Compendium of bits from applications to cybersecurity
Words in cyberspace, writings on the IDE, and plans in Agile board
Throughout time we have encapsulated the moment in pictograms, symbols, words, and in modern terms, blogging. Working to explain with contextual evaluation of terms, as we capture outcomes in a sense of structure, to be repeated in daily use, and eventually proliferated through media.
As these words gain affinity, they will find their way into headlines, biopics, shows, movies, and transcend time as the cyberspace evolves. Creating a compendium summarizes nuance and regard to juxtapose the future era references and changing patterns of use that may derive from them.
All advice is temporal1, as architecture becomes infrastructure and sprints become code, words fixed to tasks can only heighten the awareness of the outcome. The words may change and meanings may evolve, though this snapshot of history will endure as a reminder of what was now.
Acceptance Criteria
Definition:
"In agile methodology, an acceptance criterion is the smallest unit of functional or design requirement that agile product managers (or business analysts) add to their stories to clearly communicate the different states and behavior of the features that the team is planning to build." — The Product Manager
Context:
When auditing the completion of a task there is an acceptable criterion that this work element is required to meet to be considered 'done'.
Agentic AI
Definition:
"In agile methodology, an acceptance criterion is the smallest unit of functional or design requirement that agile product managers (or business analysts) add to their stories to clearly communicate the different states and behavior of the features that the team is planning to build." — Harvard Business Review
Context:
Working with an agentic AI system to plan my next vacation saved hours planning, researching, and choosing the best reservations for my budget.
Antecedent
Definition:
"An antecedent is a person, place, thing, or clause represented by a pronoun or pronominal adjective. It is also known as a referent." — Grammarly
Programmatic Definition:
"You create a continuation that executes when its antecedent has completed by calling the method." — Microsoft
Context:
As the function evaluates linearly, the result of the previous functions can be referenced through their antecedents.
Bastion Host
Definition:
"Bastion hosts are secure gateways for controlling access to internal networks, offering hardened security, strong authentication, and network segmentation to protect against cyberattacks." — Teleport
Context:
Accessing a virtually private network requires a bastion host that has a cryptographically signed authority like Secure Shell (SSH) to access ports, files, and services exposed to the bastion host.
Capital Expenditure (CapEx)
Definition:
"Capital expenditures (CapEx) are funds used by a company to acquire, upgrade, and maintain physical assets such as property, plants, buildings, technology, or equipment." — Investopedia
Context:
When migrating from on-premises to cloud, enterprises can reduce their CapEx and exchange them for lower OpEx budgets.
Classless Inter-Domain Routing (CIDR)
Definition:
"Classless Inter-Domain Routing (CIDR) is an IP address allocation method that improves data routing efficiency on the internet." — Amazon Web Services
Context:
Controlling the ingress and egress of a virtual network can be optimized by allocating distinct services to an Internet Protocol (IP) with floating or dedicated subnets through CIDR annotation.
Cold Start
Definition:
"Broadly speaking, cold start is a term used to describe the phenomenon that applications which haven’t been used take longer to start up." — Microsoft Azure
Context:
Choosing between dedicated servers and on-demand instances, especially in serverless cloud resources, requires building for the exception of a cold start, alternatively paying for continuously running instances.
Container Isolation
Definition:
"Container isolation is one of the primary benefits of containerized applications. Using containers enables us to isolate our software from its environment, increasing consistency and reliability across our development and staging environments." — Snyk
Context:
A primary requirement for meeting security standards in a container hosting environment, is limiting the systems relational and unintended accessibility to the server and other containers.
Content Projection
Definition:
"Content projection is a pattern in which you insert, or project, the content you want to use inside another component." — Angular
Context:
Dynamically rendering content into a content method, uses content projection to inherit the parameters provided in the class constructor.
Database Links (Linked Servers)
Definition:
"Linked servers enable the Database Engine to read data from the remote data sources and execute commands against the remote database servers outside of the instance." — Microsoft
Context:
When accessing multiple SQL servers and on-premises databases, database links allow for a direct link between the various data sources.
De-Risking
Definition:
"De-risking refers to the phenomenon of financial institutions terminating or restricting business relationships with clients or categories of clients to avoid, rather than manage, risk." — United States Department of State
Context:
Through the process of de-risking, companies, projects, and plans can reduce risk by removing opportunities for risk in the processes and commitments of the operation.
Decoder-Only Models
Definition:
"Decoder models use only the decoder of a Transformer model. At each stage, for a given word the attention layers can only access the words positioned before it in the sentence." — Hugging Face
Context:
Working in a feed-forward pattern, decoders rotate forward or backward through the given segment with the attention set by the decoder-only model to evaluate a provided input and return a relative output.
Dependency Injection
Definition:
"Dependency injection is a programming technique that makes a class independent of its dependencies." — DZone
Context:
In dependency injection, a higher-level class can make use of functionality within a lower-level class without having to declare lower-level dependencies for the functions, only instantiating the main method of the lower-level class, passing in parameters, and making use of the output.
Deserialization
Definition:
"Deserialization on the other hand, is the opposite of serialization, that is, transforming serialized data coming from a file, stream or network socket into an object." — Acunetix
Context:
Interactions between the RESTful service and the statically typed software application require deserialization of the object markup used to respond for downstream use of the application logic.
Discrete Computing
Definition:
"Computers are fundamentally digital machines. Everything is binary, either a 0 or a 1. This finite and discrete nature of computers links them deeply to discrete mathematics. Discrete mathematics is the study of mathematical structures that are somehow “discrete”. Discrete contrasts with “continuous”, as you know well from the real numbers and calculus." — University of Wisconsin Oshkosh
Context:
The data provided in a configuration is a discrete set of information that statically enables the computer to efficiently process and presume a series of settings.
Distroless
Definition:
"Distroless container images are a type of container image that is designed to be minimal. Unlike traditional images which include package managers, utilities, and shells, typically containing only essential software required to run an application or service." — Chainguard
Context:
Composing a container image with the minimum requirements for starting and running the application enforces a distroless pattern where there is little to no outside overhead and opportunities for vulnerabilities.
Endpoint Detection and Response (EDR)
Definition:
"Endpoint detection and response, or EDR, is software that uses real-time analytics and AI-driven automation to protect an organization's end users, endpoint devices and IT assets against cyberthreats that get past antivirus software and other traditional endpoint security tools." — IBM
Context:
Protecting the access to internet gateways through EDR software for endpoints can mitigate traffic to services that may have a malicious intention.
Enterprise Service Bus
Definition:
"The enterprise service bus (ESB) is a software architectural pattern that supports real-time data exchange between disparate applications." — Amazon Web Services
Context:
Through the ESB saga orchestration can occur across message queue channels to provide actionable data across microservices in their respective environments.
Executive Presence
Definition:
"Executive presence is the combination of personality and character traits that make a dynamic executive. It’s the ability to inspire others to be assertive in their roles through the consistent demonstration of confidence and clear leadership." — MIT
Context:
As a leader in the organization it is paramount to communicate clearly and operate consistently to establish an executive presence.
Future State
Definition:
"Having identified the business requirements (needs) at an appropriately higher level
of granularity, captured the current state, and defined the problems facing the
company, it is time to consider scenarios where the problem is addressed. As such,
the main purpose of defining the future state is to determine what needs to be in
place or necessary conditions to address the business needs." — Springer
Context:
When ideating on the continuous improvement of the existing system and creating backlog items, focusing these enhancements on the future state can create a transactional pattern for a comprised next feature release.
High Availability
Definition:
"High availability refers to a system or component that is operational without interruption for long periods of time." — Atlassian
Context:
Reliable services are often established will fail-safe, self-healing, and fallback features for providing consistent and durable instances for users, programmers, and businesses alike.
Idempotency
Definition:
"Idempotence means that if you execute an operation multiple times, the result will not change after the initial execution." — Fivetran
Context:
After the caching server has been propagated the application response continues to persist with continuous results through idempotency.
Identity Providers (IdPs)
Definition:
"An Identity Provider (IdP) is a system that authenticates users’ identities and authorizes their access to various applications and services by managing and verifying digital credentials." — Okta
Context:
Establishing a user pool for enterprise single sign-on accounts is best performed through an identity provider that can securely store and offer management tools for passwords and sign in.
Immutability
Definition:
"Once created, they always represent the same value." — Massachusetts Institute of Technology
Context:
While coding Object-oriented Programming (OOP) classes it is imperative that the values intended to be overwritten are handled in classes that convert and override the initial value to create an exception to the immutability of the initial object.
Instance Template
Definition:
"Deploying a virtual machine from a template creates a virtual machine that is a copy of the template. The new virtual machine has the virtual hardware, installed software, and other properties that are configured for the template." — VMWare
Context:
When rolling out employee systems, for reliability and security, it is ideal to use a preconfigured image or instance template.
Interoperability
Definition:
"Interoperability is the ability of applications and systems to securely and automatically exchange data irrespective of geographical, political, or organizational boundaries." — Amazon Web Services
Context:
As microservice architectures scale it becomes increasingly paramount that applications across the organization can communicate across a decoded configuration that enables interpretation in the exchange of data.
Lexical Scope
Definition:
"Scope is access; that’s the easiest way to think about it. Scope allows you, as a developer, to limit access to certain variables to specific areas." — Built In
Context:
Coding classes, functions, and methods, requires referencing variables that are within reach of those encapsulated structures, this is the realm know as lexical scope.
Lightweight Directory Access Protocol (LDAP)
Definition:
"LDAP, the Lightweight Directory Access Protocol, is a mature, flexible, and well supported standards-based mechanism for interacting with directory servers." — Okta
Context:
When establishing an enterprise directory for email information, leveraging an LDAP technology can secure the credentials and unify the storage of information in a vendor agnostic system.
Literals
Definition:
"These are fixed values—not variables—that you literally provide in your script." — Mozilla Developer Network
Context:
When enabling a software application to become stateless it is important to modify literals so that their values can be set and consumed through environment variables.
Materialized Views
"A materialized view is a duplicate data table created by combining data from multiple existing tables for faster data retrieval. Materialized views are a fast and efficient method of accessing relevant data." — AWS
Context:
The market basket of a website can be formulated into a materialized view, to simplify the query results and increase page speed load, similar to caching.
Multiprotocol Label Switching (MPLS)
"Multiprotocol Label Switching, or MPLS, is a networking technology that routes traffic using the shortest path based on “labels,” rather than network addresses, to handle forwarding over private wide area networks." — Palo Alto Networks
Context:
The market basket of products for a website can be formulated into a materialized view, to simplify the query results and increase page speed load, similar to caching.
Network Segmentation
"Network segmentation is when different parts of a computer network, or network zones, are separated by devices like firewalls, switches and routers." — CompTIA
Context:
Establishing distributed services in a cloud mitigates the vulnerability of one environment to lead to access of another, and access to a singular environment to the whole system through network segmentation.
Online Transaction Processing (OLTP)
Definition:
"A type of data processing that consists of executing a number of transactions occurring concurrently—online banking, shopping, order entry, or sending text messages, for example." — Oracle
Context:
Through connected APIs, large quantities of data are readily available with OLTP that concurrently resolves requests to simplify data aggregation.
Operand
Definition:
"An operand is the part of an instruction representing the data manipulated by the operator." — Mozilla Developer Network
Context:
Algorithmically evaluating the state of a user through different software application processes requires logical conditions formulated around the dynamic operands.
Outcome-based Pricing
Definition:
"Outcome-based pricing is when prices of a product are based on perceived value, and not costs. Businesses must understand where customers are seeing the value in their products, then adjust the pricing to align with that value." — Paddle
Context:
As a shift to meet customers where they see value, outcome-based pricing allows for a layered pricing tier with options available for reducing and increase costs through levers like availability.
Parallelization
Definition:
"Parallel computing is a computing architecture that divides a problem into smaller tasks and runs them concurrently." — Run:AI
Context:
Developing asynchronous operations that simultaneously call RESTful services to shorten the compounded processing time will allow for a parallel computing pattern that processes information more efficiently.
Peering
Definition:
"A VPC peering connection is a networking connection between two VPCs that enables you to route traffic between them using private IPv4 addresses or IPv6 addresses." — Amazon Web Services
Context:
Through VPC peering, each subnet can process software application requests in a balanced and rotational order for maximum efficiency.
Persona Drift
Definition:
"An implicit assumption in the use of prompts is that they will be stable, so the chatbot will continue to generate text according to the stipulated persona for the duration of a conversation. We propose a quantitative benchmark to test this assumption, evaluating persona stability via self-chats between two personalized chatbots." — Arxiv
Context:
Maintaining a large language model is not as simple as measure twice cut once, auditing the system continuously allows for the evaluation of learned changes that could lead to drift in the persona of the Large Language Model (LLM) responses.
Physical Architecture
Definition:
"A physical architecture model is an arrangement of physical elements, (system elements and physical interfaces) that provides the solution for a product, service, or enterprise." — SEBoK
Context:
Depicting the contextual representation of interactions between hardware and people, the physical architecture represents the operable fixed componentry that comprises the system in a meta-physical interaction.
Pre-Warming
Definition:
"Existing serverless platforms encounter two significant challenges: the cold-start problem of containers and the absence of an effective resource allocation strategy for serverless workflows. Existing pre-warm strategies are associated with high computational overhead, while current resource scheduling techniques inadequately account for the intricate structure of serverless workflows. To address these challenges, we present SSC, a pre-warming and automatic resource allocation framework designed explicitly for serverless workflows. We introduce an innovative gradient-based algorithm for pre-warming containers, significantly reducing cold start hit rates." — ResearchGate
Context:
Enabling pre-warming of a computing environment through dedicated resources and by algorithmic efficiency will reduce the impact of cold starting the environment that hosts a software application.
Processor Based Pricing (PVU)
Definition:
"A Processor Value Unit (PVU) is a unit of measure by which the Program can be licensed. The number of PVU entitlements required is based on the processor technology (defined within the PVU Tables below by Processor Vendor, Brand, Type and Model Number) and by the number of processors made available to the Program." — International Business Machines
Context:
Associating a cost with licensed software and the computational resources allocated to support the software application allows for a tiered pricing structure that encompasses the value of the total cost through processor based pricing.
Radical Candor
Definition:
"Radical candor is about soliciting critical feedback in particular because you’re reluctant to get it, but also it’s about giving praise and giving more praise than criticism." — Harvard Business Review
Context:
A functioning team can use radical candor to communicate more effectively with critical feedback on pertinent issues across the hierarchy and agile value stream to enhance the work product.
Repetition Penalty
Definition:
"A combination of exact and non-exact repetition suppression using token and sequence level unlikelihood loss, repetition penalty during training, inference, and post-processing respectively." — Arxiv
Context:
Mitigating the ability of a generative model to recreate the same generative response during training and in production can be suggestively controlled through repetition penalties.
Security Assertion Markup Language (SAML)
Definition:
"SAML is the underlying technology that allows people to sign in once using one set of credentials and access multiple applications." — Microsoft
Context:
Accessing information and applications through a unified authentication and authorization protocol reduces the complexity of access for users and management of security configurations for admins.
Security Posture
Definition:
"The security status of an enterprise’s networks, information, and systems based on information security resources (e.g., people, hardware, software, policies) and capabilities in place to manage the defense of the enterprise and to react as the situation changes." — NIST
Context:
Focusing information technology standards around business objectives, customer objectives, and best practices, while informing the organization of expectations creates a security posture within the enterprise.
Serialization
Definition:
"Serialization is the process of converting the state of an object into a form that can be persisted or transported." — Microsoft Learn
Context:
Responses from the RESTful service and the statically typed software application require serialization of the object markup used to transport the downstream object for further use.
Service Level Agreement (SLA)
Definition:
"A service-level agreement (SLA) defines the level of service expected by a customer from a supplier, laying out metrics by which that service is measured, and the remedies or penalties, if any, should service levels not be achieved." — CIO
Context:
As a show of good faith, a cloud company establishes a service level agreement and offers consideration when the quality of service is not successfully provided.
Software-Defined Networking (SDN)
Definition:
"Software-defined networking (SDN) is a software-controlled approach to networking architecture driven by application programming interfaces (APIs). SDN leverages a centralized platform to communicate with IT infrastructure and direct network traffic." — IBM
Context:
In addition to the firewall, encryption, and security standards the application is behind software-defined networking that allocates distinct access through software logic and environment properties.
Space Complexity
Definition:
"Space complexity is a function describing the amount of memory (space) an algorithm takes in terms of the amount of input to the algorithm." — The University of Texas at Austin
Context:
As a consideration for the space in a compute consideration, it is valuable to understand the quantity, throughput, and consistency of the data, through space time complexity.
Stop Sequences
Definition:
"A string of one or more characters. If you specify stop sequences, the model will automatically stop generating output after one of the stop sequences that you specify appears in the generated output." — International Business Machines
Context:
A set of parameters established to containerize the output of a Generative Artificial Intelligence (AI) model by explicitly ending the outcome at a specific point, once the stop sequence is reached.
Stop-The-World Event
Definition:
"A full garbage collection causes a stop-the-world pause to the application, to ensure that no new objects are allocated on the heap memory and that no existing objects become unreachable while the full garbage collection is performed." — RedHat Developer
Context:
A pause in the acceptance of new and old runtime specific data within a functioning software application to block the leak of data during memory reallocation. These events scale in frequency during data persistence of larger durations and highly used applications for garbage collection.
String Interpolation
Definition:
"In computer programming, string interpolation is the process of replacing placeholders with values in a string literal. A string is a sequence of characters. A string literal is a sequence of characters from the source character set enclosed in quotation marks." — Webopedia
Context:
When establishing variables and dynamic information, it is common the reference string interpolation methods to read and invoke information through a programmatic process.
Time Complexity
Definition:
"Time complexity is a function describing the amount of time an algorithm takes in terms of the amount of input to the algorithm." — The University of Texas at Austin
Context:
When evaluating the effectiveness of the function it can be a good practice to review the steps, linear code evaluation, and dependencies within the function to calculate the time complexity in the sense of how long it will take to finish the function.
Timeseries Data
Definition:
"Temporal data is a sequence of data points collected over time intervals, allowing us to track changes over time." — Timescale
Context:
Connected device sensors revealed that the path to a specific destination may change due to unpredicted factors like traffic, weather, and human preference through time-series data.
Top-K
Definition:
"The top-k operator returns a sparse vector, where the non-zero values correspond to the k largest values of the input." — Arxiv
Context:
In a generative sequence the Large Language Model (LLM) uses the Top-K operator to define the contextual inference value of sorted neurons within a neural network. Directly associated with the effort or computation and depth required to search the neural tree for relational samples, inferenced through tokens.
Top-P (Nucleus Sampling)
Definition:
"Nucleus sampling, controls the cumulative probability of the generated tokens. The model generates tokens until the cumulative probability exceeds the chosen threshold." — Medium
Context:
Using the Top-P operator, a generative sequence within the Large Language Model (LLM) searches for matching values of sampled neurons within a neural network based on probability of correlation. Symmetrically associated with the effort or computation and depth required to search the neural tree for relational samples, inferenced through tokens.
Transcoding
Definition:
"Transcoding is taking encoded (or “compressed”) video or other digital content, decompressing it, and altering and re-compressing it." — Kaltura
Context:
Processing a video file through software applications for streaming, filtering, and enhancement often requires expanding the raw image file into byte form and augmenting the individual sequence, then reassembling the data to augment the output.
User Based Pricing (UVU)
"User Value Unit (UVU) is a unit of measure by which the Program can be licensed. UVU Proof of Entitlement (PoE) are based on the number and type of Users for the given Program." — International Business Machines
Context:
Associating a cost with licensed software and the accessed resources allocated to support the software application for a given user in a tiered pricing structure that encompasses the value of an individual's cost through user based pricing.
Wisdom of Crowds
"The idea that large groups of people are collectively smarter than individual experts when it comes to problem-solving, decision-making, innovating, and predicting." — Investopedia
Context:
When collaborating during an implementation of work, it can be invaluable to ideate through the wisdom of crowds in considering different vantage points from people as individuals with unique experiences.
All advice is temporal: subject to change, open for review, often only slightly.