Engineering Glossary

From fundamental principles to cutting-edge practices, this glossary covers the full spectrum of software engineering terminology.

DevOps
Cloud Computing
Git
Containerization & Orchestration

"As code"

Defining and managing infrastructure, configurations, or processes using code, enabling version control, automation, and reproducibility.
DevOps

"Nines"

Measure of system availability, expressed as a percentage. E.g., "five nines" means 99.999% uptime, allowing for minimal downtime.
DevOps

"Single Pane of Glass"

Unified display or interface that integrates data from multiple sources, providing a comprehensive view of system status or operations.
DevOps

A/B Testing

Comparing two versions of a webpage or app to determine which performs better, based on user interaction and conversion rates.
DevOps

AIOps (Artificial Intelligence Operations)

Using AI and machine learning to enhance IT operations, automating tasks and providing insights for better decision-making.
DevOps

ALB (Application Load Balancing)

Distributes incoming application traffic across multiple targets to improve availability and fault tolerance.
DevOps

API

Application Programming Interface; set of protocols and tools for building software applications and enabling communication between systems.
DevOps

API Discovery

Process of identifying and documenting available APIs within an organization or from external sources.
DevOps

API Endpoint

Specific URL where an API can be accessed and where requests are sent to interact with a server or service.
DevOps

API Gateway

Manages, secures, and routes API requests, acting as a single entry point for multiple microservices or backend systems.
DevOps

API Management

Process of creating, publishing, documenting, and analyzing APIs in a secure environment.
DevOps

API Monitoring

Tracking API performance, availability, and usage to ensure optimal functionality and identify issues.
DevOps

API Response Time

The duration between sending a request to an API and receiving the response, crucial for performance evaluation.
DevOps

API Security

Measures and practices to protect APIs from unauthorized access, attacks, and data breaches.
DevOps

API Versioning

Managing different versions of an API to maintain compatibility while allowing updates and improvements.
DevOps

ASG (Auto Scaling Group)

Feature in cloud computing that automatically adjusts the number of instances based on defined conditions.
DevOps

ASP.Net Core Monitoring

Observing and analyzing the performance and behavior of applications built with ASP.Net Core framework.
DevOps

ATO (Account Takeover)

Type of identity theft where an attacker gains unauthorized access to a user's account.
DevOps

AWS (Amazon Web Services)

Cloud computing platform offering a wide range of services for computing, storage, networking, and more.
DevOps

AWS App Development Tools

Suite of tools provided by AWS for building, testing, and deploying applications on their cloud platform.
DevOps

AWS CLI

Command-line interface for interacting with AWS services, allowing users to manage resources and automate tasks.
DevOps

AWS CloudWatch

Monitoring and observability service for AWS resources and applications, providing metrics, logs, and alarms.
DevOps

AWS CodeDeploy

Fully managed deployment service that automates software deployments to various compute services.
DevOps

AWS CodePipeline

Continuous delivery service for fast and reliable application and infrastructure updates.
DevOps

AWS EC2

Elastic Compute Cloud; scalable computing capacity in the AWS cloud for running virtual servers.
DevOps

AWS ELB

Elastic Load Balancing; automatically distributes incoming application traffic across multiple targets.
DevOps

AWS Lambda

Serverless compute service that runs code in response to events and automatically manages the underlying resources.
DevOps

AWS Managed Services

Ongoing management of AWS infrastructure, allowing customers to focus on their applications and business.
DevOps

AWS Monitoring

Process of tracking and analyzing the performance, health, and usage of AWS resources and applications.
DevOps

AWS RDS

Relational Database Service; managed service for setting up, operating, and scaling relational databases in the cloud.
DevOps

AWS RDS Postgres Monitoring

Tracking and analyzing the performance and health of PostgreSQL databases running on AWS RDS.
DevOps

AWS S3

Simple Storage Service; object storage service offering industry-leading scalability, data availability, and performance.
DevOps

AWS S3 Cost Optimization

Strategies and practices to reduce costs associated with storing and accessing data in AWS S3.
DevOps

AWS Security

Set of tools, services, and best practices for protecting data, applications, and infrastructure in the AWS cloud.
DevOps

Acceptance Test-Driven Development (ATDD)

Software development approach where acceptance tests are written before the code, guiding implementation.
DevOps

Active Directory

Microsoft's directory service for Windows domain networks, managing users, computers, groups, and other objects.
DevOps

Advanced Rate Limiting

Technique to control the rate of incoming requests to an API or service, preventing overload and ensuring fair usage.
DevOps

Agent

Software component that performs automated tasks, often used in monitoring, data collection, or system management.
DevOps

Agile

Iterative approach to software development emphasizing flexibility, collaboration, and rapid delivery of working software.
DevOps

Agile Manifesto

Document outlining values and principles of Agile software development, prioritizing individuals, working software, and adaptability.
DevOps

Agile Methodology

Set of practices based on Agile principles, focusing on iterative development, team collaboration, and customer feedback.
DevOps

Agile Organization

Company structure that emphasizes adaptability, quick response to change, and continuous improvement.
DevOps

Agile Project Management

Applying Agile principles to project management, focusing on iterative planning, frequent delivery, and team empowerment.
DevOps

Agile Software Development

Iterative approach to building software, emphasizing flexibility, collaboration, and rapid delivery of working features.
DevOps

Ajax Requests

Technique for creating fast, dynamic web pages by exchanging small amounts of data with the server behind the scenes.
DevOps

Alerting

System for notifying relevant personnel about critical events or issues in IT infrastructure or applications.
DevOps

Amazon Aurora

Fully managed relational database engine compatible with MySQL and PostgreSQL, designed for the cloud.
DevOps

Amazon Web Services (AWS)

A cloud platform offering a wide range of services like computing power, storage, and databases, enabling scalable, flexible solutions.
DevOps

Android Deployment

Process of distributing and installing Android applications on devices or making them available through app stores.
DevOps

Android Emulator

Software tool that simulates Android devices on a computer for testing and development purposes.
DevOps

Android Studio

Official integrated development environment (IDE) for Android app development, offering a comprehensive set of tools and features.
DevOps

Anomaly Detection

Process of identifying unusual patterns or behaviors that deviate from expected norms in data or system behavior.
DevOps

Ansible

Open-source automation tool for configuration management, application deployment, and task automation.
DevOps

Antifragile

Quality of systems that gain strength from disorder or stress, becoming more resilient in the face of challenges.
DevOps

Apache

Popular open-source web server software that can run on various platforms, known for its reliability and extensive feature set.
DevOps

App Store Connect

Apple's platform for managing apps, viewing analytics, and submitting to the App Store.
DevOps

AppDynamics

Application performance management and IT operations analytics platform for monitoring and optimizing application performance.
DevOps

Application Containerization

Packaging software code and dependencies into lightweight, portable containers for consistent deployment across environments.
DevOps

Application Firewall

Security system that monitors, filters, and blocks HTTP/HTTPS traffic to and from web applications.
DevOps

Application Infrastructure

The hardware, software, and networking components required to run and support an application.
DevOps

Application Lifecycle Management

Process of managing an application from ideation through retirement, including development, testing, and maintenance.
DevOps

Application Migration

Process of moving an application from one environment to another, often involving cloud or platform transitions.
DevOps

Application Performance Monitoring (APM)

Tools and practices for monitoring and managing the performance and availability of software applications.
DevOps

Application Platform

Software framework that provides a foundation for developing and running applications, often including runtime services and APIs.
DevOps

Application Program Interface (API)

Set of protocols, routines, and tools for building software applications and enabling communication between different software systems.
DevOps

Application Release Automation (ARA)

Process of packaging and deploying applications automatically across various environments and platforms.
DevOps

Application Security

Measures taken to improve the security of an application by finding, fixing, and preventing vulnerabilities.
DevOps

Application Team

Group responsible for developing, maintaining, and improving a specific application or set of applications.
DevOps

Application Whitelisting

Security practice that specifies which applications are permitted to run on a system, blocking all others.
DevOps

Application Workflow

Sequence of tasks or processes within an application, often automated to improve efficiency and consistency.
DevOps

Aptly

Debian repository management tool that makes it easy to mirror existing repositories and create new ones.
DevOps

Artifact

Any file or object produced during the software development process, such as compiled code, documentation, or test results.
DevOps

Artifactory

Repository manager for storing and managing software packages, artifacts, and dependencies.
DevOps

Artifacts

Byproducts of software development, including executables, libraries, documentation, and other files created during the process.
DevOps

Artificial Intelligence (AI)

Computer systems capable of performing tasks that typically require human intelligence, such as learning and problem-solving.
DevOps

Asgard

Open-source web-based tool for cloud management and application deployment, primarily used with Amazon Web Services.
DevOps

Asterisk

Open-source framework for building communications applications, particularly used for creating custom telephone systems.
DevOps

Atom

Open-source text and source code editor developed by GitHub, known for its customizability.
DevOps

Attack Surface

Total sum of vulnerabilities in a given system that are accessible to an attacker.
DevOps

Attack Vector

Method or pathway used by a malicious actor to gain unauthorized access to a computer or network.
DevOps

Audit Log

Chronological record of system activities, providing a trail for tracking user actions and system events.
DevOps

Auditd

Linux daemon that monitors and logs system activities to detect security violations.
DevOps

Authentication Factor

Piece of information or process used to verify a user's identity, such as passwords, biometrics, or security tokens.
DevOps

Automated Builds

Process of compiling source code into executable software without manual intervention, often part of CI/CD pipelines.
DevOps

Automation

Use of technology to perform tasks with minimal human intervention, improving efficiency and reducing errors.
DevOps

Autonomy

Degree of independence and self-governance given to teams or systems in making decisions and performing tasks.
DevOps

Awsbox

Tool for deploying node.js apps to Amazon Web Services, simplifying the process of setting up and managing instances.
DevOps

Azure

Microsoft's cloud computing platform providing a wide range of services for building, testing, deploying, and managing applications.
DevOps

Back-end

Server-side of a website or application, responsible for data storage, security, and business logic.
DevOps

Backup

Copy of data created to protect against loss or damage, often stored separately from the original for recovery purposes.
DevOps

Bad/Threat Actor

Individual or entity that attempts to exploit vulnerabilities in systems or networks for malicious purposes.
DevOps

Baklava code

Term describing code that has too many layers, making it overly complex and difficult to understand or maintain.
DevOps

Bamboo

Continuous integration and deployment server by Atlassian, automating the building, testing, and deployment of software.
DevOps

Bare-metal

Physical computer server dedicated to a single tenant, not virtualized or shared among multiple users.
DevOps

Barkeep

Open-source web-based code review system that facilitates collaborative code reviews and discussions.
DevOps

Bash

Unix shell and command language, widely used for scripting and automating tasks in Unix-like operating systems.
DevOps

Bastion host

Specially designed system on a network specifically intended to withstand attacks, usually placed at the edge of a network.
DevOps

Bazel

Open-source build and test tool that enables fast, reproducible builds across multiple platforms and languages.
DevOps

Beats

Lightweight data shippers for various types of data, part of the Elastic Stack for log and metrics collection.
DevOps

Behavior-Driven Development (BDD)

Software development approach that focuses on defining the behavior of an application based on user stories.
DevOps
stash entry

stash entry

A single set of stashed changes in Git, which can be reapplied later to the working directory.
status checks

status checks

Automated tests or processes that run when changes are proposed in a Git repository, ensuring code quality and compatibility.
subscription

subscription

Notifications or updates a user receives about activity in Git repositories they're interested in or contributing to.
superproject

superproject

The main Git repository that contains submodules, managing references to specific versions of nested repositories.
symref

symref

A symbolic reference in Git that points to another reference, most commonly used for HEAD pointing to the current branch.
tag object

tag object

A Git object containing metadata about a tag, including the tagger, date, and optional message.
team

team

A group of users on a Git platform with shared access permissions to repositories within an organization.
team maintainer

team maintainer

A user with administrative privileges for managing a team's membership and access rights in a Git organization.
timeline

timeline

A chronological display of events and activities in a Git repository or user profile on hosting platforms.
topic branch

topic branch

A short-lived Git branch created to develop a specific feature or fix a particular issue.
topics

topics

Keywords or categories assigned to Git repositories to help users discover related projects on hosting platforms.
traffic graph

traffic graph

A visual representation of visitor activity and clone statistics for a Git repository on hosting platforms.
transfer

transfer

The process of moving Git objects between repositories during push, fetch, or clone operations.
tree

tree

A Git object representing a directory structure, containing references to blobs (files) and other trees (subdirectories).
tree object

tree object

A Git object that stores the hierarchy of files and directories in a repository at a specific point in time.
tree-ish (also treeish)

tree-ish (also treeish)

A Git term referring to an object that resolves to a tree, such as a commit, tag, or tree.
unborn

unborn

A state of a Git branch that has no commits yet, typically seen when initializing a new repository.
unmerged index

unmerged index

The state of the Git index containing conflicting changes from different branches during a merge operation.
unreachable object

unreachable object

A Git object not accessible from any reference, potentially subject to garbage collection if not recovered.
upstream branch

upstream branch

The remote branch that a local branch is set to track, used as a reference for pull and push operations.
user

user

An individual account on a Git platform, associated with personal repositories and contributions.
user-to-server request

user-to-server request

An authenticated request from a Git client to a server, typically for operations like push or fetch.
username

username

The unique identifier for a user account on Git platforms, used for authentication and mention notifications.
visible team

visible team

A team in a Git organization that is visible to all members of the organization, as opposed to secret teams.
watch

watch

A feature allowing users to receive notifications about activity in Git repositories they're interested in.
watching notifications

watching notifications

Alerts received for all notable events in a watched Git repository, including issues, pull requests, and releases.
web notifications

web notifications

Alerts displayed on Git platforms' web interfaces, notifying users of relevant activity or mentions.
working area

working area

The directory on your local machine where you modify files before staging and committing them in Git.
working tree

working tree

The set of files and directories in your project that are currently checked out and available for editing.
worktree

worktree

A Git feature allowing multiple working directories to be associated with a single repository.
write access

write access

Permission to make changes to a Git repository, including pushing commits and modifying branches.

Cloud-Based Robot Operating System (ROS)

Cloud-hosted version of ROS, providing robotics middleware and tools as a service.

Cloud-Based Robot Simulation

Platforms for simulating and testing robotic systems using cloud computing resources.

Cloud-Based Spatial Audio

Services for processing and rendering 3D audio experiences using cloud computing resources.

Cloud-Connected Industrial Robots

Factory automation systems leveraging cloud resources for data processing, analytics, and remote management.

Cloud-Enabled Autonomous Navigation

Systems using cloud computing to enhance navigation capabilities of autonomous vehicles or robots.

Cloud-Integrated Storage

Systems using cloud computing to enhance navigation capabilities of autonomous vehicles or robots.

Cloud-Native ACID Transactions

Implementations of ACID properties for database transactions in distributed cloud environments.

Cloud-Native Application Protection Platform (CNAPP)

Integrated security solutions designed to protect cloud-native applications throughout their lifecycle.

Cloud-Native Debugging Tools

Specialized software for identifying and resolving issues in cloud-native applications and microservices.

Cloud-Native Deep Learning

Frameworks and services optimized for training and deploying deep learning models in cloud environments.

Cloud-Native FPGAs and ASICs

Specialized hardware accelerators optimized for cloud-native workloads and accessible as cloud services.

Cloud-Native Firewalls

Network security tools designed specifically for protecting cloud-native applications and infrastructure.

Cloud-Native Hardware Security Module (HSM)

Cloud-based services providing hardware-level encryption key management and cryptographic operations.

Cloud-Native IDEs

Integrated development environments optimized for building and deploying cloud-native applications.

Cloud-Native Jupyter Notebooks

Interactive computing environments for data analysis and machine learning, designed for cloud deployment.

Cloud-Native Load Balancing

Traffic distribution services designed specifically for cloud-native applications and microservices architectures.

Cloud-Native Network Functions (CNF)

Virtualized network services designed to run in containerized environments, optimized for cloud infrastructure.

Cloud-Native Network Functions (CNFs)

Network services built as microservices, optimized for deployment in cloud-native environments.

Cloud-Native Reinforcement Learning Environments

Scalable platforms for training AI agents using reinforcement learning algorithms in cloud environments.

Cloud-Native Security Information and Event Management (SIEM)

SIEM solutions designed for collecting and analyzing security data from cloud-native applications.

Cloud-Native Security Orchestration

Automated coordination of security tools and processes in cloud-native environments.

Cloud-Native Transformation

Process of redesigning applications and infrastructure to fully leverage cloud-native technologies and practices.

Cloud-Powered Brain-Computer Interfaces

BCI systems that use cloud computing for data processing and AI-driven interpretation of brain signals.

Cloud-agnostic Architecture

Design approach for building applications that can run on multiple cloud platforms without significant modifications.

Cloud-based AI Chipset Virtualization

Technology enabling virtual access to specialized AI hardware accelerators in the cloud.

Cloud-based Augmented Reality (AR)

Services for processing and delivering AR experiences using cloud computing resources.

Cloud-based Cognitive Architectures

Frameworks for building AI systems that mimic human cognitive processes using cloud resources.

Cloud-based Cryptocurrency Mining

Using cloud computing resources to perform complex calculations required for mining digital currencies.

Cloud-based IoT Platforms

Managed services for connecting, monitoring, and controlling Internet of Things devices using cloud infrastructure.

Cloud-based Robotic Process Automation (RPA)

Services for automating repetitive tasks and workflows using software robots hosted in the cloud.

Cloud-based Visual Programming Environments

Platforms offering drag-and-drop interfaces for creating applications without traditional coding, hosted in the cloud.

Cloud-native AI Development

Practices and tools for building, training, and deploying AI models optimized for cloud environments.

Cloud-native GPU Programming

Techniques and tools for leveraging cloud-based GPUs to accelerate computational tasks in cloud-native applications.

Cloud-to-Cloud Migration

Process of moving applications and data from one cloud provider to another, optimizing for cost, performance, or features.

Cloud-to-Edge-to-Fog Seamless Integration

Unified computing paradigm combining cloud, edge, and fog computing for optimal data processing and latency.

CloudFormation (AWS)

Infrastructure-as-Code service for defining and provisioning AWS infrastructure using declarative templates.

CloudFormation Designer

Visual tool for creating, viewing, and modifying AWS CloudFormation templates, simplifying infrastructure-as-code development.

Cloudlets

Small-scale cloud data centers located at the edge of the network to support low-latency applications.

CoAP Protocol

Lightweight application layer protocol designed for constrained devices in Internet of Things (IoT) environments.

Cold Start

Delay in executing serverless functions when they haven't been used recently and need to be initialized.

Collaborative Cloud Robotics

Multiple robots working together, leveraging cloud resources for coordination and shared learning.

Collaborative Data Modeling

Cloud-based tools enabling teams to jointly design and refine data models for applications.

Collaborative Data Science Environments

Cloud platforms supporting team-based data analysis, model development, and knowledge sharing.

Collaborative Filtering at Scale

Cloud-based recommendation systems processing large datasets to suggest items based on user preferences.

Columnar Storage

Database storage format optimized for analytical queries in cloud data warehouses.

Command Query Responsibility Segregation (CQRS)

Architectural pattern separating read and write operations in cloud-based applications.

Complex Event Processing (CEP)

Real-time analysis of data streams to identify and respond to specific patterns or events in cloud environments.

Compliance Frameworks

Standardized guidelines for ensuring cloud systems meet regulatory requirements (e.g., GDPR, HIPAA, PCI DSS).

Compliance Frameworks (GDPR, HIPAA, PCI DSS, etc.)

Regulatory standards guiding data protection and security practices in cloud computing.

Compliance Monitoring

Continuous assessment of cloud systems and practices to ensure adherence to regulatory standards.

Composable Infrastructure as a Service

Cloud service allowing dynamic assembly of virtualized compute, storage, and networking resources.

Computational Storage

Storage devices with built-in processing capabilities, enabling data processing within the storage subsystem.

Computational Storage Devices

Storage hardware with integrated computing resources for in-situ data processing in cloud environments.

Computer Vision

AI technology that enables machines to interpret and understand visual information from images or videos.

Computer Vision APIs

Cloud services offering pre-built models and tools for image and video analysis tasks.

Concurrency

Simultaneous execution of multiple computations or processes in cloud environments.

Confidential Computing

Technology protecting data in use by performing computation in a hardware-based trusted execution environment.

Confidential Computing Enclaves

Isolated environments in cloud infrastructure for secure processing of sensitive data.

Configuration Drift Detection

Monitoring and identifying unintended changes in cloud resource configurations over time.

Consortium Blockchain

Permissioned blockchain network operated by a group of organizations in a cloud environment.

Container Instances (e.g., Amazon ECS, Azure Container Instances)

Serverless compute platforms for running containers without managing the underlying infrastructure.

Container Networking

Optimizing container resource allocations to improve efficiency and reduce costs in cloud environments.

Container Rightsizing

Technologies and practices for managing network connectivity between containerized applications in the cloud.

Container Runtime Security

Tools and practices for protecting containerized applications during execution in cloud environments.

Container Security

Measures and tools for protecting containerized applications and their data in cloud environments.

Context-Aware Cloud Interfaces

User interfaces that adapt based on user context, device capabilities, and environmental factors.

Continuous Adaptive Risk and Trust Assessment (CARTA)

Dynamic approach to security that continuously analyzes and adapts to changing risks in cloud environments.

Continuous Cloud Security Posture Management

Ongoing process of assessing and improving security risks in cloud infrastructure configurations.

Continuous Compliance Monitoring and Reporting

Automated, real-time tracking and reporting of compliance status for cloud resources and applications.

Continuous Data Testing

Ongoing validation of data quality, integrity, and consistency in cloud-based data pipelines and storage systems.

Continuous Deployment

Automated process of releasing code changes to production environments in cloud infrastructure.

Continuous Integration/Continuous Deployment (CI/CD) in the Cloud

Automated pipeline for building, testing, and deploying applications in cloud environments.

Continuous Optimization

Ongoing process of improving cloud resource utilization, performance, and cost-efficiency.

Continuous Profiling

Constant monitoring and analysis of application performance in cloud environments to identify bottlenecks.

Continuous Rightsizing

Ongoing process of adjusting cloud resource allocations to match actual usage and demand.

Continuous Training

Automated process of regularly updating machine learning models with new data in cloud environments.

Continuous Verification

Ongoing process of validating cloud infrastructure and applications against defined policies and configurations.

Cost Allocation

Process of distributing cloud expenses across different departments, projects, or cost centers within an organization.

Cost Anomaly Detection

Automated identification of unusual or unexpected patterns in cloud spending, helping optimize resource allocation and budgeting.

Cost Attribution

Associating cloud expenses with specific resources, services, or business units for accurate accounting.

Cost Explorer

Tool for visualizing and analyzing cloud spending patterns and trends, helping optimize resource allocation and budgeting.

Cost Optimization Recommendations

Automated suggestions for reducing cloud expenses while maintaining performance and reliability.

Cost-aware Autoscaling

Intelligent scaling of cloud resources considering both performance requirements and cost implications.

Cross-Border Data Transfer Compliance

Ensuring cloud data transfers comply with international data protection regulations.

Cross-Cloud Data Replication

Synchronizing data across multiple cloud providers for redundancy and disaster recovery.

Cross-Cloud Smart Contracts

Blockchain-based agreements executable across different cloud platforms, enabling multi-cloud decentralized applications.

Cross-Platform Cloud Native Runtimes

Execution environments for cloud-native applications that work across multiple cloud providers.

Cryptographic Key Management

Services for securely generating, storing, and rotating encryption keys in cloud environments.

DDoS Protection

Services defending against Distributed Denial of Service attacks on cloud-based applications and infrastructure.

DNA Data Storage

Experimental technology using DNA molecules to store digital data, potentially leveraging cloud for processing.

DNA-Based Data Storage

Experimental technique using DNA molecules to store digital data, potentially integrated with cloud for processing and retrieval.

DNS in the Cloud

Managed Domain Name System services provided by cloud platforms for translating domain names to IP addresses.

Dapr (Distributed Application Runtime)

Portable runtime for building microservices-based applications across cloud and edge environments.

Dashboards and Visualization

Tools for creating interactive, visual representations of cloud data and metrics.

Data Catalog

Centralized repository for metadata about an organization's data assets in the cloud.

Data Catalogs and Data Discovery

Tools for organizing, indexing, and searching data assets across cloud environments.

Data Classification

Categorizing data based on sensitivity and importance for appropriate handling in cloud storage.

Data Drift Detection

Monitoring changes in data distributions that may affect machine learning model performance in cloud environments.

Data Fabric

Integrated architecture for managing and accessing data across diverse cloud and on-premises environments.

Data Fabric Architecture

Unified data management framework spanning multiple cloud and on-premises environments.

DaemonSet Pattern

Design pattern using DaemonSets to run system daemons or agents on every node in a cluster.

Data Backup and Recovery

Processes and tools for preserving and restoring data in containerized environments, ensuring data durability.

Data Consistency in Distributed Systems

Techniques ensuring data integrity across distributed container-based applications, maintaining reliability.

Data Fabric in Containerized Environments

Distributed data management architecture providing consistent data access across containerized applications.

Data Lakehouse Architecture

Unified data architecture combining data lake and data warehouse features in containerized environments.

Data Migration Between Containers

Process of moving data between containers or from traditional systems to containerized applications.

Data Persistence Strategies

Techniques for maintaining data across container lifecycles, including volume mounts and persistent volumes.

Data Plane

Network layer responsible for forwarding container traffic based on control plane decisions.

Data Replication in Containers

Techniques for creating and maintaining copies of data across multiple containerized instances.

Data Sharding in Containerized Databases

Partitioning data across multiple database containers for improved scalability and performance.

Database Containerization

Process of running database systems within containers for improved portability and resource utilization.

Database-per-Service Pattern

Microservices design pattern where each service has its own dedicated database, ensuring data isolation.

Datadog Container Monitoring

Platform for observability and monitoring of containerized environments and microservices.

Dead Letter Queue Pattern

Design pattern for handling failed message processing in containerized message-driven systems.

Declarative Deployments

Approach to deploying containers by specifying desired state rather than imperative commands.

Deployment Strategies

Techniques for rolling out container updates, including rolling updates, blue-green, and canary deployments.

Descheduler

Kubernetes component that evicts pods from nodes based on specific policies to optimize cluster resource usage.

DevSpace for Cloud-native Development

Standardized format defining the structure and metadata of Docker container images, ensuring portability.

Device Plugins

Kubernetes feature allowing nodes to advertise system hardware resources to the cluster, enabling specialized hardware use.

Direct Server Return (DSR)

Network optimization technique in container load balancing for improved performance by bypassing the load balancer for responses.

Distributed Tracing Integration

Implementation of tracing in containerized microservices for end-to-end request visibility.

Distributed Tracing with Jaeger

Implementation of distributed tracing using Jaeger to monitor and optimize performance in microservices architectures.

Distributed Tracing with OpenTelemetry

Implementation of OpenTelemetry for standardized observability in containerized environments.

Distroless Images

Minimal container images containing only the application and its runtime dependencies, reducing attack surface.

Docker Attach

Command to attach local standard input, output, and error streams to a running container for interaction and debugging.

Docker Build Context

Set of files located in the specified PATH or URL, used during the docker build process to create images.

Docker Buildx

Docker CLI plugin for extended build capabilities, including multi-platform builds and enhanced build options.

Docker CRI Shim

Component enabling Docker to be used as a container runtime in Kubernetes via the Container Runtime Interface.

Docker Client

Command-line tool for interacting with Docker daemon and managing containers, images, and other Docker objects.

Docker Commit

Command creating a new image from a container's changes, useful for saving modifications made to a running container.

Docker Compose

Tool for defining and running multi-container Docker applications, simplifying the process of managing complex application stacks.

Docker Container Inspection

Process of viewing detailed information about a container's configuration and state, aiding in troubleshooting.

Docker Content Trust

Feature providing digital signing and verification of Docker images, ensuring image authenticity and integrity.

Docker Content Trust Signature Verification

Process of validating the authenticity and integrity of signed Docker images before use.

Docker Contexts

Feature allowing management of multiple Docker endpoints from a single Docker client, simplifying multi-environment management.

Docker Daemon

Background service managing Docker objects like images, containers, networks, and volumes.

Docker Exec

Command allowing users to run a new process inside a running container, useful for debugging and maintenance tasks.

Docker Export/Import

Commands for exporting a container's filesystem as a tarball and importing it as an image.

Docker Hub

Cloud-based repository service for finding and sharing container images, central to the Docker ecosystem.

Docker Image History

Command showing the history of an image's layers, providing insight into how the image was built and modified.

Docker Image Inspection

Process of examining Docker image metadata, including layers, environment variables, and exposed ports.

Docker Image Specification

Standardized format defining the structure and metadata of Docker container images, ensuring portability.

Docker Network

Virtualized network providing connectivity between Docker containers, isolating container traffic from the host network.

Docker Network Driver Types (bridge, host, overlay, macvlan)

Different networking modes in Docker, including bridge, host, overlay, and macvlan, offering varied connectivity options.

Docker Prune

Command for removing unused Docker objects like containers, networks, images, and volumes.

Docker Save/Load

Commands for exporting Docker images to tar archives and importing them back, useful for image transfer and backup.

Docker Scan

Command-line tool for scanning Docker images for vulnerabilities, providing detailed reports on potential security issues.

Docker Shim

Deprecated component that provided CRI compatibility for Docker in Kubernetes, bridging Docker and CRI.

Docker Socket

Unix socket or named pipe used for communication between Docker client and daemon, enabling Docker API access.

Docker Stats

Command displaying a live stream of container resource usage statistics, including CPU, memory, and network I/O.

Docker Swarm

Native clustering and orchestration solution for Docker, allowing you to create and manage a swarm of Docker nodes as a single virtual system.

Docker System Events

Real-time stream of Docker daemon events, providing insights into container, image, volume, and network activities.

Docker Top

Command displaying the running processes of a container, similar to the Unix top command but container-specific.

Docker Volume

Persistent data storage mechanism for containers, independent of container lifecycle, enabling data persistence.

Docker Volume Driver Types

Different storage backends for Docker volumes, including local, NFS, and cloud-specific drivers.

Dockerfile

Text document containing all the commands a user could call on the command line to assemble a Docker image.

Dockerfile ARG

Instruction defining build-time variables that users can pass at build-time to the builder.

Dockerfile Best Practices

Guidelines for creating efficient, secure, and maintainable Dockerfiles, optimizing image builds and runtime performance.

Dockerfile HEALTHCHECK

Instruction telling Docker how to test a container to check its health status, improving reliability.

Dockerfile Instructions (ADD, COPY, RUN, CMD, ENTRYPOINT, etc.)

Set of commands used in Dockerfiles to build images, including ADD, COPY, RUN, CMD, and ENTRYPOINT.

Dockerfile ONBUILD

Set of commands used in Dockerfiles to build images, including ADD, COPY, RUN, CMD, and ENTRYPOINT.

Dockerfile STOPSIGNAL

Instruction setting the system call signal that will be sent to the container to exit, customizing shutdown behavior.

Dockerignore

File specifying which files and directories should be excluded when building a Docker image.

Domain-Driven Design (DDD) in Microservices

Approach to software design focusing on the core domain in containerized microservices architectures.

Dragonfly for P2P Image Distribution

P2P-based image and file distribution system to improve efficiency of image downloads in container environments.

Drain

Process of cordoning a node and evicting its pods in preparation for maintenance or decommissioning.

Dual-stack Networking

Networking configuration supporting both IPv4 and IPv6 in container environments, enabling broader connectivity options.

Dynamic Admission Control

Kubernetes feature allowing custom logic to be applied to object creation or modification requests.

Dynamic Auditing

Kubernetes feature enabling runtime configuration of audit policies without API server restart.

Dynamic Provisioning

Automatic creation of storage when persistent volume claims are made in Kubernetes, simplifying storage management.

Dynatrace OneAgent

Monitoring solution for containerized environments, providing deep visibility into application performance.

ELK Stack (Elasticsearch, Logstash, Kibana)

Combination of Elasticsearch, Logstash, and Kibana for logging and monitoring containerized environments.

East-West Traffic

Network communication between containers or services within the same cluster or data center.

Edge AI/ML

Deployment of artificial intelligence and machine learning models on edge devices using containers.

Edge Analytics

Processing and analyzing data at the network edge using containerized analytics applications.

Edge Device Management

Tools and practices for managing containerized workloads on edge devices, ensuring consistent deployment and updates.

Edge Orchestration

Management and coordination of containerized applications across distributed edge locations.

Edge Security

Security measures and practices specific to containerized edge computing environments, protecting distributed workloads.

Edge Workload Scheduling

Techniques for efficiently distributing containerized workloads across edge devices, optimizing resource usage.

Edge-Cloud Syncing

Synchronization of data and state between edge containers and cloud-based systems, ensuring consistency.

Egress Gateway

Component controlling outbound traffic from a container cluster to external services, enhancing security and traffic management.

Egress Gateways

Service mesh components managing outbound traffic from the mesh to external services, providing fine-grained control.

Egress Traffic Control

Management and policies for outbound network traffic from containers, ensuring security and compliance.

Elastic APM

Application Performance Monitoring tool for containerized applications in the Elastic Stack.

Encrypted Secrets

Sensitive data stored in an encrypted form in container orchestration platforms, enhancing security.

End-to-End Testing

Comprehensive testing of containerized applications from start to finish, validating entire system functionality.

EndpointSlices

Kubernetes API resource providing a more scalable alternative to Endpoints for service discovery.

Environment Variables in Containers

Key-value pairs passed to containers at runtime, used for configuration and runtime behavior control.

Envoy Proxy

High-performance proxy often used in service mesh implementations for containerized environments.

Ephemeral Containers

Temporary containers used for troubleshooting or debugging in Kubernetes pods, without affecting the main containers.

Ephemeral Volumes

Short-lived storage volumes in Kubernetes that share the lifecycle of a pod, useful for temporary data storage.

Equal-Cost Multi-Path (ECMP)

Routing strategy for load balancing network traffic across multiple paths in container networks.

Etcd

Distributed key-value store that provides a reliable way to store data across a cluster of machines.

Event Sinks

Destinations for cluster-level events in container orchestration platforms, used for monitoring and alerting.

Event Sources

Components or services generating events in containerized environments, often used in event-driven architectures.

Event Sourcing

Pattern of storing changes to application state as a sequence of events, often used in microservices architectures.

Event Sourcing Pattern

Design pattern capturing all changes to application state as a sequence of events, useful in distributed systems.

Event Sourcing in Containers

Implementation of event sourcing pattern in containerized microservices architectures, ensuring data consistency.

Event-driven Architectures

Design approach where containerized services produce, detect, and react to events, enabling loose coupling and scalability.

Eviction Policies

Rules determining which pods to terminate when a node is under resource pressure in Kubernetes clusters.