GlossaryTechnology Glossary
Comprehensive definitions of technology terms, IT concepts, and industry jargon.
From A to Z - understand the language of technology.
259 terms found
Acceptance Testing
TestingA formal testing process that determines whether a system satisfies business requirements and is acceptable for delivery to end users.
Read More →Accessibility Testing
TestingTesting that ensures software applications are usable by people with disabilities, complying with accessibility standards and guidelines.
Read More →Agile
MethodologyA project management and software development methodology that emphasizes iterative development, collaboration, and flexibility in responding to change.
Read More →A fully managed service that makes it easy to create, publish, maintain, monitor, and secure APIs at any scale for backend services.
Read More →A fast content delivery network (CDN) service that securely delivers data, videos, applications, and APIs to customers globally with low latency.
Read More →A monitoring and observability service that provides data and actionable insights to monitor applications, respond to system-wide performance changes, and optimize resource utilization.
Read More →A service that provides authentication, authorization, and user management for web and mobile apps, supporting sign-up and sign-in with social identity providers.
Read More →A key-value and document database that delivers single-digit millisecond performance at any scale, fully managed NoSQL database service.
Read More →Amazon EC2
AWSElastic Compute Cloud - A web service that provides secure, resizable compute capacity in the cloud, designed to make web-scale cloud computing easier.
Read More →Amazon ECS
AWSElastic Container Service - A fully managed container orchestration service that makes it easy to deploy, manage, and scale containerized applications.
Read More →Amazon EKS
AWSElastic Kubernetes Service - A managed service that makes it easy to run Kubernetes on AWS without needing to install and operate your own Kubernetes control plane.
Read More →A web service that makes it easy to deploy, operate, and scale an in-memory cache in the cloud, supporting Redis and Memcached engines.
Read More →A serverless compute service that lets you run code without provisioning or managing servers, paying only for the compute time consumed.
Read More →Amazon RDS
AWSRelational Database Service - A managed database service that makes it easy to set up, operate, and scale a relational database in the cloud.
Read More →A scalable cloud Domain Name System (DNS) web service designed to route end users to Internet applications by translating domain names into IP addresses.
Read More →Amazon S3
AWSSimple Storage Service - An object storage service that offers industry-leading scalability, data availability, security, and performance.
Read More →Amazon SNS
AWSSimple Notification Service - A fully managed messaging service for both application-to-application and application-to-person communication.
Read More →Amazon SQS
AWSSimple Queue Service - A fully managed message queuing service that enables you to decouple and scale microservices, distributed systems, and serverless applications.
Read More →Amazon VPC
AWSVirtual Private Cloud - A service that lets you launch AWS resources in a logically isolated virtual network that you define.
Read More →Angular
DevelopmentA TypeScript-based open-source web application framework developed by Google for building single-page applications with a component-based architecture.
Read More →Ansible
DevOpsAn open-source automation tool that automates software provisioning, configuration management, and application deployment using simple YAML syntax.
Read More →Antivirus
SecuritySoftware designed to detect and destroy computer viruses and other malicious software, providing real-time protection against threats.
Read More →Apache
InfrastructureAn open-source cross-platform web server software that has been the most popular web server on the Internet since 1996.
Read More →API
DevelopmentApplication Programming Interface - A set of protocols, routines, and tools for building software applications that specifies how software components should interact.
Read More →API Gateway
MicroservicesA server that acts as an API front-end, receiving API requests, enforcing throttling and security policies, passing requests to the back-end service, and passing the response back to the requester.
Read More →API Testing
TestingA type of software testing that involves testing Application Programming Interfaces directly to determine if they meet expectations for functionality and reliability.
Read More →The simulation of human intelligence in machines that are programmed to think and learn like humans, encompassing machine learning, natural language processing, and computer vision.
Read More →Asana
Project ManagementA web and mobile application designed to help teams organize, track, and manage their work, providing project management capabilities for teams of all sizes.
Read More →Attention Mechanism
AI/MLA technique in neural networks that allows models to focus on specific parts of input data when making predictions, crucial for transformer architectures.
Read More →Autoencoder
AI/MLA type of neural network used for unsupervised learning that learns to compress data into a lower-dimensional representation and then reconstruct the original input.
Read More →Automated Testing
TestingThe use of software tools and scripts to execute tests automatically, comparing actual outcomes with expected outcomes without manual intervention.
Read More →AWS
CloudAmazon Web Services - A comprehensive cloud computing platform that provides on-demand cloud computing services including computing power, database storage, and content delivery.
Read More →Backpropagation
AI/MLA method used in training neural networks that calculates gradients by propagating errors backward through the network to update weights and minimize loss.
Read More →Bash
DevelopmentBourne Again Shell - A Unix shell and command language that provides a command-line interface for interacting with the operating system through scripting.
Read More →Behavior-Driven Development
TestingAn agile software development process that encourages collaboration between developers, QA, and business participants through executable specifications.
Read More →BERT
AI/MLBidirectional Encoder Representations from Transformers - A transformer-based model designed to understand the context of words in search queries and documents.
Read More →Black Box Testing
TestingA software testing method where the functionality is tested without knowledge of the internal structure, implementation details, or internal paths.
Read More →Blockchain
TechnologyA distributed ledger technology that maintains a continuously growing list of records, called blocks, which are linked and secured using cryptography.
Read More →Blue-Green Deployment
DevOpsA deployment strategy that reduces downtime and risk by running two identical production environments called Blue and Green, switching traffic between them.
Read More →Buffer Overflow
SecurityA programming error that occurs when more data is written to a buffer than it can hold, potentially allowing attackers to execute malicious code.
Read More →C#
DevelopmentA general-purpose, multi-paradigm programming language developed by Microsoft as part of its .NET initiative, designed for building applications on the .NET platform.
Read More →Canary Deployment
DevOpsA deployment strategy where a new version is gradually rolled out to a small subset of users before being rolled out to the entire infrastructure.
Read More →CDN
InfrastructureContent Delivery Network - A geographically distributed group of servers that work together to provide fast delivery of internet content by caching content closer to users.
Read More →CI/CD
DevOpsContinuous Integration/Continuous Deployment - A method to frequently deliver apps by introducing automation into the stages of app development.
Read More →Circuit Breaker
MicroservicesA design pattern used in microservices to detect failures and encapsulates the logic of preventing a failure from constantly recurring during maintenance, temporary external system failure, or unexpected system difficulties.
Read More →Clojure
DevelopmentA dynamic, general-purpose programming language that combines the approachability and interactive development of a scripting language with an efficient and robust infrastructure for multithreaded programming.
Read More →Cloud Computing
CloudThe delivery of computing services including servers, storage, databases, networking, software, analytics, and intelligence over the Internet.
Read More →Compatibility Testing
TestingTesting that checks whether software can run on different hardware, operating systems, applications, network environments, or mobile devices.
Read More →Compliance Framework
SecurityA structured set of guidelines that detail an organization's processes for maintaining accordance with established regulations, specifications, or legislation.
Read More →Computer Vision
AI/MLA field of AI that trains computers to interpret and understand the visual world, enabling machines to identify and analyze visual content in images and videos.
Read More →ConfigMap
KubernetesA Kubernetes object used to store non-confidential data in key-value pairs, allowing configuration data to be separated from application code.
Read More →Confluence
CollaborationA web-based corporate wiki developed by Atlassian that enables teams to collaborate and share knowledge efficiently, integrating with other Atlassian products.
Read More →Consul
InfrastructureA service mesh solution providing service discovery, configuration, and segmentation functionality with a distributed, highly available architecture.
Read More →Container
DevOpsA lightweight, standalone, executable package that includes everything needed to run an application: code, runtime, system tools, libraries, and settings.
Read More →A type of deep neural network particularly effective for image recognition tasks, using convolutional layers to detect features like edges, shapes, and patterns.
Read More →Cordova
DevelopmentA mobile application development framework that enables software programmers to build applications for mobile devices using CSS3, HTML5, and JavaScript.
Read More →CQRS
ArchitectureCommand Query Responsibility Segregation - A pattern that separates read and update operations for a data store, using different models to update and read data.
Read More →Cross-Browser Testing
TestingTesting that ensures web applications work correctly across different web browsers and browser versions.
Read More →Cross-Site Request Forgery
SecurityAn attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticated.
Read More →Cross-Site Scripting
SecurityA type of security vulnerability typically found in web applications that enables attackers to inject client-side scripts into web pages viewed by other users.
Read More →Cross-validation
AI/MLA statistical method used to estimate the performance of machine learning models by partitioning data into subsets, training on some and testing on others.
Read More →Cypress
DevelopmentA next generation front end testing tool built for the modern web, enabling developers to write end-to-end tests, integration tests, and unit tests.
Read More →Dart
DevelopmentA client-optimized programming language for fast apps on any platform, developed by Google and used primarily for building mobile, desktop, server, and web applications with Flutter.
Read More →Data Loss Prevention
SecurityA strategy for making sure that end users do not send sensitive or critical information outside the corporate network, protecting data in motion, at rest, and in use.
Read More →Database Testing
TestingTesting that checks database operations, triggers, procedures, and functions for data validity, data integrity, performance, and security.
Read More →Datadog
MonitoringA monitoring and analytics platform for developers, IT operations teams, and business users in the cloud age, providing full-stack observability across applications and infrastructure.
Read More →DDoS Attack
SecurityDistributed Denial of Service - A malicious attempt to disrupt normal traffic of a targeted server by overwhelming it with a flood of internet traffic.
Read More →Deep Learning
AI/MLA subset of machine learning that uses neural networks with multiple layers to model and understand complex patterns in data, enabling advanced AI capabilities.
Read More →HTTP method used to delete the specified resource from the server. It removes the resource identified by the URL.
Read More →Deployment
KubernetesA Kubernetes resource that provides declarative updates for Pods and ReplicaSets, managing the rollout of application updates.
Read More →DevOps
MethodologyA set of practices that combines software development and IT operations to shorten the development lifecycle and provide continuous delivery with high software quality.
Read More →Digital Forensics
SecurityThe process of uncovering and interpreting electronic data for use in a court of law, involving the recovery and investigation of material found in digital devices.
Read More →Discord
CollaborationA VoIP, instant messaging and digital distribution platform designed for creating communities, originally built for gaming communities but now used by various groups.
Read More →Django
DevelopmentA high-level Python web framework that encourages rapid development and clean, pragmatic design, following the model-template-views architectural pattern.
Read More →DNS
InfrastructureDomain Name System - A hierarchical and decentralized naming system that translates human-readable domain names into IP addresses that computers use to identify each other.
Read More →Docker
DevOpsA platform that uses OS-level virtualization to deliver software in packages called containers, enabling applications to run reliably across different computing environments.
Read More →Edge Computing
TechnologyA distributed computing paradigm that brings computation and data storage closer to the location where it is needed, improving response times and saving bandwidth.
Read More →Elasticsearch
DatabaseA distributed, RESTful search and analytics engine capable of addressing a growing number of use cases, built on Apache Lucene.
Read More →Elixir
DevelopmentA dynamic, functional language designed for building maintainable and scalable applications, leveraging the Erlang Virtual Machine for fault-tolerance and concurrency.
Read More →ELK Stack
MonitoringA collection of three open-source products — Elasticsearch, Logstash, and Kibana — used together for searching, analyzing, and visualizing log data in real time.
Read More →Encryption
SecurityThe process of converting information or data into a code to prevent unauthorized access, ensuring data security and privacy.
Read More →End-to-End Testing
TestingA testing methodology that validates the entire software system from start to finish, ensuring the application flow behaves as expected in real-world scenarios.
Read More →Endpoint Detection and Response
SecurityA cybersecurity technology that continually monitors and responds to threats on endpoints, providing visibility into endpoint activities and automated response capabilities.
Read More →Ensemble Learning
AI/MLA machine learning technique that combines multiple models to create a stronger predictor than any individual model alone, including methods like bagging and boosting.
Read More →Erlang
DevelopmentA programming language used to build massively scalable soft real-time systems with requirements on high availability, designed for distributed, fault-tolerant applications.
Read More →ESLint
DevelopmentA static code analysis tool for identifying problematic patterns found in JavaScript code, helping developers write consistent and error-free code.
Read More →Event Sourcing
ArchitectureA pattern where state changes are logged as a time-ordered sequence of records, allowing the system to be rebuilt by replaying events from the event store.
Read More →Express.js
DevelopmentA minimal and flexible Node.js web application framework that provides a robust set of features for web and mobile applications and APIs.
Read More →F#
DevelopmentA functional-first programming language that makes it easy to write correct and maintainable code, part of the .NET ecosystem with strong typing and immutability by default.
Read More →Feature Engineering
AI/MLThe process of selecting, modifying, or creating features from raw data to improve the performance of machine learning algorithms.
Read More →Fiber
DevelopmentAn Express-inspired web framework built on top of Fasthttp, the fastest HTTP engine for Go, designed to ease things up for fast development with zero memory allocation.
Read More →Fine-tuning
AI/MLThe process of taking a pre-trained AI model and training it further on a specific dataset to adapt it for particular tasks or domains.
Read More →Firewall
SecurityA network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Read More →Flask
DevelopmentA lightweight WSGI web application framework in Python designed to make getting started quick and easy, with the ability to scale up to complex applications.
Read More →Fluentd
MonitoringAn open-source data collector that helps unify the data collection and consumption for better use and understanding of data, part of the CNCF ecosystem.
Read More →Flutter
DevelopmentGoogle's UI toolkit for building natively compiled applications for mobile, web, and desktop from a single codebase using the Dart programming language.
Read More →Functional Testing
TestingA type of testing that validates the software system against the functional requirements, ensuring each function operates in conformance with specifications.
Read More →Generative AI
AI/MLAI systems that can create new content including text, images, audio, and video by learning patterns from training data and generating similar but original outputs.
Read More →GET Method
APIHTTP method used to retrieve data from a server at the specified resource. It should only retrieve data and should have no other effect.
Read More →Gin
DevelopmentA HTTP web framework written in Go that features a Martini-like API with much better performance, up to 40 times faster thanks to httprouter.
Read More →Git
DevelopmentA distributed version control system for tracking changes in source code during software development, designed for coordinating work among programmers.
Read More →GitHub
DevelopmentA web-based Git repository hosting service that provides distributed version control and source code management functionality, plus additional features.
Read More →GitLab
DevOpsA web-based DevOps lifecycle tool that provides a Git repository manager with wiki, issue-tracking, and CI/CD pipeline features.
Read More →Go
DevelopmentAn open-source programming language developed by Google that makes it easy to build simple, reliable, and efficient software with strong concurrency support.
Read More →GPT
AI/MLGenerative Pre-trained Transformer - A type of large language model that uses transformer architecture to generate human-like text based on input prompts.
Read More →Gradient Descent
AI/MLAn optimization algorithm used to minimize the cost function in machine learning by iteratively moving in the direction of steepest descent to find optimal parameters.
Read More →Grafana
MonitoringAn open-source platform for monitoring and observability that allows you to query, visualize, alert on, and understand your metrics from multiple data sources.
Read More →GraphQL
APIA query language for APIs and a runtime for fulfilling those queries, providing a complete description of the data in your API and giving clients the power to ask for exactly what they need.
Read More →Gray Box Testing
TestingA software testing technique that combines both black box and white box testing methods, with limited knowledge of internal workings.
Read More →gRPC
APIA high-performance, open-source universal RPC framework that uses HTTP/2 for transport, Protocol Buffers as the interface description language.
Read More →Haskell
DevelopmentA standardized, general-purpose purely functional programming language with non-strict semantics and strong static typing, known for its mathematical approach to programming.
Read More →Helm
KubernetesA package manager for Kubernetes that helps you manage Kubernetes applications through Helm Charts, which define, install, and upgrade complex Kubernetes applications.
Read More →HTTPS
SecurityHyperText Transfer Protocol Secure - An extension of HTTP that uses encryption for secure communication over a computer network, widely used on the Internet.
Read More →Hybrid Cloud
CloudA cloud computing environment that uses a mix of on-premises, private cloud, and third-party public cloud services with orchestration between platforms.
Read More →Hyperparameter
AI/MLConfiguration settings for machine learning algorithms that are set before training begins and control the learning process, such as learning rate and batch size.
Read More →Identity and Access Management
SecurityA framework of policies and technologies ensuring that the right users have appropriate access to technology resources at the right times.
Read More →Incident Response
SecurityAn organized approach to addressing and managing the aftermath of a security breach or cyberattack, aimed at handling the situation to limit damage.
Read More →Infrastructure as Code
DevOpsThe practice of managing and provisioning computing infrastructure through machine-readable definition files, rather than physical hardware configuration or interactive configuration tools.
Read More →Ingress
KubernetesA Kubernetes resource that manages external access to services in a cluster, typically HTTP, providing load balancing, SSL termination, and name-based virtual hosting.
Read More →Integration Testing
TestingA type of testing where individual software modules are combined and tested as a group to evaluate compliance with specified requirements.
Read More →Intrusion Detection System
SecurityA device or software application that monitors a network or systems for malicious activity or policy violations and reports them to management.
Read More →Intrusion Prevention System
SecurityA network security tool that continuously monitors network traffic for suspicious activity and takes action to prevent identified threats.
Read More →Ionic
DevelopmentAn open-source SDK for hybrid mobile app development that allows developers to build mobile apps using web technologies like HTML, CSS, and JavaScript.
Read More →IoT
TechnologyInternet of Things - A network of physical objects embedded with sensors, software, and connectivity to collect and exchange data over the internet.
Read More →Istio
MicroservicesAn open-source service mesh that provides a way to control how microservices share data with one another, offering traffic management, security, and observability.
Read More →Java
DevelopmentA high-level, class-based, object-oriented programming language designed to have as few implementation dependencies as possible, widely used for enterprise applications.
Read More →JavaScript
DevelopmentA high-level, interpreted programming language that is one of the core technologies of the World Wide Web, alongside HTML and CSS.
Read More →Jenkins
DevOpsAn open-source automation server that enables developers to build, test, and deploy their applications through continuous integration and continuous delivery pipelines.
Read More →Jest
DevelopmentA JavaScript testing framework designed to ensure correctness of any JavaScript codebase, focusing on simplicity and support for large web applications.
Read More →Jira
Project ManagementA proprietary issue tracking product developed by Atlassian that allows bug tracking and agile project management, widely used in software development teams.
Read More →JSON
DevelopmentJavaScript Object Notation - A lightweight data-interchange format that is easy for humans to read and write and easy for machines to parse and generate.
Read More →JWT
SecurityJSON Web Token - A compact, URL-safe means of representing claims to be transferred between two parties, commonly used for authentication and information exchange.
Read More →K-Means Clustering
AI/MLAn unsupervised learning algorithm that partitions data into k clusters by grouping similar data points together and separating dissimilar ones.
Read More →Kafka
InfrastructureA distributed streaming platform that can publish and subscribe to streams of records, store streams of records, and process streams of records as they occur.
Read More →Kibana
MonitoringA data visualization dashboard software for Elasticsearch that provides visualization capabilities on top of the content indexed on an Elasticsearch cluster.
Read More →Kotlin
DevelopmentA cross-platform, statically typed, general-purpose programming language with type inference, fully interoperable with Java and Android development.
Read More →Kubernetes
DevOpsAn open-source container orchestration platform that automates the deployment, scaling, and management of containerized applications.
Read More →Large Language Model
AI/MLA type of AI model trained on vast amounts of text data to understand and generate human-like text, capable of tasks like translation, summarization, and conversation.
Read More →Load Balancer
InfrastructureA device or software that distributes network or application traffic across multiple servers to ensure no single server becomes overwhelmed.
Read More →Load Testing
TestingA type of performance testing that determines how a system performs under expected normal and peak load conditions, identifying bottlenecks.
Read More →Logseq
Knowledge ManagementA privacy-first, open-source knowledge base that works on top of local plain-text Markdown and Org-mode files, featuring block-based editing and bi-directional linking.
Read More →Logstash
MonitoringA server-side data processing pipeline that ingests data from multiple sources simultaneously, transforms it, and then sends it to a 'stash' like Elasticsearch.
Read More →Malware
SecurityMalicious software specifically designed to disrupt, damage, or gain unauthorized access to a computer system, including viruses, worms, and trojans.
Read More →Man-in-the-Middle Attack
SecurityA cyberattack where the attacker secretly relays and possibly alters communications between two parties who believe they are directly communicating.
Read More →Manual Testing
TestingA testing process where test cases are executed manually by human testers without the use of automation tools or scripts.
Read More →Microservices
ArchitectureAn architectural approach where applications are built as a collection of small, independent services that communicate over well-defined APIs.
Read More →Miro
CollaborationAn online collaborative whiteboard platform that enables distributed teams to work effectively together, from brainstorming with digital sticky notes to planning and managing agile workflows.
Read More →Mobile Testing
TestingTesting mobile applications for functionality, usability, and consistency across different mobile devices, operating systems, and network conditions.
Read More →Monday.com
Project ManagementA cloud-based project management platform that allows teams to build custom workflow apps in minutes to run their projects, processes, and everyday work.
Read More →MongoDB
DatabaseA document-oriented NoSQL database that uses JSON-like documents with optional schemas, designed for ease of development and scaling.
Read More →Monkey Testing
TestingA testing technique where random inputs are provided to the system to check how it behaves under unexpected or invalid input conditions.
Read More →Multi-Cloud
CloudThe use of multiple cloud computing services in a single heterogeneous architecture to reduce reliance on any single vendor and increase flexibility.
Read More →Multi-Factor Authentication
SecurityA security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity.
Read More →Mutation Testing
TestingA testing technique that involves modifying program source code in small ways to check if existing test cases can detect the changes.
Read More →Namespace
KubernetesA way to divide cluster resources between multiple users or teams in Kubernetes, providing scope for names and resource isolation.
Read More →A branch of AI that helps computers understand, interpret, and manipulate human language, enabling machines to read text, hear speech, and interpret meaning.
Read More →Neural Network
AI/MLA computing system inspired by biological neural networks that learns to perform tasks by considering examples, without being programmed with task-specific rules.
Read More →New Relic
MonitoringA software analytics company that provides application performance monitoring, infrastructure monitoring, and digital intelligence for software-driven businesses.
Read More →Nginx
InfrastructureA web server that can also be used as a reverse proxy, load balancer, mail proxy and HTTP cache, known for its high performance and low resource consumption.
Read More →Node.js
DevelopmentA JavaScript runtime built on Chrome's V8 JavaScript engine that allows developers to run JavaScript on the server-side for building scalable network applications.
Read More →Nomad
DevOpsA flexible workload orchestrator that enables organizations to easily deploy and manage any containerized or legacy application using a single, unified workflow.
Read More →Non-Functional Testing
TestingTesting that checks non-functional aspects like performance, usability, reliability, and scalability rather than specific behaviors or functions.
Read More →NoSQL
DatabaseA database design approach that provides flexible schemas for the storage and retrieval of data that is modeled in means other than tabular relations.
Read More →Notion
CollaborationAn application that provides components such as notes, databases, kanban boards, wikis, calendars and reminders, marketed as an all-in-one workspace for note-taking and collaboration.
Read More →OAuth
SecurityAn open standard for access delegation, commonly used for token-based authentication and authorization on the internet.
Read More →Observability
MonitoringThe ability to measure the internal states of a system by examining its outputs, typically through logs, metrics, and traces in distributed systems.
Read More →Obsidian
Knowledge ManagementA powerful knowledge base that works on top of a local folder of plain text Markdown files, featuring linking, graph view, and extensibility through plugins.
Read More →Overfitting
AI/MLA modeling error that occurs when a machine learning model learns the training data too well, including noise and outliers, resulting in poor performance on new data.
Read More →Packer
DevOpsAn open-source tool for creating identical machine images for multiple platforms from a single source configuration, automating the creation of machine images.
Read More →Parcel
DevelopmentA web application bundler that offers blazing fast performance utilizing multicore processing and requires zero configuration for most projects.
Read More →PATCH Method
APIHTTP method used to apply partial modifications to a resource, unlike PUT which replaces the entire resource.
Read More →Penetration Testing
SecurityA simulated cyber attack against a computer system to check for exploitable vulnerabilities, performed to evaluate the security of the system.
Read More →Performance Testing
TestingA testing practice that evaluates the speed, responsiveness, and stability of a computer system under various workload conditions.
Read More →Phishing
SecurityA cybercrime where targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
Read More →PHP
DevelopmentA popular general-purpose scripting language especially suited to web development, originally created for server-side web development but now used for general-purpose programming.
Read More →Playwright
DevelopmentA framework for Web Testing and Automation that allows testing Chromium, Firefox and WebKit with a single API, enabling cross-browser web automation.
Read More →Pod
KubernetesThe smallest deployable unit in Kubernetes that can contain one or more containers sharing storage and network resources.
Read More →POST Method
APIHTTP method used to send data to a server to create/update a resource. The data sent to the server is stored in the request body.
Read More →PostgreSQL
DatabaseAn advanced, enterprise-class open-source relational database that supports both SQL and JSON querying, known for reliability and feature robustness.
Read More →PowerShell
DevelopmentA task automation and configuration management framework from Microsoft, consisting of a command-line shell and associated scripting language.
Read More →Prettier
DevelopmentAn opinionated code formatter that supports many languages and integrates with most editors, enforcing a consistent style by parsing code and reprinting it.
Read More →Principle of Least Privilege
SecurityA security concept where users are given the minimum levels of access necessary to complete their job functions, reducing the attack surface.
Read More →Prometheus
MonitoringAn open-source monitoring system with a dimensional data model, flexible query language, efficient time series database, and modern alerting approach.
Read More →Prompt Engineering
AI/MLThe practice of designing and optimizing input prompts to effectively communicate with AI language models and achieve desired outputs or behaviors.
Read More →Proxmox
InfrastructureAn open-source server virtualization management platform that combines KVM hypervisor and LXC containers, software-defined storage and networking functionality.
Read More →Puppeteer
DevelopmentA Node library that provides a high-level API to control Chrome or Chromium browsers over the DevTools Protocol, commonly used for web scraping and testing.
Read More →PUT Method
APIHTTP method used to update a resource or create a new resource if it doesn't exist. It replaces the entire resource with the new data.
Read More →Python
DevelopmentA high-level, interpreted programming language known for its simplicity and readability, widely used in web development, data science, and AI.
Read More →Quantum Computing
TechnologyA type of computation that harnesses quantum mechanical phenomena to process information in ways that classical computers cannot.
Read More →RabbitMQ
InfrastructureAn open-source message broker software that implements the Advanced Message Queuing Protocol (AMQP) for reliable message delivery between applications.
Read More →Random Forest
AI/MLAn ensemble learning method that combines multiple decision trees to improve prediction accuracy and reduce overfitting through voting or averaging.
Read More →Ransomware
SecurityA type of malicious software designed to block access to a computer system until a sum of money is paid, often encrypting files to make them inaccessible.
Read More →React
DevelopmentA JavaScript library for building user interfaces, particularly web applications, using a component-based architecture and virtual DOM for efficient rendering.
Read More →React Native
DevelopmentA framework for building native mobile applications using React and JavaScript, allowing developers to use React along with native platform capabilities.
Read More →A type of neural network designed for sequential data processing, with connections that create loops allowing information to persist and process sequences of inputs.
Read More →Redis
DatabaseAn open-source, in-memory data structure store used as a database, cache, and message broker, supporting various data structures.
Read More →Regression Testing
TestingA type of software testing that ensures that previously developed and tested software still performs correctly after changes or additions.
Read More →A type of machine learning where an agent learns to make decisions by performing actions in an environment to maximize cumulative reward through trial and error.
Read More →REST API
DevelopmentRepresentational State Transfer API - An architectural style for designing networked applications based on stateless, client-server communication.
Read More →Risk Assessment
SecurityThe identification of hazards that could negatively impact an organization's ability to conduct business, evaluating the likelihood and impact of identified risks.
Read More →Roam Research
Knowledge ManagementA note-taking tool for networked thought, designed to create a web of knowledge by connecting related ideas through bi-directional linking and graph databases.
Read More →Role-Based Access Control
SecurityA method of restricting network access based on the roles of individual users within an organization, ensuring users only access information necessary for their roles.
Read More →Rollup
DevelopmentA module bundler for JavaScript which compiles small pieces of code into something larger and more complex, such as a library or application.
Read More →Ruby
DevelopmentA dynamic, open-source programming language with a focus on simplicity and productivity, featuring an elegant syntax that is natural to read and easy to write.
Read More →Rust
DevelopmentA systems programming language that runs blazingly fast, prevents segfaults, and guarantees thread safety, focusing on speed, safety, and concurrency.
Read More →SaaS
CloudSoftware as a Service - A software distribution model where applications are hosted by a service provider and made available over the internet.
Read More →Sanity Testing
TestingA subset of regression testing that focuses on testing specific functionality after minor changes to ensure the changes work as expected.
Read More →Scala
DevelopmentA general-purpose programming language providing support for both object-oriented and functional programming, designed to be concise and run on the Java Virtual Machine.
Read More →Secret
KubernetesA Kubernetes object that contains sensitive data such as passwords, OAuth tokens, and SSH keys in a more secure way than putting it in a Pod specification.
Read More →An approach to security management that combines security information management and security event management functions into one security management system.
Read More →Security Operations Center
SecurityA centralized unit that deals with security issues on an organizational and technical level, monitoring and analyzing security events in real-time.
Read More →Security Testing
TestingA testing process that determines whether the system protects data and maintains functionality as intended, identifying vulnerabilities and security flaws.
Read More →Selenium
DevelopmentA portable framework for testing web applications that provides a playback tool for authoring functional tests without learning a test scripting language.
Read More →Serverless
CloudA cloud computing execution model where the cloud provider dynamically manages the allocation of machine resources, and pricing is based on the actual amount of resources consumed.
Read More →Service
KubernetesIn Kubernetes, an abstraction that defines a logical set of Pods and a policy by which to access them, enabling load balancing and service discovery.
Read More →Service Mesh
MicroservicesA dedicated infrastructure layer for facilitating service-to-service communications between microservices, often using a sidecar proxy pattern.
Read More →Single Sign-On
SecurityAn authentication scheme that allows a user to log in with a single ID and password to access multiple related systems and applications.
Read More →Slack
CollaborationA business communication platform that offers many IRC-style features, including persistent chat rooms organized by topic, private groups, and direct messaging.
Read More →Smoke Testing
TestingA preliminary testing approach that checks whether the deployed software build is stable enough for further detailed testing.
Read More →Social Engineering
SecurityThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
Read More →Splunk
MonitoringA software platform to search, analyze and visualize machine-generated data gathered from websites, applications, sensors, devices, and other sources.
Read More →Spring Boot
DevelopmentA Java-based framework that makes it easy to create stand-alone, production-grade Spring-based applications with minimal configuration.
Read More →SQL Injection
SecurityA code injection technique that exploits vulnerabilities in an application's software by inserting malicious SQL statements into entry fields.
Read More →SSL/TLS
SecuritySecure Sockets Layer/Transport Layer Security - Cryptographic protocols that provide communications security over a computer network.
Read More →Storybook
DevelopmentA tool for building UI components and pages in isolation, serving as a workshop for UI development, testing, and documentation for React, Vue, Angular, and more.
Read More →Stress Testing
TestingA type of performance testing that evaluates how a system performs under extreme conditions, beyond normal operational capacity.
Read More →Supervised Learning
AI/MLA machine learning approach where algorithms learn from labeled training data to make predictions or decisions on new, unseen data.
Read More →A supervised learning algorithm that finds the optimal boundary (hyperplane) to separate different classes in data, effective for both classification and regression tasks.
Read More →Swift
DevelopmentA powerful and intuitive programming language developed by Apple for iOS, macOS, watchOS, and tvOS app development, designed to be fast and safe.
Read More →Terraform
DevOpsAn open-source infrastructure as code software tool that enables you to safely and predictably create, change, and improve infrastructure using declarative configuration files.
Read More →Test-Driven Development
TestingA software development approach where tests are written before the actual code, ensuring that code meets the specified requirements.
Read More →Threat Intelligence
SecurityEvidence-based knowledge about existing or emerging threats that can be used to inform decisions regarding the subject's response to those threats.
Read More →Transfer Learning
AI/MLA machine learning technique where a model developed for one task is reused as the starting point for a model on a related task, leveraging pre-learned features.
Read More →Transformer
AI/MLA deep learning model architecture that uses self-attention mechanisms to process sequential data, forming the foundation of modern language models like GPT and BERT.
Read More →Trello
Project ManagementA web-based Kanban-style list-making application developed by Atlassian, used for project management and personal productivity with boards, lists, and cards.
Read More →TypeScript
DevelopmentA programming language developed by Microsoft that builds on JavaScript by adding static type definitions for better development experience.
Read More →UI/UX
DesignUser Interface/User Experience - The design and interaction aspects of digital products focusing on usability and user satisfaction.
Read More →Unit Testing
TestingA software testing method where individual units or components of software are tested in isolation to determine if they are fit for use.
Read More →A machine learning approach that finds hidden patterns or structures in data without labeled examples, including clustering and dimensionality reduction.
Read More →Usability Testing
TestingA testing method that evaluates how easy and user-friendly a software application is by testing it with real users.
Read More →User Acceptance Testing
TestingThe final phase of testing where actual users test the software to ensure it can handle required tasks in real-world scenarios according to specifications.
Read More →Vagrant
DevOpsA tool for building and managing virtual machine environments in a single workflow, providing easy-to-configure, reproducible, and portable work environments.
Read More →Vault
SecurityA tool for securely accessing secrets, providing a unified interface to any secret while providing tight access control and recording a detailed audit log.
Read More →Virtual Machine
InfrastructureA software-based emulation of a computer system that provides the functionality of a physical computer, running on top of a host operating system.
Read More →Vite
DevelopmentA build tool that aims to provide a faster and leaner development experience for modern web projects, featuring instant server start and lightning fast HMR.
Read More →VPN
SecurityVirtual Private Network - A service that creates a secure, encrypted connection over a less secure network, such as the internet, allowing remote access to private networks.
Read More →Vue.js
DevelopmentA progressive JavaScript framework for building user interfaces that focuses on the view layer and can be easily integrated into projects using other libraries.
Read More →Vulnerability Assessment
SecurityThe process of identifying, quantifying, and prioritizing vulnerabilities in a system to understand security weaknesses before they can be exploited.
Read More →Web Application Firewall
SecurityA firewall that filters, monitors, and blocks HTTP traffic to and from a web application, protecting against common web exploits.
Read More →Webhook
APIA method of augmenting or altering the behavior of a web page or web application with custom callbacks, allowing real-time data updates.
Read More →Webpack
DevelopmentA static module bundler for modern JavaScript applications that builds a dependency graph and bundles modules into one or more optimized bundles for the browser.
Read More →WebSocket
DevelopmentA communication protocol that provides full-duplex communication channels over a single TCP connection, enabling real-time data exchange.
Read More →White Box Testing
TestingA software testing method where the tester has knowledge of the internal structure, design, and implementation of the system being tested.
Read More →Xamarin
DevelopmentA Microsoft-owned San Francisco-based software company that provides commercial software development tools allowing users to develop applications for Android, iOS, and Windows using C# and .NET.
Read More →XML
DevelopmenteXtensible Markup Language - A markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable.
Read More →YAML
DevelopmentYAML Ain't Markup Language - A human-readable data serialization standard commonly used for configuration files and data exchange between applications.
Read More →Zero Trust
SecurityA security model that requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are sitting within or outside of the network perimeter.
Read More →Zookeeper
InfrastructureA centralized service for maintaining configuration information, naming, providing distributed synchronization, and providing group services in distributed systems.
Read More →Zoom
CollaborationA video conferencing service used by companies and universities for remote communication, offering video meetings, voice calls, and webinar capabilities.
Read More →Understanding Technology Terms
Our comprehensive technology glossary helps you understand the complex world of IT, software development, cloud computing, and digital transformation. Whether you're a business leader, developer, or technology enthusiast, these definitions will help you navigate technical discussions with confidence.