S

Software Composition Analysis (SCA)(SCA)

The process of identifying and managing the security and license risks associated with third-party open-source libraries and dependencies.

security

Software-Defined Networking(SDN)

An architecture that decouples the network control plane from the forwarding plane, enabling centralized and programmable network management.

network

Software-Defined Radio(SDR)

A radio communication system where components that have been traditionally implemented in hardware are instead implemented by means of software.

network

Software Development Life Cycle(SDLC)

A structured process used by the software industry to design, develop, and test high-quality software.

dev

Solana(SOL)

A high-performance Layer 1 blockchain known for its fast transaction speeds and low costs.

web

Solid

A project led by Sir Tim Berners-Lee that aims to radically change the way web applications work today, resulting in true data ownership.

web

SolidJS

A declarative, efficient, and flexible JavaScript library for building user interfaces, known for its extreme performance.

web

SOLID Principles

A set of five design principles intended to make software designs more understandable, flexible, and maintainable.

dev

Solid-State Drive(SSD)

A storage device that uses integrated circuit assemblies to store data persistently, typically using flash memory.

hardware

Soulbound Token(SBT)

Non-transferable NFTs that represent a person's identity, achievements, or affiliations within a decentralized ecosystem.

web

Southbridge

The chip in a chipset that manages slower peripheral communications like USB, Ethernet, and storage interfaces.

hardware

Spear Phishing

A highly targeted phishing attack that uses personal information to trick a specific individual or organization.

security

Speculative Execution

An optimization technique where a computer system performs some task that may not be needed.

hardware

Speech-to-Text(STT)

The process of converting spoken language into written text, also known as Automatic Speech Recognition (ASR).

ai

Speed Index

A performance metric that measures how quickly the contents of a page are visibly populated.

web

Splunk

A commercial software platform for searching, monitoring, and analyzing machine-generated big data via a Web-style interface.

cloud

Spot Instances

Excess cloud compute capacity available at steep discounts, which can be reclaimed by the provider with very short notice.

cloud

Spyware

Malware that secretly monitors and collects information about a user's activities without their knowledge or consent.

security

SQL Injection(SQLi)

A type of vulnerability where an attacker can interfere with the queries that an application makes to its database.

security

Stablecoin

A cryptocurrency designed to maintain a stable value by being pegged to a reserve asset, such as a fiat currency.

web

Staking

The act of locking up cryptocurrency tokens to support the operation and security of a proof-of-stake blockchain network.

web

Staking Pool

A group of token holders who combine their resources to increase their chances of earning staking rewards.

web

Standard Deviation(SD)

A measure of the amount of variation or dispersion of a set of values, expressed in the same units as the data.

ai

Star Schema

The simplest style of data mart schema and is the approach most widely used to develop data warehouses and dimensional data marts.

ai

Star Topology

A network topology where every peripheral node is connected to a central node, usually a switch or hub.

network

State Channel

A scaling solution that allows participants to conduct an unlimited number of transactions off-chain, only submitting the final state to the blockchain.

web

Stateful Application

An application that requires the server to remember client data or session state across multiple requests.

cloud

StatefulSet

A Kubernetes workload object used to manage stateful applications.

cloud

Stateless Application

An application that does not store client data or session state on the server between requests.

cloud

Static Application Security Testing (SAST)(SAST)

A security testing methodology that analyzes an application's source code, bytecode, or binaries for vulnerabilities without executing the program.

security

Static Code Analysis

The analysis of computer software that is performed without actually executing programs.

dev

Static RAM(SRAM)

A type of random-access memory that uses latching circuitry to store each bit, making it faster but more expensive than DRAM.

hardware

Static Routing

A process where network administrators manually configure the paths that data packets take through a network.

network

Static Site Generation(SSG)

The process of generating a full static HTML website based on raw data and a set of templates at build time.

web

Stationary Process

A stochastic process whose unconditional joint probability distribution does not change when shifted in time.

ai

Statistical Analysis

The process of collecting, exploring, and presenting large amounts of data to discover underlying patterns and trends.

ai

Step Functions/Orchestration

A service used to coordinate multiple serverless functions and other cloud services into complex, multi-step workflows.

cloud

Stochastic Gradient Descent(SGD)

An iterative optimization algorithm used to minimize a loss function by updating model parameters using a small, random subset of the training data.

ai

Storage Area Network(SAN)

A specialized, high-speed network that provides block-level network access to storage.

network

Storage Tiers

Different classes of storage offered by cloud providers, optimized for various access patterns, performance requirements, and costs.

cloud

Store Buffer

A small buffer that holds 'store' (write) operations until they are ready to be committed to the cache or main memory.

hardware

STP(STP)

A network protocol that ensures a loop-free topology for Ethernet networks by disabling redundant paths.

network

Strangler Fig Pattern

An architectural pattern for incrementally migrating a legacy system by gradually replacing specific pieces of functionality with new services.

dev

Strategy Pattern

A behavioral design pattern that lets you define a family of algorithms, put each of them into a separate class, and make their objects interchangeable.

dev

Stratified Sampling

A sampling method that involves dividing a population into smaller sub-groups known as strata.

ai

Streamlit

An open-source Python library that makes it easy to create and share custom web apps for machine learning and data science.

ai

Stream Processing

The real-time processing of continuous streams of data as they are generated.

cloud

Stress Testing

A type of performance testing that pushes a system beyond its normal operating limits to see how it fails and how it recovers.

dev

STRIDE Model(STRIDE)

A mnemonic used in threat modeling to categorize different types of security threats.

security

Structural Patterns

Design patterns that explain how to assemble objects and classes into larger structures while keeping these structures flexible and efficient.

dev

Stubbing

The practice of providing 'canned' responses to calls made during a test, usually to provide data to the code being tested.

dev

Subnet

A logical subdivision of an IP network, typically within a Virtual Private Cloud (VPC).

cloud

Subnet Mask

A 32-bit number that masks an IP address and divides the IP address into network address and host address.

network

Superscalar Architecture

A CPU design that can execute more than one instruction per clock cycle by having multiple execution units.

hardware

Superset

A modern, enterprise-ready business intelligence web application.

ai

Supervised Learning

A type of machine learning where the model is trained on a labeled dataset, meaning each training example is paired with an output label.

ai

Supply Chain Attack

A cyberattack that targets a vulnerability in a third-party dependency or service to gain access to a larger organization.

security

Supply Chain Security

The process of securing the entire lifecycle of a product, from raw materials and components to manufacturing, distribution, and software dependencies.

security

Support Vector Machine(SVM)

A supervised learning model used for classification and regression that finds the optimal hyperplane to separate data points of different classes.

ai

Survival Analysis

A branch of statistics for analyzing the expected duration of time until one or more events happen.

ai

Svelte

A radical new approach to building user interfaces that shifts the work from the browser to a compile step.

web

SVG(SVG)

An XML-based vector image format for two-dimensional graphics with support for interactivity and animation.

web

SVN

Apache Subversion (SVN) is a centralized version control system.

dev

Swarm Intelligence

The collective behavior of decentralized, self-organized systems, typically inspired by nature (e.g., ant colonies, bird flocking).

ai

Switch

A networking device that connects devices on a computer network by using packet switching to receive and forward data to the destination device.

network

Sybil Attack

A security threat where an attacker creates multiple fake identities to gain disproportionate influence over a network.

web

Symmetric Encryption

A type of encryption where the same key is used for both encrypting and decrypting the data.

security

Symmetric Multiprocessing(SMP)

A multiprocessor computer architecture where two or more identical processors connect to a single, shared main memory.

hardware

Synchronous DRAM(SDRAM)

A type of DRAM that is synchronized with the system bus, allowing for higher speeds and better efficiency.

hardware

Synthetic Data

Artificially generated data that mimics the statistical properties of real-world data without containing any information from actual individuals.

ai

Syslog

A standard for message logging that allows a device to send event notifications to a central server.

network

System on a Chip(SoC)

An integrated circuit that integrates all or most components of a computer or other electronic system into a single chip.

hardware

System Testing

A level of software testing where a complete and integrated software is tested to evaluate the system's compliance with its specified requirements.

dev

T

T5(T5)

Text-to-Text Transfer Transformer; a model that treats every NLP task as a text-to-text problem, from translation to classification.

ai

Tableau

A powerful and fastest growing data visualization tool used in the Business Intelligence Industry.

ai

Tailwind CSS

A utility-first CSS framework for rapidly building custom user interfaces without leaving your HTML.

web

Tally

A governance platform that provides tools for DAOs to manage on-chain voting, proposals, and delegate power.

web

TCP(TCP)

A core protocol of the Internet Protocol Suite that provides reliable, ordered, and error-checked delivery of a stream of octets between applications.

network

Tcpdump

A common command-line packet analyzer that allows users to display TCP/IP and other packets being transmitted or received over a network.

network

TCP/IP Model

A four-layer conceptual model used for the internet and similar networks, focusing on the protocols that enable communication.

network

Technical Debt

A concept in software development that reflects the implied cost of additional rework caused by choosing an easy (and fast) solution now instead of using a better approach that would take longer.

dev

Temperature

A hyperparameter that controls the randomness or creativity of an AI model's output.

ai

Tendermint

A software for securely and consistently replicating an application on many machines, serving as a core consensus engine.

web

Tensor Processing Unit(TPU)

An AI-accelerator application-specific integrated circuit (ASIC) developed by Google specifically for machine learning.

hardware

Teradata

A multi-cloud data platform company for enterprise analytics.

ai

Terraform

An open-source infrastructure as code (IaC) tool that allows developers to define and provision cloud infrastructure using a declarative configuration language.

cloud

Terraform for Networking

The use of HashiCorp Terraform to provision and manage network infrastructure as code.

network

Test Double

A generic term for any object that stands in for a real object during a test.

dev

Test-Driven Development(TDD)

A software development process where developers write a failing automated test case before writing the minimum amount of code to pass that test.

dev

Testnet

An alternative blockchain used by developers for testing applications and protocol upgrades without risking real funds.

web

Test Set

A final subset of data, never seen by the model during training or tuning, used to provide an unbiased evaluation of the final model's performance.

ai

Text-to-Speech(TTS)

The artificial production of human speech from written text, also known as speech synthesis.

ai

Thermal Design Power(TDP)

The maximum amount of heat a computer chip is expected to generate under a theoretical 'real-world' workload.

hardware

Thermal Paste

A thermally conductive compound used to fill the microscopic air gaps between a processor and its heat sink.

hardware

Thread Level Parallelism(TLP)

The ability of a system to execute multiple independent threads of execution simultaneously.

hardware

Threat Intelligence

Evidence-based knowledge about existing or emerging threats that helps organizations make informed security decisions.

security

Threat Modeling

A structured process for identifying, quantifying, and addressing potential security threats to a system or application during the design phase.

security

Three-way Handshake

The process used by TCP to establish a reliable connection between a client and a server.

network

Throughput

The actual amount of data successfully transferred over a network in a given time period.

network

Thunderbolt

A high-speed hardware interface developed by Intel and Apple that combines PCIe and DisplayPort signals into one serial signal.

hardware

Time Series Analysis

A specific way of analyzing a sequence of data points collected over an interval of time.

ai

Time to First Byte(TTFB)

A metric that measures the time between the request for a resource and when the first byte of a response begins to arrive.

web

Time to Interactive(TTI)

A performance metric that measures how long it takes for a page to become fully interactive and capable of responding quickly to user input.

web

TinyML

A field of machine learning focused on developing models that can run on extremely low-power microcontrollers and embedded systems.

ai

Token

A digital asset that exists on an existing blockchain, representing a utility, asset, or right.

web

Tokenization

The process of breaking down text into smaller units called tokens that an AI model can process.

ai

Tokenomics

The study of the economic systems and incentives that govern a cryptocurrency or token ecosystem.

web

Total Blocking Time(TBT)

A performance metric that measures the total amount of time that a page is blocked from responding to user input.

web

Total Value Locked(TVL)

A metric representing the total amount of assets currently staked or deposited in a DeFi protocol.

web

Trace Cache

A specialized instruction cache that stores sequences of decoded instructions (micro-ops) in their actual execution order.

hardware

Traceroute

A diagnostic tool used to track the path a packet takes across an IP network and measure the transit delays of each hop.

network

Tracing

A method of tracking a single request as it moves through various services in a distributed system.

cloud

Traffic Policing

A QoS technique that drops or re-marks packets that exceed a defined bandwidth limit.

network

Traffic Shaping

A QoS technique that delays packets to ensure that network traffic stays within a defined bandwidth limit.

network

Training Data

The dataset used to teach an AI model patterns and relationships during the training phase.

ai

Transaction(TX)

An agreement between a buyer and a seller to exchange an asset, recorded on the blockchain.

web

Transaction Fee

A small amount of cryptocurrency paid by the sender to have their transaction processed and included in a block.

web

Transfer Learning

A machine learning technique where a model developed for one task is reused as the starting point for a model on a second, related task.

ai

Transformer Architecture

A neural network architecture that uses self-attention mechanisms to process sequential data, forming the basis for most modern LLMs.

ai

Transistor

A semiconductor device used to amplify or switch electrical signals and power.

hardware

Transit Gateway

A network hub that connects multiple Virtual Private Clouds (VPCs) and on-premises networks.

cloud

Translation Lookaside Buffer(TLB)

A specialized cache used by the Memory Management Unit (MMU) to speed up virtual-to-physical address translation.

hardware

Transparency

The property of public blockchains where all transactions and data are visible to anyone with an internet connection.

web

Transpilation

The process of taking source code written in one language and transforming it into another language that has a similar level of abstraction.

web

Transport Layer

The fourth layer of the OSI model, responsible for end-to-end communication, error recovery, and flow control.

network

Transport Layer Security(TLS)

A cryptographic protocol designed to provide communications security over a computer network.

security

Travis CI

A hosted continuous integration service used to build and test software projects hosted on GitHub and Bitbucket.

cloud

Treemap

A visualization that displays hierarchical data as a set of nested rectangles.

ai

Tree of Thoughts(ToT)

An advanced prompting framework that allows LLMs to explore multiple reasoning paths simultaneously and evaluate them to find the best solution.

ai

Tree Shaking

A form of dead code elimination that removes unused code from the final bundle.

web

Trend Analysis

The practice of collecting information and attempting to spot a pattern.

ai

Trojan Horse

A type of malware that is disguised as legitimate software.

security

Trunk-Based Development

A version control management strategy where developers merge small, frequent updates to a single branch, typically called 'main' or 'trunk'.

dev

Trunking

A method of carrying traffic for multiple VLANs over a single physical link between two network devices.

network

Trusted Platform Module (TPM)(TPM)

A specialized chip on a computer's motherboard that provides hardware-based security functions, such as secure key storage and platform integrity measurement.

security

t-SNE(t-SNE)

t-Distributed Stochastic Neighbor Embedding; a non-linear dimensionality reduction technique particularly well-suited for visualizing high-dimensional datasets.

ai

TSV(TSV)

Through-Silicon Via; a vertical electrical connection that passes completely through a silicon wafer or die.

hardware

TTL(TTL)

A value in an IP packet that limits the number of hops the packet can take before being discarded.

network

Tufte's Principles

A set of data visualization guidelines proposed by Edward Tufte, emphasizing clarity, precision, and efficiency.

ai

Turing Test

A test of a machine's ability to exhibit intelligent behavior equivalent to, or indistinguishable from, that of a human.

ai

Twelve-Factor App

A methodology for building software-as-a-service (SaaS) applications that are portable, resilient, and scalable in cloud environments.

cloud

Twisted Pair

A type of wiring in which two conductors of a single circuit are twisted together for the purposes of canceling out electromagnetic interference.

network

TypeScript(TS)

A statically typed superset of JavaScript that adds optional type definitions, improving error detection and developer tooling.

dev

U

UDP(UDP)

A simple, connectionless communication protocol that offers a limited amount of service when exchanging messages.

network

UEFI Security(UEFI)

The security features and protocols associated with the Unified Extensible Firmware Interface, the modern replacement for the legacy BIOS.

security

UMAP(UMAP)

Uniform Manifold Approximation and Projection; a dimension reduction technique used for visualization and non-linear dimension reduction.

ai

Underfitting

A situation where an AI model is too simple to capture the underlying patterns in the training data.

ai

Under-sampling

A technique used to adjust the class distribution of a data set by reducing the number of instances in the majority class.

ai

Unicast

The most common form of network communication, where data is sent from one specific sender to one specific recipient.

network

Unit Testing

A level of software testing where individual units or components of a software are tested in isolation.

dev

Universal Serial Bus(USB)

An industry standard that establishes specifications for cables, connectors, and protocols for connection, communication, and power supply between computers and peripherals.

hardware

Unsupervised Learning

A type of machine learning where the model is trained on unlabeled data and must find hidden patterns or structures within the input.

ai

User Timing API

A browser API that allows developers to measure the performance of specific parts of their application using high-precision timestamps.

web

Utility Token

A type of token that provides users with access to a product or service within a specific ecosystem.

web

V

Validation Set

A subset of data used during the training process to tune hyperparameters and provide an unbiased evaluation of a model while it is being built.

ai

Validator

A node in a proof-of-stake or other consensus-based network that is responsible for verifying transactions and proposing new blocks.

web

Value Stream Mapping(VSM)

A lean management method for analyzing the current state and designing a future state for the series of events that take a product or service from its beginning through to the customer.

dev

Variance

A measure of how far a set of numbers is spread out from their average value.

ai

Variational Autoencoder(VAE)

A type of generative model that learns to map input data to a probabilistic latent space, allowing for the generation of new, similar data points.

ai

Vector Database

A specialized database designed to store and query high-dimensional vector embeddings, commonly used in RAG systems.

ai

Vector Processor

A CPU designed to handle mathematical operations on entire vectors (arrays of data) in a single instruction.

hardware

Verifiable Credentials(VC)

A digital standard for credentials that are cryptographically secure, privacy-preserving, and machine-verifiable.

web

Version Control System(VCS)

A software tool that helps software teams manage changes to source code over time.

dev

Vertical Pod Autoscaler(VPA)

A Kubernetes feature that automatically sets the CPU and memory reservations for Pods based on their actual usage.

cloud

VGA(VGA)

Video Graphics Array; an analog display standard for computer monitors.

hardware

Vibration API

A browser API that allows web applications to provide haptic feedback by vibrating the user's device.

web

Victim Cache

A small, specialized cache used to store blocks that have been recently evicted from the main cache due to a conflict or capacity miss.

hardware

Virtual CISO (vCISO)(vCISO)

An outsourced security practitioner who provides the expertise and leadership of a Chief Information Security Officer on a part-time or project basis.

security

Virtual Machine(VM)

A software-based emulation of a physical computer that runs an operating system and applications.

cloud

Virtual Memory

A memory management technique that provides an 'idealized' view of storage to applications, using both RAM and disk space.

hardware

Virtual Private Cloud(VPC)

A private, isolated section of a public cloud where users can launch resources in a virtual network.

cloud

Virtual Private Network(VPN)

A secure, encrypted connection between two networks or between an individual user and a network over the public internet.

cloud

Virtual RAN(vRAN)

A way of implementing the Radio Access Network (RAN) where some or all of the baseband functions are run as software on general-purpose servers.

network

Virtual Reality (VR) in Web3(VR)

The use of immersive computer-generated environments within decentralized ecosystems, where users can interact with 3D spaces and own virtual assets.

web

Vishing

A form of phishing that uses voice calls or VoIP (Voice over IP) to manipulate victims into disclosing sensitive information.

security

Vision Transformer(ViT)

An architecture that applies the Transformer model, originally designed for NLP, to image recognition tasks by treating image patches as tokens.

ai

Vite

A modern, lightning-fast frontend build tool that significantly improves the developer experience.

web

VLAN(VLAN)

A logical subnetwork that groups together a collection of devices from different physical LANs.

network

VLIW(VLIW)

Very Long Instruction Word; a CPU architecture where the compiler bundles multiple independent operations into a single, very long instruction.

hardware

VLSI(VLSI)

Very Large Scale Integration; the process of creating an integrated circuit by combining millions or billions of transistors onto a single chip.

hardware

VMware vSphere

A commercial enterprise-grade virtualization platform for building and managing cloud infrastructures.

cloud

Von Neumann Architecture

A computer architecture based on the concept where program instructions and data are stored in the same memory unit.

hardware

VRRP(VRRP)

An open-standard redundancy protocol that provides high availability for default gateways, similar to HSRP.

network

VTP(VTP)

A Cisco proprietary protocol used to synchronize VLAN configurations across multiple switches in a network.

network

Vue.js

A progressive JavaScript framework for building user interfaces, designed to be incrementally adoptable.

web

Vulnerability Assessment

The process of identifying, quantifying, and prioritizing vulnerabilities in a system.

security

Vulnerability Disclosure Program (VDP)(VDP)

A formal process established by an organization to allow security researchers to safely and legally report security vulnerabilities they find in the organization's products or services.

security

Vulnerability Management

The continuous process of identifying, evaluating, treating, and reporting on security vulnerabilities in systems and software.

security

W

Wafer

A thin slice of semiconductor material used as the substrate for the fabrication of integrated circuits.

hardware

WASM in Blockchain(WASM)

WebAssembly; a binary instruction format that allows high-performance code to run in blockchain environments.

web

Waterfall Model

A linear and sequential approach to software development where each phase must be completed before the next one begins.

dev

Weaviate

An open-source vector database that allows you to store data objects and vector embeddings from your favorite ML-models.

ai

Web3

An idea for a new iteration of the World Wide Web which incorporates concepts such as decentralization, blockchain technologies, and token-based economics.

web

Web Application Firewall(WAF)

A specific type of firewall that filters, monitors, and blocks HTTP traffic to and from a web application.

network

WebAssembly(Wasm)

A binary instruction format for a stack-based virtual machine, designed as a portable compilation target for programming languages.

web

WebAuthn

A web standard published by the W3C that allows for passwordless authentication using public-key cryptography.

security

Web Bluetooth API

A browser API that allows web applications to communicate with nearby Bluetooth Low Energy (BLE) devices.

web

Web Components

A suite of different technologies allowing you to create reusable custom elements with their functionality encapsulated away from the rest of your code.

web

WebGL

A JavaScript API for rendering high-performance interactive 3D and 2D graphics within any compatible web browser without the use of plug-ins.

web

WebGPU

A future web standard and JavaScript API for accelerated graphics and machine learning, designed to succeed WebGL.

web