As you navigate the world of cloud computing and specifically Amazon Web Services (AWS), you're bound to come across an abundance of acronyms. To help you decode this "alphabet soup", ClearScale has curated a comprehensive list of the most commonly used acronyms in the field.
From 'ACL' representing Access Control List to ‘XML’, standing for Extensible Markup Language, this page offers you a clear breakdown of each acronym. With this resource, we aim to demystify the terminology and foster better comprehension of AWS and cloud computing as a whole.
Jump to:
- ACL -
- Access Control List
- ACM -
- AWS Certificate Manager
- AI -
- Artificial Intelligence
- AMI -
- Amazon Machine Image
- API -
- Application Programming Interface
- AR -
- Augmented Reality
- ARN -
- Amazon Resource Name
- ASCII -
- American Standard Code for Information Interchange
- ASR -
- Automatic Speech Recognition
- AWS -
- Amazon Web Services
- AZ -
- Availability Zone
- BGP ASN -
- Border Gateway Protocol Autonomous System Number
- BYOL -
- Bring Your Own License
- CA -
- Certificate Authority
- CDK -
- Cloud Development Kit
- CDN -
- Content Delivery Network
- CI/CD -
- Continuous Integration and Continuous Delivery
- CLI -
- Command Line Interface
- CMK -
- Custom Master Key
- CORS -
- Cross-Origin Resource Sharing
- CPU -
- Central Processing Unit
- CSP -
- Cloud Service Provider
- CV -
- Computer Vision
- DB -
- Database
- DHCP -
- Dynamic Host Configuration Protocol
- DKIM -
- DomainKeys Identified Mail
- DMS -
- Database Migration Service
- DNS -
- Domain Name System
- DR -
- Disaster Recovery
- EBS -
- Elastic Block Store
- EC2 -
- Elastic Compute Cloud
- ECR -
- Elastic Container Registry
- ECS -
- Elastic Container Service
- EFS -
- Elastic File System
- EIP -
- Elastic IP
- EKS -
- Elastic Kubernetes Service
- ELB -
- Elastic Load Balancer
- EMP -
- End-of-Service Migration Program
- EMR -
- Elastic Map Reduce
- ENI -
- Elastic Network Interface
- ETL -
- Extract, Transform, and Load
- FIM -
- Federated Identity Management
- FIS -
- Fault Injection Simulator
- FTP -
- File Transfer Protocol
- FTPS -
- File Transfer Protocol over SSL
- GB -
- Gigabyte
- GPU -
- Graphics Processing Unit
- HA -
- High Availability
- HIPAA -
- Health Insurance Portability and Accountability Act
- HMAC -
- Hash-Based Message Authentication Code
- HPC -
- High Performance Computing
- HRNN -
- Hierarchical Recurrent Neural Network
- HSM -
- Hardware Security Module
- HTML -
- HyperText Markup Language
- HTTP -
- HyperText Transfer Protocol
- HTTPS -
- Hyper Text Transfer Protocol Secure
- HVM -
- Hardware Virtual Machine
- IaaS -
- Infrastructure as a Service
- IAM -
- Identity and Access Management
- IDE -
- Integrated Development Environment
- IdP -
- Identity Provider
- IOPs -
- Input/Output Operations Per Second
- IoT -
- Internet of Things
- IP -
- Internet Protocol
- IPsec -
- Internet Protocol Security
- ISP -
- Internet Service Provider
- ISV -
- Independent Software Vendor
- IT -
- Information Technology
- ITSM -
- IT Service Management
- JSON -
- JavaScript Object Notation
- KDS -
- Kinesis Data Stream
- KMS -
- Key Management Service
- MAC -
- Message Authentication Code
- MAP -
- Migration Acceleration Program
- MFA -
- Multi-Factor Authentication
- MIME -
- Multipurpose Internet Mail Extensions
- ML -
- Machine Learning
- MSP -
- Managed Service Provider
- MTA -
- Mail Transfer Agent
- MWAA -
- Managed Workflows for Apache Airflow
- NACL -
- Network Access Control List
- NAT -
- Network Address Translation
- NLP -
- Natural Language Processing
- OCR -
- Optical Character Recognition
- OLTP -
- Online Transaction Processing
- OU -
- Organizational Unit
- PaaS -
- Platform as a Service
- PAT -
- Port Address Translation
- PoC -
- Proof of Concept
- QLDB -
- Quantum Ledger Database
- RAM -
- Resource Access Manager
- RDS -
- Relational Database Service
- REST -
- Representational State Transfer
- RTMP -
- Real Time Messaging Protocol
- S3 -
- Simple Storage Service
- SaaS -
- Software as a Service
- SAM -
- Serverless Application Model
- SCP -
- Secure Copy Protocol
- SCP -
- Service Control Policy
- SCT -
- Scheme Conversion Tool
- SDK -
- Software Development Kit
- SES -
- Simple Email Service
- SFTP -
- Secure File Transfer Protocol
- SG -
- Security Group
- SHA -
- Secure Hash Algorithm
- SLA -
- Service Level Agreement
- SMC -
- Service Management Connector
- SMTP -
- Simple Mail Transfer Protocol
- SNS -
- Simple Notification Service
- SOAP -
- Simple Object Access Protocol
- SOC2 -
- Service Organization Control 2
- SOW -
- Statement of Work
- SPF -
- Sender Policy Framework
- SPICE -
- Super-fast, Parallel, In-memory Calculation Engine
- SQL -
- Structured Query Language
- SQS -
- Simple Queue Service
- SSE -
- Server-Side Encryption
- SSH -
- Secure Shell
- SSL -
- Secure Sockets Layer
- SSO -
- Single Sign-On
- SSP -
- Supply Side Platform
- STS -
- Security Token Service
- SWF -
- Simple Workflow Service
- TCO -
- Total Cost of Ownership
- TCP -
- Transmission Control Protocol
- TLS -
- Transport Layer Security
- TTS -
- Text-to-Speech
- UDP -
- User Datagram Protocol
- URL -
- Uniform Resource Locator
- VERP -
- Variable Envelope Return Path
- VGW(VPG) -
- Virtual Private Gateway
- VM -
- Virtual Machine
- VPC -
- Virtual Private Cloud
- VPN -
- Virtual Private Network
- VR -
- Virtual Reality
- WAF -
- Web Application Firewall
- WAM -
- WorkSpaces Application Manager
- WAR -
- Well-Architectured Review
- WSDL -
- Web Services Description Language
- XML -
- Extensible Markup Language