S
Saga Pattern
A design pattern for managing distributed transactions in a microservices architecture.
devSaliency Map
A visualization technique used in computer vision to highlight the pixels or regions of an image that were most influential in a model's prediction.
aiSalting (Cryptography)
Adding a unique, random string of characters to a password before it is hashed to protect against pre-computed attacks.
securitySame-Origin Policy(SOP)
A fundamental web security model that restricts how a document or script loaded from one origin can interact with a resource from another origin.
securitySandboxing
A security mechanism for separating running programs, usually in an effort to mitigate system failures or software vulnerabilities from spreading.
securitySandwich Attack
A form of MEV where an attacker places trades both before and after a victim's transaction.
webSankey Diagram
A type of flow diagram in which the width of the arrows is proportional to the flow rate.
aiSANS Top 25
A list of the most widespread and critical errors that can lead to serious software vulnerabilities.
securitySass/SCSS
A preprocessor scripting language that is interpreted or compiled into Cascading Style Sheets (CSS).
webSATA
Serial AT Attachment; a computer bus interface that connects host bus adapters to mass storage devices.
hardwareSatoshi(sat)
The smallest unit of Bitcoin, named after its creator Satoshi Nakamoto.
webScalability
The property of a system to handle a growing amount of work by adding resources to the system.
devScapy
A powerful Python-based interactive packet manipulation program and library.
networkScatter Plot
A chart that uses Cartesian coordinates to display values for typically two variables for a set of data.
aiScrum
An Agile framework for managing complex projects, characterized by short iterations called Sprints and specific roles like Scrum Master and Product Owner.
devSD-WAN(SD-WAN)
A software-defined approach to managing Wide Area Networks (WANs) that simplifies management and improves performance by using multiple transport services.
networkSeaborn
A Python data visualization library based on matplotlib that provides a high-level interface for drawing attractive and informative statistical graphics.
aiSeasonality
A characteristic of a time series in which the data experiences regular and predictable changes that recur every calendar year.
aiSecret
A Kubernetes API object used to store and manage sensitive information, such as passwords, OAuth tokens, and ssh keys.
cloudSecrets Management
The tools and processes used to securely store, manage, and rotate sensitive information like API keys, passwords, and certificates.
cloudSecure Access Service Edge(SASE)
A network architecture that combines wide area networking (WAN) capabilities with cloud-native security functions.
securitySecure Boot
A security standard that ensures a device boots using only software that is trusted by the Original Equipment Manufacturer (OEM).
securitySecure Sockets Layer(SSL)
A deprecated security protocol for establishing encrypted links between a web server and a browser, now replaced by TLS.
securitySecurity Architecture
The design and structure of security controls and systems within an organization's IT environment to protect its assets and ensure business continuity.
securitySecurity as Code
The integration of security tools and practices into the DevOps pipeline through automation and code-based configurations.
devSecurity Awareness Training
A strategy used by IT and security professionals to prevent and mitigate user risk through education.
securitySecurity by Default
The practice of designing products and systems so that the most secure settings are enabled out-of-the-box.
securitySecurity by Design
An approach to software and hardware development that integrates security at every stage of the design and development process.
securitySecurity Group
A virtual firewall for cloud instances that controls inbound and outbound traffic at the instance level.
cloudSecurity Header
HTTP response headers that tell a browser how to behave when handling a website's content to improve security.
securitySecurity Information and Event Management(SIEM)
Software that combines security information management and security event management.
securitySecurity Operations Center (SOC)(SOC)
A centralized unit that deals with security issues on an organizational and technical level, responsible for monitoring, detecting, and responding to cyber threats.
securitySecurity Orchestration, Automation, and Response(SOAR)
Software that allows organizations to collect threat data and respond to security events automatically.
securitySecurity Token
A digital asset that represents an investment in a real-world asset and is subject to securities regulations.
webSecurity Token Offering(STO)
A regulated token sale where the tokens represent securities and comply with legal requirements.
webSeed Phrase
A series of 12 to 24 random words that acts as a master key to a cryptocurrency wallet, allowing for its recovery if the device is lost or damaged.
webSegmentation
A memory management technique that divides memory into segments of varying lengths based on logical groupings.
hardwareSegregation of Duties(SoD)
A security principle that requires more than one person to complete a critical task to prevent fraud and error.
securitySelf-Attention
An attention mechanism where a model relates different positions of a single sequence to compute a representation of that sequence.
aiSelfish Mining
A strategy where a miner keeps discovered blocks private to gain an advantage over the rest of the network.
webSelf-Service Infrastructure
A model where developers can provision and manage the infrastructure they need without manual intervention from an operations team.
devSelf-Sovereign Identity(SSI)
A model for digital identity that gives individuals full ownership and control over their personal data and how it is shared.
webSemantic HTML
The use of HTML markup to reinforce the semantics, or meaning, of the information in web pages and web applications rather than merely to define its look or appearance.
webSemantic Versioning(SemVer)
A versioning scheme for software that uses a three-part number (MAJOR.MINOR.PATCH) to convey meaning about the underlying changes.
devSemiconductor
A material with electrical conductivity between that of a conductor and an insulator, forming the basis of modern electronics.
hardwareSemi-supervised Learning
A machine learning approach that combines a small amount of labeled data with a large amount of unlabeled data during training.
aiSentencePiece
A language-independent subword tokenizer that treats the input as a raw stream of characters, including spaces.
aiSentiment Analysis
The use of natural language processing to identify, extract, and quantify affective states and subjective information from text.
aiSEO(SEO)
The process of improving the quality and quantity of website traffic to a website or a web page from search engines.
webServerless Computing
A cloud execution model where the provider manages the infrastructure, automatically allocating resources based on demand.
cloudServerless Database
A database that automatically scales its compute and storage resources based on demand.
aiServerless Functions(FaaS)
A cloud computing model that allows developers to run code in response to events without managing the underlying servers.
cloudServerless Query Service
An interactive query service that allows you to analyze data directly in object storage using standard SQL, without managing any infrastructure.
cloudServer-Sent Events(SSE)
A server push technology enabling a browser to receive automatic updates from a server via an HTTP connection.
webServer-Side Rendering(SSR)
The process of rendering a web page on the server and sending the fully generated HTML to the client's browser.
cloudServer-Side Request Forgery(SSRF)
A vulnerability where an attacker can trick a server-side application into making requests to an unintended location.
securityService Account
A special type of cloud identity used by applications or virtual machines to interact with other cloud services programmatically.
cloudService Catalog
A centralized repository that provides information about all the services available within an organization.
devService Discovery
The process of automatically detecting devices and services on a network.
cloudService Mesh
A dedicated infrastructure layer for facilitating service-to-service communications between microservices.
cloudService Orchestration
The automated coordination and management of multiple services to achieve a larger business goal or workflow.
devService-Oriented Architecture(SOA)
An architectural style where software components provide services to other components via a communications protocol over a network.
devService Worker
A script that your browser runs in the background, separate from a web page, opening the door to features that don't need a web page or user interaction.
webService Worker Caching
A powerful caching mechanism that allows developers to programmatically manage network requests and responses using a Service Worker.
webSession Hijacking
The exploitation of a valid computer session to gain unauthorized access to information or services in a computer system.
securitySession Layer
The fifth layer of the OSI model, responsible for establishing, managing, and terminating sessions between applications.
networksFlow
An industry-standard technology for monitoring high-speed switched or routed networks using sampling.
networkSHA-256(SHA-256)
A cryptographic hash function that generates a 256-bit (32-byte) signature, part of the SHA-2 family.
securityShadow Deployment
A deployment strategy where a new version of a service receives a copy of production traffic without affecting the actual response sent to users.
devShadow DOM
A web standard that provides encapsulation for the JavaScript, CSS, and templating in a Web Component.
webShanghai Upgrade
An Ethereum network upgrade that enabled the withdrawal of staked ETH from the Beacon Chain.
webSHAP(SHAP)
Shapley Additive Explanations; a game-theoretic approach to explain the output of any machine learning model.
aiSharding
A database partitioning technique used to scale blockchains by splitting the network into smaller, more manageable pieces called 'shards.'
webShared Database Pattern
An anti-pattern in microservices where multiple services access the same database directly.
devShared Responsibility Model
A security framework that defines which security tasks are handled by the cloud provider and which are the responsibility of the customer.
cloudShift Left Security
The practice of moving security testing and considerations earlier (to the 'left') in the software development lifecycle.
securityShift Left Testing
The practice of performing testing earlier in the software development lifecycle (to the 'left' on a project timeline).
devShift Right Testing
The practice of performing testing and monitoring in the production environment (to the 'right' on a project timeline).
devSidecar
A design pattern where a helper container is deployed alongside a main application container in the same Pod.
cloudSidecar Pattern
A design pattern where a separate container or process is deployed alongside the main application to provide supporting features.
devSidechain
An independent blockchain that runs in parallel to a main blockchain (Layer 1) and is connected to it via a two-way bridge.
webSigmoid
An activation function that maps any input value to a value between 0 and 1, often used in the output layer of binary classification models.
aiSIMD(SIMD)
Single Instruction, Multiple Data; a type of parallel computing where one instruction operates on multiple data points simultaneously.
hardwareSimultaneous Multi-threading(SMT)
A technique that allows multiple independent threads of execution to better utilize the resources provided by modern processor architectures.
hardwareSingle Page Application(SPA)
A web application or website that interacts with the user by dynamically rewriting the current web page with new data from the web server, instead of the default method of a browser loading entire new pages.
webSingle Sign-On(SSO)
An authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems.
securitySingle-tenant Architecture
An architecture where each customer has their own dedicated instance of an application and its supporting infrastructure.
cloudSingleton Pattern
A creational design pattern that ensures a class has only one instance and provides a global point of access to it.
devSingularity
A hypothetical future point in time at which technological growth becomes uncontrollable and irreversible, resulting in unfathomable changes to human civilization.
aiSite Reliability Engineering(SRE)
A discipline that applies software engineering principles to infrastructure and operations.
cloudSlippage
The difference between the expected price of a trade and the actual price at which it is executed.
webSmall Cell
Low-power wireless base stations that operate in licensed and unlicensed spectrum and have a range of 10 meters to a few hundred meters.
networkSmart Contract Audit
A thorough analysis of a smart contract's code to identify security vulnerabilities and inefficient code.
securitySmishing
A form of phishing that uses SMS (text messages) to trick victims into revealing sensitive information or downloading malware.
securitySmoke Testing
A preliminary set of tests to reveal simple failures severe enough to reject a prospective software release.
devSMOTE(SMOTE)
Synthetic Minority Over-sampling Technique; an over-sampling method that creates synthetic samples for the minority class.
aiSnapshot
An off-chain voting platform used by many DAOs to allow token holders to vote on proposals without paying gas fees.
webSNAT(SNAT)
A process that changes the source IP address of a packet as it passes through a router or firewall.
networkSNMP(SNMP)
An internet-standard protocol for collecting and organizing information about managed devices on IP networks.
networkSnowflake (Data Warehouse)
A cloud-based data-warehousing platform.
aiSnowflake Schema
A logical arrangement of tables in a multidimensional database such that the entity relationship diagram resembles a snowflake shape.
aiSoak Testing
A type of performance testing where a system is subjected to a significant load for an extended period of time.
devSOC 2(SOC 2)
An auditing procedure that ensures your service providers securely manage your data to protect the interests of your organization and the privacy of its clients.
securitySocial Engineering
The psychological manipulation of people into performing actions or divulging confidential information.
securitySocial Engineering Toolkit (SET)(SET)
An open-source Python-driven framework designed to facilitate social engineering attacks for security testing purposes.
securitySocialFi
A combination of social media and decentralized finance, where users can monetize their social interactions and content through blockchain-based incentives.
webSocket
The combination of an IP address and a port number, representing one end of a two-way communication link.
networkSocket.io
A library that enables real-time, bi-directional, and event-based communication between web clients and servers.
webSoft Fork
A backward-compatible upgrade to a blockchain protocol where only the upgraded nodes enforce the new rules.
webSoftmax
An activation function used in the final layer of a neural network to turn a vector of numbers into a probability distribution that sums to 1.
aiSoftware as a Service(SaaS)
A cloud model that delivers software applications over the internet on a subscription basis.
cloudSoftware Bill of Materials (SBOM)(SBOM)
A formal, structured record of the various components, libraries, and dependencies used in building a piece of software.
securitySoftware Composition Analysis (SCA)(SCA)
The process of identifying and managing the security and license risks associated with third-party open-source libraries and dependencies.
securitySoftware-Defined Networking(SDN)
An architecture that decouples the network control plane from the forwarding plane, enabling centralized and programmable network management.
networkSoftware-Defined Radio(SDR)
A radio communication system where components that have been traditionally implemented in hardware are instead implemented by means of software.
networkSoftware Development Life Cycle(SDLC)
A structured process used by the software industry to design, develop, and test high-quality software.
devSolana(SOL)
A high-performance Layer 1 blockchain known for its fast transaction speeds and low costs.
webSolid
A project led by Sir Tim Berners-Lee that aims to radically change the way web applications work today, resulting in true data ownership.
webSolidJS
A declarative, efficient, and flexible JavaScript library for building user interfaces, known for its extreme performance.
webSOLID Principles
A set of five design principles intended to make software designs more understandable, flexible, and maintainable.
devSolid-State Drive(SSD)
A storage device that uses integrated circuit assemblies to store data persistently, typically using flash memory.
hardwareSoulbound Token(SBT)
Non-transferable NFTs that represent a person's identity, achievements, or affiliations within a decentralized ecosystem.
webSouthbridge
The chip in a chipset that manages slower peripheral communications like USB, Ethernet, and storage interfaces.
hardwareSpear Phishing
A highly targeted phishing attack that uses personal information to trick a specific individual or organization.
securitySpeculative Execution
An optimization technique where a computer system performs some task that may not be needed.
hardwareSpeech-to-Text(STT)
The process of converting spoken language into written text, also known as Automatic Speech Recognition (ASR).
aiSpeed Index
A performance metric that measures how quickly the contents of a page are visibly populated.
webSplunk
A commercial software platform for searching, monitoring, and analyzing machine-generated big data via a Web-style interface.
cloudSpot Instances
Excess cloud compute capacity available at steep discounts, which can be reclaimed by the provider with very short notice.
cloudSpyware
Malware that secretly monitors and collects information about a user's activities without their knowledge or consent.
securitySQL Injection(SQLi)
A type of vulnerability where an attacker can interfere with the queries that an application makes to its database.
securityStablecoin
A cryptocurrency designed to maintain a stable value by being pegged to a reserve asset, such as a fiat currency.
webStaking
The act of locking up cryptocurrency tokens to support the operation and security of a proof-of-stake blockchain network.
webStaking Pool
A group of token holders who combine their resources to increase their chances of earning staking rewards.
webStandard Deviation(SD)
A measure of the amount of variation or dispersion of a set of values, expressed in the same units as the data.
aiStar Schema
The simplest style of data mart schema and is the approach most widely used to develop data warehouses and dimensional data marts.
aiStar Topology
A network topology where every peripheral node is connected to a central node, usually a switch or hub.
networkState Channel
A scaling solution that allows participants to conduct an unlimited number of transactions off-chain, only submitting the final state to the blockchain.
webStateful Application
An application that requires the server to remember client data or session state across multiple requests.
cloudStatefulSet
A Kubernetes workload object used to manage stateful applications.
cloudStateless Application
An application that does not store client data or session state on the server between requests.
cloudStatic Application Security Testing (SAST)(SAST)
A security testing methodology that analyzes an application's source code, bytecode, or binaries for vulnerabilities without executing the program.
securityStatic Code Analysis
The analysis of computer software that is performed without actually executing programs.
devStatic RAM(SRAM)
A type of random-access memory that uses latching circuitry to store each bit, making it faster but more expensive than DRAM.
hardwareStatic Routing
A process where network administrators manually configure the paths that data packets take through a network.
networkStatic Site Generation(SSG)
The process of generating a full static HTML website based on raw data and a set of templates at build time.
webStationary Process
A stochastic process whose unconditional joint probability distribution does not change when shifted in time.
aiStatistical Analysis
The process of collecting, exploring, and presenting large amounts of data to discover underlying patterns and trends.
aiStep Functions/Orchestration
A service used to coordinate multiple serverless functions and other cloud services into complex, multi-step workflows.
cloudStochastic Gradient Descent(SGD)
An iterative optimization algorithm used to minimize a loss function by updating model parameters using a small, random subset of the training data.
aiStorage Area Network(SAN)
A specialized, high-speed network that provides block-level network access to storage.
networkStorage Tiers
Different classes of storage offered by cloud providers, optimized for various access patterns, performance requirements, and costs.
cloudStore Buffer
A small buffer that holds 'store' (write) operations until they are ready to be committed to the cache or main memory.
hardwareSTP(STP)
A network protocol that ensures a loop-free topology for Ethernet networks by disabling redundant paths.
networkStrangler Fig Pattern
An architectural pattern for incrementally migrating a legacy system by gradually replacing specific pieces of functionality with new services.
devStrategy Pattern
A behavioral design pattern that lets you define a family of algorithms, put each of them into a separate class, and make their objects interchangeable.
devStratified Sampling
A sampling method that involves dividing a population into smaller sub-groups known as strata.
aiStreamlit
An open-source Python library that makes it easy to create and share custom web apps for machine learning and data science.
aiStream Processing
The real-time processing of continuous streams of data as they are generated.
cloudStress Testing
A type of performance testing that pushes a system beyond its normal operating limits to see how it fails and how it recovers.
devSTRIDE Model(STRIDE)
A mnemonic used in threat modeling to categorize different types of security threats.
securityStructural Patterns
Design patterns that explain how to assemble objects and classes into larger structures while keeping these structures flexible and efficient.
devStubbing
The practice of providing 'canned' responses to calls made during a test, usually to provide data to the code being tested.
devSubnet
A logical subdivision of an IP network, typically within a Virtual Private Cloud (VPC).
cloudSubnet Mask
A 32-bit number that masks an IP address and divides the IP address into network address and host address.
networkSuperscalar Architecture
A CPU design that can execute more than one instruction per clock cycle by having multiple execution units.
hardwareSuperset
A modern, enterprise-ready business intelligence web application.
aiSupervised Learning
A type of machine learning where the model is trained on a labeled dataset, meaning each training example is paired with an output label.
aiSupply Chain Attack
A cyberattack that targets a vulnerability in a third-party dependency or service to gain access to a larger organization.
securitySupply Chain Security
The process of securing the entire lifecycle of a product, from raw materials and components to manufacturing, distribution, and software dependencies.
securitySupport Vector Machine(SVM)
A supervised learning model used for classification and regression that finds the optimal hyperplane to separate data points of different classes.
aiSurvival Analysis
A branch of statistics for analyzing the expected duration of time until one or more events happen.
aiSvelte
A radical new approach to building user interfaces that shifts the work from the browser to a compile step.
webSVG(SVG)
An XML-based vector image format for two-dimensional graphics with support for interactivity and animation.
webSVN
Apache Subversion (SVN) is a centralized version control system.
devSwarm Intelligence
The collective behavior of decentralized, self-organized systems, typically inspired by nature (e.g., ant colonies, bird flocking).
aiSwitch
A networking device that connects devices on a computer network by using packet switching to receive and forward data to the destination device.
networkSybil Attack
A security threat where an attacker creates multiple fake identities to gain disproportionate influence over a network.
webSymmetric Encryption
A type of encryption where the same key is used for both encrypting and decrypting the data.
securitySymmetric Multiprocessing(SMP)
A multiprocessor computer architecture where two or more identical processors connect to a single, shared main memory.
hardwareSynchronous DRAM(SDRAM)
A type of DRAM that is synchronized with the system bus, allowing for higher speeds and better efficiency.
hardwareSynthetic Data
Artificially generated data that mimics the statistical properties of real-world data without containing any information from actual individuals.
aiSyslog
A standard for message logging that allows a device to send event notifications to a central server.
networkSystem on a Chip(SoC)
An integrated circuit that integrates all or most components of a computer or other electronic system into a single chip.
hardwareSystem Testing
A level of software testing where a complete and integrated software is tested to evaluate the system's compliance with its specified requirements.
dev