S

Saga Pattern

A design pattern for managing distributed transactions in a microservices architecture.

dev

Saliency Map

A visualization technique used in computer vision to highlight the pixels or regions of an image that were most influential in a model's prediction.

ai

Salting (Cryptography)

Adding a unique, random string of characters to a password before it is hashed to protect against pre-computed attacks.

security

Same-Origin Policy(SOP)

A fundamental web security model that restricts how a document or script loaded from one origin can interact with a resource from another origin.

security

Sandboxing

A security mechanism for separating running programs, usually in an effort to mitigate system failures or software vulnerabilities from spreading.

security

Sandwich Attack

A form of MEV where an attacker places trades both before and after a victim's transaction.

web

Sankey Diagram

A type of flow diagram in which the width of the arrows is proportional to the flow rate.

ai

SANS Top 25

A list of the most widespread and critical errors that can lead to serious software vulnerabilities.

security

Sass/SCSS

A preprocessor scripting language that is interpreted or compiled into Cascading Style Sheets (CSS).

web

SATA

Serial AT Attachment; a computer bus interface that connects host bus adapters to mass storage devices.

hardware

Satoshi(sat)

The smallest unit of Bitcoin, named after its creator Satoshi Nakamoto.

web

Scalability

The property of a system to handle a growing amount of work by adding resources to the system.

dev

Scapy

A powerful Python-based interactive packet manipulation program and library.

network

Scatter Plot

A chart that uses Cartesian coordinates to display values for typically two variables for a set of data.

ai

Scrum

An Agile framework for managing complex projects, characterized by short iterations called Sprints and specific roles like Scrum Master and Product Owner.

dev

SD-WAN(SD-WAN)

A software-defined approach to managing Wide Area Networks (WANs) that simplifies management and improves performance by using multiple transport services.

network

Seaborn

A Python data visualization library based on matplotlib that provides a high-level interface for drawing attractive and informative statistical graphics.

ai

Seasonality

A characteristic of a time series in which the data experiences regular and predictable changes that recur every calendar year.

ai

Secret

A Kubernetes API object used to store and manage sensitive information, such as passwords, OAuth tokens, and ssh keys.

cloud

Secrets Management

The tools and processes used to securely store, manage, and rotate sensitive information like API keys, passwords, and certificates.

cloud

Secure Access Service Edge(SASE)

A network architecture that combines wide area networking (WAN) capabilities with cloud-native security functions.

security

Secure Boot

A security standard that ensures a device boots using only software that is trusted by the Original Equipment Manufacturer (OEM).

security

Secure Sockets Layer(SSL)

A deprecated security protocol for establishing encrypted links between a web server and a browser, now replaced by TLS.

security

Security Architecture

The design and structure of security controls and systems within an organization's IT environment to protect its assets and ensure business continuity.

security

Security as Code

The integration of security tools and practices into the DevOps pipeline through automation and code-based configurations.

dev

Security Awareness Training

A strategy used by IT and security professionals to prevent and mitigate user risk through education.

security

Security by Default

The practice of designing products and systems so that the most secure settings are enabled out-of-the-box.

security

Security by Design

An approach to software and hardware development that integrates security at every stage of the design and development process.

security

Security Group

A virtual firewall for cloud instances that controls inbound and outbound traffic at the instance level.

cloud

Security Header

HTTP response headers that tell a browser how to behave when handling a website's content to improve security.

security

Security Information and Event Management(SIEM)

Software that combines security information management and security event management.

security

Security Operations Center (SOC)(SOC)

A centralized unit that deals with security issues on an organizational and technical level, responsible for monitoring, detecting, and responding to cyber threats.

security

Security Orchestration, Automation, and Response(SOAR)

Software that allows organizations to collect threat data and respond to security events automatically.

security

Security Token

A digital asset that represents an investment in a real-world asset and is subject to securities regulations.

web

Security Token Offering(STO)

A regulated token sale where the tokens represent securities and comply with legal requirements.

web

Seed Phrase

A series of 12 to 24 random words that acts as a master key to a cryptocurrency wallet, allowing for its recovery if the device is lost or damaged.

web

Segmentation

A memory management technique that divides memory into segments of varying lengths based on logical groupings.

hardware

Segregation of Duties(SoD)

A security principle that requires more than one person to complete a critical task to prevent fraud and error.

security

Self-Attention

An attention mechanism where a model relates different positions of a single sequence to compute a representation of that sequence.

ai

Selfish Mining

A strategy where a miner keeps discovered blocks private to gain an advantage over the rest of the network.

web

Self-Service Infrastructure

A model where developers can provision and manage the infrastructure they need without manual intervention from an operations team.

dev

Self-Sovereign Identity(SSI)

A model for digital identity that gives individuals full ownership and control over their personal data and how it is shared.

web

Semantic HTML

The use of HTML markup to reinforce the semantics, or meaning, of the information in web pages and web applications rather than merely to define its look or appearance.

web

Semantic Versioning(SemVer)

A versioning scheme for software that uses a three-part number (MAJOR.MINOR.PATCH) to convey meaning about the underlying changes.

dev

Semiconductor

A material with electrical conductivity between that of a conductor and an insulator, forming the basis of modern electronics.

hardware

Semi-supervised Learning

A machine learning approach that combines a small amount of labeled data with a large amount of unlabeled data during training.

ai

SentencePiece

A language-independent subword tokenizer that treats the input as a raw stream of characters, including spaces.

ai

Sentiment Analysis

The use of natural language processing to identify, extract, and quantify affective states and subjective information from text.

ai

SEO(SEO)

The process of improving the quality and quantity of website traffic to a website or a web page from search engines.

web

Serverless Computing

A cloud execution model where the provider manages the infrastructure, automatically allocating resources based on demand.

cloud

Serverless Database

A database that automatically scales its compute and storage resources based on demand.

ai

Serverless Functions(FaaS)

A cloud computing model that allows developers to run code in response to events without managing the underlying servers.

cloud

Serverless Query Service

An interactive query service that allows you to analyze data directly in object storage using standard SQL, without managing any infrastructure.

cloud

Server-Sent Events(SSE)

A server push technology enabling a browser to receive automatic updates from a server via an HTTP connection.

web

Server-Side Rendering(SSR)

The process of rendering a web page on the server and sending the fully generated HTML to the client's browser.

cloud

Server-Side Request Forgery(SSRF)

A vulnerability where an attacker can trick a server-side application into making requests to an unintended location.

security

Service Account

A special type of cloud identity used by applications or virtual machines to interact with other cloud services programmatically.

cloud

Service Catalog

A centralized repository that provides information about all the services available within an organization.

dev

Service Discovery

The process of automatically detecting devices and services on a network.

cloud

Service Mesh

A dedicated infrastructure layer for facilitating service-to-service communications between microservices.

cloud

Service Orchestration

The automated coordination and management of multiple services to achieve a larger business goal or workflow.

dev

Service-Oriented Architecture(SOA)

An architectural style where software components provide services to other components via a communications protocol over a network.

dev

Service Worker

A script that your browser runs in the background, separate from a web page, opening the door to features that don't need a web page or user interaction.

web

Service Worker Caching

A powerful caching mechanism that allows developers to programmatically manage network requests and responses using a Service Worker.

web

Session Hijacking

The exploitation of a valid computer session to gain unauthorized access to information or services in a computer system.

security

Session Layer

The fifth layer of the OSI model, responsible for establishing, managing, and terminating sessions between applications.

network

sFlow

An industry-standard technology for monitoring high-speed switched or routed networks using sampling.

network

SHA-256(SHA-256)

A cryptographic hash function that generates a 256-bit (32-byte) signature, part of the SHA-2 family.

security

Shadow Deployment

A deployment strategy where a new version of a service receives a copy of production traffic without affecting the actual response sent to users.

dev

Shadow DOM

A web standard that provides encapsulation for the JavaScript, CSS, and templating in a Web Component.

web

Shanghai Upgrade

An Ethereum network upgrade that enabled the withdrawal of staked ETH from the Beacon Chain.

web

SHAP(SHAP)

Shapley Additive Explanations; a game-theoretic approach to explain the output of any machine learning model.

ai

Sharding

A database partitioning technique used to scale blockchains by splitting the network into smaller, more manageable pieces called 'shards.'

web

Shared Database Pattern

An anti-pattern in microservices where multiple services access the same database directly.

dev

Shared Responsibility Model

A security framework that defines which security tasks are handled by the cloud provider and which are the responsibility of the customer.

cloud

Shift Left Security

The practice of moving security testing and considerations earlier (to the 'left') in the software development lifecycle.

security

Shift Left Testing

The practice of performing testing earlier in the software development lifecycle (to the 'left' on a project timeline).

dev

Shift Right Testing

The practice of performing testing and monitoring in the production environment (to the 'right' on a project timeline).

dev

Sidecar

A design pattern where a helper container is deployed alongside a main application container in the same Pod.

cloud

Sidecar Pattern

A design pattern where a separate container or process is deployed alongside the main application to provide supporting features.

dev

Sidechain

An independent blockchain that runs in parallel to a main blockchain (Layer 1) and is connected to it via a two-way bridge.

web

Sigmoid

An activation function that maps any input value to a value between 0 and 1, often used in the output layer of binary classification models.

ai

SIMD(SIMD)

Single Instruction, Multiple Data; a type of parallel computing where one instruction operates on multiple data points simultaneously.

hardware

Simultaneous Multi-threading(SMT)

A technique that allows multiple independent threads of execution to better utilize the resources provided by modern processor architectures.

hardware

Single Page Application(SPA)

A web application or website that interacts with the user by dynamically rewriting the current web page with new data from the web server, instead of the default method of a browser loading entire new pages.

web

Single Sign-On(SSO)

An authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems.

security

Single-tenant Architecture

An architecture where each customer has their own dedicated instance of an application and its supporting infrastructure.

cloud

Singleton Pattern

A creational design pattern that ensures a class has only one instance and provides a global point of access to it.

dev

Singularity

A hypothetical future point in time at which technological growth becomes uncontrollable and irreversible, resulting in unfathomable changes to human civilization.

ai

Site Reliability Engineering(SRE)

A discipline that applies software engineering principles to infrastructure and operations.

cloud

Slippage

The difference between the expected price of a trade and the actual price at which it is executed.

web

Small Cell

Low-power wireless base stations that operate in licensed and unlicensed spectrum and have a range of 10 meters to a few hundred meters.

network

Smart Contract Audit

A thorough analysis of a smart contract's code to identify security vulnerabilities and inefficient code.

security

Smishing

A form of phishing that uses SMS (text messages) to trick victims into revealing sensitive information or downloading malware.

security

Smoke Testing

A preliminary set of tests to reveal simple failures severe enough to reject a prospective software release.

dev

SMOTE(SMOTE)

Synthetic Minority Over-sampling Technique; an over-sampling method that creates synthetic samples for the minority class.

ai

Snapshot

An off-chain voting platform used by many DAOs to allow token holders to vote on proposals without paying gas fees.

web

SNAT(SNAT)

A process that changes the source IP address of a packet as it passes through a router or firewall.

network

SNMP(SNMP)

An internet-standard protocol for collecting and organizing information about managed devices on IP networks.

network

Snowflake (Data Warehouse)

A cloud-based data-warehousing platform.

ai

Snowflake Schema

A logical arrangement of tables in a multidimensional database such that the entity relationship diagram resembles a snowflake shape.

ai

Soak Testing

A type of performance testing where a system is subjected to a significant load for an extended period of time.

dev

SOC 2(SOC 2)

An auditing procedure that ensures your service providers securely manage your data to protect the interests of your organization and the privacy of its clients.

security

Social Engineering

The psychological manipulation of people into performing actions or divulging confidential information.

security

Social Engineering Toolkit (SET)(SET)

An open-source Python-driven framework designed to facilitate social engineering attacks for security testing purposes.

security

SocialFi

A combination of social media and decentralized finance, where users can monetize their social interactions and content through blockchain-based incentives.

web

Socket

The combination of an IP address and a port number, representing one end of a two-way communication link.

network

Socket.io

A library that enables real-time, bi-directional, and event-based communication between web clients and servers.

web

Soft Fork

A backward-compatible upgrade to a blockchain protocol where only the upgraded nodes enforce the new rules.

web

Softmax

An activation function used in the final layer of a neural network to turn a vector of numbers into a probability distribution that sums to 1.

ai

Software as a Service(SaaS)

A cloud model that delivers software applications over the internet on a subscription basis.

cloud

Software Bill of Materials (SBOM)(SBOM)

A formal, structured record of the various components, libraries, and dependencies used in building a piece of software.

security

Software Composition Analysis (SCA)(SCA)

The process of identifying and managing the security and license risks associated with third-party open-source libraries and dependencies.

security

Software-Defined Networking(SDN)

An architecture that decouples the network control plane from the forwarding plane, enabling centralized and programmable network management.

network

Software-Defined Radio(SDR)

A radio communication system where components that have been traditionally implemented in hardware are instead implemented by means of software.

network

Software Development Life Cycle(SDLC)

A structured process used by the software industry to design, develop, and test high-quality software.

dev

Solana(SOL)

A high-performance Layer 1 blockchain known for its fast transaction speeds and low costs.

web

Solid

A project led by Sir Tim Berners-Lee that aims to radically change the way web applications work today, resulting in true data ownership.

web

SolidJS

A declarative, efficient, and flexible JavaScript library for building user interfaces, known for its extreme performance.

web

SOLID Principles

A set of five design principles intended to make software designs more understandable, flexible, and maintainable.

dev

Solid-State Drive(SSD)

A storage device that uses integrated circuit assemblies to store data persistently, typically using flash memory.

hardware

Soulbound Token(SBT)

Non-transferable NFTs that represent a person's identity, achievements, or affiliations within a decentralized ecosystem.

web

Southbridge

The chip in a chipset that manages slower peripheral communications like USB, Ethernet, and storage interfaces.

hardware

Spear Phishing

A highly targeted phishing attack that uses personal information to trick a specific individual or organization.

security

Speculative Execution

An optimization technique where a computer system performs some task that may not be needed.

hardware

Speech-to-Text(STT)

The process of converting spoken language into written text, also known as Automatic Speech Recognition (ASR).

ai

Speed Index

A performance metric that measures how quickly the contents of a page are visibly populated.

web

Splunk

A commercial software platform for searching, monitoring, and analyzing machine-generated big data via a Web-style interface.

cloud

Spot Instances

Excess cloud compute capacity available at steep discounts, which can be reclaimed by the provider with very short notice.

cloud

Spyware

Malware that secretly monitors and collects information about a user's activities without their knowledge or consent.

security

SQL Injection(SQLi)

A type of vulnerability where an attacker can interfere with the queries that an application makes to its database.

security

Stablecoin

A cryptocurrency designed to maintain a stable value by being pegged to a reserve asset, such as a fiat currency.

web

Staking

The act of locking up cryptocurrency tokens to support the operation and security of a proof-of-stake blockchain network.

web

Staking Pool

A group of token holders who combine their resources to increase their chances of earning staking rewards.

web

Standard Deviation(SD)

A measure of the amount of variation or dispersion of a set of values, expressed in the same units as the data.

ai

Star Schema

The simplest style of data mart schema and is the approach most widely used to develop data warehouses and dimensional data marts.

ai

Star Topology

A network topology where every peripheral node is connected to a central node, usually a switch or hub.

network

State Channel

A scaling solution that allows participants to conduct an unlimited number of transactions off-chain, only submitting the final state to the blockchain.

web

Stateful Application

An application that requires the server to remember client data or session state across multiple requests.

cloud

StatefulSet

A Kubernetes workload object used to manage stateful applications.

cloud

Stateless Application

An application that does not store client data or session state on the server between requests.

cloud

Static Application Security Testing (SAST)(SAST)

A security testing methodology that analyzes an application's source code, bytecode, or binaries for vulnerabilities without executing the program.

security

Static Code Analysis

The analysis of computer software that is performed without actually executing programs.

dev

Static RAM(SRAM)

A type of random-access memory that uses latching circuitry to store each bit, making it faster but more expensive than DRAM.

hardware

Static Routing

A process where network administrators manually configure the paths that data packets take through a network.

network

Static Site Generation(SSG)

The process of generating a full static HTML website based on raw data and a set of templates at build time.

web

Stationary Process

A stochastic process whose unconditional joint probability distribution does not change when shifted in time.

ai

Statistical Analysis

The process of collecting, exploring, and presenting large amounts of data to discover underlying patterns and trends.

ai

Step Functions/Orchestration

A service used to coordinate multiple serverless functions and other cloud services into complex, multi-step workflows.

cloud

Stochastic Gradient Descent(SGD)

An iterative optimization algorithm used to minimize a loss function by updating model parameters using a small, random subset of the training data.

ai

Storage Area Network(SAN)

A specialized, high-speed network that provides block-level network access to storage.

network

Storage Tiers

Different classes of storage offered by cloud providers, optimized for various access patterns, performance requirements, and costs.

cloud

Store Buffer

A small buffer that holds 'store' (write) operations until they are ready to be committed to the cache or main memory.

hardware

STP(STP)

A network protocol that ensures a loop-free topology for Ethernet networks by disabling redundant paths.

network

Strangler Fig Pattern

An architectural pattern for incrementally migrating a legacy system by gradually replacing specific pieces of functionality with new services.

dev

Strategy Pattern

A behavioral design pattern that lets you define a family of algorithms, put each of them into a separate class, and make their objects interchangeable.

dev

Stratified Sampling

A sampling method that involves dividing a population into smaller sub-groups known as strata.

ai

Streamlit

An open-source Python library that makes it easy to create and share custom web apps for machine learning and data science.

ai

Stream Processing

The real-time processing of continuous streams of data as they are generated.

cloud

Stress Testing

A type of performance testing that pushes a system beyond its normal operating limits to see how it fails and how it recovers.

dev

STRIDE Model(STRIDE)

A mnemonic used in threat modeling to categorize different types of security threats.

security

Structural Patterns

Design patterns that explain how to assemble objects and classes into larger structures while keeping these structures flexible and efficient.

dev

Stubbing

The practice of providing 'canned' responses to calls made during a test, usually to provide data to the code being tested.

dev

Subnet

A logical subdivision of an IP network, typically within a Virtual Private Cloud (VPC).

cloud

Subnet Mask

A 32-bit number that masks an IP address and divides the IP address into network address and host address.

network

Superscalar Architecture

A CPU design that can execute more than one instruction per clock cycle by having multiple execution units.

hardware

Superset

A modern, enterprise-ready business intelligence web application.

ai

Supervised Learning

A type of machine learning where the model is trained on a labeled dataset, meaning each training example is paired with an output label.

ai

Supply Chain Attack

A cyberattack that targets a vulnerability in a third-party dependency or service to gain access to a larger organization.

security

Supply Chain Security

The process of securing the entire lifecycle of a product, from raw materials and components to manufacturing, distribution, and software dependencies.

security

Support Vector Machine(SVM)

A supervised learning model used for classification and regression that finds the optimal hyperplane to separate data points of different classes.

ai

Survival Analysis

A branch of statistics for analyzing the expected duration of time until one or more events happen.

ai

Svelte

A radical new approach to building user interfaces that shifts the work from the browser to a compile step.

web

SVG(SVG)

An XML-based vector image format for two-dimensional graphics with support for interactivity and animation.

web

SVN

Apache Subversion (SVN) is a centralized version control system.

dev

Swarm Intelligence

The collective behavior of decentralized, self-organized systems, typically inspired by nature (e.g., ant colonies, bird flocking).

ai

Switch

A networking device that connects devices on a computer network by using packet switching to receive and forward data to the destination device.

network

Sybil Attack

A security threat where an attacker creates multiple fake identities to gain disproportionate influence over a network.

web

Symmetric Encryption

A type of encryption where the same key is used for both encrypting and decrypting the data.

security

Symmetric Multiprocessing(SMP)

A multiprocessor computer architecture where two or more identical processors connect to a single, shared main memory.

hardware

Synchronous DRAM(SDRAM)

A type of DRAM that is synchronized with the system bus, allowing for higher speeds and better efficiency.

hardware

Synthetic Data

Artificially generated data that mimics the statistical properties of real-world data without containing any information from actual individuals.

ai

Syslog

A standard for message logging that allows a device to send event notifications to a central server.

network

System on a Chip(SoC)

An integrated circuit that integrates all or most components of a computer or other electronic system into a single chip.

hardware

System Testing

A level of software testing where a complete and integrated software is tested to evaluate the system's compliance with its specified requirements.

dev