IT & Technology
202 terms Β· Networking, cloud, security, databases, AI/ML, and software development
Tools & CalculatorsShowing all 202 terms
- Networking
IP Address
EasyA unique numerical label assigned to each device connected to a computer network.
- Networking
DNS
EasyDomain Name System Γ’β¬β translates human-readable domain names into IP addresses.
- Networking
TCP/IP
MediumTransmission Control Protocol/Internet Protocol Γ’β¬β the foundational communication protocols of the internet.
- Networking
Firewall
EasyA network security system that monitors and controls incoming and outgoing network traffic based on rules.
- Networking
VPN
EasyVirtual Private Network Γ’β¬β creates an encrypted tunnel over a public network for secure communication.
- Networking
Bandwidth
EasyThe maximum rate of data transfer across a network connection, measured in bits per second.
- Networking
Latency
EasyThe time delay between a data request being sent and the response being received, measured in milliseconds.
- Networking
Router
EasyA networking device that forwards data packets between computer networks, directing traffic on the internet.
- Networking
Network Switch
EasyA device that connects multiple devices on a local network and forwards data only to the intended recipient.
- Networking
Network Protocol
EasyA set of rules governing how data is transmitted and received across a network.
- Networking
Subnet Mask
MediumA 32-bit number that divides an IP address into network and host portions.
- Networking
DHCP
EasyDynamic Host Configuration Protocol Γ’β¬β automatically assigns IP addresses to devices on a network.
- Networking
NAT
MediumNetwork Address Translation Γ’β¬β maps private IP addresses to a public IP address for internet access.
- Networking
Load Balancer
MediumA system that distributes incoming network traffic across multiple servers to ensure high availability.
- Networking
CDN
EasyContent Delivery Network Γ’β¬β a geographically distributed network of servers that delivers web content faster.
- Networking
OSI Model
MediumA seven-layer conceptual framework that standardizes how different network protocols communicate.
- Networking
BGP
AdvancedBorder Gateway Protocol Γ’β¬β the routing protocol that manages how data is routed across the internet.
- Networking
Packet
EasyA unit of data formatted for transmission over a network, containing header information and payload.
- Networking
HTTP
EasyHyperText Transfer Protocol Γ’β¬β the foundation of data communication on the World Wide Web.
- Networking
HTTPS
EasyHTTP Secure Γ’β¬β the encrypted version of HTTP using SSL/TLS to secure data in transit.
- Networking
IPv6
MediumInternet Protocol version 6 Γ’β¬β the successor to IPv4, using 128-bit addresses to support a vastly larger address space.
- Networking
UDP
MediumUser Datagram Protocol Γ’β¬β a connectionless transport protocol that prioritizes speed over reliability.
- Networking
SSH
EasySecure Shell Γ’β¬β a cryptographic protocol for securely accessing and managing remote servers over a network.
- Networking
VLAN
MediumVirtual LAN Γ’β¬β a logical network segment that groups devices on different physical switches as if on the same network.
- Cloud Computing
AWS
EasyAmazon Web Services Γ’β¬β the world's most comprehensive and widely adopted cloud platform.
- Cloud Computing
Microsoft Azure
EasyMicrosoft's cloud computing platform offering a wide range of services for building, deploying, and managing applications.
- Cloud Computing
Google Cloud Platform
EasyGoogle's cloud computing platform known for its data analytics, AI, and Kubernetes capabilities.
- Cloud Computing
IaaS
MediumInfrastructure as a Service Γ’β¬β cloud-provided virtualized computing infrastructure over the internet.
- Cloud Computing
PaaS
MediumPlatform as a Service Γ’β¬β a cloud environment that provides tools for developers to build and deploy applications.
- Cloud Computing
SaaS
EasySoftware as a Service Γ’β¬β software delivered over the internet on a subscription basis, no installation required.
- Cloud Computing
Serverless Computing
MediumA cloud execution model where the provider manages server infrastructure and automatically scales resources.
- Cloud Computing
Container
MediumA lightweight, standalone executable package of software that includes everything needed to run an application.
- Cloud Computing
Kubernetes
AdvancedAn open-source container orchestration system for automating deployment, scaling, and management of containers.
- Cloud Computing
Docker
MediumA platform for developing, shipping, and running applications in containers.
- Cloud Computing
Hybrid Cloud
MediumA computing environment combining on-premises infrastructure with public and private cloud services.
- Cloud Computing
Auto Scaling
MediumAutomatically adjusting cloud compute resources up or down in response to demand or predefined rules.
- Cloud Computing
Availability Zone
MediumAn isolated data center location within a cloud region designed to provide fault tolerance and high availability.
- Cloud Computing
Object Storage
MediumA storage architecture managing data as objects with metadata, ideal for unstructured data at massive scale.
- Cloud Computing
Edge Computing
MediumProcessing data closer to where it is generated rather than in a centralized cloud data center.
- Cloud Computing
Infrastructure as Code
MediumManaging and provisioning infrastructure through machine-readable configuration files rather than manual processes.
- Cloud Computing
Cloud Migration
MediumThe process of moving applications, data, and workloads from on-premises infrastructure to cloud environments.
- Cloud Computing
Virtual Machine
EasyA software emulation of a physical computer that runs an operating system and applications in isolation.
- Cybersecurity
Encryption
EasyThe process of converting data into an unreadable format using algorithms, decryptable only with the correct key.
- Cybersecurity
SSL
EasySecure Sockets Layer Γ’β¬β a cryptographic protocol for securing internet communications, now superseded by TLS.
- Cybersecurity
TLS
MediumTransport Layer Security Γ’β¬β the successor to SSL, providing encrypted communications over networks.
- Cybersecurity
Phishing
EasyA social engineering attack that tricks users into revealing sensitive information through deceptive communications.
- Cybersecurity
Malware
EasyMalicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
- Cybersecurity
Ransomware
EasyA type of malware that encrypts a victim's files and demands payment for the decryption key.
- Cybersecurity
Zero-Day Vulnerability
AdvancedA software vulnerability unknown to the vendor, exploited by attackers before a patch is available.
- Cybersecurity
Penetration Testing
MediumAn authorized simulated cyberattack on a system to evaluate its security posture and find vulnerabilities.
- Cybersecurity
Two-Factor Authentication
EasyA security process requiring two different verification factors to access an account or system.
- Cybersecurity
DDoS Attack
MediumDistributed Denial of Service Γ’β¬β an attack that overwhelms a server with traffic to make it unavailable.
- Cybersecurity
SQL Injection
MediumA web security vulnerability where attackers insert malicious SQL code into a query to manipulate the database.
- Cybersecurity
Intrusion Detection System
MediumA system that monitors network or system activities for malicious activity or policy violations.
- Cybersecurity
SIEM
AdvancedSecurity Information and Event Management Γ’β¬β aggregates and analyzes security logs for threat detection.
- Cybersecurity
PKI
AdvancedPublic Key Infrastructure Γ’β¬β the framework of certificates, authorities, and policies enabling secure communications.
- Cybersecurity
Social Engineering
MediumPsychological manipulation of people into performing actions or divulging confidential information.
- Databases
SQL
EasyStructured Query Language Γ’β¬β the standard language for managing and querying relational databases.
- Databases
NoSQL
MediumA category of databases that store and retrieve data in formats other than relational tables.
- Databases
ACID Properties
MediumAtomicity, Consistency, Isolation, Durability Γ’β¬β four properties ensuring reliable database transactions.
- Databases
Database Index
MediumA data structure that improves the speed of data retrieval operations on a database table.
- Databases
Database Normalization
AdvancedThe process of organizing a database to reduce data redundancy and improve data integrity.
- Databases
Database Sharding
AdvancedHorizontal database partitioning that splits data across multiple database instances for scalability.
- Databases
Database Replication
MediumThe process of copying and maintaining database data across multiple servers for availability and performance.
- Databases
CAP Theorem
AdvancedStates that a distributed system can guarantee at most two of: Consistency, Availability, and Partition Tolerance.
- Databases
Redis
MediumAn open-source, in-memory data structure store used as a cache, database, and message broker.
- Databases
ORM
MediumObject-Relational Mapper Γ’β¬β a library that maps database tables to programming language objects, abstracting SQL.
- Databases
Query Optimization
AdvancedThe process of selecting the most efficient execution plan for a database query to minimize resource usage.
- Software Development
API
EasyApplication Programming Interface Γ’β¬β a set of rules allowing different software applications to communicate.
- Software Development
REST API
EasyRepresentational State Transfer Γ’β¬β an architectural style for designing networked HTTP-based APIs.
- Software Development
GraphQL
MediumA query language for APIs that allows clients to request exactly the data they need.
- Software Development
CI/CD
MediumContinuous Integration/Continuous Delivery Γ’β¬β practices that automate building, testing, and deploying software.
- Software Development
Agile
EasyAn iterative software development methodology emphasizing collaboration, flexibility, and frequent delivery.
- Software Development
Scrum
EasyAn Agile framework using fixed-length sprints, defined roles, and ceremonies to deliver software iteratively.
- Software Development
Git
EasyA distributed version control system for tracking changes in source code during software development.
- Software Development
Microservices
MediumAn architectural pattern where an application is built as a collection of small, independently deployable services.
- Software Development
DevOps
MediumA culture and set of practices combining software development and IT operations to shorten the development lifecycle.
- Software Development
Algorithm
EasyA step-by-step procedure or formula for solving a problem or accomplishing a task.
- Software Development
Big O Notation
MediumA mathematical notation describing an algorithm's time or space complexity relative to its input size.
- Software Development
Data Structure
EasyA specialized format for organizing, storing, and accessing data to enable efficient operations.
- Software Development
Recursion
MediumA programming technique where a function calls itself to solve a problem by breaking it into smaller subproblems.
- Software Development
Design Pattern
MediumA reusable solution template to a commonly occurring software design problem.
- Software Development
Technical Debt
MediumThe implied cost of rework caused by choosing a quick, easy solution now instead of a better long-term approach.
- Software Development
Refactoring
MediumRestructuring existing code without changing its external behavior to improve quality and maintainability.
- Software Development
Object-Oriented Programming
MediumA programming paradigm organizing code into objects that combine data and behavior.
- Software Development
Unit Testing
EasyTesting individual units or components of code in isolation to verify they function correctly.
- Software Development
API Gateway
MediumA server that acts as an entry point for clients, routing requests to appropriate microservices.
- Software Development
Message Queue
MediumA component that enables asynchronous communication between services by storing messages until processed.
- Software Development
Event-Driven Architecture
MediumA software design pattern where components communicate by producing and consuming events asynchronously.
- Software Development
SRE
MediumSite Reliability Engineering Γ’β¬β applying software engineering principles to IT operations to build reliable systems.
- Software Development
Observability
MediumThe ability to understand the internal state of a system from its external outputs: logs, metrics, and traces.
- Software Development
Feature Flag
MediumA software development technique that enables or disables features at runtime without deploying new code.
- Operating Systems
Operating System Kernel
MediumThe core component of an OS that manages system resources and mediates between hardware and software.
- Operating Systems
Process
MediumAn instance of a running program, with its own memory space and system resources allocated by the OS.
- Operating Systems
Thread
MediumThe smallest unit of CPU execution within a process, sharing the process's memory and resources.
- Operating Systems
Deadlock
AdvancedA situation where two or more processes are each waiting for resources held by the others, causing permanent blocking.
- Operating Systems
Concurrency
MediumThe ability of a system to run multiple tasks or processes in overlapping time periods.
- Operating Systems
Virtual Memory
AdvancedAn OS technique using disk space to simulate additional RAM, allowing programs to use more memory than physically available.
- Operating Systems
File System
MediumA method for organizing and storing files on storage media, managing how data is stored and retrieved.
- Operating Systems
Garbage Collection
MediumAutomatic memory management that reclaims memory occupied by objects no longer in use by a program.
- AI/ML
Machine Learning
EasyA subset of AI where algorithms learn patterns from data to make predictions or decisions without explicit programming.
- AI/ML
Neural Network
MediumA computational model inspired by the brain, composed of interconnected layers of nodes that process data.
- AI/ML
Deep Learning
MediumA subset of machine learning using neural networks with many layers to learn representations from large datasets.
- AI/ML
Natural Language Processing
MediumA branch of AI that enables computers to understand, interpret, and generate human language.
- AI/ML
Transformer Architecture
AdvancedA deep learning model architecture using self-attention mechanisms, foundational to modern NLP and LLMs.
- AI/ML
Large Language Model
MediumA type of AI model trained on massive text datasets capable of understanding and generating human language.
- AI/ML
Training Data
EasyThe labeled dataset used to train a machine learning model to recognize patterns and make predictions.
- AI/ML
Overfitting
MediumWhen a machine learning model learns training data too well, including noise, reducing its generalization ability.
- AI/ML
Reinforcement Learning
AdvancedA machine learning paradigm where an agent learns to make decisions by receiving rewards or penalties from its environment.
- AI/ML
Computer Vision
MediumA field of AI enabling computers to interpret and understand visual information from images and video.
- AI/ML
GPU
MediumGraphics Processing Unit Γ’β¬β a processor designed for parallel computation, now essential for AI/ML training.
- Web Development
HTML
EasyHyperText Markup Language Γ’β¬β the standard markup language for creating web pages.
- Web Development
CSS
EasyCascading Style Sheets Γ’β¬β the language used to describe the visual presentation of HTML documents.
- Web Development
JavaScript
EasyA high-level programming language that makes web pages interactive and dynamic.
- Web Development
React
MediumA JavaScript library for building reusable UI components and fast, declarative user interfaces.
- Web Development
Node.js
MediumA JavaScript runtime that allows running JavaScript on the server side outside of a browser.
- Web Development
HTTP Cookie
EasySmall pieces of data stored by a browser, sent by web servers to track sessions and user preferences.
- Web Development
Cache
EasyA hardware or software component that stores frequently accessed data for faster future retrieval.
- Web Development
OAuth 2.0
MediumAn open standard for authorization that allows third-party applications to access user data without sharing passwords.
- Web Development
JWT
MediumJSON Web Token Γ’β¬β a compact, self-contained token for securely transmitting information between parties.
- Web Development
TypeScript
MediumA typed superset of JavaScript that compiles to plain JavaScript, adding static type checking.
- Web Development
CORS
MediumCross-Origin Resource Sharing Γ’β¬β a browser security mechanism controlling how web pages request resources from other origins.
- Web Development
WebSocket
MediumA communication protocol providing full-duplex communication channels over a single TCP connection.
- Web Development
Single Page Application
MediumA web application that loads once and dynamically updates content without full page reloads.
- Web Development
Webhook
MediumA user-defined HTTP callback that triggers when a specific event occurs in a third-party service.
- Web Development
Progressive Web App
MediumA web application using modern browser features to deliver app-like experiences including offline support.
- Software Development
gRPC
AdvancedA high-performance remote procedure call framework using Protocol Buffers for efficient serialization.
- Cloud Computing
Service Mesh
AdvancedA dedicated infrastructure layer handling service-to-service communication, observability, and security in microservices.
- Cybersecurity
Single Sign-On
MediumAn authentication scheme allowing users to log in once and access multiple applications without re-authenticating.
- Databases
Blockchain
MediumA distributed, append-only ledger where data is stored in cryptographically linked blocks across multiple nodes.
- Operating Systems
Microprocessor
MediumAn integrated circuit that contains a CPU on a single chip.
- Operating Systems
Cache Memory
MediumHigh-speed memory that stores frequently accessed data close to the CPU.
- Software Development
Binary Search
MediumAn efficient algorithm that finds an item in a sorted list by halving the search space.
- Software Development
Load Testing
MediumTesting a system under expected and peak load conditions to measure performance.
- Software Development
API Rate Limiting
MediumControlling the number of API requests a client can make within a time window.
- Networking
Reverse Proxy
MediumA server that forwards client requests to backend servers and returns responses.
- Cybersecurity
DNS Cache Poisoning
AdvancedAn attack that corrupts DNS resolver caches to redirect users to malicious sites.
- Software Development
Asynchronous Programming
MediumA programming model where tasks run concurrently without blocking execution flow.
- Software Development
CI Pipeline
EasyAn automated sequence of steps that build, test, and validate code changes.
- Software Development
Semantic Versioning
EasyA versioning scheme using MAJOR.MINOR.PATCH numbers to communicate change impact.
- Software Development
Blue-Green Deployment
MediumA deployment strategy using two identical environments to enable zero-downtime releases.
- Software Development
Canary Deployment
MediumGradually rolling out a new release to a small subset of users before full release.
- Web Development
Web Scraping
MediumAutomated extraction of data from websites using bots or scripts.
- Cybersecurity
Multi-Factor Authentication
EasySecurity requiring two or more verification factors to grant access.
- Software Development
SOLID Principles
MediumFive object-oriented design principles for creating maintainable and scalable software.
- Web Development
Server-Side Rendering
MediumGenerating web page HTML on the server and sending it fully rendered to the browser.
- Web Development
Static Site Generation
MediumPre-building all web pages at compile time rather than generating them per request.
- Software Development
Dependency Injection
MediumA design pattern where objects receive their dependencies from external sources rather than creating them.
- Software Development
Application Monitoring
EasyContinuously tracking application health, performance, and errors in production.
- Cybersecurity
Encryption at Rest
MediumEncrypting stored data to protect it from unauthorized access when not in active use.
- Cybersecurity
Zero Trust Security
MediumA security model that verifies every request regardless of network location.
- Cloud Computing
Container Registry
MediumA repository for storing, versioning, and distributing container images.
- Cloud Computing
Kubernetes Pod
MediumThe smallest deployable unit in Kubernetes, containing one or more containers.
- AI/ML
ML Inference
MediumUsing a trained machine learning model to make predictions on new data.
- AI/ML
Feature Engineering
MediumTransforming raw data into informative input features for machine learning models.
- Networking
Internet of Things
EasyA network of physical devices embedded with sensors that collect and exchange data.
- Software Development
Integration Testing
MediumTesting how multiple components work together as a combined system.
- Databases
Data Warehouse
MediumA centralized repository for structured, historical data optimized for analytics and reporting.
- Databases
ETL
MediumA data integration process that extracts data from sources, transforms it, and loads it into a target.
- Databases
Data Lake
MediumA centralized repository storing vast amounts of raw data in its native format.
- Databases
SQL Joins
EasySQL operations that combine rows from two or more tables based on related columns.
- Cloud Computing
Lambda Function
EasyA serverless function that executes code in response to events without managing servers.
- Software Development
Idempotency
AdvancedA property where performing an operation multiple times produces the same result as once.
- Software Development
Linked List
MediumA data structure where elements are stored in nodes, each pointing to the next.
- Software Development
Stack
EasyA last-in, first-out (LIFO) data structure where elements are added and removed from the top.
- Software Development
Queue
EasyA first-in, first-out (FIFO) data structure where elements are added at the back and removed from the front.
- Software Development
Publish-Subscribe Pattern
MediumA messaging pattern where publishers send messages to topics consumed by subscribers.
- Networking
Network Segmentation
MediumDividing a network into subnetworks to improve security and performance.
- Software Development
Regular Expression
MediumA sequence of characters defining a search pattern for text matching and manipulation.
- Software Development
Functional Programming
MediumA programming paradigm treating computation as evaluation of mathematical functions.
- Software Development
Test-Driven Development
MediumA development practice where tests are written before production code.
- Software Development
API Versioning
MediumManaging multiple versions of an API to support clients while evolving the service.
- Software Development
Circuit Breaker Pattern
AdvancedA design pattern that prevents cascading failures by stopping calls to a failing service.
- Software Development
Event Sourcing
AdvancedStoring application state as a sequence of immutable events rather than current values.
- Software Development
Git Branching Strategy
MediumA workflow defining how teams use Git branches to organize development and releases.
- Software Development
Logging
EasyRecording application events and errors to files or systems for debugging and auditing.
- Cloud Computing
Virtual Private Cloud
MediumA logically isolated virtual network within a public cloud environment.
- Networking
CDN Caching
MediumStoring copies of web content at geographically distributed edge servers for faster delivery.
- Software Development
Microservice Architecture
MediumAn architectural style structuring an application as a collection of small, independent services.
- Cloud Computing
Infrastructure Monitoring
EasyTracking the health and performance of servers, networks, and cloud resources.
- Software Development
Apache Kafka
MediumA distributed event streaming platform for high-throughput, fault-tolerant data pipelines.
- Cybersecurity
Hash Function
MediumA function that maps data of arbitrary size to a fixed-size value for integrity verification.
- Networking
Content Delivery Network
EasyA globally distributed network of servers that delivers web content from locations close to users.
- Cloud Computing
Infrastructure as Code
MediumManaging and provisioning infrastructure through machine-readable configuration files.
- Cybersecurity
SSH Key Pair
MediumA pair of cryptographic keys used for secure, passwordless authentication to remote servers.
- Web Development
Browser Developer Tools
EasyBuilt-in browser utilities for inspecting, debugging, and profiling web applications.
- Web Development
Responsive Web Design
EasyA design approach where web layouts adapt fluidly to different screen sizes and devices.
- Software Development
REST API Best Practices
MediumConventions for designing clean, consistent, and intuitive RESTful APIs.
- Web Development
Progressive Web App
MediumA web application that provides native app-like experiences using modern browser capabilities.
- Databases
SQL Transaction
MediumA sequence of SQL operations treated as a single atomic unit that either all succeed or all fail.
- Networking
IPv4
EasyThe fourth version of the Internet Protocol using 32-bit addresses supporting about 4 billion addresses.
- Operating Systems
Memory Leak
MediumA bug where a program allocates memory but fails to release it, causing gradual resource exhaustion.
- Web Development
HTTP Status Codes
EasyStandardized three-digit codes indicating the result of an HTTP request.
- Cloud Computing
Docker Compose
EasyA tool for defining and running multi-container Docker applications with a YAML configuration file.
- Cybersecurity
Penetration Testing Types
MediumClassifications of security testing by tester knowledge level: black box, white box, and grey box.
- Cloud Computing
Cloud-Native
MediumAn approach to building applications that fully leverage cloud computing capabilities.
- Databases
NoSQL Database Types
MediumThe four main categories of NoSQL databases: document, key-value, column-family, and graph.
- Networking
Load Balancer Types
AdvancedClassifications of load balancers by operation layer: L4 transport layer and L7 application layer.
- Software Development
Mobile App Development
MediumBuilding applications for mobile operating systems using native or cross-platform frameworks.
- Software Development
DevOps Culture
EasyA cultural movement breaking silos between development and operations teams to accelerate delivery.
- Web Development
Web Accessibility
MediumDesigning and building websites usable by people with disabilities.
- Software Development
Caching Strategies
MediumApproaches to storing and invalidating cached data to balance freshness and performance.