A

A/B Testing (Cloud)

A method of comparing two versions of an application by routing different groups of users to each version to measure performance or user behavior.

cloud

A/B Testing (Statistics)

A randomized experimentation process wherein two or more versions of a variable are shown to different segments of users at the same time to determine which version leaves the maximum impact and drive business metrics.

ai

Acceptance Testing

A level of software testing where a system is tested for acceptability to evaluate whether it meets the business requirements.

dev

Accessibility(a11y)

The practice of making websites usable by as many people as possible, including those with disabilities.

web

Access Point(AP)

A networking hardware device that allows other Wi-Fi devices to connect to a wired network.

network

Activation Function

A mathematical function applied to the output of a neural network node to determine if it should 'fire' and to introduce non-linearity into the model.

ai

Active Learning

A special case of machine learning in which a learning algorithm can interactively query a user (or some other information source) to label new data points with the desired outputs.

ai

ActivityPub

An open, decentralized social networking protocol that allows different social media platforms to communicate with each other.

web

ActivityPub (Blockchain)

An open, decentralized social networking protocol that, when integrated with blockchain, enables interoperable and censorship-resistant social interactions.

web

Adapter Pattern

A structural design pattern that allows objects with incompatible interfaces to collaborate.

dev

Address

A unique string of alphanumeric characters that identifies a specific 'account' or 'mailbox' on a blockchain where funds can be sent.

web

Ad-hoc Network

A decentralized type of wireless network that does not rely on a pre-existing infrastructure, such as routers or access points.

network

Advanced Persistent Threat(APT)

A sophisticated, long-term cyberattack campaign where an intruder gains access to a network and remains undetected for an extended period.

security

Adversarial Attack

A technique used to trick a machine learning model into making a mistake by providing it with subtly manipulated input data.

ai

Adware

Software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online.

security

Agentic Workflow

A design pattern for AI applications where an LLM is used as a reasoning engine to control a sequence of steps, tools, and decisions.

ai

Agile Methodology

An iterative approach to software development and project management that emphasizes flexibility, collaboration, and customer feedback.

dev

AI Alignment

The field of research aimed at ensuring that AI systems' goals and behaviors are consistent with human values and intentions.

ai

AI Bias

The phenomenon where an AI system produces results that are systematically prejudiced due to erroneous assumptions in the machine learning process.

ai

AI Ethics

A system of moral principles intended to inform the responsible development and use of artificial intelligence.

ai

Airdrop

The free distribution of tokens or coins to a large number of wallet addresses.

web

Air Gap

A security measure that involves isolating a computer or network from all other networks, including the internet.

security

AJAX

A set of web development techniques using many web technologies on the client side to create asynchronous web applications.

web

Alerting

The process of automatically notifying individuals or teams when a system's metrics or logs indicate a potential problem.

dev

Algorithmic Fairness

The field of study focused on ensuring that AI and machine learning algorithms make decisions that are equitable and free from discrimination.

ai

Algorithmic Stablecoin

A stablecoin that uses algorithms and smart contracts to manage its supply and maintain its peg without collateral.

web

Alpine.js

A rugged, minimal framework for composing JavaScript behavior in your markup, often described as 'Tailwind for JavaScript.'

web

Altair

A declarative statistical visualization library for Python, based on Vega and Vega-Lite.

ai

ALU(ALU)

Arithmetic Logic Unit; a digital circuit within a processor that performs integer arithmetic and bitwise logical operations.

hardware

Ambassador Pattern

A design pattern where a helper service is used to offload common connectivity tasks, such as monitoring, logging, and routing.

dev

Ambient Light API

A browser API that provides information about the light level of the device's surroundings.

web

Amdahl's Law

A formula used to find the maximum theoretical improvement of a system when only part of it is improved.

hardware

Angular

A comprehensive, TypeScript-based web application framework led by Google for building large-scale, high-performance applications.

web

Anonymization

The process of removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous.

security

Ansible

An open-source automation tool used for configuration management, application deployment, and task automation.

cloud

Ansible for Networking

The use of the Ansible automation engine to manage and configure network devices from various vendors.

network

Ant Design(AntD)

An enterprise-class UI design language and React UI library with a set of high-quality components.

web

Anycast

A network addressing and routing method where a single IP address is shared by multiple geographically dispersed servers.

network

Apache Cassandra

A free and open-source, distributed, wide-column store, NoSQL database management system designed to handle large amounts of data across many commodity servers.

ai

Apache Flink

An open-source, unified stream-processing and batch-processing framework developed by the Apache Software Foundation.

ai

Apache HBase

An open-source, non-relational, distributed database modeled after Google's Bigtable and written in Java.

ai

Apache Hive

A data warehouse software project built on top of Apache Hadoop for providing data query and analysis.

ai

Apache Kafka

An open-source distributed event streaming platform used by thousands of companies for high-performance data pipelines, streaming analytics, data integration, and mission-critical applications.

ai

Apache Pig

A high-level platform for creating programs that run on Apache Hadoop.

ai

API

A set of defined rules that allow different software applications to communicate and exchange data with each other.

dev

API First Design

A development approach where the API is treated as a 'first-class citizen' and is designed before any code is written.

dev

API Gateway

A server that acts as an API front-end, receiving API requests, enforcing policies, and passing them to the appropriate backend services.

cloud

Application Layer

The seventh and highest layer of the OSI model, providing network services directly to end-user applications.

network

Application Load Balancer(ALB)

A load balancer that functions at the application layer (Layer 7), allowing for advanced routing based on HTTP headers and paths.

cloud

Application Security(AppSec)

The process of making applications more secure by finding, fixing, and preventing security vulnerabilities.

security

Application-Specific Integrated Circuit(ASIC)

An integrated circuit (IC) chip customized for a particular use, rather than intended for general-purpose use.

hardware

App Shell Architecture

A design pattern that separates the core application infrastructure (the shell) from the dynamic content.

web

Archive Storage

A low-cost storage tier designed for long-term data retention and digital preservation, where data is rarely accessed.

cloud

ArgoCD

A declarative, GitOps continuous delivery tool for Kubernetes.

cloud

ARIA(ARIA)

A set of attributes that define ways to make web content and web applications more accessible to people with disabilities.

web

ARIMA Model(ARIMA)

A class of statistical models for analyzing and forecasting time series data.

ai

ARM Architecture(ARM)

A family of processor architectures known for high power efficiency, widely used in mobile devices and increasingly in laptops and servers.

hardware

ARP(ARP)

A communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address.

network

Artifact Management

The process of storing, versioning, and managing the output of the build process (artifacts) throughout the software development lifecycle.

dev

Artifactory

A universal DevOps solution for managing all binary artifacts throughout the software supply chain.

cloud

Artifact Repository

A centralized location for storing and managing software artifacts produced during the build process.

cloud

Artificial General Intelligence(AGI)

A hypothetical type of AI that possesses the ability to understand, learn, and apply its intelligence to any intellectual task that a human being can perform.

ai

Artificial Narrow Intelligence(ANI)

AI systems designed and trained for a specific, limited task, such as facial recognition, language translation, or playing chess.

ai

Artificial Super Intelligence(ASI)

A hypothetical level of AI that surpasses human intelligence across all fields, including scientific creativity, general wisdom, and social skills.

ai

Arweave(AR)

A decentralized storage network that offers permanent data storage through a unique 'blockweave' structure and a one-time payment model.

web

Aspect-Oriented Programming(AOP)

A programming paradigm that aims to increase modularity by allowing the separation of cross-cutting concerns.

dev

Astro

A modern web framework designed for building fast, content-focused websites using an 'islands architecture.'

web

Asymmetric Encryption

A type of encryption that uses a pair of related keys: a public key for encryption and a private key for decryption.

security

Atomic Operation

An operation that appears to the rest of the system to occur instantaneously and without interruption.

hardware

Attack Surface

The total number of points where an unauthorized user can try to enter or extract data.

security

Attack Tree

A conceptual diagram that represents the various paths an attacker can take to achieve a specific goal or 'root' objective.

security

Attention Mechanism

A technique that allows a neural network to focus on specific parts of the input data when producing an output, rather than treating all parts equally.

ai

Attribute-Based Access Control(ABAC)

An access control method where access rights are granted based on policies which combine attributes.

security

ATX(ATX)

Advanced Technology eXtended; a motherboard and power supply configuration specification developed by Intel.

hardware

AUC (Area Under Curve)(AUC)

A single scalar value that represents the entire area underneath the ROC curve, used to measure the overall performance of a binary classifier.

ai

Audit Logging

The practice of recording all actions and events within a cloud environment for security, compliance, and troubleshooting purposes.

cloud

Augmented Reality (AR) in Web3(AR)

The integration of digital information with the user's environment in real-time, using blockchain to verify ownership and authenticity of digital overlays.

web

Autocorrelation

The correlation of a signal with a delayed copy of itself as a function of delay.

ai

Autoencoder

A type of neural network used to learn efficient codings of unlabeled data by training the network to ignore signal 'noise'.

ai

AutoGPT

An experimental open-source application that uses GPT-4 to act autonomously, breaking down high-level goals into sub-tasks and executing them.

ai

Automated Market Maker(AMM)

A decentralized exchange protocol that uses mathematical formulas to price assets and allow for automated trading.

web

AutoML(AutoML)

Automated Machine Learning; the process of automating the end-to-end tasks of applying machine learning to real-world problems.

ai

Autonomous System(AS)

A collection of IP networks and routers under the control of a single entity that presents a common routing policy to the internet.

network

Auto-scaling

A cloud feature that automatically adjusts the number of active computational resources based on demand.

cloud

Auto Scaling Group(ASG)

A collection of virtual machine instances treated as a logical grouping for the purposes of automatic scaling and management.

cloud

Avalanche(AVAX)

A scalable blockchain platform for decentralized applications and custom blockchain networks.

web

AVIF

A high-performance, open-source image file format based on the AV1 video codec, offering even better compression than WebP.

web

Axios

A popular, promise-based HTTP client for the browser and Node.js.

web

B

Babel

A JavaScript compiler that allows developers to use next-generation JavaScript features today by converting them into a backward-compatible version.

web

BabyAGI

A simplified AI agent framework that uses LLMs to create, prioritize, and execute tasks based on a given objective.

ai

Background Sync API

A browser API that allows web applications to defer tasks until the user has a stable internet connection.

web

Backpropagation

The fundamental algorithm used to train neural networks by calculating the gradient of the loss function with respect to each weight using the chain rule.

ai

Backstage(IDP)

An open-source framework for building internal developer portals, originally created by Spotify.

dev

Bandwidth

The maximum rate of data transfer across a network path, typically measured in bits per second (bps).

network

Bar Chart

A chart that represents categorical data with rectangular bars with heights or lengths proportional to the values that they represent.

ai

Bare Metal

A physical server dedicated to a single tenant, without a hypervisor or virtualization layer between the OS and the hardware.

cloud

Batch Normalization(BatchNorm)

A technique to improve the speed and stability of neural network training by normalizing the inputs to each layer for every mini-batch.

ai

Batch Size

The number of training examples used in one iteration of model training before the internal parameters are updated.

ai

Battery Status API

A browser API that provides information about the system's battery charge level and charging status.

web

Bayesian Inference

A method of statistical inference in which Bayes' theorem is used to update the probability for a hypothesis as more evidence or information becomes available.

ai

Bayesian Network

A probabilistic graphical model that represents a set of variables and their conditional dependencies via a directed acyclic graph (DAG).

ai

Bayesian Optimization

A sophisticated hyperparameter tuning strategy that uses a probabilistic model to find the best settings with as few evaluations as possible.

ai

Beacon Chain

The foundational Proof of Stake blockchain that was merged with the Ethereum mainnet to enable PoS consensus.

web

Beamforming

A signal processing technique used in sensor arrays for directional signal transmission or reception.

network

Behavioral Patterns

Design patterns that are concerned with algorithms and the assignment of responsibilities between objects.

dev

Behavior-Driven Development(BDD)

An Agile software development process that encourages collaboration between developers, QA, and non-technical stakeholders by using a shared language to describe system behavior.

dev

BEP-20

A token standard on the BNB Smart Chain (BSC) similar to Ethereum's ERC-20.

web

BERT(BERT)

Bidirectional Encoder Representations from Transformers; a landmark language model designed to pre-train deep bidirectional representations from unlabeled text.

ai

Bias-Variance Tradeoff

The fundamental tension in machine learning between a model's ability to minimize errors from erroneous assumptions (bias) and its sensitivity to small fluctuations in the training set (variance).

ai

Big Data

Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions.

ai

Binary Repository

A specialized software tool designed to store and manage binary artifacts, such as compiled code, libraries, and container images.

dev

Biometric Authentication

A security process that relies on the unique biological characteristics of an individual to verify their identity.

security

Bitcoin(BTC)

The first decentralized cryptocurrency, created by an anonymous person or group known as Satoshi Nakamoto in 2009.

web

Blameless Post-mortem

A process for analyzing an incident that focuses on identifying systemic causes rather than assigning blame to individuals.

dev

Blobs

Large chunks of data introduced by Proto-Danksharding that are stored off-chain but referenced on-chain to lower Layer 2 fees.

web

Block

A data structure used for grouping a set of transactions and other metadata to be added to the blockchain.

web

Blockchain Security

The comprehensive risk management system for a blockchain network, using cybersecurity frameworks and best practices.

security

Block Explorer

An online tool or website that allows users to search and browse the data on a blockchain.

web

Block Height

The number of blocks preceding a particular block on the blockchain, representing its position in the sequence.

web

Block Reward

The amount of cryptocurrency awarded by the network to a miner or validator for successfully adding a new block to the blockchain.

web

Block Storage

A type of data storage where data is stored in volumes called blocks.

cloud

Block Storage Volume

A virtual disk that can be attached to a cloud instance, providing persistent storage that behaves like a physical hard drive.

cloud

Block Time

The average time it takes for the network to generate a new block and add it to the blockchain.

web

Blue-Green Deployment

A deployment strategy that uses two identical production environments to minimize downtime and risk during updates.

cloud

Blue Teaming

The group of security professionals responsible for maintaining internal network defenses against all cyber threats and attackers.

security

Bluetooth

A short-range wireless technology standard used for exchanging data between fixed and mobile devices over short distances.

network

Bokeh

A Python library for creating interactive visualizations for modern web browsers.

ai

Bootstrap

The most popular CSS framework for developing responsive and mobile-first websites, providing a collection of pre-designed components.

web

Bootstrapping

A statistical method that uses random sampling with replacement to estimate the sampling distribution of a statistic.

ai

Botnet

A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.

security

Box Plot

A standardized way of displaying the distribution of data based on a five-number summary.

ai

Branching Strategy

A set of rules that developers follow when creating, naming, and merging branches in a version control system.

dev

Branch Prediction

A digital circuit that tries to guess which way a branch (e.g., an if-then-else structure) will go before it is known for sure.

hardware

Branch Target Buffer(BTB)

A cache used by the branch predictor to store the predicted destination address of a branch instruction.

hardware

Bridge

A networking device that connects two or more network segments together, operating at the Data Link Layer.

network

Broadcast

A communication method where data is sent from one source to all devices on a local network segment.

network

Brotli

A generic-purpose lossless compression algorithm developed by Google, offering better compression ratios than Gzip for web assets.

web

Browser Caching

A mechanism where the web browser stores copies of static resources locally to avoid re-downloading them on subsequent visits.

web

Browser Object Model(BOM)

A browser-specific convention that refers to all the objects exposed by the web browser, allowing JavaScript to interact with the browser itself.

web

Brute Force Attack

A trial-and-error method used to obtain information such as a user password or personal identification number (PIN).

security

Bubble Chart

A variation of a scatter plot in which the data points are replaced with bubbles, and an additional dimension of the data is represented in the size of the bubbles.

ai

Budget Alerts

Automated notifications that trigger when cloud spending or usage exceeds (or is forecasted to exceed) a predefined threshold.

cloud

Buffer Overflow

A vulnerability that occurs when a program writes more data to a block of memory (a buffer) than it is allocated to hold.

security

Bug Bounty

A program that offers financial rewards (bounties) to ethical hackers for finding and reporting valid security vulnerabilities in an organization's software.

security

Build Automation

The process of automating the creation of a software build and the associated processes including compiling, linking, and packaging code.

cloud

Build Pipeline

The initial part of a deployment pipeline focused on compiling code, running unit tests, and creating deployable artifacts.

dev

Bulkhead Pattern

A design pattern that isolates elements of an application into pools so that if one fails, the others will continue to function.

dev

Bun

An incredibly fast, all-in-one JavaScript runtime, package manager, and bundler designed for speed.

web

Burp Suite

An integrated platform for performing security testing of web applications, widely used for manual and automated vulnerability discovery.

security

Bus

A communication system that transfers data between components inside a computer, or between computers.

hardware

Business Continuity Planning(BCP)

The process of creating systems of prevention and recovery to deal with potential threats to a company.

dev

Business Email Compromise(BEC)

A sophisticated scam targeting businesses that perform wire transfers and have suppliers abroad.

security

Business Intelligence(BI)

The strategies and technologies used by enterprises for the data analysis of business information.

ai

Byte Pair Encoding(BPE)

A subword tokenization method that iteratively merges the most frequent pairs of characters or character sequences into a single new token.

ai

Byzantine Fault Tolerance(BFT)

The property of a system that allows it to reach consensus even if some of its components fail or act maliciously.

web

C

Cache Coherency

The uniformity of shared resource data that ends up stored in multiple local caches.

hardware

Cache-Control

An HTTP header used to specify browser and intermediary caching policies for both requests and responses.

web

Cache Hierarchy

The multi-level organization of cache memory in a computer, designed to balance speed, size, and cost.

hardware

Cache Hit

An event where the data requested by the CPU is successfully found in the cache memory.

hardware

Cache Line

The smallest unit of data that can be transferred between main memory and a cache.

hardware

Cache Memory

A small, high-speed type of volatile computer memory that provides high-speed data access to a processor.

hardware

Cache Miss

An event where the data requested by the CPU is not found in the cache memory, requiring a slower access to main memory.

hardware

Calico

An open-source networking and network security solution for containers, virtual machines, and native host-based workloads.

cloud

Canary Deployment

A deployment strategy where a new version of an application is rolled out to a small subset of users before being deployed to the entire infrastructure.

cloud

Canary Release

A deployment strategy where a new version of software is rolled out to a small subset of users before being made available to everyone.

dev

Canvas API

An HTML5 element and associated JavaScript API used for drawing 2D graphics and animations dynamically.

web

Cardano(ADA)

A decentralized Proof of Stake (PoS) blockchain platform designed for security and sustainability.

web

Carrier Grade NAT(CGNAT)

A large-scale NAT implemented by ISPs to share a small pool of public IPv4 addresses among a very large number of customers.

network

Cascading Style Sheets(CSS)

A style sheet language used for describing the presentation of a document written in a markup language like HTML or XML.

web

Casper

A family of consensus protocols designed to transition Ethereum from Proof of Work to Proof of Stake.

web

CatBoost

A gradient boosting library developed by Yandex that is specifically optimized for handling categorical features automatically.

ai

Causation

The relationship between cause and effect, where one event (the cause) directly leads to the occurrence of another event (the effect).

ai

Centralized Exchange(CEX)

A platform managed by a company that facilitates the buying and selling of cryptocurrencies.

web

Central Processing Unit(CPU)

The primary component of a computer that acts as its 'brain,' performing most of the processing inside the system.

hardware

Ceph

A highly scalable, distributed storage system that provides object, block, and file storage from a single unified cluster.

cloud

Certificate Authority(CA)

A trusted third-party entity that issues digital certificates that verify the identity of a website, organization, or individual.

security

Cert-Manager

A native Kubernetes certificate management controller that automates the issuance and renewal of TLS certificates.

cloud

Chainlink(LINK)

A decentralized oracle network that provides secure and reliable data feeds to smart contracts.

web

Chain of Thought(CoT)

A prompting technique that encourages an LLM to explain its reasoning process step-by-step before providing a final answer.

ai

Chakra UI

A simple, modular, and accessible component library that gives you the building blocks you need to build your React applications.

web

Change Failure Rate

The percentage of changes to production that result in a failure (e.g., service outage, degraded performance) and require a rollback or hotfix.

dev

Changelog Automation

The process of automatically generating a list of changes for a new software release based on commit messages.

dev

Change Management

A systematic approach to dealing with the transition or transformation of an organization's goals, processes, or technologies.

dev

Chaos Engineering

The discipline of experimenting on a software system in production in order to build confidence in the system's capability to withstand turbulent conditions.

dev

Chaos Monkey

A tool developed by Netflix that randomly terminates instances in production to test the system's resilience to failures.

dev

Chart.js

A popular, easy-to-use open-source JavaScript library for creating HTML5 charts.

ai

Chart Types

The various graphical formats used to represent data, each suited for different types of analysis and relationships.

ai

Chinese Room Argument

A philosophical thought experiment challenging the idea that a machine can truly 'understand' language, even if it can perfectly simulate conversation.

ai

Chiplet

A small, modular integrated circuit that is combined with other chiplets in a single package to form a larger, more complex processor.

hardware

Chipset

A set of electronic components in an integrated circuit that manages the data flow between the processor, memory, and peripherals.

hardware

Chord Diagram

A graphical method of displaying the inter-relationships between data in a matrix.

ai

Choropleth Map

A thematic map in which areas are shaded or patterned in proportion to the measurement of the statistical variable being displayed.

ai

Chroma DB

An open-source embedding database designed to make it easy to build LLM apps by making knowledge, facts, and skills pluggable for LLMs.

ai

CI/CD

A set of practices that automate the integration, testing, and delivery of code changes to ensure faster and more reliable software releases.

dev

Cilium

An open-source project that provides eBPF-based networking, security, and observability for cloud-native environments.

cloud

CircleCI

A cloud-based CI/CD platform that automates the software development process with a focus on speed and efficiency.

cloud