C

Cache Coherency

The uniformity of shared resource data that ends up stored in multiple local caches.

hardware

Cache-Control

An HTTP header used to specify browser and intermediary caching policies for both requests and responses.

web

Cache Hierarchy

The multi-level organization of cache memory in a computer, designed to balance speed, size, and cost.

hardware

Cache Hit

An event where the data requested by the CPU is successfully found in the cache memory.

hardware

Cache Line

The smallest unit of data that can be transferred between main memory and a cache.

hardware

Cache Memory

A small, high-speed type of volatile computer memory that provides high-speed data access to a processor.

hardware

Cache Miss

An event where the data requested by the CPU is not found in the cache memory, requiring a slower access to main memory.

hardware

Calico

An open-source networking and network security solution for containers, virtual machines, and native host-based workloads.

cloud

Canary Deployment

A deployment strategy where a new version of an application is rolled out to a small subset of users before being deployed to the entire infrastructure.

cloud

Canary Release

A deployment strategy where a new version of software is rolled out to a small subset of users before being made available to everyone.

dev

Canvas API

An HTML5 element and associated JavaScript API used for drawing 2D graphics and animations dynamically.

web

Cardano(ADA)

A decentralized Proof of Stake (PoS) blockchain platform designed for security and sustainability.

web

Carrier Grade NAT(CGNAT)

A large-scale NAT implemented by ISPs to share a small pool of public IPv4 addresses among a very large number of customers.

network

Cascading Style Sheets(CSS)

A style sheet language used for describing the presentation of a document written in a markup language like HTML or XML.

web

Casper

A family of consensus protocols designed to transition Ethereum from Proof of Work to Proof of Stake.

web

CatBoost

A gradient boosting library developed by Yandex that is specifically optimized for handling categorical features automatically.

ai

Causation

The relationship between cause and effect, where one event (the cause) directly leads to the occurrence of another event (the effect).

ai

Centralized Exchange(CEX)

A platform managed by a company that facilitates the buying and selling of cryptocurrencies.

web

Central Processing Unit(CPU)

The primary component of a computer that acts as its 'brain,' performing most of the processing inside the system.

hardware

Ceph

A highly scalable, distributed storage system that provides object, block, and file storage from a single unified cluster.

cloud

Certificate Authority(CA)

A trusted third-party entity that issues digital certificates that verify the identity of a website, organization, or individual.

security

Cert-Manager

A native Kubernetes certificate management controller that automates the issuance and renewal of TLS certificates.

cloud

Chainlink(LINK)

A decentralized oracle network that provides secure and reliable data feeds to smart contracts.

web

Chain of Thought(CoT)

A prompting technique that encourages an LLM to explain its reasoning process step-by-step before providing a final answer.

ai

Chakra UI

A simple, modular, and accessible component library that gives you the building blocks you need to build your React applications.

web

Change Failure Rate

The percentage of changes to production that result in a failure (e.g., service outage, degraded performance) and require a rollback or hotfix.

dev

Changelog Automation

The process of automatically generating a list of changes for a new software release based on commit messages.

dev

Change Management

A systematic approach to dealing with the transition or transformation of an organization's goals, processes, or technologies.

dev

Chaos Engineering

The discipline of experimenting on a software system in production in order to build confidence in the system's capability to withstand turbulent conditions.

dev

Chaos Monkey

A tool developed by Netflix that randomly terminates instances in production to test the system's resilience to failures.

dev

Chart.js

A popular, easy-to-use open-source JavaScript library for creating HTML5 charts.

ai

Chart Types

The various graphical formats used to represent data, each suited for different types of analysis and relationships.

ai

Chinese Room Argument

A philosophical thought experiment challenging the idea that a machine can truly 'understand' language, even if it can perfectly simulate conversation.

ai

Chiplet

A small, modular integrated circuit that is combined with other chiplets in a single package to form a larger, more complex processor.

hardware

Chipset

A set of electronic components in an integrated circuit that manages the data flow between the processor, memory, and peripherals.

hardware

Chord Diagram

A graphical method of displaying the inter-relationships between data in a matrix.

ai

Choropleth Map

A thematic map in which areas are shaded or patterned in proportion to the measurement of the statistical variable being displayed.

ai

Chroma DB

An open-source embedding database designed to make it easy to build LLM apps by making knowledge, facts, and skills pluggable for LLMs.

ai

CI/CD

A set of practices that automate the integration, testing, and delivery of code changes to ensure faster and more reliable software releases.

dev

Cilium

An open-source project that provides eBPF-based networking, security, and observability for cloud-native environments.

cloud

CircleCI

A cloud-based CI/CD platform that automates the software development process with a focus on speed and efficiency.

cloud

Circuit Breaker Pattern

A design pattern used to detect failures and encapsulate the logic of preventing a failure from constantly recurring.

dev

CISC

Complex Instruction Set Computer; a CPU design where single instructions can perform multi-step operations.

hardware

CIS Controls

A prioritized set of actions that collectively form a defense-in-depth set of best practices that mitigate the most common cyberattacks.

security

Clickjacking

A malicious technique of tricking a user into clicking on something different from what the user perceives.

security

Client-Side Rendering(CSR)

A rendering method where the browser downloads a minimal HTML file and uses JavaScript to render the content and handle navigation.

web

CLIP(CLIP)

Contrastive Language-Image Pre-training; a model developed by OpenAI that learns visual concepts from natural language supervision.

ai

Clock Gating

A power-saving technique that disables the clock signal to portions of a circuit that are not currently in use.

hardware

Clock Speed

The rate at which a processor executes instructions, measured in cycles per second (Hertz).

hardware

Cloud Access Security Broker(CASB)

A software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.

security

CloudFormation

An AWS service that allows users to model and set up Amazon Web Services resources using JSON or YAML templates.

cloud

Cloud Foundry

An open-source multi-cloud platform as a service (PaaS) governed by the Cloud Foundry Foundation.

cloud

Cloud Governance

The set of rules, policies, and controls that an organization implements to manage its cloud resources effectively and securely.

cloud

Cloud Identity and Access Management(IAM)

A framework of policies and technologies for ensuring that the proper people and entities have the appropriate access to cloud resources.

cloud

Cloud Interconnect

A high-speed, private connection between an on-premises network and a cloud provider's network.

cloud

Cloud Migration

The process of moving data, applications, or other business elements to the cloud.

cloud

Cloud Native

An approach to building and running applications that exploits the advantages of the cloud computing delivery model.

cloud

Cloud-Native Buildpacks

A set of tools for transforming source code into production-ready container images without a Dockerfile.

cloud

Cloud-Native Networking

The set of networking principles and technologies designed to support the dynamic and distributed nature of cloud-native applications.

cloud

Cloud-Native Security

A security approach designed specifically for the dynamic, distributed, and scalable nature of cloud-native applications.

cloud

Cloud Security Posture Management (CSPM)(CSPM)

A security tool that automatically identifies and remediates misconfigurations and compliance risks in cloud environments.

security

Cloud Workload Protection Platform (CWPP)(CWPP)

A security solution designed to protect workloads (VMs, containers, and serverless functions) across different cloud environments.

security

Cluster

A set of connected computers (nodes) that work together as a single system to run containerized applications.

cloud

Cluster Analysis

The task of grouping a set of objects in such a way that objects in the same group are more similar to each other than to those in other groups.

ai

Cluster Autoscaler

A tool that automatically adjusts the size of a Kubernetes cluster by adding or removing nodes.

cloud

CNI (Container Network Interface)(CNI)

A CNCF project that consists of a specification and libraries for writing plugins to configure network interfaces in Linux containers.

cloud

CoAP(CoAP)

A specialized web transfer protocol for use with constrained nodes and constrained networks in the Internet of Things.

network

Coaxial Cable

A type of electrical cable with an inner conductor surrounded by a tubular insulating layer, surrounded by a tubular conducting shield.

network

Code Coverage

A metric used to measure the percentage of source code that is executed when a particular test suite runs.

dev

Code Review

A systematic examination of computer source code intended to find bugs, improve code quality, and share knowledge among developers.

dev

Code Smell

Any symptom in the source code of a program that possibly indicates a deeper problem.

dev

Code Splitting

A feature of modern bundlers that allows you to split your code into various bundles which can then be loaded on demand or in parallel.

web

Cognitive Radio(CR)

An intelligent radio that can be programmed and configured dynamically to use the best wireless channels in its vicinity to avoid interference and congestion.

network

Cold Start

The delay that occurs when a serverless function is invoked for the first time or after a period of inactivity.

cloud

Cold Storage

A storage tier designed for data that is rarely accessed.

cloud

Cold Wallet

A cryptocurrency wallet that is kept offline, providing a high level of security against online threats.

web

Color Theory in Data Viz

The strategic use of color to enhance the clarity, readability, and emotional impact of data visualizations.

ai

Command and Control(C2)

The infrastructure used by attackers to maintain communication with compromised systems within a target network.

security

Common Vulnerabilities and Exposures (CVE)(CVE)

A list of publicly disclosed cybersecurity vulnerabilities, each assigned a unique identification number.

security

Common Vulnerability Scoring System (CVSS)(CVSS)

A standardized framework for rating the severity of security vulnerabilities on a scale from 0 to 10.

security

Common Weakness Enumeration (CWE)(CWE)

A community-developed list of common software and hardware security weaknesses.

security

Compare-and-Swap(CAS)

An atomic instruction that compares the contents of a memory location to a given value and, only if they are the same, modifies the contents of that memory location to a new given value.

hardware

Compliance

The state of meeting the requirements of accepted laws, regulations, standards, or policies.

security

Compliance as Code

The practice of automating the implementation, monitoring, and reporting of compliance requirements using code.

dev

Compliance Framework

A set of guidelines and best practices that help organizations meet regulatory and industry-specific security standards in the cloud.

cloud

Compression

The process of encoding information using fewer bits than the original representation to reduce file size and transmission time.

web

Computer Network

A collection of interconnected computing devices that exchange data and share resources using common communication protocols.

network

Computer Vision

A field of AI that enables computers to interpret and understand visual information from the world.

ai

Conceptual Data Model

A high-level view of the data required to support business processes.

ai

Confidence Interval(CI)

A range of values derived from sample statistics that is likely to contain the value of an unknown population parameter.

ai

ConfigMap

A Kubernetes API object used to store non-confidential data in key-value pairs.

cloud

Configuration Management

The process of maintaining software and infrastructure in a desired, consistent state.

cloud

Configuration Management Database(CMDB)

A repository that acts as a data warehouse, storing information about IT assets and the relationships between them.

dev

Confusion Matrix

A table used to describe the performance of a classification model by showing the counts of true positives, true negatives, false positives, and false negatives.

ai

Congestion Control

A mechanism used to prevent a network from becoming overloaded with too much traffic, which would lead to packet loss and delays.

network

Consensus Mechanism

A fault-tolerant mechanism used in computer and blockchain systems to achieve the necessary agreement on a single data value or a single state of the network among distributed processes.

web

Consortium Blockchain

A semi-decentralized blockchain where the network is managed by a group of organizations rather than a single entity.

web

Consumer-Driven Contracts(CDC)

A pattern where the consumers of an API define the contract, ensuring the provider only builds what is actually needed.

dev

Containerization

The process of packaging an application together with its libraries, dependencies, and configuration files into a single container image.

dev

Container Orchestration

The automation of the deployment, scaling, and management of containerized applications.

cloud

Container Runtime

The software responsible for running containers on a host system.

cloud

Container Security

The practice of protecting containerized applications and their underlying infrastructure throughout the entire lifecycle.

security

Content Delivery Network(CDN)

A geographically distributed group of servers that work together to provide fast delivery of Internet content.

cloud

Content Security Policy(CSP)

An HTTP header that allows site operators to control which resources the user agent is allowed to load for a given page.

security

Context Window

The maximum amount of text that an LLM can consider at one time when generating a response.

ai

Continuous Feedback

The practice of gathering and analyzing data from all stages of the software delivery lifecycle to inform future development and improvements.

dev

Continuous Verification

The practice of continuously monitoring and verifying that a system is behaving as expected in production, often using automated experiments.

dev

Contract Testing

A technique for testing an integration point by checking that each application adheres to a shared contract.

dev

Control Plane

The collection of components that manage the state of a Kubernetes cluster.

cloud

Conventional Commits

A specification for adding human and machine-readable meaning to commit messages.

dev

Convolutional Neural Network(CNN)

A type of deep neural network specifically designed for processing structured arrays of data, such as images.

ai

Cookie Poisoning

An attack where the attacker modifies the contents of a cookie to bypass security controls or steal information.

security

Cooling System

The components used to dissipate heat generated by a computer's processor and other parts.

hardware

Coordinated Vulnerability Disclosure (CVD)(CVD)

A collaborative process where multiple parties (researchers, vendors, and coordinators) work together to manage the disclosure and remediation of security vulnerabilities.

security

Core Web Vitals

A set of specific factors that Google considers important in a webpage's overall user experience.

web

Correlation

A statistical measure that expresses the extent to which two variables are linearly related.

ai

Cosmos(ATOM)

An ecosystem of independent, parallel blockchains that can interoperate with each other.

web

Cost Management

The process of monitoring, analyzing, and optimizing cloud spending to ensure maximum value and prevent budget overruns.

cloud

CQRS(CQRS)

Command Query Responsibility Segregation (CQRS) is a pattern that separates read and update operations for a data store.

dev

Creational Patterns

Design patterns that deal with object creation mechanisms, trying to create objects in a manner suitable to the situation.

dev

Creator Economy

An economic system where independent content creators can earn revenue directly from their audience, facilitated by Web3 tools.

web

Critical Rendering Path(CRP)

The sequence of steps the browser goes through to convert HTML, CSS, and JavaScript into pixels on the screen.

web

CronJob

A Kubernetes object that manages time-based Jobs, similar to the crontab on a Unix system.

cloud

Cross-Browser Compatibility

The ability of a website, web application, or HTML construct to support various web browsers.

web

Cross-Entropy

A loss function commonly used in classification tasks to measure the performance of a model whose output is a probability value between 0 and 1.

ai

Cross-Origin Resource Sharing(CORS)

A mechanism that uses additional HTTP headers to tell browsers to give a web application running at one origin access to selected resources from a different origin.

security

Cross-Site Request Forgery(CSRF)

An attack that forces an authenticated user to execute unwanted actions on a web application in which they are currently authenticated.

security

Cross-Site Scripting(XSS)

A vulnerability that allows an attacker to inject malicious scripts into web pages viewed by other users.

security

Cross-Validation

A resampling technique used to evaluate a model's performance by partitioning the data into multiple subsets and training/testing the model several times.

ai

Cryptoeconomics

The study of economic incentives and cryptography in decentralized systems to ensure security and stability.

web

Cryptographic Hash Function

A mathematical algorithm that maps data of arbitrary size to a bit string of a fixed size (a hash).

security

CSS3

The latest evolution of the Cascading Style Sheets language, used for describing the presentation of a document written in HTML.

web

CSS Grid

A two-dimensional layout system for the web, allowing developers to create complex layouts with rows and columns more easily than ever before.

web

Cumulative Layout Shift(CLS)

A Core Web Vital that measures the sum total of all individual layout shift scores for every unexpected layout shift that occurs during the entire lifespan of the page.

web

Custom Elements

A set of JavaScript APIs that allow you to define custom elements and their behavior, which can then be used in your user interface.

web

Cyber Kill Chain

A model developed by Lockheed Martin that describes the stages of a cyberattack, from initial reconnaissance to the final objective.

security

Cyber Threat Hunting

A proactive security exercise where analysts search through networks to detect and isolate advanced threats that have evaded existing security solutions.

security