50+ DevOps, Cloud, AI & Security Terms Explained

Plain-English definitions written by senior engineers — for engineering leaders, product managers, and enterprise buyers who need to understand the technology, not just the acronyms.

A

Auto-Scaling
A cloud capability that automatically adjusts compute capacity (servers, containers, serverless functions) based on real-time demand. Prevents over-provisioning during off-peak hours and ensures headroom during traffic spikes.Cloud Solutions
Apache Kafka
A distributed event streaming platform used to build real-time data pipelines and streaming applications. Kafka handles high-throughput, fault-tolerant publish/subscribe messaging between microservices and data systems.Data Engineering
API Gateway
A server that acts as the entry point for API requests, handling routing, authentication, rate limiting, caching, and protocol translation. AWS API Gateway, Kong, and Nginx are common implementations.Web Development
ACID Transactions
A set of properties guaranteeing database reliability: Atomicity (all or nothing), Consistency (data remains valid), Isolation (concurrent transactions don't interfere), Durability (committed data persists). PostgreSQL, MySQL, and SQL Server enforce ACID guarantees.Database Administration

C

CI/CD (Continuous Integration / Continuous Delivery)
A software delivery practice where code changes are automatically built, tested, and deployed to production or staging. CI validates every commit; CD automates the release pipeline to minimize manual handoffs and reduce deployment risk.DevOps & Infrastructure
Cloud Migration
The process of moving applications, data, and workloads from on-premise infrastructure to a cloud environment. Strategies include lift-and-shift (rehost), re-platform, re-architect (refactor), and replace (SaaS substitution).Cloud Solutions
Core Web Vitals
Google's set of user-experience metrics: Largest Contentful Paint (LCP — load speed), Interaction to Next Paint (INP — responsiveness), and Cumulative Layout Shift (CLS — visual stability). Strong Core Web Vitals improve both user experience and SEO rankings.Web Development
Connection Pooling
A technique that maintains a pool of established database connections that can be reused by multiple application requests, avoiding the overhead of creating and destroying connections for every query. PgBouncer and RDS Proxy are common PostgreSQL poolers.Database Administration

D

Disaster Recovery (DR)
A set of policies, tools, and procedures to restore critical IT systems after a disruption. Key metrics are Recovery Time Objective (RTO — how fast you recover) and Recovery Point Objective (RPO — how much data you can afford to lose).Cloud Solutions
dbt (Data Build Tool)
An open-source SQL transformation framework that enables data teams to write, test, document, and version-control data transformations inside the warehouse. dbt is the de facto standard for modern analytics engineering.Data Engineering
Data Lakehouse
An architecture that combines the flexibility of a data lake (store any data format at scale) with the structure and performance of a data warehouse. Tools like Delta Lake, Apache Iceberg, and Databricks implement the lakehouse pattern.Data Engineering
Data Mesh
A decentralized data architecture pattern where domain teams own and manage their own data products, with a central platform providing shared infrastructure and standards. Addresses the scalability limitations of centralized data teams.Data Engineering
Dimensional Modeling
A data warehouse design technique that organizes data into fact tables (measurements) and dimension tables (context). Produces star or snowflake schemas optimized for analytical queries and business intelligence reporting.Data Warehousing
DeFi (Decentralized Finance)
Financial services built on blockchain networks without traditional intermediaries (banks, brokers). DeFi protocols enable lending, borrowing, trading, and yield generation through smart contracts — typically on Ethereum or Layer 2 networks.Web3 & Blockchain

E

ETL / ELT
ETL (Extract, Transform, Load) processes data before loading it into the warehouse. ELT (Extract, Load, Transform) loads raw data first, then transforms it inside the warehouse using its compute power. ELT is standard in modern cloud warehouse architectures (Snowflake, BigQuery).Data Engineering
ERC-20
The Ethereum token standard for fungible tokens. ERC-20 defines a common interface for token contracts (transfer, approve, allowance functions) that enables interoperability with exchanges, wallets, and DeFi protocols.Web3 & Blockchain
Event-Driven Architecture
A software design pattern where components communicate by producing and consuming events (messages), rather than making direct API calls. Promotes loose coupling, scalability, and resilience. Common tools include Kafka, RabbitMQ, AWS SNS/SQS, and Azure Service Bus.

F

FinOps (Cloud Financial Operations)
A practice that brings financial accountability to cloud spending by creating shared ownership between engineering, finance, and product teams. FinOps enables real-time cost visibility, chargeback/showback models, and optimization without blocking delivery.Cloud Solutions
Feature Engineering
The process of transforming raw data into meaningful inputs (features) for machine learning models. Good feature engineering often has more impact on model performance than algorithm selection.AI Development

G

GitOps
An operational model where infrastructure and application state is declared in Git repositories. Changes are applied automatically by a reconciliation controller (e.g., ArgoCD, Flux) that detects drift between the desired state in Git and the actual cluster state.DevOps & Infrastructure
GDPR (General Data Protection Regulation)
EU law governing the processing of personal data. Applies to any organization that processes data of EU residents, regardless of where the organization is based. Requires lawful basis for processing, data subject rights, breach notification within 72 hours, and privacy by design.Cybersecurity

H

Hybrid Cloud
An architecture combining on-premise infrastructure with one or more public clouds, connected by a private network or VPN. Allows organizations to keep sensitive workloads on-prem while using cloud elasticity for variable demand.Cloud Solutions
HIPAA (Health Insurance Portability and Accountability Act)
US federal law governing the protection of Protected Health Information (PHI). Healthcare organizations and their business associates must implement administrative, physical, and technical safeguards. HIPAA compliance is a prerequisite for most US healthcare technology engagements.Cybersecurity
High Availability (HA)
A system design that ensures continuous operational availability, typically by eliminating single points of failure through redundancy (primary/replica pairs, multi-AZ deployments, automatic failover). Measured as a percentage uptime over a period.Database Administration

I

Infrastructure as Code (IaC)
The practice of managing infrastructure (servers, networks, databases) through machine-readable configuration files rather than manual processes. Common tools include Terraform, Pulumi, CloudFormation, and Ansible.DevOps & Infrastructure
IAM (Identity and Access Management)
The framework of policies, processes, and technologies that controls who has access to what. In cloud environments, IAM includes roles, policies, service accounts, and least-privilege principle enforcement across AWS, Azure, and GCP.Cybersecurity

K

Kubernetes (K8s)
An open-source container orchestration platform that automates deployment, scaling, and management of containerized applications. Kubernetes manages clusters of nodes, scheduling workloads and ensuring desired state is maintained.DevOps & Infrastructure

L

LLM (Large Language Model)
A neural network trained on massive text corpora to generate and understand natural language. GPT-4, Claude, Gemini, and Llama are examples. LLMs power chatbots, code generation, summarization, and retrieval-augmented generation (RAG) applications.AI Development
Layer 2 (L2)
A scaling solution built on top of a Layer 1 blockchain (like Ethereum) that processes transactions off-chain and settles on-chain. L2s (Optimism, Arbitrum, Polygon, zkSync) dramatically reduce gas costs and increase throughput.Web3 & Blockchain

M

Multi-Cloud
A cloud strategy that uses services from two or more public cloud providers (e.g., AWS + Azure + GCP). Reduces vendor lock-in, improves redundancy, and allows teams to use best-in-class services from each provider.Cloud Solutions
MLOps (Machine Learning Operations)
A set of practices that applies DevOps principles to the machine learning lifecycle — covering data versioning, model training pipelines, experiment tracking, model serving, monitoring, and retraining automation.AI Development
Model Drift
The degradation in model prediction accuracy over time as real-world data distributions shift away from the training data. MLOps monitoring systems detect drift and trigger automated retraining pipelines.AI Development
Microservices
An architectural style that structures an application as a collection of small, independently deployable services organized around business capabilities. Each service has its own codebase, database, and deployment lifecycle — enabling faster releases and targeted scaling.

N

Next.js
A React framework for building full-stack web applications with server-side rendering (SSR), static site generation (SSG), incremental static regeneration (ISR), and App Router architecture. Optimized for SEO, performance, and developer experience.Web Development
NFT (Non-Fungible Token)
A unique cryptographic token on a blockchain representing ownership of a digital or physical asset. Unlike ERC-20 tokens, NFTs (ERC-721, ERC-1155) are non-interchangeable — each token has unique properties and provenance.Web3 & Blockchain

O

Observability
The ability to understand what is happening inside a system by examining its outputs. Modern observability combines metrics, logs, and traces (the "three pillars") to give engineers visibility into system behavior without guessing.DevOps & Infrastructure

P

Platform Engineering
The discipline of building and maintaining an internal developer platform (IDP) that enables product teams to self-serve infrastructure, deployments, and operational tooling. Reduces cognitive load and increases engineering velocity.DevOps & Infrastructure
Penetration Testing (Pen Test)
A simulated cyberattack conducted by authorized security professionals to identify vulnerabilities before malicious actors do. Produces a prioritized findings report with exploitation evidence and remediation guidance.Cybersecurity

R

RAG (Retrieval-Augmented Generation)
An AI pattern that enhances LLM responses by first retrieving relevant documents from a knowledge base, then feeding them as context to the model. Reduces hallucinations and makes responses grounded in your proprietary data.AI Development
Read Replica
A copy of a primary database that receives asynchronously replicated data and serves read-only queries. Read replicas reduce load on the primary node and improve query performance for analytics and reporting workloads.Database Administration

S

SLA / SLO / SLI
Service Level Agreement (SLA) is the contractual commitment. Service Level Objective (SLO) is the engineering target (e.g., 99.9% uptime). Service Level Indicator (SLI) is the actual measurement. A healthy SRE practice keeps SLIs within SLOs to protect SLAs.DevOps & Infrastructure
SIEM (Security Information and Event Management)
A platform that aggregates and analyzes security logs from across the infrastructure stack in real time. Provides threat detection, alerting, and compliance audit trails. Common tools include Splunk, Microsoft Sentinel, and Elastic SIEM.Cybersecurity
Snowflake
A cloud-native data warehouse platform offering separate storage and compute scaling, time-travel queries, data sharing, and multi-cloud support. Snowflake is widely adopted for enterprise analytics workloads across AWS, Azure, and GCP.Data Warehousing
Smart Contract
Self-executing code deployed on a blockchain that automatically enforces agreement terms when predefined conditions are met. Written in Solidity (Ethereum), Rust (Solana), or Vyper, smart contracts power DeFi, NFTs, DAOs, and tokenized assets.Web3 & Blockchain
Service Mesh
An infrastructure layer that handles service-to-service communication in a microservices architecture. Provides traffic management, mutual TLS (mTLS) encryption, observability, and circuit breaking without changing application code. Istio and Linkerd are common implementations.
Serverless
A cloud execution model where the provider manages the underlying infrastructure and automatically scales compute based on demand. Developers write functions (AWS Lambda, Azure Functions, Google Cloud Run) without managing servers. Pay-per-invocation pricing can significantly reduce costs for event-driven workloads.

V

Vulnerability Scanning
Automated scanning of systems, containers, and dependencies for known security weaknesses. Part of a DevSecOps pipeline, scanning tools (Trivy, Snyk, Qualys) can be integrated into CI/CD workflows to catch vulnerabilities before deployment.Cybersecurity

W

WebSockets
A protocol providing full-duplex communication channels over a single TCP connection. Used for real-time features like live dashboards, chat, collaborative editing, and push notifications — where HTTP's request/response model is too slow.Web Development

Z

Zero-Downtime Deployment
A deployment strategy that allows new code to be released without taking the application offline. Techniques include blue/green deployments, canary releases, and rolling updates — all common in Kubernetes-native delivery pipelines.DevOps & Infrastructure
Zero Trust
A security model based on "never trust, always verify." Every request — regardless of network location — is authenticated, authorized, and continuously validated. Replaces the traditional perimeter-based "castle and moat" model.Cybersecurity