Engineering Glossary

From fundamental principles to cutting-edge practices, this glossary covers the full spectrum of software engineering terminology.

DevOps
Cloud Computing
Git
Containerization & Orchestration

Syslog

Standard for message logging, often used in Unix and Unix-like systems for system management and security auditing.
DevOps

System Team

Team responsible for building and maintaining the platforms used by stream-aligned teams.
DevOps

TLS Certificate: DevOps Explained

Digital certificate that authenticates a website's identity and enables an encrypted connection.
DevOps

Tactics Techniques and Procedures (TTPs)

Patterns of activities or methods associated with a specific threat actor or group of threat actors.
DevOps

Taint Analysis

Technique used to identify and track data in a program that has been tainted with user input.
DevOps

Team Topologies

Organizational design approach focused on optimizing team interactions and boundaries for effective software delivery.
DevOps

TeamCity

Powerful and user-friendly continuous integration server by JetBrains, supporting various version control systems and build tools.
DevOps

Technical Debt

Implied cost of future rework caused by choosing quick, easy solutions now instead of better, more time-consuming approaches.
DevOps

Technology Stack

Set of technologies used to build and run a single application, including programming languages, frameworks, and tools.
DevOps

Telemetry

Automated process of collecting data at remote points and transmitting it to receiving equipment for monitoring.
DevOps

Tenants

In multi-tenant architecture, distinct groups of users who share a common access with specific privileges to the software instance.
DevOps

Terraform

Open-source infrastructure as code software tool that enables defining and provisioning data center infrastructure using a declarative language.
DevOps

Terraform Cloud

Managed service offering of Terraform for teams and organizations, providing collaboration features and workflow management.
DevOps

Test Automation

Use of software to execute tests and compare actual outcomes with predicted outcomes.
DevOps

Test Automation for Everything

Approach of automating all possible tests in the software development process to improve quality and efficiency.
DevOps

Test Data Management

Process of creating, managing, and maintaining test data for software testing, ensuring data quality and relevance.
DevOps

Test Environment

Setup of software and hardware on which the testing team performs testing of a new build.
DevOps

Test Environment Management

Process of planning, creating, maintaining, and managing environments for software testing, ensuring consistency and reliability.
DevOps

Test Kitchen

Tool for testing infrastructure code and software on isolated target platforms, supporting multiple providers and test frameworks.
DevOps

Test-doubles

Generic term for any object used in place of a real object for testing purposes.
DevOps

Test-driven Development (TDD)

Software development process relying on software requirements being converted to test cases before software is fully developed.
DevOps

TestFlight

Apple's platform for over-the-air installation and beta testing of mobile applications before they are submitted to the App Store.
DevOps

Testdatenmanagement

Process of creating, managing, and maintaining test data for software testing, ensuring data quality and relevance for various test scenarios.
DevOps

Testenvironment Self-Service

Ability for testers to provision and manage their own test environments, increasing efficiency and autonomy.
DevOps

Testing-as-a-Service (TaaS)

Outsourcing of testing activities to a third-party service provider, offering specialized expertise and tools for comprehensive testing.
DevOps

The Three Pillars of Observability

Logs, metrics, and traces; key components for understanding the behavior of distributed systems.
DevOps

The Three Ways

Principles underpinning DevOps movements: Flow, Feedback, Continual Learning and Experimentation.
DevOps

Theory of Constraints

Management paradigm that views any manageable system as being limited in achieving its goals by a small number of constraints.
DevOps

Threat Detection and Response (TDR)

Cybersecurity process of identifying, analyzing, and mitigating threats to an organization's IT infrastructure in real-time.
DevOps

Threat Hunting

Proactive cybersecurity technique to detect hidden threats that have evaded existing security solutions.
DevOps

Threat Intelligence

Information about potential or current threats to an organization's security, used to inform better decision-making.
DevOps

Threat Landscape

Comprehensive view of potential security threats facing an organization or industry, crucial for effective risk management.
DevOps

Threat Modeling

Process of identifying, understanding, and categorizing potential security threats.
DevOps

Time to First Byte

Measure of responsiveness that indicates the time between a user making an HTTP request and the first byte of the page being received by the browser.
DevOps

Time to Restore Service

Metric measuring how long it takes to restore a service after an incident, important for assessing system reliability.
DevOps

Time to Value

Duration between the initiation of a process and the realization of its benefits, crucial for measuring efficiency and ROI.
DevOps

Toggle by Geo-location

Feature flag technique that enables or disables features based on geographical location.
DevOps

Toggle by User Rights

Feature flag technique that enables or disables features based on user permissions.
DevOps

Toil

Manual, repetitive, automatable work in running production services that lacks long-term value and scales linearly with service growth.
DevOps

Tool Sprawl

Proliferation of tools within an organization, often leading to inefficiency and integration challenges.
DevOps

Toolchain

Set of programming tools used to perform a complex software development task or to create a software product.
DevOps

Traffic Management

Process of monitoring, controlling, and optimizing network traffic to ensure efficient data flow and prevent congestion.
DevOps

Travis CI

Distributed continuous integration service used to build and test software projects hosted on GitHub.
DevOps

Trunk-Based Development

Source control branching model where developers collaborate on code in a single branch.
DevOps

Tsuru

Open-source Platform as a Service (PaaS) that makes it easy to deploy and manage applications.
DevOps

TypeScript

Typed superset of JavaScript that compiles to plain JavaScript, offering enhanced tooling and error detection in large-scale applications.
DevOps

TypeScript First

Development approach prioritizing TypeScript over JavaScript for enhanced type safety and tooling support.
DevOps

UEBA

User and Entity Behavior Analytics; process of tracking, collecting and analyzing user and machine data to detect anomalies.
DevOps

UI Testing

Process of testing a product's graphical user interface to ensure it meets its specifications.
DevOps

Ubuntu

Popular, user-friendly Linux distribution based on Debian, known for its ease of use, regular release cycle, and strong community support.
DevOps

Unit Testing

Software testing method where individual units or components of a program are tested in isolation.
DevOps

Uptime

Measure of system reliability, expressed as the percentage of time a machine has been working and available.
DevOps

Uptime Robot

Service for monitoring websites and alerting users when their sites go down, providing 24/7 uptime monitoring.
DevOps

Uptrends

Website and server monitoring service that helps businesses ensure their online presence is always available and performing optimally.
DevOps

Use Mockups

Practice of creating simplified versions of system components for testing purposes.
DevOps

User Acceptance Test

Final phase of software testing where intended users test the software to ensure it can handle required tasks in real-world scenarios.
DevOps

User Acceptance Testing (UAT)

Final phase of software testing where actual users test the software to ensure it meets business requirements and is fit for purpose.
DevOps

Using Components with Known Vulnerabilities

Security risk of utilizing software components with documented security issues in applications.
DevOps

VMFest

Clojure library for managing virtual machines on various virtualization platforms, simplifying VM lifecycle management.
DevOps

VPC Flow Logging

Feature that enables you to capture information about the IP traffic going to and from network interfaces in your VPC.
DevOps

VPC Peering

Networking connection between two VPCs that enables you to route traffic between them using private IP addresses.
DevOps

Vagrant

Tool for building and managing virtual machine environments, streamlining the setup process for development environments.
DevOps

Vagrant-lxc

Vagrant plugin that allows the use of LXC (Linux Containers) as a provider, enabling lightweight, OS-level virtualization for development environments.
DevOps

Validate Compliance

Process of ensuring that systems and practices meet specified standards or regulations.
DevOps

Value Stream Management

Practice of optimizing the flow of value through the software delivery lifecycle.
DevOps

Value Stream Mapping

Lean technique for analyzing current state and designing future state of events that deliver a product or service to the customer.
DevOps

Vault

Secure secret management tool for storing and controlling access to tokens, passwords, certificates, and other sensitive data.
DevOps

Vaurien

Chaos Monkey-style tool for introducing delays and errors into TCP connections, useful for testing system resilience.
DevOps

Veewee

Tool for easily building custom Vagrant base boxes, KVMs, and virtual machine images.
DevOps

Velocity

Measure of the amount of work a team completes during a sprint or iteration, used in agile project management.
DevOps

Version Control

System that records changes to a file or set of files over time so that you can recall specific versions later.
DevOps

Version Control System (VCS)

Software tools that help software teams manage changes to source code over time.
DevOps

Vieraugenprinzip

German term for the "four-eyes principle", requiring two individuals to approve an action before it can be taken.
DevOps

Virtual Machine (VM)

Emulation of a computer system, providing the functionality of a physical computer.
DevOps

Virtual Private Cloud (VPC)

On-demand configurable pool of shared computing resources allocated within a public cloud environment.
DevOps

Virtualization

Creation of a virtual version of something, such as a server, storage device, network or operating system.
DevOps

Vulnerability Assessments (VA)

Systematic review of security weaknesses in an information system, often involving scanning and analysis of potential vulnerabilities.
DevOps

Vulnerability Scanning

Automated process of proactively identifying security vulnerabilities of computing systems in a network.
DevOps

WAAP (Web Application & API Protection)

Security solution that protects web applications and APIs from various types of attacks.
DevOps

WAF (Web Application Firewall)

Application firewall for HTTP applications that applies a set of rules to an HTTP conversation.
DevOps

Waste

Any activity in a process that does not add value to the customer, a key concept in lean methodologies for process improvement.
DevOps

Waterfall

Traditional, linear approach to software development with distinct phases, often contrasted with more iterative methodologies like Agile.
DevOps

Weave

Network plugin for Kubernetes that creates a virtual network for connecting containers across multiple hosts.
DevOps

Web API Security

Set of practices and measures taken to protect web APIs from various security threats and unauthorized access.
DevOps

Web Application Development

Process of creating web applications, including design, coding, testing, and deployment, often using various web technologies.
DevOps

Web Application Security

Discipline of protecting websites and web applications against security threats.
DevOps

Web Scraping

Automated process of extracting data from websites, often used for data mining, price monitoring, or content aggregation.
DevOps

WebSockets

Protocol providing full-duplex communication channels over a single TCP connection.
DevOps

Webhooks

Automated messages sent from apps when something happens, allowing real-time data transfer and integration between different systems.
DevOps

White Box Testing

Method of testing where the internal structure/design/implementation of the item being tested is known to the tester.
DevOps

Wildcard Certificate

SSL certificate that secures a domain and its subdomains, allowing for flexible and cost-effective implementation of HTTPS.
DevOps

Windows Event

Record of an occurrence in a Windows operating system or application, crucial for system monitoring and troubleshooting.
DevOps

Windows Event Log

Detailed record of system, security, and application notifications stored by Windows.
DevOps

Windows Performance Counters

Measurement tools built into Windows that provide information about system operation.
DevOps

Windows Services

Programs that operate in the background on Windows systems, similar to daemons in Unix-like operating systems.
DevOps

Work in Progress (WIP)

Partially completed work or any task that has been started but is not yet finished.
DevOps

Workflow

Sequence of processes through which a piece of work passes from initiation to completion.
DevOps

XDR

Extended Detection and Response; security technology that provides holistic protection against cyber threats.
DevOps

XML External Entities (XXE)

Web security vulnerability that allows an attacker to interfere with an application's processing of XML data.
DevOps

Xcode

Integrated development environment (IDE) for macOS containing a suite of software development tools.
DevOps
@mention

@mention

A feature in Git platforms that allows users to notify specific team members or reference issues by using the @ symbol followed by a username.
API preview

API preview

A feature allowing developers to test and provide feedback on new Git API functionality before it's officially released.
Bare Repository

Bare Repository

A Git repository containing version control information without a working directory, typically used as a central repository for collaboration.
Bisect

Bisect

A Git command used to perform a binary search through a repository's history to identify the commit that introduced a bug or issue.
Bitbucket Pipelines

Bitbucket Pipelines

An integrated CI/CD service in Bitbucket for automating builds, tests, and deployments.
Blame

Blame

A Git feature that shows which user last modified each line of a file, helping developers trace changes and understand code history.
Blamestorming

Blamestorming

A collaborative process of analyzing Git blame information to identify the source of bugs or issues in a codebase.
Branch

Branch

A parallel version of a repository, allowing developers to work on different features or experiments without affecting the main codebase.
Branch policies

Branch policies

Rules enforced on Git branches to ensure code quality, require reviews, or restrict certain actions before merging.
Business plan

Business plan

A premium subscription tier offered by Git hosting services, providing advanced features and support for enterprise users.
CA certificate

CA certificate

A digital certificate issued by a Certificate Authority, used in Git to establish secure HTTPS connections and verify server identities.
Cache

Cache

A temporary storage area that holds frequently accessed data for quick retrieval, improving system performance.
Checkout

Checkout

A Git command used to switch between different branches or restore files from a specific commit in a repository's history.
Cherry-Pick

Cherry-Pick

A Git operation that applies the changes from a specific commit to the current branch, useful for selective code integration.
Cherry-picking

Cherry-picking

The practice of selecting and applying specific commits from one branch to another in Git, often used for targeted bug fixes.
Clone

Clone

The process of creating a local copy of a remote Git repository, allowing developers to work on the codebase independently.
Code owners file

Code owners file

A file specifying individuals or teams responsible for code in different parts of a repository.
Commit

Commit

Operation in version control systems that saves changes to the local repository, creating a new revision with a unique identifier.
Conflict

Conflict

A situation in Git where incompatible changes have been made to the same part of a file, requiring manual resolution before merging.
Continuous Integration

Continuous Integration

Practice of merging all developer working copies to a shared mainline several times a day.
DAG (Directed Acyclic Graph)

DAG (Directed Acyclic Graph)

Directed Acyclic Graph, the underlying data structure used by Git to represent the commit history and relationships between commits.
Detach HEAD

Detach HEAD

A Git operation that moves the HEAD pointer to a specific commit, allowing for temporary exploration of historical states.
Diff

Diff

A Git command or operation that shows the differences between two commits, branches, files, or other Git objects.
Downstream

Downstream

Refers to the direction of change propagation in Git, typically from a parent branch to its child branches or forks.
Explorer

Explorer

A feature in Git platforms for browsing repository contents, viewing files, and navigating through different branches.
Feature branch workflow

Feature branch workflow

A Git pattern where each new feature is developed in a dedicated branch, then merged back to the main branch.
Fetch

Fetch

A Git command that retrieves changes from a remote repository without automatically merging them into the local branch.
Force Push

Force Push

A Git push operation that overwrites the remote branch's history with the local branch, potentially causing data loss if used carelessly.
Fork

Fork

A personal copy of another user's repository on a Git hosting platform, allowing independent development without affecting the original project.
Free plan

Free plan

A no-cost tier offered by Git hosting services, typically with limited features and storage for individual users or small projects.
GPG (GNU Privacy Guard)

GPG (GNU Privacy Guard)

An encryption software used with Git for signing commits and tags, enhancing security and verification.
Gist

Gist

A simple way to share code snippets, notes, or small files using Git, often integrated into Git platforms.
Git

Git

Distributed version control system for tracking changes in source code during software development.
Git Alias

Git Alias

A custom shortcut command defined by users to simplify complex or frequently used Git operations.
Git Alternates

Git Alternates

A mechanism in Git allowing a repository to borrow objects from another repository, useful for saving disk space in large projects.
Git Annotate

Git Annotate

A Git command that shows the author and commit information for each line in a file, similar to the "blame" feature.
Git Assume Unchanged

Git Assume Unchanged

A Git feature that tells the system to temporarily ignore changes to a tracked file, useful for local configuration files.
Git Attributes

Git Attributes

A mechanism in Git for defining attributes on a per-path basis, controlling how Git handles certain files or directories.
Git Bisect

Git Bisect

A Git command used to perform a binary search through the commit history to find the commit that introduced a bug.
Git Bisect Run

Git Bisect Run

An automated version of Git Bisect that uses a script to determine if each checked-out commit is "good" or "bad".
Git Blame -C (Copy Detection)

Git Blame -C (Copy Detection)

An enhanced version of Git Blame that detects lines moved or copied from other files, providing better change tracking.
Git Bundle

Git Bundle

A Git command that creates a single file containing all the data needed to recreate a repository's branch or history.
Git Bundle Create/Verify

Git Bundle Create/Verify

Commands to create and verify Git bundles, useful for transferring repository data without using a network.
Git Cheat Sheet

Git Cheat Sheet

A quick reference guide summarizing common Git commands and their usage, helpful for both beginners and experienced users.
Git Cherry

Git Cherry

A Git command used to find commits that haven't been merged upstream, useful for identifying changes to be applied to another branch.
Git Clean

Git Clean

A command to remove untracked files from the working directory, helping to maintain a clean repository state.
Git Commit --amend

Git Commit --amend

A command that allows you to modify the most recent commit, adding new changes or updating the commit message.
Git Commit Amend

Git Commit Amend

A command that allows you to modify the most recent commit, changing its message or contents, and update it without creating a new commit.
Git Commit Hooks

Git Commit Hooks

Scripts that run automatically before or after a commit, allowing you to enforce rules, format code, or perform checks on changes.
Git Commit Templates

Git Commit Templates

Predefined structures for commit messages, helping maintain consistency and include necessary information in commits.
Git Commit Trailers

Git Commit Trailers

Metadata added to the end of commit messages, often used for things like issue references or sign-offs.
Git Commit-graph

Git Commit-graph

A file format used to store commit graph structure, improving performance for operations that traverse commit history.
Git Commit-graph Verify

Git Commit-graph Verify

A command to check the integrity and validity of the commit-graph file in a Git repository.
Git Commit-tree

Git Commit-tree

A low-level Git command used to create a new commit object from an existing tree object.
Git Config

Git Config

A command and system for setting configuration options for Git on a global, local, or repository level.
Git Count-objects

Git Count-objects

A diagnostic command that provides statistics about the number and size of objects in a Git repository.
Git Credential Helper

Git Credential Helper

A system that securely stores and retrieves credentials for Git operations, reducing the need for manual authentication.
Git Daemon

Git Daemon

A lightweight server for the Git protocol, allowing anonymous read access to Git repositories.
Git Dangling Objects

Git Dangling Objects

Objects in Git that are not reachable from any reference, often created during rebasing or other history-altering operations.
Git Describe

Git Describe

A command that generates a human-readable name for a commit based on the most recent tag and additional commit information.
Git Diff

Git Diff

A command that shows changes between commits, branches, files, or the working directory and the index.
Git Diff Algorithms

Git Diff Algorithms

Various methods used by Git to compute differences between versions of files, optimizing for different scenarios.
Git Diff Tool

Git Diff Tool

An external program or interface used to visualize differences between files or commits in a more user-friendly manner.
Git Fetch --All

Git Fetch --All

A command that fetches updates from all remote repositories configured in a Git project.
Git Filter-branch

Git Filter-branch

A powerful tool for rewriting Git history, allowing for large-scale changes across many commits.
Git Flow

Git Flow

A branching model for Git that defines a strict branching structure designed to support multiple parallel developments.
Git Fork

Git Fork

The process of creating a personal copy of someone else's project, allowing for independent development without affecting the original.
Git Fsck

Git Fsck

A command that verifies the connectivity and validity of objects in the Git database.
Git Fsck (File System Check)

Git Fsck (File System Check)

Verifies the integrity of objects in the Git database, checking for corruption and inconsistencies.
Git GPG verification

Git GPG verification

A security feature in Git that uses GPG to sign and verify commits and tags, ensuring authenticity.
Git Garbage Collection (gc)

Git Garbage Collection (gc)

A process that optimizes the Git repository by removing unnecessary files and compressing objects.
Git Gc (Garbage Collection)

Git Gc (Garbage Collection)

Short for Git Garbage Collection, a command to clean up unnecessary files and optimize the repository.
Git Grep

Git Grep

A command for searching files in a Git repository using regular expressions or simple string matching.
Git Hook

Git Hook

A script that Git automatically runs before or after specific events, like commits or merges, to customize workflows and enforce rules.
Git Hooks

Git Hooks

Same as Git Hook, scripts triggered by various Git actions to automate tasks or enforce policies.
Git Ignore

Git Ignore

A mechanism to specify intentionally untracked files that Git should ignore, typically defined in a .gitignore file.
Git Index Format

Git Index Format

The internal format used by Git to store the staging area information, representing the next commit to be made.
Git Init

Git Init

A command used to initialize a new Git repository, creating the necessary directory structure for version control.
Git Interactive Rebase

Git Interactive Rebase

A feature allowing users to modify commits in their branch history, useful for cleaning up before merging.
Git Internals (objects, refs, etc.)

Git Internals (objects, refs, etc.)

The underlying data structures and mechanisms Git uses to store and manage version control information.
Git Interpret-trailers

Git Interpret-trailers

A command to parse and manipulate the trailer lines typically found at the end of commit messages.
Git LFS (Large File Storage)

Git LFS (Large File Storage)

A system that manages large files by storing them outside the main repository, replacing them with lightweight pointers to improve performance and efficiency.
Git Large File Storage (LFS)

Git Large File Storage (LFS)

An extension that replaces large files with text pointers in Git, while storing the file contents on a remote server.
Git Log

Git Log

A command to display the commit history of a repository, showing details like author, date, and commit message.
Git Maintenance

Git Maintenance

A set of tasks performed to keep a Git repository in good condition, including garbage collection and optimization.
Git Merge Strategies

Git Merge Strategies

Different algorithms used by Git to combine separate development histories when merging branches.
Git Merge Tools

Git Merge Tools

External programs or interfaces used to resolve merge conflicts in a more visual and user-friendly manner.
Git Merge-base

Git Merge-base

A command that finds the best common ancestor between two commits, useful for determining the point where branches diverged.
Git Multi-pack Index (MIDX)

Git Multi-pack Index (MIDX)

A feature that improves performance for repositories with many pack files by creating an index across multiple packs.
Git Namespaces

Git Namespaces

A feature allowing multiple references (like branches or tags) with the same name to coexist by separating them into different namespaces.
Git Notes

Git Notes

A way to add or inspect object notes, allowing additional information to be attached to Git objects without changing their SHA-1 hash.
Git Object Storage

Git Object Storage

The system Git uses to store all the versions of files, commits, and other objects in a content-addressable filesystem.
Git Pack Files

Git Pack Files

Compressed files containing Git objects, used to efficiently store and transfer repository data.
Git Packfile Format

Git Packfile Format

The internal format used by Git to store multiple objects efficiently in a single file, reducing disk usage and improving performance.
Git Partial Clone

Git Partial Clone

A feature allowing users to clone a repository without downloading all of its objects, saving bandwidth and storage.
Git Patch

Git Patch

A file format representing changes between versions, used for sharing and applying modifications across different repositories.
Git Plumbing Commands

Git Plumbing Commands

Low-level Git commands that expose the internal workings of Git, primarily used for scripting and advanced operations.
Git Porcelain Commands

Git Porcelain Commands

User-friendly commands for everyday tasks, like git status and git commit, designed for ease of use and clear output.
Git Protocol

Git Protocol

The native network protocol used by Git for efficient data transfer between repositories.
Git Prune

Git Prune

A command that removes objects that are no longer reachable from any references in the repository.

Hybrid Blockchain-Cloud Solutions

Systems integrating blockchain technology with traditional cloud services for enhanced security and transparency.

Hybrid Cloud Management

Tools and practices for managing resources across public and private cloud environments.

Hybrid Cloud Monitoring

Tracking performance and health of resources spanning both public and private cloud environments.

Hybrid Cloud Orchestration

Coordinating and automating workflows across multiple cloud environments and on-premises infrastructure.

Hybrid Cloud Storage

Data storage solutions that span both on-premises and cloud environments, offering flexible and scalable data management.

Hybrid Connectivity

Network solutions that connect on-premises infrastructure with cloud services, enabling seamless integration and data flow.

Hybrid Identity Management

Managing user identities and access across both on-premises systems and cloud services.

Hybrid Integration Platforms

Tools for connecting applications, data, and processes across on-premises and cloud environments.

Hybrid Quantum-Classical Algorithms

Computational methods combining quantum and classical processing in cloud environments.

Hybrid Quantum-Classical Computing

Using both quantum and classical computing resources in tandem for cloud-based problem-solving.

Hybrid Transactional/Analytical Processing (HTAP)

Database systems supporting both real-time transactions and analytics in cloud environments.

Hyperconverged Infrastructure (HCI)

Integrated compute, storage, and networking in a single cloud-managed system, simplifying data center architecture.

Hyperparameter Tuning

Process of optimizing machine learning model parameters in cloud-based environments.

Hypervisor

Software layer that manages virtual machines in cloud computing environments, enabling efficient resource utilization and isolation.

IAM Roles and Policies

Defined permissions and access controls for users and services in cloud environments.

ISO 27001 Certification

International standard for information security management in cloud environments.

Identity-Aware Proxies

Security tools that verify user identity before granting access to cloud applications.

Image Scanning

Automated process of examining container images for vulnerabilities in cloud environments.

Immutable Infrastructure Security

Security approach based on replacing rather than modifying cloud infrastructure components.

Immutable Storage

Cloud storage that prevents data modification after writing, ensuring data integrity and compliance.

In-Memory Database (e.g., Amazon ElastiCache, Azure Cache for Redis)

Database system that primarily uses main memory for data storage in cloud environments.

In-Memory Grid Computing

Distributed computing using the collective memory of networked computers in the cloud.

In-Network Computing

Processing data within network devices to reduce latency and bandwidth use in cloud architectures.

Incremental Computing Frameworks

Systems for efficiently updating computation results when input data changes in cloud environments.

Indexing

Process of organizing data to optimize query performance in cloud databases, enhancing search and retrieval efficiency.

Infrastructure as Code (IaC) Security Scanning

Automated tools for identifying security issues in infrastructure definition files.

Infrastructure as Code (IaC) Testing

Validating infrastructure definitions before deployment in cloud environments, ensuring reliability and consistency.

Infrastructure as a Service (IaaS)

Cloud-based provision of virtualized computing resources over the internet, including servers, storage, and networking.

Infrastructure-from-Code

Generating cloud infrastructure configurations directly from application code, streamlining development and deployment processes.

Instance Types (e.g., General Purpose, Compute Optimized, Memory Optimized)

Predefined virtual server configurations optimized for different use cases in cloud environments.

Integration Flow Designer

Visual tool for creating and managing data integration processes in cloud environments.

Integration Monitoring and Analytics

Tools for tracking and analyzing the performance of integrated cloud systems and processes.

Intelligent Tiering

Automated data storage class selection based on access patterns in cloud environments.

Intelligent Tiering for Storage

Automatic movement of data between storage tiers based on usage patterns in the cloud.

Intent-Based Networking

Network management approach using AI to automate configuration based on business intent.

Internet Gateway

Network node that connects cloud VPCs to the internet, enabling communication with external resources.

Interplanetary File System (IPFS) Cloud Storage

Decentralized storage system for distributing and accessing files in the cloud, enhancing data availability and resilience.

Intrusion Detection System (IDS)

Security tool that monitors network traffic for suspicious activity in cloud environments.

Intrusion Prevention System (IPS)

Security system that not only detects but also blocks potential threats in cloud networks.

IoT Analytics

Processing and analyzing data from Internet of Things devices in cloud environments.

IoT Anomaly Detection

Identifying unusual patterns in data from IoT devices using cloud-based analytics.

IoT Central (Azure)

Fully managed IoT application platform in the Azure cloud for connecting, monitoring, and managing IoT devices at scale.

IoT Data Ingestion

Process of collecting and importing data from IoT devices into cloud systems for storage, analysis, and processing.

IoT Data Lake

Centralized repository in the cloud for storing large volumes of IoT device data.

IoT Device Management

Cloud-based systems for monitoring, updating, and controlling IoT devices, ensuring efficient operation and security at scale.

IoT Device Provisioning

Process of setting up and configuring IoT devices for secure cloud connectivity.

IoT Device SDK

Software development kit for building applications that connect IoT devices to cloud services.

IoT Edge

Deploying cloud intelligence directly to IoT devices for local processing and analytics.

IoT Edge Computing

Processing data from IoT devices locally before sending to the cloud, reducing latency and bandwidth usage.

IoT Greengrass (AWS)

AWS service for running local compute, messaging, and data caching for connected IoT devices.

IoT Hub

Central message hub for bi-directional communication between IoT applications and devices.

IoT Integration Frameworks

Tools for connecting and managing diverse IoT devices and data streams in cloud environments.

IoT Lifecycle Management

Cloud-based tools for managing IoT devices from deployment through retirement, ensuring efficient device administration.

IoT Over-the-Air (OTA) Updates

Remote software updates for IoT devices managed through cloud platforms, ensuring device security and functionality.

IoT Platform as a Service (PaaS)

Cloud-based platform for developing, managing, and integrating IoT applications and devices.

IoT Protocols (MQTT, CoAP)

Lightweight communication protocols designed for IoT devices in cloud environments.

IoT Rules Engine

Cloud service for processing and acting on data from IoT devices based on predefined conditions.

IoT Security

Measures to protect IoT devices, data, and infrastructure in cloud-connected environments.

IoT Streaming Analytics

Real-time processing and analysis of data streams from IoT devices in the cloud.

Key Management Service (KMS)

Cloud service for creating and managing cryptographic keys for data encryption, ensuring secure data protection.

Knative

Kubernetes-based platform for building, deploying, and managing serverless workloads.

Kubeless

Kubernetes-native serverless framework enabling function deployment without managing underlying infrastructure.

Kubernetes Network Policies

Rules for controlling network traffic between pods in Kubernetes clusters, enhancing security in cloud-native environments.

Kubernetes Security Posture Management (KSPM)

Tools for assessing and improving security configurations in Kubernetes environments.

Kubernetes Services (e.g., Amazon EKS, Azure AKS, Google GKE)

Managed Kubernetes platforms offered by major cloud providers for container orchestration.

Kustomize

Kubernetes native configuration management tool for customizing application configurations.

Lambda@Edge (AWS)

AWS service for running Lambda functions at edge locations to customize content delivery.

Launch Configuration

Template for EC2 instance settings used in Auto Scaling groups, defining instance type, AMI, and other parameters.

Least Privilege Principle

Security concept of granting only the minimum permissions necessary in cloud environments.

License Optimization for Cloud

Managing software licenses efficiently to reduce costs in cloud environments, ensuring compliance and cost-effectiveness.

Lift and Shift

Migration strategy of moving applications to the cloud without significant modifications.

Lightweight VMs (like Firecracker)

Minimalist virtual machines designed for fast startup and low resource usage in cloud environments.

Linkerd

Lightweight service mesh for Kubernetes, providing observability, reliability, and security for microservices.

Liquid Cooling for High-Density Compute

Using liquid to dissipate heat in densely packed cloud data centers for improved efficiency.

Load Balancer (Application, Network, Classic)

Service that distributes incoming network traffic across multiple servers to ensure no single server becomes overwhelmed.

Log Analytics

Process of collecting, analyzing, and visualizing log data from cloud resources for insights and troubleshooting.

Log Intelligence

AI-driven analysis of log data to identify patterns, anomalies, and insights in cloud environments.

Low-Code Integration Platforms

Tools for building application integrations with minimal hand-coding in cloud environments.

Low-Code/No-Code Development Platforms

Cloud-based tools for creating applications with little to no traditional programming.

Low-Code/No-Code Platforms

Cloud services enabling app development with minimal coding, using visual interfaces and pre-built components.

MQTT Protocol

Lightweight messaging protocol designed for IoT devices and low-bandwidth networks in cloud ecosystems.

Machine Learning Platforms (e.g., Amazon SageMaker, Azure Machine Learning)

Cloud-based services for building, training, and deploying machine learning models at scale.

Master Data Management (MDM) in the Cloud

Centralized management of critical business data entities in cloud environments.

Meta-Learning Frameworks

Tools for developing AI models that can learn how to learn, improving adaptability in cloud environments.

Metadata Management Services

Cloud tools for organizing, integrating, and governing metadata across various data sources.

Metamaterial Antennas for Cloud Connectivity

Advanced antenna designs using engineered materials to enhance cloud network performance.

Metric Collection

Gathering and storing quantitative data about cloud resource performance and usage.

Micro-Frontends

Architectural style where frontend apps are composed from independently deployable components in the cloud.

Microsegmentation Orchestration

Automating the process of dividing cloud networks into secure zones for enhanced protection.

Microservices Integration

Connecting and coordinating interactions between independent microservices in cloud architectures.

Migration Planning

Strategic process of preparing and scheduling the move of applications and data to cloud environments.

Mixed Reality as a Service

Cloud-based platforms for developing and deploying mixed reality applications, combining virtual and physical environments.

Mobile Edge Computing

Bringing cloud computing capabilities closer to mobile users to reduce latency and improve performance.

Mobile Edge Computing (MEC)

Extending cloud computing capabilities to the edge of mobile networks for lower latency.

Model Deployment

Process of making machine learning models available for use in cloud production environments.

Model Explainability

Techniques for understanding and interpreting decisions made by AI models in cloud environments.

Model Monitoring

Tracking the performance and behavior of deployed machine learning models in cloud environments.

Model Registry

Centralized repository for storing and managing machine learning models in cloud environments.

Model Serving

Process of making trained machine learning models available for real-time predictions in cloud environments.

Model Training

Process of teaching machine learning algorithms to make predictions using data in cloud environments.

Init Containers

Specialized containers that run to completion before other containers in a Kubernetes pod, used for initialization tasks.

Init Containers Resources

Specification of CPU and memory limits for initialization containers in Kubernetes pods, ensuring efficient resource utilization.

Initializers

Deprecated Kubernetes feature for dynamically modifying resource configurations before they become visible to the system.

Inter-Container Communication

Methods and patterns for containers within a pod to exchange data and signals, utilizing shared volumes or localhost networking.

IoT Edge Patterns

Architectural designs for deploying and managing containerized applications on edge devices in Internet of Things scenarios.

Istio

Open-source service mesh providing traffic management, security, and observability for cloud-native applications.

Istio Control Plane Components

Core services of the Istio service mesh responsible for configuring proxies and implementing policies.

Istio Destination Rules

Istio traffic management resource defining policies that apply to traffic intended for a service after routing has occurred.

Istio Gateways

Istio resources managing inbound and outbound traffic for the service mesh, providing fine-grained control over traffic flow.

Istio Mixerless Architecture

Istio design that removes the Mixer component, improving performance and scalability of the service mesh.

Istio Service Entries

Istio resources allowing the addition of entries to the service registry, enabling traffic to external dependencies.

Istio Virtual Services

Istio traffic management resources defining a set of traffic routing rules to apply when a host is addressed.

Istio's Ambient Mesh

Istio feature providing a sidecar-less service mesh implementation, reducing resource overhead and simplifying deployment.

Jaeger

Open-source, end-to-end distributed tracing system for monitoring and troubleshooting microservices-based distributed systems.

Jaeger Operator

Kubernetes operator for automated deployment and management of Jaeger tracing infrastructure in container environments.

Jaeger Tracing

Implementation of distributed tracing using Jaeger to monitor and optimize performance in microservices architectures.

Jenkins X

Cloud-native CI/CD solution for Kubernetes, automating the entire software development lifecycle for containerized applications.

Jib

Tool for building optimized Docker and OCI images for Java applications without the need for a Docker daemon.

Job

Kubernetes resource that creates one or more pods to perform a specific task and ensures they successfully complete, ideal for batch processes.

K3s

Lightweight Kubernetes distribution designed for edge, IoT, and resource-constrained environments, simplifying cluster deployment.

K9s CLI

Terminal-based UI for managing and monitoring Kubernetes clusters, providing an intuitive interface for cluster operations.

KEDA (Kubernetes Event-driven Autoscaling)

Kubernetes-based Event Driven Autoscaling, enabling fine-grained autoscaling for event-driven workloads based on event sources.

KUDO (Kubernetes Universal Declarative Operator)

Kubernetes Universal Declarative Operator, a toolkit for writing operators using a declarative spec, simplifying complex application management.

Kaniko

Tool for building container images from a Dockerfile inside a container or Kubernetes cluster, without requiring a Docker daemon.

Kanister for Application-Consistent Backups

Framework for application-level data management in Kubernetes, ensuring consistent backups of stateful apps.

Karmada

Open-source project for multi-cluster application management in Kubernetes, facilitating resource distribution across clusters.

Kata Containers

Lightweight virtual machines that feel and perform like containers, but provide the workload isolation and security of VMs.

Kata Containers 2.0

Major update to Kata Containers, introducing improved performance, reduced footprint, and enhanced security features.

Keptn

Cloud-native application lifecycle orchestration tool, automating deployment, testing, and remediation for containerized apps.

Kernel Bypass Networking

Technique allowing network packets to bypass the kernel, improving performance in container networking scenarios.

Kernel Namespaces

Linux feature providing isolation for system resources, fundamental to container implementation and resource separation.

Kilo for WireGuard-based Overlay Network

CNI plugin using WireGuard to create a mesh overlay network for Kubernetes, enhancing security and simplicity.

Knative

Kubernetes-based platform for building, deploying, and managing serverless workloads, simplifying serverless application development.

Knative Eventing

Knative component providing tools for routing events between publishers and subscribers in cloud-native applications.

Knative Serving

Knative component for deploying and managing serverless workloads, handling scaling and routing of containerized applications.

Krustlet for WebAssembly in Kubernetes

Tool allowing WebAssembly modules to run in Kubernetes clusters, enabling language-agnostic workloads.

Kube-OVN

Network virtualization solution for Kubernetes integrating the Open vSwitch software switch to provide advanced networking features.

Kube-OVN for Open vSwitch-based Networking

Implementation of Kube-OVN to leverage Open vSwitch for flexible, high-performance container networking.

Kube-bench for CIS Benchmarks

Tool for checking whether Kubernetes deployments adhere to Center for Internet Security (CIS) best practices.

Kube-bench for Security Auditing

Use of kube-bench to perform automated security audits of Kubernetes clusters against established benchmarks.

Kube-router for Direct Container Routing

Kubernetes networking solution providing direct container-to-container networking with BGP-based routing.

Kube-score for Kubernetes Object Analysis

Tool for static code analysis of Kubernetes object definitions, identifying misconfigurations and potential issues.

Kube-state-metrics

Service that listens to the Kubernetes API server and generates metrics about the state of Kubernetes objects.

KubeEdge

Open-source system extending native containerized application orchestration capabilities to hosts at Edge.

Kubeadm

Tool for bootstrapping a minimum viable Kubernetes cluster, simplifying the process of setting up a production-grade cluster.

Kubeaudit for Kubernetes Auditing

Open-source tool for auditing Kubernetes clusters and workloads for potential security issues and best practice violations.

Kubebuilder

Framework for building Kubernetes APIs using custom resource definitions (CRDs), simplifying the creation of operators and controllers.

Kubecost for Cost Monitoring

Tool providing real-time cost visibility and insights for running applications on Kubernetes, optimizing resource allocation.

Kubefed

Kubernetes Cluster Federation, enabling resource management across multiple Kubernetes clusters from a single control plane.

Kubeless

Kubernetes-native serverless framework, allowing deployment of small bits of code (functions) without managing underlying infrastructure.

Kubernetes API Versioning

System for evolving the Kubernetes API over time, allowing for backwards compatibility and gradual feature deprecation.

Kubernetes Admission Controllers

Plugins intercepting requests to the Kubernetes API server before object persistence, enforcing policies.

Kubernetes Aggregation Layer

Feature allowing the Kubernetes API to be extended with additional APIs, enabling custom resources and controllers.

Kubernetes Annotations

Key-value pairs for attaching non-identifying metadata to objects, used for tooling and client retrieval.

Kubernetes Autoscaling (HPA, VPA, Cluster Autoscaler)

Mechanisms (HPA, VPA, Cluster Autoscaler) for automatically adjusting resources based on demand and metrics.

Kubernetes Conformance Program

CNCF initiative ensuring consistency and portability across Kubernetes distributions and installations.

Kubernetes Events

API objects automatically created when other objects change state, providing a cluster activity audit trail.

Kubernetes Federation

Mechanism for coordinating multiple Kubernetes clusters, enabling multi-cluster application deployment and management.

Kubernetes Finalizers

Field on resources preventing accidental deletion, ensuring proper cleanup of related resources or external dependencies.

Kubernetes Garbage Collection

Process of automatically deleting objects that no longer have owners, preventing resource leaks.

Kubernetes Gateway API

Evolved ingress and service networking, providing a more expressive, extensible way to configure traffic routing.

Kubernetes Labels

Key-value pairs attached to objects for identification and selection, crucial for organizing and selecting object subsets.

Kubernetes Metrics Server

Cluster-wide aggregator of resource usage data, providing CPU and memory metrics for Horizontal Pod Autoscaler.

Kubernetes Operators

Software extensions to Kubernetes that use custom resources to manage applications and their components.

Kubernetes Owners and Dependents

Relationship between API objects where one object owns another, used for cascading deletion and orphan handling.

Kubernetes Selectors

Label query over a set of resources, used for identifying and grouping API objects based on their labels.

Kubernetes Version Lifecycle

Policies and timelines for Kubernetes version releases, support, and deprecation, guiding upgrade planning.

Kubernetes Virtual Clusters

Fully functional Kubernetes clusters running on top of other Kubernetes clusters, enabling multi-tenancy.

Kubesec.io for Kubernetes Manifests Scanning

Web-based tool for security risk analysis of Kubernetes resource manifests, identifying vulnerabilities.

Kustomize

Kubernetes native configuration management tool that allows customization of YAML manifests without templating.

Kustomize Overlays

Technique in Kustomize for creating variations of a common base of Kubernetes resources, enabling environment-specific configs.

Kustomize Patches

Method in Kustomize for modifying existing Kubernetes resources without directly editing the original YAML files.

Lacework for Container Compliance

Cloud security platform providing compliance monitoring and threat detection for containerized environments.

Layer

Unit of a container image representing a set of files or changes, crucial for image building and optimization.

Layered File System

Storage mechanism used by container runtimes, allowing efficient storage and quick updates of container images.

Leader Election Pattern

Design pattern ensuring only one instance of a distributed application component is active at a time.

Leader Election in Operators

Process where multiple instances of an operator elect a leader to prevent conflicts in resource management.

Least Privilege Principle

Security concept of giving a user or process only the minimum levels of access necessary to perform its function.

Lens IDE for Kubernetes

User-friendly, open-source IDE for managing Kubernetes clusters, providing a unified interface for multiple clusters.

Lightstep

Observability platform providing insights into the behavior of highly distributed software systems and microservices.

Limit Ranges

Kubernetes policy for constraining resource allocations (CPU and memory) for pods or containers in a namespace.

LimitRange

Kubernetes object defining the min, max, and default compute resources for pods and containers in a namespace.

Linkerd

Lightweight service mesh for Kubernetes, providing observability, reliability, and security for microservices.

Linkerd Data Plane

Component of Linkerd responsible for proxying traffic between services, implementing service mesh functionality.

Linkerd Service Profiles

Linkerd resource providing service-specific traffic metrics and control, enhancing observability and management.

Linkerd's Ultra-lightweight Proxy

High-performance, minimal-footprint proxy used in Linkerd's data plane for efficient service mesh operations.

Linux Security Modules (LSM)

Framework allowing various security models to be plugged into the Linux kernel, enhancing container isolation.

Load Balancer Integration

Process of connecting external load balancers with Kubernetes services for distributing incoming traffic.

Load Balancing Algorithms

Methods used by load balancers to distribute traffic across multiple container instances or pods.

LoadBalancer

Kubernetes service type that provisions an external load balancer in cloud environments for routing external traffic to services.

Local Persistent Volumes

Kubernetes volume type for locally attached storage, providing high-performance storage options for stateful workloads.

Locality Load Balancing

Technique for routing traffic to geographically or topologically closer endpoints in distributed container deployments.

Log Aggregation Patterns

Techniques for collecting, processing, and storing logs from distributed containerized applications for centralized analysis.

Logging Architecture

Design of systems for capturing, storing, and analyzing logs from containers and orchestration platforms.

Loki

Horizontally-scalable, multi-tenant log aggregation system designed for use with Prometheus and Kubernetes.

Longhorn

Cloud-native distributed block storage system for Kubernetes, providing persistent storage for stateful workloads.

Longhorn Distributed Block Storage

Implementation of Longhorn for providing resilient, replicated block storage in Kubernetes clusters.

Materialized View Pattern

Technique for precomputing and storing query results, improving performance in microservices architectures.

Memory Pressure

Condition where a node or container is running low on available memory, potentially triggering evictions or OOM kills.

Mesh Expansion

Process of extending service mesh capabilities to workloads running outside the primary container orchestration platform.