References

Advanced Common Application Platform  (ACAP)
ACAP is applicable for specifications and standards based on the ACAP APIs, content formats, and semantic guarantees. This standard is firstly intended to be used by entities writing terminal specifications and/or standards based on ACAP. Secondly, it is intended for developers of applications that use the ACAP functionality and APIs. ACAP aims to ensure interoperability between ACAP applications and different implementations of platforms supporting ACAP applications.
Advanced Television Systems Committee  (ATSC)
The Advanced Television Systems Committee, Inc. is an international, non-profit organization developing voluntary standards for digital television. The ATSC member organizations represent the broadcast, broadcast equipment, motion picture, consumer electronics, computer, cable, satellite, and semiconductor industries. We are defining the future of television with the ATSC 3.0 next-generation broadcast standard.
Amazon Web Services  (AWS)
Amazon Web Services, Inc. (AWS) is a subsidiary of Amazon that provides on-demand cloud computing platforms and APIs to individuals, companies, and governments, on a metered, pay-as-you-go basis.
Apache Ant
Apache Ant is a Java™ Library and command-line tool whose mission is to drive processes described in build files as targets and extension points dependent upon each other.
Apache APISIX®
Apache APISIX is an open source, dynamic, scalable, and high-performance cloud native API gateway for all your APIs and microservices.
Apache Avro™
Apache Avro™ is the leading serialization format for record data, and first choice for streaming data pipelines. It offers excellent schema evolution, and has implementations for the JVM (Java, Kotlin, Scala,…), Python, C/C++/C#, PHP, Ruby, Rust, JavaScript, and even Perl.
Apache Batik
Batik is a Java™-based tookit for applications or applets that want to use images in the Scalable Vector Graphics (SVG) format for various purposes, such as display, generation or manipulation.
Apache Beam
Apache Beam is an open-source, unified programming model for batch and streaming data processing pipelines that simplifies large-scale data processing dynamics.
Apache Camel
Camel is an open source integration framework that empowers you to quickly and easily integrate various systems consuming or producing data.
Apache Cassandra
Apache Cassandra is an open source NoSQL distributed database trusted by thousands of companies for scalability and high availability without compromising performance. Linear scalability and proven fault-tolerance on commodity hardware or cloud infrastructure make it the perfect platform for mission-critical data.
Apache Commons Lang
The standard Java™ libraries fail to provide enough methods for manipulation of its core classes. Apache Commons Lang provides these extra methods.
Apache CXF
Apache CXF is an open source services framework. CXF helps you build and develop services using frontend programming APIs, like JAX-WS and JAX-RS. These services can speak a variety of protocols such as SOAP, XML/HTTP, RESTful HTTP, or CORBA and work over a variety of transports such as HTTP, JMS or JBI.
Apache Log4j 2
Apache Log4j is a Java-based logging utility originally written by Ceki Gülcü. It is part of the Apache Logging Services, a project of the Apache Software Foundation. Log4j is one of several Java logging frameworks.
Apache Parquet
Apache Parquet is an open source, column-oriented data file format designed for efficient data storage and retrieval. It provides high performance compression and encoding schemes to handle complex data in bulk and is supported in many programming language and analytics tools.
Apache Shiro
Apache Shiro™ is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management.
Apache Spark™
Apache Spark™ is a multi-language engine for executing data engineering, data science, and machine learning on single-node machines or clusters.
API Gateway
A server that acts as an API front-end, receives API requests, enforces throttling and security policies, passes requests to the back-end service and then passes the response back to the requester.
Applicant Tracking System  (ATS)
An applicant tracking system (ATS) is a software application that enables the electronic handling of the entire recruitment and hiring processes.
Application Programming Interface  (API)
An application programming interface (API) is a way for two or more computer programs or components to communicate with each other. It is a type of software interface, offering a service to other pieces of software. In 2000, Roy Fielding's outlined Representational state transfer (REST) and described the idea of a "network-based Application Programming Interface" that Fielding contrasted with traditional "library-based" APIs. XML and JSON web APIs saw widespread commercial adoption beginning in 2000 and continuing as of 2022. The web API is now the most common meaning of the term API.
Artificial Intelligence  (AI)
Artificial intelligence (AI), in its broadest sense, is intelligence exhibited by machines, particularly computer systems.
Authorization to Operate  (ATO)
ATO stands for authorization to operate, also known as "authority to operate." Because there is no perfect, risk-free software system, the ATO process is aimed at minimizing and managing risk responsibility. This process mostly comes from the Federal Information Security Management Act (FISMA).
Azure PowerShell
Azure PowerShell is a set of cmdlets for managing Azure resources directly from PowerShell. Azure PowerShell is designed to make it easy to learn and get started with, but provides powerful features for automation.
BeanShell
BeanShell is a small, free, embeddable Java source interpreter with object scripting language features, written in Java. It runs in the Java Runtime Environment (JRE), dynamically executes standard Java syntax and extends it with common scripting conveniences such as loose types, commands, and method closures, like those in Perl and JavaScript.
Binary Large Object  (BLOB)
Binary large object (BLOB) is a generic term used to describe the handling and storage of long strings of data by database management systems. A BLOB is a category of data, characterized by large size (including media formats such as audio and video), which can place extreme demands on storage systems and network bandwidth.
Central Policy Manager  (CPM)
Domain: CyberArk
The Central Policy Manager (CPM) is a Privileged Access Manager - Self-Hosted component and does not require a dedicated machine. However, it must be installed on a machine that is accessible to the network.
Central Processing Unit  (CPU)
A central processing unit (CPU), also called a central processor, main processor, or just processor, is the most important processor in a given computer. Its electronic circuitry executes instructions of a computer program, such as arithmetic, logic, controlling, and input/output (I/O) operations. This role contrasts with that of external components, such as main memory and I/O circuitry, and specialized coprocessors such as graphics processing units (GPUs).
Character Large Object  (CLOB)
A Character Large OBject (or CLOB) is part of the SQL:1999 standard data types. It is a collection of character data in a database management system, usually stored in a separate location that is referenced in the table itself.
Chief Executive Officer  (CEO)
A chief executive officer (CEO), also known as a chief executive or managing director, is the top-ranking corporate executive charged with the management of an organization, usually a company or a nonprofit organization.
Chief Information Officer  (CIO)
Chief information officer (CIO) is a job title commonly given to the most senior executive in an enterprise who works with information technology and computer systems, in order to support enterprise goals.
Chief Information Security Officer  (CISO)
A chief information security officer (CISO) is a senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO directs staff in identifying, developing, implementing, and maintaining processes across the enterprise to reduce information and information technology (IT) risks.
Chief Technology Officer  (CTO)
A chief technology officer (CTO) (also known as a chief technical officer or chief technologist) is an officer tasked with managing technical operations of an organization. They oversee and supervise research and development and serve as a technical advisor to a higher executive such as a chief executive officer.
Classless Inter-Domain Routing  (CIDR)
Classless Inter-Domain Routing is a method for allocating IP addresses for IP routing. The Internet Engineering Task Force introduced CIDR in 1993 to replace the previous classful network addressing architecture on the Internet. Its goal was to slow the growth of routing tables on routers across the Internet, and to help slow the rapid exhaustion of IPv4 addresses.
Combinatory Categorial Grammar  (CCG)
Combinatory categorial grammar (CCG) is an efficiently parsable, yet linguistically expressive grammar formalism. It has a transparent interface between surface syntax and underlying semantic representation, including predicate?argument structure, quantification and information structure.
Command-Line Interface  (CLI)
A command-line interface (CLI) is a means of interacting with a computer program by inputting lines of text called command-lines.
Common Object Request Broker Architecture  (CORBA)
The Common Object Request Broker Architecture (CORBA) is a standard defined by the Object Management Group (OMG) designed to facilitate the communication of systems that are deployed on diverse platforms. CORBA enables collaboration between systems on different operating systems, programming languages, and computing hardware.
Concept Description Language  (CDL)
Concept Description Language (CDL) is a computer language to describe concept structure of content.
Confidential Computing
Confidential computing is a security and privacy-enhancing computational technique focused on protecting data in use. Confidential computing can be used in conjunction with storage and network encryption, which protect data at rest and data in transit respectively.
Confidential Federated Learning  (CLF)
The principles of security, privacy, accountability, transparency, and fairness are the cornerstones of modern AI regulations. Classic FL was designed with a strong emphasis on security and privacy, at the cost of transparency and accountability. CFL addresses this gap with a careful combination of FL with TEEs and commitments. In addition, CFL brings other desirable security properties, such as code-based access control, model confidentiality, and protection of models during inference. Recent advances in confidential computing such as confidential containers and confidential GPUs mean that existing FL frameworks can be extended seamlessly to support CFL with low overheads. For these reasons, CFL is likely to become the default mode for deploying FL workloads.
Constraint Satisfaction Problem  (CSP)
Constraint satisfaction problems (CSPs) are mathematical questions defined as a set of objects whose state must satisfy a number of constraints or limitations. CSPs represent the entities in a problem as a homogeneous collection of finite constraints over variables, which is solved by constraint satisfaction methods.
Container Database  (CDB)
A container database (CDB) contains one or more user-created, pluggable databases and application containers. The CDB includes all the data files for the PDBs contained within it and a set of system data files that store metadata for the CDB itself.
Control Objectives for Information and Related Technology  (COBIT)
COBIT (Control Objectives for Information and Related Technologies) is a framework created by ISACA for information technology (IT) management and IT governance. The framework is business focused and defines a set of generic processes for the management of IT, with each process defined together with process inputs and outputs, key process-activities, process objectives, performance measures and an elementary maturity model.
Controlled Natural Language  (CNL)
Controlled natural languages (CNLs) are subsets of natural languages that are obtained by restricting the grammar and vocabulary in order to reduce or eliminate ambiguity and complexity.
Convolutional Neural Networks  (CNN)
A convolutional neural network (CNN) is a regularized type of feed-forward neural network that learns features by itself via filter (or kernel) optimization.
Dandified YUM  (DNF)
DNF is the next upcoming major version of YUM, a package manager for RPM-based Linux distributions. It roughly maintains CLI compatibility with YUM and defines a strict API for extensions and plugins.
Data Definition Language  (DDL)
In the context of SQL, data definition or data description language (DDL) is a syntax for creating and modifying database objects such as tables, indices, and users.
Denial of Service  (DoS)
In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.
Digital Object Identifier  (DOI)
A DOI name is a digital identifier of an object, any object ? physical, digital, or abstract. DOIs solve a common problem: keeping track of things. Things can be matter, material, content, or activities.
Digital Rights Management  (DRM)
Digital rights management (DRM) is the management of legal access to digital content. Various tools or technological protection measures (TPM), such as access control technologies, can restrict the use of proprietary hardware and copyrighted works. DRM technologies govern the use, modification and distribution of copyrighted works (e.g. software, multimedia content) and of systems that enforce these policies within devices. DRM technologies include licensing agreements and encryption.
Directory Services Markup Language  (DSML)
Directory Services Markup Language (DSML) is a representation of directory service information in an XML syntax.
Distributed Denial of Service  (DDoS)
A DDoS attack targets websites and servers by disrupting network services in an attempt to exhaust an application?s resources. The perpetrators behind these attacks flood a site with errant traffic, resulting in poor website functionality or knocking it offline altogether.
Domain Name System  (DNS)
The Domain Name System (DNS) is a hierarchical and distributed name service that provides a naming system for computers, services, and other resources on the Internet or other Internet Protocol (IP) networks.
Elliptic Curve Cryptography  (ECC)
Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys to provide equivalent security, compared to cryptosystems based on modular exponentiation in Galois fields, such as the RSA cryptosystem and ElGamal cryptosystem.
Enterprise User Security  (EUS)
Enterprise User Security is an important component of the Oracle Database. It enables you to address administrative and security challenges for a large number of enterprise database users.
Explainable artificial intelligence  (XAI)
Explainable AI (XAI), often overlapping with interpretable AI, or explainable machine learning (XML), either refers to an artificial intelligence (AI) system over which it is possible for humans to retain intellectual oversight, or refers to the methods to achieve this. The main focus is usually on the reasoning behind the decisions or predictions made by the AI which are made more understandable and transparent.
Explicit Semantic Analysis  (ESA)
In natural language processing and information retrieval, explicit semantic analysis (ESA) is a vectoral representation of text (individual words or entire documents) that uses a document corpus as a knowledge base.
Extended Detection and Response  (XDR)
Domain: Cyber Security
Extended detection and response (XDR) is a cybersecurity technology that monitors and mitigates cyber security threats.
Extensible Access Control Markup Language  (XACML)
The eXtensible Access Control Markup Language (XACML) is an XML-based standard markup language for specifying access control policies. The standard, published by OASIS, defines a declarative fine-grained, attribute-based access control policy language, an architecture, and a processing model describing how to evaluate access requests according to the rules defined in policies.
Extensible Authentication Protocol  (EAP)
Extensible Authentication Protocol (EAP) is an authentication framework frequently used in network and internet connections. EAP is an authentication framework for providing the transport and usage of material and parameters generated by EAP methods. There are many methods defined by RFCs, and a number of vendor-specific methods and new proposals exist. EAP is not a wire protocol; instead it only defines the information from the interface and the formats. Each protocol that uses EAP defines a way to encapsulate by the user EAP messages within that protocol's messages.
Extensible Markup Language  (XML)
Extensible Markup Language (XML) is a markup language and file format for storing, transmitting, and reconstructing arbitrary data. It defines a set of rules for encoding documents in a format that is both human-readable and machine-readable.
Extensible Stylesheet Language  (XSL)
In computing, the term Extensible Stylesheet Language (XSL) is used to refer to a family of languages used to transform and render XML documents.
Extensible Stylesheet Language Transformation  (XSLT)
XSLT (Extensible Stylesheet Language Transformations) is a language originally designed for transforming XML documents into other XML documents, or other formats such as HTML for web pages, plain text or XSL Formatting Objects, which may subsequently be converted to other formats, such as PDF, PostScript and PNG. Support for JSON and plain-text transformation was added in later updates to the XSLT 1.0 specification.
Extension Mechanisms for DNS  (EDNS)
Extension Mechanisms for DNS (EDNS) is a specification for expanding the size of several parameters of the Domain Name System (DNS) protocol which had size restrictions that the Internet engineering community deemed too limited for increasing functionality of the protocol.
Federal Information Security Management Act  (FISMA)
The Federal Information Security Modernization Act of 2014 (FISMA) was signed into federal law by President Barack Obama on December 18, 2014. Passed as a response to the increasing amount of cyber attacks on the federal government, it amended existing laws to enable the federal government to better respond to cyber attacks on departments and agencies.
Federated Learning  (FL)
Federated learning is a machine learning technique focusing on settings in which multiple entities (often referred to as clients) collaboratively train a model while ensuring that their data remains decentralized. This stands in contrast to machine learning settings in which data is centrally stored.
Feedforward Neural Network  (FNN)
A feedforward neural network (FNN) is one of the two broad types of artificial neural network, characterized by direction of the flow of information between its layers.
First-Order Logic  (FOL)
First-order logic?also called predicate logic, predicate calculus, quantificational logic?is a collection of formal systems used in mathematics, philosophy, linguistics, and computer science.
Foreigh Exchange  (FX)
Foreign exchange, "FOREX" or "FX," refers to global currencies as well as to exchanges, markets and products used for trading various world currencies.
Galois Counter Mode  (GCM)
In cryptography, Galois/Counter Mode (GCM) is a mode of operation for symmetric-key cryptographic block ciphers which is widely adopted for its performance. GCM throughput rates for state-of-the-art, high-speed communication channels can be achieved with inexpensive hardware resources.
Garbage Collector  (GC)
Garbage collection (GC) is a form of automatic memory management. The garbage collector attempts to reclaim memory that was allocated by the program, but is no longer referenced; such memory is called garbage.
General Data Protection Regulation  (GDPR)
The General Data Protection Regulation (Regulation (EU) 2016/679) is a European Union regulation on information privacy in the European Union (EU) and the European Economic Area (EEA). The GDPR is an important component of EU privacy law and human rights law, in particular Article 8(1) of the Charter of Fundamental Rights of the European Union. It also governs the transfer of personal data outside the EU and EEA.
Generative Adversarial Network  (GAN)
A generative adversarial network (GAN) is a class of machine learning frameworks and a prominent framework for approaching generative AI.
Generative Artificial Intelligence  (GenAI)
Generative artificial intelligence is artificial intelligence capable of generating text, images, videos, or other data using generative models, often in response to prompts. Generative AI models learn the patterns and structure of their input training data and then generate new data that has similar characteristics.
Generic Security Services Application Program Interface  (GSSAPI)
The Generic Security Service Application Program Interface (GSSAPI) is an application programming interface for programs to access security services. The GSSAPI is an IETF standard that addresses the problem of many similar but incompatible security services in use as of 2005.
Good Documentation Practice  (GDP)
Good documentation practice is a term in the pharmaceutical and medical device industries to describe standards by which documents are created and maintained.
Graph Neural Network  (GNN)
A graph neural network (GNN) belongs to a class of artificial neural networks for processing data that can be represented as graphs.
Graph Query Language  (GQL)
Graph Query Language (GQL) is a standard graph query language published by ISO in April 2024.
Graph Theory
In mathematics, graph theory is the study of graphs, which are mathematical structures used to model pairwise relations between objects. A graph in this context is made up of vertices (also called nodes or points) which are connected by edges (also called arcs, links or lines).
Graphics Processing Unit  (GPU)
A graphics processing unit (GPU) is a specialized electronic circuit initially designed for digital image processing and to accelerate computer graphics, being present either as a discrete video card or embedded on motherboards, mobile phones, personal computers, workstations, and game consoles. After their initial design, GPUs were found to be useful for non-graphic calculations involving embarrassingly parallel problems due to their parallel structure. Other non-graphical uses include the training of neural networks and cryptocurrency mining.
Health Insurance Portability and Accountability Act  (HIPAA)
The Health Insurance Portability and Accountability Act of 1996 (HIPAA or the Kennedy?Kassebaum Act) is a United States Act of Congress enacted by the 104th United States Congress and signed into law by President Bill Clinton on August 21, 1996. It aimed to alter the transfer of healthcare information, stipulated the guidelines by which personally identifiable information maintained by the healthcare and healthcare insurance industries should be protected from fraud and theft, and addressed some limitations on healthcare insurance coverage.
Homebrew
Homebrew installs the stuff you need that Apple (or your Linux system) didn?t.
Hypertext Markup Language  (HTML)
HTML is the World Wide Web's core markup language. Originally, HTML was primarily designed as a language for semantically describing scientific documents. Its general design, however, has enabled it to be adapted, over the subsequent years, to describe a number of other types of documents and even applications.
Hypertext Transfer Protocol  (HTTP)
The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems.
Identity as a Service  (IdaaS)
Identity as a Service, or IDaaS is cloud-based authentication built and operated by a third-party provider. IDaaS companies supply cloud-based authentication or identity management to enterprises who subscribe.
Information Systems Audit and Control Association  (ISACA)
ISACA is an international professional association focused on IT (information technology) governance. On its IRS filings, it is known as the Information Systems Audit and Control Association, although ISACA now goes by its acronym only. ISACA currently offers 8 certification programs, as well as other micro-certificates.
Information Technology Infrastructure Library  (ITIL)
The Information Technology Infrastructure Library (ITIL) is a set of practices and a framework for IT activities such as IT service management (ITSM) and IT asset management (ITAM) that focus on aligning IT services with the needs of the business.
Infrastructure as a Service  (IaaS)
Infrastructure as a service (IaaS) is a cloud computing service model by means of which computing resources are supplied by a cloud services provider. The IaaS vendor provides the storage, network, servers, and virtualization (which mostly refers, in this case, to emulating computer hardware).
Integrated Development Environment  (IDE)
An integrated development environment (IDE) is a software application that provides comprehensive facilities for software development. An IDE normally consists of at least a source-code editor, build automation tools, and a debugger.
International Organization for Standardization  (ISO)
The International Organization for Standardization (ISO) is an independent, non-governmental, international standard development organization composed of representatives from the national standards organizations of member countries.
Internet Assigned Numbers Authority  (IANA)
The global coordination of the DNS Root, IP addressing, and other Internet protocol resources is performed as the Internet Assigned Numbers Authority (IANA) functions.
Internet Control Message Protocol  (ICMP)
The Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet protocol suite. It is used by network devices, including routers, to send error messages and operational information indicating success or failure when communicating with another IP address.
Internet Corporation for Assigned Names and Numbers  (ICANN)
The Internet Corporation for Assigned Names and Numbers (ICANN) is a global multistakeholder group and nonprofit organization headquartered in the United States responsible for coordinating the maintenance and procedures of several databases related to the namespaces and numerical spaces of the Internet, ensuring the Internet's stable and secure operation.
Internet Engineering Task Force  (IETF)
The Internet Engineering Task Force (IETF), founded in 1986, is the premier standards development organization (SDO) for the Internet. The IETF makes voluntary standards that are often adopted by Internet users, network operators, and equipment vendors, and it thus helps shape the trajectory of the development of the Internet. But in no way does the IETF control, or even patrol, the Internet.
Internet Message Access Protocol  (IMAP)
The Internet Message Access Protocol (IMAP) is an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection.
Internet of Things  (IoT)
The Internet of Things (IoT) describes the network of physical objects ? "things" ? that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.
Internet Protocol  (IP)
The Internet Protocol (IP) is the network layer communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet.
Java Authentication and Authorization Service  (JAAS)
Java Authentication and Authorization Service, or JAAS is the Java implementation of the standard Pluggable Authentication Module (PAM) information security framework. JAAS has as its main goal the separation of concerns of user authentication so that they may be managed independently. While the former authentication mechanism contained information about where the code originated from and who signed that code, JAAS adds a marker about who runs the code. By extending the verification vectors JAAS extends the security architecture for Java applications that require authentication and authorization modules.
Java Database Connectivity  (JDBC)
Java Database Connectivity (JDBC) is an application programming interface (API) for the Java programming language which defines how a client may access a database. It is a Java-based data access technology used for Java database connectivity. It is part of the Java Standard Edition platform, from Oracle Corporation.
Java Development Kit  (JDK)
The Java Development Kit (JDK) is a distribution of Java technology by Oracle Corporation. It implements the Java Language Specification (JLS) and the Java Virtual Machine Specification (JVMS) and provides the Standard Edition (SE) of the Java Application Programming Interface (API).
Java Runtime Environment  (JRE)
The Java Runtime Environment (JRE) released by Oracle is a freely available software distribution containing a stand-alone JVM (HotSpot), the Java standard library (Java Class Library), a configuration tool, and - until its discontinuation in JDK 9 - a browser plug-in.
Java Virtual Machine  (JVM)
A Java virtual machine (JVM) is a virtual machine that enables a computer to run Java programs as well as programs written in other languages that are also compiled to Java bytecode.
Java™ API for RESTful Web Services  (JAX-RS)
This JSR is to develop JAX-RS 2.1, the next release of Java™ API for RESTful Web Services.
Java™ API for XML-Based Web Services  (JAX-WS)
The Java™ API for XML-Based Web Services (JAX-WS) 2.0 specification is the next generation web services API replacing JAX-RPC 1.0.
Java™ Business Integration  (JBI)
Java™ Business Integration (JBI) is a standard developed under the Java™ Community Process (JCP) as an approach to implementing a service-oriented architecture (SOA). It defines an environment for plug-in components that interact using a services model based directly on Web Services Description Language (WSDL) 2.0.
Java™ Community Process  (JCP)
The JCP is the mechanism for developing standard technical specifications for Java™ technology.
Java™ Messaging Service  (JMS)
The Java™ Message Service (JMS) API is a messaging standard that allows application components based on the Java™ Platform Enterprise Edition (Java™ EE) to create, send, receive, and read messages. It enables distributed communication that is loosely coupled, reliable, and asynchronous.
Java™ Specification Request  (JSR)
Java™ Specification Requests (JSRs) are the actual descriptions of proposed and final specifications for the Java™ platform.
JavaScript Object Notation  (JSON)
JavaScript Object Notation (JSON) is an open standard file format and data interchange format that uses human-readable text to store and transmit data objects consisting of attribute?value pairs and arrays (or other serializable values). It is a commonly used data format with diverse uses in electronic data interchange, including that of web applications with servers.
JSON Web Token  (JWT)
JSON Web Token (JWT) is a proposed Internet standard for creating data with optional signature and/or optional encryption whose payload holds JSON that asserts some number of claims. The tokens are signed either using a private secret or a public/private key.
Key Performance Indicator  (KPI)
KPIs evaluate the success of an organization or of a particular activity (such as projects, programs, products and other initiatives) in which it engages. KPIs provide a focus for strategic and operational improvement, create an analytical basis for decision making and help focus attention on what matters most.
Knowledge Representation and Reasoning  (KRR)
Knowledge representation and reasoning is the field of artificial intelligence (AI) dedicated to representing information about the world in a form that a computer system can use to solve complex tasks such as diagnosing a medical condition or having a dialog in a natural language.
Large Language Model  (LLM)
A large language model (LLM) is a computational model notable for its ability to achieve general-purpose language generation and other natural language processing tasks such as classification.
Latent Semantic Analysis  (LSA)
Latent semantic analysis (LSA) is a technique in natural language processing, in particular distributional semantics, of analyzing relationships between a set of documents and the terms they contain by producing a set of concepts related to the documents and terms.
LEAN
Lean is a way of thinking about creating needed value with fewer resources and less waste. And lean is a practice consisting of continuous experimentation to achieve perfect value with zero waste. Lean thinking and practice occur together.
Lempel-Ziv-Welch  (LZW)
Lempel?Ziv?Welch (LZW) is a universal lossless data compression algorithm created by Abraham Lempel, Jacob Ziv, and Terry Welch. The algorithm is simple to implement and has the potential for very high throughput in hardware implementations. It is the algorithm of the Unix file compression utility compress and is used in the GIF image format.
Lightweight Directory Access Protocol  (LDAP)
The Lightweight Directory Access Protocol (LDAP) provides access to distributed directory services that act in accordance with X.500 data and service models.
Local Area Network  (LAN)
A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.
Long Short-Term Memory  (LSTM)
Long short-term memory (LSTM) is a type of recurrent neural network (RNN) aimed at dealing with the vanishing gradient problem present in traditional RNNs.
Mathematical Markup Language  (MathML)
MathML is a markup language for describing mathematical notation and capturing both its structure and content. The goal of MathML is to enable mathematics to be served, received, and processed on the World Wide Web, just as HTML has enabled this functionality for text.
Memory Management Unit  (MMU)
A memory management unit (MMU), sometimes called paged memory management unit (PMMU), is a computer hardware unit that examines all memory references on the memory bus, translating these requests, known as virtual memory addresses, into physical addresses in main memory.
Meta-Object Facility  (MOF)
The Meta-Object Facility (MOF) is an Object Management Group (OMG) standard for model-driven engineering. Its purpose is to provide a type system for entities in the CORBA architecture and a set of interfaces through which those types can be created and manipulated. MOF may be used for domain-driven software design and object-oriented modelling.
Multi-Factor Authentication  (MFA)
Multi-factor authentication (MFA) is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism.
National Institute of Standards and Technology  (NIST)
The National Institute of Standards and Technology (NIST) was founded in 1901 and is now part of the U.S. Department of Commerce. Its mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.
Natural Language Processing  (NLP)
Natural language processing (NLP) is an interdisciplinary subfield of computer science and artificial intelligence. It is primarily concerned with providing computers the ability to process data encoded in natural language and is thus closely related to information retrieval, knowledge representation and computational linguistics, a subfield of linguistics.
Network Address Translation  (NAT)
Network Address Translation (NAT) is a service that operates on a router or edge platform to connect private networks to public networks like the internet.
Network Time Protocol  (NTP)
The Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. In operation since before 1985, NTP is one of the oldest Internet protocols in current use.
New Technology LAN Manager  (NTLM)
New Technology LAN Manager (NTLM) is a suite of Microsoft security protocols intended to provide authentication, integrity, and confidentiality to users.
Non-Interactive Zero Knowledge  (NIZK)
Non-interactive zero-knowledge proofs are cryptographic primitives, where information between a prover and a verifier can be authenticated by the prover, without revealing any of the specific information beyond the validity of the statement itself. This makes direct communication between the prover and verifier unnecessary, effectively removing any intermediaries.
OAuth 2.0
The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.
Object Constraint Language  (OCL)
The Object Constraint Language (OCL) is a declarative language describing rules applying to Unified Modeling Language (UML) models developed at IBM and is now part of the UML standard. Initially, OCL was merely a formal specification language extension for UML. OCL may now be used with any Meta-Object Facility (MOF) Object Management Group (OMG) meta-model, including UML.
Object Management Group®  (OMG)
The Object Management Group® Standards Development Organization (OMG® SDO) is an international (27 countries), membership-driven (230+ organizations) and not-for-profit consortium
Object/Relational Model  (ORM)
Object?relational mapping (ORM, O/RM, and O/R mapping tool) in computer science is a programming technique for converting data between a relational database and the heap of an object-oriented programming language. This creates, in effect, a virtual object database that can be used from within the programming language.
Oracle Call Interface  (OCI)
Domain: Databases
In computing, the Oracle Call Interface (OCI) consists of a set of C-language software APIs which provide an interface to the Oracle database. OCI offers a procedural API for not only performing certain database administration tasks (such as system startup and shutdown), but also for using PL/SQL or SQL to query, access, and manipulate data.
Oracle Unified Directory  (OUD)
Oracle Unified Directory is part of Oracle's comprehensive directory solution offering for robust identity management deployments. Enable enterprise directory scalability with an all-in-one solution that provides the services required for high performance and massive scale.
Password Vault Web Access  (PVWA)
Domain: CyberArk
The Password Vault Web Access (PVWA) is a CyberArk component that enables you to access and configure the PVWA solution over the web.
Pathway Language Model 2  (PaLM2)
PaLM 2 is a next generation language model with improved multilingual, reasoning and coding capabilities that builds on Google?s legacy of breakthrough research in machine learning and responsible AI.
Platform as a Service  (PaaS)
Platform as a service (PaaS) or application platform as a service (aPaaS) or platform-based service is a category of cloud computing services that allows customers to provision, instantiate, run, and manage a modular bundle comprising a computing platform and one or more applications, without the complexity of building and maintaining the infrastructure typically associated with developing and launching the application(s), and to allow developers to create, develop, and package such software bundles.
Pluggable Authentication Module  (PAM)
Domain: Authentication
A pluggable authentication module (PAM) is a mechanism to integrate multiple low-level authentication schemes into a high-level application programming interface (API). PAM allows programs that rely on authentication to be written independently of the underlying authentication scheme.
Pluggable Database  (PDB)
A pluggable database (PDB) is a portable collection of schemas, schema objects, and nonschema objects that appears to an application as a separate database. At the physical level, each PDB has its own set of data files that store the data for the PDB.
Post Office Protocol  (POP)
In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server. Today, POP version 3 (POP3) is the most commonly used version. Together with IMAP, it is one of the most common protocols for email retrieval.
PowerShell
PowerShell is a task automation and configuration management program from Microsoft, consisting of a command-line shell and the associated scripting language
Privacy Pass Architecture
Privacy Pass is an architecture for authorization based on privacy-preserving authentication mechanisms. In other words, relying parties authenticate Clients in a privacy-preserving way, i.e., without learning any unique, per-Client information through the authentication protocol, and then make authorization decisions on the basis of that authentication succeeding or failing. Possible authorization decisions might be to provide Clients with read access to a particular resource or write access to a particular resource.
Privileged Access Management  (PAM)
Domain: Access Management
Privileged Access Management (PAM) is a type of identity management and branch of cybersecurity that focuses on the control, monitoring, and protection of privileged accounts within an organization.
Pronunciation Lexicon Specification  (PLS)
The Pronunciation Lexicon Specification (PLS) is a W3C Recommendation, which is designed to enable interoperable specification of pronunciation information for both speech recognition and speech synthesis engines within voice browsing applications. The language is intended to be easy to use by developers while supporting the accurate specification of pronunciation information for international use.
Proof Key for Code Exchange  (PKCE)
PKCE, which stands for "Proof of Key Code Exchange", is an extension of the OAuth 2.0 protocol that helps prevent code interception attacks
Quantum Processing Unit  (QPU)
The Quantum Processing Unit (QPU) is specialized hardware designed to run quantum algorithms, with the potential to revolutionize technology. Unlike the Central Processing Unit (CPU) or Graphics Processing Unit (GPU), which uses classical bits, the QPU uses qubits that can exist in a superposition of states. The power of quantum computing lies in the quantum phenomena of superposition, entanglement, and interference.
Recovery Point Objective  (RPO)
Recovery Point Objective or RPO is the point in time to which systems and data must be recovered after a disaster has occurred.
Recovery Time Objective  (RTO)
Recovery Time Objective (RTO) refers to the maximum acceptable length of time that can elapse before the lack of a business function severely impacts the organization. This is the maximum agreed time for the resumption of the critical business functions.
Recurrent Neural Network  (RNN)
A recurrent neural network (RNN) is one of the two broad types of artificial neural network, characterized by direction of the flow of information between its layers. In contrast to the uni-directional feedforward neural network, it is a bi-directional artificial neural network, meaning that it allows the output from some nodes to affect subsequent input to the same nodes.
Relational Database Management System  (RDBMS)
A relational database management system (RDBMS) is a program that allows you to create, update, and administer a relational database. Most relational database management systems use the SQL language to access the database.
Remote Authentication Dial-In User Service  (RADIUS)
Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized authentication, authorization, and accounting (AAA) management for users who connect and use a network service.
Representational State Transfer  (REST)
REST (REpresentational State Transfer) is a software architectural style that was created to guide the design and development of the architecture for the World Wide Web. REST defines a set of constraints for how the architecture of a distributed, Internet-scale hypermedia system, such as the Web, should behave. The REST architectural style emphasises uniform interfaces, independent deployment of components, the scalability of interactions between them, and creating a layered architecture to promote caching to reduce user-perceived latency, enforce security, and encapsulate legacy systems.
Request For Comments  (RFC)
The IETF publishes its technical documentation as RFCs. They define the Internet's technical foundations, such as addressing, routing and transport technologies. They recommend operational best practice and specify application protocols that are used to deliver services used by billions of people every day.
Resource Description Framework  (RDF)
The Resource Description Framework (RDF) is a World Wide Web Consortium (W3C) standard originally designed as a data model for metadata. It has come to be used as a general method for description and exchange of graph data.
Robotic Process Automation  (RPA)
Robotic process automation (RPA) is a form of business process automation that is based on software robots (bots) or artificial intelligence (AI) agents. RPA should not be confused with artificial intelligence as it is based on automotive technology following a predefined workflow.
RPM Package Manager  (RPM)
RPM Package Manager (RPM) (originally Red Hat Package Manager, now a recursive acronym) is a free and open-source package management system.
Sarbanes-Oxley Act  (SoX)
The Sarbanes?Oxley Act of 2002 is a United States federal law that mandates certain practices in financial record keeping and reporting for corporations.
Schnorr Protocol
This document describes the Schnorr non-interactive zero-knowledge (NIZK) proof, a non-interactive variant of the three-pass Schnorr identification scheme. The Schnorr NIZK proof allows one to prove the knowledge of a discrete logarithm without leaking any information about its value. It can serve as a useful building block for many cryptographic protocols to ensure that participants follow the protocol specification honestly.
Security Assertion Markup Language  (SAML)
Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider. SAML is an XML-based markup language for security assertions (statements that service providers use to make access-control decisions).
Security Information and Event Management  (SIEM)
Security information and event management (SIEM) is a field within computer security that combines security information management (SIM) and security event management (SEM) to enable real-time analysis of security alerts generated by applications and network hardware.
Security Orchestration, Automation and Response  (SOAR)
Security orchestration, automation and response (SOAR) is a group of cybersecurity technologies that allow organizations to respond to some incidents automatically. It collects inputs monitored by the security operations team such as alerts from the SIEM system, TIP, and other security technologies and helps define, prioritize, and drive standardized incident response activities.
Segregation of Duties  (SoD)
Separation of duties (SoD), also known as segregation of duties, is the concept of having more than one person required to complete a task. It is an administrative control used by organisations to prevent fraud, sabotage, theft, misuse of information, and other security compromises.
Semantic Interpretation for Speech Recognition  (SISR)
Semantic Interpretation for Speech Recognition (SISR) defines the syntax and semantics of annotations to grammar rules in the Speech Recognition Grammar Specification (SRGS).
Simple and Protected GSSAPI Negotiation Mechanism  (SPNEGO)
Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) is a GSSAPI "pseudo mechanism" used by client-server software to negotiate the choice of security technology. SPNEGO is used when a client application wants to authenticate to a remote server, but neither end is sure what authentication protocols the other supports. The pseudo-mechanism uses a protocol to determine what common GSSAPI mechanisms are available, selects one and then dispatches all further security operations to it.
Simple Authentication and Security Layer  (SASL)
Simple Authentication and Security Layer (SASL) is a framework for authentication and data security in Internet protocols. It decouples authentication mechanisms from application protocols, in theory allowing any authentication mechanism supported by SASL to be used in any application protocol that uses SASL.
Simple Mail Transfer Protocol  (SMTP)
The Simple Mail Transfer Protocol (SMTP) is an Internet standard communication protocol for electronic mail transmission.
Simple Network Time Protocol  (SNTP)
The Simple Network Time Protocol (SNTP) is a simplified access strategy for servers and clients using NTP as now specified and deployed in the Internet.
Simple Object Access Protocol  (SOAP)
SOAP is a lightweight protocol intended for exchanging structured information in a decentralized, distributed environment.
Single Sign-On  (SSO)
Single sign-on (SSO) is an authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems.
Snappy
Snappy is a compression/decompression library. It does not aim for maximum compression, or compatibility with any other compression library; instead, it aims for very high speeds and reasonable compression.
Software Development Lifecycle  (SDLC)
The software development lifecycle (SDLC) is the cost-effective and time-efficient process that development teams use to design and build high-quality software. The goal of SDLC is to minimize project risks through forward planning so that software meets customer expectations during production and beyond. This methodology outlines a series of steps that divide the software development process into tasks you can assign, complete, and measure.
Software Guard Extension  (SGX)
Intel Software Guard Extensions (SGX) is a set of instruction codes implementing trusted execution environment that are built into some Intel central processing units (CPUs). They allow user-level and operating system code to define protected private regions of memory, called enclaves. SGX is designed to be useful for implementing secure remote computation, secure web browsing, and digital rights management (DRM). Other applications include concealment of proprietary algorithms and of encryption keys.
SPARQL Protocol and RDF Query Language  (SPARQL)
SPARQL Protocol and RDF Query Language is an RDF query language?that is, a semantic query language for databases?able to retrieve and manipulate data stored in Resource Description Framework (RDF) format.
Speech Recognition Grammar Specification  (SRGS)
Speech Recognition Grammar Specification (SRGS) is a W3C standard for how speech recognition grammars are specified. A speech recognition grammar is a set of word patterns, and tells a speech recognition system what to expect a human to say.
Speech Synthesis Markup Language  (SSML)
Speech Synthesis Markup Language (SSML) is an XML-based markup language for speech synthesis applications. It is a recommendation of the W3C's Voice Browser Working Group. SSML is often embedded in VoiceXML scripts to drive interactive telephony systems.
Standard Generalized Markup Language  (SGML)
The Standard Generalized Markup Language (ISO 8879:1986) is a standard for defining generalized markup languages for documents.
StartTLS
Opportunistic TLS (Transport Layer Security) refers to extensions in plain text communication protocols, which offer a way to upgrade a plain text connection to an encrypted (TLS or SSL) connection instead of using a separate port for encrypted communication. Several protocols use a command named "STARTTLS" for this purpose. It is a form of opportunistic encryption and is primarily intended as a countermeasure to passive monitoring.
STRIDE Threat Model  (STRIDE)
STRIDE is a model for identifying computer security threats developed by Praerit Garg and Loren Kohnfelder at Microsoft. It provides a mnemonic for security threats in six categories (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege).
Structure Query Language  (SQL)
Structured Query Language (SQL) is a domain-specific language used to manage data, especially in a relational database management system (RDBMS).
System for Cross-domain Identity Management  (SCIM)
The System for Cross-domain Identity Management (SCIM) specification is designed to make managing user identities in cloud-based applications and services easier. The specification suite seeks to build upon experience with existing schemas and deployments, placing specific emphasis on simplicity of development and integration, while applying existing authentication, authorization, and privacy models. Its intent is to reduce the cost and complexity of user management operations by providing a common user schema and extension model, as well as binding documents to provide patterns for exchanging this schema using standard protocols. In essence: make it fast, cheap, and easy to move users in to, out of, and around the cloud.
Text Encoding Initiative  (TEI)
The Text Encoding Initiative (TEI) is a consortium which collectively develops and maintains a standard for the representation of texts in digital form. Its chief deliverable is a set of Guidelines which specify encoding methods for machine-readable texts, chiefly in the humanities, social sciences and linguistics.
Transmission Control Protol  (TCP)
The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite. It originated in the initial network implementation in which it complemented the Internet Protocol (IP).
Transport Layer Security  (TLS)
Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network.
Trusted Computing Base  (TCB)
The trusted computing base (TCB) of a computer system is the set of all hardware, firmware, and/or software components that are critical to its security, in the sense that bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.
Trusted Container Extension  (TCX)
Trusted Container Extensions (TCX) combines the manageability and agility of standard containers with the strong protection guarantees of hardware-enforced Trusted Execution Environments (TEEs) to enable confidential computing for container workloads. TCX provides significant performance advantages compared to existing approaches while protecting container workloads and the data processed by them.
Trusted Execution Environment  (TEE)
Trusted Execution Environment (TEE) is a secure area of a main processor. It helps the code and data loaded inside it be protected with respect to confidentiality and integrity. Data confidentiality prevents unauthorized entities from outside the TEE from reading data, while code integrity prevents code in the TEE from being replaced or modified by unauthorized entities, which may also be the computer owner itself as in certain DRM schemes described in Intel SGX.
Trusted Platform Module  (TPM)
Trusted Platform Module (TPM) is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys.
Unified Modeling Language  (UML)
The unified modeling language (UML) is a general-purpose visual modeling language that is intended to provide a standard way to visualize the design of a system.
Uniform Resource Identifier  (URI)
A Uniform Resource Identifier (URI), formerly Universal Resource Identifier, is a unique sequence of characters that identifies an abstract or physical resource, such as resources on a webpage, mail address, phone number, books, real-world objects such as people and places, concepts.
Uniform Resource Locator  (URL)
A uniform resource locator (URL), colloquially known as an address on the Web, is a reference to a resource that specifies its location on a computer network and a mechanism for retrieving it. A URL is a specific type of Uniform Resource Identifier (URI), although many people use the two terms interchangeably.
Universal Description, Discovery, and Integration  (UDDI)
Universal Description, Discovery, and Integration (UDDI) is an XML-based registry for business internet services. A provider can explicitly register a service with a Web Services Registry such as UDDI or publish additional documents intended to facilitate discovery such as Web Services Inspection Language (WSIL) documents.
User Datagram Protocol  (UDP)
In computer networking, the User Datagram Protocol (UDP) is one of the core communication protocols of the Internet protocol suite used to send messages (transported as datagrams in packets) to other hosts on an Internet Protocol (IP) network. Within an IP network, UDP does not require prior communication to set up communication channels or data paths.
Virtual Local Area Network  (VLAN)
A virtual local area network (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2).
Virtual Private Cloud  (VPC)
A virtual private cloud (VPC) is an on-demand configurable pool of shared resources allocated within a public cloud environment, providing a certain level of isolation between the different organizations (denoted as users hereafter) using the resources.
Virtual Private Network  (VPN)
Virtual private network (VPN) is a network architecture for virtually extending a private network (i.e. any computer network which is not the public Internet) across one or multiple other networks which are either untrusted (as not controlled by who is aiming to implement a VPN) or need to be isolated (thus making the lower network invisible or not directly usable).
Web Service Inspection Language  (WSIL)
WS-Inspection is a Web service specification for "discovery documents" developed in a joint effort by Microsoft and IBM. WS-Inspection lists groups of web services and their endpoints in an XML format.
Web Services Description Language  (WSDL)
Web Services Description Language Version 2.0 (WSDL 2.0) provides a model and an XML format for describing Web services. WSDL 2.0 enables one to separate the description of the abstract functionality offered by a service from concrete details of a service description such as "how" and "where" that functionality is offered.
Web Services Federation  (WS-Fed)
WS-Federation (Web Services Federation) is an Identity Federation specification, developed by a group of companies: BEA Systems, BMC Software, CA Inc., IBM, Microsoft, Novell, Hewlett Packard Enterprise, and VeriSign. Part of the larger Web Services Security framework, WS-Federation defines mechanisms for allowing different security realms to broker information on identities, identity attributes and authentication.
Wide Area Network  (WAN)
A wide area network (WAN) is a telecommunications network that extends over a large geographic area. Wide area networks are often established with leased telecommunication circuits.
World Wide Web Consortium  (W3C)
The World Wide Web Consortium (W3C) develops standards and guidelines to help everyone build a web based on the principles of accessibility, internationalization, privacy and security.
YAML Ain't Markup Language  (YAML)
YAML is a human-readable data serialization language. It is commonly used for configuration files and in applications where data are being stored or transmitted. YAML targets many of the same communications applications as Extensible Markup Language (XML) but has a minimal syntax that intentionally differs from Standard Generalized Markup Language (SGML)
Yellowdog Updater Modified  (YUM)
The Yellowdog Updater Modified (YUM) is a free and open-source command-line package-management utility for computers running the Linux operating system using the RPM Package Manager.