Technology Terms A-Z
Understand technology without a computer science degree: This glossary explains important tech terms like APIs, Cloud Computing and Microservices specifically for marketing professionals.
A
A2A (Agent-to-Agent Protocol)
A2A (Agent-to-Agent) is an open standard initiated by Google for direct communication between autonomous AI agents — regardless of which framework (LangChain, OpenAI, Claude, AutoGen) they were built with.
Abstract Data Type
A conceptual model of a data structure defined by its behavior (operations and properties) rather than a specific implementation.
Abstraction
The process of simplifying complexity by focusing on high-level concepts and hiding lower-level details.
Accelerating Change
The perceived increase in the rate of technological innovation and societal progress over time.
Action Schema
Action Schema is an extension of the schema.org vocabulary (PotentialAction, Schema.Action) that lets websites machine-readably declare which actions (buy, book, reserve, subscribe, contact) a user or agent can perform on the page.
Agent-to-Agent (A2A)
Direct communication between autonomous AI agents without human mediation – e.g., for negotiation, booking, or data exchange.
Agent-to-Agent Protocol (A2A)
An open protocol developed by Google that standardizes communication and collaboration between different AI agents.
AI Abundance Economy
Economic model in which AI drives the production cost of knowledge, software, and content toward zero, with scarcity primarily in energy, compute, and attention.
AI Accelerator
Specialized hardware designed specifically to speed up artificial intelligence tasks, particularly the heavy mathematical computations in machine learning.
AI Act Compliance
Operational implementation of EU AI Act requirements in organizations – from risk classification to logging obligations.
AI Governance Board
Cross-functional corporate body steering AI strategy, risk decisions, use case approvals, and compliance.
AI Liability
Legal and organizational responsibility for damages caused by AI systems or autonomous agents.
AI Observability
The practice of real-time monitoring, evaluation, and debugging of AI systems in production – from classical ML models to LLM applications and autonomous agents.
AI Red Teaming
Systematic testing of AI systems by an attacker team to identify weaknesses, bias, and misuse potential.
AP2 (Agent Payments Protocol)
The Agent Payments Protocol (AP2) is an open standard initiated in 2025 by Google together with 60+ partners (Mastercard, PayPal, American Express, Coinbase and others) that lets AI agents securely and verifiably trigger payments on behalf of users or businesses.
API (Application Programming Interface)
An interface that allows software applications to communicate with each other and exchange data.
Arize AI
An AI observability platform that runs over 50 million evaluations per month and serves over 1 trillion inferences. Arize helps monitor, evaluate, and optimize ML models and generative AI applications.
Array
An array is a contiguous data structure storing elements of the same type (in many languages) accessed by index.
Audit Logging
Audit logging records security-relevant events (access, policy decisions, admin changes, tool actions) in an immutable or tamper-evident way.
Authorization
Authorization determines what an authenticated identity is allowed to do (permissions), such as reading specific data or executing specific actions.
Auto-Complete
Auto-complete is a feature that, during text entry, automatically offers matching completion suggestions — based on dictionaries, search history, statistical language models, or, since 2023, generative LLMs.
Automata Theory
The branch of computer science and mathematics that deals with abstract machines (automata) and the computational problems they can solve.
B
Bellman-Ford Algorithm
The Bellman–Ford algorithm computes shortest paths from a single source in a weighted graph and can handle negative edge weights (and detect negative cycles).
Big-O Notation
Big-O notation describes how an algorithm's time or space requirements grow with input size, expressing an upper bound on asymptotic behavior (e.g., O(log n), O(n), O(n²)).
Binary Search
Binary search finds a target value in a sorted list by repeatedly halving the search range.
BM25 Ranking
BM25 is a classic lexical ranking function used in information retrieval that scores documents based on term frequency, inverse document frequency, and length normalization.
Breadth-First Search (BFS)
A graph traversal algorithm that explores all neighbor nodes at the current depth before moving to the next depth level.
Business Continuity
Business continuity is the capability to keep critical business functions running during and after disruptions (technical failures, security incidents, disasters).
C
C2PA Content Credentials
Open standard for marking the provenance and editing history of digital media, developed by the Coalition for Content Provenance and Authenticity.
Capacity Planning
Capacity planning ensures systems have sufficient resources (compute, storage, network, quotas) to meet demand while maintaining SLOs and controlling cost.
Certificate Authority
A Certificate Authority (CA) issues and signs digital certificates, binding public keys to identities within a PKI.
Chain of Trust
A chain of trust is the ordered set of certificates from a leaf certificate through intermediates up to a trusted root CA.
Column Store
A column store database stores data column-by-column, optimizing for analytical workloads (OLAP) and scanning specific fields across many rows.
Content Delivery Network (CDN)
Distributed network of servers for fast delivery of web content.
Content Policy
A content policy defines what content is allowed, restricted, or disallowed in a system—covering both inputs and outputs.
Cryptography
The science of secure communication through mathematical methods that encrypt data, ensure integrity, and prove authenticity.
CSS
CSS (Cascading Style Sheets) is the styling language of the web that defines the visual appearance of HTML elements – colors, layouts, animations, and responsive design.
D
DAG (Directed Acyclic Graph)
A directed graph with no cycles, meaning you cannot start at a node and follow directed edges to return to the same node.
Data Structure
An organized method for storing and managing data that enables efficient operations like searching, inserting, and deleting.
Depth-First Search (DFS)
A graph traversal algorithm that goes as far as possible along a path before backtracking and exploring alternative paths.
Design Pattern
A design pattern is a reusable solution template for common software design problems (structure, behavior, collaboration).
Dijkstra's Algorithm
Dijkstra's algorithm computes the shortest path distances from a single source node to all other nodes in a weighted graph with non-negative edge weights.
Disaster Recovery
Strategies and processes for restoring critical systems and data after catastrophic events like hardware failures, cyberattacks, or natural disasters.
Document AI
AI systems for intelligent processing and analysis of documents.
Dynamic Batching
Grouping multiple inference requests together at runtime to improve throughput and reduce cost per request.
E
Economics of AGI
Research and discourse field on macroeconomic effects of artificial general intelligence on labor, productivity, and value creation.
Edge AI
AI processing that happens on local devices (edge) rather than in the cloud, for low latency and privacy.
Edge Computing
Data processing close to the data source instead of in central clouds.
Encapsulation
A programming concept that bundles data and the methods that access it into a single unit (class/module) and restricts direct access from outside.
Encryption
Encryption transforms plaintext into ciphertext using a key, so only authorized parties can recover the original information.
Encryption at Rest
Encryption at rest protects stored data (databases, disks, backups, object storage) by encrypting it when not actively being transmitted or processed.
Encryption in Transit
Encryption in transit protects data while it moves across networks, commonly implemented using TLS (e.g., HTTPS).
Endpoint
A URL where an API service is accessible and receives requests.
Envelope Encryption
Envelope encryption encrypts data with a short-lived data key, then encrypts that data key with a longer-lived master key (often in KMS/HSM).
EU AI Act
EU Regulation 2024/1689 that regulates AI systems by risk class and is progressively applicable from 2026.
Event-Driven Architecture
Software architecture where components communicate through events.
Experiment Tracking
Systematic logging and management of ML experiments.
Exponential Backoff
Exponential backoff increases the wait time between retries exponentially after each failure (e.g., 100ms → 200ms → 400ms → 800ms…).
Exponential Growth
A growth pattern where a quantity grows proportionally to its current value, leading to doubling in constant time intervals.
F
FAISS
An open-source library from Meta for efficient similarity search and clustering of dense vectors – the standard for local vector indices.
Fault Tolerance
Fault tolerance is a system's ability to continue operating correctly (or degrade safely) when components fail.
Feature Store
A central infrastructure for managing, storing, and serving ML features across training and serving.
Fiddler AI
An enterprise platform for model performance management that helps companies launch and update AI models faster by automatically detecting issues and improving efficiency.
Finite State Machine (FSM)
A mathematical model of computation that is in exactly one of a finite number of states and transitions between these states based on inputs.
FinOps
A discipline for managing cloud costs that brings together engineering, finance, and business to make data-driven decisions about cloud spending.
Full-Stack
Development that encompasses both frontend and backend of an application.
G
Google Colab
Google Colab (Colaboratory) is a free, cloud-based Jupyter notebook environment with GPU/TPU access for machine learning and data analysis.
Google Flow
Google's AI-powered creative platform for image generation and editing, using Nano Banana 2 as its default model.
GPT Orchestration
Architectural approach connecting multiple specialized GPTs/LLMs with routing logic into complex workflows.
GPU (Graphics Processing Unit)
Specialized processor for parallel computations, ideal for AI training.
Graph Traversal
Graph traversal is systematically visiting nodes and edges in a graph (e.g., using BFS or DFS) to explore structure or find targets.
H
Hardware Security Module (HSM)
An HSM is a tamper-resistant hardware device that securely generates, stores, and uses cryptographic keys.
Hash Function
A function that maps input data to a fixed output value, ideally collision-free.
Hash Table
A hash table maps keys to values using a hash function, enabling average-case O(1) lookups, inserts, and deletes.
Headless CMS
A content management system that delivers content via APIs without a fixed frontend.
High Availability
A system design approach that ensures continuous operation and minimal downtime, typically through redundancy and automatic failover.
HNSW Index
HNSW (Hierarchical Navigable Small World) is an approximate nearest neighbor (ANN) indexing method that uses layered graph structures to enable fast similarity search in high-dimensional vector spaces.
Horizontal Scaling
Increasing capacity by adding more machines rather than upgrading individual systems.
HTTPS (Hypertext Transfer Protocol Secure)
HTTPS is HTTP over TLS, providing encrypted transport, integrity, and server authentication for web communication.
I
Identity
Identity is the representation of a principal (user, service, device) that can be authenticated and authorized in a system.
Identity and Access Management (IAM)
IAM is the set of processes and systems that manage identities and control their access to resources (authentication + authorization + governance).
Incident Response
Structured processes and procedures for detecting, analyzing, containing, and remediating security incidents or system outages.
Inference Optimization
Improving speed and cost of running models while maintaining acceptable quality.
Information Hiding
A software design principle that hides internal implementation details of a module from other parts of the system to localize changes.
Integration Testing
Tests that verify the interaction between multiple components or systems.
Interface
An Interface defines a contract between system components – the methods, properties, or protocols through which they communicate without exposing internal details.
iOS 27 Siri
The Siri generation deeply integrated with ChatGPT in iOS 27, acting as a personal on-device agent.
J
JAX
JAX is Google's high-performance framework for numerical computing and machine learning that combines NumPy syntax with automatic differentiation and GPU/TPU acceleration.
JIT Compilation
Just-In-Time compilation translates code to machine code at runtime for better performance.
Jitter
Jitter adds randomness to retry delays so many clients don't retry at the same time.
Job Scheduling
Planning and executing tasks at specific times or based on events.
JSON Schema
A vocabulary for annotating and validating JSON documents.
JSON Web Token
A compact, URL-safe token standard for securely transmitting claims between parties.
Jupyter Notebook
An interactive computing environment that combines code, visualizations, and text in one document.
K
Kafka
Apache Kafka is a distributed event streaming platform used to publish, store, and process event streams at scale.
Key Management
Key management is the lifecycle management of cryptographic keys: generation, storage, access control, rotation, revocation, and auditing.
Key Management Service (KMS)
KMS is a managed service for creating, storing, rotating, and auditing cryptographic keys (often with HSM-backed options).
Key Rotation
Key rotation is the practice of regularly replacing cryptographic keys to reduce exposure if a key is compromised.
KMS (Key Management Service)
A Key Management Service is a managed system for creating, storing, rotating, and controlling access to cryptographic keys.
Knowledge Graph
A structured representation of knowledge as a graph with entities (nodes) and relationships (edges).
Kubernetes (K8s)
Kubernetes is a container orchestration platform for deploying, scaling, and managing containerized applications.
L
Latency
The time between request and response in a system.
Latency Budget
A latency budget is an explicit allocation of maximum allowed time for each system component to meet an overall SLA.
Layer
A Layer is an abstract level in a layered system that encapsulates a specific function and communicates with other layers through defined interfaces.
Learning Management System
A Learning Management System (LMS) is software for delivering, managing, and tracking training and learning content (courses, assignments, completion, assessments).
Learning Record Store (LRS)
A Learning Record Store (LRS) is a system that stores learning activity data—typically as xAPI statements—and enables reporting and analytics across learning experiences.
Least Privilege
Least privilege grants only the minimum permissions needed to perform a task—no more, no longer than necessary.
Lexical Search
Lexical search retrieves documents based on exact words/terms (keyword matching), typically using inverted indexes and BM25.
Liability Target
Clearly defined entity (person, role, or organization) liable for an AI agent's decisions or damages.
Link Graph
A link graph is the network of pages (nodes) connected by links (edges), both internally and externally.
Linting
Linting is automatically checking code (or structured content) for errors, style violations, and quality issues based on rules.
LLM Observability
LLM observability is collecting and analyzing telemetry that explains LLM system behavior in production.
LLM Routing
LLM routing is selecting which model/workflow to use for a request based on intent, risk, and cost constraints.
Load Balancing
Load balancing distributes incoming traffic across multiple servers to improve availability, throughput, and latency.
Locality-Sensitive Hashing (LSH)
LSH is a technique that hashes items so similar items are more likely to land in the same bucket.
M
Mac mini M4 Pro
Apple's compact desktop with M4 Pro chip and Neural Engine, popular as an affordable on-device AI workstation.
MCP (Model Context Protocol)
The Model Context Protocol (MCP) is an open standard released by Anthropic in late 2024 that lets AI models access external tools, data and systems in a structured way — a kind of "USB-C for AI".
MCP Protocol
Open protocol by Anthropic that gives LLMs standardized access to tools, data sources, and external services.
Memory Bandwidth
Memory bandwidth is the amount of data that can be moved to/from memory per unit time; for GPUs it strongly influences how fast data can be fed into compute.
Metadata Filtering (Vector Search)
Metadata filtering restricts vector search results using structured fields (e.g., tenant_id, timestamps, doc_type) in addition to similarity search.
Microservices
Architecture style where an application consists of small, independent services.
MLOps
MLOps is the practice of operationalizing machine learning—deploying, monitoring, versioning, and governing ML systems reliably.
Model Context Protocol (MCP)
Model Context Protocol (MCP) is an open standard for connecting LLM applications to external data sources and tools via a standardized client/server pattern.
Model Registry
Central version management for trained ML models.
Model Serving
Deployment of trained ML models for inference in production environments.
Moderation
Moderation is the detection, review, and enforcement process that applies content policy to user inputs, generated outputs, and platform behavior.
Modular Design
Modular design structures systems as cohesive modules with clear responsibilities and stable interfaces, minimizing coupling.
Modularity
A design principle that divides systems into independent, interchangeable components (modules) that communicate through defined interfaces.
Moore's Law
The observation that the number of transistors on integrated circuits doubles approximately every two years, leading to exponential growth in computing power.
mTLS (Mutual TLS)
mTLS is a TLS setup where both client and server authenticate each other using certificates (two-way authentication).
Multi-Region
An architecture that distributes applications and data across multiple geographic data centers to optimize latency, availability, and compliance.
Multi-tenancy
Multi-tenancy is a software architecture where a single instance of an application serves multiple customers ("tenants") while keeping each tenant's data/config separated and secure.
N
N-Tier Architecture
N-tier architecture is a system design that separates an application into logical layers (tiers)—commonly presentation, application/business logic, and data—to improve scalability, maintainability, and security.
NAC (Network Access Control)
Network Access Control (NAC) is a security approach that restricts network access based on device identity, posture, and policy (e.g., only compliant devices can access sensitive services).
NACK (Negative Acknowledgment)
A NACK is a message indicating a request/message was not successfully processed (the opposite of an ACK).
Namespace Collision
A namespace collision happens when two resources share the same name in a context where names must be unique, causing ambiguity or runtime errors.
Namespace Isolation Patterns
Namespace isolation patterns are design approaches (often in Kubernetes) that use namespaces, policies, quotas, and secrets boundaries to isolate environments or tenants.
Namespace-Scoped Secrets
Namespace-scoped secrets are secrets managed within a specific namespace boundary (commonly in Kubernetes), limiting which workloads can access them.
NAT (Network Address Translation)
NAT maps private IP addresses to public IP addresses (and vice versa), enabling private networks to access external networks while reducing public IP usage.
NCCL (NVIDIA Collective Communications Library)
NCCL is a library used for fast GPU-to-GPU communication primitives (collectives) such as all-reduce, broadcast, and all-gather—commonly in distributed training and inference.
NCCL All-Reduce
All-reduce is a collective operation that aggregates data (often summation) across devices and distributes the result back to all devices.
Near-Duplicate Detection
Near-duplicate detection identifies items that are not exactly identical but are highly similar (e.g., same content with minor edits, boilerplate differences, or formatting changes).
Neo4j
Neo4j is the leading graph database that stores data as nodes and relationships, enabling efficient queries over connected data structures.
Network Bandwidth
Network bandwidth is the rate at which data can be transmitted over a network (e.g., Mbps, Gbps).
Network DLP
Network Data Loss Prevention (DLP) is a set of controls that detect and prevent sensitive data from leaving a network boundary through outbound traffic (egress).
Network Egress
Network egress is outbound traffic leaving a system/network (e.g., from your VPC to the internet or to external SaaS APIs).
Network Jitter
Network jitter is variation in packet delay over time (inconsistent latency), even if average latency is acceptable.
Network Latency
Network latency is the time it takes for data to travel across a network between systems (client ↔ server, service ↔ service).
Network Load Balancer
A network load balancer distributes incoming network traffic across multiple servers/instances to improve availability and performance.
Network Partition
A network partition is a failure where parts of a distributed system cannot communicate with each other, even though each part may still be running.
Network Rate Limiting
Network rate limiting restricts request rates to protect services from overload, abuse, or cost blowups.
Network Segmentation
Network segmentation is dividing a network into isolated segments to reduce attack surface, limit lateral movement, and enforce least privilege access.
Network Topology
Network topology describes how network components are arranged and connected (physical and logical layout).
Network-Aware Batching
Network-aware batching groups requests to reduce network overhead and improve throughput, especially when network latency dominates.
NetworkPolicy (Kubernetes)
A Kubernetes NetworkPolicy defines how pods are allowed to communicate with each other and with external endpoints, enabling micro-segmentation inside clusters.
Neural Processing Unit (NPU)
An NPU is specialized hardware designed to accelerate neural network computations (matrix multiplications, convolutions, attention-like ops) efficiently—often with strong power/performance advantages for specific workloads.
Neural Processing Unit (NPU)
An NPU is specialized hardware designed to accelerate neural network computations (matrix multiplications, convolutions, attention-like ops) efficiently—often with strong power/performance advantages for specific workloads.
Neuromorphic Computing
Neuromorphic computing is an approach to hardware and computation inspired by biological neural systems, often emphasizing event-driven processing and energy efficiency.
NIST Cybersecurity Framework (NIST CSF)
The NIST Cybersecurity Framework is a structured framework for managing cybersecurity risk through a common language, categories, and practices across the organization.
NIST SP 800-53
NIST SP 800-53 is a catalog of security and privacy controls used as a reference for designing and assessing secure systems.
NIST SP 800-63 (Digital Identity)
NIST SP 800-63 is guidance for digital identity: identity proofing, authentication, and federation concepts and requirements.
Node Affinity
Node affinity is a Kubernetes scheduling feature that constrains which nodes pods can run on (based on node labels), enabling placement control.
Node Pool
A node pool is a group of compute nodes (often in Kubernetes or managed clusters) with similar characteristics, managed together for scaling and scheduling.
Node Selector
Node selector is a Kubernetes mechanism to constrain pods to run on nodes with matching labels.
Non-Blocking I/O
Non-blocking I/O allows a program to initiate I/O operations without waiting synchronously for them to complete, enabling concurrency and better throughput.
Non-Idempotent Operation
A non-idempotent operation is one where repeating the same request multiple times can produce different outcomes (or duplicate side effects).
Non-Production Environment
A non-production environment is any environment that is not live customer production (e.g., dev, staging, test), used for development and validation.
Non-Repudiation
Non-repudiation is the ability to prove an action occurred and that a specific actor performed it—so they cannot later credibly deny it.
Non-Retryable Error
A non-retryable error is a failure that is unlikely to succeed if you simply retry (e.g., invalid input, permission denied).
Nonce Reuse
Nonce reuse is a security flaw where a "used once" value is accidentally reused, potentially enabling replay attacks or cryptographic failures (depending on context).
NoSQL
NoSQL refers to non-relational databases designed for scalability and flexibility (document, key-value, wide-column, graph databases).
Notarization (Software Artifact)
Software notarization is the process of verifying and attesting that a software artifact (binary/container/package) meets certain integrity and security requirements before it's distributed or executed.
Notebook (Jupyter Notebook)
A notebook is an interactive document that mixes code, outputs, and narrative text—commonly used for data science exploration and prototyping (e.g., Jupyter).
NUMA (Non-Uniform Memory Access)
NUMA is a memory architecture where memory access time depends on which CPU socket/node the memory is attached to (local memory is faster than remote).
Numerical Precision
Numerical precision is how accurately numbers are represented and computed (e.g., FP32 vs FP16/bfloat16), affecting rounding and stability.
NVLink
NVLink is a high-speed GPU interconnect used to provide faster GPU-to-GPU communication than standard PCIe in many setups.
NVMe
NVMe is a storage protocol/interface designed for high-speed access to SSDs, typically offering significantly lower latency and higher throughput than older interfaces.
O
OAuth 2.0
An authorization framework that enables applications to access resources on behalf of a user or service without sharing passwords.
Object Storage
Stores data as objects (blob + metadata + ID), optimized for durability and scalability (e.g., documents, images, logs).
Object-Oriented Programming
A programming paradigm that organizes software around "objects" – data structures that encapsulate state (attributes) and behavior (methods).
Observability
The ability to understand a system's internal state from its outputs—typically via logs, metrics, and traces.
OCR (Optical Character Recognition)
Converts text in images (scans, screenshots, photos, PDFs-as-images) into machine-readable text.
OCR (Optical Character Recognition)
Conversion of images containing text into machine-readable text.
On-Call
An operational practice where designated engineers respond to incidents affecting system reliability, performance, or security.
On-Call Rotation
A structured schedule for who is responsible for incident response over time, often with escalation paths and backup roles.
On-Device AI
AI inference executed entirely on the end device (phone, laptop, edge gateway) without cloud connection.
Open Graph Protocol
A set of metadata tags that control how a page appears when shared on social platforms and messaging apps (title, description, preview image).
OpenAPI Specification
A standard for describing REST APIs in a machine-readable format (endpoints, parameters, auth, request/response schemas).
OpenID Connect (OIDC)
An identity layer on top of OAuth 2.0 that provides authentication (who the user is) using standardized identity tokens.
OpenTelemetry (OTel)
A set of standards and tools for collecting and exporting telemetry—traces, metrics, and logs.
Operator (Kubernetes Operator)
Software that automates management of complex applications on Kubernetes using custom resources and controllers.
Outage
A period when a service is unavailable or unusable for its intended function (full or partial).
Outage Budget (Error Budget)
A practical tolerance for downtime/unreliability within a period, derived from SLOs and risk appetite.
Outage Postmortem
A structured analysis documenting what happened, impact, root causes, contributing factors, and corrective actions after an incident.
Outbox Pattern
A distributed systems design where a service writes its state changes and an "event to publish" into the same database transaction, then publishes the event reliably later.
P
P95 / P99 Latency
Percentile measures of response time: 95% (or 99%) of requests complete faster than this value.
Parallelism
Running computations concurrently to improve throughput or reduce time-to-result.
PCI DSS
A security standard for organizations that store, process, or transmit payment card data.
Penetration Testing
Authorized security testing where experts attempt to find and exploit vulnerabilities in a system.
Pipeline Parallelism
Splits a model into sequential stages across devices and processes micro-batches in a pipeline to use multiple devices efficiently.
PKI (Public Key Infrastructure)
PKI is the system of certificates, certificate authorities, and processes that enables secure identity verification and encryption using public/private keys.
Policy Decision Point (PDP)
The component that evaluates policies and returns a decision (e.g., allow/deny/step-up auth) for a given request.
Policy Drift
When the rules a system is supposed to enforce diverge over time due to changes in code, prompts, tools, or infrastructure.
Policy Enforcement Point (PEP)
The component that enforces policy decisions at runtime (allow/deny/modify/require-confirmation).
Policy-as-Code
Expressing governance rules in machine-readable, version-controlled code so policies can be tested, reviewed, and deployed like software.
Principle of Least Privilege
Giving users/services only the minimum permissions needed to perform their tasks—no more.
Privacy by Design
An approach where privacy protections are built into system architecture from the start, not bolted on later.
Public Key Infrastructure (PKI)
PKI is the system of certificates, CAs, policies, and lifecycle processes used to manage trust for public/private keys at scale.
Q
Qdrant
Qdrant is a vector database used for storing embeddings and performing similarity search (often for RAG and semantic search).
QoS (Quality of Service)
Quality of Service is the ability to prioritize and manage traffic so critical workloads meet performance guarantees.
QPS (Queries Per Second)
QPS measures how many queries a system can handle per second—often used for search services, APIs, and inference endpoints.
Query Cache
A query cache stores results of frequent queries so subsequent identical queries can be served faster and cheaper.
Queue
A Queue is a data structure following the FIFO principle (First In, First Out), where elements are processed in the order of their arrival.
Queue Depth
Queue depth is the number of pending messages/jobs waiting in a queue.
Queue Latency
Queue latency is the distribution of queue time (p50/p95/p99) for queued tasks.
Queue Time
Queue time is the time a request/job spends waiting in a queue before processing begins.
Queueing Theory
Queueing theory studies waiting lines (queues) to understand throughput, utilization, and latency under load.
Quorum
A quorum is the minimum number of participants/nodes required to agree or be present for a system to make a valid decision.
Quota Exhaustion
Quota exhaustion occurs when a user/tenant reaches a quota limit and further actions are blocked or throttled.
Quotas
Quotas are enforced limits on usage of a resource (requests, tokens, compute, storage, tool calls) within a defined scope.
R
Rate Limiting
Rate limiting restricts how many requests (or actions) a client can perform in a given time window.
Rate-Limit Backoff
Rate-limit backoff is adapting request behavior when receiving throttling signals (e.g., HTTP 429), typically by slowing down, retrying later, and/or shedding load.
RBAC (Role-Based Access Control)
RBAC assigns permissions to roles (e.g., "viewer," "editor," "admin") and assigns users/services to those roles.
RBAC/ABAC
RBAC (Role-Based Access Control) grants permissions via roles; ABAC (Attribute-Based Access Control) grants permissions via policies over attributes (user, resource, context).
RCA (Root Cause Analysis)
Root cause analysis is the process of identifying the underlying causes of an incident—not just symptoms—and defining corrective actions.
RDF
RDF (Resource Description Framework) is a standard model for data interchange on the web that represents information as subject-predicate-object triples (facts).
Recursion
A programming concept where a function calls itself to break down a problem into smaller, similar subproblems.
Request Coalescing
Request coalescing merges multiple identical (or similar) concurrent requests into a single upstream request, then shares the result.
Response Schema
A response schema is a formal structure the system requires for outputs (fields, types, required sections), often enforced with validation.
Response Streaming
Response streaming sends model output to the client incrementally as it's generated, improving perceived responsiveness (time-to-first-token).
Response Validation
Response validation checks that outputs meet required structure, policy constraints, and quality rules before display or execution.
Retry
A retry is re-attempting a failed operation (API call, tool call, retrieval request) to recover from transient errors.
Retry Storm
A retry storm is a feedback loop where failing requests trigger retries that increase load, causing more failures and even more retries.
Retryable Error
A retryable error is a failure that may succeed on retry (e.g., transient network issues, temporary overload, rate limiting).
Risk Classification (AI Act)
Classification of an AI system into one of the four AI Act risk classes as the basis for applicable obligations.
Risk Register
A risk register is a structured list of risks, their likelihood/impact, mitigations, owners, and review cadence.
Rollback
A rollback reverts a deployment/change to a previous known-good version (code, model, prompt, index, policy).
Row Store
A row store database stores data row-by-row, optimizing for transactional workloads (OLTP) and retrieving full records efficiently.
RPO (Recovery Point Objective)
RPO is the maximum acceptable amount of data loss measured in time (e.g., "no more than 15 minutes of data").
RTO (Recovery Time Objective)
RTO is the maximum acceptable time to restore a service after an outage.
Runbook
A runbook is an operational guide for diagnosing and resolving specific incidents, including steps, decision points, and escalation paths.
S
SaaS-pocalypse
Term for the thesis that many classic SaaS tools will be made obsolete by agentic AI workflows.
SAML
SAML (Security Assertion Markup Language) is a standard for single sign-on (SSO) that exchanges authentication and authorization data between an identity provider and a service provider.
Sandbox Environment
A sandbox environment is an isolated, non-production environment used to test workflows, integrations, prompts, and tool actions safely.
Schema.org DefinedTerm
Schema.org DefinedTerm is structured data markup for representing a term and its definition in a machine-readable way.
SCORM/xAPI
SCORM and xAPI (Experience API, "Tin Can") are standards for packaging, delivering, and tracking learning experiences in learning platforms.
SDK
An SDK (Software Development Kit) is a set of tools, libraries, and documentation that helps developers integrate with a platform or API.
SDLC is Dead
Thesis that the classic Software Development Lifecycle (analysis, design, code, test, deploy) is being replaced by agentic development loops.
Search Algorithm
A procedure for systematically traversing a data space to find a specific element or identify a solution to a problem.
Secrets Management
Secrets management is securely storing, accessing, rotating, and auditing secrets such as API keys, tokens, and credentials.
Secure by Design
Secure by design means security is built into system architecture from the start via safe defaults, least privilege, and defense-in-depth—rather than patched later.
Secure Egress Control
Secure egress control restricts and monitors outbound network access from systems to reduce data exfiltration risk (allowlists, proxies, DNS controls).
Secure Enclave
A secure enclave is a hardware-backed isolated execution environment designed to protect data and code while in use.
Secure Tool Calling
Secure tool calling is executing actions via tools/APIs in a way that enforces authorization, validation, and safety—without relying on the LLM's good behavior.
Security
Security is protecting systems and data against threats by ensuring confidentiality, integrity, and availability (CIA), plus accountability and resilience.
Security Posture
Security posture is the overall security state of a system, measured by controls, configuration, monitoring coverage, and incident readiness.
Self-tuning Systems
Self-tuning systems automatically adjust internal parameters to maintain or improve performance under changing conditions.
Semantic Versioning
Semantic versioning (SemVer) is a versioning convention: MAJOR.MINOR.PATCH, where MAJOR indicates breaking changes, MINOR indicates backward-compatible features, PATCH indicates backward-compatible fixes.
Semantic Web
The Semantic Web is an extension of the World Wide Web that structures data in machine-readable formats so computers can understand and process their meaning.
Server-Sent Events
Server-Sent Events (SSE) is a web technology that streams real-time updates from server to client over a single HTTP connection.
Server-Side Rendering
Server-Side Rendering (SSR) generates page HTML on the server per request (or per route) rather than relying entirely on client-side JavaScript.
Service Account
A service account is a non-human identity used by applications/services to authenticate to other systems and perform actions programmatically.
Service Level Agreement (SLA)
A Service Level Agreement (SLA) is a contract between service provider and customer that defines measurable quality standards such as availability, response times, and support levels.
Service Mesh
A service mesh is an infrastructure layer (often via sidecars or proxies) that manages service-to-service communication with consistent security, observability, and traffic policies.
Shadow Deployment
A shadow deployment runs a new model/system version on real traffic without affecting user outputs, to evaluate behavior safely.
Sharding
Sharding partitions a dataset across multiple databases or nodes (shards) to scale storage and throughput.
Shortest Path
An algorithm problem that finds the optimal (shortest, fastest, or cheapest) route between two nodes in a graph.
SIEM
SIEM (Security Information and Event Management) is a system that aggregates security logs/events for detection, investigation, and compliance reporting.
Signed Webhook
A signed webhook includes a cryptographic signature so the receiver can verify the request really came from the sender and wasn't tampered with.
Single Sign-On
Single Sign-On (SSO) lets users authenticate once via an identity provider and access multiple services without separate logins (often via SAML or OIDC).
Single Sign-On (SSO)
Single Sign-On (SSO) enables users to authenticate once with an identity provider (IdP) and access multiple applications without re-authenticating for each.
SLA (Service Level Agreement)
An SLA is a contractual commitment to service performance (e.g., uptime), often with remedies/credits if not met.
SLI (Service Level Indicator)
An SLI is the measurable metric used to evaluate whether an SLO is being met (latency, error rate, correctness proxy, cost per answer).
SLO (Service Level Objective)
An SLO is a target level of service performance/reliability (e.g., 99.9% availability, p95 latency < 2s).
SOC 2
SOC 2 is an attestation framework focused on controls related to security, availability, processing integrity, confidentiality, and privacy.
Software Bill of Materials (SBOM)
A Software Bill of Materials (SBOM) is an inventory of software components and dependencies used in a system (libraries, versions, suppliers).
Space Complexity
Space complexity describes how an algorithm's memory usage grows with input size (often using Big-O notation).
Speech Synthesis
Artificial generation of human speech from text (text-to-speech).
SRE
Site Reliability Engineering (SRE) applies software engineering practices to operations to achieve reliable, scalable systems using SLOs, automation, and incident discipline.
Stack
A Stack is a fundamental data structure following the LIFO principle (Last In, First Out), where the last added element is removed first.
Staging Environment
A staging environment is a pre-production environment designed to mirror production as closely as possible for final validation.
State Transition System
A state transition system models a system as states and transitions that move it from one state to another.
Static Site Generation
Static Site Generation (SSG) builds pages ahead of time into static HTML (often deployed on a CDN) for very fast delivery and high reliability.
Streaming (Token Streaming)
Outputting LLM tokens as they are generated instead of waiting for the complete response.
Structured Logging
Structured logging records logs in a consistent, machine-parseable format (fields like request_id, tenant_id, route, model_version, latency_ms) rather than free-form strings.
Superwise
An AI observability and monitoring platform that tracks performance using 100+ metrics and generates real-time incident reports.
Supply Chain Security
Supply chain security protects software and AI dependencies (libraries, containers, build pipelines, models, datasets) from tampering and compromise.
Synthetic Monitoring
Synthetic monitoring runs automated, scripted checks to simulate user actions and detect failures before users report them.
SynthID
Google's technology for invisible digital watermarks in AI-generated images, videos, and audio for provenance marking.
T
Threat Modeling
Threat modeling is a structured process for identifying assets, attack surfaces, threats, and mitigations to reduce security risk.
Time Complexity
Time complexity describes how an algorithm's runtime grows as input size increases, often expressed using Big‑O notation (e.g., O(log n), O(n), O(n²)).
TLS (Transport Layer Security)
TLS (Transport Layer Security) is a cryptographic protocol that secures network communication by providing encryption, integrity, and endpoint authentication.
Truncation
Truncation is cutting off data that exceeds a maximum length – whether text for LLMs, sequences for models, or decimal places.
Trust Boundary
A trust boundary is a point in a system where the level of trust changes (e.g., from untrusted user input to internal services).
Trust Models
A trust model defines who/what is trusted to make assertions (identity, integrity, authorization) and how that trust is established, delegated, and verified.
U
UAT (User Acceptance Testing)
User Acceptance Testing (UAT) is the final validation phase where real users confirm a system meets business requirements.
Ubiquitous Language
Ubiquitous language is a DDD practice where teams use a shared, precise vocabulary for core concepts.
Unbounded Fan-Out
Unbounded fan-out: workflow spawns uncontrolled downstream calls (tools, retrieval, model calls).
Unicode Normalization
Unicode normalization converts text into canonical form for consistent treatment.
Unified Search
Unified search: one search experience across multiple content sources (docs, tickets, wiki, CRM).
Unit Test
A unit test verifies the behavior of an isolated piece of code automatically in CI.
Update Cadence
Update cadence is the planned frequency for content/system refreshes.
Update vs Upgrade
Update: minor, backward-compatible change. Upgrade: larger change with potential behavior changes.
Upsert
An upsert updates a record if it exists or inserts it if it doesn't.
URL (Uniform Resource Locator)
A URL is the address of a web resource (scheme, domain, path, query parameters).
Usage Anomaly Detection
Identifies unusual patterns in user/tenant behavior (spikes, errors).
Usage-Based Pricing
Usage-based pricing charges based on consumption (tokens, requests, tool calls).
Usage-Based Routing
Adapts model/workflow selection based on cost and consumption signals.
V
Validator
A validator is a component that checks whether an input/output meets required constraints (schema, safety policy, semantics, permissions).
Value-Based Pricing
Value-based pricing sets price based on the value delivered to customers (outcomes), not purely on provider costs (tokens, compute).
Vector Database
A database optimized for efficient storage and retrieval of high-dimensional vectors (embeddings).
Vector Index
A data structure enabling efficient similarity search in high-dimensional vector spaces.
Vendor Risk Management
Vendor Risk Management (VRM) is assessing and managing risks introduced by third-party providers (security, privacy, compliance, continuity, and operational dependencies).
Verifiability
Verifiability is the property that claims can be checked against reliable sources, logs, or measurable evidence.
Version Control
Version control tracks changes to code, configs, prompts, schemas, and content over time, enabling collaboration, rollbacks, and auditability.
Versioned Prompt
A versioned prompt is a prompt template managed like a software artifact: changes are tracked, tested, reviewed, and deployable with rollback.
vLLM
vLLM is an inference/serving approach (and commonly a serving engine) designed to run LLMs efficiently with high throughput and strong utilization.
Voice Cloning
AI technology for replicating a specific human voice.
Voice Search
Search using spoken language through assistants and devices.
W
WAF (Web Application Firewall)
A Web Application Firewall (WAF) filters and monitors HTTP traffic to protect web apps from attacks (e.g., injection, abuse, bot traffic).
WASM (WebAssembly)
WebAssembly (WASM) is a binary instruction format that enables near-native performance code to run in the browser (and other runtimes).
Web Scraping
Web scraping is programmatically extracting data from websites for analysis, indexing, or monitoring.
Webhook
A webhook is an event-driven HTTP callback where one system sends another system data when something happens (e.g., "ticket created," "payment succeeded").
Webhook Verification
Webhook verification ensures incoming webhook requests are authentic and untampered, typically using HMAC signatures, timestamps, and replay protection.
Windsurf
An AI-powered code editor by Codeium offering deep context awareness and agentic coding assistance.
Workflow Automation
Workflow automation uses software (often with AI) to execute repetitive tasks or business processes with minimal manual intervention.
Workflow Orchestration
Workflow orchestration coordinates multi-step processes across services/tools, managing state, retries, timeouts, and error handling.
Workload Isolation
Workload isolation separates workloads so one workload can't degrade another's performance, security, or cost (e.g., interactive vs batch).
Write Amplification
Write amplification is when a system performs much more internal writing than the size of the user's write request (common in storage engines and log-structured systems).
Write-Back Cache
A write-back cache writes changes to the cache first and flushes them to the backing store asynchronously later.
Write-Through Cache
A write-through cache writes data to both the cache and the backing store synchronously on every write.
X
X-Content-Type-Options
X-Content-Type-Options: nosniff is an HTTP header that instructs browsers not to "MIME sniff" a response and to respect declared content types.
X-Forwarded-For
X-Forwarded-For is an HTTP header used to identify the originating client IP address when a request passes through proxies or load balancers.
X-Frame-Options
X-Frame-Options is an HTTP response header that helps prevent clickjacking by controlling whether a page can be embedded in an iframe.
X-Robots-Tag
X-Robots-Tag is an HTTP header that gives robots directives (like noindex, nofollow) similar to meta robots tags—useful for non-HTML resources.
X.509 Certificate
An X.509 certificate is a digital certificate standard used for public key infrastructure (PKI), enabling TLS and identity verification.
X.509 Certificate
An X.509 certificate is a digital certificate standard used in PKI to bind a public key to an identity, enabling secure authentication and encrypted communication (e.g., TLS).
XDR (Extended Detection and Response)
XDR is a security approach that unifies detection and response across endpoints, networks, identities, cloud workloads, and more.
XLA
XLA (Accelerated Linear Algebra) is a compiler for machine learning computations that optimizes operations and compiles them for various hardware platforms (CPU, GPU, TPU).
XLA (Accelerated Linear Algebra)
XLA is a compiler for linear algebra computations (commonly associated with TensorFlow and JAX) that optimizes execution by fusing operations and improving hardware utilization.
XML (Extensible Markup Language)
XML is a markup language for representing structured data using nested tags.
XML Sitemap
An XML sitemap is a machine-readable list of URLs (with optional metadata like lastmod) that helps search engines discover and crawl content efficiently.
XOR Cipher
A XOR cipher is a simple encryption method that combines plaintext with a key using XOR; by itself it is generally not secure unless used correctly in specific forms.
XPath
XPath is a language for selecting nodes in an XML/HTML document using path expressions.
XQuery
XQuery is a query language for extracting and transforming data stored in XML documents.
XSLT
XSLT is a language used to transform XML documents into other formats (XML, HTML, plain text).
XSRF Token
An XSRF token (often synonymous with CSRF token) is a secret value used to prevent Cross-Site Request Forgery attacks.
XSS (Cross-Site Scripting)
Cross-Site Scripting (XSS) is a web vulnerability where attackers inject malicious scripts into content that is later served to other users.
XSS in AI-Generated Markdown
XSS in AI-generated markdown is the risk that markdown produced by an AI system can contain content that becomes executable when rendered.
XSS Payload
An XSS payload is the injected script or markup an attacker uses to exploit a cross-site scripting vulnerability.
XSS Prevention Patterns
XSS prevention patterns are design and engineering practices that prevent cross-site scripting by ensuring untrusted content cannot execute as code in a user's browser.
xUnit
xUnit refers to a family of unit testing frameworks (e.g., JUnit, NUnit, pytest, xUnit.net) that standardize how automated tests are written and executed.
XXE (XML External Entity)
XXE is a vulnerability where an XML parser processes external entities in a way that can expose sensitive data, trigger SSRF-like behavior, or cause denial of service.
Y
Y-Combinator
The Y-combinator is a concept from lambda calculus that enables recursion in languages that don't have named self-references.
YAML
YAML ("YAML Ain't Markup Language") is a human-readable data serialization format commonly used for configuration files.
YAML Anchors and Aliases
YAML anchors and aliases let you define reusable blocks (anchors) and reference them elsewhere (aliases) to avoid repetition.
YAML Front Matter
YAML front matter is a YAML block at the start of a content file (often Markdown) used to store metadata (title, tags, canonical URL, updated date).
YAML Injection
YAML injection is when untrusted input is interpreted as YAML and causes unintended behavior—often through unsafe deserialization or config templating.
YAML Schema Validation
YAML schema validation checks that a YAML file conforms to an expected structure and constraints (fields, types, required keys, enums).
YARA Rule
A YARA rule is a pattern-matching rule used in cybersecurity to identify malware or suspicious artifacts in files and memory.
YARN
YARN (Yet Another Resource Negotiator) is a resource management layer in the Hadoop ecosystem for scheduling and running distributed applications.
Z
Z-Index
z-index is a CSS property that controls the stacking order of overlapping elements on a web page (which layer appears on top).
Z-Layer Architecture
Z-layer architecture is an informal term teams use to describe layered stacks where each layer provides a specific responsibility (UI → API gateway → policy → orchestration → tools/data).
Zero Trust
Zero Trust is a security model that assumes no implicit trust—every request must be authenticated, authorized, and continuously evaluated, regardless of network location.
Zero-Day Vulnerability
A zero-day vulnerability is a security flaw unknown to the vendor or without an available patch at the time it is exploited.
Zero-Knowledge Proof (ZKP)
A zero-knowledge proof (ZKP) is a cryptographic method that lets one party prove a statement is true without revealing the underlying data.
Zettelkasten
Zettelkasten is a knowledge-management method based on atomic notes and dense linking between ideas to build a scalable "knowledge graph" of concepts.
Zipping Artifacts
Zipping artifacts bundles files (models, configs, logs, datasets, build outputs) into a compressed archive for storage, transport, or deployment.
ZK-SNARK
ZK-SNARK is a type of zero-knowledge proof designed to be succinct and efficiently verifiable.
ZK-STARK
ZK-STARK is a type of zero-knowledge proof designed to be transparent (no trusted setup) and scalable, often with different performance tradeoffs than SNARKs.
Zod
Zod is a TypeScript-first schema validation library used to define and validate data structures at runtime.
Zombie Process
A zombie process is a process that has finished execution but still has an entry in the process table because its parent hasn't reaped its exit status.
Zonal vs Regional Services
Zonal services operate within a single availability zone; regional services span multiple zones within a region.
Zone Redundancy
Zone redundancy is deploying services across multiple availability zones to remain resilient if one zone fails or degrades.
ZooKeeper (Apache ZooKeeper)
Apache ZooKeeper is a distributed coordination service used for configuration management, leader election, and distributed locks.
Zstandard (zstd)
Zstandard (zstd) is a fast compression algorithm designed to provide high compression ratios with low CPU overhead.
ZTNA (Zero Trust Network Access)
ZTNA is a zero-trust approach to granting network access based on identity and context, often replacing legacy VPN patterns with app-level access controls.