S
Software Composition Analysis (SCA)(SCA)
The process of identifying and managing the security and license risks associated with third-party open-source libraries and dependencies.
securitySoftware-Defined Networking(SDN)
An architecture that decouples the network control plane from the forwarding plane, enabling centralized and programmable network management.
networkSoftware-Defined Radio(SDR)
A radio communication system where components that have been traditionally implemented in hardware are instead implemented by means of software.
networkSoftware Development Life Cycle(SDLC)
A structured process used by the software industry to design, develop, and test high-quality software.
devSolana(SOL)
A high-performance Layer 1 blockchain known for its fast transaction speeds and low costs.
webSolid
A project led by Sir Tim Berners-Lee that aims to radically change the way web applications work today, resulting in true data ownership.
webSolidJS
A declarative, efficient, and flexible JavaScript library for building user interfaces, known for its extreme performance.
webSOLID Principles
A set of five design principles intended to make software designs more understandable, flexible, and maintainable.
devSolid-State Drive(SSD)
A storage device that uses integrated circuit assemblies to store data persistently, typically using flash memory.
hardwareSoulbound Token(SBT)
Non-transferable NFTs that represent a person's identity, achievements, or affiliations within a decentralized ecosystem.
webSouthbridge
The chip in a chipset that manages slower peripheral communications like USB, Ethernet, and storage interfaces.
hardwareSpear Phishing
A highly targeted phishing attack that uses personal information to trick a specific individual or organization.
securitySpeculative Execution
An optimization technique where a computer system performs some task that may not be needed.
hardwareSpeech-to-Text(STT)
The process of converting spoken language into written text, also known as Automatic Speech Recognition (ASR).
aiSpeed Index
A performance metric that measures how quickly the contents of a page are visibly populated.
webSplunk
A commercial software platform for searching, monitoring, and analyzing machine-generated big data via a Web-style interface.
cloudSpot Instances
Excess cloud compute capacity available at steep discounts, which can be reclaimed by the provider with very short notice.
cloudSpyware
Malware that secretly monitors and collects information about a user's activities without their knowledge or consent.
securitySQL Injection(SQLi)
A type of vulnerability where an attacker can interfere with the queries that an application makes to its database.
securityStablecoin
A cryptocurrency designed to maintain a stable value by being pegged to a reserve asset, such as a fiat currency.
webStaking
The act of locking up cryptocurrency tokens to support the operation and security of a proof-of-stake blockchain network.
webStaking Pool
A group of token holders who combine their resources to increase their chances of earning staking rewards.
webStandard Deviation(SD)
A measure of the amount of variation or dispersion of a set of values, expressed in the same units as the data.
aiStar Schema
The simplest style of data mart schema and is the approach most widely used to develop data warehouses and dimensional data marts.
aiStar Topology
A network topology where every peripheral node is connected to a central node, usually a switch or hub.
networkState Channel
A scaling solution that allows participants to conduct an unlimited number of transactions off-chain, only submitting the final state to the blockchain.
webStateful Application
An application that requires the server to remember client data or session state across multiple requests.
cloudStatefulSet
A Kubernetes workload object used to manage stateful applications.
cloudStateless Application
An application that does not store client data or session state on the server between requests.
cloudStatic Application Security Testing (SAST)(SAST)
A security testing methodology that analyzes an application's source code, bytecode, or binaries for vulnerabilities without executing the program.
securityStatic Code Analysis
The analysis of computer software that is performed without actually executing programs.
devStatic RAM(SRAM)
A type of random-access memory that uses latching circuitry to store each bit, making it faster but more expensive than DRAM.
hardwareStatic Routing
A process where network administrators manually configure the paths that data packets take through a network.
networkStatic Site Generation(SSG)
The process of generating a full static HTML website based on raw data and a set of templates at build time.
webStationary Process
A stochastic process whose unconditional joint probability distribution does not change when shifted in time.
aiStatistical Analysis
The process of collecting, exploring, and presenting large amounts of data to discover underlying patterns and trends.
aiStep Functions/Orchestration
A service used to coordinate multiple serverless functions and other cloud services into complex, multi-step workflows.
cloudStochastic Gradient Descent(SGD)
An iterative optimization algorithm used to minimize a loss function by updating model parameters using a small, random subset of the training data.
aiStorage Area Network(SAN)
A specialized, high-speed network that provides block-level network access to storage.
networkStorage Tiers
Different classes of storage offered by cloud providers, optimized for various access patterns, performance requirements, and costs.
cloudStore Buffer
A small buffer that holds 'store' (write) operations until they are ready to be committed to the cache or main memory.
hardwareSTP(STP)
A network protocol that ensures a loop-free topology for Ethernet networks by disabling redundant paths.
networkStrangler Fig Pattern
An architectural pattern for incrementally migrating a legacy system by gradually replacing specific pieces of functionality with new services.
devStrategy Pattern
A behavioral design pattern that lets you define a family of algorithms, put each of them into a separate class, and make their objects interchangeable.
devStratified Sampling
A sampling method that involves dividing a population into smaller sub-groups known as strata.
aiStreamlit
An open-source Python library that makes it easy to create and share custom web apps for machine learning and data science.
aiStream Processing
The real-time processing of continuous streams of data as they are generated.
cloudStress Testing
A type of performance testing that pushes a system beyond its normal operating limits to see how it fails and how it recovers.
devSTRIDE Model(STRIDE)
A mnemonic used in threat modeling to categorize different types of security threats.
securityStructural Patterns
Design patterns that explain how to assemble objects and classes into larger structures while keeping these structures flexible and efficient.
devStubbing
The practice of providing 'canned' responses to calls made during a test, usually to provide data to the code being tested.
devSubnet
A logical subdivision of an IP network, typically within a Virtual Private Cloud (VPC).
cloudSubnet Mask
A 32-bit number that masks an IP address and divides the IP address into network address and host address.
networkSuperscalar Architecture
A CPU design that can execute more than one instruction per clock cycle by having multiple execution units.
hardwareSuperset
A modern, enterprise-ready business intelligence web application.
aiSupervised Learning
A type of machine learning where the model is trained on a labeled dataset, meaning each training example is paired with an output label.
aiSupply Chain Attack
A cyberattack that targets a vulnerability in a third-party dependency or service to gain access to a larger organization.
securitySupply Chain Security
The process of securing the entire lifecycle of a product, from raw materials and components to manufacturing, distribution, and software dependencies.
securitySupport Vector Machine(SVM)
A supervised learning model used for classification and regression that finds the optimal hyperplane to separate data points of different classes.
aiSurvival Analysis
A branch of statistics for analyzing the expected duration of time until one or more events happen.
aiSvelte
A radical new approach to building user interfaces that shifts the work from the browser to a compile step.
webSVG(SVG)
An XML-based vector image format for two-dimensional graphics with support for interactivity and animation.
webSVN
Apache Subversion (SVN) is a centralized version control system.
devSwarm Intelligence
The collective behavior of decentralized, self-organized systems, typically inspired by nature (e.g., ant colonies, bird flocking).
aiSwitch
A networking device that connects devices on a computer network by using packet switching to receive and forward data to the destination device.
networkSybil Attack
A security threat where an attacker creates multiple fake identities to gain disproportionate influence over a network.
webSymmetric Encryption
A type of encryption where the same key is used for both encrypting and decrypting the data.
securitySymmetric Multiprocessing(SMP)
A multiprocessor computer architecture where two or more identical processors connect to a single, shared main memory.
hardwareSynchronous DRAM(SDRAM)
A type of DRAM that is synchronized with the system bus, allowing for higher speeds and better efficiency.
hardwareSynthetic Data
Artificially generated data that mimics the statistical properties of real-world data without containing any information from actual individuals.
aiSyslog
A standard for message logging that allows a device to send event notifications to a central server.
networkSystem on a Chip(SoC)
An integrated circuit that integrates all or most components of a computer or other electronic system into a single chip.
hardwareSystem Testing
A level of software testing where a complete and integrated software is tested to evaluate the system's compliance with its specified requirements.
devT
T5(T5)
Text-to-Text Transfer Transformer; a model that treats every NLP task as a text-to-text problem, from translation to classification.
aiTableau
A powerful and fastest growing data visualization tool used in the Business Intelligence Industry.
aiTailwind CSS
A utility-first CSS framework for rapidly building custom user interfaces without leaving your HTML.
webTally
A governance platform that provides tools for DAOs to manage on-chain voting, proposals, and delegate power.
webTCP(TCP)
A core protocol of the Internet Protocol Suite that provides reliable, ordered, and error-checked delivery of a stream of octets between applications.
networkTcpdump
A common command-line packet analyzer that allows users to display TCP/IP and other packets being transmitted or received over a network.
networkTCP/IP Model
A four-layer conceptual model used for the internet and similar networks, focusing on the protocols that enable communication.
networkTechnical Debt
A concept in software development that reflects the implied cost of additional rework caused by choosing an easy (and fast) solution now instead of using a better approach that would take longer.
devTemperature
A hyperparameter that controls the randomness or creativity of an AI model's output.
aiTendermint
A software for securely and consistently replicating an application on many machines, serving as a core consensus engine.
webTensor Processing Unit(TPU)
An AI-accelerator application-specific integrated circuit (ASIC) developed by Google specifically for machine learning.
hardwareTeradata
A multi-cloud data platform company for enterprise analytics.
aiTerraform
An open-source infrastructure as code (IaC) tool that allows developers to define and provision cloud infrastructure using a declarative configuration language.
cloudTerraform for Networking
The use of HashiCorp Terraform to provision and manage network infrastructure as code.
networkTest Double
A generic term for any object that stands in for a real object during a test.
devTest-Driven Development(TDD)
A software development process where developers write a failing automated test case before writing the minimum amount of code to pass that test.
devTestnet
An alternative blockchain used by developers for testing applications and protocol upgrades without risking real funds.
webTest Set
A final subset of data, never seen by the model during training or tuning, used to provide an unbiased evaluation of the final model's performance.
aiText-to-Speech(TTS)
The artificial production of human speech from written text, also known as speech synthesis.
aiThermal Design Power(TDP)
The maximum amount of heat a computer chip is expected to generate under a theoretical 'real-world' workload.
hardwareThermal Paste
A thermally conductive compound used to fill the microscopic air gaps between a processor and its heat sink.
hardwareThread Level Parallelism(TLP)
The ability of a system to execute multiple independent threads of execution simultaneously.
hardwareThreat Intelligence
Evidence-based knowledge about existing or emerging threats that helps organizations make informed security decisions.
securityThreat Modeling
A structured process for identifying, quantifying, and addressing potential security threats to a system or application during the design phase.
securityThree-way Handshake
The process used by TCP to establish a reliable connection between a client and a server.
networkThroughput
The actual amount of data successfully transferred over a network in a given time period.
networkThunderbolt
A high-speed hardware interface developed by Intel and Apple that combines PCIe and DisplayPort signals into one serial signal.
hardwareTime Series Analysis
A specific way of analyzing a sequence of data points collected over an interval of time.
aiTime to First Byte(TTFB)
A metric that measures the time between the request for a resource and when the first byte of a response begins to arrive.
webTime to Interactive(TTI)
A performance metric that measures how long it takes for a page to become fully interactive and capable of responding quickly to user input.
webTinyML
A field of machine learning focused on developing models that can run on extremely low-power microcontrollers and embedded systems.
aiToken
A digital asset that exists on an existing blockchain, representing a utility, asset, or right.
webTokenization
The process of breaking down text into smaller units called tokens that an AI model can process.
aiTokenomics
The study of the economic systems and incentives that govern a cryptocurrency or token ecosystem.
webTotal Blocking Time(TBT)
A performance metric that measures the total amount of time that a page is blocked from responding to user input.
webTotal Value Locked(TVL)
A metric representing the total amount of assets currently staked or deposited in a DeFi protocol.
webTrace Cache
A specialized instruction cache that stores sequences of decoded instructions (micro-ops) in their actual execution order.
hardwareTraceroute
A diagnostic tool used to track the path a packet takes across an IP network and measure the transit delays of each hop.
networkTracing
A method of tracking a single request as it moves through various services in a distributed system.
cloudTraffic Policing
A QoS technique that drops or re-marks packets that exceed a defined bandwidth limit.
networkTraffic Shaping
A QoS technique that delays packets to ensure that network traffic stays within a defined bandwidth limit.
networkTraining Data
The dataset used to teach an AI model patterns and relationships during the training phase.
aiTransaction(TX)
An agreement between a buyer and a seller to exchange an asset, recorded on the blockchain.
webTransaction Fee
A small amount of cryptocurrency paid by the sender to have their transaction processed and included in a block.
webTransfer Learning
A machine learning technique where a model developed for one task is reused as the starting point for a model on a second, related task.
aiTransformer Architecture
A neural network architecture that uses self-attention mechanisms to process sequential data, forming the basis for most modern LLMs.
aiTransistor
A semiconductor device used to amplify or switch electrical signals and power.
hardwareTransit Gateway
A network hub that connects multiple Virtual Private Clouds (VPCs) and on-premises networks.
cloudTranslation Lookaside Buffer(TLB)
A specialized cache used by the Memory Management Unit (MMU) to speed up virtual-to-physical address translation.
hardwareTransparency
The property of public blockchains where all transactions and data are visible to anyone with an internet connection.
webTranspilation
The process of taking source code written in one language and transforming it into another language that has a similar level of abstraction.
webTransport Layer
The fourth layer of the OSI model, responsible for end-to-end communication, error recovery, and flow control.
networkTransport Layer Security(TLS)
A cryptographic protocol designed to provide communications security over a computer network.
securityTravis CI
A hosted continuous integration service used to build and test software projects hosted on GitHub and Bitbucket.
cloudTreemap
A visualization that displays hierarchical data as a set of nested rectangles.
aiTree of Thoughts(ToT)
An advanced prompting framework that allows LLMs to explore multiple reasoning paths simultaneously and evaluate them to find the best solution.
aiTree Shaking
A form of dead code elimination that removes unused code from the final bundle.
webTrend Analysis
The practice of collecting information and attempting to spot a pattern.
aiTrojan Horse
A type of malware that is disguised as legitimate software.
securityTrunk-Based Development
A version control management strategy where developers merge small, frequent updates to a single branch, typically called 'main' or 'trunk'.
devTrunking
A method of carrying traffic for multiple VLANs over a single physical link between two network devices.
networkTrusted Platform Module (TPM)(TPM)
A specialized chip on a computer's motherboard that provides hardware-based security functions, such as secure key storage and platform integrity measurement.
securityt-SNE(t-SNE)
t-Distributed Stochastic Neighbor Embedding; a non-linear dimensionality reduction technique particularly well-suited for visualizing high-dimensional datasets.
aiTSV(TSV)
Through-Silicon Via; a vertical electrical connection that passes completely through a silicon wafer or die.
hardwareTTL(TTL)
A value in an IP packet that limits the number of hops the packet can take before being discarded.
networkTufte's Principles
A set of data visualization guidelines proposed by Edward Tufte, emphasizing clarity, precision, and efficiency.
aiTuring Test
A test of a machine's ability to exhibit intelligent behavior equivalent to, or indistinguishable from, that of a human.
aiTwelve-Factor App
A methodology for building software-as-a-service (SaaS) applications that are portable, resilient, and scalable in cloud environments.
cloudTwisted Pair
A type of wiring in which two conductors of a single circuit are twisted together for the purposes of canceling out electromagnetic interference.
networkTypeScript(TS)
A statically typed superset of JavaScript that adds optional type definitions, improving error detection and developer tooling.
devU
UDP(UDP)
A simple, connectionless communication protocol that offers a limited amount of service when exchanging messages.
networkUEFI Security(UEFI)
The security features and protocols associated with the Unified Extensible Firmware Interface, the modern replacement for the legacy BIOS.
securityUMAP(UMAP)
Uniform Manifold Approximation and Projection; a dimension reduction technique used for visualization and non-linear dimension reduction.
aiUnderfitting
A situation where an AI model is too simple to capture the underlying patterns in the training data.
aiUnder-sampling
A technique used to adjust the class distribution of a data set by reducing the number of instances in the majority class.
aiUnicast
The most common form of network communication, where data is sent from one specific sender to one specific recipient.
networkUnit Testing
A level of software testing where individual units or components of a software are tested in isolation.
devUniversal Serial Bus(USB)
An industry standard that establishes specifications for cables, connectors, and protocols for connection, communication, and power supply between computers and peripherals.
hardwareUnsupervised Learning
A type of machine learning where the model is trained on unlabeled data and must find hidden patterns or structures within the input.
aiUser Timing API
A browser API that allows developers to measure the performance of specific parts of their application using high-precision timestamps.
webUtility Token
A type of token that provides users with access to a product or service within a specific ecosystem.
webV
Validation Set
A subset of data used during the training process to tune hyperparameters and provide an unbiased evaluation of a model while it is being built.
aiValidator
A node in a proof-of-stake or other consensus-based network that is responsible for verifying transactions and proposing new blocks.
webValue Stream Mapping(VSM)
A lean management method for analyzing the current state and designing a future state for the series of events that take a product or service from its beginning through to the customer.
devVariance
A measure of how far a set of numbers is spread out from their average value.
aiVariational Autoencoder(VAE)
A type of generative model that learns to map input data to a probabilistic latent space, allowing for the generation of new, similar data points.
aiVector Database
A specialized database designed to store and query high-dimensional vector embeddings, commonly used in RAG systems.
aiVector Processor
A CPU designed to handle mathematical operations on entire vectors (arrays of data) in a single instruction.
hardwareVerifiable Credentials(VC)
A digital standard for credentials that are cryptographically secure, privacy-preserving, and machine-verifiable.
webVersion Control System(VCS)
A software tool that helps software teams manage changes to source code over time.
devVertical Pod Autoscaler(VPA)
A Kubernetes feature that automatically sets the CPU and memory reservations for Pods based on their actual usage.
cloudVGA(VGA)
Video Graphics Array; an analog display standard for computer monitors.
hardwareVibration API
A browser API that allows web applications to provide haptic feedback by vibrating the user's device.
webVictim Cache
A small, specialized cache used to store blocks that have been recently evicted from the main cache due to a conflict or capacity miss.
hardwareVirtual CISO (vCISO)(vCISO)
An outsourced security practitioner who provides the expertise and leadership of a Chief Information Security Officer on a part-time or project basis.
securityVirtual Machine(VM)
A software-based emulation of a physical computer that runs an operating system and applications.
cloudVirtual Memory
A memory management technique that provides an 'idealized' view of storage to applications, using both RAM and disk space.
hardwareVirtual Private Cloud(VPC)
A private, isolated section of a public cloud where users can launch resources in a virtual network.
cloudVirtual Private Network(VPN)
A secure, encrypted connection between two networks or between an individual user and a network over the public internet.
cloudVirtual RAN(vRAN)
A way of implementing the Radio Access Network (RAN) where some or all of the baseband functions are run as software on general-purpose servers.
networkVirtual Reality (VR) in Web3(VR)
The use of immersive computer-generated environments within decentralized ecosystems, where users can interact with 3D spaces and own virtual assets.
webVishing
A form of phishing that uses voice calls or VoIP (Voice over IP) to manipulate victims into disclosing sensitive information.
securityVision Transformer(ViT)
An architecture that applies the Transformer model, originally designed for NLP, to image recognition tasks by treating image patches as tokens.
aiVite
A modern, lightning-fast frontend build tool that significantly improves the developer experience.
webVLAN(VLAN)
A logical subnetwork that groups together a collection of devices from different physical LANs.
networkVLIW(VLIW)
Very Long Instruction Word; a CPU architecture where the compiler bundles multiple independent operations into a single, very long instruction.
hardwareVLSI(VLSI)
Very Large Scale Integration; the process of creating an integrated circuit by combining millions or billions of transistors onto a single chip.
hardwareVMware vSphere
A commercial enterprise-grade virtualization platform for building and managing cloud infrastructures.
cloudVon Neumann Architecture
A computer architecture based on the concept where program instructions and data are stored in the same memory unit.
hardwareVRRP(VRRP)
An open-standard redundancy protocol that provides high availability for default gateways, similar to HSRP.
networkVTP(VTP)
A Cisco proprietary protocol used to synchronize VLAN configurations across multiple switches in a network.
networkVue.js
A progressive JavaScript framework for building user interfaces, designed to be incrementally adoptable.
webVulnerability Assessment
The process of identifying, quantifying, and prioritizing vulnerabilities in a system.
securityVulnerability Disclosure Program (VDP)(VDP)
A formal process established by an organization to allow security researchers to safely and legally report security vulnerabilities they find in the organization's products or services.
securityVulnerability Management
The continuous process of identifying, evaluating, treating, and reporting on security vulnerabilities in systems and software.
securityW
Wafer
A thin slice of semiconductor material used as the substrate for the fabrication of integrated circuits.
hardwareWASM in Blockchain(WASM)
WebAssembly; a binary instruction format that allows high-performance code to run in blockchain environments.
webWaterfall Model
A linear and sequential approach to software development where each phase must be completed before the next one begins.
devWeaviate
An open-source vector database that allows you to store data objects and vector embeddings from your favorite ML-models.
aiWeb3
An idea for a new iteration of the World Wide Web which incorporates concepts such as decentralization, blockchain technologies, and token-based economics.
webWeb Application Firewall(WAF)
A specific type of firewall that filters, monitors, and blocks HTTP traffic to and from a web application.
networkWebAssembly(Wasm)
A binary instruction format for a stack-based virtual machine, designed as a portable compilation target for programming languages.
webWebAuthn
A web standard published by the W3C that allows for passwordless authentication using public-key cryptography.
securityWeb Bluetooth API
A browser API that allows web applications to communicate with nearby Bluetooth Low Energy (BLE) devices.
webWeb Components
A suite of different technologies allowing you to create reusable custom elements with their functionality encapsulated away from the rest of your code.
webWebGL
A JavaScript API for rendering high-performance interactive 3D and 2D graphics within any compatible web browser without the use of plug-ins.
webWebGPU
A future web standard and JavaScript API for accelerated graphics and machine learning, designed to succeed WebGL.
web