I
Identity and Access Management(IAM)
A framework for ensuring that the right people have the appropriate access to technology resources.
securityIdentity Security
A comprehensive approach to securing digital identities and managing access to resources across an organization.
securityImage Optimization
The practice of reducing the file size of images as much as possible without sacrificing quality to improve page load speed.
webImage Registry
A centralized service for storing and distributing container images.
cloudImage Segmentation
The process of partitioning a digital image into multiple segments or sets of pixels to simplify its representation and make it more meaningful for analysis.
aiImmutability
The inability of a blockchain's history to be changed or deleted once it has been recorded.
webImpermanent Loss(IL)
The temporary loss of funds experienced by liquidity providers in an AMM when asset prices change.
webIncident Management
The process of responding to an unplanned event or service interruption and restoring the service to its operational state.
devIncident Response(IR)
An organized approach to addressing and managing the aftermath of a security breach or cyberattack.
securityInclusive Cache
A cache hierarchy design where all data in a higher-level cache (e.g., L1) is also guaranteed to be present in the lower-level cache (e.g., L2).
hardwareIncremental Static Regeneration(ISR)
A hybrid approach that allows you to update static content after you've built your site, without needing to rebuild the entire site.
webIndicators of Attack(IoA)
Evidence of an attacker's intent and the techniques they are using in real-time, focusing on the 'how' rather than the 'what'.
securityIndicators of Compromise(IoC)
Evidence or artifacts found on a network or operating system that indicate a high probability of a security breach.
securityInference
The stage where a trained AI model is used to make predictions or generate outputs based on new, unseen input data.
aiInferential Statistics
The process of using data analysis to deduce properties of an underlying probability distribution.
aiInformation Security(InfoSec)
The practice of protecting information by mitigating information risks, ensuring confidentiality, integrity, and availability.
securityInfrastructure as a Service(IaaS)
A cloud model that provides on-demand access to fundamental computing resources like servers and storage.
cloudInfrastructure as Code(IaC)
The management and provisioning of infrastructure through machine-readable definition files, rather than manual configuration or interactive tools.
cloudInfrastructure as Code (IaC) Scanning
The process of analyzing infrastructure definition files (e.g., Terraform, CloudFormation) for security misconfigurations before they are deployed.
securityInfrastructure as Code (Networking)(IaC)
Managing and provisioning network infrastructure through machine-readable definition files rather than manual configuration.
networkInfrastructure Monitoring
The process of collecting and analyzing metrics and logs from cloud resources to ensure their health, performance, and availability.
cloudIngress
An API object that manages external access to services in a Kubernetes cluster, typically HTTP.
cloudInitial Coin Offering(ICO)
A fundraising method where a new project sells its native tokens to early investors.
webInitial DEX Offering(IDO)
A token launch conducted on a decentralized exchange (DEX).
webInitial Exchange Offering(IEO)
A token sale managed by a centralized exchange (CEX) on behalf of a project.
webIn-Memory Cache
A high-speed data storage layer that stores a subset of data in RAM to serve future requests faster than accessing the primary database.
cloudInput/Output(I/O)
The communication between an information processing system (such as a computer) and the outside world.
hardwareInstruction Level Parallelism(ILP)
A measure of how many instructions in a computer program can be executed simultaneously.
hardwareInstruction Set Architecture(ISA)
The abstract model of a computer that defines the set of basic operations a processor can perform.
hardwareIntegrated Circuit(IC)
A set of electronic circuits on one small flat piece of semiconductor material, commonly called a 'chip'.
hardwareIntegrated Services(IntServ)
A QoS architecture that reserves end-to-end network resources for specific traffic flows before data is sent.
networkIntegration Testing
A level of software testing where individual units are combined and tested as a group.
devInteraction to Next Paint(INP)
A Core Web Vital that measures a page's overall responsiveness to user interactions throughout its entire lifecycle.
webInteractive Application Security Testing (IAST)(IAST)
A security testing methodology that combines elements of SAST and DAST by using agents to monitor an application's internal execution during testing.
securityInteractive Visualization
A type of data visualization that allows users to manipulate and explore the data directly through the interface.
aiInterconnect
The physical wiring that connects transistors and other components within an integrated circuit or between chiplets.
hardwareInternal Developer Portal(IDP)
A self-service interface that allows developers to discover and use the tools, services, and infrastructure provided by a platform engineering team.
devInternet Gateway(IGW)
A horizontally scaled, redundant, and highly available VPC component that allows communication between your VPC and the internet.
cloudInternet of Things Networking(IoT Networking)
The specialized networking technologies and protocols used to connect billions of physical devices to the internet and to each other.
networkInterrupt
A signal to the processor emitted by hardware or software indicating an event that needs immediate attention.
hardwareInterrupt Request(IRQ)
A signal sent to the CPU to temporarily stop a running program and allow a special piece of code (an ISR) to run instead.
hardwareInterrupt Service Routine(ISR)
A software routine that hardware invokes in response to an interrupt.
hardwareIntranet
A private network accessible only to an organization's staff, used for internal communication and collaboration.
networkIntrusion Detection System(IDS)
A device or software that monitors a network or systems for malicious activity.
securityIntrusion Prevention System(IPS)
A network security tool that monitors traffic for malicious activity and takes action to prevent it.
securityI/O Port
A specialized address used by the CPU to communicate with a specific hardware device.
hardwareI/O Wall
The performance bottleneck caused by the slow speed of input/output operations compared to the processor and memory.
hardwareIP Address(IP)
A numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.
networkIPFIX(IPFIX)
An IETF standard protocol for exporting IP flow information from network devices.
networkIPFS(IPFS)
InterPlanetary File System; a peer-to-peer network for storing and sharing data in a distributed file system.
webIPFS (Web)(IPFS)
The use of the InterPlanetary File System protocol within web browsers to store and access content in a decentralized, content-addressed manner.
webIPv4
The fourth version of the Internet Protocol, using 32-bit addresses, which limits the total number of addresses to approximately 4.3 billion.
networkIPv6
The most recent version of the Internet Protocol, using 128-bit addresses to provide a vastly larger address space than IPv4.
networkIS-IS(IS-IS)
A link-state routing protocol used primarily by service providers to route traffic within large backbone networks.
networkISO/IEC 27001
An international standard on how to manage information security, providing a framework for an Information Security Management System (ISMS).
securityIstio
An open-source service mesh that provides a uniform way to secure, connect, and monitor microservices.
cloudITIL
Information Technology Infrastructure Library (ITIL) is a set of detailed practices for IT service management (ITSM).
devITX(ITX)
A family of small form factor motherboard specifications, most notably Mini-ITX.
hardwareJ
Jaeger
An open-source, end-to-end distributed tracing system used for monitoring and troubleshooting microservices-based distributed systems.
cloudJailbreaking (AI)
The process of using clever prompts to bypass the safety and ethical guardrails built into an AI model.
aiJamstack
A modern web development architecture based on client-side JavaScript, reusable APIs, and prebuilt Markup.
webJavaScript(JS)
A high-level, interpreted programming language that is one of the core technologies of the World Wide Web, alongside HTML and CSS.
webJenkins
An open-source automation server that enables developers to reliably build, test, and deploy their software.
cloudJitter
The variation in the delay of received packets.
networkJob
A Kubernetes object that creates one or more Pods and ensures that a specified number of them successfully terminate.
cloudjQuery
A fast, small, and feature-rich JavaScript library that simplified HTML document traversal, event handling, and animation.
webJSON
A lightweight data-interchange format that is easy for humans to read and write and easy for machines to parse and generate.
webJunction Temperature(Tj)
The highest operating temperature of the actual semiconductor material within an electronic device.
hardwareK
Kali Linux
A Debian-derived Linux distribution designed for digital forensics and penetration testing, pre-installed with hundreds of security tools.
securityKanban
A visual system for managing work as it moves through a process, focusing on continuous delivery and limiting work-in-progress (WIP).
devKEDA (Kubernetes Event-driven Autoscaling)(KEDA)
A Kubernetes-based Event Driven Autoscaler that allows you to scale any container in Kubernetes based on the number of events needing to be processed.
cloudKeylogger
A type of surveillance software or hardware that has the capability to record every keystroke made on a computer.
securityKey Management Service (KMS)(KMS)
A managed service that makes it easy to create and control the cryptographic keys used to encrypt your data.
securityKISS (Keep It Simple, Stupid)(KISS)
A design principle stating that most systems work best if they are kept simple rather than made complicated.
devK-Means Clustering
An unsupervised learning algorithm that groups data points into K distinct, non-overlapping clusters based on their features.
aiKnative
A Kubernetes-based platform to deploy and manage modern serverless workloads.
cloudK-Nearest Neighbors(KNN)
A simple, instance-based learning algorithm that classifies a data point based on how its neighbors are classified.
aiKnowledge Distillation
A technique where a small 'student' model is trained to mimic the behavior and performance of a large, complex 'teacher' model.
aiKnowledge Graph
A structured representation of knowledge that uses a graph-based data model to integrate and link data from various sources.
aiKoa
A new web framework designed by the team behind Express, which aims to be a smaller, more expressive, and more robust foundation for web applications and APIs.
webKubelet
An agent that runs on each node in a Kubernetes cluster, ensuring that containers are running in a Pod.
cloudKubernetes(K8s)
An open-source platform for automating the deployment, scaling, and management of containerized applications.
cloudKubernetes Security
The set of practices and tools used to secure a Kubernetes cluster and the applications running within it.
securityKVM(KVM)
Kernel-based Virtual Machine; an open-source virtualization technology built into the Linux kernel.
cloudL
L1 Cache
The primary cache, which is the fastest and smallest level of cache memory in a computer's hierarchy.
hardwareL2 Cache
The secondary cache, which is larger but slightly slower than the L1 cache.
hardwareL3 Cache
The third level of cache memory, which is shared among all cores of a multi-core processor.
hardwareLabel Encoding
Converting categorical labels into numerical values.
aiLACP(LACP)
An open-standard protocol used to automate the creation and maintenance of EtherChannels.
networkLangChain
A popular framework designed to simplify the creation of applications using large language models (LLMs).
aiLarge Language Model(LLM)
A type of artificial intelligence trained on massive datasets to understand, generate, and process human language.
aiLargest Contentful Paint(LCP)
A Core Web Vital that measures the time it takes for the largest image or text block to become visible within the viewport.
webLatency
The time delay between the moment a data packet is sent and the moment it is received at its destination.
networkLatent Space
A compressed, abstract representation of data where the most important features are captured in a lower-dimensional format.
aiLayer 1(L1)
The base level of a blockchain architecture, referring to the main underlying network itself.
webLayer 2(L2)
A secondary framework or protocol built on top of an existing blockchain (Layer 1) to improve its scalability and speed.
webLazy Loading
A design pattern that defers the initialization of an object or the loading of a resource until the point at which it is needed.
webLead Time for Changes
The amount of time it takes for a code commit to reach production.
devLean Software Development
An adaptation of lean manufacturing principles to software development, focusing on eliminating waste and optimizing the entire value stream.
devLearning Rate(LR)
A hyperparameter that determines the size of the steps the optimization algorithm takes when moving toward a minimum of the loss function.
aiLens Protocol
A decentralized, open-source social graph that allows developers to build social media platforms where users own their profiles and connections.
webLess
A dynamic preprocessor style sheet language that can be compiled into CSS and run on the client-side or server-side.
webLi-Fi(Li-Fi)
A wireless communication technology that uses light to transmit data and position between devices.
networkLightGBM
A gradient boosting framework developed by Microsoft that uses tree-based learning algorithms and is designed for distributed and efficient training.
aiLighthouse
An open-source, automated tool for improving the quality of web pages.
webLighthouse Score
A weighted average of various performance metrics provided by the Google Lighthouse auditing tool.
webLight Node
A node that only downloads a portion of the blockchain, typically just the block headers, to verify transactions without storing the entire ledger.
webLIME(LIME)
Local Interpretable Model-agnostic Explanations; a technique that explains the predictions of any machine learning classifier by approximating it locally with an interpretable model.
aiLinear Regression
A linear approach for modeling the relationship between a scalar response and one or more explanatory variables.
aiLine Chart
A chart that displays information as a series of data points connected by straight line segments.
aiLinkerd
An ultralight, security-first service mesh for Kubernetes.
cloudLink State Routing
A class of routing protocols where every router maintains a complete map of the entire network topology.
networkLinting
The process of running a program that will analyze code for potential errors and stylistic issues.
devLiquid Cooling
A cooling method that uses a liquid (usually water-based) to carry heat away from components.
hardwareLiquidity Mining
A subset of yield farming where users earn rewards for providing liquidity to a protocol.
webLiquidity Pool
A collection of funds locked in a smart contract, used to facilitate decentralized trading and lending.
webLittle's Law
A theorem that relates the average number of items in a stable system to their arrival rate and average time spent in the system.
hardwareLlama 2
A family of open-weights large language models released by Meta, widely used as a foundation for many open-source AI projects.
aiLlamaIndex
A data framework for LLM applications that provides tools to ingest, structure, and access private or domain-specific data.
aiLoad Balancer
A device or service that distributes incoming network traffic across multiple servers.
networkLoad Balancing Strategies
The various algorithms and methods used to distribute incoming network traffic across a group of backend servers.
devLoad-Link/Store-Conditional(LL/SC)
A pair of instructions used in multithreading to achieve synchronization.
hardwareLoad/Store Unit(LSU)
A specialized execution unit responsible for executing instructions that read from or write to memory.
hardwareLoad Testing
A type of performance testing that simulates the expected real-world load on a system to see how it behaves.
devLocal Area Network(LAN)
A network that connects computers and devices within a limited geographical area, such as a home, school, or office building.
networkLog Aggregation
The process of collecting logs from multiple sources and consolidating them into a single, searchable location.
devLogical Data Model
A model that describes the data in as much detail as possible, without regard to how they will be physically implemented in the database.
aiLogistic Regression
A statistical model used to predict the probability of a binary event occurring.
aiLonghorn
An open-source distributed block storage system for Kubernetes.
cloudLong-range Attack
A type of attack in Proof of Stake systems where an attacker creates a separate chain starting from an old block to overtake the main chain.
webLong Short-Term Memory(LSTM)
A specialized type of RNN architecture designed to learn long-term dependencies by using a complex gating mechanism to control the flow of information.
aiLooker
An enterprise platform for business intelligence, data applications, and embedded analytics.
aiLoRaWAN(LoRaWAN)
A low-power, wide-area networking (LPWAN) protocol designed to wirelessly connect battery-operated 'things' to the internet.
networkLoss Function
A mathematical formula that measures the difference between the model's prediction and the actual target value.
aiLow-Rank Adaptation(LoRA)
A technique for fine-tuning large models by adding a small number of trainable parameters, significantly reducing memory and storage requirements.
aiM
MAC Address(MAC)
A unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment.
networkMachine Translation(MT)
The automated process of translating text or speech from one natural language to another using computer software.
aiMacro-operation
A high-level instruction from the processor's Instruction Set Architecture (ISA), such as an x86 instruction.
hardwareMainnet
The primary, live version of a blockchain where actual transactions take place and the native tokens have real economic value.
webMalware
Any software intentionally designed to cause disruption, leak information, or gain unauthorized access.
securityManaged Detection and Response(MDR)
An outsourced cybersecurity service that provides organizations with threat hunting services and responds to threats once they are discovered.
securityManaged DNS
A cloud-based Domain Name System service that provides high availability and scalability for domain registration and routing.
cloudManaged Hadoop/Spark
A cloud service that simplifies running big data frameworks like Apache Hadoop and Apache Spark on a managed cluster of instances.
cloudManaged Identity
A feature that provides cloud services with an automatically managed identity in the cloud's IAM system, eliminating the need for developers to manage credentials.
cloudManaged Machine Learning Platform
A comprehensive cloud service that provides tools for every stage of the machine learning lifecycle, from data preparation to model deployment.
cloudManaged Relational Database
A cloud service that automates the setup, operation, and scaling of relational databases like MySQL, PostgreSQL, and SQL Server.
cloudManaged Security Service Provider (MSSP)(MSSP)
A third-party company that provides outsourced monitoring and management of security devices and systems for other organizations.
securityMan-in-the-Middle Attack(MitM)
An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
securityMapReduce
A programming model and an associated implementation for processing and generating big data sets with a parallel, distributed algorithm on a cluster.
aiMarkov Chain
A mathematical system that undergoes transitions from one state to another according to certain probabilistic rules, where the next state depends only on the current state.
aiMarkov Chain Monte Carlo(MCMC)
A class of algorithms for sampling from a probability distribution.
aiMassive MIMO
A wireless network technology that uses a very large number of antennas at the base station to improve spectral efficiency and capacity.
networkMaster Data Management(MDM)
A technology-enabled discipline in which business and IT work together to ensure the uniformity, accuracy, stewardship, semantic consistency and accountability of the enterprise’s official shared master data assets.
aiMaterial UI(MUI)
A popular React component library that implements Google's Material Design system.
webMatplotlib
The foundational plotting library for the Python programming language.
aiMaximum Likelihood Estimation(MLE)
A method of estimating the parameters of a probability distribution by maximizing a likelihood function.
aiMD5(MD5)
A widely used cryptographic hash function that produces a 128-bit hash value, now considered cryptographically broken.
securityMean
The mathematical average of a set of numbers, calculated by dividing the sum of all values by the total number of values.
aiMean Absolute Error(MAE)
A regression metric that calculates the average of the absolute differences between predicted and actual values.
aiMean Squared Error(MSE)
A loss function used in regression tasks that calculates the average of the squares of the errors between predicted and actual values.
aiMean Time Between Failures(MTBF)
The average time a system or component operates between consecutive failures.
devMean Time to Detect(MTTD)
The average time it takes for a team to become aware of an incident after it has occurred.
devMean Time to Repair(MTTR)
The average time it takes to restore a service to its normal operational state after a failure.
devMedian
The middle value in a list of numbers ordered from lowest to highest.
aiMedia Source Extensions(MSE)
A browser API that allows JavaScript to dynamically generate media streams for playback, enabling features like adaptive bitrate streaming.
webMemory Barrier
A type of instruction that forces the CPU or compiler to enforce an ordering constraint on memory operations.
hardwareMemory Consistency Model
A set of rules that defines the order in which memory operations (reads and writes) appear to occur to different processors in a multi-core system.
hardwareMemory Management Unit(MMU)
A computer hardware component that handles all memory and caching operations associated with the processor.
hardwareMemory-Mapped I/O(MMIO)
A method of performing I/O where the same address space is used to address both main memory and I/O devices.
hardwareMemory Wall
The growing gap between the speed of the CPU and the speed of the main memory (RAM).
hardwareMercurial
A free, distributed source control management tool.
devMerge (Ethereum)
The historic event in September 2022 when the Ethereum mainnet transitioned from Proof of Work to Proof of Stake.
webMerge Request(MR)
The GitLab equivalent of a Pull Request (PR).
devMerkle Tree
A mathematical structure used in computer science and blockchain to efficiently summarize and verify the integrity of large sets of data.
webMesh Networking
A network topology in which each node relays data for the network, and all mesh nodes cooperate in the distribution of data in the network.
networkMesh Topology
A network topology where nodes are interconnected, with many nodes having multiple physical or logical paths to other nodes.
networkMessage Queue
A form of asynchronous service-to-service communication used in serverless and microservices architectures.
devMetadata Management
The administration of data that describes other data.
aiMetasploit
A widely used penetration testing framework that provides information about security vulnerabilities and aids in exploitation and IDS signature development.
securityMetaverse
A collective virtual shared space, created by the convergence of virtually enhanced physical reality and physically persistent virtual space.
webMetrics Collection
The process of gathering numerical data about the performance and health of a system over time.
devMetropolitan Area Network(MAN)
A network that interconnects users with computer resources in a geographic area larger than a LAN but smaller than a WAN, typically covering a city.
networkMEV(MEV)
The maximum value that can be extracted from block production by reordering transactions.
webMIB(MIB)
A database used for managing all the entities in a network, typically associated with SNMP.
networkMicro-operation(uOp)
A simple, low-level instruction used internally by a processor to implement complex machine instructions.
hardwareMicroservices
An architectural style that structures an application as a collection of small, autonomous services modeled around a business domain.
devMicrosoft SQL Server
A relational database management system developed by Microsoft.
aiMilvus
An open-source vector database built for scalable similarity search and AI-powered applications.
aiMIMD(MIMD)
Multiple Instruction, Multiple Data; a type of parallel computing where multiple processors execute different instructions on different data.
hardwareMinification
The process of removing all unnecessary characters from source code without changing its functionality.
webMining
The process by which new blocks are added to a proof-of-work blockchain and new units of cryptocurrency are issued.
webMIPS Architecture(MIPS)
A reduced instruction set computer (RISC) instruction set architecture developed by MIPS Computer Systems.
hardwareMissing Value Imputation
The process of replacing missing data with substituted values.
aiMistral
A high-performance language model known for its efficiency and the use of Grouped-Query Attention (GQA) and Sliding Window Attention.
aiMITRE ATT&CK Framework(ATT&CK)
A globally accessible knowledge base of adversary tactics and techniques based on real-world observations.
securityMixture of Experts(MoE)
A machine learning technique where different parts of a model are trained to handle different types of inputs.
aiMLOps(MLOps)
Machine Learning Operations; a set of practices that aims to deploy and maintain machine learning models in production reliably and efficiently.
aiMobile-First Design
A design strategy where the mobile version of a website is developed first, and then features are added for larger screens.
webMob Programming
A software development approach where the whole team works on the same thing, at the same time, in the same space, and at the same computer.
devMocking
A technique in unit testing where real objects are replaced with simulated objects that mimic the behavior of the real ones.
dev