I
ICMP(ICMP)
A supporting protocol in the Internet Protocol Suite used by network devices to send error messages and operational information.
networkIdentity and Access Management(IAM)
A framework for ensuring that the right people have the appropriate access to technology resources.
securityIdentity Security
A comprehensive approach to securing digital identities and managing access to resources across an organization.
securityImage Optimization
The practice of reducing the file size of images as much as possible without sacrificing quality to improve page load speed.
webImage Registry
A centralized service for storing and distributing container images.
cloudImage Segmentation
The process of partitioning a digital image into multiple segments or sets of pixels to simplify its representation and make it more meaningful for analysis.
aiImmutability
The inability of a blockchain's history to be changed or deleted once it has been recorded.
webImpermanent Loss(IL)
The temporary loss of funds experienced by liquidity providers in an AMM when asset prices change.
webIncident Management
The process of responding to an unplanned event or service interruption and restoring the service to its operational state.
devIncident Response(IR)
An organized approach to addressing and managing the aftermath of a security breach or cyberattack.
securityInclusive Cache
A cache hierarchy design where all data in a higher-level cache (e.g., L1) is also guaranteed to be present in the lower-level cache (e.g., L2).
hardwareIncremental Static Regeneration(ISR)
A hybrid approach that allows you to update static content after you've built your site, without needing to rebuild the entire site.
webIndicators of Attack(IoA)
Evidence of an attacker's intent and the techniques they are using in real-time, focusing on the 'how' rather than the 'what'.
securityIndicators of Compromise(IoC)
Evidence or artifacts found on a network or operating system that indicate a high probability of a security breach.
securityInference
The stage where a trained AI model is used to make predictions or generate outputs based on new, unseen input data.
aiInferential Statistics
The process of using data analysis to deduce properties of an underlying probability distribution.
aiInformation Security(InfoSec)
The practice of protecting information by mitigating information risks, ensuring confidentiality, integrity, and availability.
securityInfrastructure as a Service(IaaS)
A cloud model that provides on-demand access to fundamental computing resources like servers and storage.
cloudInfrastructure as Code(IaC)
The management and provisioning of infrastructure through machine-readable definition files, rather than manual configuration or interactive tools.
cloudInfrastructure as Code (IaC) Scanning
The process of analyzing infrastructure definition files (e.g., Terraform, CloudFormation) for security misconfigurations before they are deployed.
securityInfrastructure as Code (Networking)(IaC)
Managing and provisioning network infrastructure through machine-readable definition files rather than manual configuration.
networkInfrastructure Monitoring
The process of collecting and analyzing metrics and logs from cloud resources to ensure their health, performance, and availability.
cloudIngress
An API object that manages external access to services in a Kubernetes cluster, typically HTTP.
cloudInitial Coin Offering(ICO)
A fundraising method where a new project sells its native tokens to early investors.
webInitial DEX Offering(IDO)
A token launch conducted on a decentralized exchange (DEX).
webInitial Exchange Offering(IEO)
A token sale managed by a centralized exchange (CEX) on behalf of a project.
webIn-Memory Cache
A high-speed data storage layer that stores a subset of data in RAM to serve future requests faster than accessing the primary database.
cloudInput/Output(I/O)
The communication between an information processing system (such as a computer) and the outside world.
hardwareInstruction Level Parallelism(ILP)
A measure of how many instructions in a computer program can be executed simultaneously.
hardwareInstruction Set Architecture(ISA)
The abstract model of a computer that defines the set of basic operations a processor can perform.
hardwareIntegrated Circuit(IC)
A set of electronic circuits on one small flat piece of semiconductor material, commonly called a 'chip'.
hardwareIntegrated Services(IntServ)
A QoS architecture that reserves end-to-end network resources for specific traffic flows before data is sent.
networkIntegration Testing
A level of software testing where individual units are combined and tested as a group.
devInteraction to Next Paint(INP)
A Core Web Vital that measures a page's overall responsiveness to user interactions throughout its entire lifecycle.
webInteractive Application Security Testing (IAST)(IAST)
A security testing methodology that combines elements of SAST and DAST by using agents to monitor an application's internal execution during testing.
securityInteractive Visualization
A type of data visualization that allows users to manipulate and explore the data directly through the interface.
aiInterconnect
The physical wiring that connects transistors and other components within an integrated circuit or between chiplets.
hardwareInternal Developer Portal(IDP)
A self-service interface that allows developers to discover and use the tools, services, and infrastructure provided by a platform engineering team.
devInternet Gateway(IGW)
A horizontally scaled, redundant, and highly available VPC component that allows communication between your VPC and the internet.
cloudInternet of Things Networking(IoT Networking)
The specialized networking technologies and protocols used to connect billions of physical devices to the internet and to each other.
networkInterrupt
A signal to the processor emitted by hardware or software indicating an event that needs immediate attention.
hardwareInterrupt Request(IRQ)
A signal sent to the CPU to temporarily stop a running program and allow a special piece of code (an ISR) to run instead.
hardwareInterrupt Service Routine(ISR)
A software routine that hardware invokes in response to an interrupt.
hardwareIntranet
A private network accessible only to an organization's staff, used for internal communication and collaboration.
networkIntrusion Detection System(IDS)
A device or software that monitors a network or systems for malicious activity.
securityIntrusion Prevention System(IPS)
A network security tool that monitors traffic for malicious activity and takes action to prevent it.
securityI/O Port
A specialized address used by the CPU to communicate with a specific hardware device.
hardwareI/O Wall
The performance bottleneck caused by the slow speed of input/output operations compared to the processor and memory.
hardwareIP Address(IP)
A numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.
networkIPFIX(IPFIX)
An IETF standard protocol for exporting IP flow information from network devices.
networkIPFS(IPFS)
InterPlanetary File System; a peer-to-peer network for storing and sharing data in a distributed file system.
webIPFS (Web)(IPFS)
The use of the InterPlanetary File System protocol within web browsers to store and access content in a decentralized, content-addressed manner.
webIPv4
The fourth version of the Internet Protocol, using 32-bit addresses, which limits the total number of addresses to approximately 4.3 billion.
networkIPv6
The most recent version of the Internet Protocol, using 128-bit addresses to provide a vastly larger address space than IPv4.
networkIS-IS(IS-IS)
A link-state routing protocol used primarily by service providers to route traffic within large backbone networks.
networkISO/IEC 27001
An international standard on how to manage information security, providing a framework for an Information Security Management System (ISMS).
securityIstio
An open-source service mesh that provides a uniform way to secure, connect, and monitor microservices.
cloudITIL
Information Technology Infrastructure Library (ITIL) is a set of detailed practices for IT service management (ITSM).
devITX(ITX)
A family of small form factor motherboard specifications, most notably Mini-ITX.
hardware