Engineering Glossary

From fundamental principles to cutting-edge practices, this glossary covers the full spectrum of software engineering terminology.

DevOps
Cloud Computing
Git
Containerization & Orchestration

SLA (Service Level Agreement)

Contract between a service provider and customer defining expected service levels.
DevOps

SOAR

Security Orchestration, Automation and Response; platforms that enable organizations to collect security data and perform security operations.
DevOps

SOC

Security Operations Center; centralized unit dealing with security issues on an organizational and technical level.
DevOps

SQL Injection

Code injection technique used to attack data-driven applications by inserting malicious SQL statements into application queries.
DevOps

SQLi

Abbreviation for SQL Injection, a code injection technique used to attack data-driven applications by inserting malicious SQL statements.
DevOps

SSL Certificate

Digital document that authenticates a website's identity and enables encrypted connections between servers and browsers, ensuring secure data transmission.
DevOps

SSL Certificate Chain

Series of certificates needed to verify the authenticity of a website's SSL certificate.
DevOps

SSL Certificate Expiry

Date when an SSL certificate is no longer valid and needs to be renewed to maintain secure connections.
DevOps

SSL/TLS Handshake

Process by which a client and server establish a secure encrypted connection, crucial for secure data transmission over the internet.
DevOps

SaltStack

Python-based, open-source configuration management software and remote execution engine.
DevOps

Sanity Testing

Subset of regression testing to verify that code changes don't impact critical functionalities.
DevOps

Scalability

Ability of a system, network, or process to handle a growing amount of work or its potential to be enlarged.
DevOps

Scaled Agile Framework (SAFe)

Set of organization and workflow patterns for implementing agile practices at enterprise scale.
DevOps

Schatten-IT

German term for "Shadow IT"; IT systems deployed outside of the organization's formal IT department.
DevOps

Scrubbing Center

Facility used to filter malicious traffic from a network, often used in DDoS mitigation.
DevOps

Scrum

Agile framework for project management emphasizing iterative progress, team collaboration, and flexibility.
DevOps

SecOps

Practice of integrating security processes with IT operations, aiming to reduce vulnerabilities and improve overall system security.
DevOps

Secure SDLC

Software Development Life Cycle that integrates security at every stage of the development process.
DevOps

Security Analytics

Use of data collection, aggregation, and analysis tools for security monitoring and threat detection.
DevOps

Security Champions

Individuals within development teams who act as the first point of contact for security-related matters.
DevOps

Security Information and Event Management (SIEM)

System providing real-time analysis of security alerts generated by applications and network hardware.
DevOps

Security Intelligence

Evidence-based knowledge about existing or emerging threats to assets, crucial for effective cybersecurity strategies.
DevOps

Security Misconfiguration

Improper configuration of security controls, often leading to vulnerabilities and potential security breaches.
DevOps

Security Observability

Practice of gaining insight into the security posture of systems through the collection and analysis of security-relevant data.
DevOps

Security Operation Center (SOC)

Centralized unit dealing with security issues on an organizational and technical level.
DevOps

Security Posture

Overall security status of an organization's systems, networks, and data, reflecting its ability to protect from cyber threats.
DevOps

Security Remediation

Process of addressing and fixing identified security vulnerabilities or weaknesses in systems, applications, or networks.
DevOps

Security as Code

Practice of building and operating security controls as code to ensure consistent and repeatable security processes.
DevOps

Selbstheilende Systeme

German for "self-healing systems"; systems that can detect and recover from failures automatically.
DevOps

Selenium

Popular open-source tool for automating web browsers, primarily used for testing web applications across various platforms.
DevOps

Self-Healing Systems

Systems capable of detecting and recovering from failures without human intervention.
DevOps

Self-Service Deployment

Capability allowing users to deploy applications or services independently, without IT intervention.
DevOps

Semaphore

Lightweight, cloud-native continuous integration and delivery platform designed for speed and simplicity in software development workflows.
DevOps

Sensitive Data Exposure

Security vulnerability where an application does not adequately protect sensitive information from unauthorized access.
DevOps

Sensu

Open-source monitoring framework designed to empower organizations with flexible and scalable monitoring for their infrastructure and applications.
DevOps

Sequencer

Tool used in network security for analyzing and manipulating network protocols, often employed in penetration testing and vulnerability assessment.
DevOps

Serf

Decentralized solution for cluster membership, failure detection, and orchestration, designed for service discovery and orchestration.
DevOps

Server Monitoring

Process of reviewing and analyzing a server for availability, operations, performance, security and other operations-related processes.
DevOps

Serverless

Cloud computing execution model where the cloud provider manages server infrastructure.
DevOps

Serverless Computing

Cloud computing model where the cloud provider manages server infrastructure, allowing developers to focus solely on code.
DevOps

Serverless Framework

Open-source tool for building and deploying serverless applications across various cloud providers, simplifying serverless development.
DevOps

Serverless Monitoring

Process of observing and managing the performance, availability, and cost of serverless applications and functions.
DevOps

Service Level Agreement (SLA)

Contract between a service provider and the end user defining the expected level of service.
DevOps

Service Level Indicator (SLI)

Quantitative measure of the level of service provided, used to evaluate whether a Service Level Objective is being met.
DevOps

Service Level Indicators (SLIs)

Quantitative measures of the level of service provided, used to evaluate whether Service Level Objectives are being met.
DevOps

Service Level Objective (SLO)

Target value or range of values for a service level that is measured by one or more Service Level Indicators.
DevOps

Service Mesh

Infrastructure layer for facilitating service-to-service communications between microservices.
DevOps

Service Reliability

Measure of a service's ability to perform its intended function consistently and without failure.
DevOps

Service Virtualisation

Practice of simulating the behavior of system components to enable continuous testing.
DevOps

Shadow APIs

Undocumented or unofficial APIs within an organization that may pose security risks or lead to inefficiencies if not properly managed.
DevOps

Shadow CD

Unofficial or unapproved continuous delivery practices within an organization, potentially bypassing established processes.
DevOps

Shadow IT

IT systems and solutions built and used inside organizations without explicit approval.
DevOps

Shared Responsibility Model

Cloud security framework that delineates security obligations of a cloud provider and its users.
DevOps

Shift Left

Practice of moving testing, quality, and performance evaluation earlier in the development process.
DevOps

Shift Right

Practice of extending testing and quality assurance into production environments.
DevOps

Shift-Left Security

Practice of integrating security earlier in the software development lifecycle, improving overall application security.
DevOps

Shift-Left Testing

Practice of performing testing earlier in the software development lifecycle to catch and fix issues sooner.
DevOps

Shift-Right Testing

Approach that extends testing into production environments, allowing for real-world validation and continuous improvement.
DevOps

SignalFx

Cloud monitoring and observability platform for infrastructure, microservices, and applications, enabling real-time analytics.
DevOps

Siloed Security

Approach where security is treated as a separate concern, not integrated with development and operations.
DevOps

Simian Army

Suite of tools created by Netflix to test the resiliency of its AWS infrastructure.
DevOps

Single Branch Development

Development practice where all work is done on a single branch in version control.
DevOps

Site Reliability Engineer (SRE)

IT professional who combines software and systems engineering to create scalable and reliable software systems.
DevOps

Site Reliability Engineering (SRE)

Discipline that incorporates aspects of software engineering and applies them to infrastructure and operations problems.
DevOps

Sitex

Tool for automating the setup and teardown of temporary environments, useful for testing and development purposes.
DevOps

Six Nines

Explore the pinnacle of system reliability: "six nines" uptime. Discover what 99.9999% availability means, its rarity, and the extreme measures required to achieve this DevOps feat.
DevOps

Slaughter

System administration tool designed for automating repetitive tasks across multiple servers, improving efficiency and consistency in IT operations.
DevOps

Smoke Testing

Preliminary testing to reveal simple failures severe enough to reject a prospective software release.
DevOps

Snapshot

Capture of the state of a system at a particular point in time, often used for backups.
DevOps

Snort

Open-source network intrusion detection and prevention system, capable of real-time traffic analysis and packet logging on IP networks.
DevOps

Soak Testing

Testing to determine system performance over an extended period of continuous use.
DevOps

Software Composition Analysis (SCA)

Model of software delivery where software is licensed on a subscription basis and centrally hosted.
DevOps

Software Deployment

Process of making software available and ready for use in a specific environment, including installation and configuration.
DevOps

Software Development Lifecycle (SDLC)

Structured process for planning, creating, testing, deploying, and maintaining software applications.
DevOps

Software Lifecycle

Entire process of software development from inception to retirement, including planning, development, testing, deployment, and maintenance.
DevOps

Software Stack

Set of software subsystems or components needed to create a complete platform for developing and running applications.
DevOps

Software as a Service (SaaS)

Model of software delivery where software is licensed on a subscription basis and centrally hosted.
DevOps

Source Control

Management of changes to documents, programs, and other information stored as computer files.
DevOps

Spaghetti Code

Code that is hard to read, understand, or maintain due to its complex and tangled structure.
DevOps

Spike Testing

Testing to determine how a system behaves under a sudden large increase in load.
DevOps

Sprint

Time-boxed iteration in Agile methodologies, typically 1-4 weeks long, during which a potentially shippable product increment is created.
DevOps

StackStorm

Open-source automation platform that connects all your apps, services, and workflows, enabling auto-remediation and security responses.
DevOps

Staging Environment

Pre-production environment that closely mimics the production environment, used for final testing before deployment.
DevOps

Standard Operating Procedures (SOPs)

Established procedures to be followed in carrying out a given operation or situation.
DevOps

Static Application Security Testing (SAST)

Process of analyzing source code to identify security vulnerabilities without executing the program.
DevOps

Status Page

Webpage displaying the current state of system's services and any known issues, crucial for transparent communication.
DevOps

Step

Individual task or action within a larger process or workflow, often used in the context of CI/CD pipelines or automation scripts.
DevOps

Strangler Fig Pattern

Technique for gradually migrating a legacy system by replacing pieces of functionality with new applications and services.
DevOps

Stream-aligned Team

Team organized around the flow of work, capable of delivering value directly to customers or users.
DevOps

Streamline Releases

Process of optimizing and simplifying the software release cycle to increase efficiency and reduce time-to-market.
DevOps

Structured Logging

Practice of implementing a consistent, predetermined message format for application logs.
DevOps

Stubs

Pieces of code used to stand in for some other programming functionality, often used in testing to simulate complex objects or processes.
DevOps

Sublime Text

Sophisticated text editor for code, markup, and prose, known for its speed, cross-platform support, and powerful features.
DevOps

SumoLogic

Cloud-native, machine data analytics platform that helps organizations gain real-time insights from logs, metrics, and other machine data.
DevOps

Sunzi

Lightweight server provisioning tool that simplifies the process of setting up and configuring servers using simple YAML files.
DevOps

Support-Level

Degree of technical assistance provided for a product or service, often tiered based on response times and scope of support.
DevOps

Swagger

Set of tools for designing, building, documenting, and consuming RESTful web services.
DevOps

Swift

General-purpose, multi-paradigm, compiled programming language developed by Apple.
DevOps

Synthetic Monitoring

Monitoring technique that uses scripted recordings or transactions to simulate user activity.
DevOps

Sysdig

Open-source system-level exploration and troubleshooting tool for Linux systems, providing deep visibility into system behavior.
DevOps
@mention

@mention

A feature in Git platforms that allows users to notify specific team members or reference issues by using the @ symbol followed by a username.
API preview

API preview

A feature allowing developers to test and provide feedback on new Git API functionality before it's officially released.
Bare Repository

Bare Repository

A Git repository containing version control information without a working directory, typically used as a central repository for collaboration.
Bisect

Bisect

A Git command used to perform a binary search through a repository's history to identify the commit that introduced a bug or issue.
Bitbucket Pipelines

Bitbucket Pipelines

An integrated CI/CD service in Bitbucket for automating builds, tests, and deployments.
Blame

Blame

A Git feature that shows which user last modified each line of a file, helping developers trace changes and understand code history.
Blamestorming

Blamestorming

A collaborative process of analyzing Git blame information to identify the source of bugs or issues in a codebase.
Branch

Branch

A parallel version of a repository, allowing developers to work on different features or experiments without affecting the main codebase.
Branch policies

Branch policies

Rules enforced on Git branches to ensure code quality, require reviews, or restrict certain actions before merging.
Business plan

Business plan

A premium subscription tier offered by Git hosting services, providing advanced features and support for enterprise users.
CA certificate

CA certificate

A digital certificate issued by a Certificate Authority, used in Git to establish secure HTTPS connections and verify server identities.
Cache

Cache

A temporary storage area that holds frequently accessed data for quick retrieval, improving system performance.
Checkout

Checkout

A Git command used to switch between different branches or restore files from a specific commit in a repository's history.
Cherry-Pick

Cherry-Pick

A Git operation that applies the changes from a specific commit to the current branch, useful for selective code integration.
Cherry-picking

Cherry-picking

The practice of selecting and applying specific commits from one branch to another in Git, often used for targeted bug fixes.
Clone

Clone

The process of creating a local copy of a remote Git repository, allowing developers to work on the codebase independently.
Code owners file

Code owners file

A file specifying individuals or teams responsible for code in different parts of a repository.
Commit

Commit

Operation in version control systems that saves changes to the local repository, creating a new revision with a unique identifier.
Conflict

Conflict

A situation in Git where incompatible changes have been made to the same part of a file, requiring manual resolution before merging.
Continuous Integration

Continuous Integration

Practice of merging all developer working copies to a shared mainline several times a day.
DAG (Directed Acyclic Graph)

DAG (Directed Acyclic Graph)

Directed Acyclic Graph, the underlying data structure used by Git to represent the commit history and relationships between commits.
Detach HEAD

Detach HEAD

A Git operation that moves the HEAD pointer to a specific commit, allowing for temporary exploration of historical states.
Diff

Diff

A Git command or operation that shows the differences between two commits, branches, files, or other Git objects.
Downstream

Downstream

Refers to the direction of change propagation in Git, typically from a parent branch to its child branches or forks.
Explorer

Explorer

A feature in Git platforms for browsing repository contents, viewing files, and navigating through different branches.
Feature branch workflow

Feature branch workflow

A Git pattern where each new feature is developed in a dedicated branch, then merged back to the main branch.
Fetch

Fetch

A Git command that retrieves changes from a remote repository without automatically merging them into the local branch.
Force Push

Force Push

A Git push operation that overwrites the remote branch's history with the local branch, potentially causing data loss if used carelessly.
Fork

Fork

A personal copy of another user's repository on a Git hosting platform, allowing independent development without affecting the original project.
Free plan

Free plan

A no-cost tier offered by Git hosting services, typically with limited features and storage for individual users or small projects.
GPG (GNU Privacy Guard)

GPG (GNU Privacy Guard)

An encryption software used with Git for signing commits and tags, enhancing security and verification.
Gist

Gist

A simple way to share code snippets, notes, or small files using Git, often integrated into Git platforms.
Git

Git

Distributed version control system for tracking changes in source code during software development.
Git Alias

Git Alias

A custom shortcut command defined by users to simplify complex or frequently used Git operations.
Git Alternates

Git Alternates

A mechanism in Git allowing a repository to borrow objects from another repository, useful for saving disk space in large projects.
Git Annotate

Git Annotate

A Git command that shows the author and commit information for each line in a file, similar to the "blame" feature.
Git Assume Unchanged

Git Assume Unchanged

A Git feature that tells the system to temporarily ignore changes to a tracked file, useful for local configuration files.
Git Attributes

Git Attributes

A mechanism in Git for defining attributes on a per-path basis, controlling how Git handles certain files or directories.
Git Bisect

Git Bisect

A Git command used to perform a binary search through the commit history to find the commit that introduced a bug.
Git Bisect Run

Git Bisect Run

An automated version of Git Bisect that uses a script to determine if each checked-out commit is "good" or "bad".
Git Blame -C (Copy Detection)

Git Blame -C (Copy Detection)

An enhanced version of Git Blame that detects lines moved or copied from other files, providing better change tracking.
Git Bundle

Git Bundle

A Git command that creates a single file containing all the data needed to recreate a repository's branch or history.
Git Bundle Create/Verify

Git Bundle Create/Verify

Commands to create and verify Git bundles, useful for transferring repository data without using a network.
Git Cheat Sheet

Git Cheat Sheet

A quick reference guide summarizing common Git commands and their usage, helpful for both beginners and experienced users.
Git Cherry

Git Cherry

A Git command used to find commits that haven't been merged upstream, useful for identifying changes to be applied to another branch.
Git Clean

Git Clean

A command to remove untracked files from the working directory, helping to maintain a clean repository state.
Git Commit --amend

Git Commit --amend

A command that allows you to modify the most recent commit, adding new changes or updating the commit message.
Git Commit Amend

Git Commit Amend

A command that allows you to modify the most recent commit, changing its message or contents, and update it without creating a new commit.
Git Commit Hooks

Git Commit Hooks

Scripts that run automatically before or after a commit, allowing you to enforce rules, format code, or perform checks on changes.
Git Commit Templates

Git Commit Templates

Predefined structures for commit messages, helping maintain consistency and include necessary information in commits.
Git Commit Trailers

Git Commit Trailers

Metadata added to the end of commit messages, often used for things like issue references or sign-offs.
Git Commit-graph

Git Commit-graph

A file format used to store commit graph structure, improving performance for operations that traverse commit history.
Git Commit-graph Verify

Git Commit-graph Verify

A command to check the integrity and validity of the commit-graph file in a Git repository.
Git Commit-tree

Git Commit-tree

A low-level Git command used to create a new commit object from an existing tree object.
Git Config

Git Config

A command and system for setting configuration options for Git on a global, local, or repository level.
Git Count-objects

Git Count-objects

A diagnostic command that provides statistics about the number and size of objects in a Git repository.
Git Credential Helper

Git Credential Helper

A system that securely stores and retrieves credentials for Git operations, reducing the need for manual authentication.
Git Daemon

Git Daemon

A lightweight server for the Git protocol, allowing anonymous read access to Git repositories.
Git Dangling Objects

Git Dangling Objects

Objects in Git that are not reachable from any reference, often created during rebasing or other history-altering operations.
Git Describe

Git Describe

A command that generates a human-readable name for a commit based on the most recent tag and additional commit information.
Git Diff

Git Diff

A command that shows changes between commits, branches, files, or the working directory and the index.
Git Diff Algorithms

Git Diff Algorithms

Various methods used by Git to compute differences between versions of files, optimizing for different scenarios.
Git Diff Tool

Git Diff Tool

An external program or interface used to visualize differences between files or commits in a more user-friendly manner.
Git Fetch --All

Git Fetch --All

A command that fetches updates from all remote repositories configured in a Git project.
Git Filter-branch

Git Filter-branch

A powerful tool for rewriting Git history, allowing for large-scale changes across many commits.
Git Flow

Git Flow

A branching model for Git that defines a strict branching structure designed to support multiple parallel developments.
Git Fork

Git Fork

The process of creating a personal copy of someone else's project, allowing for independent development without affecting the original.
Git Fsck

Git Fsck

A command that verifies the connectivity and validity of objects in the Git database.
Git Fsck (File System Check)

Git Fsck (File System Check)

Verifies the integrity of objects in the Git database, checking for corruption and inconsistencies.
Git GPG verification

Git GPG verification

A security feature in Git that uses GPG to sign and verify commits and tags, ensuring authenticity.
Git Garbage Collection (gc)

Git Garbage Collection (gc)

A process that optimizes the Git repository by removing unnecessary files and compressing objects.
Git Gc (Garbage Collection)

Git Gc (Garbage Collection)

Short for Git Garbage Collection, a command to clean up unnecessary files and optimize the repository.
Git Grep

Git Grep

A command for searching files in a Git repository using regular expressions or simple string matching.
Git Hook

Git Hook

A script that Git automatically runs before or after specific events, like commits or merges, to customize workflows and enforce rules.
Git Hooks

Git Hooks

Same as Git Hook, scripts triggered by various Git actions to automate tasks or enforce policies.
Git Ignore

Git Ignore

A mechanism to specify intentionally untracked files that Git should ignore, typically defined in a .gitignore file.
Git Index Format

Git Index Format

The internal format used by Git to store the staging area information, representing the next commit to be made.
Git Init

Git Init

A command used to initialize a new Git repository, creating the necessary directory structure for version control.
Git Interactive Rebase

Git Interactive Rebase

A feature allowing users to modify commits in their branch history, useful for cleaning up before merging.
Git Internals (objects, refs, etc.)

Git Internals (objects, refs, etc.)

The underlying data structures and mechanisms Git uses to store and manage version control information.
Git Interpret-trailers

Git Interpret-trailers

A command to parse and manipulate the trailer lines typically found at the end of commit messages.
Git LFS (Large File Storage)

Git LFS (Large File Storage)

A system that manages large files by storing them outside the main repository, replacing them with lightweight pointers to improve performance and efficiency.
Git Large File Storage (LFS)

Git Large File Storage (LFS)

An extension that replaces large files with text pointers in Git, while storing the file contents on a remote server.
Git Log

Git Log

A command to display the commit history of a repository, showing details like author, date, and commit message.
Git Maintenance

Git Maintenance

A set of tasks performed to keep a Git repository in good condition, including garbage collection and optimization.
Git Merge Strategies

Git Merge Strategies

Different algorithms used by Git to combine separate development histories when merging branches.
Git Merge Tools

Git Merge Tools

External programs or interfaces used to resolve merge conflicts in a more visual and user-friendly manner.
Git Merge-base

Git Merge-base

A command that finds the best common ancestor between two commits, useful for determining the point where branches diverged.
Git Multi-pack Index (MIDX)

Git Multi-pack Index (MIDX)

A feature that improves performance for repositories with many pack files by creating an index across multiple packs.
Git Namespaces

Git Namespaces

A feature allowing multiple references (like branches or tags) with the same name to coexist by separating them into different namespaces.
Git Notes

Git Notes

A way to add or inspect object notes, allowing additional information to be attached to Git objects without changing their SHA-1 hash.
Git Object Storage

Git Object Storage

The system Git uses to store all the versions of files, commits, and other objects in a content-addressable filesystem.
Git Pack Files

Git Pack Files

Compressed files containing Git objects, used to efficiently store and transfer repository data.
Git Packfile Format

Git Packfile Format

The internal format used by Git to store multiple objects efficiently in a single file, reducing disk usage and improving performance.
Git Partial Clone

Git Partial Clone

A feature allowing users to clone a repository without downloading all of its objects, saving bandwidth and storage.
Git Patch

Git Patch

A file format representing changes between versions, used for sharing and applying modifications across different repositories.
Git Plumbing Commands

Git Plumbing Commands

Low-level Git commands that expose the internal workings of Git, primarily used for scripting and advanced operations.
Git Porcelain Commands

Git Porcelain Commands

User-friendly commands for everyday tasks, like git status and git commit, designed for ease of use and clear output.
Git Protocol

Git Protocol

The native network protocol used by Git for efficient data transfer between repositories.
Git Prune

Git Prune

A command that removes objects that are no longer reachable from any references in the repository.

Hybrid Blockchain-Cloud Solutions

Systems integrating blockchain technology with traditional cloud services for enhanced security and transparency.

Hybrid Cloud Management

Tools and practices for managing resources across public and private cloud environments.

Hybrid Cloud Monitoring

Tracking performance and health of resources spanning both public and private cloud environments.

Hybrid Cloud Orchestration

Coordinating and automating workflows across multiple cloud environments and on-premises infrastructure.

Hybrid Cloud Storage

Data storage solutions that span both on-premises and cloud environments, offering flexible and scalable data management.

Hybrid Connectivity

Network solutions that connect on-premises infrastructure with cloud services, enabling seamless integration and data flow.

Hybrid Identity Management

Managing user identities and access across both on-premises systems and cloud services.

Hybrid Integration Platforms

Tools for connecting applications, data, and processes across on-premises and cloud environments.

Hybrid Quantum-Classical Algorithms

Computational methods combining quantum and classical processing in cloud environments.

Hybrid Quantum-Classical Computing

Using both quantum and classical computing resources in tandem for cloud-based problem-solving.

Hybrid Transactional/Analytical Processing (HTAP)

Database systems supporting both real-time transactions and analytics in cloud environments.

Hyperconverged Infrastructure (HCI)

Integrated compute, storage, and networking in a single cloud-managed system, simplifying data center architecture.

Hyperparameter Tuning

Process of optimizing machine learning model parameters in cloud-based environments.

Hypervisor

Software layer that manages virtual machines in cloud computing environments, enabling efficient resource utilization and isolation.

IAM Roles and Policies

Defined permissions and access controls for users and services in cloud environments.

ISO 27001 Certification

International standard for information security management in cloud environments.

Identity-Aware Proxies

Security tools that verify user identity before granting access to cloud applications.

Image Scanning

Automated process of examining container images for vulnerabilities in cloud environments.

Immutable Infrastructure Security

Security approach based on replacing rather than modifying cloud infrastructure components.

Immutable Storage

Cloud storage that prevents data modification after writing, ensuring data integrity and compliance.

In-Memory Database (e.g., Amazon ElastiCache, Azure Cache for Redis)

Database system that primarily uses main memory for data storage in cloud environments.

In-Memory Grid Computing

Distributed computing using the collective memory of networked computers in the cloud.

In-Network Computing

Processing data within network devices to reduce latency and bandwidth use in cloud architectures.

Incremental Computing Frameworks

Systems for efficiently updating computation results when input data changes in cloud environments.

Indexing

Process of organizing data to optimize query performance in cloud databases, enhancing search and retrieval efficiency.

Infrastructure as Code (IaC) Security Scanning

Automated tools for identifying security issues in infrastructure definition files.

Infrastructure as Code (IaC) Testing

Validating infrastructure definitions before deployment in cloud environments, ensuring reliability and consistency.

Infrastructure as a Service (IaaS)

Cloud-based provision of virtualized computing resources over the internet, including servers, storage, and networking.

Infrastructure-from-Code

Generating cloud infrastructure configurations directly from application code, streamlining development and deployment processes.

Instance Types (e.g., General Purpose, Compute Optimized, Memory Optimized)

Predefined virtual server configurations optimized for different use cases in cloud environments.

Integration Flow Designer

Visual tool for creating and managing data integration processes in cloud environments.

Integration Monitoring and Analytics

Tools for tracking and analyzing the performance of integrated cloud systems and processes.

Intelligent Tiering

Automated data storage class selection based on access patterns in cloud environments.

Intelligent Tiering for Storage

Automatic movement of data between storage tiers based on usage patterns in the cloud.

Intent-Based Networking

Network management approach using AI to automate configuration based on business intent.

Internet Gateway

Network node that connects cloud VPCs to the internet, enabling communication with external resources.

Interplanetary File System (IPFS) Cloud Storage

Decentralized storage system for distributing and accessing files in the cloud, enhancing data availability and resilience.

Intrusion Detection System (IDS)

Security tool that monitors network traffic for suspicious activity in cloud environments.

Intrusion Prevention System (IPS)

Security system that not only detects but also blocks potential threats in cloud networks.

IoT Analytics

Processing and analyzing data from Internet of Things devices in cloud environments.

IoT Anomaly Detection

Identifying unusual patterns in data from IoT devices using cloud-based analytics.

IoT Central (Azure)

Fully managed IoT application platform in the Azure cloud for connecting, monitoring, and managing IoT devices at scale.

IoT Data Ingestion

Process of collecting and importing data from IoT devices into cloud systems for storage, analysis, and processing.

IoT Data Lake

Centralized repository in the cloud for storing large volumes of IoT device data.

IoT Device Management

Cloud-based systems for monitoring, updating, and controlling IoT devices, ensuring efficient operation and security at scale.

IoT Device Provisioning

Process of setting up and configuring IoT devices for secure cloud connectivity.

IoT Device SDK

Software development kit for building applications that connect IoT devices to cloud services.

IoT Edge

Deploying cloud intelligence directly to IoT devices for local processing and analytics.

IoT Edge Computing

Processing data from IoT devices locally before sending to the cloud, reducing latency and bandwidth usage.

IoT Greengrass (AWS)

AWS service for running local compute, messaging, and data caching for connected IoT devices.

IoT Hub

Central message hub for bi-directional communication between IoT applications and devices.

IoT Integration Frameworks

Tools for connecting and managing diverse IoT devices and data streams in cloud environments.

IoT Lifecycle Management

Cloud-based tools for managing IoT devices from deployment through retirement, ensuring efficient device administration.

IoT Over-the-Air (OTA) Updates

Remote software updates for IoT devices managed through cloud platforms, ensuring device security and functionality.

IoT Platform as a Service (PaaS)

Cloud-based platform for developing, managing, and integrating IoT applications and devices.

IoT Protocols (MQTT, CoAP)

Lightweight communication protocols designed for IoT devices in cloud environments.

IoT Rules Engine

Cloud service for processing and acting on data from IoT devices based on predefined conditions.

IoT Security

Measures to protect IoT devices, data, and infrastructure in cloud-connected environments.

IoT Streaming Analytics

Real-time processing and analysis of data streams from IoT devices in the cloud.

Key Management Service (KMS)

Cloud service for creating and managing cryptographic keys for data encryption, ensuring secure data protection.

Knative

Kubernetes-based platform for building, deploying, and managing serverless workloads.

Kubeless

Kubernetes-native serverless framework enabling function deployment without managing underlying infrastructure.

Kubernetes Network Policies

Rules for controlling network traffic between pods in Kubernetes clusters, enhancing security in cloud-native environments.

Kubernetes Security Posture Management (KSPM)

Tools for assessing and improving security configurations in Kubernetes environments.

Kubernetes Services (e.g., Amazon EKS, Azure AKS, Google GKE)

Managed Kubernetes platforms offered by major cloud providers for container orchestration.

Kustomize

Kubernetes native configuration management tool for customizing application configurations.

Lambda@Edge (AWS)

AWS service for running Lambda functions at edge locations to customize content delivery.

Launch Configuration

Template for EC2 instance settings used in Auto Scaling groups, defining instance type, AMI, and other parameters.

Least Privilege Principle

Security concept of granting only the minimum permissions necessary in cloud environments.

License Optimization for Cloud

Managing software licenses efficiently to reduce costs in cloud environments, ensuring compliance and cost-effectiveness.

Lift and Shift

Migration strategy of moving applications to the cloud without significant modifications.

Lightweight VMs (like Firecracker)

Minimalist virtual machines designed for fast startup and low resource usage in cloud environments.

Linkerd

Lightweight service mesh for Kubernetes, providing observability, reliability, and security for microservices.

Liquid Cooling for High-Density Compute

Using liquid to dissipate heat in densely packed cloud data centers for improved efficiency.

Load Balancer (Application, Network, Classic)

Service that distributes incoming network traffic across multiple servers to ensure no single server becomes overwhelmed.

Log Analytics

Process of collecting, analyzing, and visualizing log data from cloud resources for insights and troubleshooting.

Log Intelligence

AI-driven analysis of log data to identify patterns, anomalies, and insights in cloud environments.

Low-Code Integration Platforms

Tools for building application integrations with minimal hand-coding in cloud environments.

Low-Code/No-Code Development Platforms

Cloud-based tools for creating applications with little to no traditional programming.

Low-Code/No-Code Platforms

Cloud services enabling app development with minimal coding, using visual interfaces and pre-built components.

MQTT Protocol

Lightweight messaging protocol designed for IoT devices and low-bandwidth networks in cloud ecosystems.

Machine Learning Platforms (e.g., Amazon SageMaker, Azure Machine Learning)

Cloud-based services for building, training, and deploying machine learning models at scale.

Master Data Management (MDM) in the Cloud

Centralized management of critical business data entities in cloud environments.

Meta-Learning Frameworks

Tools for developing AI models that can learn how to learn, improving adaptability in cloud environments.

Metadata Management Services

Cloud tools for organizing, integrating, and governing metadata across various data sources.

Metamaterial Antennas for Cloud Connectivity

Advanced antenna designs using engineered materials to enhance cloud network performance.

Metric Collection

Gathering and storing quantitative data about cloud resource performance and usage.

Micro-Frontends

Architectural style where frontend apps are composed from independently deployable components in the cloud.

Microsegmentation Orchestration

Automating the process of dividing cloud networks into secure zones for enhanced protection.

Microservices Integration

Connecting and coordinating interactions between independent microservices in cloud architectures.

Migration Planning

Strategic process of preparing and scheduling the move of applications and data to cloud environments.

Mixed Reality as a Service

Cloud-based platforms for developing and deploying mixed reality applications, combining virtual and physical environments.

Mobile Edge Computing

Bringing cloud computing capabilities closer to mobile users to reduce latency and improve performance.

Mobile Edge Computing (MEC)

Extending cloud computing capabilities to the edge of mobile networks for lower latency.

Model Deployment

Process of making machine learning models available for use in cloud production environments.

Model Explainability

Techniques for understanding and interpreting decisions made by AI models in cloud environments.

Model Monitoring

Tracking the performance and behavior of deployed machine learning models in cloud environments.

Model Registry

Centralized repository for storing and managing machine learning models in cloud environments.

Model Serving

Process of making trained machine learning models available for real-time predictions in cloud environments.

Model Training

Process of teaching machine learning algorithms to make predictions using data in cloud environments.

DaemonSet Pattern

Design pattern using DaemonSets to run system daemons or agents on every node in a cluster.

Data Backup and Recovery

Processes and tools for preserving and restoring data in containerized environments, ensuring data durability.

Data Consistency in Distributed Systems

Techniques ensuring data integrity across distributed container-based applications, maintaining reliability.

Data Fabric in Containerized Environments

Distributed data management architecture providing consistent data access across containerized applications.

Data Lakehouse Architecture

Unified data architecture combining data lake and data warehouse features in containerized environments.

Data Migration Between Containers

Process of moving data between containers or from traditional systems to containerized applications.

Data Persistence Strategies

Techniques for maintaining data across container lifecycles, including volume mounts and persistent volumes.

Data Plane

Network layer responsible for forwarding container traffic based on control plane decisions.

Data Replication in Containers

Techniques for creating and maintaining copies of data across multiple containerized instances.

Data Sharding in Containerized Databases

Partitioning data across multiple database containers for improved scalability and performance.

Database Containerization

Process of running database systems within containers for improved portability and resource utilization.

Database-per-Service Pattern

Microservices design pattern where each service has its own dedicated database, ensuring data isolation.

Datadog Container Monitoring

Platform for observability and monitoring of containerized environments and microservices.

Dead Letter Queue Pattern

Design pattern for handling failed message processing in containerized message-driven systems.

Declarative Deployments

Approach to deploying containers by specifying desired state rather than imperative commands.

Deployment Strategies

Techniques for rolling out container updates, including rolling updates, blue-green, and canary deployments.

Descheduler

Kubernetes component that evicts pods from nodes based on specific policies to optimize cluster resource usage.

DevSpace for Cloud-native Development

Standardized format defining the structure and metadata of Docker container images, ensuring portability.

Device Plugins

Kubernetes feature allowing nodes to advertise system hardware resources to the cluster, enabling specialized hardware use.

Direct Server Return (DSR)

Network optimization technique in container load balancing for improved performance by bypassing the load balancer for responses.

Distributed Tracing Integration

Implementation of tracing in containerized microservices for end-to-end request visibility.

Distributed Tracing with Jaeger

Implementation of distributed tracing using Jaeger to monitor and optimize performance in microservices architectures.

Distributed Tracing with OpenTelemetry

Implementation of OpenTelemetry for standardized observability in containerized environments.

Distroless Images

Minimal container images containing only the application and its runtime dependencies, reducing attack surface.

Docker Attach

Command to attach local standard input, output, and error streams to a running container for interaction and debugging.

Docker Build Context

Set of files located in the specified PATH or URL, used during the docker build process to create images.

Docker Buildx

Docker CLI plugin for extended build capabilities, including multi-platform builds and enhanced build options.

Docker CRI Shim

Component enabling Docker to be used as a container runtime in Kubernetes via the Container Runtime Interface.

Docker Client

Command-line tool for interacting with Docker daemon and managing containers, images, and other Docker objects.

Docker Commit

Command creating a new image from a container's changes, useful for saving modifications made to a running container.

Docker Compose

Tool for defining and running multi-container Docker applications, simplifying the process of managing complex application stacks.

Docker Container Inspection

Process of viewing detailed information about a container's configuration and state, aiding in troubleshooting.

Docker Content Trust

Feature providing digital signing and verification of Docker images, ensuring image authenticity and integrity.

Docker Content Trust Signature Verification

Process of validating the authenticity and integrity of signed Docker images before use.

Docker Contexts

Feature allowing management of multiple Docker endpoints from a single Docker client, simplifying multi-environment management.

Docker Daemon

Background service managing Docker objects like images, containers, networks, and volumes.

Docker Exec

Command allowing users to run a new process inside a running container, useful for debugging and maintenance tasks.

Docker Export/Import

Commands for exporting a container's filesystem as a tarball and importing it as an image.

Docker Hub

Cloud-based repository service for finding and sharing container images, central to the Docker ecosystem.

Docker Image History

Command showing the history of an image's layers, providing insight into how the image was built and modified.

Docker Image Inspection

Process of examining Docker image metadata, including layers, environment variables, and exposed ports.

Docker Image Specification

Standardized format defining the structure and metadata of Docker container images, ensuring portability.

Docker Network

Virtualized network providing connectivity between Docker containers, isolating container traffic from the host network.

Docker Network Driver Types (bridge, host, overlay, macvlan)

Different networking modes in Docker, including bridge, host, overlay, and macvlan, offering varied connectivity options.

Docker Prune

Command for removing unused Docker objects like containers, networks, images, and volumes.

Docker Save/Load

Commands for exporting Docker images to tar archives and importing them back, useful for image transfer and backup.

Docker Scan

Command-line tool for scanning Docker images for vulnerabilities, providing detailed reports on potential security issues.

Docker Shim

Deprecated component that provided CRI compatibility for Docker in Kubernetes, bridging Docker and CRI.

Docker Socket

Unix socket or named pipe used for communication between Docker client and daemon, enabling Docker API access.

Docker Stats

Command displaying a live stream of container resource usage statistics, including CPU, memory, and network I/O.

Docker Swarm

Native clustering and orchestration solution for Docker, allowing you to create and manage a swarm of Docker nodes as a single virtual system.

Docker System Events

Real-time stream of Docker daemon events, providing insights into container, image, volume, and network activities.

Docker Top

Command displaying the running processes of a container, similar to the Unix top command but container-specific.

Docker Volume

Persistent data storage mechanism for containers, independent of container lifecycle, enabling data persistence.

Docker Volume Driver Types

Different storage backends for Docker volumes, including local, NFS, and cloud-specific drivers.

Dockerfile

Text document containing all the commands a user could call on the command line to assemble a Docker image.

Dockerfile ARG

Instruction defining build-time variables that users can pass at build-time to the builder.

Dockerfile Best Practices

Guidelines for creating efficient, secure, and maintainable Dockerfiles, optimizing image builds and runtime performance.

Dockerfile HEALTHCHECK

Instruction telling Docker how to test a container to check its health status, improving reliability.

Dockerfile Instructions (ADD, COPY, RUN, CMD, ENTRYPOINT, etc.)

Set of commands used in Dockerfiles to build images, including ADD, COPY, RUN, CMD, and ENTRYPOINT.

Dockerfile ONBUILD

Set of commands used in Dockerfiles to build images, including ADD, COPY, RUN, CMD, and ENTRYPOINT.

Dockerfile STOPSIGNAL

Instruction setting the system call signal that will be sent to the container to exit, customizing shutdown behavior.

Dockerignore

File specifying which files and directories should be excluded when building a Docker image.

Domain-Driven Design (DDD) in Microservices

Approach to software design focusing on the core domain in containerized microservices architectures.

Dragonfly for P2P Image Distribution

P2P-based image and file distribution system to improve efficiency of image downloads in container environments.

Drain

Process of cordoning a node and evicting its pods in preparation for maintenance or decommissioning.

Dual-stack Networking

Networking configuration supporting both IPv4 and IPv6 in container environments, enabling broader connectivity options.

Dynamic Admission Control

Kubernetes feature allowing custom logic to be applied to object creation or modification requests.

Dynamic Auditing

Kubernetes feature enabling runtime configuration of audit policies without API server restart.

Dynamic Provisioning

Automatic creation of storage when persistent volume claims are made in Kubernetes, simplifying storage management.

Dynatrace OneAgent

Monitoring solution for containerized environments, providing deep visibility into application performance.

ELK Stack (Elasticsearch, Logstash, Kibana)

Combination of Elasticsearch, Logstash, and Kibana for logging and monitoring containerized environments.

East-West Traffic

Network communication between containers or services within the same cluster or data center.

Edge AI/ML

Deployment of artificial intelligence and machine learning models on edge devices using containers.

Edge Analytics

Processing and analyzing data at the network edge using containerized analytics applications.

Edge Device Management

Tools and practices for managing containerized workloads on edge devices, ensuring consistent deployment and updates.

Edge Orchestration

Management and coordination of containerized applications across distributed edge locations.

Edge Security

Security measures and practices specific to containerized edge computing environments, protecting distributed workloads.

Edge Workload Scheduling

Techniques for efficiently distributing containerized workloads across edge devices, optimizing resource usage.

Edge-Cloud Syncing

Synchronization of data and state between edge containers and cloud-based systems, ensuring consistency.

Egress Gateway

Component controlling outbound traffic from a container cluster to external services, enhancing security and traffic management.

Egress Gateways

Service mesh components managing outbound traffic from the mesh to external services, providing fine-grained control.

Egress Traffic Control

Management and policies for outbound network traffic from containers, ensuring security and compliance.

Elastic APM

Application Performance Monitoring tool for containerized applications in the Elastic Stack.

Encrypted Secrets

Sensitive data stored in an encrypted form in container orchestration platforms, enhancing security.

End-to-End Testing

Comprehensive testing of containerized applications from start to finish, validating entire system functionality.

EndpointSlices

Kubernetes API resource providing a more scalable alternative to Endpoints for service discovery.

Environment Variables in Containers

Key-value pairs passed to containers at runtime, used for configuration and runtime behavior control.

Envoy Proxy

High-performance proxy often used in service mesh implementations for containerized environments.

Ephemeral Containers

Temporary containers used for troubleshooting or debugging in Kubernetes pods, without affecting the main containers.

Ephemeral Volumes

Short-lived storage volumes in Kubernetes that share the lifecycle of a pod, useful for temporary data storage.

Equal-Cost Multi-Path (ECMP)

Routing strategy for load balancing network traffic across multiple paths in container networks.

Etcd

Distributed key-value store that provides a reliable way to store data across a cluster of machines.

Event Sinks

Destinations for cluster-level events in container orchestration platforms, used for monitoring and alerting.

Event Sources

Components or services generating events in containerized environments, often used in event-driven architectures.

Event Sourcing

Pattern of storing changes to application state as a sequence of events, often used in microservices architectures.

Event Sourcing Pattern

Design pattern capturing all changes to application state as a sequence of events, useful in distributed systems.

Event Sourcing in Containers

Implementation of event sourcing pattern in containerized microservices architectures, ensuring data consistency.

Event-driven Architectures

Design approach where containerized services produce, detect, and react to events, enabling loose coupling and scalability.

Eviction Policies

Rules determining which pods to terminate when a node is under resource pressure in Kubernetes clusters.