I

Identity and Access Management(IAM)

A framework for ensuring that the right people have the appropriate access to technology resources.

security

Identity Security

A comprehensive approach to securing digital identities and managing access to resources across an organization.

security

Image Optimization

The practice of reducing the file size of images as much as possible without sacrificing quality to improve page load speed.

web

Image Registry

A centralized service for storing and distributing container images.

cloud

Image Segmentation

The process of partitioning a digital image into multiple segments or sets of pixels to simplify its representation and make it more meaningful for analysis.

ai

Immutability

The inability of a blockchain's history to be changed or deleted once it has been recorded.

web

Impermanent Loss(IL)

The temporary loss of funds experienced by liquidity providers in an AMM when asset prices change.

web

Incident Management

The process of responding to an unplanned event or service interruption and restoring the service to its operational state.

dev

Incident Response(IR)

An organized approach to addressing and managing the aftermath of a security breach or cyberattack.

security

Inclusive Cache

A cache hierarchy design where all data in a higher-level cache (e.g., L1) is also guaranteed to be present in the lower-level cache (e.g., L2).

hardware

Incremental Static Regeneration(ISR)

A hybrid approach that allows you to update static content after you've built your site, without needing to rebuild the entire site.

web

Indicators of Attack(IoA)

Evidence of an attacker's intent and the techniques they are using in real-time, focusing on the 'how' rather than the 'what'.

security

Indicators of Compromise(IoC)

Evidence or artifacts found on a network or operating system that indicate a high probability of a security breach.

security

Inference

The stage where a trained AI model is used to make predictions or generate outputs based on new, unseen input data.

ai

Inferential Statistics

The process of using data analysis to deduce properties of an underlying probability distribution.

ai

Information Security(InfoSec)

The practice of protecting information by mitigating information risks, ensuring confidentiality, integrity, and availability.

security

Infrastructure as a Service(IaaS)

A cloud model that provides on-demand access to fundamental computing resources like servers and storage.

cloud

Infrastructure as Code(IaC)

The management and provisioning of infrastructure through machine-readable definition files, rather than manual configuration or interactive tools.

cloud

Infrastructure as Code (IaC) Scanning

The process of analyzing infrastructure definition files (e.g., Terraform, CloudFormation) for security misconfigurations before they are deployed.

security

Infrastructure as Code (Networking)(IaC)

Managing and provisioning network infrastructure through machine-readable definition files rather than manual configuration.

network

Infrastructure Monitoring

The process of collecting and analyzing metrics and logs from cloud resources to ensure their health, performance, and availability.

cloud

Ingress

An API object that manages external access to services in a Kubernetes cluster, typically HTTP.

cloud

Initial Coin Offering(ICO)

A fundraising method where a new project sells its native tokens to early investors.

web

Initial DEX Offering(IDO)

A token launch conducted on a decentralized exchange (DEX).

web

Initial Exchange Offering(IEO)

A token sale managed by a centralized exchange (CEX) on behalf of a project.

web

In-Memory Cache

A high-speed data storage layer that stores a subset of data in RAM to serve future requests faster than accessing the primary database.

cloud

Input/Output(I/O)

The communication between an information processing system (such as a computer) and the outside world.

hardware

Instruction Level Parallelism(ILP)

A measure of how many instructions in a computer program can be executed simultaneously.

hardware

Instruction Set Architecture(ISA)

The abstract model of a computer that defines the set of basic operations a processor can perform.

hardware

Integrated Circuit(IC)

A set of electronic circuits on one small flat piece of semiconductor material, commonly called a 'chip'.

hardware

Integrated Services(IntServ)

A QoS architecture that reserves end-to-end network resources for specific traffic flows before data is sent.

network

Integration Testing

A level of software testing where individual units are combined and tested as a group.

dev

Interaction to Next Paint(INP)

A Core Web Vital that measures a page's overall responsiveness to user interactions throughout its entire lifecycle.

web

Interactive Application Security Testing (IAST)(IAST)

A security testing methodology that combines elements of SAST and DAST by using agents to monitor an application's internal execution during testing.

security

Interactive Visualization

A type of data visualization that allows users to manipulate and explore the data directly through the interface.

ai

Interconnect

The physical wiring that connects transistors and other components within an integrated circuit or between chiplets.

hardware

Internal Developer Portal(IDP)

A self-service interface that allows developers to discover and use the tools, services, and infrastructure provided by a platform engineering team.

dev

Internet Gateway(IGW)

A horizontally scaled, redundant, and highly available VPC component that allows communication between your VPC and the internet.

cloud

Internet of Things Networking(IoT Networking)

The specialized networking technologies and protocols used to connect billions of physical devices to the internet and to each other.

network

Interrupt

A signal to the processor emitted by hardware or software indicating an event that needs immediate attention.

hardware

Interrupt Request(IRQ)

A signal sent to the CPU to temporarily stop a running program and allow a special piece of code (an ISR) to run instead.

hardware

Interrupt Service Routine(ISR)

A software routine that hardware invokes in response to an interrupt.

hardware

Intranet

A private network accessible only to an organization's staff, used for internal communication and collaboration.

network

Intrusion Detection System(IDS)

A device or software that monitors a network or systems for malicious activity.

security

Intrusion Prevention System(IPS)

A network security tool that monitors traffic for malicious activity and takes action to prevent it.

security

I/O Port

A specialized address used by the CPU to communicate with a specific hardware device.

hardware

I/O Wall

The performance bottleneck caused by the slow speed of input/output operations compared to the processor and memory.

hardware

IP Address(IP)

A numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

network

IPFIX(IPFIX)

An IETF standard protocol for exporting IP flow information from network devices.

network

IPFS(IPFS)

InterPlanetary File System; a peer-to-peer network for storing and sharing data in a distributed file system.

web

IPFS (Web)(IPFS)

The use of the InterPlanetary File System protocol within web browsers to store and access content in a decentralized, content-addressed manner.

web

IPv4

The fourth version of the Internet Protocol, using 32-bit addresses, which limits the total number of addresses to approximately 4.3 billion.

network

IPv6

The most recent version of the Internet Protocol, using 128-bit addresses to provide a vastly larger address space than IPv4.

network

IS-IS(IS-IS)

A link-state routing protocol used primarily by service providers to route traffic within large backbone networks.

network

ISO/IEC 27001

An international standard on how to manage information security, providing a framework for an Information Security Management System (ISMS).

security

Istio

An open-source service mesh that provides a uniform way to secure, connect, and monitor microservices.

cloud

ITIL

Information Technology Infrastructure Library (ITIL) is a set of detailed practices for IT service management (ITSM).

dev

ITX(ITX)

A family of small form factor motherboard specifications, most notably Mini-ITX.

hardware

K

Kali Linux

A Debian-derived Linux distribution designed for digital forensics and penetration testing, pre-installed with hundreds of security tools.

security

Kanban

A visual system for managing work as it moves through a process, focusing on continuous delivery and limiting work-in-progress (WIP).

dev

KEDA (Kubernetes Event-driven Autoscaling)(KEDA)

A Kubernetes-based Event Driven Autoscaler that allows you to scale any container in Kubernetes based on the number of events needing to be processed.

cloud

Keylogger

A type of surveillance software or hardware that has the capability to record every keystroke made on a computer.

security

Key Management Service (KMS)(KMS)

A managed service that makes it easy to create and control the cryptographic keys used to encrypt your data.

security

KISS (Keep It Simple, Stupid)(KISS)

A design principle stating that most systems work best if they are kept simple rather than made complicated.

dev

K-Means Clustering

An unsupervised learning algorithm that groups data points into K distinct, non-overlapping clusters based on their features.

ai

Knative

A Kubernetes-based platform to deploy and manage modern serverless workloads.

cloud

K-Nearest Neighbors(KNN)

A simple, instance-based learning algorithm that classifies a data point based on how its neighbors are classified.

ai

Knowledge Distillation

A technique where a small 'student' model is trained to mimic the behavior and performance of a large, complex 'teacher' model.

ai

Knowledge Graph

A structured representation of knowledge that uses a graph-based data model to integrate and link data from various sources.

ai

Koa

A new web framework designed by the team behind Express, which aims to be a smaller, more expressive, and more robust foundation for web applications and APIs.

web

Kubelet

An agent that runs on each node in a Kubernetes cluster, ensuring that containers are running in a Pod.

cloud

Kubernetes(K8s)

An open-source platform for automating the deployment, scaling, and management of containerized applications.

cloud

Kubernetes Security

The set of practices and tools used to secure a Kubernetes cluster and the applications running within it.

security

KVM(KVM)

Kernel-based Virtual Machine; an open-source virtualization technology built into the Linux kernel.

cloud

L

L1 Cache

The primary cache, which is the fastest and smallest level of cache memory in a computer's hierarchy.

hardware

L2 Cache

The secondary cache, which is larger but slightly slower than the L1 cache.

hardware

L3 Cache

The third level of cache memory, which is shared among all cores of a multi-core processor.

hardware

Label Encoding

Converting categorical labels into numerical values.

ai

LACP(LACP)

An open-standard protocol used to automate the creation and maintenance of EtherChannels.

network

LangChain

A popular framework designed to simplify the creation of applications using large language models (LLMs).

ai

Large Language Model(LLM)

A type of artificial intelligence trained on massive datasets to understand, generate, and process human language.

ai

Largest Contentful Paint(LCP)

A Core Web Vital that measures the time it takes for the largest image or text block to become visible within the viewport.

web

Latency

The time delay between the moment a data packet is sent and the moment it is received at its destination.

network

Latent Space

A compressed, abstract representation of data where the most important features are captured in a lower-dimensional format.

ai

Layer 1(L1)

The base level of a blockchain architecture, referring to the main underlying network itself.

web

Layer 2(L2)

A secondary framework or protocol built on top of an existing blockchain (Layer 1) to improve its scalability and speed.

web

Lazy Loading

A design pattern that defers the initialization of an object or the loading of a resource until the point at which it is needed.

web

Lead Time for Changes

The amount of time it takes for a code commit to reach production.

dev

Lean Software Development

An adaptation of lean manufacturing principles to software development, focusing on eliminating waste and optimizing the entire value stream.

dev

Learning Rate(LR)

A hyperparameter that determines the size of the steps the optimization algorithm takes when moving toward a minimum of the loss function.

ai

Lens Protocol

A decentralized, open-source social graph that allows developers to build social media platforms where users own their profiles and connections.

web

Less

A dynamic preprocessor style sheet language that can be compiled into CSS and run on the client-side or server-side.

web

Li-Fi(Li-Fi)

A wireless communication technology that uses light to transmit data and position between devices.

network

LightGBM

A gradient boosting framework developed by Microsoft that uses tree-based learning algorithms and is designed for distributed and efficient training.

ai

Lighthouse

An open-source, automated tool for improving the quality of web pages.

web

Lighthouse Score

A weighted average of various performance metrics provided by the Google Lighthouse auditing tool.

web

Light Node

A node that only downloads a portion of the blockchain, typically just the block headers, to verify transactions without storing the entire ledger.

web

LIME(LIME)

Local Interpretable Model-agnostic Explanations; a technique that explains the predictions of any machine learning classifier by approximating it locally with an interpretable model.

ai

Linear Regression

A linear approach for modeling the relationship between a scalar response and one or more explanatory variables.

ai

Line Chart

A chart that displays information as a series of data points connected by straight line segments.

ai

Linkerd

An ultralight, security-first service mesh for Kubernetes.

cloud

Link State Routing

A class of routing protocols where every router maintains a complete map of the entire network topology.

network

Linting

The process of running a program that will analyze code for potential errors and stylistic issues.

dev

Liquid Cooling

A cooling method that uses a liquid (usually water-based) to carry heat away from components.

hardware

Liquidity Mining

A subset of yield farming where users earn rewards for providing liquidity to a protocol.

web

Liquidity Pool

A collection of funds locked in a smart contract, used to facilitate decentralized trading and lending.

web

Little's Law

A theorem that relates the average number of items in a stable system to their arrival rate and average time spent in the system.

hardware

Llama 2

A family of open-weights large language models released by Meta, widely used as a foundation for many open-source AI projects.

ai

LlamaIndex

A data framework for LLM applications that provides tools to ingest, structure, and access private or domain-specific data.

ai

Load Balancer

A device or service that distributes incoming network traffic across multiple servers.

network

Load Balancing Strategies

The various algorithms and methods used to distribute incoming network traffic across a group of backend servers.

dev

Load-Link/Store-Conditional(LL/SC)

A pair of instructions used in multithreading to achieve synchronization.

hardware

Load/Store Unit(LSU)

A specialized execution unit responsible for executing instructions that read from or write to memory.

hardware

Load Testing

A type of performance testing that simulates the expected real-world load on a system to see how it behaves.

dev

Local Area Network(LAN)

A network that connects computers and devices within a limited geographical area, such as a home, school, or office building.

network

Log Aggregation

The process of collecting logs from multiple sources and consolidating them into a single, searchable location.

dev

Logical Data Model

A model that describes the data in as much detail as possible, without regard to how they will be physically implemented in the database.

ai

Logistic Regression

A statistical model used to predict the probability of a binary event occurring.

ai

Longhorn

An open-source distributed block storage system for Kubernetes.

cloud

Long-range Attack

A type of attack in Proof of Stake systems where an attacker creates a separate chain starting from an old block to overtake the main chain.

web

Long Short-Term Memory(LSTM)

A specialized type of RNN architecture designed to learn long-term dependencies by using a complex gating mechanism to control the flow of information.

ai

Looker

An enterprise platform for business intelligence, data applications, and embedded analytics.

ai

LoRaWAN(LoRaWAN)

A low-power, wide-area networking (LPWAN) protocol designed to wirelessly connect battery-operated 'things' to the internet.

network

Loss Function

A mathematical formula that measures the difference between the model's prediction and the actual target value.

ai

Low-Rank Adaptation(LoRA)

A technique for fine-tuning large models by adding a small number of trainable parameters, significantly reducing memory and storage requirements.

ai

M

MAC Address(MAC)

A unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment.

network

Machine Translation(MT)

The automated process of translating text or speech from one natural language to another using computer software.

ai

Macro-operation

A high-level instruction from the processor's Instruction Set Architecture (ISA), such as an x86 instruction.

hardware

Mainnet

The primary, live version of a blockchain where actual transactions take place and the native tokens have real economic value.

web

Malware

Any software intentionally designed to cause disruption, leak information, or gain unauthorized access.

security

Managed Detection and Response(MDR)

An outsourced cybersecurity service that provides organizations with threat hunting services and responds to threats once they are discovered.

security

Managed DNS

A cloud-based Domain Name System service that provides high availability and scalability for domain registration and routing.

cloud

Managed Hadoop/Spark

A cloud service that simplifies running big data frameworks like Apache Hadoop and Apache Spark on a managed cluster of instances.

cloud

Managed Identity

A feature that provides cloud services with an automatically managed identity in the cloud's IAM system, eliminating the need for developers to manage credentials.

cloud

Managed Machine Learning Platform

A comprehensive cloud service that provides tools for every stage of the machine learning lifecycle, from data preparation to model deployment.

cloud

Managed Relational Database

A cloud service that automates the setup, operation, and scaling of relational databases like MySQL, PostgreSQL, and SQL Server.

cloud

Managed Security Service Provider (MSSP)(MSSP)

A third-party company that provides outsourced monitoring and management of security devices and systems for other organizations.

security

Man-in-the-Middle Attack(MitM)

An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.

security

MapReduce

A programming model and an associated implementation for processing and generating big data sets with a parallel, distributed algorithm on a cluster.

ai

Markov Chain

A mathematical system that undergoes transitions from one state to another according to certain probabilistic rules, where the next state depends only on the current state.

ai

Markov Chain Monte Carlo(MCMC)

A class of algorithms for sampling from a probability distribution.

ai

Massive MIMO

A wireless network technology that uses a very large number of antennas at the base station to improve spectral efficiency and capacity.

network

Master Data Management(MDM)

A technology-enabled discipline in which business and IT work together to ensure the uniformity, accuracy, stewardship, semantic consistency and accountability of the enterprise’s official shared master data assets.

ai

Material UI(MUI)

A popular React component library that implements Google's Material Design system.

web

Matplotlib

The foundational plotting library for the Python programming language.

ai

Maximum Likelihood Estimation(MLE)

A method of estimating the parameters of a probability distribution by maximizing a likelihood function.

ai

MD5(MD5)

A widely used cryptographic hash function that produces a 128-bit hash value, now considered cryptographically broken.

security

Mean

The mathematical average of a set of numbers, calculated by dividing the sum of all values by the total number of values.

ai

Mean Absolute Error(MAE)

A regression metric that calculates the average of the absolute differences between predicted and actual values.

ai

Mean Squared Error(MSE)

A loss function used in regression tasks that calculates the average of the squares of the errors between predicted and actual values.

ai

Mean Time Between Failures(MTBF)

The average time a system or component operates between consecutive failures.

dev

Mean Time to Detect(MTTD)

The average time it takes for a team to become aware of an incident after it has occurred.

dev

Mean Time to Repair(MTTR)

The average time it takes to restore a service to its normal operational state after a failure.

dev

Median

The middle value in a list of numbers ordered from lowest to highest.

ai

Media Source Extensions(MSE)

A browser API that allows JavaScript to dynamically generate media streams for playback, enabling features like adaptive bitrate streaming.

web

Memory Barrier

A type of instruction that forces the CPU or compiler to enforce an ordering constraint on memory operations.

hardware

Memory Consistency Model

A set of rules that defines the order in which memory operations (reads and writes) appear to occur to different processors in a multi-core system.

hardware

Memory Management Unit(MMU)

A computer hardware component that handles all memory and caching operations associated with the processor.

hardware

Memory-Mapped I/O(MMIO)

A method of performing I/O where the same address space is used to address both main memory and I/O devices.

hardware

Memory Wall

The growing gap between the speed of the CPU and the speed of the main memory (RAM).

hardware

Mercurial

A free, distributed source control management tool.

dev

Merge (Ethereum)

The historic event in September 2022 when the Ethereum mainnet transitioned from Proof of Work to Proof of Stake.

web

Merge Request(MR)

The GitLab equivalent of a Pull Request (PR).

dev

Merkle Tree

A mathematical structure used in computer science and blockchain to efficiently summarize and verify the integrity of large sets of data.

web

Mesh Networking

A network topology in which each node relays data for the network, and all mesh nodes cooperate in the distribution of data in the network.

network

Mesh Topology

A network topology where nodes are interconnected, with many nodes having multiple physical or logical paths to other nodes.

network

Message Queue

A form of asynchronous service-to-service communication used in serverless and microservices architectures.

dev

Metadata Management

The administration of data that describes other data.

ai

Metasploit

A widely used penetration testing framework that provides information about security vulnerabilities and aids in exploitation and IDS signature development.

security

Metaverse

A collective virtual shared space, created by the convergence of virtually enhanced physical reality and physically persistent virtual space.

web

Metrics Collection

The process of gathering numerical data about the performance and health of a system over time.

dev

Metropolitan Area Network(MAN)

A network that interconnects users with computer resources in a geographic area larger than a LAN but smaller than a WAN, typically covering a city.

network

MEV(MEV)

The maximum value that can be extracted from block production by reordering transactions.

web

MIB(MIB)

A database used for managing all the entities in a network, typically associated with SNMP.

network

Micro-operation(uOp)

A simple, low-level instruction used internally by a processor to implement complex machine instructions.

hardware

Microservices

An architectural style that structures an application as a collection of small, autonomous services modeled around a business domain.

dev

Microsoft SQL Server

A relational database management system developed by Microsoft.

ai

Milvus

An open-source vector database built for scalable similarity search and AI-powered applications.

ai

MIMD(MIMD)

Multiple Instruction, Multiple Data; a type of parallel computing where multiple processors execute different instructions on different data.

hardware

Minification

The process of removing all unnecessary characters from source code without changing its functionality.

web

Mining

The process by which new blocks are added to a proof-of-work blockchain and new units of cryptocurrency are issued.

web

MIPS Architecture(MIPS)

A reduced instruction set computer (RISC) instruction set architecture developed by MIPS Computer Systems.

hardware

Missing Value Imputation

The process of replacing missing data with substituted values.

ai

Mistral

A high-performance language model known for its efficiency and the use of Grouped-Query Attention (GQA) and Sliding Window Attention.

ai

MITRE ATT&CK Framework(ATT&CK)

A globally accessible knowledge base of adversary tactics and techniques based on real-world observations.

security

Mixture of Experts(MoE)

A machine learning technique where different parts of a model are trained to handle different types of inputs.

ai

MLOps(MLOps)

Machine Learning Operations; a set of practices that aims to deploy and maintain machine learning models in production reliably and efficiently.

ai

Mobile-First Design

A design strategy where the mobile version of a website is developed first, and then features are added for larger screens.

web

Mob Programming

A software development approach where the whole team works on the same thing, at the same time, in the same space, and at the same computer.

dev

Mocking

A technique in unit testing where real objects are replaced with simulated objects that mimic the behavior of the real ones.

dev