CloudTadaInsights
Glossary

Technical Definitions

Simplified explanations of complex technologies and industry concepts.

Backup & Recovery

14 items

3-2-1 Backup Strategy

A best practice backup methodology that recommends keeping 3 copies of data on 2 different media types with 1 copy stored offsite.

View Definition

Backup Window

The designated time period during which backup operations are scheduled to run, typically during low-usage periods to minimize impact on system performance.

View Definition

Cloud Backup / Online Backup

A backup method that stores data copies in remote cloud storage services over the internet, providing offsite data protection and accessibility.

View Definition

Deduplication (Data Dedup)

A data optimization technique that eliminates redundant copies of data by storing only unique data blocks, significantly reducing storage requirements.

View Definition

Differential Backup

A backup type that copies all data that has changed since the last full backup, regardless of how many incremental backups have occurred.

View Definition

Encryption

The process of converting data into a coded format to prevent unauthorized access, ensuring data security during storage and transmission.

View Definition

Full Backup

A complete copy of all data in a system, database, or application at a specific point in time.

View Definition

Immutable Backup

A backup copy that cannot be modified, deleted, or tampered with for a specified period, providing protection against ransomware and accidental changes.

View Definition

Incremental Backup

A backup type that only copies data that has changed since the last backup, whether it was a full or incremental backup.

View Definition

Mirror Backup

An exact copy of data that replicates the source structure and content, creating a complete mirror image of the original.

View Definition

On-site Backup

A backup method where data copies are stored within the same physical location as the original data, typically on local storage systems.

View Definition

Point-in-Time Recovery

A data recovery technique that allows restoration of data to any specific moment in time, enabling precise recovery before data corruption or unwanted changes occurred.

View Definition

Restore / Recovery

The process of retrieving and recovering data from backup copies to restore systems, applications, or files to a previous state after data loss or system failure.

View Definition

Retention Policy

A set of rules that defines how long backup data should be kept before being deleted or overwritten, balancing storage costs with recovery requirements.

View Definition

Kubernetes

1 items

AI

23 items

Agentic AI

AI systems that exhibit goal-directed behavior and can autonomously plan, execute, and adapt their actions to achieve specific objectives without continuous human intervention.

View Definition

AI Ethics

The branch of ethics that studies and evaluates moral problems related to AI systems, including the development, deployment, and use of artificial intelligence technologies in society.

View Definition

Anthropic

An AI safety company that develops large language models with a focus on safety and constitutional AI principles, known for creating the Claude family of AI assistants.

View Definition

ChatGPT

A conversational AI model developed by OpenAI based on the GPT architecture, designed to engage in human-like conversations and assist with various tasks through natural language interaction.

View Definition

Claude

A family of large language models developed by Anthropic, designed with a focus on safety, helpfulness, and harmlessness through constitutional AI techniques.

View Definition

Deep Learning

A subset of machine learning that uses artificial neural networks with multiple layers to model and understand complex patterns in data, inspired by the structure and function of the human brain.

View Definition

Deepseek

An open-source AI company that develops large language models, including DeepSeek-Coder for programming tasks and other specialized models for various applications.

View Definition

Explainable AI (XAI)

A set of tools and techniques that enable humans to understand and trust the decisions made by artificial intelligence systems, particularly for complex models like deep neural networks.

View Definition

Fine-tuning

The process of taking a pre-trained machine learning model and further training it on a specific task or dataset to adapt its general capabilities to a particular use case or domain.

View Definition

Gemini

A family of multimodal large language models developed by Google DeepMind, designed to understand and generate responses based on text, images, audio, video, and code inputs.

View Definition

Generative AI

A type of artificial intelligence that uses algorithms to generate new content such as text, images, audio, video, code, and other data based on patterns learned from training data.

View Definition

Graphics Processing Unit - (GPU)

A specialized electronic circuit designed to rapidly manipulate and alter memory to accelerate the creation of images in a frame buffer intended for output to a display device, now widely used for parallel computing in AI and machine learning.

View Definition

Hallucination

In AI, particularly large language models, the phenomenon where a model generates factually incorrect, fabricated, or nonsensical information that appears plausible but is not based on its training data or reality.

View Definition

Inference

In AI, the process of using a trained machine learning model to make predictions or generate outputs on new, unseen data after the model has completed its training phase.

View Definition

Large Language Model - (LLM)

A type of artificial intelligence model that is trained on vast amounts of text data to understand and generate human-like language, often containing billions or trillions of parameters.

View Definition

Machine Learning

A branch of artificial intelligence that enables computers to learn and improve from experience without being explicitly programmed, using algorithms that identify patterns in data and make predictions or decisions.

View Definition

Multimodal

In AI, a system or model that can process and understand multiple types of input data simultaneously, such as text, images, audio, and video, to provide more comprehensive analysis or generate richer outputs.

View Definition

OpenAI

An artificial intelligence research laboratory consisting of OpenAI Inc. and OpenAI LP, known for developing large language models and AI systems like GPT, ChatGPT, and DALL-E.

View Definition

Prompt Engineering

The practice of designing and crafting input prompts to effectively guide AI models in generating desired outputs, optimizing the interaction between humans and AI systems.

View Definition

Reinforcement Learning from Human Feedback (RLHF)

A machine learning technique that uses human feedback to train AI models through reinforcement learning, where human preferences and evaluations guide the model's learning process.

View Definition

Retrieval-Augmented Generation - (RAG)

An AI technique that combines information retrieval with text generation, where a model retrieves relevant documents or information before generating a response to ensure accuracy and grounding in factual data.

View Definition

Token

In AI and NLP, the smallest unit of text that an AI model processes, which can be a word, subword, or character depending on the tokenization method used by the model.

View Definition

Vector Embeddings

Numerical representations of data such as words, sentences, or documents in a multi-dimensional space, where similar items are positioned closer together, enabling semantic similarity calculations.

View Definition

AI & Security

1 items

Security

64 items

Agentic SOC

A Security Operations Center (SOC) that leverages artificial intelligence agents to automate security monitoring, threat detection, and incident response activities.

View Definition

Anti-malware

A security solution designed to detect, prevent, and remove malicious software including viruses, worms, trojans, spyware, adware, and other harmful programs.

View Definition

Antivirus (AV)

A security software designed to prevent, detect, and remove viruses and other malicious software from computer systems.

View Definition

API Keys

A unique identifier used to authenticate and authorize access to Application Programming Interfaces (APIs), typically used to track and control how APIs are being used.

View Definition

Attack Surface

The total sum of all possible entry points, interfaces, and pathways that an attacker could use to gain unauthorized access to a system or application.

View Definition

Blue Team

A group of security professionals responsible for defending an organization's systems and networks against attacks, often working in conjunction with red teams to improve security posture.

View Definition

Checkov

An open-source static analysis tool that scans infrastructure as code files to detect security and compliance misconfigurations, supporting multiple infrastructure providers and configuration formats.

View Definition

Cloud Access Security Broker (CASB)

A security policy enforcement point that sits between cloud service consumers and providers to monitor and control access to cloud applications and services.

View Definition

Compliance as Code

An approach that treats compliance policies and controls as code, enabling automated enforcement, testing, and management of compliance requirements.

View Definition

Container Security

The practice of securing containerized applications throughout their lifecycle, including image creation, orchestration, runtime, and monitoring.

View Definition

Continuous Compliance

An automated approach to compliance monitoring and enforcement that continuously assesses and validates adherence to regulatory requirements, security policies, and industry standards throughout the development and deployment lifecycle.

View Definition

Continuous Security

An approach that integrates security practices throughout the entire software development lifecycle, ensuring security is considered at every stage rather than as an afterthought.

View Definition

CSPM

Cloud Security Posture Management - a technology that continuously monitors cloud infrastructure to identify and remediate security issues and compliance violations.

View Definition

Data Loss Prevention / Data Leakage Prevention (DLP)

A security solution that detects potential data breaches and prevents unauthorized access to, or sharing of, sensitive data.

View Definition

Data Privacy

The relationship between the collection and dissemination of data, technology, the public expectation of privacy, and the legal and regulatory obligations related to personal information.

View Definition

Deepfake

An artificial intelligence-based technique used to create realistic fake images, audio, or video content that depicts people saying or doing things they never actually said or did.

View Definition

Defense-in-Depth

A security strategy that employs multiple layers of security controls to protect information and assets, ensuring that if one layer fails, others continue to provide protection.

View Definition

Dynamic Application Security Testing (DAST)

Dynamic Application Security Testing - a security testing methodology that examines running applications for vulnerabilities by simulating real-world attacks without access to the source code.

View Definition

Endpoint Detection and Response (EDR)

A security solution that continuously monitors endpoints to detect and investigate suspicious activities and security threats.

View Definition

Endpoint Security

A comprehensive approach to securing endpoints such as laptops, desktops, mobile devices, and servers from cyber threats and unauthorized access.

View Definition

Extended Detection and Response (XDR)

A security solution that integrates data from multiple security products to provide comprehensive detection, investigation, and response capabilities across endpoints, networks, cloud, and other security layers.

View Definition

IBM Identity and Access Management

IBM's suite of identity and access management solutions that provide authentication, authorization, and governance capabilities for enterprise applications and cloud services.

View Definition

Identity and Access Management (IAM)

A framework of policies and technologies that ensures the right individuals have the appropriate access to technology resources at the right times and for the right reasons.

View Definition

Incident Response

A structured approach to addressing and managing the aftermath of a security breach or cyberattack, including the preparation, detection, and response to security incidents.

View Definition

Interactive Application Security Testing (IAST)

Interactive Application Security Testing - a security testing methodology that combines elements of static and dynamic application security testing by running in the application runtime environment.

View Definition

ISO 27001

An international standard that provides requirements for establishing, implementing, maintaining, and improving an information security management system (ISMS) within the context of the organization.

View Definition

Multi-Factor Authentication (MFA)

A security system that requires users to provide two or more verification factors to gain access to an application, online account, or VPN.

View Definition

Next-Generation Firewall (NGFW)

Next-Generation Firewall - a security appliance that provides traditional firewall capabilities along with advanced features like application awareness, intrusion prevention, and threat intelligence.

View Definition

NGAV (Next-Generation Antivirus)

An advanced antivirus solution that uses machine learning, behavioral analysis, and cloud-based intelligence to detect and prevent sophisticated threats.

View Definition

Open Policy Agent (OPA)

An open-source, general-purpose policy engine that enables unified, context-aware policy enforcement across the entire technology stack, including cloud infrastructure, microservices, and APIs.

View Definition

OWASP

Open Web Application Security Project - an open-source community that provides tools, documentation, and education to improve software security.

View Definition

Penetration Testing

A simulated cyberattack against a computer system, network, or web application to identify security vulnerabilities that could be exploited by attackers.

View Definition

Phishing

A cyberattack that uses disguised email or other communication as a weapon to trick the recipient into revealing sensitive information or installing malware.

View Definition

Post-Quantum Cryptography (PQC)

Cryptographic algorithms designed to be secure against attacks by both classical and quantum computers, intended to replace current public-key algorithms that could be broken by quantum computers.

View Definition

Ransomware-as-a-Service (RaaS)

A cybercrime model where ransomware developers offer their malicious software to affiliates who carry out attacks in exchange for a percentage of the ransom payments.

View Definition

Red Team

A group of security professionals who simulate adversarial attacks to test an organization's defenses, often using advanced tactics, techniques, and procedures (TTPs) to identify security weaknesses.

View Definition

Resilience

The ability of a system, network, or organization to adapt, recover, and continue operating in the face of adverse conditions, including cyberattacks, natural disasters, or other disruptions.

View Definition

Sandbox

A security mechanism for isolating and analyzing potentially malicious code in a secure, contained environment.

View Definition

Secrets Management

The practice of securely storing, managing, and accessing sensitive information such as passwords, API keys, certificates, and other authentication credentials.

View Definition

Secure Access Service Edge (SASE)

A cloud-delivered security model that combines network and security functions into a single service delivered from the cloud.

View Definition

Secure by Design / Secure by Default

A security approach that involves considering security requirements during the design phase of systems, products, or services, ensuring that security features are built in from the beginning rather than added later.

View Definition

Secure Web Gateway (SWG)

A security solution that filters traffic between users and the internet to prevent threats and enforce acceptable use policies.

View Definition

Security as Code (SaC)

An approach that treats security controls and policies as code, enabling version control, automated testing, and continuous deployment of security measures.

View Definition

Security Lifecycle Management

The continuous process of managing security controls and measures throughout the entire lifecycle of systems, applications, and data, from design through decommissioning.

View Definition

Security Service Edge (SSE)

A framework that delivers network security capabilities as a cloud service, providing secure access to applications and services from any location.

View Definition

Single Sign-On (SSO)

An authentication process that allows users to access multiple applications and services with one set of login credentials.

View Definition

Smishing

A type of social engineering attack that uses SMS (text messages) to trick recipients into revealing personal information, installing malware, or visiting malicious websites.

View Definition

SOC2

A security framework and compliance standard developed by the American Institute of CPAs (AICPA) that defines criteria for managing customer data based on five trust service principles: security, availability, processing integrity, confidentiality, and privacy.

View Definition

Software Bill of Materials (SBOM)

A formal record containing the details and supply chain relationships of various components used in building software, similar to a list of ingredients in a recipe.

View Definition

Software Composition Analysis (SCA)

Software Composition Analysis - a security testing methodology that identifies and manages open-source and third-party components in applications to detect vulnerabilities, licensing issues, and compliance risks.

View Definition

Software-Defined Perimeter (SDP)

A security framework that uses software to dynamically define network perimeters around protected resources, creating encrypted connections based on identity and context.

View Definition

Static Application Security Testing (SAST)

Static Application Security Testing - a security testing methodology that analyzes source code, bytecode, or binaries for security vulnerabilities without executing the application.

View Definition

Supply Chain Attack

A type of cyberattack that targets less secure elements in the supply chain to gain access to the final target, often through compromised software or hardware components.

View Definition

Threat Modeling

A structured approach for identifying, understanding, and addressing potential security threats to a system, application, or organization.

View Definition

Trojans

A type of malware that appears legitimate but performs malicious functions, named after the Trojan Horse of Greek mythology.

View Definition

Vishing

A type of social engineering attack that uses voice communication (phone calls) to trick individuals into revealing personal information, passwords, or financial details.

View Definition

Vulnerability Assessment

A systematic review of security weaknesses in an information system, conducted to identify and quantify vulnerabilities in the system.

View Definition

Vulnerability Management

A comprehensive approach to identifying, classifying, prioritizing, remediating, and mitigating security vulnerabilities in systems, applications, and networks.

View Definition

Worms

A type of malicious software that replicates itself to spread to other computers, often without human interaction, and can consume network bandwidth and system resources.

View Definition

Zero Trust

A security model that assumes no implicit trust and continuously validates every transaction and access request, regardless of location or network.

View Definition

Zero Trust Architecture (ZTA)

A security framework that implements the Zero Trust model by requiring continuous verification of all users, devices, and applications before granting access to resources.

View Definition

Zero Trust Network Access (ZTNA)

A security solution that provides secure remote access to applications and services based on identity and context, without extending network access.

View Definition

Zero Trust Network Access 2.0 (ZTNA 2.0)

An evolved version of ZTNA that provides enhanced security capabilities with improved user experience and broader integration capabilities.

View Definition

Zero-Day Vulnerability

A security flaw in software that is unknown to the vendor or users, leaving no time (zero days) for the vendor to address and patch the vulnerability before it can be exploited.

View Definition

Methodology

10 items

AI/MLOps

A set of practices that combines machine learning, DevOps, and data engineering to automate and streamline the process of developing, testing, deploying, and monitoring machine learning models in production.

View Definition

Business Continuity Plan (BCP)

Business Continuity Plan - a comprehensive plan that outlines how an organization will continue operating during an unplanned disruption to business operations.

View Definition

Business Impact Analysis (BIA)

Business Impact Analysis - a systematic process to evaluate and document the potential effects of disruption to critical business operations and processes.

View Definition

CI/CD

Continuous Integration and Continuous Delivery/Deployment - a set of practices that automate the process of integrating code changes, testing them, and delivering/deploying them to production.

View Definition

DevOps

A set of practices that combines software development and IT operations to shorten the development life cycle and provide continuous delivery with high software quality.

View Definition

DevSecOps

An approach that integrates security practices into the DevOps process, emphasizing security as a shared responsibility throughout the application lifecycle.

View Definition

Shift Left

A software development practice that emphasizes moving quality assurance, security, and testing activities earlier in the development lifecycle to identify and address issues sooner.

View Definition

Simulation

A more realistic exercise than a tabletop exercise that tests specific functions or capabilities of an emergency response plan using simulated conditions without disrupting actual operations.

View Definition

Software Development Life Cycle (SDLC)

Software Development Life Cycle - a systematic process for planning, creating, testing, and deploying software applications that defines phases and activities for developing high-quality software.

View Definition

Tabletop Exercise

A discussion-based exercise that involves team members reviewing and discussing their roles, responsibilities, and procedures during emergency situations in an informal setting.

View Definition

Cloud Provider

5 items

Database

25 items

Amazon DynamoDB

A fully managed NoSQL database service provided by AWS that offers fast and predictable performance with seamless scalability, supporting document and key-value data models.

View Definition

Amazon Neptune

A fast, reliable, fully managed graph database service provided by AWS that makes it easy to build and run applications that work with highly connected datasets, supporting both property graph and RDF data models.

View Definition

Apache Cassandra

An open-source, distributed NoSQL database management system designed to handle large amounts of data across many commodity servers, providing high availability with no single point of failure.

View Definition

CockroachDB

A distributed SQL database designed for global cloud services, built on a transactional and strongly-consistent SQL API, with built-in horizontal scaling and survivability.

View Definition

CouchDB

An open-source document-oriented NoSQL database that uses JSON to store data, JavaScript as its query language, and HTTP as its API, known for its multi-master replication and offline-first capabilities.

View Definition

Database Management System (DBMS)

Software that provides an interface for users and applications to interact with databases, managing data storage, retrieval, security, and integrity while ensuring data consistency and availability.

View Definition

Google Spanner

A globally distributed database service offered by Google Cloud that provides strong consistency, global distribution, and SQL semantics with horizontal scaling capabilities.

View Definition

Graph Database

A type of NoSQL database that uses graph structures with nodes, edges, and properties to represent and store data, optimized for managing highly connected data and complex relationships.

View Definition

In-Memory Database

A database management system that primarily relies on main memory for data storage, providing faster data access and processing compared to traditional disk-based databases.

View Definition

Microsoft SQL Server

A relational database management system developed by Microsoft that supports a variety of transaction processing, business intelligence, and analytics applications in corporate environments.

View Definition

Milvus

An open-source vector database built for scalable similarity search, designed to support diverse AI applications with high-performance vector search capabilities.

View Definition

MongoDB

A source-available cross-platform document-oriented NoSQL database program that uses JSON-like documents with optional schemas, providing high performance, high availability, and easy scalability.

View Definition

MySQL

An open-source relational database management system that uses SQL for managing and accessing data, widely used for web applications and known for its speed, reliability, and ease of use.

View Definition

Neo4j

A graph database management system that provides ACID-compliant transactional capabilities and scales up for multi-billion node and relationship applications, using the Cypher query language.

View Definition

NewSQL

A class of modern relational database management systems that seek to provide the same scalable performance of NoSQL systems while maintaining the ACID guarantees of traditional relational databases.

View Definition

NoSQL Database

A type of database that provides a mechanism for storage and retrieval of data that is modeled differently than the traditional tabular relations used in relational databases, often used for large-scale distributed data systems.

View Definition

Oracle Database

A multi-model database management system produced and marketed by Oracle Corporation, known for its comprehensive enterprise features, high performance, and scalability for large-scale applications.

View Definition

Pinecone

A managed vector database service that enables developers to build and deploy vector search applications, providing fast similarity search for machine learning and AI applications.

View Definition

PostgreSQL

A powerful, open-source object-relational database system known for its reliability, feature robustness, and performance, supporting complex queries, foreign keys, and various data types.

View Definition

Redis

An open-source, in-memory data structure store used as a database, cache, and message broker, supporting various data structures such as strings, hashes, lists, sets, and more.

View Definition

Relational Database

A type of database that stores and provides access to data points that are related to one another through tables, using structured query language (SQL) for data manipulation and management.

View Definition

ScyllaDB

An open-source, distributed NoSQL database that is compatible with Apache Cassandra and Amazon DynamoDB, designed to deliver microsecond latency and high throughput on commodity hardware.

View Definition

TiDB

An open-source, distributed SQL database that supports Hybrid Transactional and Analytical Processing (HTAP) workloads, compatible with the MySQL protocol and ecosystem.

View Definition

Vector Database

A specialized database designed to store and search vector embeddings, enabling efficient similarity search for machine learning, artificial intelligence, and semantic search applications.

View Definition

Weaviate

An open-source vector database that allows developers to build vector search applications, featuring built-in machine learning models for automatic vectorization and semantic search capabilities.

View Definition

DevOps Tools

7 items

Technology

14 items

Automation

The use of technology to perform tasks with minimal human intervention, improving efficiency, reliability, and consistency in various processes.

View Definition

Commvault

A data protection and information management software company that provides backup, recovery, and data management solutions for virtual, physical, and cloud environments.

View Definition

Containerization

A lightweight virtualization technology that packages applications and their dependencies into standardized, executable containers that can run consistently across different computing environments.

View Definition

Infrastructure as Code (IaC)

The process of managing and provisioning computing infrastructure through machine-readable configuration files rather than physical hardware configuration or interactive configuration tools.

View Definition

Network

A collection of interconnected devices that communicate with each other to share resources, data, and services, following standardized protocols and communication rules.

View Definition

Orchestration

The automated arrangement, coordination, and management of complex computer systems, middleware, and services to ensure they work together efficiently.

View Definition

Proxmox

An open-source server virtualization management platform that provides a complete solution for virtualization and containerization with a web-based management interface.

View Definition

SD-WAN

Software-Defined Wide Area Network - a technology that uses software-defined networking to manage and control WAN connections, providing improved performance and simplified management.

View Definition

Server

A computer program or device that provides functionality for other programs or devices, called clients, in a client-server model, typically providing services such as file sharing, web hosting, or database management.

View Definition

Serverless

A cloud computing execution model where the cloud provider dynamically manages the allocation and provisioning of servers, allowing developers to focus on writing code without worrying about infrastructure management.

View Definition

Veeam

A data protection and availability software provider that offers backup, recovery, and replication solutions for virtual, physical, and cloud environments.

View Definition

Virtualization

The process of creating virtual versions of physical resources, such as servers, storage devices, networks, or operating systems, allowing multiple virtual machines to run on a single physical machine.

View Definition

VMware

A virtualization and cloud computing software provider that offers a range of products for virtualizing computing environments and managing virtual machines.

View Definition

Zerto

A disaster recovery and business continuity software provider that offers continuous data protection and replication solutions for virtual, physical, and cloud environments.

View Definition

HashiCorp Tools

11 items

Boundary

A HashiCorp secure remote access solution that provides secure access to applications and infrastructure without requiring VPNs, firewalls, or client software.

View Definition

Consul

A HashiCorp service networking solution that provides service discovery, configuration, and segmentation capabilities to connect and secure services across dynamic and distributed infrastructure environments.

View Definition

HashiCorp Cloud Platform (HCP)

A fully managed service offering from HashiCorp that provides hosted versions of HashiCorp tools including Consul, Vault, Nomad, and Packer with simplified operations and reduced management overhead.

View Definition

HCP Vault Radar

A HashiCorp Cloud Platform (HCP) service that provides continuous monitoring and alerting for secrets rotation, policy compliance, and security posture assessment in Vault environments.

View Definition

Nomad

A HashiCorp workload orchestrator that enables users to deploy and manage containers and non-containerized applications across on-premises and cloud environments at scale.

View Definition

Packer

A HashiCorp tool that enables users to create identical machine images for multiple platforms from a single source configuration, supporting automated machine image creation for various cloud and virtualization platforms.

View Definition

Project Infragraph

A HashiCorp initiative that aims to provide a unified view and management of infrastructure across different tools and platforms, enabling better visualization and understanding of infrastructure relationships.

View Definition

Sentinel

A HashiCorp policy engine that enables organizations to create, manage, and enforce policies across their infrastructure as code and cloud resources using a purpose-built policy language.

View Definition

Vagrant

A HashiCorp tool that enables users to create and configure lightweight, reproducible, and portable development environments using virtual machines, containers, or cloud providers.

View Definition

Vault

A HashiCorp tool for secrets management that provides secure storage, access, and lifecycle management for sensitive data including passwords, API keys, certificates, and other secrets.

View Definition

Waypoint

A HashiCorp tool that provides a modern workflow for deploying applications across cloud providers and deployment targets, offering a simple command-line interface for complex deployment operations.

View Definition

Programming Languages

12 items

C / C++

C and C++ are closely related, general-purpose programming languages where C is a procedural language and C++ is an extension of C with object-oriented programming features.

View Definition

C# (C-Sharp)

A modern, object-oriented programming language developed by Microsoft that runs on the .NET framework, designed for building a variety of applications including web, mobile, desktop, and cloud applications.

View Definition

Go (Golang)

An open-source programming language developed by Google that makes it easy to build simple, reliable, and efficient software, particularly well-suited for building network services and distributed systems.

View Definition

JavaScript

A versatile, high-level programming language primarily used for web development, enabling interactive web pages and dynamic content, and increasingly used for server-side development and mobile applications.

View Definition

Kotlin

A cross-platform, statically typed programming language developed by JetBrains that runs on the Java Virtual Machine (JVM) and can also be compiled to JavaScript or native code.

View Definition

Node.js

An open-source, cross-platform JavaScript runtime environment that executes JavaScript code outside of a web browser, enabling server-side and networking applications.

View Definition

PHP

A popular general-purpose scripting language that is especially suited for web development and can be embedded into HTML, powering many websites and web applications.

View Definition

Python

A high-level, interpreted programming language known for its simplicity, readability, and versatility, widely used in web development, data science, artificial intelligence, automation, and scientific computing.

View Definition

Rust

A systems programming language focused on safety, speed, and concurrency, with memory safety enforced at compile time without requiring garbage collection.

View Definition

SQL

Structured Query Language, a domain-specific language used for managing and manipulating relational databases, allowing users to query, insert, update, and delete data.

View Definition

Swift

A powerful and intuitive programming language developed by Apple for building apps on iOS, macOS, watchOS, and tvOS, designed to be safe, fast, and expressive.

View Definition

TypeScript

A strongly typed programming language that builds on JavaScript, providing optional static typing and other features that help developers write more reliable and maintainable code.

View Definition

DevSecOps

3 items

Cloud Management

1 items

Cloud Services

4 items

Infrastructure

18 items

Cold Site

A backup facility that provides only basic infrastructure such as space, power, and cooling, requiring significant setup time and equipment installation to become operational after a primary site failure.

View Definition

Data Center Disaster Recovery (DC-DR)

Data Center Disaster Recovery - the processes, procedures, and technologies used to recover data center operations after a significant disruption or disaster.

View Definition

Disaster Recovery

A comprehensive plan and process to recover IT infrastructure and systems following a natural or human-induced disaster, ensuring business continuity and minimizing downtime.

View Definition

Disaster Recovery as a Service (DRaaS)

Disaster Recovery as a Service - a cloud-based service model that provides disaster recovery capabilities to organizations without requiring them to build and maintain their own disaster recovery infrastructure.

View Definition

Failback

The process of returning operations from a backup or standby system to the original primary system after the primary system has been restored or fixed.

View Definition

Failover

The automatic or manual process of switching to a redundant or standby system, server, or network upon the failure or abnormal termination of the previously active system.

View Definition

High Availability

A system design approach that ensures applications and services remain operational with minimal downtime, typically achieved through redundancy and failover mechanisms.

View Definition

Hot Site

A fully equipped backup facility that is always ready to take over operations immediately in case of a primary site failure, with all necessary equipment, systems, and data available.

View Definition

Infrastructure Lifecycle Management

The process of managing infrastructure from creation through retirement, including provisioning, configuration, maintenance, monitoring, scaling, and decommissioning of infrastructure resources.

View Definition

NAS

Network Attached Storage - a file-level storage device connected to a network that provides data access to multiple clients, enabling centralized file sharing and storage management.

View Definition

Offsite Backup

A backup strategy that involves storing copies of data at a location separate from the primary data center, providing protection against site-specific disasters.

View Definition

Recovery Point Objective (RPO)

Recovery Point Objective - the maximum acceptable amount of data loss measured in time that an organization can tolerate during a disaster or system failure.

View Definition

Recovery Time Objective (RTO)

Recovery Time Objective - the maximum acceptable time an organization can tolerate for systems to be unavailable after a disaster or system failure.

View Definition

Replication

The process of copying and maintaining data across multiple locations or systems to ensure availability, improve performance, and provide disaster recovery capabilities.

View Definition

SAN

Storage Area Network - a dedicated high-speed network that connects servers to storage devices, providing block-level access to shared storage resources.

View Definition

Snapshot

A point-in-time copy of data that captures the state of a system, file, or storage volume at a specific moment, allowing for quick recovery and backup.

View Definition

Warm Site

A partially equipped backup facility that contains some infrastructure and systems, requiring some setup time to become fully operational after a primary site failure.

View Definition

Work Recovery Time (WRT)

Work Recovery Time - the time required to verify that the system is fully functional and all business processes are operating normally after a disaster recovery event.

View Definition

DevOps

2 items

Business Software

2 items

Infrastructure as Code

3 items

Containerization

1 items

Development Tool

1 items

Development Platform

2 items

Company

4 items

Cloud Model

3 items

Programming Language

1 items

Orchestration

1 items

Kubernetes Security

1 items

Deployment Model

1 items

Security Threat

1 items