C
Circuit Breaker Pattern
A design pattern used to detect failures and encapsulate the logic of preventing a failure from constantly recurring.
devCISC
Complex Instruction Set Computer; a CPU design where single instructions can perform multi-step operations.
hardwareCIS Controls
A prioritized set of actions that collectively form a defense-in-depth set of best practices that mitigate the most common cyberattacks.
securityClickjacking
A malicious technique of tricking a user into clicking on something different from what the user perceives.
securityClient-Side Rendering(CSR)
A rendering method where the browser downloads a minimal HTML file and uses JavaScript to render the content and handle navigation.
webCLIP(CLIP)
Contrastive Language-Image Pre-training; a model developed by OpenAI that learns visual concepts from natural language supervision.
aiClock Gating
A power-saving technique that disables the clock signal to portions of a circuit that are not currently in use.
hardwareClock Speed
The rate at which a processor executes instructions, measured in cycles per second (Hertz).
hardwareCloud Access Security Broker(CASB)
A software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.
securityCloudFormation
An AWS service that allows users to model and set up Amazon Web Services resources using JSON or YAML templates.
cloudCloud Foundry
An open-source multi-cloud platform as a service (PaaS) governed by the Cloud Foundry Foundation.
cloudCloud Governance
The set of rules, policies, and controls that an organization implements to manage its cloud resources effectively and securely.
cloudCloud Identity and Access Management(IAM)
A framework of policies and technologies for ensuring that the proper people and entities have the appropriate access to cloud resources.
cloudCloud Interconnect
A high-speed, private connection between an on-premises network and a cloud provider's network.
cloudCloud Migration
The process of moving data, applications, or other business elements to the cloud.
cloudCloud Native
An approach to building and running applications that exploits the advantages of the cloud computing delivery model.
cloudCloud-Native Buildpacks
A set of tools for transforming source code into production-ready container images without a Dockerfile.
cloudCloud-Native Networking
The set of networking principles and technologies designed to support the dynamic and distributed nature of cloud-native applications.
cloudCloud-Native Security
A security approach designed specifically for the dynamic, distributed, and scalable nature of cloud-native applications.
cloudCloud Security Posture Management (CSPM)(CSPM)
A security tool that automatically identifies and remediates misconfigurations and compliance risks in cloud environments.
securityCloud Workload Protection Platform (CWPP)(CWPP)
A security solution designed to protect workloads (VMs, containers, and serverless functions) across different cloud environments.
securityCluster
A set of connected computers (nodes) that work together as a single system to run containerized applications.
cloudCluster Analysis
The task of grouping a set of objects in such a way that objects in the same group are more similar to each other than to those in other groups.
aiCluster Autoscaler
A tool that automatically adjusts the size of a Kubernetes cluster by adding or removing nodes.
cloudCNI (Container Network Interface)(CNI)
A CNCF project that consists of a specification and libraries for writing plugins to configure network interfaces in Linux containers.
cloudCoAP(CoAP)
A specialized web transfer protocol for use with constrained nodes and constrained networks in the Internet of Things.
networkCoaxial Cable
A type of electrical cable with an inner conductor surrounded by a tubular insulating layer, surrounded by a tubular conducting shield.
networkCode Coverage
A metric used to measure the percentage of source code that is executed when a particular test suite runs.
devCode Review
A systematic examination of computer source code intended to find bugs, improve code quality, and share knowledge among developers.
devCode Smell
Any symptom in the source code of a program that possibly indicates a deeper problem.
devCode Splitting
A feature of modern bundlers that allows you to split your code into various bundles which can then be loaded on demand or in parallel.
webCognitive Radio(CR)
An intelligent radio that can be programmed and configured dynamically to use the best wireless channels in its vicinity to avoid interference and congestion.
networkCold Start
The delay that occurs when a serverless function is invoked for the first time or after a period of inactivity.
cloudCold Storage
A storage tier designed for data that is rarely accessed.
cloudCold Wallet
A cryptocurrency wallet that is kept offline, providing a high level of security against online threats.
webColor Theory in Data Viz
The strategic use of color to enhance the clarity, readability, and emotional impact of data visualizations.
aiCommand and Control(C2)
The infrastructure used by attackers to maintain communication with compromised systems within a target network.
securityCommon Vulnerabilities and Exposures (CVE)(CVE)
A list of publicly disclosed cybersecurity vulnerabilities, each assigned a unique identification number.
securityCommon Vulnerability Scoring System (CVSS)(CVSS)
A standardized framework for rating the severity of security vulnerabilities on a scale from 0 to 10.
securityCommon Weakness Enumeration (CWE)(CWE)
A community-developed list of common software and hardware security weaknesses.
securityCompare-and-Swap(CAS)
An atomic instruction that compares the contents of a memory location to a given value and, only if they are the same, modifies the contents of that memory location to a new given value.
hardwareCompliance
The state of meeting the requirements of accepted laws, regulations, standards, or policies.
securityCompliance as Code
The practice of automating the implementation, monitoring, and reporting of compliance requirements using code.
devCompliance Framework
A set of guidelines and best practices that help organizations meet regulatory and industry-specific security standards in the cloud.
cloudCompression
The process of encoding information using fewer bits than the original representation to reduce file size and transmission time.
webComputer Network
A collection of interconnected computing devices that exchange data and share resources using common communication protocols.
networkComputer Vision
A field of AI that enables computers to interpret and understand visual information from the world.
aiConceptual Data Model
A high-level view of the data required to support business processes.
aiConfidence Interval(CI)
A range of values derived from sample statistics that is likely to contain the value of an unknown population parameter.
aiConfigMap
A Kubernetes API object used to store non-confidential data in key-value pairs.
cloudConfiguration Management
The process of maintaining software and infrastructure in a desired, consistent state.
cloudConfiguration Management Database(CMDB)
A repository that acts as a data warehouse, storing information about IT assets and the relationships between them.
devConfusion Matrix
A table used to describe the performance of a classification model by showing the counts of true positives, true negatives, false positives, and false negatives.
aiCongestion Control
A mechanism used to prevent a network from becoming overloaded with too much traffic, which would lead to packet loss and delays.
networkConsensus Mechanism
A fault-tolerant mechanism used in computer and blockchain systems to achieve the necessary agreement on a single data value or a single state of the network among distributed processes.
webConsortium Blockchain
A semi-decentralized blockchain where the network is managed by a group of organizations rather than a single entity.
webConsumer-Driven Contracts(CDC)
A pattern where the consumers of an API define the contract, ensuring the provider only builds what is actually needed.
devContainerization
The process of packaging an application together with its libraries, dependencies, and configuration files into a single container image.
devContainer Orchestration
The automation of the deployment, scaling, and management of containerized applications.
cloudContainer Runtime
The software responsible for running containers on a host system.
cloudContainer Security
The practice of protecting containerized applications and their underlying infrastructure throughout the entire lifecycle.
securityContent Delivery Network(CDN)
A geographically distributed group of servers that work together to provide fast delivery of Internet content.
cloudContent Security Policy(CSP)
An HTTP header that allows site operators to control which resources the user agent is allowed to load for a given page.
securityContext Window
The maximum amount of text that an LLM can consider at one time when generating a response.
aiContinuous Feedback
The practice of gathering and analyzing data from all stages of the software delivery lifecycle to inform future development and improvements.
devContinuous Verification
The practice of continuously monitoring and verifying that a system is behaving as expected in production, often using automated experiments.
devContract Testing
A technique for testing an integration point by checking that each application adheres to a shared contract.
devControl Plane
The collection of components that manage the state of a Kubernetes cluster.
cloudConventional Commits
A specification for adding human and machine-readable meaning to commit messages.
devConvolutional Neural Network(CNN)
A type of deep neural network specifically designed for processing structured arrays of data, such as images.
aiCookie Poisoning
An attack where the attacker modifies the contents of a cookie to bypass security controls or steal information.
securityCooling System
The components used to dissipate heat generated by a computer's processor and other parts.
hardwareCoordinated Vulnerability Disclosure (CVD)(CVD)
A collaborative process where multiple parties (researchers, vendors, and coordinators) work together to manage the disclosure and remediation of security vulnerabilities.
securityCore Web Vitals
A set of specific factors that Google considers important in a webpage's overall user experience.
webCorrelation
A statistical measure that expresses the extent to which two variables are linearly related.
aiCosmos(ATOM)
An ecosystem of independent, parallel blockchains that can interoperate with each other.
webCost Management
The process of monitoring, analyzing, and optimizing cloud spending to ensure maximum value and prevent budget overruns.
cloudCQRS(CQRS)
Command Query Responsibility Segregation (CQRS) is a pattern that separates read and update operations for a data store.
devCreational Patterns
Design patterns that deal with object creation mechanisms, trying to create objects in a manner suitable to the situation.
devCreator Economy
An economic system where independent content creators can earn revenue directly from their audience, facilitated by Web3 tools.
webCritical Rendering Path(CRP)
The sequence of steps the browser goes through to convert HTML, CSS, and JavaScript into pixels on the screen.
webCronJob
A Kubernetes object that manages time-based Jobs, similar to the crontab on a Unix system.
cloudCross-Browser Compatibility
The ability of a website, web application, or HTML construct to support various web browsers.
webCross-Entropy
A loss function commonly used in classification tasks to measure the performance of a model whose output is a probability value between 0 and 1.
aiCross-Origin Resource Sharing(CORS)
A mechanism that uses additional HTTP headers to tell browsers to give a web application running at one origin access to selected resources from a different origin.
securityCross-Site Request Forgery(CSRF)
An attack that forces an authenticated user to execute unwanted actions on a web application in which they are currently authenticated.
securityCross-Site Scripting(XSS)
A vulnerability that allows an attacker to inject malicious scripts into web pages viewed by other users.
securityCross-Validation
A resampling technique used to evaluate a model's performance by partitioning the data into multiple subsets and training/testing the model several times.
aiCryptoeconomics
The study of economic incentives and cryptography in decentralized systems to ensure security and stability.
webCryptographic Hash Function
A mathematical algorithm that maps data of arbitrary size to a bit string of a fixed size (a hash).
securityCSS3
The latest evolution of the Cascading Style Sheets language, used for describing the presentation of a document written in HTML.
webCSS Grid
A two-dimensional layout system for the web, allowing developers to create complex layouts with rows and columns more easily than ever before.
webCumulative Layout Shift(CLS)
A Core Web Vital that measures the sum total of all individual layout shift scores for every unexpected layout shift that occurs during the entire lifespan of the page.
webCustom Elements
A set of JavaScript APIs that allow you to define custom elements and their behavior, which can then be used in your user interface.
webCyber Kill Chain
A model developed by Lockheed Martin that describes the stages of a cyberattack, from initial reconnaissance to the final objective.
securityCyber Threat Hunting
A proactive security exercise where analysts search through networks to detect and isolate advanced threats that have evaded existing security solutions.
securityD
D3.js
A JavaScript library for producing dynamic, interactive data visualizations in web browsers.
aiDaemonSet
A Kubernetes object that ensures that all (or some) Nodes run a copy of a specific Pod.
cloudDanksharding
The final design for Ethereum sharding that focuses on data availability and simplifies the architecture.
webDark Launching
The practice of deploying a new feature to production but keeping it hidden from users to test its performance and stability.
devDark Silicon
The portion of an integrated circuit that cannot be powered on at the same time due to thermal constraints.
hardwareDash
A productive Python framework for building analytical web applications.
aiDashboard
A type of graphical user interface which often provides at-a-glance views of key performance indicators (KPIs) relevant to a particular objective or business process.
aiDashboarding
The visual representation of metrics, logs, and traces to provide a real-time overview of system health and performance.
devData Analytics
The process of examining data sets in order to find trends and draw conclusions about the information they contain.
aiData Archiving
The process of moving data that is no longer actively used to a separate storage device for long-term retention.
aiData Augmentation
A technique used to increase the diversity of training data without collecting new examples, by creating modified versions of existing data.
aiData Availability
The assurance that data is accessible to authorized users and applications when and where they need it.
aiDatabase per Service
A microservices pattern where each service has its own private database that cannot be accessed directly by other services.
devData Catalog
A centralized metadata management service that helps users discover, understand, and manage data assets across their organization.
cloudData Cleansing
The process of identifying and correcting corrupt, inaccurate, or irrelevant records from a record set, table, or database.
aiData Consistency
The requirement that any given database transaction must change affected data only in allowed ways.
aiData Democratization
The process of making data accessible to all users within an organization, regardless of their technical expertise.
aiData Dictionary
A centralized repository of information about data such as meaning, relationships to other data, origin, usage, and format.
aiData Disposal
The process of permanently deleting or destroying data so that it can no longer be read or reconstructed.
aiDatadog
A cloud-scale monitoring and security platform that provides full-stack observability for modern applications.
cloudData Durability
The ability of a system to keep data stored and intact over long periods, even in the event of system failures or power outages.
aiData Engineering
The practice of designing and building systems for collecting, storing, and analyzing data at scale.
aiData Fabric
An integrated architecture that provides a unified view of data across disparate sources using metadata and automation.
aiData Federation
A form of data virtualization where multiple databases are combined into a single virtual database.
aiData Governance
The overall management of the availability, usability, integrity and security of data used in an enterprise.
aiData Integration
The process of combining data from different sources into a single, unified view.
aiData Lake
A centralized repository that allows you to store all your structured and unstructured data at any scale.
aiData Lakehouse
A new, open data management architecture that combines the flexibility, cost-efficiency, and scale of data lakes with the data management and transactions of data warehouses.
aiData Leakage
A common error in machine learning where information from outside the training dataset is used to create the model, leading to overly optimistic performance results.
aiData Level Parallelism(DLP)
A form of parallelism where the same operation is performed on multiple data points simultaneously.
hardwareData Lineage
A data life cycle that includes the data's origins and where it moves over time.
aiData Link Layer
The second layer of the OSI model, responsible for node-to-node data transfer and error detection on the physical link.
networkData Literacy
The ability to read, understand, create, and communicate data as information.
aiData Loss Prevention(DLP)
A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.
securityData Mesh
A decentralized data architecture that organizes data by business domain, treating data as a product.
aiData Mining
The process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.
aiData Modeling
The process of creating a visual representation of either a whole information system or parts of it to communicate connections between data points and structures.
aiData Pipeline
A series of automated processes that collect, transform, and move data from various sources to a destination for analysis or model training.
aiData Privacy
The branch of data protection that deals with the proper handling of data focusing on compliance with data protection regulations.
securityData Profiling
The process of examining, analyzing, and creating useful summaries of data to understand its structure, content, and quality.
aiData Quality
A measure of the condition of data based on factors such as accuracy, completeness, consistency, reliability and whether it's up to date.
aiData Residency
The physical or geographic location of where an organization's data or information is stored.
securityData Retention
The practice of keeping data for a specific period to meet business, legal, or regulatory requirements.
aiData Sampling
The selection of a subset of individuals from within a statistical population to estimate characteristics of the whole population.
aiData Science
The field of study that combines domain expertise, programming skills, and knowledge of mathematics and statistics to extract meaningful insights from data.
aiData Scrubbing
A specific type of data cleansing that focuses on removing or modifying data that is incorrect, incomplete, improperly formatted, or duplicated.
aiData Sovereignty
The idea that data is subject to the laws and governance structures within the nation it is collected.
securityData Synchronization
The process of ensuring that data in two or more locations is consistent and up-to-date.
aiData Virtualization
An approach to data management that allows applications to retrieve and manipulate data without requiring technical details about the data, such as how it is formatted or where it is physically located.
aiData Visualization
The graphical representation of information and data.
aiData Visualization Principles
A set of guidelines and best practices for creating effective and accurate graphical representations of data.
aiData Warehouse
A system used for reporting and data analysis, storing structured data from multiple sources.
aiData Warehouse Service
A managed, large-scale data storage and analysis service optimized for complex queries and business intelligence.
cloudData Wrangling
The process of transforming and mapping data from one 'raw' data form into another format with the intent of making it more appropriate and valuable for a variety of downstream purposes such as analytics.
aiDBSCAN(DBSCAN)
Density-Based Spatial Clustering of Applications with Noise; a clustering algorithm that groups together points that are closely packed together.
aiDDR4
The fourth generation of Double Data Rate (DDR) synchronous dynamic random-access memory.
hardwareDDR5
The fifth and latest generation of Double Data Rate (DDR) synchronous dynamic random-access memory.
hardwareDecentralized Application(dApp)
An application that runs on a distributed computing system, typically a blockchain, rather than on a centralized server.
webDecentralized Exchange(DEX)
A peer-to-peer marketplace where users can trade cryptocurrencies directly without a central intermediary.
webDecentralized Identity(DID)
A type of identity that allows individuals to own and control their digital identity without relying on a central authority.
webDecentralized Social Media(DeSo)
Social networking platforms that operate on decentralized protocols, giving users control over their data, identity, and content.
webDecentralized Storage
A system where data is stored across a network of multiple nodes rather than on a single centralized server.
webDecentralized Web(DWeb)
A movement and set of technologies aimed at creating a more distributed internet that is not controlled by a few large entities.
webDecorator Pattern
A structural design pattern that lets you attach new behaviors to objects by placing these objects inside special wrapper objects that contain the behaviors.
devDedicated Infrastructure
Cloud resources that run on physical hardware dedicated to a single customer, providing higher isolation and meeting specific compliance requirements.
cloudDeep Learning
A subset of machine learning based on artificial neural networks with multiple layers that can learn complex patterns from large amounts of data.
aiDeep Packet Inspection(DPI)
A form of network packet filtering that examines the data part (and possibly also the header) of a packet as it passes an inspection point.
networkDefault Gateway
The node in a computer network that serves as an access point to another network, typically a router.
networkDefense in Depth(DiD)
A security strategy that uses multiple layers of defense to protect an organization's assets, ensuring that if one control fails, others are in place to stop the attack.
securityDelegated Proof of Stake(DPoS)
A consensus mechanism where network users vote for 'delegates' who are responsible for validating transactions and maintaining the blockchain.
webDenial of Service(DoS)
An attack meant to shut down a machine or network, making it inaccessible to its intended users.
securityDennard Scaling
The principle that as transistors get smaller, their power density stays constant, allowing for higher clock speeds without increasing heat.
hardwareDeno
A secure runtime for JavaScript and TypeScript that was created by Ryan Dahl, the original creator of Node.js.
webDenormalization
A database optimization technique in which we add redundant data to one or more tables to avoid costly joins.
aiDependency Management
The process of identifying, resolving, and managing the external libraries and modules that a software project relies on.
devDeployment
A Kubernetes object that provides declarative updates for Pods and ReplicaSets.
cloudDeployment Frequency
How often an organization successfully releases code to production.
devDeployment Pipeline
An automated manifestation of the process for getting software from version control into the hands of users.
devDescriptive Statistics
Brief descriptive coefficients that summarize a given data set, which can be either a representation of the entire population or a sample of a population.
aiDesign Patterns
Typical solutions to common problems in software design, acting as blueprints that can be customized to solve a particular design problem in your code.
devDevice Orientation API
A browser API that provides information about the physical orientation and motion of the device.
webDevOps Topology
The organizational structure and patterns of interaction between development and operations teams.
devDevSecOps
An approach to software development that integrates security practices into the DevOps pipeline.
devDHCP(DHCP)
A network management protocol used to dynamically assign IP addresses and other network configuration parameters to devices.
networkDictionary Attack
A type of brute force attack that uses a pre-defined list of common words, phrases, and previously leaked passwords.
securityDifferential Privacy(DP)
A mathematical framework for sharing information about a dataset by describing the patterns of groups within the dataset while withholding information about individuals.
aiDifferentiated Services(DiffServ)
A scalable QoS architecture that marks packets with priority levels to determine how they should be treated by routers.
networkDiffusion Model
A class of generative models that create data by gradually reversing a process of adding noise to data.
aiDigital Forensics
The branch of forensic science encompassing the recovery and investigation of material found in digital devices.
securityDigital Signature
A mathematical scheme for demonstrating the authenticity of digital messages or documents.
securityDimensionality Reduction
The process of reducing the number of random variables under consideration by obtaining a set of principal variables.
aiDimension Table
A table in a star schema that contains attributes that describe business entities.
aiDirect Connect
A dedicated network connection from an on-premises data center to a cloud provider, bypassing the public internet.
cloudDirect Memory Access(DMA)
A feature of computer systems that allows certain hardware subsystems to access main system memory independently of the CPU.
hardwareDisaster Recovery(DR)
A set of policies and procedures to enable the recovery of technology systems following a disaster.
cloudDisaster Recovery Planning(DRP)
A documented, structured approach that describes how an organization can quickly resume work after an unplanned incident.
securityDisplayPort(DP)
A digital display interface developed by a consortium of PC and chip manufacturers and standardized by VESA.
hardwareDistance Vector Routing
A class of routing protocols that determine the best path based on the distance (metric) and direction (vector) to a destination.
networkDistributed Denial of Service(DDoS)
A DoS attack where the incoming traffic flooding the victim originates from many different sources.
securityDistributed Ledger Technology(DLT)
A digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time.
webDistributed Tracing
A method used to monitor and profile applications, especially those built using microservices, by tracking the path of a single request as it moves through various services.
devDNAT(DNAT)
A process that changes the destination IP address of a packet as it passes through a router or firewall.
networkDocker
A platform that uses OS-level virtualization to deliver software in packages called containers.
cloudDocument Object Model(DOM)
A programming interface for web documents that represents the page so that programs can change the document structure, style, and content.
web