C

Circuit Breaker Pattern

A design pattern used to detect failures and encapsulate the logic of preventing a failure from constantly recurring.

dev

CISC

Complex Instruction Set Computer; a CPU design where single instructions can perform multi-step operations.

hardware

CIS Controls

A prioritized set of actions that collectively form a defense-in-depth set of best practices that mitigate the most common cyberattacks.

security

Clickjacking

A malicious technique of tricking a user into clicking on something different from what the user perceives.

security

Client-Side Rendering(CSR)

A rendering method where the browser downloads a minimal HTML file and uses JavaScript to render the content and handle navigation.

web

CLIP(CLIP)

Contrastive Language-Image Pre-training; a model developed by OpenAI that learns visual concepts from natural language supervision.

ai

Clock Gating

A power-saving technique that disables the clock signal to portions of a circuit that are not currently in use.

hardware

Clock Speed

The rate at which a processor executes instructions, measured in cycles per second (Hertz).

hardware

Cloud Access Security Broker(CASB)

A software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.

security

CloudFormation

An AWS service that allows users to model and set up Amazon Web Services resources using JSON or YAML templates.

cloud

Cloud Foundry

An open-source multi-cloud platform as a service (PaaS) governed by the Cloud Foundry Foundation.

cloud

Cloud Governance

The set of rules, policies, and controls that an organization implements to manage its cloud resources effectively and securely.

cloud

Cloud Identity and Access Management(IAM)

A framework of policies and technologies for ensuring that the proper people and entities have the appropriate access to cloud resources.

cloud

Cloud Interconnect

A high-speed, private connection between an on-premises network and a cloud provider's network.

cloud

Cloud Migration

The process of moving data, applications, or other business elements to the cloud.

cloud

Cloud Native

An approach to building and running applications that exploits the advantages of the cloud computing delivery model.

cloud

Cloud-Native Buildpacks

A set of tools for transforming source code into production-ready container images without a Dockerfile.

cloud

Cloud-Native Networking

The set of networking principles and technologies designed to support the dynamic and distributed nature of cloud-native applications.

cloud

Cloud-Native Security

A security approach designed specifically for the dynamic, distributed, and scalable nature of cloud-native applications.

cloud

Cloud Security Posture Management (CSPM)(CSPM)

A security tool that automatically identifies and remediates misconfigurations and compliance risks in cloud environments.

security

Cloud Workload Protection Platform (CWPP)(CWPP)

A security solution designed to protect workloads (VMs, containers, and serverless functions) across different cloud environments.

security

Cluster

A set of connected computers (nodes) that work together as a single system to run containerized applications.

cloud

Cluster Analysis

The task of grouping a set of objects in such a way that objects in the same group are more similar to each other than to those in other groups.

ai

Cluster Autoscaler

A tool that automatically adjusts the size of a Kubernetes cluster by adding or removing nodes.

cloud

CNI (Container Network Interface)(CNI)

A CNCF project that consists of a specification and libraries for writing plugins to configure network interfaces in Linux containers.

cloud

CoAP(CoAP)

A specialized web transfer protocol for use with constrained nodes and constrained networks in the Internet of Things.

network

Coaxial Cable

A type of electrical cable with an inner conductor surrounded by a tubular insulating layer, surrounded by a tubular conducting shield.

network

Code Coverage

A metric used to measure the percentage of source code that is executed when a particular test suite runs.

dev

Code Review

A systematic examination of computer source code intended to find bugs, improve code quality, and share knowledge among developers.

dev

Code Smell

Any symptom in the source code of a program that possibly indicates a deeper problem.

dev

Code Splitting

A feature of modern bundlers that allows you to split your code into various bundles which can then be loaded on demand or in parallel.

web

Cognitive Radio(CR)

An intelligent radio that can be programmed and configured dynamically to use the best wireless channels in its vicinity to avoid interference and congestion.

network

Cold Start

The delay that occurs when a serverless function is invoked for the first time or after a period of inactivity.

cloud

Cold Storage

A storage tier designed for data that is rarely accessed.

cloud

Cold Wallet

A cryptocurrency wallet that is kept offline, providing a high level of security against online threats.

web

Color Theory in Data Viz

The strategic use of color to enhance the clarity, readability, and emotional impact of data visualizations.

ai

Command and Control(C2)

The infrastructure used by attackers to maintain communication with compromised systems within a target network.

security

Common Vulnerabilities and Exposures (CVE)(CVE)

A list of publicly disclosed cybersecurity vulnerabilities, each assigned a unique identification number.

security

Common Vulnerability Scoring System (CVSS)(CVSS)

A standardized framework for rating the severity of security vulnerabilities on a scale from 0 to 10.

security

Common Weakness Enumeration (CWE)(CWE)

A community-developed list of common software and hardware security weaknesses.

security

Compare-and-Swap(CAS)

An atomic instruction that compares the contents of a memory location to a given value and, only if they are the same, modifies the contents of that memory location to a new given value.

hardware

Compliance

The state of meeting the requirements of accepted laws, regulations, standards, or policies.

security

Compliance as Code

The practice of automating the implementation, monitoring, and reporting of compliance requirements using code.

dev

Compliance Framework

A set of guidelines and best practices that help organizations meet regulatory and industry-specific security standards in the cloud.

cloud

Compression

The process of encoding information using fewer bits than the original representation to reduce file size and transmission time.

web

Computer Network

A collection of interconnected computing devices that exchange data and share resources using common communication protocols.

network

Computer Vision

A field of AI that enables computers to interpret and understand visual information from the world.

ai

Conceptual Data Model

A high-level view of the data required to support business processes.

ai

Confidence Interval(CI)

A range of values derived from sample statistics that is likely to contain the value of an unknown population parameter.

ai

ConfigMap

A Kubernetes API object used to store non-confidential data in key-value pairs.

cloud

Configuration Management

The process of maintaining software and infrastructure in a desired, consistent state.

cloud

Configuration Management Database(CMDB)

A repository that acts as a data warehouse, storing information about IT assets and the relationships between them.

dev

Confusion Matrix

A table used to describe the performance of a classification model by showing the counts of true positives, true negatives, false positives, and false negatives.

ai

Congestion Control

A mechanism used to prevent a network from becoming overloaded with too much traffic, which would lead to packet loss and delays.

network

Consensus Mechanism

A fault-tolerant mechanism used in computer and blockchain systems to achieve the necessary agreement on a single data value or a single state of the network among distributed processes.

web

Consortium Blockchain

A semi-decentralized blockchain where the network is managed by a group of organizations rather than a single entity.

web

Consumer-Driven Contracts(CDC)

A pattern where the consumers of an API define the contract, ensuring the provider only builds what is actually needed.

dev

Containerization

The process of packaging an application together with its libraries, dependencies, and configuration files into a single container image.

dev

Container Orchestration

The automation of the deployment, scaling, and management of containerized applications.

cloud

Container Runtime

The software responsible for running containers on a host system.

cloud

Container Security

The practice of protecting containerized applications and their underlying infrastructure throughout the entire lifecycle.

security

Content Delivery Network(CDN)

A geographically distributed group of servers that work together to provide fast delivery of Internet content.

cloud

Content Security Policy(CSP)

An HTTP header that allows site operators to control which resources the user agent is allowed to load for a given page.

security

Context Window

The maximum amount of text that an LLM can consider at one time when generating a response.

ai

Continuous Feedback

The practice of gathering and analyzing data from all stages of the software delivery lifecycle to inform future development and improvements.

dev

Continuous Verification

The practice of continuously monitoring and verifying that a system is behaving as expected in production, often using automated experiments.

dev

Contract Testing

A technique for testing an integration point by checking that each application adheres to a shared contract.

dev

Control Plane

The collection of components that manage the state of a Kubernetes cluster.

cloud

Conventional Commits

A specification for adding human and machine-readable meaning to commit messages.

dev

Convolutional Neural Network(CNN)

A type of deep neural network specifically designed for processing structured arrays of data, such as images.

ai

Cookie Poisoning

An attack where the attacker modifies the contents of a cookie to bypass security controls or steal information.

security

Cooling System

The components used to dissipate heat generated by a computer's processor and other parts.

hardware

Coordinated Vulnerability Disclosure (CVD)(CVD)

A collaborative process where multiple parties (researchers, vendors, and coordinators) work together to manage the disclosure and remediation of security vulnerabilities.

security

Core Web Vitals

A set of specific factors that Google considers important in a webpage's overall user experience.

web

Correlation

A statistical measure that expresses the extent to which two variables are linearly related.

ai

Cosmos(ATOM)

An ecosystem of independent, parallel blockchains that can interoperate with each other.

web

Cost Management

The process of monitoring, analyzing, and optimizing cloud spending to ensure maximum value and prevent budget overruns.

cloud

CQRS(CQRS)

Command Query Responsibility Segregation (CQRS) is a pattern that separates read and update operations for a data store.

dev

Creational Patterns

Design patterns that deal with object creation mechanisms, trying to create objects in a manner suitable to the situation.

dev

Creator Economy

An economic system where independent content creators can earn revenue directly from their audience, facilitated by Web3 tools.

web

Critical Rendering Path(CRP)

The sequence of steps the browser goes through to convert HTML, CSS, and JavaScript into pixels on the screen.

web

CronJob

A Kubernetes object that manages time-based Jobs, similar to the crontab on a Unix system.

cloud

Cross-Browser Compatibility

The ability of a website, web application, or HTML construct to support various web browsers.

web

Cross-Entropy

A loss function commonly used in classification tasks to measure the performance of a model whose output is a probability value between 0 and 1.

ai

Cross-Origin Resource Sharing(CORS)

A mechanism that uses additional HTTP headers to tell browsers to give a web application running at one origin access to selected resources from a different origin.

security

Cross-Site Request Forgery(CSRF)

An attack that forces an authenticated user to execute unwanted actions on a web application in which they are currently authenticated.

security

Cross-Site Scripting(XSS)

A vulnerability that allows an attacker to inject malicious scripts into web pages viewed by other users.

security

Cross-Validation

A resampling technique used to evaluate a model's performance by partitioning the data into multiple subsets and training/testing the model several times.

ai

Cryptoeconomics

The study of economic incentives and cryptography in decentralized systems to ensure security and stability.

web

Cryptographic Hash Function

A mathematical algorithm that maps data of arbitrary size to a bit string of a fixed size (a hash).

security

CSS3

The latest evolution of the Cascading Style Sheets language, used for describing the presentation of a document written in HTML.

web

CSS Grid

A two-dimensional layout system for the web, allowing developers to create complex layouts with rows and columns more easily than ever before.

web

Cumulative Layout Shift(CLS)

A Core Web Vital that measures the sum total of all individual layout shift scores for every unexpected layout shift that occurs during the entire lifespan of the page.

web

Custom Elements

A set of JavaScript APIs that allow you to define custom elements and their behavior, which can then be used in your user interface.

web

Cyber Kill Chain

A model developed by Lockheed Martin that describes the stages of a cyberattack, from initial reconnaissance to the final objective.

security

Cyber Threat Hunting

A proactive security exercise where analysts search through networks to detect and isolate advanced threats that have evaded existing security solutions.

security

D

D3.js

A JavaScript library for producing dynamic, interactive data visualizations in web browsers.

ai

DaemonSet

A Kubernetes object that ensures that all (or some) Nodes run a copy of a specific Pod.

cloud

Danksharding

The final design for Ethereum sharding that focuses on data availability and simplifies the architecture.

web

Dark Launching

The practice of deploying a new feature to production but keeping it hidden from users to test its performance and stability.

dev

Dark Silicon

The portion of an integrated circuit that cannot be powered on at the same time due to thermal constraints.

hardware

Dash

A productive Python framework for building analytical web applications.

ai

Dashboard

A type of graphical user interface which often provides at-a-glance views of key performance indicators (KPIs) relevant to a particular objective or business process.

ai

Dashboarding

The visual representation of metrics, logs, and traces to provide a real-time overview of system health and performance.

dev

Data Analytics

The process of examining data sets in order to find trends and draw conclusions about the information they contain.

ai

Data Archiving

The process of moving data that is no longer actively used to a separate storage device for long-term retention.

ai

Data Augmentation

A technique used to increase the diversity of training data without collecting new examples, by creating modified versions of existing data.

ai

Data Availability

The assurance that data is accessible to authorized users and applications when and where they need it.

ai

Database per Service

A microservices pattern where each service has its own private database that cannot be accessed directly by other services.

dev

Data Catalog

A centralized metadata management service that helps users discover, understand, and manage data assets across their organization.

cloud

Data Cleansing

The process of identifying and correcting corrupt, inaccurate, or irrelevant records from a record set, table, or database.

ai

Data Consistency

The requirement that any given database transaction must change affected data only in allowed ways.

ai

Data Democratization

The process of making data accessible to all users within an organization, regardless of their technical expertise.

ai

Data Dictionary

A centralized repository of information about data such as meaning, relationships to other data, origin, usage, and format.

ai

Data Disposal

The process of permanently deleting or destroying data so that it can no longer be read or reconstructed.

ai

Datadog

A cloud-scale monitoring and security platform that provides full-stack observability for modern applications.

cloud

Data Durability

The ability of a system to keep data stored and intact over long periods, even in the event of system failures or power outages.

ai

Data Engineering

The practice of designing and building systems for collecting, storing, and analyzing data at scale.

ai

Data Fabric

An integrated architecture that provides a unified view of data across disparate sources using metadata and automation.

ai

Data Federation

A form of data virtualization where multiple databases are combined into a single virtual database.

ai

Data Governance

The overall management of the availability, usability, integrity and security of data used in an enterprise.

ai

Data Integration

The process of combining data from different sources into a single, unified view.

ai

Data Lake

A centralized repository that allows you to store all your structured and unstructured data at any scale.

ai

Data Lakehouse

A new, open data management architecture that combines the flexibility, cost-efficiency, and scale of data lakes with the data management and transactions of data warehouses.

ai

Data Leakage

A common error in machine learning where information from outside the training dataset is used to create the model, leading to overly optimistic performance results.

ai

Data Level Parallelism(DLP)

A form of parallelism where the same operation is performed on multiple data points simultaneously.

hardware

Data Lineage

A data life cycle that includes the data's origins and where it moves over time.

ai

Data Link Layer

The second layer of the OSI model, responsible for node-to-node data transfer and error detection on the physical link.

network

Data Literacy

The ability to read, understand, create, and communicate data as information.

ai

Data Loss Prevention(DLP)

A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.

security

Data Mesh

A decentralized data architecture that organizes data by business domain, treating data as a product.

ai

Data Mining

The process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.

ai

Data Modeling

The process of creating a visual representation of either a whole information system or parts of it to communicate connections between data points and structures.

ai

Data Pipeline

A series of automated processes that collect, transform, and move data from various sources to a destination for analysis or model training.

ai

Data Privacy

The branch of data protection that deals with the proper handling of data focusing on compliance with data protection regulations.

security

Data Profiling

The process of examining, analyzing, and creating useful summaries of data to understand its structure, content, and quality.

ai

Data Quality

A measure of the condition of data based on factors such as accuracy, completeness, consistency, reliability and whether it's up to date.

ai

Data Residency

The physical or geographic location of where an organization's data or information is stored.

security

Data Retention

The practice of keeping data for a specific period to meet business, legal, or regulatory requirements.

ai

Data Sampling

The selection of a subset of individuals from within a statistical population to estimate characteristics of the whole population.

ai

Data Science

The field of study that combines domain expertise, programming skills, and knowledge of mathematics and statistics to extract meaningful insights from data.

ai

Data Scrubbing

A specific type of data cleansing that focuses on removing or modifying data that is incorrect, incomplete, improperly formatted, or duplicated.

ai

Data Sovereignty

The idea that data is subject to the laws and governance structures within the nation it is collected.

security

Data Synchronization

The process of ensuring that data in two or more locations is consistent and up-to-date.

ai

Data Virtualization

An approach to data management that allows applications to retrieve and manipulate data without requiring technical details about the data, such as how it is formatted or where it is physically located.

ai

Data Visualization

The graphical representation of information and data.

ai

Data Visualization Principles

A set of guidelines and best practices for creating effective and accurate graphical representations of data.

ai

Data Warehouse

A system used for reporting and data analysis, storing structured data from multiple sources.

ai

Data Warehouse Service

A managed, large-scale data storage and analysis service optimized for complex queries and business intelligence.

cloud

Data Wrangling

The process of transforming and mapping data from one 'raw' data form into another format with the intent of making it more appropriate and valuable for a variety of downstream purposes such as analytics.

ai

DBSCAN(DBSCAN)

Density-Based Spatial Clustering of Applications with Noise; a clustering algorithm that groups together points that are closely packed together.

ai

DDR4

The fourth generation of Double Data Rate (DDR) synchronous dynamic random-access memory.

hardware

DDR5

The fifth and latest generation of Double Data Rate (DDR) synchronous dynamic random-access memory.

hardware

Decentralized Application(dApp)

An application that runs on a distributed computing system, typically a blockchain, rather than on a centralized server.

web

Decentralized Exchange(DEX)

A peer-to-peer marketplace where users can trade cryptocurrencies directly without a central intermediary.

web

Decentralized Identity(DID)

A type of identity that allows individuals to own and control their digital identity without relying on a central authority.

web

Decentralized Social Media(DeSo)

Social networking platforms that operate on decentralized protocols, giving users control over their data, identity, and content.

web

Decentralized Storage

A system where data is stored across a network of multiple nodes rather than on a single centralized server.

web

Decentralized Web(DWeb)

A movement and set of technologies aimed at creating a more distributed internet that is not controlled by a few large entities.

web

Decorator Pattern

A structural design pattern that lets you attach new behaviors to objects by placing these objects inside special wrapper objects that contain the behaviors.

dev

Dedicated Infrastructure

Cloud resources that run on physical hardware dedicated to a single customer, providing higher isolation and meeting specific compliance requirements.

cloud

Deep Learning

A subset of machine learning based on artificial neural networks with multiple layers that can learn complex patterns from large amounts of data.

ai

Deep Packet Inspection(DPI)

A form of network packet filtering that examines the data part (and possibly also the header) of a packet as it passes an inspection point.

network

Default Gateway

The node in a computer network that serves as an access point to another network, typically a router.

network

Defense in Depth(DiD)

A security strategy that uses multiple layers of defense to protect an organization's assets, ensuring that if one control fails, others are in place to stop the attack.

security

Delegated Proof of Stake(DPoS)

A consensus mechanism where network users vote for 'delegates' who are responsible for validating transactions and maintaining the blockchain.

web

Denial of Service(DoS)

An attack meant to shut down a machine or network, making it inaccessible to its intended users.

security

Dennard Scaling

The principle that as transistors get smaller, their power density stays constant, allowing for higher clock speeds without increasing heat.

hardware

Deno

A secure runtime for JavaScript and TypeScript that was created by Ryan Dahl, the original creator of Node.js.

web

Denormalization

A database optimization technique in which we add redundant data to one or more tables to avoid costly joins.

ai

Dependency Management

The process of identifying, resolving, and managing the external libraries and modules that a software project relies on.

dev

Deployment

A Kubernetes object that provides declarative updates for Pods and ReplicaSets.

cloud

Deployment Frequency

How often an organization successfully releases code to production.

dev

Deployment Pipeline

An automated manifestation of the process for getting software from version control into the hands of users.

dev

Descriptive Statistics

Brief descriptive coefficients that summarize a given data set, which can be either a representation of the entire population or a sample of a population.

ai

Design Patterns

Typical solutions to common problems in software design, acting as blueprints that can be customized to solve a particular design problem in your code.

dev

Device Orientation API

A browser API that provides information about the physical orientation and motion of the device.

web

DevOps Topology

The organizational structure and patterns of interaction between development and operations teams.

dev

DevSecOps

An approach to software development that integrates security practices into the DevOps pipeline.

dev

DHCP(DHCP)

A network management protocol used to dynamically assign IP addresses and other network configuration parameters to devices.

network

Dictionary Attack

A type of brute force attack that uses a pre-defined list of common words, phrases, and previously leaked passwords.

security

Differential Privacy(DP)

A mathematical framework for sharing information about a dataset by describing the patterns of groups within the dataset while withholding information about individuals.

ai

Differentiated Services(DiffServ)

A scalable QoS architecture that marks packets with priority levels to determine how they should be treated by routers.

network

Diffusion Model

A class of generative models that create data by gradually reversing a process of adding noise to data.

ai

Digital Forensics

The branch of forensic science encompassing the recovery and investigation of material found in digital devices.

security

Digital Signature

A mathematical scheme for demonstrating the authenticity of digital messages or documents.

security

Dimensionality Reduction

The process of reducing the number of random variables under consideration by obtaining a set of principal variables.

ai

Dimension Table

A table in a star schema that contains attributes that describe business entities.

ai

Direct Connect

A dedicated network connection from an on-premises data center to a cloud provider, bypassing the public internet.

cloud

Direct Memory Access(DMA)

A feature of computer systems that allows certain hardware subsystems to access main system memory independently of the CPU.

hardware

Disaster Recovery(DR)

A set of policies and procedures to enable the recovery of technology systems following a disaster.

cloud

Disaster Recovery Planning(DRP)

A documented, structured approach that describes how an organization can quickly resume work after an unplanned incident.

security

DisplayPort(DP)

A digital display interface developed by a consortium of PC and chip manufacturers and standardized by VESA.

hardware

Distance Vector Routing

A class of routing protocols that determine the best path based on the distance (metric) and direction (vector) to a destination.

network

Distributed Denial of Service(DDoS)

A DoS attack where the incoming traffic flooding the victim originates from many different sources.

security

Distributed Ledger Technology(DLT)

A digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time.

web

Distributed Tracing

A method used to monitor and profile applications, especially those built using microservices, by tracking the path of a single request as it moves through various services.

dev

DNAT(DNAT)

A process that changes the destination IP address of a packet as it passes through a router or firewall.

network

Docker

A platform that uses OS-level virtualization to deliver software in packages called containers.

cloud

Document Object Model(DOM)

A programming interface for web documents that represents the page so that programs can change the document structure, style, and content.

web