Software Standards
Comparing two versions of a product to determine which performs better.
A_B_TestingAWS tools for building full-stack web and mobile apps.
AmplifyAWS managed GraphQL service.
AppSyncAWS interactive query service for S3 data.
AthenaAWS infrastructure as code service.
CloudFormationAWS content delivery network service.
CloudFrontAWS service for logging and monitoring account activity.
CloudTrailAWS monitoring and observability service.
CloudWatchAWS fully managed build service.
CodeBuildAWS source control service.
CodeCommitAWS automated deployment service.
CodeDeployAWS continuous delivery service.
CodePipelineAWS user authentication and authorization service.
CognitoAWS natural language processing service.
ComprehendAWS service for assessing resource configurations.
ConfigAWS service for deploying web applications.
Elastic_BeanstalkAWS serverless ETL service.
GlueAWS threat detection service.
GuardDutyAWS security assessment service.
InspectorAWS real-time data streaming service.
KinesisAWS serverless compute service running code in response to events.
LambdaAWS service for building conversational interfaces.
LexAWS simplified virtual private server service.
LightsailAWS data security and privacy service.
MacieAWS configuration management service.
OpsWorksAWS text-to-speech service.
PollyAWS image and video analysis service.
RekognitionAWS scalable DNS and domain registration service.
Route_53AWS machine learning platform.
SageMakerAWS service for protecting secrets.
Secrets_ManagerAWS DDoS protection service.
ShieldAWS operational hub for AWS resources.
Systems_ManagerAWS automatic speech recognition service.
TranscribeAWS neural machine translation service.
TranslateA list of permissions attached to an object.
ACLA symmetric encryption algorithm.
AESAn open standard for message-oriented middleware.
AMQPAn iterative approach to software development emphasizing flexibility and customer collaboration.
AgileError monitoring for web applications.
AirbrakeAWS NoSQL database service.
DynamoDBAWS data warehouse service.
RedshiftAmazon's comprehensive cloud computing platform.
AWSA private organization overseeing standards development.
ANSIA character encoding standard for electronic communication.
ASCIIProduct intelligence platform.
AmplitudeGeneral category for cloud services delivered over internet.
XaaSA distributed NoSQL database for handling large amounts of data.
CassandraA distributed event streaming platform.
KafkaA permissive free software license from Apache Software Foundation.
ApacheA Linux security module for mandatory access control.
AppArmorA set of protocols and tools that allows different software applications to communicate with each other.
APIComputer systems designed to perform tasks requiring human intelligence.
AIA programming paradigm for increasing modularity through separation of cross-cutting concerns.
AOPA technique for creating dynamic web pages by exchanging data with servers asynchronously.
AJAXModern incident management platform.
OpsgenieStatus and incident communication tool.
StatusPageA hackable text editor developed by GitHub.
AtomA set of properties guaranteeing reliable database transaction processing.
ACIDTechnology that overlays digital information onto the real world.
ARCloud service providing backend infrastructure for mobile and web apps.
BaaSFirmware initializing hardware during boot process.
BIOSProperties of distributed database systems focusing on availability over consistency.
BASEAn agile software development process encouraging collaboration between developers and business stakeholders.
BDDA family of permissive free software licenses.
BSDA collection of binary data stored as a single entity in databases.
BLOBA Git-based code hosting and collaboration tool.
BitbucketA Unix shell and command language.
BashError monitoring and reporting platform.
BugsnagTechnologies and strategies for analyzing business data.
BIHigh-speed memory storing frequently accessed data.
CacheCalifornia law enhancing privacy rights for residents.
CCPAThe primary component of a computer that performs instructions.
CPUAn entity issuing digital certificates.
CAA list of revoked digital certificates.
CRLA collection of character data stored in databases.
CLOBConfiguration management tool for infrastructure as code.
ChefA continuous integration and delivery platform.
CircleCIApplication performance management solution.
AppDynamicsA simple file format for storing tabular data in plain text.
CSVA text-based interface used to interact with software and operating systems by typing commands.
CLIA command-line interpreter for Windows.
CMDA list of publicly disclosed security vulnerabilities.
CVEA framework for rating security vulnerabilities.
CVSSA category system for software vulnerabilities.
CWEA team handling security incidents.
CSIRTSoftware tools supporting software development activities.
CASEA collaboration and documentation tool.
ConfluenceA geographically distributed network of servers delivering web content efficiently.
CDNSoftware for creating and managing digital content.
CMSA security standard preventing cross-site scripting attacks.
CSPA software release process that automatically deploys code changes to production.
CDA development practice where code changes are automatically tested and integrated frequently.
CIThe four basic operations of persistent storage in databases and APIs.
CRUDA nonprofit organization enabling sharing of creative works.
CCA time-based job scheduler in Unix-like systems.
CronA mechanism allowing restricted resources on a web page to be requested from another domain.
CORSAn attack that forces users to execute unwanted actions on authenticated applications.
CSRFA security vulnerability allowing injection of malicious scripts into web pages.
XSSSystems for managing company interactions with customers and potential customers.
CRMA symmetric-key algorithm for encryption.
DESA graphical representation of data flow through a system.
DFDCloud strategy for delivering data on demand.
DaaSCloud computing service providing database functionality.
DBaaSMonitoring and security platform for cloud applications.
DatadogA set of practices that combines software development and IT operations to shorten development cycles.
DevOpsA method for securely exchanging cryptographic keys.
DHA U.S. copyright law addressing digital rights management.
DMCAPolicies and procedures for recovering from catastrophic events.
DRAn attack attempting to make a service unavailable by overwhelming it with traffic.
DDoSA platform for developing, shipping, and running applications in containers.
DockerA programming interface for HTML and XML documents.
DOMA set of markup declarations defining document structure for XML.
DTDA hierarchical naming system that translates domain names to IP addresses.
DNSA suite of extensions securing DNS data.
DNSSECAn email authentication protocol.
DMARCAn email authentication method using digital signatures.
DKIMA software development principle aimed at reducing repetition of code patterns.
DRYSoftware intelligence platform for application performance.
DynatraceAn integrated development environment primarily for Java.
EclipseAn extensible, customizable text editor.
EmacsAmazon's scalable computing capacity in AWS cloud.
EC2AWS container orchestration service.
ECSAWS managed Kubernetes service.
EKSAWS big data platform using Hadoop.
EMRStack for searching, analyzing, and visualizing log data.
ELKA distributed search and analytics engine.
ElasticsearchPublic-key cryptography based on elliptic curves.
ECCKey agreement protocol using elliptic curve cryptography.
ECDHIntegrated software systems for managing business processes.
ERPA diagram showing relationships between entities in databases.
ERDAn industry association for standardizing information systems.
ECMAU.S. regulations controlling dual-use exports.
EARA data integration process for moving data from sources to data warehouses.
ETLU.S. law defining security standards for federal systems.
FISMAA U.S. government program for cloud security.
FedRAMPA standard network protocol for transferring files between client and server.
FTPOpen-source data collector for unified logging.
FluentdSoftware with source code available for modification.
FOSSDigital experience analytics platform.
FullStoryCloud computing service allowing execution of code in response to events.
FaaSA programming paradigm treating computation as evaluation of mathematical functions.
FPA widely used free software license.
GPLA free software license allowing linking with proprietary software.
LGPLA free implementation of OpenPGP standard.
GPGA free software operating system.
GNUEU regulation on data protection and privacy.
GDPRA distributed version control system for tracking code changes.
GitA platform for version control and collaboration.
GitHubA web-based DevOps lifecycle tool.
GitLabA pattern matching notation for filenames.
GlobGoogle's suite of cloud computing services.
GCPOpen-source analytics and monitoring platform.
GrafanaA query language for APIs and runtime for executing queries.
GraphQLA visual interface that allows users to interact with software through graphical icons and visual indicators.
GUIA specialized processor for rendering graphics and parallel processing.
GPUA web security policy mechanism enforcing HTTPS.
HSTSA data storage device using magnetic storage to store digital data.
HDDA mechanism for message authentication using hash functions.
HMACService mesh solution providing service discovery.
ConsulFlexible orchestrator for deploying applications.
NomadTool for creating machine images for multiple platforms.
PackerInfrastructure as code tool for building and managing infrastructure.
TerraformTool for building and managing virtual machine environments.
VagrantTool for secrets management and data protection.
VaultU.S. legislation for data privacy in healthcare.
HIPAAPackage manager for Kubernetes.
HelmSystems designed to minimize downtime.
HABehavior analytics and user feedback service.
HotjarThe foundation protocol used for transmitting data over the web.
HTTPAn extension of HTTP with encryption for secure communication over networks.
HTTPSA constraint of REST architecture for dynamic navigation.
HATEOASAlternative acronym for HATEOAS.
HATEOSFramework for managing digital identities and access.
IAMA cloud computing model that provides virtualized computing resources over the internet.
IaaSCommunication between an information processing system and the outside world.
I_OA professional association for electronic engineering.
IEEEA software application that provides comprehensive facilities for software development, including code editor, debugger, and compiler.
IDEAn integrated development environment for Java.
IntelliJAn international standard-setting body.
ISOU.S. regulations controlling defense-related exports.
ITARAn organization developing internet standards.
IETFA protocol for accessing email on remote servers.
IMAPThe principal communications protocol for routing data across networks.
IPAn organization providing internet access services.
ISPNetwork of physical devices connected to the internet collecting and exchanging data.
IoTA system monitoring network traffic for malicious activities.
IDSA system actively blocking detected threats.
IPSOpen platform for connecting and securing microservices.
IstioA proprietary issue tracking and project management tool.
JIRAA compact, URL-safe means of representing claims to be transferred between parties.
JWTOpen-source distributed tracing system.
JaegerA lightweight data interchange format that is easy for humans to read and machines to parse.
JSONAn open-source automation server for continuous integration.
JenkinsA visual workflow management method for tracking work progress.
KanbanA design principle stating that systems work best when kept simple.
KISSA network authentication protocol.
KerberosAWS service for creating and controlling encryption keys.
KMSA measurable value demonstrating effectiveness in achieving objectives.
KPIData visualization dashboard for Elasticsearch.
KibanaShort form of Kubernetes.
K8sOpen-source container orchestration platform.
KubernetesA document preparation system for high-quality typesetting.
LaTeXAn open protocol for accessing directory services.
LDAPUltralight service mesh for Kubernetes.
LinkerdDistributing workloads across multiple computing resources.
LBA network connecting computers in a limited area.
LANFrontend monitoring platform with session replay.
LogRocketServer-side data processing pipeline.
LogstashA subset of artificial intelligence focused on systems that learn from data.
MLA fork of MySQL relational database.
MariaDBA lightweight markup language for creating formatted text.
MarkdownA permissive free software license.
MITAverage time between system failures.
MTBFAverage time required to repair a failed system.
MTTRA unique identifier assigned to network interfaces.
MACA distributed memory caching system.
MemcachedA cryptographic hash function producing 128-bit hash.
MD5A lightweight messaging protocol for IoT devices.
MQTTMicrosoft's cloud computing service.
AzureMicrosoft's relational database management system.
MSSQLA collaboration platform integrated with Office 365.
TeamsA version of a product with minimum features for early customer validation.
MVPProduct analytics platform.
MixpanelCloud computing model for mobile app backends.
MBaaSA software design pattern that separates application logic into three interconnected components.
MVCAn architectural pattern that facilitates separation of development of GUI from business logic.
MVVMA NoSQL document-oriented database.
MongoDBA free and open-source software license.
MPLAn authentication method requiring multiple verification factors.
MFAAn internet standard extending email format to support text in character sets other than ASCII.
MIMEAn open-source relational database management system.
MySQLA U.S. agency developing technology standards.
NISTA field of AI focused on interaction between computers and human language.
NLPHardware component connecting computers to networks.
NICObservability platform for monitoring applications.
New_RelicA package manager for JavaScript and the default for Node.js.
NPMDatabase systems that use non-relational data structures for storage and retrieval.
NoSQLA programming paradigm based on objects containing data and code.
OOPA programming technique for converting data between incompatible type systems in object-oriented languages.
ORMA protocol for obtaining certificate revocation status.
OCSPAn open standard for access delegation commonly used for token-based authentication.
OAuthAn organization promoting open-source software.
OSIA nonprofit foundation improving software security.
OWASPA specification for describing REST APIs.
OpenAPISystem software managing computer hardware and software resources.
OSTechnology for converting images of text into machine-encoded text.
OCRA multi-model enterprise database management system.
OracleIncident response platform for IT operations.
PagerDutySecurity standards for credit card processing.
PCI_DSSA decentralized network architecture where participants share resources.
P2PA package installer for Python.
pipA cloud computing model that provides a platform for developers to build and deploy applications.
PaaSA protocol for retrieving email from mail servers.
POP3An open-source relational database management system.
PostgreSQLA collaboration platform for API development and testing.
PostmanA task automation framework from Microsoft.
PowerShellAn encryption program providing cryptographic privacy.
PGPWeb applications that use modern web capabilities to deliver app-like experiences.
PWAOpen-source monitoring and alerting toolkit.
PrometheusA realization of a method to demonstrate feasibility.
POCA framework for creating and managing digital certificates.
PKIConfiguration management tool for infrastructure automation.
PuppetAn integrated development environment for Python.
PyCharmActivities ensuring quality processes are followed in software development.
QAPerformance measures of a network service.
QoSA YAML-based language for describing RESTful APIs.
RAMLAn open-source message broker software.
RabbitMQVolatile memory used by computers for temporary data storage.
RAMAn agile software development methodology emphasizing quick prototyping.
RADError monitoring and crash reporting platform.
RaygunNon-volatile memory storing permanent data and instructions.
ROMMaximum acceptable data loss measured in time.
RPOMaximum acceptable time to restore systems after disruption.
RTOAutomation tool for configuration management and deployment.
AnsibleData storage virtualization technology combining multiple drives.
RAIDA sequence of characters defining a search pattern.
RegExAWS managed relational database service.
RDSA networking protocol for authentication and accounting.
RADIUSAn in-memory data structure store used as database and cache.
RedisA protocol allowing a program to execute procedures on remote computers.
RPCAn architectural style for designing networked applications using stateless HTTP requests.
RESTA publication documenting internet specifications and policies.
RFCA standard model for data interchange on the web.
RDFA measure of profitability relative to investment cost.
ROIA public-key cryptosystem for secure data transmission.
RSAA method of restricting system access based on user roles.
RBACReal-time error monitoring and debugging tool.
RollbarOpen-source customer data infrastructure.
RudderStackA query language for databases able to retrieve RDF data.
SPARQLA code injection technique exploiting vulnerabilities in database queries.
SQL_InjectionA lightweight embedded relational database.
SQLiteAn agile framework for managing complex projects through iterative sprints.
ScrumInternet marketing involving promotion of websites through paid advertising.
SEMPractice of increasing website visibility in search engine results.
SEOA family of cryptographic hash functions.
SHAA cryptographic network protocol for secure remote login and command execution.
SSHA standard security technology for establishing an encrypted link between servers and clients.
SSLAn XML-based standard for exchanging authentication and authorization data.
SAMLTechnology for threat detection and security analysis.
SIEMA centralized unit monitoring and improving security.
SOCA security architecture for Linux systems.
SELinuxAn email authentication method preventing spoofing.
SPFApplication monitoring platform focusing on error tracking.
SentryA contract defining expected service levels between provider and customer.
SLAAn auditing standard for service providers.
SOC_2AWS email sending service.
SESAn internet standard for email transmission.
SMTPAWS pub/sub messaging service.
SNSA protocol for exchanging structured information in web services using XML.
SOAPAWS message queuing service.
SQSAmazon's object storage service.
S3A web application that loads a single HTML page and dynamically updates content.
SPAFive design principles for object-oriented programming to make software more maintainable.
SOLIDAn authentication scheme allowing users to log in with a single ID to multiple systems.
SSOA business communication platform.
SlackBehavioral data platform.
SnowplowA collection of software development tools that enables developers to create applications for specific platforms.
SDKA process for planning, creating, testing, and deploying software.
SDLCA document describing software functionality and constraints.
SRSA software distribution model where applications are hosted by vendors and made available over the internet.
SaaSA storage device using integrated circuits for persistent data storage.
SSDIncident management and response platform.
VictorOpsPlatform for searching and analyzing machine-generated data.
SplunkA standard for defining markup languages.
SGMLCloud model providing data storage.
STaaSA domain-specific language for managing and querying relational databases.
SQLA sophisticated text editor for code and markup.
SublimeA security feature enabling verification of fetched resources.
SRIA centralized version control system.
SVNA framework for API development and documentation.
SwaggerAn init system for Linux operating systems.
SystemdA security protocol for remote authentication.
TACACSA development approach where tests are written before the actual code.
TDDComplete cost of a system over its lifecycle.
TCOA connection-oriented protocol that ensures reliable data transmission.
TCPThe successor to SSL, providing cryptographic protocols for secure communications.
TLSA continuous integration service for building and testing projects.
TravisA symmetric-key block cipher applying DES three times.
3DESCustomer data platform.
SegmentA security process requiring two different authentication factors.
2FAA character encoding standard for representing text in computers.
UTFA specification for firmware interface replacing BIOS.
UEFIA standardized modeling language for software engineering.
UMLA string of characters that identifies a resource on the internet.
URIA reference to a web resource that specifies its location on a computer network.
URLA directory service for web services discovery.
UDDITesting performed by end users to verify software meets requirements.
UATA connectionless protocol for fast, lightweight data transmission without guaranteed delivery.
UDPOverall experience of a person using a product, especially regarding ease of use.
UXThe means by which users interact with software applications.
UISoftware for tracking and managing changes to code.
VCSA highly configurable text editor.
VimA logical grouping of network devices.
VLANAn emulation of a computer system providing functionality of a physical computer.
VMIsolated cloud network within public cloud.
VPCAn encrypted connection over the internet from a device to a network.
VPNSimulated experience created using computer technology.
VRA source code editor developed by Microsoft.
VS_CodeSecurity service protecting web applications from attacks.
WAFTechnology enabling real-time communication in web browsers.
WebRTCAn XML-based language for describing web services.
WSDLA protocol providing full-duplex communication channels over a single TCP connection.
WebSocketA telecommunications network extending over a large geographical area.
WANAn international community developing web standards.
W3CA query language for selecting nodes from XML documents.
XPathA query and functional programming language for XML data.
XQueryA language for defining the structure of XML documents.
XSDA human-readable data serialization language commonly used for configuration files.
YAMLA principle of extreme programming that states functionality should not be added until necessary.
YAGNIDistributed tracing system for troubleshooting latency.
ZipkinA video conferencing and online meeting platform.
ZoomA markup language that defines rules for encoding documents in a format readable by both humans and machines.
XMLA language for transforming XML documents.
XSLTA high-performance RPC framework developed by Google.
gRPCCustomer data platform for mobile and web.
mParticle