This glossary is intended to provide a single refernce to be reused across multiple projects - and design artifacts. Defining localized/specialized terms may then be limited to being addressed in specific design artifacts. The intent is to avoid duplication of a large corpus of glossary entries, in many places.
Term | Definition |
---|---|
__ | |
2FA | Two-Factor Authentication |
3LOD | Three Lines of Defence Model (Codified by the Basel Committee on Banking Supervision in its 2011 Principles for the sound management of operational risk) |
3PL | Third-Party Logistics providers |
4+1 | 4+1 Architecture View Model |
7 Rs | Refactor, Replatform, Repurchase, Rehost, Relocate, Retain, Retire - Re: AWS Migration Readiness |
A__ | |
A11y | Accessibility [see: Mozzila, W3C] |
A2C | Advantage Actor-Critic (e.g., Deep Reinforcement Learning agent) |
AA | Alternatives Analysis |
AAD | Average absolution deviation |
AAD | Azure Active Directory |
ABAC | Attribute-Based Access Contorl (see CBAC, PBAC) |
ABC | Activity Based Costing |
ABC | Area of Business Concern |
ABNF | Augmented Backus-Naur Form (see RFC-5234) |
AC | Axiom of Choice |
ACE | Access Control Entry |
ACG | Automatic Code Generators |
ACH | Automated Clearing House |
ACI | Artificial Capable Intelligence |
ACID | Atomicity, Consistency, Isolation, and Durability |
ACK | Acknowledgement |
ACL | Access Control List |
ACL | Anti-Corruption Layer |
ACM | Access Control Mechanism |
ACME | Automatic Certificate Management Environment, also see RFC 8555 |
ACPI | Advanced Configuration and Power Interface |
ACPT | Access Control Policy Tool |
ACR | Access Control Rule |
ACS | Azure Communication Service |
ACT | Automated Combinatorial Testing |
ACTS | Automated Combinatorial Testing for Software |
ACV | Annual Contract Value |
ACVP | Automated Cryptographic Validation Protocol |
ACVTS | Automated Cryptographic Validation Test System |
AD | Active Directory |
AD | Application Delivery |
AD | Architecture Decision |
ADA | Advanced Data Analysis |
ADA | The Americans with Disabilities Act of 1990 or ADA (42 U.S.C. § 12101) |
ADAL | Active Directory Authentication Library |
ADCS | Active Directory Certificate Services |
ADDIE | (analyze, design, development, implement, evaluate) a methodology developed by Florida State University for the U.S. Army as a repeatable and standard set of tasks to create training. Wikipedia Article |
ADDS | Active Directory Domain Service(s) |
ADOMS | Adapting, Defining, Operating, Managing and Supporting |
ADR | Address Resolution Protocol |
ADSL | Asymmetric digital subscriber line |
ADT | Algebraic Data Type |
AE | Authenticated Encryption |
AEA | Adaptive Enterprise Architecture |
AEAD | Authentication Encryption with Associated Data |
AES | Advanced Encryption Standard |
AFCE | Authorization for Capital Expenditure |
AI | Artificial Intelligence |
AKA | Also Known As |
AKA | Authentication and Key Agreement |
AKI | Amazon Kernel Image |
AKM | Authentication and Key Management |
AKP | Advanced Key Processor |
AKS | Azure Kubernetes Service |
ALM | Application Lifecycle Management |
ALM | Audio Language Models |
AMASS | Autonomous Multi-Domain Adaptive Swarms-of-Swarms |
AMI | Advanced Machine Intelligence |
AMI | Amazon Machine Image |
AML | Anti-Money Laundering |
AMMERSE | Agile, Minimal, Maintainable, Environmental, Reachable, Solvable, Extensible |
AMMS | Autonomous Mobility Management System: |
AMS | Application Managed Service |
AMQP | Advanced Message Queuing Protocol |
ANC | Adaptive Network Control |
ANM | Additive Noise Model |
ANN | Approximate Nearest Neighbor |
ANN | Artificial Neural Network |
ANOVA | Analysis of Variance |
ANSI | American National Standards Institute |
AOL | Attorney Opinion Letters |
AOP | Aspect Oriented Programming |
AOT | Ahead of Time (i.e. compiled ahead of time) |
AP | Access Point |
AP | Average Precision |
aPaaS | Application Platform as a Service |
APAC | Asia/Pacfic |
API | Application Programming Interface |
APM | Application Portfolio Management |
APM | Application Performance Management |
APM | Application Performance Monitoring |
APNIC | Asia Pacific Network Information Centre |
APNS | Apple Push Notification service |
APO | Automatic Prompt Optimization |
APT | Advanced Persistent Threat |
AP@N | Average Precision |
ARB | Architecture Review Board (aka ARC) |
ARC | Architecture Review Committee, or Council (aka ARB) |
ARHR | Average Reciprocal Hit Ratio |
ARI | Amazon Ramdisk Image |
ARIMA | Auto-Regressive Integrated Moving Average |
ARM | Architectural Reference Model |
ARM | Azure Resource Manager |
ARN | Amazon Resource Name |
ARP | Address Resolution Protocol |
ARPA | Average Revenue Per Account |
ARPU | Average Revenue Per User |
ARR | Annual Recurring Revenue |
ART | Agile Release Train (re: Scaled Agile Framework, SAFe) |
AS | Authoritative Source |
ASCII | American Standard Code for Information Interchange |
ASI | Artificial Super Intelligence |
ASN | Advanced Shipment Notification |
ASN | Application Service Name |
ASN | Autonomous System Number |
ASP | Application Service Provider |
ASPM | Application Security Posture Management |
ASR | Automatic Speech Recognition |
AST | Application Security Testing |
ATDD | Acceptance-Test-Driven-Development |
ATE | Averate Treatment Effect |
ATF | Automated Test Framework |
ATM | Asynchronous Transfer Mode |
AUC | Area Under the Curve |
AUC-ROC | Area Under Curve – Receiver Operating Characteristics Curve |
AUP | Acceptable Use Policy |
AUROC | Area Under the Receiver Operating Characteristics Curve |
AVD | Azure Virtual Desktop |
AWM | Agent Workflow Memory |
AZ | Availability Zone |
B__ | |
B2B | Business-to-Business |
B2C | Business-to-Consumer |
BA | Business Analyst |
BAA | Business Associate Agreement |
BACM | Business Architecture Core Metamodel (re: OMG.org) |
BAFO | Best And Final Offer (e.g., RFP negotiations) |
BAIR | Berkeley Artificial Intelligence Research |
BASE | Basically Available, Soft state, Eventual consistency |
BAU | Business As Usual |
BC | Business Continuity |
BCD | Binary Coded Decimal |
BCDR | Business Continuity and Disaster Recovery |
BCM | Business Continuity Management |
BCP | Best Current Practice |
BCP | Business Continuity Planning (or Plan) |
BDAM | IBM Basic Direct Access Method |
BDB | Biometric Data Block |
BDD | Behavior-Driven Development |
BDFL | Benevolent Dictator For Life |
BDR | Business Development Resources |
BDR | Business Development Representative |
BDS ` | Boot Device Selection |
BDUF | Big Design Up Front |
BEC | Business Email Compromise |
BEC | Business Executive Committee |
BFT | Byzantine Fault Tolerant |
BFO | Basic Formal Ontology |
BGP | Border Gateway Protocol |
BHAG | Big Hairy Audacious Goal |
BI | Business Intelligence |
BIA | Business Impact Analysis |
BIAN | Banking Industry Architecture Network |
BIND | Berkeley Internet Name Domain |
BIMI | Brand Indicators for Message Identification |
BIOS | Basic Input-Output System |
BLOB | Binary Large Object |
BLSR | Baseline Security Requirement |
BMA | Business Mission Area |
BNA | Business Needs Analysis |
BNF | Backus-Naur Form |
BNS | Business Needs Statement |
BOD | Binding Operational Directive |
BOE | Basis of Estimate |
BOF | Buffer Overflow |
BoK | Body of Knowledge |
BOM | Basic Order of Magntitude |
BOM | Bill of Matrials |
BOOTP | Bootstrap Protocol |
BOSS | Business Operation Support Services |
BPF | Berkeley Packet Filter - see eBPF |
BPM | Business Process Management |
BPM | Business Process Model |
BPML | Business Process Markup Language |
BPS | Bits Per Second |
BPSS | Business Process Specification Schema |
BR | Business Rules |
BRD | Business Requirements Document |
BRM | Business Reference Model |
BRS | Business Requirements Specification |
BSA | Bank Secrecy Act |
BSD | Berkeley Software Distribution |
BSI | British Sandards Institution |
BTC | Bitcoin |
BtoS | Business-to-Society |
BU | Business Unit |
BYO | Bring Your Own |
BYOD | Bring Your Own Device |
C__ | |
C-V2X | Celluar-vehicle-to-everything |
C2 | Command and Control |
C4 | C4 Model viewpoints: Context, Container, Component, Code |
C5 | Command, Control, Computers, Communications and Cyber |
C&A | Certification & Accreditation |
CA | Certificate Authority |
CAAS | Container as a Service |
CAB | Change-Advisory Board |
CaC | Compliance as Code |
CAC | Customer Acquisition Cost |
CAF | Cloud Adoption Framework (Azure) |
CAGR | Compound Annual Growth Rate |
CALM | Communications Access for Land Mobiles |
CAP | Consistency, Availability, Partition Tolerance |
CapEx | Capital Expenditure |
CAS | [Compare-And-Swap |
CASE | Connected, Autonomous / Automated, Shared, and Electric |
CAT | Customer Advisory Team |
CATEs | Conditional Average Treatment Effects |
CBA | Cost Benefit Analysis |
CBAC | Claim-Based Attirbute Control (see ABAC,PBAC) |
CBFR | Commenting For Better Reach |
CBR | Change Blast Radius |
CBS | Critical Business System |
CCaaS | Contact Center as a Service |
CCANM | Cascade Nonlinear Additive Noise Models |
CCB | Change Control Board, or Change Configuration Board |
CCC | FINOS: Common Cloud Controls Project |
CCD | Conceptual Design Document |
CCPOLDAT | Customer, Channel, Process, Organisation, Location, Data, Application and Technology (see POLDAT) |
CCoE | Cloud Center of Excellence |
CCO | Chief Commercial Officer |
CCO | Client Change Order |
CCO | Cloud Control Objectives |
CCPA | California Consumer Privacy Act |
CCPM | Critical Chain Project Management |
CD | Candidate Recommendation |
CD | Continuous Delivery |
CDC | Change Data Capture |
CDD | Customer Due Dilligence (also see KYC) |
CDE | Cardholder Data Environment |
CDE | Cloud Development Environment |
CDE | Collaborative Development Environment |
CDE | Common Desktop Environment |
CDE | Critical Data Element |
CDF | Cumulative Distribution Function |
CDI | Contexts and Dependency Injection |
CDK | Cloud Development Kit |
CDM | Common Data Model |
CDN | Content Distribution Network |
CDO | Chief Data Officer |
CDO | Care Delivery Organizatoin |
CDP | Customer Data Platform |
CE | Community Edition |
CEAF | California Enterprise Architecture Framework |
CEB | Corporate Executive Board |
CEH | Certified Ethical Hacker |
CEP | Complex Event Processing |
CER | Control Exception Request |
CERN | European Organization for Nuclear Research, French: Organisation européenne pour la recherche nucléaire |
CESGA | Galician Supercomputing Center |
CIFAR | Canadian Institute for Advanced Research |
CFBR | Commenting For Better Reach |
CFR | Change Failure Rate |
CFS | Completely Fair Scheduler |
CFT | Cross-Functional Team |
CGI | Common Gateway Interface |
CHAP | Challenge-Handshake Authentication Protocol |
ChatGPT | Chat Generative Pre-trained Transformer |
CHF | Cryptographic Hash Function |
CI | Configuration Item (i.e. in a CMDB, such as ServiceNow) |
CI | Continuous Improvement |
CI | Continuous Integration |
CI/CD | Continuous Integration / Continuous Delivery (or, Continous Deployment) |
CIA | Confidentiality, Integrity, Availability |
CIAM | Customer Identity and Access Management |
CICS | IBM ustomer Information Control System |
CID | Command Identifier |
CIF | Customer Information File |
CIFS | Common Internet File System |
CIO | Chief Information Officer |
CIP | Critical Infrastructure Protection |
CIP | Customer Identification Program |
CIPP | Certified Information Privacy Professional |
CISA | Certified Information Systems Auditor |
CISA | Cybersecurity and Infrastructure Security Agency |
CISC | Complex Instruction Set Computer |
CISM | Certified Information Security Manager |
CISO | Chief Information Security Officer |
CISSP | Certified Information Systems Security Professionals |
CL | Change List |
CLI | Command Line Interface |
CLT | Central Limit Theorem |
CMDB | Configuration Management Database |
CMOS | omplementary Metal Oxide Silicon |
CMF | Content Monitoring and Filtering (see DLP) |
CMGR | Compounded Monthly Growth Rate |
CMK | Customer Managed Keys |
CMM | Capability Maturity Model |
CMMC | Cybersecurity Maturity Model Certification |
CMOS | Complementary metal–oxide–semiconductor |
cn | Common Name, re: LDAP |
CNAB | Cloud Native Application Bundles |
CNAPP | Cloud-Native Application Protection Platform |
CNCF | Cloud Native Computing Foundation |
CNN | Convolutional Neural Network |
CoE | Center of Excellence |
COI | Community of Interest |
CoLA | Cognitive Architectures for Language Agents |
COOP | Continuity of Operations |
CoP | Community of Practice |
CORBA | Common Object Request Broker Architecture |
CORS | Cross-Origin Resource Sharing |
COSS | Commercial Open Source Software |
COTS | Commercial Off-The-Shelf |
CPC | Cost Per Click |
CPG | Consumer Packaged Goods (e.g. industry) |
CPL | Cost Per Lead |
CPM | Capability Portfolio Management |
CPU | entral Processing Unit |
CQRS | Command Query Responsibility Segregation |
CR | Conversion Rate |
CRC | Class Responsibility Collaboration (i.e., usually captured in a form known as "cards", see original OOPSLA 1989 paper) |
CRCQs | Cryptanalytically-Relevant Quantum Computers |
CRD | Custom Resource Definitions (e.g., Kubernetes) |
CRDT | Conflict-Free Replicated Data Type |
CRF | Conditional Random Fields |
CRL | Certificate Revocation List |
CRM | Customer Relationship Management |
CRO | Chief Risk Officer |
CRUD | Create, Read, Update, Delete |
CSA | Cloud Security Alliance |
CSA | Cloud Service Appliance |
CSAT | Customer Satisfaction |
CSD | Consolidated Service Desk |
CSF | Critical Success Factors |
CSDM | Common Service Data Model (re: ServiceNow) |
CSET | Center for Security and Emerging Technology (CSET) |
CSF | Common Security Framework |
CSF | Critical Success Factors |
CSI | Container Storage Interface (e.g. Kubernetes) |
CSM | Customer Service Management |
CSM | Customer Success Manager |
CSNS | Cloud Service Network Security |
CSO | Cloud Service Offering |
CSP | Cloud Service Provider |
CSP | Content Security Policy |
CSPM | CLOUD SECURITY POSTURE MANAGEMENT |
CSR | Customer Service Representative |
CSR | Certificate Signing Request |
CSRB | Cyber Safety Review Board |
CSRF | Cross-Site Request Forgery |
CSS | Cascading Style Sheets |
CTB | Change The Business |
CTE | Commono Table Expressions (re: SQL) |
CTI | Cyber Threat Intelligence |
CTO | Chief Technology Officer |
CTR | Click-Through-Rate |
CUI | Controlled Unclassified Information (CUI), as defined by Executive Order 13556 (2010) |
CUSO | Combined U.S. Operations |
CV | Cross-Validation |
CVD | Coordinated Vulnerability Disclosure |
CVE | Critical Vulnerabilities and Exposures |
CVS | Concurrent Version System |
CWE | Critical Weakness Enumeration (also see: Wikipedia |
CX | Customer Experience |
CXN | Customer Experience Network |
D__ | |
DA | Data Architecture |
DAC | Discretionary Access Control |
DAG | Directed Acyclic Graph |
DAO | Data Access Object |
DAO | Decentralised Autonomous Organization |
DAP | Directory Access Protocol (X.500) |
DAR | Decision Analysis and Resolution technique |
DARPA | Defense Advanced Research Projects Agency |
DARQ | Distributed Ledger Technology (DLT), Artificial Intelligence (AI), Extended Reality (XR), Quantum Computing ~ re: Accenture |
DART | Detection and Response Team |
DAS | Direct Attached Storage |
DaaS | Data as a Service |
DARPA | Defense Advanced Research Projects Agency |
DASD | Direct-Access Storage Device |
DAST | Dynamic Application Security Testing |
DAU | Daily Active Users |
DB | Database |
DBA | Database Administrator |
DBMS | Database Management System |
DBR | Drum-Buffer-Rope (re: see TOC, also see #1) |
dc | Domain Component, re: LDAP |
DC | Data Center |
DCAM | Data Management Capability Assessment Model |
DCCP | Datagram Congestion Control Protocol |
DCE | Distributed Computing Environment |
DCF | Discounted Cash Flow |
DCG | Discounted Cumulative Gain |
DCL | Data Classification & Labeling |
DD | Data Dictionary |
DDA | Data Design Authority |
DDoS | Distributed Denial-of-Service (i.e. a network traffic attack) |
DEC | Digital Equipment Corporation |
DEIB | Diversity, Equity, Inclusion, and Belonging |
DER | Distinguished Encoding Rules |
DES | Data Encryption Standard |
DFIR | Digital Forensics, Incident Response |
DGB | Data Governance Board (aka DGC) |
DGC | Data Governance Council, or Committee (aka DGB) |
DGP | Data Governance Policy |
DGS | Domain Graph Services |
DHCP | Dynamic Host Configuration Protocol |
DHT | Distributed Hash Table |
DIM | Domain Information Model |
DJIA | Dow Jones Industrial Average |
DKG | Distributed Key Generation |
DLD | Detail-Level Design |
DLM | Database Lifecycle Management |
DLP | Data Loss Prevention |
DLT | Distributed Ledger Technology |
DKIM | Domain Keys Identified Mail |
DMAIC | Define, Measure, Analayze, Improve, Control (re: Six Sigma) |
DMARC | Domain-based Message Authentication Reporting and Conformance |
DML | Double Machine Learning |
DMN | Demand |
DMO | Data Management Office |
DMP | Data Management Platform |
DMZ | Demilitarized Zone - aka perimeter network or screened subnet |
DN | Distinguished Name, re: LDAP |
DNAT | Destination network address translation |
DNS | Domain Name System |
DoDAF | Department of Defense Architecture Framework |
DORA | DevOps Research and Assessment (re: metrics: deployment frequency, lead time for changes) |
DORA | Digital Operational Resilience Act, re: Regulation (EU) 2022/2554 of the European Parliament and of the Council of 14 December 2022 on digital operational resilience for the financial sector |
DoS | Denial of Service |
DOS | Disk Operating System |
DP | Dynamic Programming |
DPC | Discrete Process Control |
DPO | Direct Preference Optimization (re: LLMs, tuning algorithm) |
DPoP | Demonstrating Proof-of-Possession |
DR | Disaster Recovery |
DRB | Design Review Board |
DRBG | Deterministic Random Bit Generator - also see PRNG |
DRI | Directly Responsible Individual |
DRL | Deep Reinforcement Learning |
DRY | Don't Repeat Yourself |
DSA | Data Structures and Algorithms |
DSA | Digital Signature Algorithm |
DSL | Digital subscriber line |
DSL | Domain Specific Language |
DSLAM | Digital subscriber line access multiplexer |
DSML | Data Science and Machine Learning |
DSN | Data Source Name |
DSPM | Data Security Posture Management |
DSRC | Dedicated short-range communications |
DSRP | Distinctions, Systems, Relationships, and Perspectives |
DSS | Data Security Standard |
DTAP | Development, Test, Acceptance, Production (i.e, typical deployment environment types) |
DTC | direct-to-consumer |
DTO | Data Transfer Object |
DTSTTCPW | Do The Simplest Thing That Could Possibly Work |
DVI | Device Independent file format |
DVR | Distributed Virtual Router |
DW | Data Warehouse (also see DWH, EDW) |
DWH | Data Warehouse (also see DW, EDW) |
DX | Developer Experience |
DXP | Digital Experience Platform |
E__ | |
EA | Enterprise Architecture |
EAI | Enterprise Application Integration |
EAMS | Enterprise Architecture Management Suite |
EAP | Extensible Authentication Protocol |
EAR | Export Administration Regulations |
EAR | Enterprise Application aRchive (file format) |
EARS | Easy Approach to Requirements Syntax (re: Alistair Mavin, Rolls Royce) |
EBA | Experience-Based Acceleration |
EBS | Amazon Elastic Block Storage |
EBV | Equiangular-Basis-Vectors |
EBCIDIC | Extended Binary Coded Decimal Interchange Code |
EBIT | Earnings Before Interest & Tax |
EBITDA | Earnings Before Interest, Taxes, Depreciation and Amortization |
eBPF | extended Berkeley Packet Filter - see BPF |
EBS | Elastic Block Storage (AWS) |
EC | European Commission |
EC2 | Amazon Elastic Compute Cloud |
ECA | Embodied Conversational Agent(s) |
ECAB | Emergency Change-Advisory Board |
ECC | Elliptic-Curve Cryptography |
ECDH | Elliptic-Curve Diffie-Hellman |
ECDSA | Elliptic Curve Digital Signature Algorithm |
eCF or e-CF | European e-Competence Framework |
EDA | Enterprise Data Architecture |
EDA | Event-Driven Architecture |
EDA | Exploratory Data Analysis |
EDI | Electronic Data Interchange |
EDIFECT | Electronic Data Interchange for Administration, Commerce and Transport |
EDMC | Enterprise Data Management Council |
EDR | Endpoint Detection and Response (i.e., cybersecurity security software) |
EDW | Enterprise Data Warehouse (also see DW, DWH) |
EEA | European Economic Area |
EFF | Electronic Frontier Foundation |
EFTA | European Free Trade Association |
EHR | Electronic Health Record(s) |
EIP | Enterprise Integration Patterns, re: Hophe's EIP Messaging Patterns |
EJB | Enterprise Java Bean |
EKG | Enterprise Knowledge Graphs |
EKS | Amazon Amazon Elastic Kubernetes Service |
EL | Enterprise Linux |
ELF | Executable and Linkable Format |
ELT | Extract, Load, Transform |
EM | Expectation Management algorithm (re: Machine Learning) |
EME | Encrypted Media Extensions, re: W3C HTML5 recommendations |
EMEA | Europe, the Middle East, and Africa |
EMS | Execution Management System |
ENA | Elastic Network Adapter |
ENI | Elastic Network Interface (re: AWS) |
ENs | European Standards |
EOL | End of Life |
EOL | End of Line |
EOS | Exactly Once Semantics |
EPC | Electronic Product Code |
EPD | Engineering, Product management, and Design |
ePHI | Electronically Protected Health Information |
EPLC | Enterprise Performance Life Cycle |
EPM | Enterprise Performance Management |
EPR | Electronic Patient Record |
EPS | Extrusion Prevention System (see DLP) |
ERD | Entity Relationship Diagram |
ERM | Enterprise Risk Management |
ERP | Enterprise Resource Planning |
ES | ECMAScript (aka JavaScript) |
ESA | Enterprise Solution Architecture |
ESG | Environmental, Social, and Governance |
ESO | European Standards Organization |
ESCO | Enterprise Security Operations Center |
ESOP | Employment Stock Ownership Plan |
ESP | Event Stream Processing |
ESPP | Employee Stock Purchase Plan |
ETL | Extract, Transform, Load |
ETSI | European Telecommunications Standards Institute |
EU | European Union |
EUC | End-User Computing |
EUDA | End-User Developed Application |
EVM | Earned Value Management |
F__ | |
FaaS | Function as a Service |
FAIL | First Attempt In Learning (i.e. agile) |
FAIR | Facebook/Meta AI Research |
FAR | Federal Acquisition Regulation |
FASB | Financial Accounting Standards Board |
FAT | File Allocation Table |
FATF | Financial Action Task Force |
FBA | Fixed-Block Architecture |
FBDI | File-Based Data Import |
FC | Fulfillment Center, i.e., a third-party logics (3PL) warehouse |
FCI | Fast Causal Inference algorithm |
FCF | Free Cash Flow |
FCFO | Free Cash Flow From Operations |
FCM | Firebase Cloud Messaging |
FCoE | Fibre Channel over Ethernet |
FCP | First Contentful Paint |
FDDI | Fiber Distributed Data Interface |
FDL | (GNU) Free Documentation License |
FedRAMP | Federal Risk Authorization Management Program |
FFT | Full Fine-Tuning |
FFW | Feedforward |
FHE | Fully Homomorphic Encryption (e.g., IBM) |
FIBO | Financial Industry Business Ontology |
FIDO | Fast IDentity Online (FIDO) |
FinCEN | Financial Crimes Enforcement Network |
FHIR | Fast Healthcare Interoperability Resources (a draft standard describing data formats and elements and an application programming interface for exchanging electronic health records) |
FIDO | Fast Identity Online |
FINRA | Financial Industry Regulatory Authority |
FIPS | Federal Information Processing Standard, re: FIPS PUB 140-2 |
FIRST | Fast Independent Repeatable Self-Validating Timely (source) |
FISMA | Federal Information Security Management Act |
FLOPS | Floating Point Operations Per Second |
FMEA | Failure Mode and Effects Analysis |
fMRI | functional Magnetic Resonance Imaging |
FoS | Families of Systems |
FOSS | Free and Open Source Software |
FOSSA | Free Open Source Software Analysis |
FP | Functional Programming |
FPGA | Field-Programmable Gate Arrays |
FPR | False Positive Rate |
FNR | False Negative Rate |
FQL | Flows Query Language |
FQDN | Fully Qualified Domain Name |
FQHE | Fractional Quantum Hall Effect |
FRC | First Robot Competition |
FRS | Fello of the Royal Society |
FSC | Financial Size Categories |
FSDG | (GNU) Free System Distribution Guidelines |
FTP | File Transfer Protocol |
FUSE | Filesystem in Userspace |
FWaaS | FireWall-as-a-Service |
G__ | |
GA | Google Analytics |
GAAP | Generally Accepted Accounting Principles |
GADTs | Generalized Algebraic Data Types |
GAM | Global Asset Management |
GAT | Generic Associated Types (e.g. introduced in Rust 1.65 |
GB | Gigabyte |
GCC | Government Community |
GCHQ | British intelligence agency Government Communications Headquarters |
GCP | Google Cloud Platfrom |
GDG | Generation Date Group |
GDPR | Genera Data Protection Regulation (re: EU) |
GFCI | Greedy Fast Causal Interference (GFCI) Algorithm |
GHAS | GitHub Advanced Security |
GIL | Global Interpreter Lock |
GIN | Generalized Inverted Index |
GIST | Generalized Search Tree |
GJXDM | Global Justice XML Data Model |
GL | General Ledger |
GLBA | Gramm Leach Bliley Act |
GLLMM | Generative Large Language Multi-Modal Model |
GML | Graph Machine Learning |
gMSA | Group Managed Service Accounts (e.g. for Swarm) |
GMV | Gross Merchandise Value |
GNS | GNU Name System |
GNU | GNU's Not Unix! (a recursive acronym) |
GOLAP | Graph OLAP |
GOST | Goals, Objectives, Strategies, Tactics |
GPAI | General-Purpose AI |
GPG | GNU Privacy Guard |
GPT | Generative Pretrained Transformer |
GPT | GUID Partition Table |
GPU | Graphics Processing Uni |
GQA | Grouped-Query Attention |
GQL | Graph Query Language ISO/IEC 39075:2024 |
GQM | Goal, Question, Metric |
GRC | Governance, Risk, and Compliance |
GRE | Generic Routing Encapsulation |
GRO | Generic Receive Offload |
GRU | Gated Recurrent Unit |
GSA | General Services Administration |
GSM | Global System for Mobile Communications |
GTM | Go-To-Market (re: strategy) |
GUC | Global User Configuration |
GUI | Graphical User Interface |
GUID | Globally Unique Identifier - see UUID |
GWP | Gross Written Premium (insurance industry) |
H__ | |
HAI | Stanford Institute for Human-Centered Artificial Intelligence |
HATEOAS | Hypermedia As The Engine Of Application State |
HBM | High-Bandwidth Memory |
HCI | Human-Computer Interaction |
HCL | HashiCorp Configuration Language |
HDD | Hard Disk Drive |
HDFS | Hadoop Distributed File System |
HDLC | High-Level Data Link Control |
HEF | Human Error Factor |
HICP | High Impact Control Plane |
HIPPA | Health Insurance Portability and Accountability Act of 1996 |
HiPPO | Highly Paid Person's Opinion |
Hipster | Health IoT Privacy and Security Transferred to Engineering Requirements |
HITRUST | Health Information Trust Alliance |
HLD | High-Level Design |
HLP | Human Level Performance (re: Machine Learning) |
HMAC | Hash-based Message Authentication Code |
HMM | Hidden Markov Models |
HNSW | Hierarchical Navigable Small World |
HOLAP | Hybrid OLAP |
HOT | Heap Oriented Tuples |
HPC | Horizontal Pod Autoscaling (Kubernetes) |
HRAA | Highly Restricted Access Area |
HSM | Hardware Security Module |
HSPI | Highly Sensitive Protected Information |
HTML | Hyper Text Markup Language |
HTTP | Hypertext Transfer Protocol |
HTTPS | Hypertext Transfer Protocol Secure |
HUD | Head-Up Display |
HVA | High Value Asset |
HVCI | HyperVisor-enforced Code Integrity (i.e., introduced in Windows 11) |
HW | Hardware |
I__ | |
IA | Information Assurance |
IA | Internal Audit |
IaaS | Infrastructure as a Service |
IaC | Infrastructure as Code |
IAM | Identity and Access Management |
IANA | Internet Assigned Numbers Authority |
IAS | International Accounting Standard |
IAST | Integrated Application Security Testing |
IC | Individual Contributor |
IC | United States IntelligenceCommunity |
ICANN | Internet Corporation for Assigned Names and Numbers |
ICAP | Internet Content Adaptation Protocol |
ICML | International Conference on Machine Learning |
ICMP | Internet Control Message Protocol |
ICP | Ideal Customer Profile |
ICS | Incident Command System |
ICS | Industrial Control Systems |
ICT | Information and Communication Technology |
iDaaS | Identity as a Service |
IdAM | See IAM |
IDCG | Ideal Discounted Cumulative Gain |
IDD | Infrastructure Design Document |
IDDFS | Iterative Deepening Depth First Search |
IDE | Integrated Development Environment |
IDEA | Imagine, Decide, Execute, Assess |
IDL | Interface Description Language |
IdM | Identity Management, also see IAM |
IdP | Identity Provider |
IDP | Individual Development Plan |
IDP | Internal Developer Platform (or Portal) |
IDS | Intrusion Detection System |
IE | Information Extraction, re: NER, DL, ML, NLP |
IEC | International Electrotechnical Commission |
IEEE | Institute of Electrical and Electronics Engineers |
IETF | Internet Engineering Task Force |
IG | Information Gain (decision tree) |
IGA | Identity Governance and Administration, see IAM |
ILDP | Information Leak Detection and Prevention (see DLP) |
ILM | Information Lifecycle Management |
IM | Incident Management |
IM | Information Model |
IMO | Integration Management Office (i.e., during Mergers & Acquisitions) |
INCOSE | International Council on Systems Engineering |
IND | Inverse Neighbor Discovery |
INVEST | Independent Negotiable Valuable Estimable Small Testable (source) |
IoA | Indicator of Attack |
IoC | Indicator of Compromise |
IOF | Industrial Ontologies Foundry |
IOPS | Input/Output Operations Per Second |
IoT | Internet of Things |
IP | Intellectual Property |
IP | Internet Protocol |
iPaaS | Infrastructure Platform as a Service |
iPaaS | Integration Platform as a Service |
IPAM | IP Address Management |
IPC | Information Proteciton and Control (see DLP) |
IPC | Inter-Process Communication |
IPMI | Intelligent Platform Management Interface |
IPS | Intrusion Prevention System |
IPSec | Internet Protocol Security |
IPv4 | Internet Protocol version 4 |
IPv6 | Internet Protocol version 6 |
IPW | Inverse Probability Weighting |
IPX | Internetwork Packet Exchange |
IR | Incident Response |
IR | Information Retrieval |
IR35 | Off-payroll working rules for clients, workers (contractors) and their intermediaries (UK) |
IRM | Incident Response Management |
IRM | Individual Rights Management |
IRM | Information Risk Management |
IRM | Integrated Risk Management |
IRP | I/O Request Packet [re: Windows Kernel Programming] |
IRR | Internal Rate of Return |
IRSA | IAM Roles for Service Accounts re: AWS EKS |
IRT | Incident Response Team |
ISA | Information Security Architecture |
ISA | Instruction Set Architecture |
ISAM | Indexed Sequential Access Method |
ISAP | Information Security Automation Program |
iSCI | Internet Small Computer System Interface |
ISDN | Integrated Services Digital Network |
ISG | Industry Specification Group |
ISM | Industrial, Scientific and Medical |
ISM | Information Security Management |
ISMS | Information Security Management System |
ISO | International Standards Organization |
ISOC | Internet Society |
ISP | Internet Service Provider |
ISPF | Interactive System Productivity Facility, re: IBM mainframe software product |
ISPs | Internet service providers |
ISRS | Information Storage and Retrieval System |
ISSAP | Information Systems Security Architecture Professional |
IT | Information Technology |
IT4IT | The IT4IT Reference Architecture, a standard of the Open Group, is a powerful tool for aligning and managing a Digital Enterprise |
ITAM | IT Asset Management |
ITAR | International Traffic in Arms Regulations |
ITIL | Information Technology Infrastructure Library |
ITIRB | Information Technology Investment Review Board |
ITS | Intelligent Transportation System |
ITSM | Information Technlogy Service Management |
ITU | International Telecommunication Union |
IX | Internet Exchange |
IXPs | Internet exchange points |
J__ | |
k8s | Kubernetes |
JAR | Java ARchive (file format) |
JCP | Java Community Process |
JDBC | Java Database Connectivity |
JDK | Java Development Kit |
JFR | Java Flight Recorder |
JIT | Just in Time |
JMS | Jakarta Messaging (formerly Java Messaging Service), re: JSR 343 |
JSON | JavaScript Object Notation |
JRT | Java Routines and Types |
JSON | JavaScript Object Notation |
JSONL | JSON Lines |
JSR | Java Specification Request |
JSR | JavaScript Remoting |
JTF | Joint Task Force |
JVM | Java Virtual Machine |
JVMS | Java Virtual Machine Specification |
JWKS | JSON Web Key Set |
JWT | JSON Web Token |
K__ | |
KAN | Kolmogorov–Arnold Network 1 |
KCL | Kinesis Client Library |
KCSA | Kubernetes and Cloud Security Associate (KCSA) certification, re: CNCF |
KDC | Key Distribution Center |
kex | key exchange |
KMDF | Kernel-Mode Driver Framework |
KMS | Key Management {System |
KNN | K-nearest neibhbors (algorithm) |
KPI | Key Performance Indicators |
KQL | Kusto Query Language |
KT | Knowledge Transfer |
KVM | Kernel-based Virtual Machine (KVM) is an open source virtualization technology built into Linux |
KVM | keyboard, video and mouse |
KVS | Key-Value Storage |
Kwok | Kubernetes Without Kubelet |
KYC | Know Your Client |
L__ | |
LaMDA | Language Model for Dialogue Applications [re: Google] |
LAN | Local Area Network |
LASSO | Least Absolute Shrinkage and Selection Operator (aka L1 regularization) |
LBA | Logical Block Addressing |
LBaaS | Load-Balancer-as-a-Service |
LCAP | Low-Code Application Platforms |
LCC | Lower Camel Case |
LCM | Life Cycle Management |
LCNC | Low-Code No-Code |
LDA | Latent Dirichlet Allocation |
LDA | Linear Discriminat Analysis |
LDAP | Lightweight Directory Access Protocol |
LDIF | LDAP Data Interchange Format, RFC 2849 The LDAP Data Interchange Format (LDIF) - Technical Specification |
LEM | Law of Excluded Middle |
LeSS | Large Scale Scrum |
LGPL | (GNU) Lesser General Public License |
LID | Language Identification |
LLaMA | Large Language Model Meta AI |
LLC | Logical Link Control |
LLM | Large Language Model |
LLRT | Low Latency Runtime (e.g., AWS) |
LOI | Letter of Intent |
LoRA | Low-Rank Adaptation (of Large Language Models) [see Microsoft github repo] |
LPU | Language Processing Unit |
LRM | Large Reasoning Model |
LSA | Latent Semantic Analysis |
LSA | Local Service Agreement |
LSE | Large Scale Event |
LSH | Locality-Sensitive Hashing |
LSM | Log-Structured Merge-Tree |
LSTM | Long Short-Term Memory |
LTV | Lifetime Value |
LTV | Loan-to-Value |
LU | Logical Unit |
LVM | Logical Volume Manager |
L2TP | Layer 2 Tunneling Protocol |
M__ | |
M&A | Mergers & Acquisitions |
MaaS | Mobility as a Service |
MAC | Machine Access Control |
MAC | Managed Application Consulting |
MAC | Mandatory Access Control |
MAC | [Medium |
MAC | Message Authentication Code |
MAD | Mean absolute deviation |
MAD | Median absolution deviation |
MAE | Mean Absolute Error |
MAMOS | Methods, Architecture, Management, Organization, Skills |
MANOVA | Multivariate Analysis of Variance |
MAO | Maximum Acceptable Outage |
MAPE | Mean Absolute Percentage Error |
MAP | Mean Average Precision |
MAR | Missing At Random (re: systematically missing data) |
MAU | Monthly Active Users |
MBaaS | Mobile Back End as a Service |
MBCO | Minimum Business Continuity Objective |
MBR | Master Boot Record |
MBRE | Model-Based Requirement Engineering |
MBSE | Model-Based Systems Engineering |
MCAR | Missing Completely At Random (re: data quality/completeness) |
MD | Markdown Language |
MD5 | MD5 Message-Digest Algorithm |
MD6 | MD6 Message-Digest Algorithm |
MDA | Multi-Dimensional Analytical (i.e. queries) |
MDAP | Mobile Application Development Platform |
MDE | Minimum Detectable Effect |
MDM | Master Data Management |
MDM | Mobile Device Management |
MDR | Managed Detection and Response |
MDR | Marketing Development Representative |
MDS | Master Data Service |
MDSL | Microservice-Domain Specific Language |
ME | Maximum Entropy |
MEAN | MongoDB, Express.js, Angular.js, Node.js |
MEAP | Mobile Enterprise Application Platform |
MECE | Mutually Exclusive, Collectivelivey Exhaustive Principle |
MED | Management of External Data |
MEI | Merit, Excellence, and Intelligence |
MERN | MongoDB, Express.js, React.js, Node.js |
MFA | Micro Frontend Architecture |
MFA | Multi-Factor Authentication |
MFE | Micro-Frontends |
MFT | Master File Table |
MGF | Moment-generating function |
MIM | Major Incident Management |
MIMD | Multiple instruction streams, multiple data streams |
MIME | Multipurpose Internet Mail Extensions |
MIPS | Million of Instructions Per Second |
MIRT | Major Incident Response Team |
MISD | Multiple Instruction Streams, Single Data Stream |
MIT/LCS | Massachusetts Institute of Technology Laboratory for Computer Science |
ML | Machine Learning |
MLE | Maximum Likelihood Estimation |
MLLM | Multimodal Large Language Models |
MLP | Minimum Lovable Product |
MLP | Multi-Layer Perceptron |
MLS | Messaging Layer Security (RFC 9420) |
MMS | Massively Multilingual Speech |
MNAR | Missing Not At Random (re: data quality/completeness) |
MOA | Memorandum of Agreement |
MoE | Mixture of Experts |
MOJO | Maven plain Old Java Object |
MOLAP | Multidimensional OLAP |
MoM | Month-on-Month |
MOM | Message Oriented Middleware |
MOQ | Minimum Order Quantity |
MOTS | Modified Off-The-Shelf |
MOU | Memorandum of Understanding |
MPL | Mozilla Public License |
MPM | Manufacturing process management |
MQL | Marketing Qualified Lead |
MRA | Matters Requiring Attention |
MRC | Management Risk Committee |
MRD | Marketing Requitements Document |
MRM | Model Risk Management |
MRM | Most Responsible Moment |
MRR | Monthly Recurring Revenue |
MSA | Microservices Architecture |
MSA | Microsoft Services Account |
MSA | Master Service Agreement |
MSE | Mean Squared Error |
MSK | AWS Managed Streaming for Apache Kafka |
MSPF | Mobility Service Platform |
MSP | Managed Service Provider |
MSRC | Microsoft Security Response Center |
MSSP | Managed Security Service Provider |
MSTC | Microsoft Threat Intelligence Center |
MTD | Maximum Tolerable Downtime |
MTDL | Maximum Tolerable Data Loss |
mTLS | Mutual Transport Layer Security (or, Mutually Authenticated TLS) |
MTPD | Maximum Tolerable Period of Disruption |
MTS | Multidimensional Type Structure (e.g. Thomsen Diagrams) |
MTTD | Mean Time to Detect |
MTTR | Mean Time to Recovery |
MTTR | Mean Time to Repair |
MTTR | Mean Time to Remediate |
MTTR | Mean Time to Resolution |
MTU | Maximum Transmission Unit. Maximum frame or packet size for a particular network medium. |
MUPS | Minimum Usable Products/Services |
MVC | Model-View-Controller |
MVCC | Multi Version Concurrency Control |
MVI | Model-View-Intent |
MVNO | Mobile Virtual Network Operator |
MVP | Minimal Viable Product |
MVS | IBM Multiple Virtual Storage |
MVVM | Model-View-ViewModel |
M&A | Mergers & Acquisitions |
N__ | |
NA | North America |
NA | Not Applicable |
NAF | NATO Architecture Framework |
NAK | Negative Acknolwedgement |
NAS | Network Attached Storage |
NAT | Network Address Translation |
NC | Non-Compliant |
NCSA | National Center for Supercomputing Applications |
NCSC | National Cyber Security Centre |
NCT | .NET Community Toolkit |
ND | Neighbor Discovery |
NDA | Non-Disclosure Agreement |
NDCG | Normalized Discounted Cumulative Gain |
NDP | Neighbor Discovery Protocol |
NDR | Network Detection and Response |
NER | Named Entity Recognition, re: ML |
NeRF | Neural Radiance Fields (re: Deep Learning, optimizing continuous volumetric scene function) |
NGAV | New-Generation Antivirus |
NIDS | Network-based Intrusion Detection System |
NISQ | Noisy Intermediate-Scale Quantum |
NIST | National Institute of Standards and Technology |
NFS | Network File System |
NFT | Non-Fungible Token |
NFV | Network Function Virtualization |
NIDS | Network Intrusion Detection System (see IDS) |
NIST | National Institute for Standards and Technology |
NISQ | Noisy Intermediate-Scale Quantum (NISQ) computers |
NLG | Natural Language Generation |
NLP | Natural Language Processing |
NLS | Natural Language Support |
NLU | Natural Language Understanding |
NMS | Network Management System |
NNS | Nearest neighbor search |
NOC | Network Operations Center |
NOPAT | Net Operating Profit After Tax |
NPI | Non-Public Personal Information (aka NPPI) |
NPM | Node Package Manager |
NPPI | Non-Public Personal Informaiton (aka NPI) |
NPV | Net Present Value |
NRD | Non-Record Disposal |
NSA | National Security Agency |
NSG | Network Security Group |
NSH | Network Service Header |
NSN | nation-state notification |
NTE | Not To Exceed |
NTFC | No-Fee Terms and Conditions |
NTIA | National Telecommunications and Information Administration, U.S. Department of Commerce |
NTLM | NT LAN Manager |
NTP | Network Time Protocol |
NVD | National Vulnerability Database |
O__ | |
OASIS | Organization for the Advancement of Structured Information Systems |
OCF | Operating Cash Flow |
OCI | Open Container Initiative |
OCI | Oracle Cloud Infrastructure |
OCIO | Office of the Chief Information Officer |
OCM | Organizational Change Management |
OCP | OpenShift Container Platform (IBM, RedHat) |
OCTAVE | Operationally Critical Threat, Asset, and Vulnerability Evaluation |
OData | Open Data Protocol |
ODBC | Open Database Connectivity |
OOBE | Out-of-Box Experience |
OFAC | Office of Foreign Assets Control |
OG | Open Graph, also see Open Graph Protocol |
OGL | Open Game License (re: Wizards of the Coast D&D public copyright license) |
OIA | Office of Intelligence and Analysis |
OIC | Oracle Integration Cloud (note: renamed in January 2019, to Oracle Integration) |
OID | Object Identifier |
OIDC | OpenID Connect |
OIDC | Oracle Identity Cloud Service |
OIDF | OpenID Foundation |
OKRs | Objectives and Key Results |
OLA | Operational-Level Agreement |
OLAP | Online Analytical Processing |
OLB | Object Language Bindings |
OLIN | Online Information Network |
OLTP | Online Transaction Processing |
OMB | Office of Management and Budget |
OMG | Object Management Group |
OMS | Order Management System |
OO | Object Oriented |
OOA/D | Object Oriented Analysis and Design |
OOD | Object Oriented Design |
OODA | Observe-Orient-Decide-Act |
OOP | Object Oriented Programming |
OOTB | Out Of The Box |
OPA | Open Policy Agent |
OPEA | Open Platform for Enterprise AI, (GitHub |
OpenELA | Open Enterprise Linux Association |
OpEx | Operational Expense |
OPS | Operations |
ORC | Operational Risk Committee |
OSF | Open Software Foundation |
OSFI | Canadanian version of OFAC |
OSI | Open Systems Interconnection model |
OSINT | Open-Source Intelligence |
OSQI | Open Source Quality Institutes - an idea by Tim Bray |
OSSF | Open Source Security Foundation |
OT | Operational Technology (re: computing systems that are used to manage industrial operations as opposed to administrative operations) |
OTC | Order-to-Cash |
OTP | One-Time Passcode |
ou | Organizational Unit, re: LDAP |
OWA | Outlook Web Access |
OWASP | Open Web Application Security Project |
OWL | Web Ontology Language |
P__ | |
P | Precision |
P&L | Profit and Loss |
PaaR | Platform as a Runtime |
PaaS | Platform as a Service, aka aPaaS (i.e., Application Platform as a Service) |
PaLM | Pathways Language Model |
PAM | Pluggable Authentication Modules |
PAM | Privileged Access Management |
PAP | Password Authentication Protocol |
PAP | Policy Administration Point |
PAS | Publicly Available Specification |
PASETO | platform-agnostic security tokens |
PAT | Profit After Tax |
PBAC | Policy-Based Access Control (see ABAC, CBAC) |
PBC | Packaged Business Capability |
PBI | Product Backlog Item (i.e. Scrum) |
PBL | Product Backlog (i.e. Scrum) |
PCA | Principlal Component Analysis |
PCI DSS | Payment Card Industry Data Security Standard |
PCR | Policy Change Request |
PCR | Project Change Request |
PDCA | Plan-Do-Check-{Act |
PDH | Product Development Hub |
PDI | Personal Developer Instances |
PDK | Platform Development Kit |
PDM | Product Data Management |
PDSA | Plan-Do-Study-Act |
PDP | Policy Decision Point |
PDP | Programmed Data Processor |
PDSA | Plan-Do-Stuy-Act |
PDU | Protocol data unit |
PE | Private Equity |
PEAP | Protected Extensible Authentication Protocol |
PEER | Parameter Efficient Expert Retrieval |
PEFT | Parameter Efficient Fine Tuning |
PEM | Privacy Enhanced Mail |
PEP | Packet Exchange Protocol |
PGM | Program |
PGP | Pretty Good Privacy |
PHI | Protected Health Information (re: HIPPA) |
PI | Program Increment (re: Scaled Agile Framework, SAFe) |
PIA | Privacy Impact Assessment |
PII | Personally Identifiable Information |
PIN | Personal Identification Number |
PIP | Performance Improvement Plan |
PIR | Post Incident Review |
PIT | Platform Information Technology |
PITR | Point In Time Recovery |
PIU | Profits Interests Units [a form of equity compensation typically issued by limited liability companies (LLCs) and are popular with private equity investors as a way to incentivize management. PIUs are based on the company's future value and are awarded to employees for their services to the company.] |
PKCE | Proof Key for Code Exchange (pronounced "pixy"), re: RFC 7636 |
PKI | Public Key Infrastructure |
PKM | Personal Knowledge Management |
PLC | Project Life Cycle |
PLCs | Programmable Logic Controllers |
PLM | Product Lifecycle Management |
PLSA | Probabilistic Latent Semantic Analysis |
PM | Program Manager |
PM | Project Management |
PM | Project Manager |
PMI | Project Management Institute |
PMO | Project Management Office |
PO | Product Owner |
PO | Purchase Order |
POC | Point of Contact |
POC | Proof-of-Concept |
POD | Point of Delivery |
POJO | Plain Old Java Object |
POLDAT | Process, Organization and Location (Business Architecture) and Data, Applications and Technology (Systems Architecture) |
POLO | Plain Old Language Objects |
PoLP | Principle of Least Privilege |
POOGI | Process Of Ongoing Improvement [see TOC, Theory of Constraints] |
PoP | Policy on Policies |
POSIX | Portable Operating System Interface |
POTS | Plain old telephone service |
POV | Point of View |
PPC | Pay Per Click |
PPI | Protected Personal Information |
PPL | Policy & Procedure Library |
PPM | [Project Portfolio Management])(https://en.wikipedia.org/wiki/Project_portfolio_management) |
PPO | Proximal Policy Optimization (e.g., Deep Reinforcement Learning algorithm) |
PPPoA | Point-to-Point Protocol over ATM |
PPPoE | Point-to-Point Protocol over Ethernet |
PPP | Point-to-Point Protocol |
PQC | Post Quantum Cryptography |
PR | Peer Review |
PR | Production Ready |
PR | Proposed Recommendation |
PR | Pull Request |
PR | Purchase Request |
PRC | Product Review Committee |
PRD | Product Requirements Document |
PRJ | Project |
PRNG | Pseudorandom Number Generator |
PRM | Program |
PRR | Production Readiness Reviews |
PRT | Portfolio |
PSD2 | Payment Services Directive (Directive 2015/2366/EU of the European Parliament andof the Council of 23 December 2015) |
PSM | Persistent Stored Modules |
PSM | Propensity Score Matching |
PSTN | Public switched telephone network |
PTP | Procure-to-Pay |
PUP | PARC Universal Packet |
PV | Present Value |
PVA | Power Virtual Agents (re: Microsoft BOT platform) |
PvP | Player to Player |
PWA | Progressive Web Application |
P2P | Peer-to-peer |
Q__ | |
QA | Quality Assurance |
QAOA | Quantum Approximate Optimization Algorithm |
QAR | Quality Assurance Review |
QEC | Quantum Error Correction |
QFT | Quantum Field Theory |
QFT | Quantum Fourier Transform |
QI | Quality Improvement |
QIT | QUality Improvement Team |
QKD | Quantum Key Distribution |
QML | Quantum Machine Learning |
QMLM | Quantum Machine Learing Model |
QMP | Quality Managemenet Principles (e.g., see: ISO 9000) |
QMS | Quality Management System |
QMT | Quality Monitoring Team |
QNN | Quanvolutional Neural Network |
QoE | Quality of experience |
QoS | Quality of Service |
QRE | Quantum Resource Estimation |
QSA | Qualified Security Assessor |
QPS | Queries Per Second |
QSM | Quantitative Software Management |
QUIC | QUIC (pronounced "quick") is a general-purpose[2] transport layer[3] network protocol initially designed by Jim Roskind at Google |
R__ | |
R2 | R-Squared |
RA | Registration Authority |
RAA | Responsibility, Accountability, Authority |
RACF | IBM Resource Access Control Facility |
RACI | Responsible, Accountable, Consulted, Informed |
RAD | Rapid Application Development |
RAG | Retrieval-Augmented Generation, (Wkipedia) |
RAG | Red, Amber (Yellow), Green (see: Traffic Light Rating System) |
RAID | Redundant Array of Independent Disks |
RAM | Random Access Memory |
RAML | REST API Modeling Language |
RAPT | Reverse Address and Port Translation (see RAT) |
RAR | Roshal Archive (file format), re: archival |
RARP | Reverse Address Resolution Protocol |
RAS | Redundancy, Availability, Serviceability |
RASUI | Reliability, Availability, Serviceability, Usability and Instability |
RAT | Reverse Address and Port Translation (see RAPT) |
RBA | Role-Based Authorization |
RBAC | Role Based Access Control |
RBFNN | Radial Basis Function Neural Network |
RCA | Root Cause Analysis |
RCE | Remote Code Execution |
RCG | Risk and Controls Group |
RCT | Randomized Controlled Trial |
RDB | Relational Database |
RDC | Remote Desktop Connection |
RDF | Resource Description Framework |
RDN | Relative Distinguished Name, re: LDAP |
RDP | Remote Desktop Protocol |
RDS | Amazon Relational Database Service |
RDS | Remote Desktop Services |
ReLU | Rectified Linear Activation |
REST | Representational State Transfer |
RFC | Request for Comments |
RFE | Recursive Feature Elimination |
RFI | Request for Information |
RFID | Radio Frequency Identification |
RFM | Recency, Frequency, Monetary Value |
RFO | Reason for Outage |
RFP | Request for Proposal |
RFQ | Request for Quote |
RFS | Request for Service (or, Solution) |
RHEL | Red Hat Enterprise Linux |
RIA | Rich Internet Application |
RICE | Reports, Interfaces, Conversions, and Enhancements |
RICE | Reach, Impact, Confidence, Effort (re: a scoring model framework - used by product owners/managers) |
RIDAC | Risk, Issue, Decision, Action, and Request Changes records (re: ServiceNow) |
RION | Raw Internet Object Notation |
RIP | Routing Information Protocol |
RISC | Reduced Instruction Set Computer |
RITM | Request Item |
RL | Reinforcement Learning |
RLHF | Reinforcement Learning from Human Feedback |
RMA | Return Merchandise Authorization |
RMA | Risk Management Administration |
RMAD | Rapid Mobile App Development |
RMF | Risk Management Framework |
RMIS | Risk Management Information System |
RMS | Rights Management Service |
RMSE | Root Mean Squared Error |
ROC | Receiver Operating Characteristic |
ROCE | Return on Capital Employed |
ROE | Return on Equity |
ROI | Return on Investment |
ROIT | Return on Information Technology |
ROLAP | Relational OLAP |
ROM | Rough Order of Magnitude (also see SWAG), aka an estimate |
ROS | Robotic Operating System |
RP | Relying Party (re: OpenID Connect) |
RPA | Robotic Process Automation |
RPC | Remote Procedure Call |
RPM | Redhat Package Manager |
RPM | Requests Per Minute |
RPO | Recovery Point Objective |
RSVP | Resource Reservation Protocol |
RSA | Rivest–Shamir–Adleman, (re: one of the first public-key cryptosystems) |
RSG | Risk Strategy & Governance |
RSU | Restricted Stock Units |
RTB | Run The Business |
RTCP | RTP Control Protocol |
RTE | Release Train Engineer |
RTF | Runtime Fabric (re: MuleSoft) |
RTFM | Read The Freaking Manual |
RTM | Requirements Traceability Matrix |
RTP | Real-time Transport Protocol |
RTR | Record-to-Report |
RTR | Right To Represent |
RTSP | Real Time Streaming Protocol |
RTT | Round-Trip Time |
RTO | Recovery Time Objective |
RTUs | Remote Terminal Units |
RUM | Real User Measurements (or Monitoring) |
RUM | Resources Under Management |
RUP | Rational Unified Process |
RWKV | Receptance Weighted Key Value (an open-source model that modernizes Recurrent Neural Networks to match the performance of Transformer-based LLMs) |
S__ | |
S&P | Strategy & Planning |
S-DBR | Simplified Drum-Buffer-Rope |
SA | Solution Architect |
SaaS | Software as a Service |
SABSA | Sherwood Applied Business Security Architecture |
SACM | Software Asset Configuration Management (an ITIL process) |
SAD | Solution Architecture Document |
SADS | Secure Application Development Standards |
SAFe | Scaled Agile Framework |
SAM | Segment Anything Model [re: A Foundation model for image segmentation, from FAIR] |
SAM | Serverless Application Model |
SAM | Serviceable Addressable Market |
SAM | Software Asset Management |
SAM | Successive Approximation Model, created by Allen Interactions |
SAML | Security Assertion Markup Language |
SAN | Storage Area Networks |
SANS | The SANS Institute (officially the Escal Institute of Advanced Technologies) |
SAP | Service Advertising Protocol |
SAR | Security Assessment Report |
SAR | Suspicious Activity Reporting |
SASE | Secure Access Service Edge |
SAST | Static Application Security Testing |
SATA | Seria AT Attachment |
SAW | Statement of Architecture Work |
SBE | Specification by Example |
SBI | Synthetic Biological Intelligence |
SBOM | Software Bill of Materials, re: Software Supply Chain - also see VEX |
SCA | Security Composition Analysis |
SCADA | Supervisory Control and Data Acquisition |
SCAP | Security Content Automation Protocol |
SCC | Strongly Connected Components (re: Parsel AI framework |
SCD | Slowly Changing Dimension |
SCI | Sensitive Compartmented Information |
SCIM | System for Cross-Domain Identity Management (re: RFC7644) |
SCP | Service Control Policy |
SCTP | Stream Control Transmission Protocol |
SD | Service Desk |
SDF | System Data Flow |
SDG | Sustainable Development Goals |
SDI | Software Defined Infrastructure |
SDK | Software Development Kit |
SDL | Secure Development Lifecycle |
SDLC | Software Development Life-cycle (aka Software Development Process) |
SDLP | Systems Development Lifecycle Process |
SDN | Software Defined Networking |
SDN | Specially Designated Nationals and Blocked Persons List |
SDP | Safe Deployment Practices |
SDP | Software Defined Perimeter (also see VPN) |
SDR | Sales Development Representative |
SDSL | Symmetric digital subscriber line |
SE | Standard Edition |
SE | Systems Engineering |
SEBoK | Systems Engineering Book of Knowledge - wiki |
SEC | U.S. Securities and Exchange Commission |
SEO | Search Engine Optimization |
SERC | Systems Engineering Research Council |
SFCC | Salesforce Commerce Cloud |
SFDC | SalesForce DotCom |
SFIA | Skills Framework for the Information Age |
SFRA | Storefront Reference Architecture (i.e., Salesforce B2C Commerce) |
SFTP | Secure File Transfer Protocol |
SFPF | Senior Foreign Political Figures |
SHA-2 | Secure Hash Algorithm 2 |
SHA-3 | Secure Hash Algorithm 3 - also see NIST/FIPS 202 |
SHAP | SHapley Additive exPlanations |
SHIR | Self-Hosted Integration Runtime |
SI | System Integrator |
SIAM | Service Integration & Management |
SII | Self-Identified Issue |
SIAM | Service Integration and Management |
SIEM | Security Information and Event Management |
SIKE | Supersingular Isogeny Key Exchange |
SIMD | Single InstructionStream, Multiple Data Streams |
SIP | Session Initiation Protocol |
SIPOC | Supplier, Input, Process, Output, Customer |
SIRT | Security Intelligence Response Team |
SISD | Single Instruction Stream, Single Data Stream |
SIT | System Integration Testing |
SKU | Stock Keeping Unit |
SLA | Service Level Agreement |
SLES | SUSE Linux Enterprise Server |
SLI | Service Level Indicator - a quantifiable measure of service reliability |
SLIM | Software Lifecycle Management |
SLMs | Small Language Models |
SLO | Service Level Objectives - a reliability target for an SLI |
SLO | Single Log-out |
SLM | Service Level Management |
SLSA | Supply chain Levels for Software Artifacts |
SM | System Maanger |
SMART | [Specific, Measurable, {Achievable |
SMART | SMART (Substitutable Medical Applications, Reusable Technologies) |
SME | Subject Matter Expert |
SMO | Service Management Office |
SMOTE | Synthetic Minority Over-Sampling Technique |
SMS | Short Message Service |
SMTP | Simple Mail Transfer Protocol |
SMURFS | Specifically Marketable, Useful, Releasable Feature Sets (source |
sn | Surname, re: LDAP |
SN | abbreviation for ServiceNow |
SNAFU | Situation Normal, All Fucked Up |
SNI | Server Name Indiciation |
SNOW | abbreviation for ServiceNow |
SO | Sales Order |
SOA | Service Oriented Architecture |
SOA | Start of Authority record, re: DNS |
SOAP | Simple Object Access Protocol |
SOC | Security Operations Center |
SOC | System and Organization Controls |
SoE | System of Engagement |
SOLID | Single Responsibility, Open-Closed, Liskov Substitution, Interface Segregation, Dependency Inversion |
SOM | Serviceable Obtainable Market |
SONET | Synchronous optical networking |
SOSL | Salesforce Object Search Language |
SOP | Standard Operating Procedure |
SOR | System of Record |
SoS | Systems of Systems |
S.O.S. | Slower, Older, Smarter |
SOT | Souce of Truth |
SOW | Statement of Work |
SOX | Sarbanes-Oxley Act of 2022 |
SP | Service Provider |
SPA | Securing Privileged Access |
SPA | Single-Page Application |
SPAC | Special Purpose Acquisition Company |
SPDX | Software Package Data Exchange, re: ISO/IEC 5962:2021 standard |
SPF | Sender Policy Framework, re: email auth |
SPICE | Simple Protocol for Independent Computing Environments |
SPIFFE | Secure Production Identity Framework for Everyone |
SPKI | Simple Public Key Infrastructure |
SPM | Service Portfolio Management |
SPOC | Single Point of Contact |
SPOF | Single Point of Failure |
SPOG | Single Pane of Glass |
SPOT | Single Point Of Truth |
SPP | Sequenced Packet Protocol |
SPX | Sequenced Packet Exchange |
SOX | Sarbanes-Oxley Act of 2002 |
SQL | Sales Qualified Lead |
SQL | Structured Query Language |
SRA | Security Risk Assessment |
SRMA | Supplier Risk Management Assessment |
SRP | Single Responsibility Principle |
SRS | Secure and Reliable Systems |
SSADM | (structured systems analysis and design methodology) - developed by Tom DeMarco, Ed Yourdon, and Larry Constantine |
SSD | Solid-State Disk |
SSG | [Server-Side {Generating |
SSG | [Static Site {Generation |
SSH | Secure Shell |
SSIRP | Software and Services Incident Response Plan |
SSL | Secure Sockets Layer |
SSML | Speech Synthesis Markup Language |
SSO | Single Sign-On |
SSOT | Single Source of Truth |
SSP | System Security Plan |
SSPI | Security Support Provider Interface |
SSR | Server-Side Rendering |
STaaS | Storage as a Service |
STAR | Security Trust Assurance and Risk |
STAR | Situation (20%), Task (10%), Action (60%), Result (10%) [re: method] |
STM-1 | Synchronous Transport Module level-1 |
STS | Security Token Service |
SuD | System Under Discussion (re, see book: Writing Effective Use Cases) |
SUTVA | Stable Unit Treatment Value Assumption |
SVD | Single Value Decomposition |
SVG | Scalable Vector Graphics |
SW | Software |
SWA | Azure Static Web Apps (github) |
SWAG | Silly Wild-Ass Guess (also see ROM), aka an estimate |
SWE | [Software Engineer |
SWG | Secure Web Gateway |
SWOT | Strengths, Weaknesses, Opportunities, and Threats |
T__ | |
T2R2 | Transparent, Traceable, Replicable and Reproducible a |
t-SNE | t-distributed Stochastic Neighbor Embedding |
TA | Throughput Accounting |
TAG | Technical Advisory Group |
TAM | Technical Account Manager |
TAM | Total Addressable Market |
TAOC | The Art of Computer Programming (re: by Donald Knuth) |
TAR | Tape Archive (file format). Aka tarball |
TB | Terabyte |
TBD | To Be Determined |
TBM | Technolog Business Management |
TBM | Technology Business Management Council |
TCO | Total Cost of Ownership (see TOC) |
TCP | Transmission Control Protocol |
TCP/IP | Internet protocol suite |
TCV | Total Contract Value (TCV) |
TDD | Test-Driven Development |
TFI | Office of Terrorism and Financial Intelligence |
TFP | Total Factor Productivity |
TGB | Technology Governance Board |
THIRA | Threat and Hazard Identification and Risk Assessment |
TIME | Tolerate. Invest. Migrate. Eliminate. (re: Gartner categorization) |
TLA | Three Letter Acronym |
TLS | Transport Layer Security |
TM | Topic Model, re: NER, NLP, DL, ML |
TNR | True Negative Rate |
TOC | Theory of Constraints |
TOC | Total Ownership Cost (see TCO) |
ToM | Theory of Mind |
TOM | Target Operating Model |
TOML | Tom's Obvious Minimal Language |
TP | Third-Party |
TPLC | Total Product Life Cycle |
TPM | Trusted Platform Module |
TPR | True Positive Rate |
TPS | Toyota Production System |
TPU | Tensor Processing Unit(s) |
TRACTOR | TRanslating All C TO Rust (DARPA project) |
TRM | Technical Reference Model |
TRPM | Third-Party Risk Management |
TSD | Technical Specification Document |
TSO | Time Sharing Option, re: IBM mainframe interactive time-sharing environment |
TSS | Time Sharing Operating System, re: IBM |
TSS | Technical Security Standards |
TTFB | Time to First Byte |
TTI | Time to Interactive |
TTL | Time To Live |
TTM | Time-To-Market |
TTP | Trusted Third Party |
TTPs | Tactics, Techniques, and Procedures |
TTS | Text-To-Speech |
TWh | Terawatt-hours |
TXN | Transaction |
U__ | |
UAT | User Acceptance Testing |
UCaaS | Unified Communications as a Service |
UCP | Universal Control-Plane |
UDDI | Universal Description, Discovery, & Integration |
UDEF | Universal Data Element Framework |
UDF | User Defined File |
UDF | User Defined Function |
UDN | Unbounded Depth Neural Network |
UDP | User Datagram Protocol |
UDR | User-Defined Routes |
UDS | Unix Domain Socket |
UEBA | User and Entity Behavior Analytics |
UEFI | Unified Extensible Firmware Interface |
UGC | User Generated Content |
UI | User Interface |
UIMA | Unstructured Information Management Architecture |
ULID | Universally unique Lexicographically sortable IDentifier |
UML | Unified Modeling Language |
UPC | Universal Product Code |
USB | Universal Serial Bus |
USL | Universal Scalability Law ~ Neil J. Gunther |
UTC | Coordinated Universal Time |
UTF | Unicode Transformation Format |
UUID | Universal Unique Identifier - also GUID |
UX | User Experience |
V__ | |
V2B | Vehicle-to-Building |
V2C | Vehcile-to-Cloud |
V2D | Vehicle-to-Device |
V2G | Vehicle-to-Grid |
V2I | Vehicle-to-Infrastructure |
V2V | Vehicle ad hock netowrk, or vehicle-to-vehicle |
V2X | Vehicle-to-Everything |
VA | Validation Authority |
VAE | Variational Autoencoders |
VAPT | Vulnerability Assessment and Penetration Testing |
VAX | Virtual Address eXtension |
VAS | Value-Added Services |
VBS | Virtualization-based Security (i.e., introduced in Windows 11) |
VC | Venture Capital |
VCF | VMware Cloud Foundation |
vCPU | Virtual Central Processing Unit |
VDBMS | Vector Database Danagement System, aka vector data, or vector store |
VDI | Virtual Desktop Infrastructure |
VEX | Software-Exploitability eXchange |
VHD | Virtual Hard Disk |
VIF ??? | Virtual Network InterFace |
VIF | Variance Inflation Factor |
VII | ehicle Infrasture Integration |
VIP | Virtual IP address |
VISP | Virtual ISP |
VLAN | Virtual Local Area Network |
VM | Virtual Machine |
VMI | Virtual Machine Image |
VNC | Virtual Network Computing |
VNet | Virtual Network |
VNI ??? | Virtual Network Interface |
VoIP | Voice over IP |
VPDA | Versioning, Packaging, Dependency Management, Artifact Management |
VPN | Virtual Private Network |
VPS | Virtual Private Server |
VQF | Variational Quantum Factoring |
VR | Virtual Reality |
VRM | Value Realization Model |
VRM | Vendor Relationship Manager (aka VRO) |
VRO | Vendor Relationship Owner (aka VRM) |
VSA | Vertical Slice Architecture |
VSAM | Virtual Storage Access Method |
VSM | Value Stream Mapping |
VSM | Value Stream Management |
VSMP | Value Stream Management Platform |
VSOC | Virtual Security Operations Center |
VTOC | Volume Table of Contents, re: IBM |
VUCA | Volatility, Uncertainty, Complexity, Ambiguity - origin: The U.S. Army War College |
VXLAN | Virtual Extensible LAN |
W__ | |
W3 | World Wide Web (i.e. WWW) |
W3C | World Wide Web Consortium |
WaaS | Workers as a Service |
WADL | Web Application Description Language |
WAF | Web Application Firewall |
WAL | Write-ahead Logging |
WAN | WIde Area Network |
WAP | Wireless Access Point |
WAR | Web Application Resource (or, Web application ARchival |
WASI | WebAssembly System Interface |
wasm | WebAssembly wikipedia |
WBS | Work Breakdown Structure |
WCCP | Web Cache Communication Protocol |
WCET | Worst-Case Execution Time |
WCT | Windows Community Toolkit |
WD | Working Draft |
WDM | Windows Driver Model |
WFM | Windows Filtering Platform |
Wi-Fi | Wireless Fidelity |
WLIF | Workload Identity Federation |
WIP | Work in Progress |
WISP | Wireless Internet service provider |
WLM | Work Lifecycle Management |
WMS | Warehouse Management System |
WoT | Web of Trust |
WORM | Write-Once-Read-Many |
WPA | Wi-Fi Protected Access |
WPA | Wi-Fi Protected Access II |
WPA | Wi-Fi Protected Access 3 |
WPS | Wi-Fi Protected Setup |
WRT | Work Recovery Time |
WSDL | Web Service Description Language |
WSJF | Weighted Shortest Job First (re: Scaled Agile Framework, SAFe) |
WWW | World Wide Web |
X__ | |
XA | EXtended Architecture |
XDR | Extended Detection and Response |
XID | Transaction Identifier |
XML | Extensible Markup Language |
XNS | Xerox Network Systems |
XP | eXtreme Programming |
XR | Extended Reality |
XSL | XML Style Language |
XSLT | eXtensible Stylesheet Language Transformations |
XSS | Cross-Site Scripting |
Y__ | |
YAGNI | You Aren't Gonna Need It |
YAS | Yet Another Silo |
YB | Yottabyte |
YBIYRI | You-build-it-you-run-it |
YBYO | You Build, You Own (alternatively: You Buid It, You Own It) |
Z__ | |
ZB | Zettabyte |
ZBB | Zero-Based Budgeting |
zkEVM | zero-knowledge Ethereum Virtual Machine |
ZKP | Zero Knowledge Proof |
ZSP | Zero Standing Privilege |
ZT | Zero Trust |
ZTA | Zero Trust Architecture |
ZTDNS | Zero Trust DNS |
ZTNA | Zero Trust Network Access |