Jump to:

a
Access Control List (ACL)
An access control list (ACL) includes the rules used to govern access to digital environments.Organizations use two types of ACLs, filesystem ACLs and networking ACLs, to control traffic flow, grant or deny permissions, and monitor activity in and out of certain systems.
Amazon Web Services (AWS)
Amazon Web Services (AWS) is a third-party provider of public cloud computing services. The platform offers over 175 cloud-native services, including Big Data tools, database solutions, Internet of Things (IoT) applications, and more.
Application Migration
Application Modernization
Application Programming Interface (API)
An application programming interface (API) enables disparate applications to communicate directly with one another according to predefined rules. There are many types of APIs, including Web APIs, Composite APIs, Internal APIs, Open APIs, and Partner APIs. The two most commonly referenced APIs are REST and SOAP APIs, both of which are Web APIs. Organizations use APIs to extend functionality to other systems and gain access to capabilities that fulfill unmet business requirements.
Application Refactoring
Artificial Intelligence (AI)
Auto-scaling
Availability Zones (AZs)
b
Big Data
Blockchain
A blockchain is an open, immutable, and distributed digital record of information that promotes accountability and transparency amongst all parties. Although originally designed to support digital currencies, organizations use blockchain technology today for numerous applications.
Business Intelligence
Business intelligence (BI) refers to when corporations use data and analytics to discover new insights, improve decision-making, and create enterprise value. Modern BI practices rely on big data analytics, modern data infrastructure technologies, advanced visualizations, and nuanced reporting to gather and process information quickly at scale, with the hopes of identifying new growth opportunities.
c
Cloud Application
Cloud Automation
Cloud Computing
Cloud computing describes when computing services, such as data storage, networking, analytics, server hosting, etc., are delivered over the Internet. Cloud computing offers many advantages over on-premises computing, including lower operating costs, flexible resource allocation, and improved scalability.
Cloud Infrastructure
Cloud Migration
Cloud-native
Cloud Provisioning
Cloud provisioning is what cloud providers, such as AWS and Microsoft Azure, do to deliver cloud resources and services to customers on an as-needed basis. Cloud provisioning is central to the on-demand nature of the cloud computing model, and represents a key advantage over traditional, more limited approaches to compute resource management.
Cloud Service Provider
Cloud service providers offer cloud computing services, networking, and infrastructure over the web. Organizations use third-party cloud service providers to outsource much of the effort associated with maintaining on-premises IT. Today’s leading cloud service providers offer cost-efficient and scalable data storage, analytical tools, and more, all through the Internet.
Cloud Storage
Cluster
A cluster describes a group of computers or hosts that collectively work together to support a specific application or middleware software. In a cluster, individual computing devices are called “nodes,” and all nodes work on the same tasks. Clusters are commonly seen in high-performance computing (HPC) applications that require significant computing power.
Compute
In modern computing, compute refers to computational activities that require processing resources beyond what is available through internal memory. Organizations must be aware of their existing computing capacity and the computing power they need to support critical business activities.
Containers
Content Delivery Network (CDN)
Continuous Integration/Continuous Development (CI/CD)
d
Database
Database Instance
A database instance refers to a complete database environment and its components, which may include database management software, specific procedures, predefined table structures, and other features. It’s not uncommon for administrators to create multiple database instances, each with a unique purpose for the organization.
Data Architecture
Data Engineering
Data Governance
Data Lake
Data Migration
Data Pipeline
Data Science
Data science involves analyzing data to uncover valuable insights that drive business decisions. It takes a multidisciplinary approach, integrating concepts and techniques from mathematics, statistics, artificial intelligence, and computer engineering to process and interpret large datasets.
Data Stream
A data stream is a sequence of digital signals that carries information to or from a data provider. Data streams typically contain raw data that can be processed, analyzed, stored, and applied to support modern applications, advanced analytics, and other use cases common to technology companies, researchers, and enterprises that collect high volumes of data.
Data Warehouse
Deep Learning
Deep learning is a type of machine learning that teaches computers to process data in a way that is inspired by the human brain. It’s used to analyze large, complex datasets, complete nonlinear tasks, and respond to inputs faster and more accurately than humans.
DevOps
Docker
Docker Image
Docker images are software packages that include all components needed to run an application. Images contain critical information about how various software components will be executed, as well as how containers will be instantiated.
e
Edge Computing
Elastic Computing
Elastic computing refers to a system’s ability to scale processing, memory, and storage capacity with changes in demand. Organizations that implement elastic computing don’t have to worry about capacity planning or peak usage scenarios. Instead, they can trust their IT infrastructure to acquire computing resources dynamically.
Endpoint
An endpoint is a remote computing device or node that communicates and receives information across a network. Endpoints can be data terminals, host computers, modems, bridges, and other commonly used computing infrastructure. Endpoints are particularly valuable in IoT and smart applications that depend on “edge” devices to gather information from the surrounding environment which can then be used to support new applications, offerings, or business models.
Extract, Transform, and Load (ETL)
g
Generative AI (Gen AI)
Google Cloud
Google Cloud is a third-party provider of public cloud computing services. Launched in 2008 by Google, Google Cloud Platform offers a variety of cloud solutions for data management, infrastructure modernization, smart analytics, and more.
h
Hadoop
High Availability
Hosted Application
A hosted application is software that runs on third-party infrastructure rather than on-premises. Hosted applications can be accessed from anywhere in the world through the Internet. In the age of cloud computing, more organizations are using hosted applications to minimize the complexities and costs of maintaining on-premises infrastructure.
Hybrid Cloud
i
Infrastructure-as-a-Service (IaaS)
Infrastructure-as-a-Service (IaaS) is one of the primary types of cloud services that provide users with instant computing, storage, and other IT infrastructure delivered through the Internet. IaaS solutions typically scale with demand, allowing organizations to pay only for what they use. Doing so minimizes the complexity of having to purchase and manage on-premises infrastructure.
Internet of Things (IoT)
j
JavaScript Object Notation (JSON)
JavaScript Object Notation (JSON) is a data interchange format that makes it easy for companies to store and transport data across the web in a way that both humans and machines can understand. JSON represents data in two ways: through key-value pairs and as arrays representing ordered collections of values. Because of JSON’s popularity, the format is a common output for APIs and data that gets sent from a server to a web page.
k
Kubernetes
l
Load Balancing
Load balancing is the process of spreading network traffic over multiple servers to ensure that no one server is entirely responsible for supporting an application. Through load balancing, organizations can distribute processing resources as needed to improve the performance and responsiveness of modern applications. Load balancing techniques include Round-robin, Least Connection, Resource Based, Weighted Response Time, and more.
m
Machine Learning
Managed Service Provider (MSP)
Management and Governance
Microservices
Microsoft Azure
Microsoft Azure is a public cloud computing platform released in 2010. Commonly referred to as Azure, the service enables organizations to build, test, launch, and manage modern applications hosted in Microsoft-managed data centers.
Middleware
Middleware refers to software that sits between various applications and the operating system in use. The purpose of middleware is to allow for seamless communication, functionality, and data management across diverse systems without detracting from the user experience.
Multicloud
Multi-tenant
Multi-tenant architecture, or multitenancy, refers to a type of software architecture commonly used in cloud computing to deploy several single instances of software from one physical server. Through multitenancy, organizations can securely and dynamically serve multiple customers on one server via independent instances.
o
On-premise
OpenStack
OpenStack is a free cloud computing platform developed by Rackspace Technology that allows organizations to manage public and private cloud environments via Infrastructure-as-a-Service (IaaS) deployments. Initially released in 2010, OpenStack is now one of the top three open source projects in the world based on current activity.
Orchestration
p
Platform-as-a-Service
PostgreSQL
Private Cloud
A private cloud describes a cloud environment and resources that are used exclusively by a single organization. Private clouds may be deployed from an on-site data center or hosted by a third-party managed services provider. The advantage of using a private cloud is that organizations can customize management, governance, and other operating elements to their unique needs.
Public Cloud
A public cloud describes a cloud environment that is owned and operated by a third-party provider. Public cloud resources are delivered over the Internet to “tenants” that all share hardware, storage, and network devices. The advantage of using a public cloud provider is that organizations don’t have to purchase or maintain critical IT infrastructure.
r
REpresentational State Transfer (REST)
REpresentational State Transfer (REST) is an architectural model that lays out standards for how stateless computing systems should communicate with one another across the web. In RESTful systems, client and server implementations operate independently, allowing them to evolve and scale more seamlessly, which is a crucial feature of the World Wide Web. Also within the context of RESTful systems, REST APIs, or RESTful APIs, are rules-based interfaces that enable applications and devices to communicate with one another according to RESTful design principles. REST APIs are particularly useful for facilitating connections within microservices architectures.
s
Scalability
Schema
Security, Identity, and Compliance
Serverless Computing
Shared Security Model
A Shared Security Model is a framework that helps cloud service providers (CSPs) and customers determine how to divide up security responsibilities. There are different types of Shared Security Models depending on how much operational support the CSP provides. Shared Security Models cover everything from hardware and infrastructure to data, the network, and all endpoints.
Software-as-a-Service (SaaS)
Storage
v
Vendor Lock-in
Virtualization refers to technology that organizations use to deploy virtual instances of something abstracted from physical hardware. Through virtualization, organizations can use their IT infrastructure more efficiently by distributing capacity that would otherwise go unused across different tenants or environments.
Virtualization
Vendor lock-in refers to when customers of a service are locked into a relationship with a legacy vendor regardless of the quality of the service they are receiving. Customers may be unable to break out of these contracts for various reasons, including there being explicit contractual stipulations or financial repercussions associated with switching vendors.
Virtual Machine
A virtual machine is a digital computing environment that behaves like a physical computer. Virtual machines use software, rather than hardware, to run apps and programs, enabling developers to test applications in isolated environments.
Virtual Private Cloud
A virtual private cloud is an isolated environment with access to on-demand computing resources within a broader public cloud environment. Organizations use virtual private clouds to gain privacy and control over their data, applications, and code without sacrificing scalability and other advantages of using public cloud platforms.
arrow