts to create standardized interfaces for interacting with various cloud services.

VPN Connection

Secure, encrypted link between a local network and cloud resources, enabling private access to cloud services over public networks.

VR Streaming

Cloud-based delivery of virtual reality content to end-user devices, enabling immersive experiences without local processing.

Vector Databases

Cloud databases optimized for storing and querying high-dimensional vector data, often used in AI applications.

Version Control in the Cloud

Managing and tracking changes to code and configurations in cloud-based repositories.

Vertical Scaling (Scale Up)

Increasing the capacity of a single cloud resource by adding more power (CPU, RAM, etc.).

Virtual Cloud Network (VCN)

Software-defined network providing connectivity for cloud resources, enabling secure and flexible communication.

Virtual Environments as a Service

Cloud-based platforms offering customizable, isolated development and testing environments.

Virtual Machines (e.g., Amazon EC2, Azure Virtual Machines)

Emulations of computer systems providing scalable, isolated environments in the cloud.

Virtual Network Appliances

Software-based network devices deployed in cloud environments for various networking functions.

Virtual Network Functions (VNF)

Software implementations of network functions running on cloud infrastructure, replacing traditional hardware appliances.

Virtual Reality (VR) Cloud

Cloud-based services for creating, rendering, and delivering virtual reality experiences.

Virtual Reality Cloud Workspaces

Cloud-hosted VR environments for collaborative work and data visualization, enabling immersive remote collaboration.

Voice User Interfaces (VUI) for Cloud Services

Speech-based interfaces for interacting with cloud applications and services, enhancing accessibility and user experience.

Volumetric Display Computation Services

Cloud-based processing for generating 3D holographic or volumetric images, enabling immersive visualization applications.

Volumetric Video Streaming

Cloud services for delivering 3D video content for immersive viewing experiences.

Water Usage Effectiveness (WUE)

Metric measuring water consumption efficiency in cloud data centers, promoting sustainable resource management.

Water Usage Effectiveness (WUE) Monitoring

Tracking water consumption and efficiency in cloud data center operations, promoting sustainable resource management.

Web Application Firewall (WAF)

Cloud-based security service that filters and monitors HTTP traffic between web applications and the Internet.

WebAssembly (Wasm) in the Cloud

Low-level language for running high-performance applications in cloud-based web browsers.

5G MEC Integration

Integration of 5G mobile edge computing with container platforms for low-latency applications and services at network edges.

AIOps for Container Environments

Application of AI and machine learning for automated operations, monitoring, and management of containerized environments.

API Deprecation Policy

Guidelines for phasing out older API versions in Kubernetes, ensuring smooth transitions for users.

API Extensions

Mechanisms to extend the Kubernetes API with custom resources and functionalities, enhancing platform capabilities.

API Gateway Pattern

Containerized service that acts as a single entry point for all client requests to a microservices architecture.

API Server

Core component of Kubernetes that exposes the cluster's API and handles all administrative operations.

API Server Aggregation

Kubernetes feature allowing the API server to be extended with additional APIs without modifying core Kubernetes code.

API-First Development

Approach prioritizing API design before implementation, crucial for developing scalable containerized microservices.

AWS Fargate

Serverless compute engine for containers, allowing you to run containers without managing the underlying infrastructure.

Adapter Pattern

Design pattern in containerized microservices that wraps a service's interface to make it compatible with other services.

Admission Controllers

Plugins that intercept requests to the Kubernetes API server before object persistence, enforcing policies or modifying objects.

Admission Controllers for Security

Admission controllers specifically focused on enforcing security policies and validating security-related configurations.

Admission Webhooks

HTTP callbacks that receive admission requests and can modify or validate objects before they are persisted.

Admission Webhooks in Operators

Use of admission webhooks within Kubernetes operators to enforce custom policies or modify resources.

Advanced Audit

Kubernetes feature providing detailed logging of all requests processed by the API server for security and compliance.

Aggregated API Servers

Extension of the Kubernetes API server to include custom resources and functionalities without modifying core Kubernetes.

Aggregated ClusterRoles

Combination of multiple ClusterRoles into a single role, simplifying RBAC management in Kubernetes.

Air-gapped Registries

Container registries isolated from public networks, used in secure or restricted environments.

Akri

Open-source project for exposing heterogeneous leaf devices as resources in Kubernetes clusters.

Alertmanager Configuration

Setup and management of Prometheus Alertmanager for handling alerts from monitoring systems.

Amazon Elastic Container Registry (ECR)

Fully managed Docker container registry provided by AWS for storing, managing, and deploying container images.

Ambassador Pattern

Microservices design pattern where a dedicated service acts as an API gateway for other services.

Ambient Mesh

Service mesh implementation that doesn't require sidecars, reducing resource overhead and simplifying deployment.

Anchore Engine for Image Scanning

Open-source tool for deep inspection of container images, including vulnerability scanning and policy enforcement.

Ansible-based Operators

Kubernetes operators implemented using Ansible for automating application lifecycle management.

Antrea Network Policies

Network policies specific to the Antrea CNI plugin, offering fine-grained control over pod-to-pod communication.

Antrea for Open vSwitch-based Networking

Kubernetes networking solution using Open vSwitch for improved performance and advanced networking features.

Apache OpenWhisk

Open-source serverless platform that executes functions in response to events or direct invocations.

AppArmor Profiles

Security profiles for Linux that restrict program capabilities, enhancing container isolation and security.

Application-level Logging

Logging implemented within applications, providing detailed insights into application behavior and performance.

Aqua Security

Platform providing security and compliance for container-based and cloud-native applications throughout their lifecycle.

Aqua Security Platform

Comprehensive security solution for containerized and cloud-native environments, offering vulnerability management and runtime protection.

Argo CD

GitOps continuous delivery tool for Kubernetes, automating application deployment and lifecycle management.

Argo Rollouts

Kubernetes controller for advanced deployment strategies like canary and blue-green deployments.

ArgoCD

Declarative GitOps tool for Kubernetes, automating application deployment and synchronization with Git repositories.

Artifact Management

Process of storing, organizing, and managing container images and related artifacts in container registries.

Athenz for Fine-grained Access Control

Open-source platform for fine-grained access control and authentication in distributed systems.

Attribute-Based Access Control (ABAC)

Access control paradigm where authorization decisions are based on attributes of users, resources, and environment.

Audit Annotations

Additional metadata added to Kubernetes audit events for enhanced context and analysis, improving audit trails.

Audit Backends

Components responsible for processing and storing Kubernetes audit logs, supporting various storage and analysis options.

Audit Events

Records of requests and activities within a Kubernetes cluster, used for security monitoring and compliance.

Audit Levels

Configurable detail levels for Kubernetes audit logs, ranging from metadata-only to full request and response details.

Audit Logging

Process of recording API server requests and responses for security, troubleshooting, and compliance purposes.

Audit Logs

Detailed records of activities and operations within a Kubernetes cluster, used for security and compliance monitoring.

Audit Policy

Configuration defining which events should be recorded in Kubernetes audit logs and at what level of detail.

Audit Profile

Predefined set of audit policy rules for common use cases in Kubernetes, simplifying audit configuration.

Audit Stages

Different phases of request processing where audit events can be generated in Kubernetes, providing comprehensive auditing.

Audit Webhook Configuration

Setup for sending Kubernetes audit events to external webhook endpoints for processing or analysis.

Auditing

Process of systematically recording and examining activities within a Kubernetes cluster for security and compliance purposes.

Authenticating Proxy

Intermediary service that handles authentication before forwarding requests to the Kubernetes API server.

Authentication Modules

Pluggable components in container orchestration platforms for verifying user identities using various methods.

Authorization Policies

Rules defining access permissions for users and services in container orchestration platforms.

Azure Container Instances

Serverless container hosting service in Azure, offering rapid deployment of containers without cluster management.

Azure Container Registry

Managed Docker registry service for storing and managing container images in Azure cloud environments.

BGP (Border Gateway Protocol) in Containers

Implementation of Border Gateway Protocol within containerized network environments for advanced routing.

BGP in Container Networks

In container networks, BGP (Border Gateway Protocol) manages routing information between containers and external networks for efficient traffic routing.

Backend for Frontend (BFF) Pattern

Microservices design pattern where a dedicated service acts as an API gateway for specific frontend needs.

Backup and Restore

Processes for preserving and recovering container data and configurations in orchestration platforms.

Base Image

Foundation Docker image upon which other images are built, containing core OS and runtime components.

Base Image Selection

Process of choosing appropriate foundation images for container builds, balancing size, security, and functionality.

Best Effort QoS

Kubernetes quality of service class for pods with no resource guarantees, scheduled when resources are available.

Blue-Green Deployments

Deployment strategy using two identical environments to minimize downtime and risk during updates.

Bootstrap Tokens

Temporary tokens used for secure cluster initialization and node joining in Kubernetes, simplifying cluster setup.

Bottlerocket OS

Minimalist Linux-based operating system optimized for running containers in cloud environments.

BuildKit

Advanced container image building toolkit offering improved performance and caching capabilities.

BuildKit for Advanced Image Building

Use of BuildKit for efficient, concurrent, and cache-optimized container image creation, improving build performance.

Bulkhead Pattern

Isolation technique in microservices to contain failures and prevent system-wide cascading failures.

Bulkhead Pattern in Microservices

The Bulkhead Pattern in microservices isolates failures by dividing services into separate compartments, preventing issues in one from affecting others.

Burstable QoS

Kubernetes quality of service class for pods that can use more resources than requested when available.

CIS Benchmarks for Containers

Security configuration guidelines for deploying containers securely in various environments.

CNI Plugin Chaining

Technique of using multiple Container Network Interface plugins together for advanced networking capabilities.

CPU Manager

Kubernetes feature for fine-grained CPU resource management and allocation to containers, optimizing performance.

CPU Throttling

Technique to limit CPU usage of containers to prevent resource monopolization and ensure fair allocation.

CQRS (Command Query Responsibility Segregation)

Architectural pattern separating read and write operations in distributed systems, often used in microservices.

CQRS (Command Query Responsibility Segregation) Pattern

Architectural pattern separating read and write operations in distributed systems, often used in microservices.

CRI (Container Runtime Interface) Specification

Standard interface between container runtimes and Kubernetes, allowing pluggable runtime implementations.

CRI Image Management

Functionality within CRI for pulling, inspecting, and removing container images, standardizing image operations.

CRI Logging

Standardized logging interface for container runtimes implementing the Container Runtime Interface.

CRI Metrics

Performance and resource usage data exposed by container runtimes adhering to the CRI specification.

CRI Runtime Class

Kubernetes feature allowing selection of different runtime configurations for containers, enabling specialized runtimes.

CRI Socket

Unix domain socket used for communication between Kubelet and the CRI-compatible container runtime.

CRI Validation Testing

Process of verifying that a container runtime correctly implements the CRI specification, ensuring compatibility.

CRI-O

Lightweight container runtime specifically designed for Kubernetes, implementing the CRI specification.

CRI-O Internals

Core components and architecture of the CRI-O container runtime, including its interaction with Kubernetes.

CRI-O as Container Runtime

Use of CRI-O, a lightweight container runtime, as the primary runtime in a Kubernetes cluster.

CSI Controller Plugin

Component of CSI responsible for volume provisioning and attachment operations in container orchestration systems.

CSI Drivers

Plugins implementing the Container Storage Interface for various storage systems in Kubernetes.

CSI Ephemeral Volumes

Short-lived volumes in Kubernetes, created and deleted alongside a pod using CSI drivers, for temporary storage.

CSI Migration

Process of transitioning from in-tree volume plugins to CSI drivers in Kubernetes, improving storage extensibility.

CSI Node Plugin

Component of CSI responsible for mounting volumes and making them available to containers.

CSI Topology

Feature allowing storage provisioning based on topology constraints in Kubernetes, optimizing data locality.

Cache-Aside Pattern

Caching strategy where the application checks the cache before retrieving data from the main data store.

Caching Strategies for Containers

Techniques for implementing and managing caches in containerized applications for improved performance.

Calico

Open-source networking and network security solution for containers, providing a rich set of security policies.

Calico eBPF Datapath

High-performance networking mode in Calico using extended Berkeley Packet Filter for packet processing.

Canary Deployments

Technique of releasing new versions to a subset of users or servers to minimize risk and gather feedback.

Capabilities

Fine-grained privileges that can be assigned to containers, enhancing security by limiting root-level access.

Capability Controls

Mechanisms for managing and restricting Linux capabilities assigned to containers for improved security.

Categories

Groupings or classifications of container-related resources or components for easier management and discovery.

Ceph RBD

Ceph's block storage system, often used for persistent volumes in container orchestration platforms.