Skip to main content
    Skip to main contentSkip to navigationSkip to footer
    Technology

    Technology Terms A-Z

    Understand technology without a computer science degree: This glossary explains important tech terms like APIs, Cloud Computing and Microservices specifically for marketing professionals.

    APIs & Integrations
    Cloud Computing
    SaaS & PaaS
    Microservices
    DevOps
    Edge Computing
    377 terms in Technology

    A

    A2A (Agent-to-Agent Protocol)

    A2A (Agent-to-Agent) is an open standard initiated by Google for direct communication between autonomous AI agents — regardless of which framework (LangChain, OpenAI, Claude, AutoGen) they were built with.

    Abstract Data Type

    A conceptual model of a data structure defined by its behavior (operations and properties) rather than a specific implementation.

    Abstraction

    The process of simplifying complexity by focusing on high-level concepts and hiding lower-level details.

    Accelerating Change

    The perceived increase in the rate of technological innovation and societal progress over time.

    Action Schema

    Action Schema is an extension of the schema.org vocabulary (PotentialAction, Schema.Action) that lets websites machine-readably declare which actions (buy, book, reserve, subscribe, contact) a user or agent can perform on the page.

    Agent-to-Agent (A2A)

    Direct communication between autonomous AI agents without human mediation – e.g., for negotiation, booking, or data exchange.

    Agent-to-Agent Protocol (A2A)

    An open protocol developed by Google that standardizes communication and collaboration between different AI agents.

    AI Abundance Economy

    Economic model in which AI drives the production cost of knowledge, software, and content toward zero, with scarcity primarily in energy, compute, and attention.

    AI Accelerator

    Specialized hardware designed specifically to speed up artificial intelligence tasks, particularly the heavy mathematical computations in machine learning.

    AI Act Compliance

    Operational implementation of EU AI Act requirements in organizations – from risk classification to logging obligations.

    AI Governance Board

    Cross-functional corporate body steering AI strategy, risk decisions, use case approvals, and compliance.

    AI Liability

    Legal and organizational responsibility for damages caused by AI systems or autonomous agents.

    AI Observability

    The practice of real-time monitoring, evaluation, and debugging of AI systems in production – from classical ML models to LLM applications and autonomous agents.

    AI Red Teaming

    Systematic testing of AI systems by an attacker team to identify weaknesses, bias, and misuse potential.

    AP2 (Agent Payments Protocol)

    The Agent Payments Protocol (AP2) is an open standard initiated in 2025 by Google together with 60+ partners (Mastercard, PayPal, American Express, Coinbase and others) that lets AI agents securely and verifiably trigger payments on behalf of users or businesses.

    API (Application Programming Interface)

    An interface that allows software applications to communicate with each other and exchange data.

    Arize AI

    An AI observability platform that runs over 50 million evaluations per month and serves over 1 trillion inferences. Arize helps monitor, evaluate, and optimize ML models and generative AI applications.

    Array

    An array is a contiguous data structure storing elements of the same type (in many languages) accessed by index.

    Audit Logging

    Audit logging records security-relevant events (access, policy decisions, admin changes, tool actions) in an immutable or tamper-evident way.

    Authorization

    Authorization determines what an authenticated identity is allowed to do (permissions), such as reading specific data or executing specific actions.

    Auto-Complete

    Auto-complete is a feature that, during text entry, automatically offers matching completion suggestions — based on dictionaries, search history, statistical language models, or, since 2023, generative LLMs.

    Automata Theory

    The branch of computer science and mathematics that deals with abstract machines (automata) and the computational problems they can solve.

    E

    Economics of AGI

    Research and discourse field on macroeconomic effects of artificial general intelligence on labor, productivity, and value creation.

    Edge AI

    AI processing that happens on local devices (edge) rather than in the cloud, for low latency and privacy.

    Edge Computing

    Data processing close to the data source instead of in central clouds.

    Encapsulation

    A programming concept that bundles data and the methods that access it into a single unit (class/module) and restricts direct access from outside.

    Encryption

    Encryption transforms plaintext into ciphertext using a key, so only authorized parties can recover the original information.

    Encryption at Rest

    Encryption at rest protects stored data (databases, disks, backups, object storage) by encrypting it when not actively being transmitted or processed.

    Encryption in Transit

    Encryption in transit protects data while it moves across networks, commonly implemented using TLS (e.g., HTTPS).

    Endpoint

    A URL where an API service is accessible and receives requests.

    Envelope Encryption

    Envelope encryption encrypts data with a short-lived data key, then encrypts that data key with a longer-lived master key (often in KMS/HSM).

    EU AI Act

    EU Regulation 2024/1689 that regulates AI systems by risk class and is progressively applicable from 2026.

    Event-Driven Architecture

    Software architecture where components communicate through events.

    Experiment Tracking

    Systematic logging and management of ML experiments.

    Exponential Backoff

    Exponential backoff increases the wait time between retries exponentially after each failure (e.g., 100ms → 200ms → 400ms → 800ms…).

    Exponential Growth

    A growth pattern where a quantity grows proportionally to its current value, leading to doubling in constant time intervals.

    L

    Latency

    The time between request and response in a system.

    Latency Budget

    A latency budget is an explicit allocation of maximum allowed time for each system component to meet an overall SLA.

    Layer

    A Layer is an abstract level in a layered system that encapsulates a specific function and communicates with other layers through defined interfaces.

    Learning Management System

    A Learning Management System (LMS) is software for delivering, managing, and tracking training and learning content (courses, assignments, completion, assessments).

    Learning Record Store (LRS)

    A Learning Record Store (LRS) is a system that stores learning activity data—typically as xAPI statements—and enables reporting and analytics across learning experiences.

    Least Privilege

    Least privilege grants only the minimum permissions needed to perform a task—no more, no longer than necessary.

    Lexical Search

    Lexical search retrieves documents based on exact words/terms (keyword matching), typically using inverted indexes and BM25.

    Liability Target

    Clearly defined entity (person, role, or organization) liable for an AI agent's decisions or damages.

    Link Graph

    A link graph is the network of pages (nodes) connected by links (edges), both internally and externally.

    Linting

    Linting is automatically checking code (or structured content) for errors, style violations, and quality issues based on rules.

    LLM Observability

    LLM observability is collecting and analyzing telemetry that explains LLM system behavior in production.

    LLM Routing

    LLM routing is selecting which model/workflow to use for a request based on intent, risk, and cost constraints.

    Load Balancing

    Load balancing distributes incoming traffic across multiple servers to improve availability, throughput, and latency.

    Locality-Sensitive Hashing (LSH)

    LSH is a technique that hashes items so similar items are more likely to land in the same bucket.

    M

    Mac mini M4 Pro

    Apple's compact desktop with M4 Pro chip and Neural Engine, popular as an affordable on-device AI workstation.

    MCP (Model Context Protocol)

    The Model Context Protocol (MCP) is an open standard released by Anthropic in late 2024 that lets AI models access external tools, data and systems in a structured way — a kind of "USB-C for AI".

    MCP Protocol

    Open protocol by Anthropic that gives LLMs standardized access to tools, data sources, and external services.

    Memory Bandwidth

    Memory bandwidth is the amount of data that can be moved to/from memory per unit time; for GPUs it strongly influences how fast data can be fed into compute.

    Metadata Filtering (Vector Search)

    Metadata filtering restricts vector search results using structured fields (e.g., tenant_id, timestamps, doc_type) in addition to similarity search.

    Microservices

    Architecture style where an application consists of small, independent services.

    MLOps

    MLOps is the practice of operationalizing machine learning—deploying, monitoring, versioning, and governing ML systems reliably.

    Model Context Protocol (MCP)

    Model Context Protocol (MCP) is an open standard for connecting LLM applications to external data sources and tools via a standardized client/server pattern.

    Model Registry

    Central version management for trained ML models.

    Model Serving

    Deployment of trained ML models for inference in production environments.

    Moderation

    Moderation is the detection, review, and enforcement process that applies content policy to user inputs, generated outputs, and platform behavior.

    Modular Design

    Modular design structures systems as cohesive modules with clear responsibilities and stable interfaces, minimizing coupling.

    Modularity

    A design principle that divides systems into independent, interchangeable components (modules) that communicate through defined interfaces.

    Moore's Law

    The observation that the number of transistors on integrated circuits doubles approximately every two years, leading to exponential growth in computing power.

    mTLS (Mutual TLS)

    mTLS is a TLS setup where both client and server authenticate each other using certificates (two-way authentication).

    Multi-Region

    An architecture that distributes applications and data across multiple geographic data centers to optimize latency, availability, and compliance.

    Multi-tenancy

    Multi-tenancy is a software architecture where a single instance of an application serves multiple customers ("tenants") while keeping each tenant's data/config separated and secure.

    N

    N-Tier Architecture

    N-tier architecture is a system design that separates an application into logical layers (tiers)—commonly presentation, application/business logic, and data—to improve scalability, maintainability, and security.

    NAC (Network Access Control)

    Network Access Control (NAC) is a security approach that restricts network access based on device identity, posture, and policy (e.g., only compliant devices can access sensitive services).

    NACK (Negative Acknowledgment)

    A NACK is a message indicating a request/message was not successfully processed (the opposite of an ACK).

    Namespace Collision

    A namespace collision happens when two resources share the same name in a context where names must be unique, causing ambiguity or runtime errors.

    Namespace Isolation Patterns

    Namespace isolation patterns are design approaches (often in Kubernetes) that use namespaces, policies, quotas, and secrets boundaries to isolate environments or tenants.

    Namespace-Scoped Secrets

    Namespace-scoped secrets are secrets managed within a specific namespace boundary (commonly in Kubernetes), limiting which workloads can access them.

    NAT (Network Address Translation)

    NAT maps private IP addresses to public IP addresses (and vice versa), enabling private networks to access external networks while reducing public IP usage.

    NCCL (NVIDIA Collective Communications Library)

    NCCL is a library used for fast GPU-to-GPU communication primitives (collectives) such as all-reduce, broadcast, and all-gather—commonly in distributed training and inference.

    NCCL All-Reduce

    All-reduce is a collective operation that aggregates data (often summation) across devices and distributes the result back to all devices.

    Near-Duplicate Detection

    Near-duplicate detection identifies items that are not exactly identical but are highly similar (e.g., same content with minor edits, boilerplate differences, or formatting changes).

    Neo4j

    Neo4j is the leading graph database that stores data as nodes and relationships, enabling efficient queries over connected data structures.

    Network Bandwidth

    Network bandwidth is the rate at which data can be transmitted over a network (e.g., Mbps, Gbps).

    Network DLP

    Network Data Loss Prevention (DLP) is a set of controls that detect and prevent sensitive data from leaving a network boundary through outbound traffic (egress).

    Network Egress

    Network egress is outbound traffic leaving a system/network (e.g., from your VPC to the internet or to external SaaS APIs).

    Network Jitter

    Network jitter is variation in packet delay over time (inconsistent latency), even if average latency is acceptable.

    Network Latency

    Network latency is the time it takes for data to travel across a network between systems (client ↔ server, service ↔ service).

    Network Load Balancer

    A network load balancer distributes incoming network traffic across multiple servers/instances to improve availability and performance.

    Network Partition

    A network partition is a failure where parts of a distributed system cannot communicate with each other, even though each part may still be running.

    Network Rate Limiting

    Network rate limiting restricts request rates to protect services from overload, abuse, or cost blowups.

    Network Segmentation

    Network segmentation is dividing a network into isolated segments to reduce attack surface, limit lateral movement, and enforce least privilege access.

    Network Topology

    Network topology describes how network components are arranged and connected (physical and logical layout).

    Network-Aware Batching

    Network-aware batching groups requests to reduce network overhead and improve throughput, especially when network latency dominates.

    NetworkPolicy (Kubernetes)

    A Kubernetes NetworkPolicy defines how pods are allowed to communicate with each other and with external endpoints, enabling micro-segmentation inside clusters.

    Neural Processing Unit (NPU)

    An NPU is specialized hardware designed to accelerate neural network computations (matrix multiplications, convolutions, attention-like ops) efficiently—often with strong power/performance advantages for specific workloads.

    Neural Processing Unit (NPU)

    An NPU is specialized hardware designed to accelerate neural network computations (matrix multiplications, convolutions, attention-like ops) efficiently—often with strong power/performance advantages for specific workloads.

    Neuromorphic Computing

    Neuromorphic computing is an approach to hardware and computation inspired by biological neural systems, often emphasizing event-driven processing and energy efficiency.

    NIST Cybersecurity Framework (NIST CSF)

    The NIST Cybersecurity Framework is a structured framework for managing cybersecurity risk through a common language, categories, and practices across the organization.

    NIST SP 800-53

    NIST SP 800-53 is a catalog of security and privacy controls used as a reference for designing and assessing secure systems.

    NIST SP 800-63 (Digital Identity)

    NIST SP 800-63 is guidance for digital identity: identity proofing, authentication, and federation concepts and requirements.

    Node Affinity

    Node affinity is a Kubernetes scheduling feature that constrains which nodes pods can run on (based on node labels), enabling placement control.

    Node Pool

    A node pool is a group of compute nodes (often in Kubernetes or managed clusters) with similar characteristics, managed together for scaling and scheduling.

    Node Selector

    Node selector is a Kubernetes mechanism to constrain pods to run on nodes with matching labels.

    Non-Blocking I/O

    Non-blocking I/O allows a program to initiate I/O operations without waiting synchronously for them to complete, enabling concurrency and better throughput.

    Non-Idempotent Operation

    A non-idempotent operation is one where repeating the same request multiple times can produce different outcomes (or duplicate side effects).

    Non-Production Environment

    A non-production environment is any environment that is not live customer production (e.g., dev, staging, test), used for development and validation.

    Non-Repudiation

    Non-repudiation is the ability to prove an action occurred and that a specific actor performed it—so they cannot later credibly deny it.

    Non-Retryable Error

    A non-retryable error is a failure that is unlikely to succeed if you simply retry (e.g., invalid input, permission denied).

    Nonce Reuse

    Nonce reuse is a security flaw where a "used once" value is accidentally reused, potentially enabling replay attacks or cryptographic failures (depending on context).

    NoSQL

    NoSQL refers to non-relational databases designed for scalability and flexibility (document, key-value, wide-column, graph databases).

    Notarization (Software Artifact)

    Software notarization is the process of verifying and attesting that a software artifact (binary/container/package) meets certain integrity and security requirements before it's distributed or executed.

    Notebook (Jupyter Notebook)

    A notebook is an interactive document that mixes code, outputs, and narrative text—commonly used for data science exploration and prototyping (e.g., Jupyter).

    NUMA (Non-Uniform Memory Access)

    NUMA is a memory architecture where memory access time depends on which CPU socket/node the memory is attached to (local memory is faster than remote).

    Numerical Precision

    Numerical precision is how accurately numbers are represented and computed (e.g., FP32 vs FP16/bfloat16), affecting rounding and stability.

    NVLink

    NVLink is a high-speed GPU interconnect used to provide faster GPU-to-GPU communication than standard PCIe in many setups.

    NVMe

    NVMe is a storage protocol/interface designed for high-speed access to SSDs, typically offering significantly lower latency and higher throughput than older interfaces.

    O

    OAuth 2.0

    An authorization framework that enables applications to access resources on behalf of a user or service without sharing passwords.

    Object Storage

    Stores data as objects (blob + metadata + ID), optimized for durability and scalability (e.g., documents, images, logs).

    Object-Oriented Programming

    A programming paradigm that organizes software around "objects" – data structures that encapsulate state (attributes) and behavior (methods).

    Observability

    The ability to understand a system's internal state from its outputs—typically via logs, metrics, and traces.

    OCR (Optical Character Recognition)

    Converts text in images (scans, screenshots, photos, PDFs-as-images) into machine-readable text.

    OCR (Optical Character Recognition)

    Conversion of images containing text into machine-readable text.

    On-Call

    An operational practice where designated engineers respond to incidents affecting system reliability, performance, or security.

    On-Call Rotation

    A structured schedule for who is responsible for incident response over time, often with escalation paths and backup roles.

    On-Device AI

    AI inference executed entirely on the end device (phone, laptop, edge gateway) without cloud connection.

    Open Graph Protocol

    A set of metadata tags that control how a page appears when shared on social platforms and messaging apps (title, description, preview image).

    OpenAPI Specification

    A standard for describing REST APIs in a machine-readable format (endpoints, parameters, auth, request/response schemas).

    OpenID Connect (OIDC)

    An identity layer on top of OAuth 2.0 that provides authentication (who the user is) using standardized identity tokens.

    OpenTelemetry (OTel)

    A set of standards and tools for collecting and exporting telemetry—traces, metrics, and logs.

    Operator (Kubernetes Operator)

    Software that automates management of complex applications on Kubernetes using custom resources and controllers.

    Outage

    A period when a service is unavailable or unusable for its intended function (full or partial).

    Outage Budget (Error Budget)

    A practical tolerance for downtime/unreliability within a period, derived from SLOs and risk appetite.

    Outage Postmortem

    A structured analysis documenting what happened, impact, root causes, contributing factors, and corrective actions after an incident.

    Outbox Pattern

    A distributed systems design where a service writes its state changes and an "event to publish" into the same database transaction, then publishes the event reliably later.

    P

    P95 / P99 Latency

    Percentile measures of response time: 95% (or 99%) of requests complete faster than this value.

    Parallelism

    Running computations concurrently to improve throughput or reduce time-to-result.

    PCI DSS

    A security standard for organizations that store, process, or transmit payment card data.

    Penetration Testing

    Authorized security testing where experts attempt to find and exploit vulnerabilities in a system.

    Pipeline Parallelism

    Splits a model into sequential stages across devices and processes micro-batches in a pipeline to use multiple devices efficiently.

    PKI (Public Key Infrastructure)

    PKI is the system of certificates, certificate authorities, and processes that enables secure identity verification and encryption using public/private keys.

    Policy Decision Point (PDP)

    The component that evaluates policies and returns a decision (e.g., allow/deny/step-up auth) for a given request.

    Policy Drift

    When the rules a system is supposed to enforce diverge over time due to changes in code, prompts, tools, or infrastructure.

    Policy Enforcement Point (PEP)

    The component that enforces policy decisions at runtime (allow/deny/modify/require-confirmation).

    Policy-as-Code

    Expressing governance rules in machine-readable, version-controlled code so policies can be tested, reviewed, and deployed like software.

    Principle of Least Privilege

    Giving users/services only the minimum permissions needed to perform their tasks—no more.

    Privacy by Design

    An approach where privacy protections are built into system architecture from the start, not bolted on later.

    Public Key Infrastructure (PKI)

    PKI is the system of certificates, CAs, policies, and lifecycle processes used to manage trust for public/private keys at scale.

    R

    Rate Limiting

    Rate limiting restricts how many requests (or actions) a client can perform in a given time window.

    Rate-Limit Backoff

    Rate-limit backoff is adapting request behavior when receiving throttling signals (e.g., HTTP 429), typically by slowing down, retrying later, and/or shedding load.

    RBAC (Role-Based Access Control)

    RBAC assigns permissions to roles (e.g., "viewer," "editor," "admin") and assigns users/services to those roles.

    RBAC/ABAC

    RBAC (Role-Based Access Control) grants permissions via roles; ABAC (Attribute-Based Access Control) grants permissions via policies over attributes (user, resource, context).

    RCA (Root Cause Analysis)

    Root cause analysis is the process of identifying the underlying causes of an incident—not just symptoms—and defining corrective actions.

    RDF

    RDF (Resource Description Framework) is a standard model for data interchange on the web that represents information as subject-predicate-object triples (facts).

    Recursion

    A programming concept where a function calls itself to break down a problem into smaller, similar subproblems.

    Request Coalescing

    Request coalescing merges multiple identical (or similar) concurrent requests into a single upstream request, then shares the result.

    Response Schema

    A response schema is a formal structure the system requires for outputs (fields, types, required sections), often enforced with validation.

    Response Streaming

    Response streaming sends model output to the client incrementally as it's generated, improving perceived responsiveness (time-to-first-token).

    Response Validation

    Response validation checks that outputs meet required structure, policy constraints, and quality rules before display or execution.

    Retry

    A retry is re-attempting a failed operation (API call, tool call, retrieval request) to recover from transient errors.

    Retry Storm

    A retry storm is a feedback loop where failing requests trigger retries that increase load, causing more failures and even more retries.

    Retryable Error

    A retryable error is a failure that may succeed on retry (e.g., transient network issues, temporary overload, rate limiting).

    Risk Classification (AI Act)

    Classification of an AI system into one of the four AI Act risk classes as the basis for applicable obligations.

    Risk Register

    A risk register is a structured list of risks, their likelihood/impact, mitigations, owners, and review cadence.

    Rollback

    A rollback reverts a deployment/change to a previous known-good version (code, model, prompt, index, policy).

    Row Store

    A row store database stores data row-by-row, optimizing for transactional workloads (OLTP) and retrieving full records efficiently.

    RPO (Recovery Point Objective)

    RPO is the maximum acceptable amount of data loss measured in time (e.g., "no more than 15 minutes of data").

    RTO (Recovery Time Objective)

    RTO is the maximum acceptable time to restore a service after an outage.

    Runbook

    A runbook is an operational guide for diagnosing and resolving specific incidents, including steps, decision points, and escalation paths.

    S

    SaaS-pocalypse

    Term for the thesis that many classic SaaS tools will be made obsolete by agentic AI workflows.

    SAML

    SAML (Security Assertion Markup Language) is a standard for single sign-on (SSO) that exchanges authentication and authorization data between an identity provider and a service provider.

    Sandbox Environment

    A sandbox environment is an isolated, non-production environment used to test workflows, integrations, prompts, and tool actions safely.

    Schema.org DefinedTerm

    Schema.org DefinedTerm is structured data markup for representing a term and its definition in a machine-readable way.

    SCORM/xAPI

    SCORM and xAPI (Experience API, "Tin Can") are standards for packaging, delivering, and tracking learning experiences in learning platforms.

    SDK

    An SDK (Software Development Kit) is a set of tools, libraries, and documentation that helps developers integrate with a platform or API.

    SDLC is Dead

    Thesis that the classic Software Development Lifecycle (analysis, design, code, test, deploy) is being replaced by agentic development loops.

    Search Algorithm

    A procedure for systematically traversing a data space to find a specific element or identify a solution to a problem.

    Secrets Management

    Secrets management is securely storing, accessing, rotating, and auditing secrets such as API keys, tokens, and credentials.

    Secure by Design

    Secure by design means security is built into system architecture from the start via safe defaults, least privilege, and defense-in-depth—rather than patched later.

    Secure Egress Control

    Secure egress control restricts and monitors outbound network access from systems to reduce data exfiltration risk (allowlists, proxies, DNS controls).

    Secure Enclave

    A secure enclave is a hardware-backed isolated execution environment designed to protect data and code while in use.

    Secure Tool Calling

    Secure tool calling is executing actions via tools/APIs in a way that enforces authorization, validation, and safety—without relying on the LLM's good behavior.

    Security

    Security is protecting systems and data against threats by ensuring confidentiality, integrity, and availability (CIA), plus accountability and resilience.

    Security Posture

    Security posture is the overall security state of a system, measured by controls, configuration, monitoring coverage, and incident readiness.

    Self-tuning Systems

    Self-tuning systems automatically adjust internal parameters to maintain or improve performance under changing conditions.

    Semantic Versioning

    Semantic versioning (SemVer) is a versioning convention: MAJOR.MINOR.PATCH, where MAJOR indicates breaking changes, MINOR indicates backward-compatible features, PATCH indicates backward-compatible fixes.

    Semantic Web

    The Semantic Web is an extension of the World Wide Web that structures data in machine-readable formats so computers can understand and process their meaning.

    Server-Sent Events

    Server-Sent Events (SSE) is a web technology that streams real-time updates from server to client over a single HTTP connection.

    Server-Side Rendering

    Server-Side Rendering (SSR) generates page HTML on the server per request (or per route) rather than relying entirely on client-side JavaScript.

    Service Account

    A service account is a non-human identity used by applications/services to authenticate to other systems and perform actions programmatically.

    Service Level Agreement (SLA)

    A Service Level Agreement (SLA) is a contract between service provider and customer that defines measurable quality standards such as availability, response times, and support levels.

    Service Mesh

    A service mesh is an infrastructure layer (often via sidecars or proxies) that manages service-to-service communication with consistent security, observability, and traffic policies.

    Shadow Deployment

    A shadow deployment runs a new model/system version on real traffic without affecting user outputs, to evaluate behavior safely.

    Sharding

    Sharding partitions a dataset across multiple databases or nodes (shards) to scale storage and throughput.

    Shortest Path

    An algorithm problem that finds the optimal (shortest, fastest, or cheapest) route between two nodes in a graph.

    SIEM

    SIEM (Security Information and Event Management) is a system that aggregates security logs/events for detection, investigation, and compliance reporting.

    Signed Webhook

    A signed webhook includes a cryptographic signature so the receiver can verify the request really came from the sender and wasn't tampered with.

    Single Sign-On

    Single Sign-On (SSO) lets users authenticate once via an identity provider and access multiple services without separate logins (often via SAML or OIDC).

    Single Sign-On (SSO)

    Single Sign-On (SSO) enables users to authenticate once with an identity provider (IdP) and access multiple applications without re-authenticating for each.

    SLA (Service Level Agreement)

    An SLA is a contractual commitment to service performance (e.g., uptime), often with remedies/credits if not met.

    SLI (Service Level Indicator)

    An SLI is the measurable metric used to evaluate whether an SLO is being met (latency, error rate, correctness proxy, cost per answer).

    SLO (Service Level Objective)

    An SLO is a target level of service performance/reliability (e.g., 99.9% availability, p95 latency < 2s).

    SOC 2

    SOC 2 is an attestation framework focused on controls related to security, availability, processing integrity, confidentiality, and privacy.

    Software Bill of Materials (SBOM)

    A Software Bill of Materials (SBOM) is an inventory of software components and dependencies used in a system (libraries, versions, suppliers).

    Space Complexity

    Space complexity describes how an algorithm's memory usage grows with input size (often using Big-O notation).

    Speech Synthesis

    Artificial generation of human speech from text (text-to-speech).

    SRE

    Site Reliability Engineering (SRE) applies software engineering practices to operations to achieve reliable, scalable systems using SLOs, automation, and incident discipline.

    Stack

    A Stack is a fundamental data structure following the LIFO principle (Last In, First Out), where the last added element is removed first.

    Staging Environment

    A staging environment is a pre-production environment designed to mirror production as closely as possible for final validation.

    State Transition System

    A state transition system models a system as states and transitions that move it from one state to another.

    Static Site Generation

    Static Site Generation (SSG) builds pages ahead of time into static HTML (often deployed on a CDN) for very fast delivery and high reliability.

    Streaming (Token Streaming)

    Outputting LLM tokens as they are generated instead of waiting for the complete response.

    Structured Logging

    Structured logging records logs in a consistent, machine-parseable format (fields like request_id, tenant_id, route, model_version, latency_ms) rather than free-form strings.

    Superwise

    An AI observability and monitoring platform that tracks performance using 100+ metrics and generates real-time incident reports.

    Supply Chain Security

    Supply chain security protects software and AI dependencies (libraries, containers, build pipelines, models, datasets) from tampering and compromise.

    Synthetic Monitoring

    Synthetic monitoring runs automated, scripted checks to simulate user actions and detect failures before users report them.

    SynthID

    Google's technology for invisible digital watermarks in AI-generated images, videos, and audio for provenance marking.

    W

    WAF (Web Application Firewall)

    A Web Application Firewall (WAF) filters and monitors HTTP traffic to protect web apps from attacks (e.g., injection, abuse, bot traffic).

    WASM (WebAssembly)

    WebAssembly (WASM) is a binary instruction format that enables near-native performance code to run in the browser (and other runtimes).

    Web Scraping

    Web scraping is programmatically extracting data from websites for analysis, indexing, or monitoring.

    Webhook

    A webhook is an event-driven HTTP callback where one system sends another system data when something happens (e.g., "ticket created," "payment succeeded").

    Webhook Verification

    Webhook verification ensures incoming webhook requests are authentic and untampered, typically using HMAC signatures, timestamps, and replay protection.

    Windsurf

    An AI-powered code editor by Codeium offering deep context awareness and agentic coding assistance.

    Workflow Automation

    Workflow automation uses software (often with AI) to execute repetitive tasks or business processes with minimal manual intervention.

    Workflow Orchestration

    Workflow orchestration coordinates multi-step processes across services/tools, managing state, retries, timeouts, and error handling.

    Workload Isolation

    Workload isolation separates workloads so one workload can't degrade another's performance, security, or cost (e.g., interactive vs batch).

    Write Amplification

    Write amplification is when a system performs much more internal writing than the size of the user's write request (common in storage engines and log-structured systems).

    Write-Back Cache

    A write-back cache writes changes to the cache first and flushes them to the backing store asynchronously later.

    Write-Through Cache

    A write-through cache writes data to both the cache and the backing store synchronously on every write.

    X

    X-Content-Type-Options

    X-Content-Type-Options: nosniff is an HTTP header that instructs browsers not to "MIME sniff" a response and to respect declared content types.

    X-Forwarded-For

    X-Forwarded-For is an HTTP header used to identify the originating client IP address when a request passes through proxies or load balancers.

    X-Frame-Options

    X-Frame-Options is an HTTP response header that helps prevent clickjacking by controlling whether a page can be embedded in an iframe.

    X-Robots-Tag

    X-Robots-Tag is an HTTP header that gives robots directives (like noindex, nofollow) similar to meta robots tags—useful for non-HTML resources.

    X.509 Certificate

    An X.509 certificate is a digital certificate standard used for public key infrastructure (PKI), enabling TLS and identity verification.

    X.509 Certificate

    An X.509 certificate is a digital certificate standard used in PKI to bind a public key to an identity, enabling secure authentication and encrypted communication (e.g., TLS).

    XDR (Extended Detection and Response)

    XDR is a security approach that unifies detection and response across endpoints, networks, identities, cloud workloads, and more.

    XLA

    XLA (Accelerated Linear Algebra) is a compiler for machine learning computations that optimizes operations and compiles them for various hardware platforms (CPU, GPU, TPU).

    XLA (Accelerated Linear Algebra)

    XLA is a compiler for linear algebra computations (commonly associated with TensorFlow and JAX) that optimizes execution by fusing operations and improving hardware utilization.

    XML (Extensible Markup Language)

    XML is a markup language for representing structured data using nested tags.

    XML Sitemap

    An XML sitemap is a machine-readable list of URLs (with optional metadata like lastmod) that helps search engines discover and crawl content efficiently.

    XOR Cipher

    A XOR cipher is a simple encryption method that combines plaintext with a key using XOR; by itself it is generally not secure unless used correctly in specific forms.

    XPath

    XPath is a language for selecting nodes in an XML/HTML document using path expressions.

    XQuery

    XQuery is a query language for extracting and transforming data stored in XML documents.

    XSLT

    XSLT is a language used to transform XML documents into other formats (XML, HTML, plain text).

    XSRF Token

    An XSRF token (often synonymous with CSRF token) is a secret value used to prevent Cross-Site Request Forgery attacks.

    XSS (Cross-Site Scripting)

    Cross-Site Scripting (XSS) is a web vulnerability where attackers inject malicious scripts into content that is later served to other users.

    XSS in AI-Generated Markdown

    XSS in AI-generated markdown is the risk that markdown produced by an AI system can contain content that becomes executable when rendered.

    XSS Payload

    An XSS payload is the injected script or markup an attacker uses to exploit a cross-site scripting vulnerability.

    XSS Prevention Patterns

    XSS prevention patterns are design and engineering practices that prevent cross-site scripting by ensuring untrusted content cannot execute as code in a user's browser.

    xUnit

    xUnit refers to a family of unit testing frameworks (e.g., JUnit, NUnit, pytest, xUnit.net) that standardize how automated tests are written and executed.

    XXE (XML External Entity)

    XXE is a vulnerability where an XML parser processes external entities in a way that can expose sensitive data, trigger SSRF-like behavior, or cause denial of service.

    Z

    Z-Index

    z-index is a CSS property that controls the stacking order of overlapping elements on a web page (which layer appears on top).

    Z-Layer Architecture

    Z-layer architecture is an informal term teams use to describe layered stacks where each layer provides a specific responsibility (UI → API gateway → policy → orchestration → tools/data).

    Zero Trust

    Zero Trust is a security model that assumes no implicit trust—every request must be authenticated, authorized, and continuously evaluated, regardless of network location.

    Zero-Day Vulnerability

    A zero-day vulnerability is a security flaw unknown to the vendor or without an available patch at the time it is exploited.

    Zero-Knowledge Proof (ZKP)

    A zero-knowledge proof (ZKP) is a cryptographic method that lets one party prove a statement is true without revealing the underlying data.

    Zettelkasten

    Zettelkasten is a knowledge-management method based on atomic notes and dense linking between ideas to build a scalable "knowledge graph" of concepts.

    Zipping Artifacts

    Zipping artifacts bundles files (models, configs, logs, datasets, build outputs) into a compressed archive for storage, transport, or deployment.

    ZK-SNARK

    ZK-SNARK is a type of zero-knowledge proof designed to be succinct and efficiently verifiable.

    ZK-STARK

    ZK-STARK is a type of zero-knowledge proof designed to be transparent (no trusted setup) and scalable, often with different performance tradeoffs than SNARKs.

    Zod

    Zod is a TypeScript-first schema validation library used to define and validate data structures at runtime.

    Zombie Process

    A zombie process is a process that has finished execution but still has an entry in the process table because its parent hasn't reaped its exit status.

    Zonal vs Regional Services

    Zonal services operate within a single availability zone; regional services span multiple zones within a region.

    Zone Redundancy

    Zone redundancy is deploying services across multiple availability zones to remain resilient if one zone fails or degrades.

    ZooKeeper (Apache ZooKeeper)

    Apache ZooKeeper is a distributed coordination service used for configuration management, leader election, and distributed locks.

    Zstandard (zstd)

    Zstandard (zstd) is a fast compression algorithm designed to provide high compression ratios with low CPU overhead.

    ZTNA (Zero Trust Network Access)

    ZTNA is a zero-trust approach to granting network access based on identity and context, often replacing legacy VPN patterns with app-level access controls.

    Term not found?

    Browse the full glossary with over 1407 terms from all categories.

    View Full Glossary
    👋Questions? Chat with us!