Share Cloud Computing Commonly used jargon and industrial connecting words from A to Z. This CloudShape Glossary is your handy and use-to Guide to Learning Cloud-Jargons Easily on this Page.
CloudShape Cloud computing IT glossary has (easy-to-understand) definitions.
In computer security, the role of an access control list (ACL) is to list out the permissions granted associated with a system resource (object or facility).ACL indicates which user or system processes are granted access to resources.
It is a part of Amazon that offers cloud computing services. Its main goal is to let people, businesses, and governments use computing power and tools whenever they need them.
Application Modernization is a practice of updating older software for newer computing approaches such as including newer languages, frameworks, and infrastructure platforms. This practice is also known as legacy modernization or you can call it legacy application modernization.
Application Refactoring is a way of rewriting one or more components of an application typically to take advantage of public cloud services. This can also involve refactoring and replacing older Oracle databases with modern AWS Aurora are often part of the Refactoring application for the cloud.
AI is a technology that enables computers and machines to simulate human intelligence and problem-solving capabilities.
Autoscaling or automatic scaling is a method used in cloud computing that dynamically adjusts the amount of computational resources in a server farm. Depending on the load on server farm or pool, the number of servers that are active typically vary automatically as user need fluctuate.
It is known as separating building buildings from a neighborhood(region) where cloud services are based. Companies that provide cloud computing usually have many of these buildings around the world.
The application is a computer program designed for people so it could help them perform an activity, depending on the purpose it was designed for such as manipulating text,graphics, and a combination of these elements.
Azure is a public cloud computing platform with solutions including such as Infrastructure as a service, platform as a service, and software as a service that can be used for a service such as analytics, virtual computing, storage, and much more.
The basic function of abstraction in computing is to hide the complicated inner workings of something(like software or hardware) and show you a simpler and easier-to-understand version.
Agile Software Development is like building step by step where both the plan and final result can change as a team works together.Its about breaking tasks into smaller parts and collaborating closely in a flexible way.
API Gateway is an entry way for API calls that represents clients request to target application and services.The function it performs is to proceed requests based on policies including authorization,authentication and access controls
This is the process of shifting software applications from one computing environment to others.In Case you migrate from one datacenter to another from an on premises server to a cloud providers environment or from public cloud to a private cloud environment.
An API endpoint is a place where all requests such as API calls are gathered and fulfilled.Like if Sam and Brian are talking to each-other on phone, Brian words travel to Sam and vice-versa. API Integration is like a conversation.
Adaptive enterprises are highly flexible and are capable of adjusting in almost real-time by changing practices and routines in response to environmental changes.
This is also known as MBaaS, Mobile backend as a service is a tool that implies development of mobile apps. It offers already built features that free the development team from the burden of making the backend infrastructure of a project.
Big data is a way of storing,analyzing and processing large amounts of data.This is also known as three “VS”
Block chain can be known as a distributed ledger with growing lists of record(block) that are securely block with cryptographics hashes.Each of the block contain cryptographics hash of the previous block such as a timestamp and a transaction data verily represented as a MarkIe tree.
Business Intelligence is a driven-process technology used for analyzing data and delivering actionable information that helps the administrative,managers and worker for business decisions.
A backend database is a database that is accessed by users indirectly through an external application rather than application programming stored with-in database itself or by low level of manipulation of the data.The backend database was invented by Micrisoft in 1989.
The term Bare Metal Machine meaning in computer science is it refers to a computer executing instruction directly on logic hardware without an intervening operation system.It allows direct access to servers hardware without any virtualization.
Blue Green Deployment is an application release model that gradually transfers traffic from a previous version of a microservice or app to a newly released version, both of which are running in production.
These tools are types of application software that retrieve data from one or more business systems and combine it in a repository, such as a data warehouse, to be reviewed and analyzed.
BYOD stands for bring your own device and is one of the most commonly used BYOD which means employees use their own personal device to connect with the organization network and access what they need to do their job.
Cloud application is a software used for running its processing logic and data storage between 2 different systems: client side and server-side. Cloud based and local components work together.
Cloud Automation involves cloud management tools to achieve tasks without manual interference. Some of the tasks that cloud Automation can perform are backing up data, Auto-provision servers and eliminating unused processes without real-time human interaction.
Cloud computing is the process of computing services which includes servers, storage, database, networking, software, analytics, and intelligence over the internet.
This is the process of migrating application and data from one location, often company private, on site servers to a public cloud provider’s servers but between different clouds.
This is a software approach to building, deploying, and managing modern applications in cloud computing environments. Cloud-native apps are designed and built to exploit scale, elasticity, resiliency, and flexibility the cloud provides.
Cloud provision involves creating, preparing, and activating the underlying infrastructure of a cloud environment. This includes installing networking components and services.
CSP is an IT company that provides on demand-scalable computing resources like data storage, computing power or application over the internet. These cloud services models are known as LaaS(Infrastructure as a service ) or known as SaaS(Software as a service).
Cloud storage is a cloud computing model that enables storing data and files on the internet through a cloud computing provider that you access either through the public internet or a dedicated private network connection.
In cloud computing clusters are known as groups of computers or applications that work together toward a common goal.
The term compute in cloud computing can be described as describing concepts and objects related to software computation. This generic term is used to reference processing power networking, memory, storage and many other resources required for the computational success of any program.
These are packages of software that contain all the necessary elements to run in any environment. Container helps to virtualize operating systems and run anywhere from private data center to public cloud or even developer personal laptop.
Content Delivery Network are proxy servers and their data centers which are geographically distributed for high availability and performance by distributing the services spatially relative to end users.
CI/CD is to accelerate and streamline the software development lifecycle. Continuous Integration refers to the practice of automatic and frequently integrating code changes into a shared source code repository.
Cloud backup can be referred as online backup or remote backup and is the process of backing-up data to cloud-based servers. When you have backup the data you simply have stored a copy of that data on one or more servers.
Cloud foundry is an open source cloud platform as a service on which developers can build, deploy, scale, and run applications. Cloud foundry is available as a stand-alone software package.
Cloud management platforms offer the administrative visibility and capability of cloud cost management software, cloud infrastructure monitoring software, cloud infrastructure automation software, and more.
Cloud Marketplace is also known as Cloud Service Marketplace or cloud marketplace platform. This serves as an online hub that empowers buyers and sellers, to collide together to deploy, evaluate, and array a wide range of solutions through various providers.
Cloud washing occurs when software providers attach the label of the” cloud “ to a program in effort to rebrand or boost sales. These programs differ from cloud-native software which actually are built for clouds. Cloud wash tools can be used to take advantage of companies who want to integrate cloud solutions to their infrastructure.
Cloud sourcing is basically an arrangement in which a company pays a third party cloud hosting provider to deliver and support IT services that could be easily provided in the house. This cloud-sourcing is similar to Outsourcing but the cost for cloud computing is verily dependent on a per use utility model instead of monthly or annual contract.
This software is hosted on CRM providers servers and accessed by its customers though via the internet. This kind of software is also known as Software as a service(SaaS).
This is a practice of making staged releases. First we roll out a software update to a small part, so they may be tested to provide feedback. As the change is done and accepted, then it is provided to the rest of the users.
Chaos engineering helps the development team to meet the resilience requirement. Chaos engineering can be used to achieve resilience against infrastructure failure, network failure, application failure and so on.
This is a distributed application structure that partitions tasks or workloads between the provider of a resource or service called servers and service request known as clients.
Cloud Native Security can be known as a security practice or a technology designed especially for applications built and deployed in a cloud environment.
Chaos engineering helps the development team to meet the resilience requirement. Chaos engineering can be used to achieve resilience against infrastructure failure, network failure, application failure and so on.
This is a distributed application structure that partitions tasks or workloads between the provider of a resource or service called servers and service request known as clients.
Cloud Native Security can be known as a security practice or a technology designed especially for applications built and deployed in a cloud environment.
A cloud database is an organized and managed collection of data in an IT system that resides on a public, private or hybrid cloud computing platform.
A DB instance is an isolated database environment in the AWS Cloud. The basic building block of Amazon RDS is the DB instance. Your DB instance can contain one or more user-created databases.
A data architecture describes how data is managed–from collection through to transformation, distribution, and consumption. It sets the blueprint for data and the way it flows through data storage systems.
Elastic computing is the ability of cloud service providers to swiftly scale the usage of resources that includes storage,memory, infrastructure, etc up and down to meet workload requirements dynamically.
This is the process of combining data from multiple sources into a large central, repository called a data warehouse. ETL uses a set of business rules to clean and organize raw data and prepare it for data analytics, storage, and machine learning(ML).
Enterprise applications are sophisticated, comprehensive software solutions defined for large organizations.
Federated databases are a possible solution to your customers’ database search issues. This IT Channel Explained will explain what a federated database is and how it works and give you the info you need to determine whether it’s a good fit for your customers.
Function-as-a-Service, often known as FaaS, is a cloud-based computing solution that enables programmers to create, compute, operate, and control software applications as procedures without keeping up with their infrastructure.
It enables users to share information over a network without having to physically transfer files. The file server takes on the computer or server role to store and make available data BLOBs to clients, serving as a central location to store and share files for a network.
Google Cloud is a suite of cloud computing service models offered by Google. Cloud computing is the on-demand availability of computing resources as services over the internet. It eliminates the need for enterprises to procure, configure, or manage resources themselves, and they only pay for what they use.
Grid computing is a computing infrastructure that combines computer resources spread over different geographical locations to achieve a common goal. All unused resources on multiple computers are pooled together and made available for a single task.
Green cloud refers to the potential environmental benefits that green IT services delivered over the internet can offer to individual companies and society as a whole.
Hadoop software is an open source framework that allows for the distributed storage and processing of large datasets across clusters of computers using simple programming models.
High availability (HA) is a system’s capability to provide services to end users without going down for a specified period of time.
A hosted application is a software as a service (SaaS) solution that allows users to execute and operate a software application entirely from the cloud on a recurring subscription. Hosted applications are hosted and powered from the remote cloud infrastructure and are accessed globally through the Internet.
Hybrid cloud management software is based on software-defined networking (SDN) and routing between virtual machines across multiple data center locations.
Infrastructure-as-a-Service is a type of cloud computing service that offers essential storage, and networking resources on demand on a pay as you go basis. This LaaS is one of the four types of cloud services, along with software as a service(SaaS) platform as a service(PaaS) and serverless.
An integrated development environment (IDE) is a software application that helps programmers develop software code efficiently. It increases developer productivity by combining capabilities such as software editing, building, testing, and packaging in an easy-to-use application.
Idempotence is a property of an operation that ensures that, if the operation is repeated once or more than once, you get the same result. Apply it once or more and the outcome the same, idempotence is the name.
JavaScript Object Notation, more commonly known by the acronym JSON, is an open data interchange format that is both human and machine-readable. Despite the name JavaScript Object Notation, JSON is independent of any programming language and is a common API output in a wide variety of applications.
Java is a multiplatform, object-oriented programming language that runs on billions of devices worldwide. It powers applications, smartphone operating systems, enterprise software, and many well-known programs.
Java Spring Framework (Spring Framework) is a popular, open source, enterprise-level framework for creating stand-alone, production-grade applications that run on the Java virtual machine (JVM).
Kubernetes is a portable, extensible, open source platform for managing containerized workloads and services, that facilitates both declarative configuration and automation. It has a large, rapidly growing ecosystem.
AWS Key Management Service (KMS) gives you centralized control over the cryptographic keys used to protect your data. The service is integrated with other AWS services making it easier to encrypt data you store in these services and control access to the keys that decrypt it.
Cloud computing is the process of computing services which includes servers, storage, database, networking, software, analytics, and intelligence over the internet.
Load balancing is the method of distributing network traffic equally across a pool of resources that support an application.
Linux is a popular cloud-based operating system for several reasons. One of the primary reasons is that Linux is open source, which means that anyone can freely use, modify, and distribute its source code.
Loosely coupled architecture is an architectural style where the individual components of an application are built independently from one another (the opposite paradigm of tightly coupled architectures).
Cloud application is a software used for running its processing logic and data storage between 2 different systems: client side and server-side. Cloud based and local components work together.
AWS Managed Service Provider (MSP) Partners provide customers full lifecycle solutions in cloud infrastructure and application migration.
Microservices, or microservices architecture, is a cloud-native architectural approach in which a single application is composed of many loosely coupled and independently deployable smaller components or services.
Nodes are the magical building blocks behind cloud technology, making everything run like a charm!
NoSQL databases are interchangeably referred to as “non relational,” “NoSQL DBs,” or “ non-SQL” to highlight the fact that they can handle huge volumes of rapidly changing, unstructured data in different ways than a relational (SQL) database with rows and tables.
Cloud NAT ( network address translation ) lets certain resources without external IP addresses create outbound connections to the internet. Cloud NAT provides outgoing connectivity for the following resources: Cloud NAT is a distributed, software-defined managed service.
OpenStack is an open source cloud computing infrastructure software project and is one of the three most active open source projects in the world.
Cloud Orchestration is the process of automating the tasks needed to manage connections and operations of workloads on private and public clouds. Cloud orchestration technologies integrate automated tasks and processes into a workflow to perform specific business functions.
On-demand self-service cloud resources are resources that are provisioned without human interaction. With an on-demand self-service, you can immediately access and use cloud services as needed after signing up.
Platform as a service (PaaS) is a complete development and deployment environment in the cloud, with resources that enable you to deliver everything from simple cloud-based apps to sophisticated, cloud-enabled enterprise applications.
A private cloud is a cloud computing environment dedicated to a single organization. Any cloud infrastructure has underlying compute resources like CPU and storage that you provision on demand through a self-service portal.
A public cloud is a cloud computing model where IT infrastructure like servers, networking, and storage resources are offered as virtual resources accessible over the internet.
Quantum computing uses quantum physics to access new computational abilities that classical computers cannot.
A qubit, or quantum bit, is the basic unit of information used to encode data in quantum computing and can be best understood as the quantum equivalent of the traditional bit used by classical computers to encode information in binary.
REST (REpresentational State Transfer) is an architectural style for developing web services and systems that can easily communicate with each other.
Reliability in cloud computing can mean different things to different people. For some, the reliability of cloud computing is measured by the frequency of component failures or cloud service downtimes; while, for others, cloud computing reliability is measured by cost-efficiency, performance, and security.
Role-Based Access Control (RBAC) is a concept in cybersecurity that plays a pivotal role in managing and controlling access to digital resources within organizations.
This refers to the ability of cloud infrastructure to scale up or down resources to meet changing workload demands. This allows businesses to easily remove or add computing resources as needed without significant hardware investment or infrastructure changes.
Serverless computing is an application development and execution model that enables developers to build and run application code without provisioning or managing servers or backend infrastructure.
They offer the necessary security tooling and capabilities that give a user control over the security of their own data. As such, they follow a shared security responsibility model, where both the cloud vendor and customer are expected to adopt certain security controls depending on the type of service.
Tightly coupled architecture is an architectural style where a number of application components are interdependent (the opposite paradigm of loosely coupled architectures).
Transport Layer Security, or TLS, is a widely adopted security protocol designed to facilitate privacy and data security for communications over the Internet. A primary use case of TLS is encrypting the communication between web applications and servers, such as web browsers loading a website.
Terraform Cloud is a SaaS that we support—that instead, when you run Terraform you still could run it on your local machine, but now it saves and retrieves the state file from Terraform Cloud—which is running over here.
This includes applications such as web servers, Chrome, text editors, and command utilities. Userspace applications are also known as userland applications.
Utility Computing Utility computing is a subset of cloud computing, allowing users to scale up and down based on their needs. Clients, users, or businesses acquire amenities such as data storage space and input devices.
User authentication verifies the identity of a user attempting to gain access to a network or computing resource by authorizing a human-to-machine transfer of credentials during interactions on a network to confirm a user’s authenticity.
Virtual machines (VMs) are computers that run inside of other computers using a process known as virtualization.
A virtual private cloud (VPC) is a secure, isolated private cloud hosted within a public cloud. VPC customers can run code, store data, host websites, and do anything else they could do in an ordinary private cloud.
A vertical cloud, also known as an industry cloud platform, is a set of cloud computing services optimized for use in a particular industry or for a specific business model.
A web application firewall or WAF is a security tool that protects web applications against common web-based threats by monitoring, filtering, and blocking data packets.
Workloads can range from simple tasks, like running a single app or computation, to complex operations, like processing large-scale data analytics or running a suite of interconnected apps.
A wide-area network (WAN) is the technology that connects your offices, data centers, cloud applications, and cloud storage together.
Zero trust is a security model used to secure an organization based on the idea that no person or device should be trusted by default, even if they are already inside the organization network.