P
Pruning
A model compression technique that involves removing unnecessary neurons or connections from a trained neural network to make it smaller and faster.
aiPseudonymization
A data management and de-identification procedure by which personally identifiable information fields within a data record are replaced by one or more artificial identifiers.
securityPublic Blockchain
A blockchain that is both permissionless and transparent, allowing anyone to view the ledger and participate in the network.
webPublic Cloud
Cloud services offered by third-party providers over the public internet.
cloudPublic Key Infrastructure(PKI)
A framework of roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates.
securityPub/Sub
A messaging pattern where senders (publishers) do not program the messages to be sent directly to specific receivers (subscribers).
devPub/Sub Service
A messaging pattern where publishers send messages to a topic, and multiple subscribers receive those messages asynchronously.
cloudPull Request(PR)
A method of submitting contributions to an open-source project or a shared repository, allowing for code review before merging.
devPulumi
An infrastructure as code platform that allows developers to use familiar programming languages to define and deploy cloud infrastructure.
cloudPurple Teaming
A collaborative security methodology where Red and Blue teams work together to improve an organization's security posture.
securityPush API
A browser API that allows web applications to receive messages pushed to them from a server, even when the application is not active.
webP-value
The probability of obtaining results at least as extreme as the observed results, assuming the null hypothesis is true.
aiPWA Manifest
A JSON file that provides information about a web application in a format that allows it to be installed on a user's device like a native app.
webPython for Networking
The use of the Python programming language to automate network tasks, interact with APIs, and build custom networking tools.
networkQ
Quadratic Voting(QV)
A collective decision-making procedure where the cost of each additional vote for a proposal increases quadratically.
webQuality of Service(QoS)
A set of technologies used to manage network resources by prioritizing certain types of traffic over others.
networkQuantization
The process of reducing the numerical precision of a model's internal values (weights) to decrease its size and increase processing speed.
aiQuantum Computing
A type of computing that uses complex quantum states (like superposition and entanglement) to perform calculations far beyond classical computers.
aiQuay
A container image registry that provides storage and management for Docker and OCI-compliant images.
cloudQuery Optimization
A function of many relational database management systems in which the system determines the most efficient way to execute a given query.
aiR
Radar Chart
A graphical method of displaying multivariate data in the form of a two-dimensional chart of three or more quantitative variables represented on axes starting from the same point.
aiRainbow Table Attack
A type of attack used to crack password hashes by using pre-computed tables of hashes for every possible password.
securityRandom Access Memory(RAM)
A type of computer memory that can be read and changed in any order, typically used to store working data and machine code.
hardwareRandom Forest
An ensemble learning method that operates by constructing a multitude of decision trees during training and outputting the average prediction of the individual trees.
aiRandom Sampling
A sampling technique where each member of the population has an equal chance of being selected.
aiRandom Search
A hyperparameter optimization technique that selects random combinations of hyperparameters to train and evaluate models.
aiRansomware
A type of malware that threatens to publish or block access to data unless a ransom is paid.
securityReact
A popular JavaScript library for building user interfaces, particularly single-page applications, using a component-based architecture.
webReactive Programming
A declarative programming paradigm concerned with data streams and the propagation of change.
devReAct Prompting(ReAct)
A prompting technique that combines 'Reasoning' and 'Acting,' allowing an LLM to generate reasoning traces and task-specific actions in an interleaved manner.
aiRead-Only Memory(ROM)
A type of non-volatile memory used in computers and other electronic devices that cannot be easily modified.
hardwareRead Replica
A copy of a primary database instance that can be used to serve read-only traffic, improving performance and scalability.
cloudReassembly
The process of putting fragmented IP packets back together into their original form at the destination device.
networkRecall
A metric that measures a model's ability to find all relevant cases within a dataset; the ratio of true positives to the total number of actual positives.
aiRecurrent Neural Network(RNN)
A class of neural networks where connections between nodes form a directed graph along a temporal sequence, allowing them to process data with a time dimension.
aiRed Teaming
A full-scope, multi-layered attack simulation designed to measure how well an organization's people, networks, applications, and physical security controls can withstand an attack from a real-life adversary.
securityRefactoring
The process of restructuring existing computer code without changing its external behavior.
devReferrer-Policy
An HTTP header that controls how much referrer information (the URL of the previous page) is sent with requests.
securityRegister Renaming
A technique used to eliminate false data dependencies between instructions by mapping architectural registers to a larger pool of physical registers.
hardwareRegression Analysis
A set of statistical processes for estimating the relationships between a dependent variable and one or more independent variables.
aiRegression Testing
Re-running functional and non-functional tests to ensure that previously developed and tested software still performs after a change.
devRegularization
A set of techniques used to prevent overfitting by adding a penalty term to the loss function or modifying the training process.
aiReinforcement Learning(RL)
A type of machine learning where an agent learns to make decisions by performing actions in an environment to maximize a cumulative reward.
aiReinforcement Learning from Human Feedback(RLHF)
A technique used to align AI models with human preferences by training them based on feedback from human evaluators.
aiRelational Database(RDBMS)
A type of database that stores and provides access to data points that are related to one another.
aiRelease Management
The process of managing, planning, scheduling, and controlling a software build through different stages and environments.
devRelease Pipeline
The latter part of a deployment pipeline focused on deploying artifacts to various environments and performing final verification.
devReliability Engineering
A sub-discipline of systems engineering that emphasizes the ability of equipment to function without failure.
devReLU
Rectified Linear Unit; a popular activation function that outputs the input directly if it is positive, and zero otherwise.
aiRemix
A full-stack web framework that focuses on web standards and modern user experience, built on top of React Router.
webReorder Buffer(ROB)
A hardware structure in out-of-order processors that ensures instructions are committed (retired) in their original program order.
hardwareRepeater
An electronic device that receives a signal and retransmits it at a higher level or higher power, so that the signal can cover longer distances.
networkReplay Attack
A cyberattack where a valid data transmission is maliciously repeated or delayed on a different chain or at a later time.
webReplicaSet
A Kubernetes object that ensures a specified number of pod replicas are running at any given time.
cloudReservation Station
A buffer that holds an instruction and its operands, waiting for execution until all dependencies are resolved.
hardwareReserved Capacity
A pricing model where users commit to using a specific amount of a cloud resource for a fixed term (1 or 3 years) in exchange for a significant discount.
cloudResilience Engineering
A paradigm for safety management that focuses on how to help people cope with complexity under pressure to achieve success.
devResource Prioritization
The process of telling the browser which resources are most important to load first to improve perceived performance.
webResource Tagging
The practice of assigning metadata to cloud resources in the form of key-value pairs to improve organization, cost tracking, and automation.
cloudResource Timing API
A browser API that provides detailed network timing data for every resource loaded by a web page.
webResponsible Disclosure
A vulnerability disclosure model where researchers report flaws to the vendor first and give them a reasonable amount of time to fix the issue before making it public.
securityResponsive Web Design(RWD)
An approach to web design that makes web pages render well on a variety of devices and window or screen sizes.
webRetrieval-Augmented Generation(RAG)
A technique that enhances LLM outputs by retrieving relevant information from external knowledge bases before generating a response.
aiRetry Pattern
A design pattern that enables an application to handle transient failures when it tries to connect to a service or network resource.
devReturn Stack Buffer(RSB)
A specialized branch predictor used specifically to predict the return addresses of function calls.
hardwareReward Model
A separate model used in reinforcement learning to predict the reward an agent should receive for a given action or output.
aiRing Topology
A network topology where each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node.
networkRIP(RIP)
A legacy distance-vector routing protocol that uses hop count as its primary metric.
networkRISC
Reduced Instruction Set Computer; a CPU design strategy based on simple instructions that can be executed quickly.
hardwareRISC-V
An open-standard instruction set architecture (ISA) based on established reduced instruction set computer (RISC) principles.
hardwareRisk Assessment
The process of identifying, estimating, and prioritizing risks to an organization's operations and assets.
securityRisk Mitigation
The process of developing options and actions to enhance opportunities and reduce threats to project objectives.
securityRoBERTa
A Robustly Optimized BERT Pretraining Approach; an improved version of BERT that modifies the key hyperparameters and training data size.
aiROC Curve(ROC)
Receiver Operating Characteristic curve; a graph showing the performance of a classification model at all classification thresholds.
aiRole-Based Access Control(RBAC)
A method of regulating access to resources based on the roles of individual users.
securityRolling Update
A deployment strategy that gradually replaces old instances of an application with new ones, ensuring continuous availability.
cloudRollup
A type of Layer 2 scaling solution that performs transaction execution outside the main blockchain but posts transaction data to it.
webRook
An open-source cloud-native storage orchestrator for Kubernetes.
cloudRoot Cause Analysis(RCA)
A systematic process for identifying the underlying cause of a problem or incident to prevent it from recurring.
devRootkit
A collection of computer software, typically malicious, designed to conceal the existence of certain processes or programs from normal methods of detection.
securityRoot Mean Squared Error(RMSE)
A regression metric that calculates the square root of the average of squared differences between predicted and actual values.
aiRouter
A networking device that forwards data packets between computer networks, operating at the Network Layer (Layer 3).
networkRoute Table
A set of rules, called routes, that are used to determine where network traffic from a subnet or gateway is directed.
cloudRouting Protocol
A set of rules used by routers to determine the best path for data packets to travel across a network.
networkR-squared(R²)
A statistical measure that represents the proportion of the variance for a dependent variable that's explained by an independent variable or variables in a regression model.
aiRSTP(RSTP)
An evolution of STP that provides significantly faster convergence after a topology change.
networkRug Pull
A type of scam where developers abandon a project and run away with investors' funds.
webRuntime Application Self-Protection (RASP)(RASP)
A security technology that resides within an application's runtime environment and can detect and block attacks in real-time.
securityS
Saga Pattern
A design pattern for managing distributed transactions in a microservices architecture.
devSaliency Map
A visualization technique used in computer vision to highlight the pixels or regions of an image that were most influential in a model's prediction.
aiSalting (Cryptography)
Adding a unique, random string of characters to a password before it is hashed to protect against pre-computed attacks.
securitySame-Origin Policy(SOP)
A fundamental web security model that restricts how a document or script loaded from one origin can interact with a resource from another origin.
securitySandboxing
A security mechanism for separating running programs, usually in an effort to mitigate system failures or software vulnerabilities from spreading.
securitySandwich Attack
A form of MEV where an attacker places trades both before and after a victim's transaction.
webSankey Diagram
A type of flow diagram in which the width of the arrows is proportional to the flow rate.
aiSANS Top 25
A list of the most widespread and critical errors that can lead to serious software vulnerabilities.
securitySass/SCSS
A preprocessor scripting language that is interpreted or compiled into Cascading Style Sheets (CSS).
webSATA
Serial AT Attachment; a computer bus interface that connects host bus adapters to mass storage devices.
hardwareSatoshi(sat)
The smallest unit of Bitcoin, named after its creator Satoshi Nakamoto.
webScalability
The property of a system to handle a growing amount of work by adding resources to the system.
devScapy
A powerful Python-based interactive packet manipulation program and library.
networkScatter Plot
A chart that uses Cartesian coordinates to display values for typically two variables for a set of data.
aiScrum
An Agile framework for managing complex projects, characterized by short iterations called Sprints and specific roles like Scrum Master and Product Owner.
devSD-WAN(SD-WAN)
A software-defined approach to managing Wide Area Networks (WANs) that simplifies management and improves performance by using multiple transport services.
networkSeaborn
A Python data visualization library based on matplotlib that provides a high-level interface for drawing attractive and informative statistical graphics.
aiSeasonality
A characteristic of a time series in which the data experiences regular and predictable changes that recur every calendar year.
aiSecret
A Kubernetes API object used to store and manage sensitive information, such as passwords, OAuth tokens, and ssh keys.
cloudSecrets Management
The tools and processes used to securely store, manage, and rotate sensitive information like API keys, passwords, and certificates.
cloudSecure Access Service Edge(SASE)
A network architecture that combines wide area networking (WAN) capabilities with cloud-native security functions.
securitySecure Boot
A security standard that ensures a device boots using only software that is trusted by the Original Equipment Manufacturer (OEM).
securitySecure Sockets Layer(SSL)
A deprecated security protocol for establishing encrypted links between a web server and a browser, now replaced by TLS.
securitySecurity Architecture
The design and structure of security controls and systems within an organization's IT environment to protect its assets and ensure business continuity.
securitySecurity as Code
The integration of security tools and practices into the DevOps pipeline through automation and code-based configurations.
devSecurity Awareness Training
A strategy used by IT and security professionals to prevent and mitigate user risk through education.
securitySecurity by Default
The practice of designing products and systems so that the most secure settings are enabled out-of-the-box.
securitySecurity by Design
An approach to software and hardware development that integrates security at every stage of the design and development process.
securitySecurity Group
A virtual firewall for cloud instances that controls inbound and outbound traffic at the instance level.
cloudSecurity Header
HTTP response headers that tell a browser how to behave when handling a website's content to improve security.
securitySecurity Information and Event Management(SIEM)
Software that combines security information management and security event management.
securitySecurity Operations Center (SOC)(SOC)
A centralized unit that deals with security issues on an organizational and technical level, responsible for monitoring, detecting, and responding to cyber threats.
securitySecurity Orchestration, Automation, and Response(SOAR)
Software that allows organizations to collect threat data and respond to security events automatically.
securitySecurity Token
A digital asset that represents an investment in a real-world asset and is subject to securities regulations.
webSecurity Token Offering(STO)
A regulated token sale where the tokens represent securities and comply with legal requirements.
webSeed Phrase
A series of 12 to 24 random words that acts as a master key to a cryptocurrency wallet, allowing for its recovery if the device is lost or damaged.
webSegmentation
A memory management technique that divides memory into segments of varying lengths based on logical groupings.
hardwareSegregation of Duties(SoD)
A security principle that requires more than one person to complete a critical task to prevent fraud and error.
securitySelf-Attention
An attention mechanism where a model relates different positions of a single sequence to compute a representation of that sequence.
aiSelfish Mining
A strategy where a miner keeps discovered blocks private to gain an advantage over the rest of the network.
webSelf-Service Infrastructure
A model where developers can provision and manage the infrastructure they need without manual intervention from an operations team.
devSelf-Sovereign Identity(SSI)
A model for digital identity that gives individuals full ownership and control over their personal data and how it is shared.
webSemantic HTML
The use of HTML markup to reinforce the semantics, or meaning, of the information in web pages and web applications rather than merely to define its look or appearance.
webSemantic Versioning(SemVer)
A versioning scheme for software that uses a three-part number (MAJOR.MINOR.PATCH) to convey meaning about the underlying changes.
devSemiconductor
A material with electrical conductivity between that of a conductor and an insulator, forming the basis of modern electronics.
hardwareSemi-supervised Learning
A machine learning approach that combines a small amount of labeled data with a large amount of unlabeled data during training.
aiSentencePiece
A language-independent subword tokenizer that treats the input as a raw stream of characters, including spaces.
aiSentiment Analysis
The use of natural language processing to identify, extract, and quantify affective states and subjective information from text.
aiSEO(SEO)
The process of improving the quality and quantity of website traffic to a website or a web page from search engines.
webServerless Computing
A cloud execution model where the provider manages the infrastructure, automatically allocating resources based on demand.
cloudServerless Database
A database that automatically scales its compute and storage resources based on demand.
aiServerless Functions(FaaS)
A cloud computing model that allows developers to run code in response to events without managing the underlying servers.
cloudServerless Query Service
An interactive query service that allows you to analyze data directly in object storage using standard SQL, without managing any infrastructure.
cloudServer-Sent Events(SSE)
A server push technology enabling a browser to receive automatic updates from a server via an HTTP connection.
webServer-Side Rendering(SSR)
The process of rendering a web page on the server and sending the fully generated HTML to the client's browser.
cloudServer-Side Request Forgery(SSRF)
A vulnerability where an attacker can trick a server-side application into making requests to an unintended location.
securityService Account
A special type of cloud identity used by applications or virtual machines to interact with other cloud services programmatically.
cloudService Catalog
A centralized repository that provides information about all the services available within an organization.
devService Discovery
The process of automatically detecting devices and services on a network.
cloudService Mesh
A dedicated infrastructure layer for facilitating service-to-service communications between microservices.
cloudService Orchestration
The automated coordination and management of multiple services to achieve a larger business goal or workflow.
devService-Oriented Architecture(SOA)
An architectural style where software components provide services to other components via a communications protocol over a network.
devService Worker
A script that your browser runs in the background, separate from a web page, opening the door to features that don't need a web page or user interaction.
webService Worker Caching
A powerful caching mechanism that allows developers to programmatically manage network requests and responses using a Service Worker.
webSession Hijacking
The exploitation of a valid computer session to gain unauthorized access to information or services in a computer system.
securitySession Layer
The fifth layer of the OSI model, responsible for establishing, managing, and terminating sessions between applications.
networksFlow
An industry-standard technology for monitoring high-speed switched or routed networks using sampling.
networkSHA-256(SHA-256)
A cryptographic hash function that generates a 256-bit (32-byte) signature, part of the SHA-2 family.
securityShadow Deployment
A deployment strategy where a new version of a service receives a copy of production traffic without affecting the actual response sent to users.
devShadow DOM
A web standard that provides encapsulation for the JavaScript, CSS, and templating in a Web Component.
webShanghai Upgrade
An Ethereum network upgrade that enabled the withdrawal of staked ETH from the Beacon Chain.
webSHAP(SHAP)
Shapley Additive Explanations; a game-theoretic approach to explain the output of any machine learning model.
aiSharding
A database partitioning technique used to scale blockchains by splitting the network into smaller, more manageable pieces called 'shards.'
webShared Database Pattern
An anti-pattern in microservices where multiple services access the same database directly.
devShared Responsibility Model
A security framework that defines which security tasks are handled by the cloud provider and which are the responsibility of the customer.
cloudShift Left Security
The practice of moving security testing and considerations earlier (to the 'left') in the software development lifecycle.
securityShift Left Testing
The practice of performing testing earlier in the software development lifecycle (to the 'left' on a project timeline).
devShift Right Testing
The practice of performing testing and monitoring in the production environment (to the 'right' on a project timeline).
devSidecar
A design pattern where a helper container is deployed alongside a main application container in the same Pod.
cloudSidecar Pattern
A design pattern where a separate container or process is deployed alongside the main application to provide supporting features.
devSidechain
An independent blockchain that runs in parallel to a main blockchain (Layer 1) and is connected to it via a two-way bridge.
webSigmoid
An activation function that maps any input value to a value between 0 and 1, often used in the output layer of binary classification models.
aiSIMD(SIMD)
Single Instruction, Multiple Data; a type of parallel computing where one instruction operates on multiple data points simultaneously.
hardwareSimultaneous Multi-threading(SMT)
A technique that allows multiple independent threads of execution to better utilize the resources provided by modern processor architectures.
hardwareSingle Page Application(SPA)
A web application or website that interacts with the user by dynamically rewriting the current web page with new data from the web server, instead of the default method of a browser loading entire new pages.
webSingle Sign-On(SSO)
An authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems.
securitySingle-tenant Architecture
An architecture where each customer has their own dedicated instance of an application and its supporting infrastructure.
cloudSingleton Pattern
A creational design pattern that ensures a class has only one instance and provides a global point of access to it.
devSingularity
A hypothetical future point in time at which technological growth becomes uncontrollable and irreversible, resulting in unfathomable changes to human civilization.
aiSite Reliability Engineering(SRE)
A discipline that applies software engineering principles to infrastructure and operations.
cloudSlippage
The difference between the expected price of a trade and the actual price at which it is executed.
webSmall Cell
Low-power wireless base stations that operate in licensed and unlicensed spectrum and have a range of 10 meters to a few hundred meters.
networkSmart Contract Audit
A thorough analysis of a smart contract's code to identify security vulnerabilities and inefficient code.
securitySmishing
A form of phishing that uses SMS (text messages) to trick victims into revealing sensitive information or downloading malware.
securitySmoke Testing
A preliminary set of tests to reveal simple failures severe enough to reject a prospective software release.
devSMOTE(SMOTE)
Synthetic Minority Over-sampling Technique; an over-sampling method that creates synthetic samples for the minority class.
aiSnapshot
An off-chain voting platform used by many DAOs to allow token holders to vote on proposals without paying gas fees.
webSNAT(SNAT)
A process that changes the source IP address of a packet as it passes through a router or firewall.
networkSNMP(SNMP)
An internet-standard protocol for collecting and organizing information about managed devices on IP networks.
networkSnowflake (Data Warehouse)
A cloud-based data-warehousing platform.
aiSnowflake Schema
A logical arrangement of tables in a multidimensional database such that the entity relationship diagram resembles a snowflake shape.
aiSoak Testing
A type of performance testing where a system is subjected to a significant load for an extended period of time.
devSOC 2(SOC 2)
An auditing procedure that ensures your service providers securely manage your data to protect the interests of your organization and the privacy of its clients.
securitySocial Engineering
The psychological manipulation of people into performing actions or divulging confidential information.
securitySocial Engineering Toolkit (SET)(SET)
An open-source Python-driven framework designed to facilitate social engineering attacks for security testing purposes.
securitySocialFi
A combination of social media and decentralized finance, where users can monetize their social interactions and content through blockchain-based incentives.
webSocket
The combination of an IP address and a port number, representing one end of a two-way communication link.
networkSocket.io
A library that enables real-time, bi-directional, and event-based communication between web clients and servers.
webSoft Fork
A backward-compatible upgrade to a blockchain protocol where only the upgraded nodes enforce the new rules.
webSoftmax
An activation function used in the final layer of a neural network to turn a vector of numbers into a probability distribution that sums to 1.
aiSoftware as a Service(SaaS)
A cloud model that delivers software applications over the internet on a subscription basis.
cloudSoftware Bill of Materials (SBOM)(SBOM)
A formal, structured record of the various components, libraries, and dependencies used in building a piece of software.
security