5
51% Attack
A situation where a single entity gains control of more than 50% of a network's mining power or staked assets.
web5G
The fifth-generation technology standard for broadband cellular networks, offering higher speeds and lower latency than 4G.
network5G Core(5GC)
The heart of a 5G network, responsible for managing data connections, mobility, authentication, and policy.
networkA
A/B Testing (Cloud)
A method of comparing two versions of an application by routing different groups of users to each version to measure performance or user behavior.
cloudA/B Testing (Statistics)
A randomized experimentation process wherein two or more versions of a variable are shown to different segments of users at the same time to determine which version leaves the maximum impact and drive business metrics.
aiAcceptance Testing
A level of software testing where a system is tested for acceptability to evaluate whether it meets the business requirements.
devAccessibility(a11y)
The practice of making websites usable by as many people as possible, including those with disabilities.
webAccess Point(AP)
A networking hardware device that allows other Wi-Fi devices to connect to a wired network.
networkActivation Function
A mathematical function applied to the output of a neural network node to determine if it should 'fire' and to introduce non-linearity into the model.
aiActive Learning
A special case of machine learning in which a learning algorithm can interactively query a user (or some other information source) to label new data points with the desired outputs.
aiActivityPub
An open, decentralized social networking protocol that allows different social media platforms to communicate with each other.
webActivityPub (Blockchain)
An open, decentralized social networking protocol that, when integrated with blockchain, enables interoperable and censorship-resistant social interactions.
webAdapter Pattern
A structural design pattern that allows objects with incompatible interfaces to collaborate.
devAddress
A unique string of alphanumeric characters that identifies a specific 'account' or 'mailbox' on a blockchain where funds can be sent.
webAd-hoc Network
A decentralized type of wireless network that does not rely on a pre-existing infrastructure, such as routers or access points.
networkAdvanced Persistent Threat(APT)
A sophisticated, long-term cyberattack campaign where an intruder gains access to a network and remains undetected for an extended period.
securityAdversarial Attack
A technique used to trick a machine learning model into making a mistake by providing it with subtly manipulated input data.
aiAdware
Software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online.
securityAgentic Workflow
A design pattern for AI applications where an LLM is used as a reasoning engine to control a sequence of steps, tools, and decisions.
aiAgile Methodology
An iterative approach to software development and project management that emphasizes flexibility, collaboration, and customer feedback.
devAI Alignment
The field of research aimed at ensuring that AI systems' goals and behaviors are consistent with human values and intentions.
aiAI Bias
The phenomenon where an AI system produces results that are systematically prejudiced due to erroneous assumptions in the machine learning process.
aiAI Ethics
A system of moral principles intended to inform the responsible development and use of artificial intelligence.
aiAirdrop
The free distribution of tokens or coins to a large number of wallet addresses.
webAir Gap
A security measure that involves isolating a computer or network from all other networks, including the internet.
securityAJAX
A set of web development techniques using many web technologies on the client side to create asynchronous web applications.
webAlerting
The process of automatically notifying individuals or teams when a system's metrics or logs indicate a potential problem.
devAlgorithmic Fairness
The field of study focused on ensuring that AI and machine learning algorithms make decisions that are equitable and free from discrimination.
aiAlgorithmic Stablecoin
A stablecoin that uses algorithms and smart contracts to manage its supply and maintain its peg without collateral.
webAlpine.js
A rugged, minimal framework for composing JavaScript behavior in your markup, often described as 'Tailwind for JavaScript.'
webAltair
A declarative statistical visualization library for Python, based on Vega and Vega-Lite.
aiALU(ALU)
Arithmetic Logic Unit; a digital circuit within a processor that performs integer arithmetic and bitwise logical operations.
hardwareAmbassador Pattern
A design pattern where a helper service is used to offload common connectivity tasks, such as monitoring, logging, and routing.
devAmbient Light API
A browser API that provides information about the light level of the device's surroundings.
webAmdahl's Law
A formula used to find the maximum theoretical improvement of a system when only part of it is improved.
hardwareAngular
A comprehensive, TypeScript-based web application framework led by Google for building large-scale, high-performance applications.
webAnonymization
The process of removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous.
securityAnsible
An open-source automation tool used for configuration management, application deployment, and task automation.
cloudAnsible for Networking
The use of the Ansible automation engine to manage and configure network devices from various vendors.
networkAnt Design(AntD)
An enterprise-class UI design language and React UI library with a set of high-quality components.
webAnycast
A network addressing and routing method where a single IP address is shared by multiple geographically dispersed servers.
networkApache Cassandra
A free and open-source, distributed, wide-column store, NoSQL database management system designed to handle large amounts of data across many commodity servers.
aiApache Flink
An open-source, unified stream-processing and batch-processing framework developed by the Apache Software Foundation.
aiApache HBase
An open-source, non-relational, distributed database modeled after Google's Bigtable and written in Java.
aiApache Hive
A data warehouse software project built on top of Apache Hadoop for providing data query and analysis.
aiApache Kafka
An open-source distributed event streaming platform used by thousands of companies for high-performance data pipelines, streaming analytics, data integration, and mission-critical applications.
aiApache Pig
A high-level platform for creating programs that run on Apache Hadoop.
aiAPI
A set of defined rules that allow different software applications to communicate and exchange data with each other.
devAPI First Design
A development approach where the API is treated as a 'first-class citizen' and is designed before any code is written.
devAPI Gateway
A server that acts as an API front-end, receiving API requests, enforcing policies, and passing them to the appropriate backend services.
cloudApplication Layer
The seventh and highest layer of the OSI model, providing network services directly to end-user applications.
networkApplication Load Balancer(ALB)
A load balancer that functions at the application layer (Layer 7), allowing for advanced routing based on HTTP headers and paths.
cloudApplication Security(AppSec)
The process of making applications more secure by finding, fixing, and preventing security vulnerabilities.
securityApplication-Specific Integrated Circuit(ASIC)
An integrated circuit (IC) chip customized for a particular use, rather than intended for general-purpose use.
hardwareApp Shell Architecture
A design pattern that separates the core application infrastructure (the shell) from the dynamic content.
webArchive Storage
A low-cost storage tier designed for long-term data retention and digital preservation, where data is rarely accessed.
cloudArgoCD
A declarative, GitOps continuous delivery tool for Kubernetes.
cloudARIA(ARIA)
A set of attributes that define ways to make web content and web applications more accessible to people with disabilities.
webARIMA Model(ARIMA)
A class of statistical models for analyzing and forecasting time series data.
aiARM Architecture(ARM)
A family of processor architectures known for high power efficiency, widely used in mobile devices and increasingly in laptops and servers.
hardwareARP(ARP)
A communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address.
networkArtifact Management
The process of storing, versioning, and managing the output of the build process (artifacts) throughout the software development lifecycle.
devArtifactory
A universal DevOps solution for managing all binary artifacts throughout the software supply chain.
cloudArtifact Repository
A centralized location for storing and managing software artifacts produced during the build process.
cloudArtificial General Intelligence(AGI)
A hypothetical type of AI that possesses the ability to understand, learn, and apply its intelligence to any intellectual task that a human being can perform.
aiArtificial Narrow Intelligence(ANI)
AI systems designed and trained for a specific, limited task, such as facial recognition, language translation, or playing chess.
aiArtificial Super Intelligence(ASI)
A hypothetical level of AI that surpasses human intelligence across all fields, including scientific creativity, general wisdom, and social skills.
aiArweave(AR)
A decentralized storage network that offers permanent data storage through a unique 'blockweave' structure and a one-time payment model.
webAspect-Oriented Programming(AOP)
A programming paradigm that aims to increase modularity by allowing the separation of cross-cutting concerns.
devAstro
A modern web framework designed for building fast, content-focused websites using an 'islands architecture.'
webAsymmetric Encryption
A type of encryption that uses a pair of related keys: a public key for encryption and a private key for decryption.
securityAtomic Operation
An operation that appears to the rest of the system to occur instantaneously and without interruption.
hardwareAttack Surface
The total number of points where an unauthorized user can try to enter or extract data.
securityAttack Tree
A conceptual diagram that represents the various paths an attacker can take to achieve a specific goal or 'root' objective.
securityAttention Mechanism
A technique that allows a neural network to focus on specific parts of the input data when producing an output, rather than treating all parts equally.
aiAttribute-Based Access Control(ABAC)
An access control method where access rights are granted based on policies which combine attributes.
securityATX(ATX)
Advanced Technology eXtended; a motherboard and power supply configuration specification developed by Intel.
hardwareAUC (Area Under Curve)(AUC)
A single scalar value that represents the entire area underneath the ROC curve, used to measure the overall performance of a binary classifier.
aiAudit Logging
The practice of recording all actions and events within a cloud environment for security, compliance, and troubleshooting purposes.
cloudAugmented Reality (AR) in Web3(AR)
The integration of digital information with the user's environment in real-time, using blockchain to verify ownership and authenticity of digital overlays.
webAutocorrelation
The correlation of a signal with a delayed copy of itself as a function of delay.
aiAutoencoder
A type of neural network used to learn efficient codings of unlabeled data by training the network to ignore signal 'noise'.
aiAutoGPT
An experimental open-source application that uses GPT-4 to act autonomously, breaking down high-level goals into sub-tasks and executing them.
aiAutomated Market Maker(AMM)
A decentralized exchange protocol that uses mathematical formulas to price assets and allow for automated trading.
webAutoML(AutoML)
Automated Machine Learning; the process of automating the end-to-end tasks of applying machine learning to real-world problems.
aiAutonomous System(AS)
A collection of IP networks and routers under the control of a single entity that presents a common routing policy to the internet.
networkAuto-scaling
A cloud feature that automatically adjusts the number of active computational resources based on demand.
cloudAuto Scaling Group(ASG)
A collection of virtual machine instances treated as a logical grouping for the purposes of automatic scaling and management.
cloudAvalanche(AVAX)
A scalable blockchain platform for decentralized applications and custom blockchain networks.
webAVIF
A high-performance, open-source image file format based on the AV1 video codec, offering even better compression than WebP.
webAxios
A popular, promise-based HTTP client for the browser and Node.js.
webB
Babel
A JavaScript compiler that allows developers to use next-generation JavaScript features today by converting them into a backward-compatible version.
webBabyAGI
A simplified AI agent framework that uses LLMs to create, prioritize, and execute tasks based on a given objective.
aiBackground Sync API
A browser API that allows web applications to defer tasks until the user has a stable internet connection.
webBackpropagation
The fundamental algorithm used to train neural networks by calculating the gradient of the loss function with respect to each weight using the chain rule.
aiBackstage(IDP)
An open-source framework for building internal developer portals, originally created by Spotify.
devBandwidth
The maximum rate of data transfer across a network path, typically measured in bits per second (bps).
networkBar Chart
A chart that represents categorical data with rectangular bars with heights or lengths proportional to the values that they represent.
aiBare Metal
A physical server dedicated to a single tenant, without a hypervisor or virtualization layer between the OS and the hardware.
cloudBatch Normalization(BatchNorm)
A technique to improve the speed and stability of neural network training by normalizing the inputs to each layer for every mini-batch.
aiBatch Size
The number of training examples used in one iteration of model training before the internal parameters are updated.
aiBattery Status API
A browser API that provides information about the system's battery charge level and charging status.
webBayesian Inference
A method of statistical inference in which Bayes' theorem is used to update the probability for a hypothesis as more evidence or information becomes available.
aiBayesian Network
A probabilistic graphical model that represents a set of variables and their conditional dependencies via a directed acyclic graph (DAG).
aiBayesian Optimization
A sophisticated hyperparameter tuning strategy that uses a probabilistic model to find the best settings with as few evaluations as possible.
aiBeacon Chain
The foundational Proof of Stake blockchain that was merged with the Ethereum mainnet to enable PoS consensus.
webBeamforming
A signal processing technique used in sensor arrays for directional signal transmission or reception.
networkBehavioral Patterns
Design patterns that are concerned with algorithms and the assignment of responsibilities between objects.
devBehavior-Driven Development(BDD)
An Agile software development process that encourages collaboration between developers, QA, and non-technical stakeholders by using a shared language to describe system behavior.
devBEP-20
A token standard on the BNB Smart Chain (BSC) similar to Ethereum's ERC-20.
webBERT(BERT)
Bidirectional Encoder Representations from Transformers; a landmark language model designed to pre-train deep bidirectional representations from unlabeled text.
aiBias-Variance Tradeoff
The fundamental tension in machine learning between a model's ability to minimize errors from erroneous assumptions (bias) and its sensitivity to small fluctuations in the training set (variance).
aiBig Data
Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions.
aiBinary Repository
A specialized software tool designed to store and manage binary artifacts, such as compiled code, libraries, and container images.
devBiometric Authentication
A security process that relies on the unique biological characteristics of an individual to verify their identity.
securityBitcoin(BTC)
The first decentralized cryptocurrency, created by an anonymous person or group known as Satoshi Nakamoto in 2009.
webBlameless Post-mortem
A process for analyzing an incident that focuses on identifying systemic causes rather than assigning blame to individuals.
devBlobs
Large chunks of data introduced by Proto-Danksharding that are stored off-chain but referenced on-chain to lower Layer 2 fees.
webBlock
A data structure used for grouping a set of transactions and other metadata to be added to the blockchain.
webBlockchain Security
The comprehensive risk management system for a blockchain network, using cybersecurity frameworks and best practices.
securityBlock Explorer
An online tool or website that allows users to search and browse the data on a blockchain.
webBlock Height
The number of blocks preceding a particular block on the blockchain, representing its position in the sequence.
webBlock Reward
The amount of cryptocurrency awarded by the network to a miner or validator for successfully adding a new block to the blockchain.
webBlock Storage
A type of data storage where data is stored in volumes called blocks.
cloudBlock Storage Volume
A virtual disk that can be attached to a cloud instance, providing persistent storage that behaves like a physical hard drive.
cloudBlock Time
The average time it takes for the network to generate a new block and add it to the blockchain.
webBlue-Green Deployment
A deployment strategy that uses two identical production environments to minimize downtime and risk during updates.
cloudBlue Teaming
The group of security professionals responsible for maintaining internal network defenses against all cyber threats and attackers.
securityBluetooth
A short-range wireless technology standard used for exchanging data between fixed and mobile devices over short distances.
networkBokeh
A Python library for creating interactive visualizations for modern web browsers.
aiBootstrap
The most popular CSS framework for developing responsive and mobile-first websites, providing a collection of pre-designed components.
webBootstrapping
A statistical method that uses random sampling with replacement to estimate the sampling distribution of a statistic.
aiBotnet
A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
securityBox Plot
A standardized way of displaying the distribution of data based on a five-number summary.
aiBranching Strategy
A set of rules that developers follow when creating, naming, and merging branches in a version control system.
devBranch Prediction
A digital circuit that tries to guess which way a branch (e.g., an if-then-else structure) will go before it is known for sure.
hardwareBranch Target Buffer(BTB)
A cache used by the branch predictor to store the predicted destination address of a branch instruction.
hardwareBridge
A networking device that connects two or more network segments together, operating at the Data Link Layer.
networkBroadcast
A communication method where data is sent from one source to all devices on a local network segment.
networkBrotli
A generic-purpose lossless compression algorithm developed by Google, offering better compression ratios than Gzip for web assets.
webBrowser Caching
A mechanism where the web browser stores copies of static resources locally to avoid re-downloading them on subsequent visits.
webBrowser Object Model(BOM)
A browser-specific convention that refers to all the objects exposed by the web browser, allowing JavaScript to interact with the browser itself.
webBrute Force Attack
A trial-and-error method used to obtain information such as a user password or personal identification number (PIN).
securityBubble Chart
A variation of a scatter plot in which the data points are replaced with bubbles, and an additional dimension of the data is represented in the size of the bubbles.
aiBudget Alerts
Automated notifications that trigger when cloud spending or usage exceeds (or is forecasted to exceed) a predefined threshold.
cloudBuffer Overflow
A vulnerability that occurs when a program writes more data to a block of memory (a buffer) than it is allocated to hold.
securityBug Bounty
A program that offers financial rewards (bounties) to ethical hackers for finding and reporting valid security vulnerabilities in an organization's software.
securityBuild Automation
The process of automating the creation of a software build and the associated processes including compiling, linking, and packaging code.
cloudBuild Pipeline
The initial part of a deployment pipeline focused on compiling code, running unit tests, and creating deployable artifacts.
devBulkhead Pattern
A design pattern that isolates elements of an application into pools so that if one fails, the others will continue to function.
devBun
An incredibly fast, all-in-one JavaScript runtime, package manager, and bundler designed for speed.
webBurp Suite
An integrated platform for performing security testing of web applications, widely used for manual and automated vulnerability discovery.
securityBus
A communication system that transfers data between components inside a computer, or between computers.
hardwareBusiness Continuity Planning(BCP)
The process of creating systems of prevention and recovery to deal with potential threats to a company.
devBusiness Email Compromise(BEC)
A sophisticated scam targeting businesses that perform wire transfers and have suppliers abroad.
securityBusiness Intelligence(BI)
The strategies and technologies used by enterprises for the data analysis of business information.
aiByte Pair Encoding(BPE)
A subword tokenization method that iteratively merges the most frequent pairs of characters or character sequences into a single new token.
aiByzantine Fault Tolerance(BFT)
The property of a system that allows it to reach consensus even if some of its components fail or act maliciously.
webC
Cache Coherency
The uniformity of shared resource data that ends up stored in multiple local caches.
hardwareCache-Control
An HTTP header used to specify browser and intermediary caching policies for both requests and responses.
webCache Hierarchy
The multi-level organization of cache memory in a computer, designed to balance speed, size, and cost.
hardwareCache Hit
An event where the data requested by the CPU is successfully found in the cache memory.
hardwareCache Line
The smallest unit of data that can be transferred between main memory and a cache.
hardwareCache Memory
A small, high-speed type of volatile computer memory that provides high-speed data access to a processor.
hardwareCache Miss
An event where the data requested by the CPU is not found in the cache memory, requiring a slower access to main memory.
hardwareCalico
An open-source networking and network security solution for containers, virtual machines, and native host-based workloads.
cloudCanary Deployment
A deployment strategy where a new version of an application is rolled out to a small subset of users before being deployed to the entire infrastructure.
cloudCanary Release
A deployment strategy where a new version of software is rolled out to a small subset of users before being made available to everyone.
devCanvas API
An HTML5 element and associated JavaScript API used for drawing 2D graphics and animations dynamically.
webCardano(ADA)
A decentralized Proof of Stake (PoS) blockchain platform designed for security and sustainability.
webCarrier Grade NAT(CGNAT)
A large-scale NAT implemented by ISPs to share a small pool of public IPv4 addresses among a very large number of customers.
networkCascading Style Sheets(CSS)
A style sheet language used for describing the presentation of a document written in a markup language like HTML or XML.
webCasper
A family of consensus protocols designed to transition Ethereum from Proof of Work to Proof of Stake.
webCatBoost
A gradient boosting library developed by Yandex that is specifically optimized for handling categorical features automatically.
aiCausation
The relationship between cause and effect, where one event (the cause) directly leads to the occurrence of another event (the effect).
aiCentralized Exchange(CEX)
A platform managed by a company that facilitates the buying and selling of cryptocurrencies.
webCentral Processing Unit(CPU)
The primary component of a computer that acts as its 'brain,' performing most of the processing inside the system.
hardwareCeph
A highly scalable, distributed storage system that provides object, block, and file storage from a single unified cluster.
cloudCertificate Authority(CA)
A trusted third-party entity that issues digital certificates that verify the identity of a website, organization, or individual.
securityCert-Manager
A native Kubernetes certificate management controller that automates the issuance and renewal of TLS certificates.
cloudChainlink(LINK)
A decentralized oracle network that provides secure and reliable data feeds to smart contracts.
webChain of Thought(CoT)
A prompting technique that encourages an LLM to explain its reasoning process step-by-step before providing a final answer.
aiChakra UI
A simple, modular, and accessible component library that gives you the building blocks you need to build your React applications.
webChange Failure Rate
The percentage of changes to production that result in a failure (e.g., service outage, degraded performance) and require a rollback or hotfix.
devChangelog Automation
The process of automatically generating a list of changes for a new software release based on commit messages.
devChange Management
A systematic approach to dealing with the transition or transformation of an organization's goals, processes, or technologies.
devChaos Engineering
The discipline of experimenting on a software system in production in order to build confidence in the system's capability to withstand turbulent conditions.
devChaos Monkey
A tool developed by Netflix that randomly terminates instances in production to test the system's resilience to failures.
devChart.js
A popular, easy-to-use open-source JavaScript library for creating HTML5 charts.
aiChart Types
The various graphical formats used to represent data, each suited for different types of analysis and relationships.
aiChinese Room Argument
A philosophical thought experiment challenging the idea that a machine can truly 'understand' language, even if it can perfectly simulate conversation.
aiChiplet
A small, modular integrated circuit that is combined with other chiplets in a single package to form a larger, more complex processor.
hardwareChipset
A set of electronic components in an integrated circuit that manages the data flow between the processor, memory, and peripherals.
hardwareChord Diagram
A graphical method of displaying the inter-relationships between data in a matrix.
aiChoropleth Map
A thematic map in which areas are shaded or patterned in proportion to the measurement of the statistical variable being displayed.
aiChroma DB
An open-source embedding database designed to make it easy to build LLM apps by making knowledge, facts, and skills pluggable for LLMs.
aiCI/CD
A set of practices that automate the integration, testing, and delivery of code changes to ensure faster and more reliable software releases.
devCilium
An open-source project that provides eBPF-based networking, security, and observability for cloud-native environments.
cloudCircleCI
A cloud-based CI/CD platform that automates the software development process with a focus on speed and efficiency.
cloud