Authoritative Vocabulary

Glossary & Terminology

Use the HexxLock glossary to locate precise, authoritative definitions for every platform, product, and governance term in one place. Search across disciplines, filter by focus area, and rely on a single source of truth for shared understanding. This page is designed to scale with the platform, ensuring terminology stays aligned as capabilities grow.

Access the glossary below

Hexxlock Lexicon

You can find the definition of the relevant term through the Hexxlock Glossary located in this section.

542 terms
A

Access Control List (ACL)

Security & Compliance

A set of rules defining which users or processes can access specific resources and operations, fundamental to traffic filtering and resource protection.

Related terms:Role-Based Access Control (RBAC)Network Hardening

Accountability Framework

Operations & Governance

Structures that define responsibility and answerability for actions and outcomes, ensuring transparency and traceability.

Related terms:Audit TrailGovernance Board

Active-Active Deployment

Platform Architecture

A deployment model where multiple sites serve traffic simultaneously. It can improve availability but requires careful handling of data consistency and conflict resolution.

Related terms:Multi-Region ArchitectureConflict Resolution Policy

Active Learning

AI & Intelligence

A learning approach where the model queries for labels on the most informative samples to optimize annotation effort.

Related terms:Data LabelingSemi-Supervised Learning

Active-Passive Deployment

Platform Architecture

A deployment model where a primary site serves traffic while a standby site is prepared for failover. It simplifies consistency management compared to active-active but may increase recovery time.

Related terms:FailoverDisaster Recovery

Actual State

Platform Architecture

The observed runtime condition of services, resources, and configurations at a point in time. Differences between actual and desired state drive reconciliation actions and operational alerts.

Related terms:Reconciliation LoopDrift Detection

Admission Controller

Platform Architecture

A policy enforcement mechanism that validates or mutates resources at creation time in orchestration environments. It is used to ensure deployments comply with security, governance, and configuration standards.

Related terms:Policy GatesIngress Controller

Adversarial Robustness

Responsible AI

Resistance of models to malicious or crafted inputs intended to cause errors or unsafe behavior, preserving accuracy under attack.

Related terms:Robustness TestingRobustness Verification

Agile Methodology

Operations & Governance

Iterative delivery with frequent feedback, adapting to change and emphasizing collaboration and working outcomes.

Related terms:Continuous ImprovementValue Stream Mapping

AI Environmental Impact

Responsible AI

Measuring and managing the energy and carbon footprint of training and operating AI models to support sustainability goals.

Related terms:Model Retraining PolicyRegulatory Sandbox

AI Ethics Committee

Responsible AI

A cross-functional body that reviews high-risk AI initiatives for alignment with ethical standards and legal requirements.

Related terms:Ethical AI FrameworkAlgorithmic Impact Assessment

AI Governance

AI & Intelligence

Policies and controls defining how AI systems are built, validated, monitored, and audited to ensure accountability and safety.

Related terms:Bias MitigationExplainability

AI Hallucination

AI & Intelligence

Generative outputs that are plausible but factually incorrect or unsupported, mitigated by grounding, retrieval, and stricter validation.

Related terms:Retrieval-Augmented Generation (RAG)Explainability

AI Incident Reporting System

Responsible AI

A channel for reporting malfunctions, safety issues, or ethical concerns about AI systems, triggering investigation and remediation.

Related terms:Algorithmic AccountabilityResponsible Disclosure

Air-Gapped Deployment

Security & ComplianceDeployment & Integration

A deployment model operating without external network connectivity for high-security environments.

Related terms:Secure Compute

Air-Gapped Reference Architecture

Platform Architecture

An architecture blueprint designed for deployments with no external network connectivity. It defines how updates, telemetry, and governance controls operate under strict isolation constraints.

Related terms:Supply Chain SecurityPrivate Service Endpoint

Algorithmic Accountability

Responsible AI

Policies and controls that assign responsibility for AI outcomes, with ownership, audit trails, and remediation paths for unintended effects.

Related terms:Traceability LoggingAutomated Compliance Checks

Algorithmic Impact Assessment

Responsible AI

Pre-deployment evaluation of potential social, ethical, and legal consequences of an AI system to mitigate negative externalities.

Related terms:Societal Impact AnalysisPrivacy Impact Assessment (PIA)

Anomaly Detection

AI & Intelligence

Identifying observations that materially deviate from expected patterns to surface potential fraud, failures, or threats early.

Related terms:Behavioral AnalyticsSignal Fusion

API Gateway

Platform Architecture

A managed entry point that routes, authenticates, and governs access to backend services. It centralizes cross-cutting concerns such as rate limits, request validation, and protocol translation.

Related terms:Ingress ControllerRate Limiting

API Versioning

Platform Architecture

A method for evolving API contracts while managing compatibility for clients. It defines how changes are introduced, supported, and eventually deprecated.

Related terms:Backward CompatibilityDeprecation Policy

Architecture Decision Record (ADR)

Platform Architecture

A concise record capturing an architectural decision, its context, alternatives considered, and the rationale. It enables traceability and repeatable review of decisions over time.

Related terms:Architecture GovernanceChange Impact Analysis

Architecture Governance

Platform Architecture

The processes and controls used to maintain architectural consistency, manage exceptions, and validate changes against standards. It defines how architectural decisions are reviewed, approved, and enforced.

Related terms:Architecture Decision Record (ADR)Policy Plane

Architecture View

Platform Architecture

A representation of the system from a specific angle such as components, deployment, or data flows. It provides a controlled level of detail to support analysis, review, and governance without relying on source code.

Related terms:Architecture ViewpointC4 Model

Architecture Viewpoint

Platform Architecture

A defined set of conventions for constructing a particular type of architecture view. It specifies the concerns addressed, the stakeholders, and the modeling rules used to keep views consistent and comparable.

Related terms:Architecture ViewComponent Model

Artifact Repository

Platform Architecture

A controlled storage system for versioned build outputs such as packages, images, and binaries. It supports provenance, controlled promotion across environments, and reproducible deployments.

Related terms:Build ProvenanceDependency Pinning

Artifact Signing

Deployment & Integration

Cryptographically signing build artifacts such as images or binaries so deployment systems verify origin and integrity before execution.

Related terms:Supply Chain SecurityImmutable Infrastructure

Asset Management

Operations & Governance

Tracking and optimizing physical and digital assets throughout their lifecycle to maximize value and reduce risk.

Related terms:Lifecycle ManagementTotal Cost of Ownership (TCO)

At-Least-Once Delivery

Platform Architecture

A delivery guarantee where messages are retried until acknowledged, which can lead to duplicates. It requires consumers to be idempotent or to implement deduplication to prevent repeated side effects.

Related terms:IdempotencyDeduplication Key

At-Most-Once Delivery

Platform Architecture

A delivery guarantee where a message is delivered zero or one time, with no retries after failure. It reduces duplicates but can result in message loss and is used only when loss is acceptable or compensated elsewhere.

Related terms:Message AcknowledgementIdempotency

Attack Surface Management

Security & Compliance

Continuous discovery and monitoring of assets and exposure points to identify vulnerabilities, misconfigurations, and shadow IT.

Related terms:Vulnerability AssessmentShadow IT Discovery

Attention Mechanism

AI & Intelligence

A neural component that weighs parts of an input sequence to focus on salient information, enabling models to handle long-range dependencies.

Related terms:Transformer ModelSelf-Attention

Attestation

Platform Architecture

A method for proving the integrity and configuration of a system to another party. It is commonly used to validate that workloads run in expected trusted environments.

Related terms:Trusted Execution Environment (TEE)Hardware Root of Trust

Auditability

Security & ComplianceOperations & Governance

The ability to trace and verify system actions, decisions, and data usage.

Related terms:Data LineageEvidence-Based Governance

Audit Logging

Security & Compliance

Chronological, tamper-resistant recording of security-relevant events to support forensics, compliance, and anomaly detection.

Related terms:SIEM (Security Information and Event Management)Digital Forensics

Audit Log Pipeline

Platform Architecture

A controlled pipeline for recording security- and governance-relevant actions with integrity and retention requirements. It supports traceability for operations, policy enforcement, and access events.

Related terms:Policy GatesAttestation

Audit Trail

Operations & Governance

A chronological record of activities that shows who did what and when, supporting security, compliance, and forensics.

Related terms:Compliance ReportingAccountability Framework

Automated Compliance Checks

Responsible AI

Code-based validations that ensure AI systems meet regulatory and policy requirements before deployment.

Related terms:Regulatory SandboxAlgorithmic Accountability

Automated Decision Review

Responsible AI

Flagging high-stakes or low-confidence automated decisions for human review to ensure quality and fairness.

Related terms:Right to ExplanationHuman-Centered Design (HCD)

Automated Reasoning

AI & Intelligence

Techniques that derive logical conclusions from facts and rules, supporting verifiable decision-making in policy-heavy contexts.

Related terms:Reasoning GraphInference Engine

Automatic Speech Recognition (ASR)

AI & Intelligence

Converting spoken language into text for downstream processing, enabling voice interfaces and transcription services.

Related terms:Natural Language Processing (NLP)Acoustic Modeling

Autonomous Agent

AI & Intelligence

An AI-driven entity that perceives its environment and acts to meet defined objectives with minimal human intervention under policy constraints.

Related terms:Reinforcement LearningPath Planning

Autonomous Decisioning

AI & IntelligenceResponsible AIOperations & Governance

System capability to execute predefined decisions automatically within policy and ethical boundaries.

Related terms:Human-in-the-LoopPolicy Gates

Autoscaling Policy

Platform Architecture

A defined rule set for scaling services based on metrics, thresholds, and cooldown periods. It balances performance and cost while preventing oscillation and overload under changing demand.

Related terms:Metrics PipelineHorizontal Scalability
B

Backend for Frontend (BFF)

Deployment & Integration

A dedicated backend tailored to a specific client (web, mobile), optimizing payloads and API interactions per interface.

Related terms:API ContractService Virtualization

Backpressure

Platform Architecture

A control mechanism where downstream components signal upstream producers to slow down when capacity is constrained. It prevents overload by aligning production rates with processing capability.

Related terms:Rate LimitingLoad Shedding

Backward Compatibility

Platform Architecture

A property where newer components continue to work with older clients, contracts, or data formats. It reduces integration risk during upgrades and staged rollouts.

Related terms:API VersioningBackward-Compatible Change

Backward-Compatible Change

Platform Architecture

A change that allows existing clients or consumers to continue functioning without modification. It is a core requirement for staged rollouts and mixed-version operation across distributed systems.

Related terms:Backward CompatibilityAPI Versioning

Bastion Host

Deployment & Integration

A hardened jump host used as a secure gateway for administrator access to private resources from external networks.

Related terms:Hybrid ConnectivityVPC Peering

Batch Processing

Data & Infrastructure

Processing data in scheduled, bounded workloads to produce aggregated or historical outputs. It is suited to stable datasets, cost-efficient backfills, and periodic reporting.

Related terms:ETL (Extract, Transform, Load)Data Pipeline

Bayesian Inference

AI & Intelligence

Updating probabilities as new evidence arrives using Bayes’ theorem, supporting decisions under uncertainty.

Related terms:Risk ScoringDecision Support

Behavioral Analytics

AI & Intelligence

Analyzing behavioral signals to understand intent and predict future actions for threat detection or user insights.

Related terms:Anomaly DetectionPattern Recognition

Beneficence Principle

Responsible AI

An ethical requirement that AI systems act to promote well-being and minimize harm for users and society.

Related terms:Value AlignmentEthical AI Framework

Bias Auditing

Responsible AI

Independent reviews to detect and document bias in AI systems, providing external validation of fairness claims.

Related terms:Model Fairness TestingFairness Metrics

Bias Mitigation

AI & Intelligence

Techniques to detect and reduce unfair bias in datasets or models to support equitable outcomes and compliance.

Related terms:AI GovernanceData Quality

Bias-Variance Tradeoff

AI & Intelligence

The balance between underfitting and overfitting that determines a model’s ability to generalize beyond training data.

Related terms:OverfittingValidation Set

Blast Radius

Platform Architecture

The extent of impact caused by a failure or change within a system. Reducing blast radius is achieved through isolation, segmentation, and controlled rollout practices.

Related terms:Failure DomainLoad Shedding

Blue-Green Deployment

Platform Architecture

A release technique that maintains two environments and switches traffic between them for cutover. It reduces risk by enabling quick rollback to the previous environment.

Related terms:Immutable InfrastructureCanary Deployment

Bounded Context

Platform Architecture

A clearly defined boundary within which a domain model and its terminology are consistent. It reduces ambiguity by ensuring the same term does not mean different things across components.

Related terms:Context MapDomain Model

Build Provenance

Platform Architecture

Evidence describing how a build artifact was produced, including sources, steps, and environments used. It supports verification of artifact integrity and compliance with controlled build processes.

Related terms:Supply Chain SecurityArtifact Repository

Bulkhead Isolation

Platform Architecture

A containment strategy that partitions resources so failures in one area do not exhaust shared capacity. It limits cross-impact and improves overall platform stability under partial failures.

Related terms:Failure DomainBlast Radius

Business Continuity Planning (BCP)

Security & Compliance

Preparation and procedures to maintain or quickly restore operations during and after disruptions or incidents.

Related terms:Incident ResponseDisaster Recovery

Business Impact Analysis (BIA)

Operations & Governance

Assessing potential effects of disruptions on critical operations to prioritize recovery objectives and resources.

Related terms:Risk ManagementBusiness Continuity Planning (BCP)
C

C4 Model

Platform Architecture

A lightweight approach for describing software architecture across four levels: context, containers, components, and code. In HexxLock context, it is used to keep architecture documentation readable while supporting review and traceability.

Related terms:Architecture ViewComponent Model

Cache Invalidation Strategy

Platform Architecture

A defined method for keeping cached data aligned with authoritative sources as data changes. It addresses when to refresh, expire, or proactively update cached entries to avoid stale outputs.

Related terms:Cache LayerSchema Evolution

Cache Layer

Platform Architecture

A performance layer that stores frequently accessed data to reduce latency and backend load. It must be designed with consistency and invalidation strategies appropriate to the domain.

Related terms:Cache Invalidation StrategyData Partitioning

Canary Deployment

Platform Architecture

A release strategy that gradually exposes a new version to a small portion of traffic before wider rollout. It supports early detection of regressions using real workload signals.

Related terms:Feature FlagTraffic Routing Policy

Capability Map

Platform Architecture

A structured inventory of platform capabilities expressed as stable business or technical functions, independent of implementation. It supports architecture planning by separating what the platform must do from how it is built.

Related terms:Platform ProfileTarget Architecture

Capacity Envelope

Platform Architecture

The defined operational limits within which the platform is expected to operate safely, including throughput, concurrency, and resource ceilings. It is used to set architectural expectations for scaling behavior, throttling, and protection mechanisms.

Related terms:Autoscaling PolicyLoad Shedding

Capacity Planning

Operations & Governance

Forecasting and allocating resources so systems and teams can meet demand without performance degradation.

Related terms:Demand ForecastingResource Allocation

Causal Consistency

Platform Architecture

A model where operations that are causally related are observed in the same order by all clients, while concurrent operations may be observed differently. It provides stronger guarantees than eventual consistency without full strong consistency cost.

Related terms:Eventual ConsistencyVector Clock

Chain-of-Thought Prompting

AI & Intelligence

Prompting that elicits intermediate reasoning steps from a model to improve final answers and transparency on complex tasks.

Related terms:Prompt EngineeringReasoning Graph

Change Control Board (CCB)

Operations & Governance

A formal body that reviews and approves or rejects proposed changes to ensure they are controlled and documented.

Related terms:Change ManagementGovernance Board

Change Data Capture (CDC)

Data & Infrastructure

Techniques that detect and stream committed data changes from source systems with minimal latency. CDC powers real-time pipelines, synchronization, and event-driven integrations.

Related terms:Stream ProcessingData Pipeline

Change Impact Analysis

Platform Architecture

A structured assessment of how a proposed change affects dependent components, data flows, and operational controls. In HexxLock context, it supports governance by documenting risk, compatibility, and rollback considerations.

Related terms:Dependency GraphRelease Train

Change Management

Operations & Governance

Standardized methods to plan, approve, and execute changes while minimizing service disruption and risk.

Related terms:Change Control Board (CCB)Incident Management

Chaos Engineering

Deployment & Integration

Deliberate fault injection in production-like environments to validate system resilience and reveal weaknesses before incidents.

Related terms:Resilience TestingTraffic Steering

CI/CD Pipeline

Deployment & Integration

Automated stages for building, testing, and deploying changes from version control to production with minimal manual steps.

Related terms:GitOpsPolicy as Code

Circuit Breaker

Platform Architecture

A resilience pattern that stops calls to an unhealthy dependency after a failure threshold is reached. It protects the system by allowing recovery time and avoiding cascading failures.

Related terms:Retry PolicyBulkhead Isolation

Classification

AI & Intelligence

Assigning inputs to predefined classes using supervised learning, common in detection and labeling tasks.

Related terms:Precision and RecallSupervised Learning

Clock Skew

Platform Architecture

The difference in time between clocks on different nodes. It can affect ordering, TTL enforcement, and coordination logic, requiring synchronization strategies and conservative time-based assumptions.

Related terms:Lamport TimestampVector Clock

Clustering

AI & Intelligence

Grouping data so items in the same cluster are more similar to each other than to other clusters, used for segmentation and anomaly surfacing.

Related terms:Unsupervised LearningDimensionality Reduction

CMDB (Configuration Management Database)

Deployment & Integration

A repository of configuration items and their relationships, used for impact analysis and controlled change in deployments.

Related terms:Change ManagementDrift Detection

Cognitive Computing

AI & Intelligence

Systems designed to mimic human reasoning, learning, and language understanding to augment human decision-making.

Related terms:Automated ReasoningNatural Language Processing (NLP)

Cold Start

Deployment & Integration

Startup latency when serverless functions or containers spin up after idling; mitigated by warming strategies in production.

Related terms:Latency BudgetAutoscaling Policy

Command Query Responsibility Segregation (CQRS)

Platform Architecture

A pattern that separates write operations from read operations into distinct models or pathways. It can improve scalability and clarity in systems with complex read/write requirements.

Related terms:Event SourcingRead-After-Write Consistency

Compaction

Platform Architecture

A storage maintenance process that rewrites data to reduce fragmentation, merge segments, or reclaim space. It impacts performance characteristics and must be planned with operational windows and resource budgets.

Related terms:State StoreSnapshotting

Compliance-by-Design

Security & CompliancePlatform Architecture

An approach where regulatory requirements are embedded directly into system architecture.

Related terms:Policy GatesSecure Compute

Compliance Governance

Security & Compliance

Frameworks and processes to align operations with regulatory, contractual, and policy requirements such as GDPR or ISO 27001.

Related terms:Data SovereigntyAudit Logging

Compliance Reporting

Operations & Governance

Producing evidence of adherence to laws, regulations, and internal policies, often through automated, auditable outputs.

Related terms:Audit TrailCompliance Governance

Component Model

Platform Architecture

A structured definition of platform components, their responsibilities, and how they interact. It clarifies boundaries and dependencies to reduce coupling and support controlled evolution.

Related terms:Service BoundaryContext Map

Computer Vision

AI & Intelligence

AI methods that interpret and act on visual inputs, covering detection, segmentation, tracking, and scene understanding for imagery and video.

Related terms:Object DetectionImage Segmentation

Concept Drift

AI & Intelligence

Changes in the statistical properties of target variables that degrade model accuracy, requiring detection, retraining, and validation.

Related terms:Model DriftContinuous Learning

Configuration Baseline

Platform Architecture

An approved set of configuration values and constraints used as a reference point for environments or deployments. It supports repeatability by making expected configuration explicit and reviewable.

Related terms:Configuration ManagementDrift Detection

Configuration Drift

Platform Architecture

A divergence between intended configuration and actual runtime configuration over time. Drift can introduce untracked risk and inconsistencies across deployments, especially in long-lived environments.

Related terms:Drift DetectionImmutable Configuration

Configuration Management

Platform Architecture

The practice and tooling used to define, distribute, and version system configuration across environments. It supports controlled change management and repeatable deployment behavior.

Related terms:Configuration BaselineImmutable Configuration

Conflict-Free Replicated Data Type (CRDT)

Platform Architecture

A data structure designed to converge automatically under concurrent updates without requiring coordination. CRDTs are used when availability and partition tolerance are prioritized and conflict resolution must be deterministic.

Related terms:Conflict Resolution PolicyEventual Consistency

Conflict Resolution Policy

Platform Architecture

A defined rule set for resolving conflicting updates that occur due to concurrent writes or partitioned operation. It must be explicit to maintain correctness and to support auditability of state convergence.

Related terms:Last-Write-Wins (LWW)Conflict-Free Replicated Data Type (CRDT)

Connection Draining

Platform Architecture

A shutdown behavior where an instance stops receiving new requests but continues processing existing ones until completion or timeout. It reduces user-facing disruption during deployments, scaling events, or maintenance.

Related terms:Graceful ShutdownLoad Balancer

Connection Keepalive

Platform Architecture

A mechanism that keeps network connections open to reduce handshake overhead and improve performance. It affects load balancers, proxies, and service runtimes and must be tuned to avoid stale or exhausted connections.

Related terms:Connection PoolingLoad Balancer

Connection Pooling

Platform Architecture

A technique where reusable connections to a dependency are maintained and shared across requests. It reduces connection setup overhead but requires capacity controls and safe lifecycle management.

Related terms:Connection KeepaliveRate Limiting

Consensus Protocol

Platform Architecture

A protocol used by distributed nodes to agree on a shared state or decision despite failures. It is foundational for coordination services, configuration stores, and leader election mechanisms.

Related terms:Leader ElectionQuorum

Consent Management

Responsible AI

Capturing, storing, and honoring user consent for data collection and AI processing to ensure lawful and ethical use.

Related terms:Data MinimizationData Stewardship

Consistency Boundary

Platform Architecture

The scope within which strong consistency is maintained and beyond which weaker guarantees may apply. Defining consistency boundaries clarifies where transactions, ordering, and read-after-write behavior are enforced.

Related terms:Strong ConsistencyEventual Consistency

Container Image

Platform Architecture

A packaged filesystem and metadata bundle used to run an application in a container runtime. It provides consistent execution environments across different infrastructure substrates.

Related terms:Container RegistryImmutable Infrastructure

Container Registry

Platform Architecture

A repository service that stores and distributes container images with access controls and version tags. It supports release workflows and controlled image promotion.

Related terms:Container ImageSupply Chain Security

Container Runtime

Platform Architecture

The component responsible for executing container images with isolation and resource controls. It enforces runtime policies and provides the execution context for containerized services.

Related terms:Runtime IsolationContainer Image

Container Runtime Security

Deployment & Integration

Controls that monitor and protect containers at runtime, including behavioral analysis, drift detection, and enforcement of immutable principles.

Related terms:Immutable LoggingInfrastructure Baselines

Container Security

Security & Compliance

Protecting container images, runtime, and orchestration layers from vulnerabilities, misconfigurations, and supply chain risks.

Related terms:DevSecOpsSecure Configuration Management

Content Delivery Network (CDN)

Deployment & Integration

A distributed network of edge caches and proxies that serves content closer to users to reduce latency and offload origin traffic.

Related terms:Edge CachingGlobal Traffic Management

Context-Aware Safety

Responsible AI

Adjusting safety strictness based on operational context, applying tighter controls in sensitive scenarios or user segments.

Related terms:Safety GuardrailsMisuse Detection

Context Map

Platform Architecture

A representation of how bounded contexts relate to each other through integration patterns and ownership boundaries. It clarifies dependencies, translation points, and coupling risks between domains.

Related terms:Bounded ContextIntegration Layer

Context Window

AI & Intelligence

The token span an LLM can process at once, defining how much prior text or instruction can be considered without truncation.

Related terms:TokenizationTransformer Model

Continuous Improvement

Operations & Governance

Ongoing incremental or breakthrough enhancements to processes, products, or services using systematic methods.

Related terms:Process OptimizationValue Stream Mapping

Continuous Learning

AI & Intelligence

Incrementally updating models as new data arrives to stay aligned with evolving patterns while managing catastrophic forgetting.

Related terms:Model DriftConcept Drift

Contract Management

Operations & Governance

Creating, executing, and tracking contracts to ensure obligations are met and risks are controlled across their lifecycle.

Related terms:Vendor ManagementCompliance Governance

Contract Testing

Platform Architecture

Testing that validates service interactions against agreed interface contracts. It detects integration failures early by ensuring changes respect expected request/response behavior.

Related terms:Interface ContractChange Impact Analysis

Control Interface

Platform Architecture

An interface used to manage configuration, lifecycle, or policy for a component rather than serving business or operational data. It is typically protected with stronger access controls and audit requirements than standard runtime APIs.

Related terms:Management PlaneControl Plane

Control Plane

Platform Architecture

The set of components that define and manage configuration, policy, orchestration, and lifecycle of workloads or services. It is responsible for intent, not high-volume operational data processing.

Related terms:Management PlaneOrchestration Layer

Correlation ID

Platform Architecture

A unique identifier attached to a request and propagated across service boundaries. It enables linking logs and traces for consistent end-to-end analysis.

Related terms:Distributed TracingStructured Logging

Cost-Benefit Analysis

Operations & Governance

Comparing expected costs and benefits of alternatives to support data-driven investment and operational decisions.

Related terms:Total Cost of Ownership (TCO)Strategic Planning

Counterfactual Fairness

Responsible AI

A fairness notion where a decision is fair if it would remain unchanged in a counterfactual world with different demographic attributes.

Related terms:Fairness MetricsModel Fairness Testing

Crisis Management

Operations & Governance

Coordinated actions and communication to respond to unexpected disruptive events, limiting harm to operations and stakeholders.

Related terms:Incident ManagementBusiness Continuity Planning (BCP)

Cryptographic Agility

Security & Compliance

The capability to change cryptographic algorithms, keys, or protocols rapidly to address emerging threats such as quantum risks.

Related terms:Cryptographic Key ManagementPublic Key Infrastructure (PKI)

Cryptographic Key Management

Security & Compliance

Governance of key generation, storage, rotation, and revocation to protect encrypted data and cryptographic operations.

Related terms:Public Key Infrastructure (PKI)Encryption at Rest

Cultural Sensitivity Analysis

Responsible AI

Evaluating AI outputs to ensure they respect cultural norms and avoid offensive content in the target region or audience.

Related terms:Stakeholder EngagementValue Sensitive Design
D

DAST (Dynamic Application Security Testing)

Security & Compliance

Testing running applications from the outside to find exploitable weaknesses, simulating attacker behavior at runtime.

Related terms:DevSecOpsPenetration Testing

Data Augmentation

AI & Intelligence

Generating additional training samples through transformations to improve robustness and mitigate overfitting or class imbalance.

Related terms:Synthetic DataOverfitting

Data Catalog

Data & Infrastructure

An inventory of data assets with metadata, lineage, ownership, and access details. It improves discoverability and supports governed reuse of datasets across teams.

Related terms:Metadata ManagementData Governance

Data Classification

Security & Compliance

Categorizing data by sensitivity to apply appropriate handling, access, and protection controls such as DLP and encryption.

Related terms:Data Loss Prevention (DLP)Compliance Governance

Data Contract

Platform Architecture

A formal definition of the structure, meaning, and constraints of data exchanged between components. It reduces ambiguity by making expectations explicit for producers and consumers, including validation and error semantics.

Related terms:Schema RegistryAPI Versioning

Data Governance

Data & Infrastructure

Policies, roles, and controls that define how data is accessed, protected, and validated. It underpins trust in data assets by enforcing quality, security, and compliance obligations.

Related terms:Data CatalogData Quality

Data Labeling

AI & Intelligence

Annotating raw data with meaningful tags for supervised learning; label quality directly affects model performance and fairness.

Related terms:Training DataValidation Set

Data Lake

Data & Infrastructure

A centralized repository that stores structured, semi-structured, and unstructured data at scale without enforcing schema on write. It enables late-binding analytics, ML feature discovery, and retention of raw records for lineage and audit.

Related terms:Schema-on-ReadData Catalog

Data Lineage

Data & InfrastructureSecurity & Compliance

The documented lifecycle of data from origin through transformations and usage.

Related terms:Auditability

Data Loss Prevention (DLP)

Security & Compliance

Tools and policies that detect and block unauthorized movement or exposure of sensitive data in use, in motion, or at rest.

Related terms:Data ClassificationEncryption at Rest

Data Masking

Data & Infrastructure

The replacement of sensitive data with realistic but fictitious values to reduce exposure risk in non-production or shared environments. It preserves structure for testing while protecting confidentiality.

Related terms:Data GovernanceData Residency

Data Mesh

Data & Infrastructure

A decentralized architecture that treats data as a product owned by domain teams with shared platform standards. It emphasizes governed interoperability across domain data products.

Related terms:Data GovernanceData Catalog

Data Minimization

Responsible AI

Collecting and using only the data strictly necessary for a defined AI purpose to reduce privacy risk.

Related terms:Privacy-Preserving AIConsent Management

Data Modeling

Data & Infrastructure

The formal design of entities, relationships, and constraints for data stores. It enforces consistency and performance expectations for analytical and operational workloads.

Related terms:Schema-on-WriteMaster Data Management (MDM)

Data Monetization

Data & Infrastructure

The practice of creating measurable value from data through efficiency gains or external data products. It depends on governed pipelines, quality controls, and clear usage permissions.

Related terms:Data GovernanceData Catalog

Data Ownership

Platform Architecture

A rule that assigns a single component or bounded context authority over a dataset’s schema, lifecycle, and mutation rights. It reduces conflicts by defining where write responsibility and governance controls reside.

Related terms:Service BoundarySchema Evolution

Data Partitioning

Platform Architecture

A method of splitting data into partitions to improve scalability, performance, or isolation. It introduces architectural requirements for routing, balancing, and handling uneven distribution.

Related terms:ShardingReplication Strategy

Data Pipeline

Data & Infrastructure

An automated sequence that moves, validates, and transforms data from sources to targets. Pipelines enforce freshness, quality, and lineage requirements for downstream analytics and operational uses.

Related terms:Change Data Capture (CDC)Data Quality

Data Plane

Platform Architecture

The runtime path where operational data, requests, and workload execution occur. It is optimized for throughput, latency, and reliability under expected load profiles.

Related terms:Control PlaneService Mesh

Data Quality

Data & Infrastructure

The degree to which data is accurate, complete, consistent, and timely for its intended use. It is maintained through validation rules, profiling, and continuous monitoring.

Related terms:Data GovernanceMaster Data Management (MDM)

Data Replication

Data & Infrastructure

The creation and maintenance of data copies across nodes or locations to improve availability and read performance. It underpins disaster recovery and read scaling strategies.

Related terms:Read ReplicaDisaster Recovery

Data Residency

Data & Infrastructure

Requirements governing the geographic storage and processing location of data. It drives deployment topology, access controls, and compliance alignment for regulated datasets.

Related terms:Network SegmentationData Governance

Data Sharding

Data & Infrastructure

A horizontal partitioning approach that splits datasets into shards to distribute load and storage. It supports scale-out for large datasets that exceed single-node capacity.

Related terms:Data PartitioningGlobal Identifier Strategy

Data Sovereignty

Security & Compliance

The requirement that digital data be subject to the laws and governance structures of the nation where it resides. It drives deployment, residency, and access controls to meet jurisdictional constraints.

Related terms:Compliance GovernanceSovereign Cloud

Data Stewardship

Responsible AI

Responsible oversight of data assets to ensure quality, lawful use, and ethical handling throughout the AI lifecycle.

Related terms:Consent ManagementData Minimization

Data Virtualization

Data & Infrastructure

An abstraction layer that provides unified access to distributed data without physical consolidation. It accelerates consumption while respecting source ownership and access policies.

Related terms:Data CatalogQuery Engine

Data Warehouse

Data & Infrastructure

A structured analytical store optimized for curated, cleansed, and conformed data to support reliable reporting. It enforces schema-on-write and is tuned for consistent query performance and governed access.

Related terms:ETL (Extract, Transform, Load)Data Modeling

DDoS Mitigation

Security & Compliance

Techniques to absorb or block distributed denial-of-service attacks while preserving availability for legitimate users.

Related terms:Web Application Firewall (WAF)Network Hardening

Dead Letter Queue (DLQ)

Platform Architecture

A queue used to isolate messages that repeatedly fail processing. It prevents blocking the main processing pipeline while enabling controlled inspection, remediation, and replay under governance.

Related terms:Poison MessageDelivery Semantics

Decision Lineage

Responsible AI

Tracing an AI decision back to model version, data, and inputs to support forensics, accountability, and compliance.

Related terms:Traceability LoggingAlgorithmic Accountability

Decision Support System

AI & IntelligenceOperations & Governance

An intelligent system that assists decision-makers by analyzing data and presenting evidence-based recommendations.

Related terms:Operational IntelligenceAutonomous Decisioning

Decision Tree

AI & Intelligence

A tree-structured model that splits data by feature conditions to arrive at predictions, valued for interpretability.

Related terms:Random ForestGradient Descent

Deduplication Key

Platform Architecture

A stable identifier used to detect and suppress duplicate messages or requests. Deduplication keys support safe retries by allowing consumers to recognize repeated inputs without repeating side effects.

Related terms:IdempotencyInbox Pattern

Deep Learning

AI & Intelligence

Multi-layer neural networks that learn hierarchical representations from raw data, driving advances in vision, language, and signal tasks.

Related terms:Neural NetworkTransformer Model

Delivery Semantics

Platform Architecture

The guarantees a messaging system provides regarding how many times a message may be delivered and under what failure conditions. In HexxLock context, delivery semantics are selected based on risk tolerance, audit needs, and idempotency design.

Related terms:At-Least-Once DeliveryAt-Most-Once Delivery

Demand Forecasting

Operations & Governance

Estimating future demand to align inventory, staffing, and capacity with expected load.

Related terms:Capacity PlanningResource Allocation

Dependency Graph

Platform Architecture

A representation of component dependencies, including runtime calls and data flows. It is used to assess change impact, identify critical paths, and understand failure propagation risks.

Related terms:Change Impact AnalysisFailure Domain

Dependency Pinning

Platform Architecture

The practice of fixing dependency versions to prevent unreviewed changes from entering runtime environments. It supports reproducibility and reduces supply-chain and compatibility risks.

Related terms:Runtime Compatibility MatrixSoftware Bill of Materials (SBOM)

Deployment Canary

Deployment & Integration

Rolling out a new version to a small slice of users first, monitoring for issues before broad release, with fast rollback if needed.

Related terms:Traffic Mirroring (Shadowing)Feature Flagging

Deployment Topology

Platform Architecture

The arrangement of services, nodes, networks, and dependencies in a target environment. It defines where workloads run, how traffic flows, and which failure domains are shared or isolated.

Related terms:Network SegmentationFailure Domain

Deprecation Policy

Platform Architecture

A formal approach for retiring APIs, features, or contracts with defined timelines and compatibility commitments. It reduces operational risk by making lifecycle changes predictable and auditable.

Related terms:API VersioningBackward-Compatible Change

Desired State

Platform Architecture

A declarative specification of how a system should look and behave, including configuration and resource intent. It is used by controllers to converge runtime state toward an approved target.

Related terms:Reconciliation LoopConfiguration Baseline

Deterministic Identifier

Platform Architecture

An identifier derived from input content or stable attributes, producing the same ID for the same input. It supports deduplication and consistent referencing but requires careful collision and privacy considerations.

Related terms:Global Identifier StrategyDeduplication Key

DevSecOps

Security & Compliance

Embedding security practices into the software delivery lifecycle with automated checks, policy gates, and secure defaults.

Related terms:SAST (Static Application Security Testing)DAST (Dynamic Application Security Testing)

Digital Forensics

Security & Compliance

Acquisition and analysis of digital evidence to determine incident root cause, scope, and support legal or regulatory action.

Related terms:Incident ResponseAudit Logging

Digital Rights Protection

Responsible AI

Safeguards within AI systems to respect privacy, non-discrimination, and other fundamental digital rights.

Related terms:Consent ManagementAlgorithmic Accountability

Digital Signature

Security & Compliance

A cryptographic mechanism that ensures authenticity, integrity, and non-repudiation of digital messages or documents.

Related terms:Public Key Infrastructure (PKI)Man-in-the-Middle (MitM) Defense

Digital Twin

Operations & Governance

A virtual representation of a system updated by real data to simulate scenarios and optimize operations without affecting production.

Related terms:Workflow OrchestrationProcess Optimization

Dimensionality Reduction

AI & Intelligence

Reducing feature space while preserving important structure to improve efficiency, interpretability, and visualization.

Related terms:ClusteringVector Embedding

Disaster Recovery

Platform Architecture

The processes and architecture enabling restoration of services and data after a major outage or catastrophic event. It includes recovery procedures, replication strategies, and validated failover paths.

Related terms:Recovery Time Objective (RTO)Recovery Point Objective (RPO)

Distributed Architecture

Platform ArchitectureDeployment & Integration

A design where components operate across multiple nodes to improve resilience and scalability.

Related terms:Operational Resilience

Distributed Compute Mesh

Deployment & Integration

A topology that distributes compute workloads dynamically across nodes, clusters, or regions to place processing near data sources and users for resilience and low latency.

Related terms:Multi-Cluster OrchestrationTraffic Steering

Distributed Lock

Platform Architecture

A coordination mechanism that enforces mutual exclusion across multiple nodes. It is used to protect critical sections but must be designed to handle timeouts, failures, and partial connectivity.

Related terms:LeaseConsensus Protocol

Distributed Tracing

Platform Architecture

A technique for tracking a request as it traverses multiple services, capturing timing and dependency relationships. It helps identify latency sources and failure points in multi-service workflows.

Related terms:Correlation IDObservability Stack

DNS-Based Service Discovery

Platform Architecture

A discovery approach that uses DNS records to resolve service endpoints and routing targets. It is commonly used for portability and compatibility across infrastructure environments.

Related terms:Service DiscoveryIngress Controller

Domain Model

Platform Architecture

A structured representation of domain concepts, relationships, and invariants used by a system. In HexxLock context, it supports consistent reasoning across platform services and governance controls.

Related terms:Bounded ContextData Contract

Drift Detection

Platform Architecture

The monitoring and comparison process used to identify configuration drift and unauthorized changes. It supports governance by enabling timely remediation and audit reporting.

Related terms:Configuration BaselineAudit Log Pipeline

Dual-Use Assessment

Responsible AI

Evaluating whether an AI capability intended for beneficial use could be repurposed for harm, and defining controls accordingly.

Related terms:Algorithmic Impact AssessmentMisuse Detection

Dual Write

Platform Architecture

A transition technique where writes are performed to both old and new systems or schemas during migration. It reduces cutover risk but requires careful handling of consistency and failure modes.

Related terms:Schema MigrationConsistency Boundary
E

Edge Caching

Deployment & Integration

Storing data or responses at the network edge to reduce latency and bandwidth to core services for distributed users.

Related terms:Content Delivery Network (CDN)Traffic Steering

Edge Inference

AI & Intelligence

Running AI models on edge devices to reduce latency and bandwidth dependence, enabling real-time decisions in constrained environments.

Related terms:Model QuantizationFederated Learning

Edge Node

Platform Architecture

A compute or gateway node deployed near data sources or operational environments to reduce latency and support constrained connectivity. It may provide local processing, buffering, or policy enforcement.

Related terms:Data PlaneNetwork Boundary

Edge Synchronization Pipeline

Deployment & Integration

A transport workflow that reliably moves telemetry and state between edge devices and core systems, handling intermittent connectivity, buffering, and conflict resolution.

Related terms:Offline-First ArchitectureManaged Identity

Egress Control

Platform Architecture

The controls and policies governing outbound network connections from services to external destinations. It reduces exposure risk by restricting where workloads can connect and under what conditions.

Related terms:Network SegmentationPolicy Plane

ELT (Extract, Load, Transform)

Data & Infrastructure

A data integration approach where raw data is loaded first and transformed in-place using the target platform’s compute. It leverages flexible schema-on-read and reduces upfront modeling constraints.

Related terms:Data LakeSchema-on-Read

Encryption at Rest

Security & Compliance

Protecting stored data with cryptography so that unauthorized access to media does not expose plaintext content.

Related terms:Cryptographic Key ManagementTrusted Platform Module (TPM)

Encryption in Transit

Security & Compliance

Protecting data while it moves between systems using secure transport protocols to ensure confidentiality and integrity.

Related terms:Man-in-the-Middle (MitM) DefensePublic Key Infrastructure (PKI)

Endpoint Detection and Response (EDR)

Security & Compliance

Continuous endpoint monitoring with analytics and automated response to detect and contain suspicious activity on hosts.

Related terms:Intrusion Detection System (IDS)Endpoint Security

Endpoint Security

Security & Compliance

Protection of end-user devices through hardening, monitoring, and response to prevent exploitation as entry points.

Related terms:Endpoint Detection and Response (EDR)Zero-Trust Architecture

Ensemble Learning

AI & Intelligence

Combining multiple models to improve predictive performance and robustness, reducing variance versus single models.

Related terms:Random ForestBoosting

Enterprise Architecture

Operations & Governance

Aligning business strategy with technology, processes, and information models to guide change and execution.

Related terms:Strategic PlanningPortfolio Management

Enterprise Resource Planning (ERP)

Operations & Governance

An integrated platform that unifies core processes such as finance, HR, manufacturing, and supply chain into a single system with a shared source of truth.

Related terms:Lifecycle ManagementFinancial Reconciliation

Environment Promotion

Platform Architecture

A controlled process for advancing artifacts and configurations through environments such as development, staging, and production. It enforces consistency by reusing the same artifact with environment-specific controls and approvals.

Related terms:Release TrainArtifact Repository

Ephemeral Environment

Deployment & Integration

On-demand, short-lived test environments per branch or change, created and torn down automatically to isolate validation.

Related terms:CI/CD PipelineFeature Flagging

Epoch

AI & Intelligence

One complete pass over the training dataset during model training; multiple epochs iteratively reduce loss.

Related terms:Model TrainingLoss Function

Ethical AI Framework

Responsible AI

Principles and operational rules defining acceptable AI behaviors and boundaries, prioritizing safety, privacy, and societal impact.

Related terms:AI Ethics CommitteeValue Alignment

Ethical Safeguards

Responsible AISecurity & Compliance

Controls designed to prevent misuse, bias, or unethical outcomes in intelligent systems.

Related terms:Human-in-the-Loop

ETL (Extract, Transform, Load)

Data & Infrastructure

A data integration approach where source data is extracted, transformed into a curated structure, and loaded into an analytical store. It emphasizes schema-on-write and upfront standardization.

Related terms:Data WarehouseData Modeling

Event Bus

Platform Architecture

A shared backbone for distributing events to multiple consumers using publish/subscribe patterns. It supports scalable fan-out and consistent event routing policies across the platform.

Related terms:Event-Driven ArchitectureMessage Ordering Guarantee

Event-Driven Architecture

Platform Architecture

An architectural approach where system state changes are communicated as events. It enables loose coupling and supports scalable, reactive integration between components.

Related terms:Event BusEvent Sourcing

Event Ingestion Node

Deployment & Integration

A dedicated entry point for high-throughput collection of logs, metrics, and event streams, providing buffering and initial normalization into the data fabric.

Related terms:Log AggregationMessage Broker

Event Sourcing

Platform Architecture

A persistence approach where system state is derived from an append-only log of events rather than overwriting current values. It supports traceability and reconstruction of state at any point in time.

Related terms:Audit Log PipelineCommand Query Responsibility Segregation (CQRS)

Eventual Consistency

Platform Architecture

A consistency model where replicas converge over time and reads may temporarily observe older state. It is often used for scalability and resilience but requires explicit handling of temporary divergence.

Related terms:Stale ReadConflict Resolution Policy

Evidence-Based Governance

Operations & GovernanceResponsible AI

A governance approach where actions and policies are supported by traceable data and documented reasoning.

Related terms:AuditabilityGovernance Framework

Exactly-Once Processing

Platform Architecture

A processing objective where the effect of handling a message occurs exactly once, even if delivery may repeat. In practice, it is achieved through transactional patterns, idempotency keys, and careful state management.

Related terms:Idempotency KeyOutbox Pattern

Expert System

AI & Intelligence

A rules- or knowledge-based system that emulates expert decision-making, relying on encoded rules rather than statistical models.

Related terms:Automated ReasoningInference Engine

Explainability

Responsible AIAI & Intelligence

The capability of systems to provide understandable explanations for their outputs and behavior.

Related terms:Reasoning TraceEthical Safeguards
F

F1 Score

AI & Intelligence

The harmonic mean of precision and recall, balancing false positives and false negatives in imbalanced settings.

Related terms:Precision and RecallClassification

Face Recognition

AI & Intelligence

Biometric identification by matching facial features against enrolled templates for access control or verification.

Related terms:Computer VisionObject Detection

Failover

Platform Architecture

A mechanism that redirects service operation from a failed component to a standby or alternate component. It can be automated or manual and must be designed to avoid data inconsistency and split-brain states.

Related terms:Active-Passive DeploymentHealth Check Endpoint

Fail-Safe Mechanism

Responsible AI

Design features that default AI systems to safe, non-active states when confidence is low or critical errors occur.

Related terms:Safety GuardrailsMisuse Detection

Failure Domain

Platform Architecture

A scope within which a single fault can affect multiple components, such as a node, rack, availability zone, or region. Architecture aims to limit shared failure domains for critical workloads.

Related terms:Blast RadiusBulkhead Isolation

Fairness Metrics

Responsible AI

Quantitative measures used to detect disparate outcomes across groups and validate equitable model behavior.

Related terms:Model Fairness TestingCounterfactual Fairness

Feature Engineering

AI & Intelligence

Creating and selecting informative variables from raw data to improve model performance using domain knowledge and validation.

Related terms:Data PipelineModel Training

Feature Flag

Platform Architecture

A mechanism that enables or disables functionality at runtime without redeploying code. It supports safe rollout, staged testing, and controlled exposure of changes.

Related terms:Canary DeploymentRelease Train

Feature Store

Data & Infrastructure

A managed repository for creating, versioning, and serving machine learning features consistently across training and inference. It reduces feature drift by providing a single authoritative source.

Related terms:Data QualityData Pipeline

Federated Learning

AI & Intelligence

Training models across distributed devices or sites without centralizing raw data, improving privacy and reducing data movement.

Related terms:Edge InferenceData Residency

Feedback Loop Management

Responsible AI

Collecting and filtering user feedback for model updates while preventing data poisoning or misuse of correction signals.

Related terms:Model Retraining PolicyIncident Reporting System

Few-Shot Learning

AI & Intelligence

Adapting models to tasks with a small number of labeled examples, important where annotated data is scarce.

Related terms:Zero-Shot LearningTransfer Learning

Financial Reconciliation

Operations & Governance

Aligning operational transactions with financial records to ensure accuracy and detect discrepancies.

Related terms:Enterprise Resource Planning (ERP)Cost-Benefit Analysis

Fine-Tuning

AI & Intelligence

Adapting a pre-trained model to a narrower domain or task with additional labeled data, speeding delivery of domain-specific capability.

Related terms:Transfer LearningModel Registry

Forward Compatibility

Platform Architecture

A property where older components can tolerate newer data or interface versions without failing. It typically relies on optional fields, tolerant parsers, and conservative schema evolution rules.

Related terms:Schema EvolutionAPI Versioning

Fuzzy Logic

AI & Intelligence

A logic system allowing truth values between 0 and 1 to model partial truths where binary logic is too rigid.

Related terms:Bayesian InferenceAutomated Reasoning
G

Generative AI

AI & Intelligence

AI techniques that create new content such as text, images, audio, or code based on learned patterns, guided by prompts and grounding.

Related terms:Transformer ModelRetrieval-Augmented Generation (RAG)

Genetic Algorithm

AI & Intelligence

An optimization method inspired by natural selection, evolving candidate solutions across generations for complex search spaces.

Related terms:OptimizationSwarm Intelligence

GitOps

Deployment & Integration

Operating infrastructure and applications from Git as the single source of truth, with automated reconciliation to apply versioned changes safely.

Related terms:Infrastructure as Code (IaC)Policy as Code

Global Identifier Strategy

Platform Architecture

A defined approach for generating unique identifiers across distributed components and environments. It influences ordering, sharding, traceability, and the ability to safely merge or replicate data.

Related terms:Deterministic IdentifierSharding

Global Traffic Management

Deployment & Integration

Distributing DNS and user traffic across regions based on availability, performance, and geography to improve resilience and latency.

Related terms:Traffic SteeringGeo-Replication

Golden Image

Platform Architecture

A standardized, pre-approved machine or container image used as a base for deployments. It supports consistency, reduces variance, and provides a controlled starting point for hardening and compliance validation.

Related terms:Immutable InfrastructureSupply Chain Security

Golden Image Pipeline

Deployment & Integration

Automated creation of hardened, tested base images for VMs or containers to ensure every instance meets security and operational standards.

Related terms:Immutable InfrastructureArtifact Signing

Governance Board

Operations & Governance

A body providing oversight and direction to ensure initiatives align with strategic objectives and stakeholder interests.

Related terms:Accountability FrameworkStrategic Alignment

Governance Framework

Operations & Governance

A structured set of rules and processes guiding accountability and decision-making.

Related terms:Policy GatesEvidence-Based Governance

Graceful Degradation

Deployment & Integration

Designing systems to reduce functionality instead of failing completely under stress, preserving core operations during faults.

Related terms:Fail-Safe MechanismTraffic Steering

Graceful Shutdown

Platform Architecture

A controlled termination process where a service releases resources and completes in-flight operations before exiting. It prevents partial work, data corruption, and abrupt client failures during lifecycle events.

Related terms:Connection DrainingReadiness Probe

Gradient Descent

AI & Intelligence

An iterative optimization algorithm that updates model parameters to minimize loss, foundational for training neural networks.

Related terms:Loss FunctionEpoch

GRC (Governance, Risk, and Compliance)

Operations & Governance

An integrated approach to align governance, risk management, and compliance activities with organizational objectives.

Related terms:Compliance GovernanceRisk Management

Ground Truth

AI & Intelligence

Authoritative labels or observations used as the benchmark for training and validation, anchoring model accuracy and drift detection.

Related terms:Validation SetData Labeling
H

Hardware Root of Trust

Platform Architecture

A hardware-based trust anchor used to securely store keys and validate system integrity. It underpins secure boot, attestation, and cryptographic key protection models.

Related terms:Secure Boot ChainKey Management Service (KMS)

Health Check Endpoint

Platform Architecture

A defined interface that reports service health status for monitoring and orchestration. It supports automated detection of failures and controlled traffic routing decisions.

Related terms:Readiness ProbeLiveness Probe

Hedged Requests

Platform Architecture

A latency mitigation technique that sends a secondary request after a delay if the primary request is slow. It can reduce tail latency but must be used with care to avoid increasing load and duplication side effects.

Related terms:Timeout BudgetBackpressure

High Availability

Platform Architecture

A design objective to keep services accessible despite component failures. It typically uses redundancy, failover mechanisms, and health-based traffic routing.

Related terms:Multi-Region ArchitectureFailover

Honeypot

Security & Compliance

A decoy resource designed to attract attackers and gather intelligence without exposing production systems.

Related terms:Threat HuntingIntrusion Detection System (IDS)

Horizontal Scalability

Platform Architecture

The ability to increase capacity by adding more instances rather than increasing the size of a single instance. It requires designs that support distribution, coordination, and consistent routing behavior.

Related terms:Stateless ServiceLoad Balancer

Human-Centered Design (HCD)

Responsible AI

Designing AI systems around user needs, limits, and values to ensure usability, clarity, and respect for human autonomy.

Related terms:Stakeholder EngagementValue Sensitive Design

Human-in-the-Loop

Responsible AIOperations & Governance

A governance model requiring human oversight or approval for automated or AI-assisted decisions.

Related terms:Autonomous DecisioningEthical Safeguards

Hybrid Connectivity

Deployment & Integration

Secure networking that links on-premises environments with cloud resources using VPNs or dedicated links, extending private networks to the cloud.

Related terms:VPC PeeringBastion Host

Hyperparameter Tuning

AI & Intelligence

Selecting hyperparameters to balance accuracy, stability, and efficiency, typically using held-out evaluation to avoid overfitting.

Related terms:Validation SetLoss Function
I

Idempotency

Platform Architecture

A property of an operation where repeated execution with the same input yields the same outcome. It is critical for safe retries in distributed systems where duplicate requests may occur.

Related terms:Retry PolicyExactly-Once Processing

Idempotency Key

Platform Architecture

A client- or system-provided token that allows an operation to be safely retried without creating duplicate effects. It is used at service boundaries to enforce idempotent behavior for non-idempotent actions.

Related terms:Exactly-Once ProcessingIdempotency

Identity and Access Management (IAM)

Security & Compliance

Policies and technologies to manage digital identities and entitlements, ensuring the right access for the right users at the right time.

Related terms:Role-Based Access Control (RBAC)Identity Federation

Identity Federation

Security & Compliance

Allowing users to access multiple domains or organizations with a single identity through trust relationships and SSO protocols.

Related terms:Identity and Access Management (IAM)Public Key Infrastructure (PKI)

Identity Provider Integration

Platform Architecture

The integration of platform authentication with an external identity provider using standardized protocols. It enables centralized identity lifecycle management and consistent access control enforcement.

Related terms:Zero Trust SegmentationIngress Controller

Image Segmentation

AI & Intelligence

Partitioning an image into regions to delineate object boundaries and classes, critical for precise visual understanding.

Related terms:Object DetectionComputer Vision

Immutable Configuration

Platform Architecture

A practice where configuration changes are applied through new releases rather than in-place edits on running systems. It improves traceability by ensuring every configuration change is versioned and deployable.

Related terms:Immutable InfrastructureConfiguration Management

Immutable Infrastructure

Platform Architecture

An approach where infrastructure components are replaced rather than modified in place. It improves predictability by ensuring updates are applied through rebuild and redeploy processes.

Related terms:Immutable ConfigurationInfrastructure as Code (IaC)

Inbox Pattern

Platform Architecture

A pattern where incoming messages are recorded and deduplicated before processing. It supports idempotent consumption and protects workflows from duplicate deliveries in asynchronous systems.

Related terms:Outbox PatternIdempotency

Incident Management

Operations & Governance

A lifecycle for detecting, triaging, containing, and resolving operational disruptions to minimize downtime and impact.

Related terms:Crisis ManagementRoot Cause Analysis (RCA)

Incident Response

Security & Compliance

A structured approach to contain, eradicate, and recover from security incidents while limiting impact and improving resilience.

Related terms:Business Continuity Planning (BCP)Digital Forensics

Inference Engine

AI & Intelligence

The component that executes trained models or rules to generate outputs, optimized for latency, throughput, and policy-compliant execution.

Related terms:Model QuantizationEdge Inference

Infrastructure as Code (IaC)

Platform Architecture

The practice of defining infrastructure using versioned, executable specifications. It supports repeatable environment creation and auditable change management.

Related terms:Immutable InfrastructureConfiguration Baseline

Ingress Controller

Platform Architecture

A component that manages inbound traffic routing into a cluster or service boundary. It typically handles TLS termination, routing rules, and external-to-internal traffic policies.

Related terms:API GatewayEgress Control

In-Memory Database (IMDB)

Data & Infrastructure

A database that keeps primary data in RAM to deliver ultra-low latency for reads and writes. It is often used for caching, session state, or high-speed analytics where disk latency is unacceptable.

Related terms:Cache LayerStateless Service

Insider Threat

Security & Compliance

Risk posed by individuals with authorized access who intentionally or unintentionally compromise security. Detection relies on monitoring behavior and access patterns.

Related terms:Data Loss Prevention (DLP)Audit Logging

Integration Fabric

Deployment & Integration

A unified integration layer that links internal systems, partner APIs, and legacy platforms into an event-driven backbone, normalizing data and enforcing governance across endpoints.

Related terms:Protocol GatewaySchema Governance

Integration Layer

Platform Architecture

A set of mechanisms and services enabling controlled connectivity between internal components and external systems. It standardizes protocols, transformations, and error-handling patterns for interoperability.

Related terms:API GatewayProtocol Translation

Intelligent Fabric

Platform ArchitectureOperations & GovernanceData & Infrastructure

Unified architectural layer that connects systems, data, security, and operations into a single coherent operational environment.

Related terms:Operational ResilienceSecure Compute

Intended Use Policy

Responsible AI

Formal definition of allowed scenarios and constraints for an AI system to prevent misuse or off-scope deployment.

Related terms:Transparency ReportsAutomated Decision Review

Interface Contract

Platform Architecture

A precise specification of inputs, outputs, behaviors, and error semantics for a component interface. It enables independent evolution of services while supporting verification through testing and governance review.

Related terms:Contract TestingAPI Versioning

Internal Control

Operations & Governance

Processes and rules that ensure reliable operations, accurate reporting, and compliance with laws and policies.

Related terms:Segregation of Duties (SoD)Compliance Reporting

Intrusion Detection System (IDS)

Security & Compliance

Monitoring of networks or hosts for malicious activity or policy violations with alerting for human or automated response.

Related terms:Endpoint Detection and Response (EDR)SIEM (Security Information and Event Management)
J

Just-in-Time (JIT) Access

Security & Compliance

Granting privileged access only for the specific task duration needed, reducing risks from standing privileges.

Related terms:Least Privilege PrincipleIdentity and Access Management (IAM)
K

Key Management Service (KMS)

Platform Architecture

A service that generates, stores, rotates, and controls access to cryptographic keys. It provides centralized enforcement of key usage policies and auditing for cryptographic operations.

Related terms:Secrets ManagementHardware Root of Trust

Key Performance Indicator (KPI)

Operations & Governance

Quantifiable metrics used to measure progress toward objectives, providing operational visibility and accountability.

Related terms:Objectives and Key Results (OKR)Performance Monitoring

Knowledge Distillation

AI & Intelligence

Training a smaller student model to match a larger teacher model’s behavior, compressing capability for faster, lighter deployment.

Related terms:Model QuantizationEdge Inference

Knowledge Graph

AI & Intelligence

A graph of entities and relationships used to improve context, inference, and search quality, supporting grounding and retrieval tasks.

Related terms:Reasoning GraphSemantic Search

Knowledge Management

Operations & Governance

Creating, sharing, and maintaining organizational knowledge to support consistent decisions and faster onboarding.

Related terms:Standard Operating Procedure (SOP)Continuous Improvement

Kubernetes Namespace

Platform Architecture

A logical partitioning mechanism used to isolate resources, policies, and quotas within a Kubernetes cluster. It supports multi-team or multi-tenant operational separation.

Related terms:Network SegmentationResource Quota
L

Lamport Timestamp

Platform Architecture

A logical clock technique that provides an ordering of events across distributed systems without relying on wall-clock time. It supports consistent sequencing for coordination and replication logic.

Related terms:Vector ClockConsensus Protocol

Last-Write-Wins (LWW)

Platform Architecture

A conflict resolution approach that chooses the update with the latest timestamp or sequence as authoritative. It is simple but requires careful consideration of clock skew and potential loss of legitimate concurrent updates.

Related terms:Conflict Resolution PolicyClock Skew

Latency Budget

Deployment & Integration

Allocated maximum latency for an operation or hop, used to design and monitor integrations against performance targets.

Related terms:SLATraffic Steering

Lateral Movement

Security & Compliance

Techniques adversaries use to pivot across systems after initial access, seeking higher-value assets. Detection is key to containment.

Related terms:Micro-segmentationEndpoint Detection and Response (EDR)

Leader Election

Platform Architecture

A coordination mechanism that selects a single node to act as a leader for a given responsibility. It ensures that certain actions are executed once and avoids conflicting concurrent control decisions.

Related terms:Consensus ProtocolSplit-Brain

Leader-Follower Replication

Platform Architecture

A replication model where a leader processes writes and followers apply replicated changes. It supports predictable write ordering but requires robust leader selection and failover controls.

Related terms:Consensus ProtocolQuorum

Lease

Platform Architecture

A time-bounded authorization to hold a lock or role, requiring renewal to remain valid. Leases reduce indefinite lock retention and support recovery when a holder becomes unavailable.

Related terms:Distributed LockTimeout Budget

Least Privilege Principle

Security & Compliance

Restricting identities to only the access required to perform specific duties, reducing the blast radius of compromised accounts.

Related terms:Role-Based Access Control (RBAC)Just-in-Time (JIT) Access

Legacy Bias Correction

Responsible AI

Techniques to remove or neutralize historical biases in datasets before they are used for model training.

Related terms:Bias AuditingFairness Metrics

Legacy Modernization

Operations & Governance

Updating or replacing outdated systems to improve efficiency, security, and scalability while aligning with current business needs.

Related terms:Enterprise ArchitectureChange Management

Legacy System Adapter

Deployment & Integration

An integration component that bridges modern services with mainframe or monolithic ERPs, translating protocols and data structures to extend legacy investments.

Related terms:Protocol GatewayIntegration Fabric

Lifecycle Management

Operations & Governance

Managing assets or products from inception through retirement, covering planning, deployment, maintenance, and disposal.

Related terms:Asset ManagementChange Management

Liveness Probe

Platform Architecture

A check that determines whether a service is still functioning and should remain running. It enables orchestration systems to restart unhealthy instances based on defined criteria.

Related terms:Health Check EndpointRuntime Isolation

Load Balancer

Platform Architecture

A component that distributes incoming traffic across multiple service instances based on defined algorithms and health signals. It improves availability and utilization by avoiding single-instance dependency and enabling controlled failover.

Related terms:Traffic Routing PolicySession Affinity

Load Shedding

Platform Architecture

A controlled degradation technique that intentionally drops or rejects some requests when the system is overloaded. It preserves core functionality and prevents total service collapse.

Related terms:BackpressureCapacity Envelope

Log Aggregation

Deployment & Integration

Collecting and centralizing logs from distributed services for troubleshooting, auditing, and analytics.

Related terms:Event Ingestion NodeObservability Stack

Log Aggregation Pipeline

Platform Architecture

A standardized path for collecting and centralizing logs from distributed components. It enables search, correlation, retention policy enforcement, and incident analysis.

Related terms:Observability StackStructured Logging

Loss Function

AI & Intelligence

A metric quantifying error between predictions and true values, guiding optimization during training.

Related terms:Gradient DescentValidation Set
M

Managed Identity

Deployment & Integration

Service-level identities issued and rotated by the platform so services authenticate to each other without embedded credentials.

Related terms:Secrets ManagementIdentity Federation

Management Plane

Platform Architecture

The operational layer responsible for monitoring, administration, diagnostics, and maintenance workflows. It provides visibility and control without directly participating in primary runtime execution.

Related terms:Observability StackControl Plane

Man-in-the-Middle (MitM) Defense

Security & Compliance

Controls like mutual TLS that prevent interception and alteration of communications by an intermediary.

Related terms:Encryption in TransitPublic Key Infrastructure (PKI)

Master Data Management (MDM)

Data & Infrastructure

Practices and systems that create a single, authoritative record for core entities like customers or products. It reduces duplication and ensures consistent reference data across systems.

Related terms:Data QualityData Governance

Message Acknowledgement

Platform Architecture

A mechanism by which a consumer signals successful handling of a message. Acknowledgement behavior directly affects delivery semantics and determines whether messages can be redelivered after failures.

Related terms:Delivery SemanticsRetry Policy

Message Broker

Platform Architecture

An intermediary system that enables asynchronous communication through queues or topics. It decouples producers and consumers and supports controlled delivery semantics.

Related terms:Event BusDelivery Semantics

Message Ordering Guarantee

Platform Architecture

A defined assurance about the order in which messages are delivered or processed. Ordering constraints influence partitioning design, consumer parallelism, and how state transitions are validated.

Related terms:Event BusData Partitioning

Metadata Management

Data & Infrastructure

Processes and tooling to organize technical, business, and operational metadata. It enables lineage, impact analysis, and effective search within catalogs and pipelines.

Related terms:Data CatalogData Governance

Metrics Pipeline

Platform Architecture

The collection, processing, and storage path for quantitative telemetry such as counters, gauges, and histograms. It supports alerting and capacity analysis using time-series measurements.

Related terms:Observability StackLog Aggregation Pipeline

Micro-segmentation

Security & Compliance

Granular network segmentation down to workload level with tailored policies to limit lateral movement after compromise.

Related terms:Zero-Trust ArchitectureNetwork Hardening

Middleware

Deployment & Integration

Software that provides common services—data access, auth, messaging—between applications and infrastructure to ease integration.

Related terms:Integration FabricMessage Broker

Mission Assurance

Operations & Governance

Ensuring critical capabilities perform as intended under adverse conditions through disciplined engineering and operations.

Related terms:Risk ManagementOperational Readiness

Mission-Critical Operations

Operations & GovernanceSecurity & Compliance

Operational environments where availability, accuracy, and security are essential and failures may have severe consequences.

Related terms:Operational Resilience

Misuse Detection

Responsible AI

Real-time monitoring to identify and block attempts to use AI systems for prohibited or harmful purposes.

Related terms:Safety GuardrailsRed Teaming

MLOps (Machine Learning Operations)

AI & Intelligence

Practices that operationalize machine learning across training, deployment, and monitoring, integrating CI/CD, observability, and governance.

Related terms:Model RegistryModel Drift

Model Card

Responsible AI

A standardized document describing a model’s inputs, outputs, performance, and limitations to improve transparency and governance.

Related terms:Transparency ReportsModel Fairness Testing

Model Drift

AI & Intelligence

Degradation of model performance as production data diverges from training data, requiring monitoring and retraining to sustain accuracy.

Related terms:Concept DriftContinuous Learning

Model Fairness Testing

Responsible AI

Systematic evaluation of model outputs against fairness criteria using diverse datasets to detect discrimination.

Related terms:Fairness MetricsBias Auditing

Model Quantization

AI & Intelligence

Reducing numeric precision of model parameters to shrink size and improve inference speed with minimal accuracy loss for edge or low-latency deployments.

Related terms:Edge InferenceKnowledge Distillation

Model Registry

AI & Intelligence

A controlled repository for models, versions, metadata, and lineage to track production deployments and support rollback.

Related terms:MLOps (Machine Learning Operations)Model Drift

Model Retraining Policy

Responsible AI

Guidelines for when and how models are updated, balancing freshness with risk of introducing bias or instability.

Related terms:Feedback Loop ManagementModel Fairness Testing

Model Training

AI & Intelligence

Fitting model parameters to data to minimize defined loss functions, with monitoring for overfitting and drift risks.

Related terms:EpochLoss Function

Model Watermarking

Responsible AI

Embedding signals in AI-generated content to identify it as machine-generated and trace its origin.

Related terms:Transparency ReportsMisuse Detection

Moral Reasoning Module

Responsible AI

A conceptual component that evaluates AI actions against defined ethical rules to constrain behavior in high-stakes contexts.

Related terms:Value AlignmentEthical AI Framework

Multi-Factor Authentication (MFA)

Security & Compliance

Requiring two or more independent authentication factors to verify identity, reducing risk from stolen credentials.

Related terms:Zero-Trust ArchitectureIdentity and Access Management (IAM)

Multi-Modal AI

AI & Intelligence

Systems that process multiple input types such as text, images, and audio concurrently to provide richer context.

Related terms:Vector EmbeddingTransformer Model

Multi-Region Architecture

Platform Architecture

A deployment architecture spanning multiple geographic regions to improve resilience and reduce localized outage risk. It requires explicit design for latency, data consistency, and failover behavior.

Related terms:Active-Active DeploymentNetwork Segmentation

Multi-Tenancy Model

Platform Architecture

The architectural approach for serving multiple tenants while defining boundaries for data, compute, and policy enforcement. It determines how isolation, scalability, and governance controls are implemented across tenants.

Related terms:Tenant IsolationResource Quota
N

Named Entity Recognition (NER)

AI & Intelligence

Identifying and classifying entities such as people, organizations, and locations in text to convert unstructured language into structured data.

Related terms:Natural Language Processing (NLP)Semantic Search

Natural Language Processing (NLP)

AI & Intelligence

AI techniques that enable systems to understand, generate, and transform human language for tasks such as extraction, summarization, and translation.

Related terms:Named Entity Recognition (NER)Semantic Search

Network Boundary

Platform Architecture

A segmentation boundary that limits connectivity between systems or components. It is used to enforce controlled paths for data and service calls, especially in constrained or regulated environments.

Related terms:Egress ControlIngress Controller

Network Hardening

Security & Compliance

Reducing network attack surface by disabling unnecessary services, closing unused ports, and enforcing secure configurations.

Related terms:Micro-segmentationDDoS Mitigation

Network Segmentation

Platform Architecture

A design practice that divides networks into isolated segments with controlled communication paths. It limits lateral movement and clarifies permitted interaction between platform components.

Related terms:Trust BoundaryZero Trust Segmentation

Neural Network

AI & Intelligence

An interconnected set of layers that learn representations from data, foundational to deep learning for vision, language, and signal tasks.

Related terms:Deep LearningGradient Descent

Node Pool

Platform Architecture

A group of compute nodes with shared characteristics such as hardware type, security posture, or scheduling constraints. It supports workload placement policies and separation of critical and non-critical workloads.

Related terms:Scheduling ConstraintTaints and Tolerations

NoSQL Database

Data & Infrastructure

A class of databases offering flexible schemas and horizontal scalability for varied data models. It is used for high-throughput or low-latency workloads where rigid schemas are impractical.

Related terms:Schema-on-ReadSharding
O

Object Detection

AI & Intelligence

Locating and classifying objects within images or video using bounding boxes to support counting, tracking, and spatial reasoning.

Related terms:Image SegmentationComputer Vision

Objectives and Key Results (OKR)

Operations & Governance

A framework for setting qualitative objectives and measurable results that align teams to strategic goals.

Related terms:Key Performance Indicator (KPI)Strategic Alignment

Observability Stack

Platform Architecture

The integrated set of tools and pipelines used to collect logs, metrics, traces, and context. It supports operational diagnosis and validation of platform behavior under real workloads.

Related terms:Metrics PipelineDistributed Tracing

Offline-First Architecture

Deployment & Integration

A design approach where applications operate fully without connectivity, synchronizing data once links are restored—critical for field and remote operations.

Related terms:Edge Synchronization PipelineCache Layer

Online Migration

Platform Architecture

A migration approach that changes data structures or storage formats while the system remains operational. It typically uses phased rollouts, dual reads or writes, and monitoring to maintain correctness during transition.

Related terms:Schema MigrationShadow Traffic

OpenTelemetry Instrumentation

Platform Architecture

The implementation of standardized telemetry collection for traces, metrics, and logs using OpenTelemetry conventions. It supports consistent observability across heterogeneous components.

Related terms:Observability StackDistributed Tracing

Operational Excellence

Operations & Governance

A leadership and execution mindset focused on continuous improvement, customer value, and efficient, defect-free operations.

Related terms:Continuous ImprovementQuality Assurance (QA)

Operational Intelligence

AI & IntelligenceOperations & Governance

Continuous analysis of real-time signals to provide situational awareness and decision support.

Related terms:TelemetryDecision Support System

Operational Readiness

Operations & Governance

Confirming that people, processes, and systems are prepared for go-live with validated procedures and support.

Related terms:Incident ManagementChange Management

Operational Resilience

Operations & GovernancePlatform Architecture

The ability to maintain operations under stress, failure, or unexpected conditions.

Related terms:Mission-Critical Operations

Operational Silo

Operations & Governance

A condition where teams or departments operate in isolation, impeding coordination and efficiency; governance seeks to reduce these barriers.

Related terms:Workflow OrchestrationKnowledge Management

Operator Pattern

Deployment & Integration

Extending Kubernetes with custom controllers to manage complex, stateful applications through declarative resources.

Related terms:Multi-Cluster OrchestrationInfrastructure as Code (IaC)

Optical Character Recognition (OCR)

AI & Intelligence

Converting images of text into machine-readable characters, enabling document ingestion and digitization pipelines.

Related terms:Computer VisionNatural Language Processing (NLP)

Orchestration Layer

Platform Architecture

A coordinating layer that manages sequencing, scheduling, and lifecycle of services or workloads. It ensures that deployment and runtime operations follow defined dependencies and policies.

Related terms:Reconciliation LoopControl Plane

Outbox Pattern

Platform Architecture

A pattern where events are written to an outbox table or log within the same transaction as the state change. It reduces the risk of publishing events that do not reflect committed state and supports reliable integration.

Related terms:Inbox PatternExactly-Once Processing

Overfitting

AI & Intelligence

When a model memorizes training noise rather than general patterns, leading to poor generalization on new data.

Related terms:Bias-Variance TradeoffValidation Set
P

Path Planning

AI & Intelligence

Computing feasible routes for autonomous agents given obstacles and constraints, balancing optimality with safety.

Related terms:Reinforcement LearningSwarm Intelligence

Pattern Recognition

AI & Intelligence

Automated identification of structures or regularities in data, underpinning detection, classification, and analytics workloads.

Related terms:Feature EngineeringClustering

Penetration Testing

Security & Compliance

Authorized simulated attacks to validate exploitability of vulnerabilities and measure potential impact beyond scanning results.

Related terms:Vulnerability AssessmentRisk Scoring

Performance Monitoring

Operations & Governance

Continuous tracking of KPIs to assess efficiency and effectiveness of systems, processes, and teams.

Related terms:Key Performance Indicator (KPI)Objectives and Key Results (OKR)

Platform Layering

Platform Architecture

A decomposition approach that organizes the platform into layers with clear responsibilities and allowed dependencies. It helps control complexity by preventing cross-cutting coupling and undefined interaction paths.

Related terms:Control PlaneData Plane

Platform Profile

Platform Architecture

A named set of constraints and defaults describing how the platform is configured for a specific environment class. In HexxLock context, profiles can capture different operational constraints such as isolated networks or restricted services.

Related terms:Configuration BaselineNetwork Segmentation

Pod Disruption Budget

Platform Architecture

A constraint that limits how many instances of a workload can be voluntarily disrupted at once. It protects availability during maintenance operations such as node upgrades and rolling changes.

Related terms:Rolling UpdateHigh Availability

Poison Message

Platform Architecture

A message that consistently causes processing failures due to malformed content, incompatible schema, or invalid business constraints. Poison messages are typically quarantined to protect system throughput and stability.

Related terms:Dead Letter Queue (DLQ)Schema Evolution

Policy as Code

Deployment & Integration

Defining and enforcing security and operational policies in code so CI/CD can automatically validate compliance before provisioning.

Related terms:GitOpsAutomated Compliance Checks

Policy-Driven Routing

Deployment & Integration

Routing decisions driven by identity, data sensitivity, or security policy to ensure compliant infrastructure handles specific workloads.

Related terms:Traffic SteeringIngress Controller

Policy Enforcement

Operations & Governance

Automated guardrails that ensure organizational rules and standards are applied consistently to actions and configurations.

Related terms:Change ManagementCompliance Governance

Policy Gates

Operations & GovernanceSecurity & Compliance

Control mechanisms that enforce rules and approvals before actions or deployments proceed.

Related terms:Compliance-by-DesignSecure Compute

Policy Plane

Platform Architecture

A logical plane where policies are defined, evaluated, and enforced across platform actions. It provides consistent decision points for authorization, compliance controls, and governance constraints.

Related terms:Architecture GovernancePolicy Gates

Polyglot Persistence

Deployment & Integration

Using multiple data storage technologies within a system to match data models to the most suitable store (graph, document, relational).

Related terms:Database Sharding StrategyData Partitioning

Portfolio Management

Operations & Governance

Managing a collection of projects or programs to balance risk, resources, and alignment with strategic goals.

Related terms:Objectives and Key Results (OKR)Program Management

Precision and Recall

AI & Intelligence

Evaluation metrics balancing correct positive predictions and coverage of true positives, used where false positives and negatives have different costs.

Related terms:F1 ScoreClassification

Predictive Analytics

AI & Intelligence

Using statistical and machine learning techniques to estimate future outcomes from historical data for forecasting, risk scoring, and anticipatory decisions.

Related terms:Regression AnalysisClassification

Primary-Replica Topology

Platform Architecture

A replication topology where one node accepts writes and replicas receive changes for read scaling or failover. It requires clearly defined promotion, failover, and consistency behavior.

Related terms:Read ReplicaFailover

Privacy Impact Assessment (PIA)

Responsible AI

Systematic analysis of privacy risks for new AI projects or updates to ensure compliance and mitigate harm.

Related terms:Data MinimizationConsent Management

Privacy-Preserving AI

Responsible AI

Techniques like differential privacy or federated learning that enable learning from data while limiting exposure of sensitive information.

Related terms:Data MinimizationSecure Multi-Party Computation

Private LLM (Large Language Model)

AI & Intelligence

A large language model deployed inside a controlled environment so sensitive data remains within organizational boundaries, often fine-tuned on proprietary terminology and processes.

Related terms:Retrieval-Augmented Generation (RAG)Model Registry

Private Service Endpoint

Platform Architecture

A network endpoint that allows access to a service over private connectivity rather than the public internet. It supports constrained environments and reduces exposure to external network threats.

Related terms:Egress ControlAir-Gapped Reference Architecture

Privilege Escalation

Security & Compliance

Exploiting flaws or misconfigurations to gain higher privileges than intended, often a precursor to broader compromise.

Related terms:Least Privilege PrincipleVulnerability Assessment

Process Optimization

Operations & Governance

Refining workflows to remove bottlenecks and improve speed, quality, or cost within defined constraints.

Related terms:Continuous ImprovementValue Stream Mapping

Procurement Strategy

Operations & Governance

Planning long-term sourcing to secure quality goods and services cost-effectively and on time while managing supplier risk.

Related terms:Vendor ManagementTotal Cost of Ownership (TCO)

Program Management

Operations & Governance

Coordinating related projects to deliver strategic benefits that individual projects cannot achieve alone.

Related terms:Portfolio ManagementStrategic Alignment

Prompt Engineering

AI & Intelligence

Designing and refining prompts to guide generative models toward accurate outputs with clear instructions and constraints.

Related terms:Chain-of-Thought PromptingRetrieval-Augmented Generation (RAG)

Protocol Gateway

Deployment & Integration

A bridge that translates between different network or messaging protocols to enable interoperability across heterogeneous systems.

Related terms:Integration FabricMessage Broker

Protocol Translation

Platform Architecture

The conversion of requests or messages between protocols, encodings, or interface styles. It is used to enable interoperability while preserving governance controls such as validation and observability.

Related terms:API GatewayIntegration Layer

Public Key Infrastructure (PKI)

Security & Compliance

The roles, policies, and systems for issuing, managing, and revoking digital certificates and keys to establish trusted communications.

Related terms:Cryptographic Key ManagementDigital Signature
Q

Quality Assurance (QA)

Operations & Governance

Systematic processes to ensure outputs meet defined requirements, emphasizing prevention over detection of defects.

Related terms:Standard Operating Procedure (SOP)Continuous Improvement

Query Engine

Data & Infrastructure

A component that parses, optimizes, and executes queries against underlying data stores. Its planner and execution model largely determine latency, cost, and concurrency behavior.

Related terms:Data VirtualizationData Warehouse

Quorum

Platform Architecture

The minimum number of nodes required to agree before an action is considered valid in a distributed system. It prevents split-brain behavior and supports consistent decision-making under partial failure.

Related terms:Consensus ProtocolFailure Domain
R

Random Forest

AI & Intelligence

An ensemble of decision trees that improves generalization by averaging diverse trees and reducing overfitting.

Related terms:Ensemble LearningDecision Tree

Ransomware Protection

Security & Compliance

Layered defenses to prevent, detect, and recover from ransomware, including immutable backups and heuristic detection.

Related terms:Data Loss Prevention (DLP)Endpoint Detection and Response (EDR)

Rate Limiting

Platform Architecture

A control that restricts the frequency of requests or operations within defined thresholds. It protects services from abuse, accidental overload, and uneven traffic patterns.

Related terms:API GatewayTraffic Routing Policy

Read-After-Write Consistency

Platform Architecture

A consistency guarantee where a client is able to read its own recent writes. It is important for user-facing correctness and certain governance workflows where immediate validation is required.

Related terms:Strong ConsistencyData Ownership

Readiness Probe

Platform Architecture

A check that determines whether a service is ready to receive traffic. It prevents premature routing to instances that are starting, recovering, or temporarily unavailable.

Related terms:Health Check EndpointRolling Update

Read Replica

Platform Architecture

A replicated data store used to serve read traffic separate from the primary write store. It improves read scalability but introduces replication lag and consistency considerations.

Related terms:Replication StrategyStale Read

Reasoning Graph

AI & Intelligence

A structured representation of entities, events, and rules that supports traceable deductions and explanations for AI-driven recommendations or automated decisions.

Related terms:Knowledge GraphChain-of-Thought Prompting

Reasoning Trace

Responsible AIAI & Intelligence

Metadata explaining how an AI system reached a specific conclusion or recommendation.

Related terms:ExplainabilityEvidence-Based Governance

Reconciliation Loop

Platform Architecture

A control pattern where a controller continuously compares actual system state with desired state and applies corrective actions. It is fundamental to declarative orchestration and automated recovery workflows.

Related terms:Desired StateActual State

Recovery Point Objective (RPO)

Platform Architecture

The maximum acceptable amount of data loss measured in time. It guides data replication and backup frequency decisions based on operational and governance requirements.

Related terms:Disaster RecoveryReplication Strategy

Recovery Time Objective (RTO)

Platform Architecture

The maximum acceptable time to restore service after an outage. It defines operational expectations and informs architecture choices such as redundancy and automated recovery.

Related terms:Disaster RecoveryFailover

Red Teaming

Responsible AI

Adversarial testing by experts to uncover safety gaps, misuse paths, or vulnerabilities before deployment.

Related terms:Robustness TestingResponsible Disclosure

Reference Architecture

Platform Architecture

A standardized architectural blueprint that defines baseline components, interfaces, and patterns for a class of systems. In HexxLock context, it is used to ensure consistent structure across deployments and solution variants.

Related terms:Target ArchitectureArchitecture Governance

Regression Analysis

AI & Intelligence

Estimating relationships between variables to predict continuous outcomes for forecasting and risk scoring.

Related terms:Predictive AnalyticsLoss Function

Regulatory Compliance

Operations & Governance

Adhering to applicable laws, regulations, and standards within operational processes to avoid penalties and ensure trust.

Related terms:Compliance ReportingRisk Management

Regulatory Sandbox

Responsible AI

A supervised environment to test AI technologies with regulators, enabling innovation while protecting users.

Related terms:Automated Compliance ChecksAlgorithmic Impact Assessment

Reinforcement Learning

AI & Intelligence

A learning paradigm where an agent optimizes actions via reward signals, widely used for control, robotics, and adaptive decision policies.

Related terms:Autonomous AgentPath Planning

Release Train

Platform Architecture

A scheduled and standardized cadence for releasing changes across a platform. It supports predictable coordination of dependencies, testing, and governance controls for multi-service systems.

Related terms:Feature FlagCanary Deployment

Remote Attestation

Security & Compliance

A cryptographic protocol for proving the integrity and configuration of a device or workload to a remote verifier before exchanging sensitive data.

Related terms:Trusted Platform Module (TPM)Attestation

Remote Procedure Call (gRPC)

Deployment & Integration

A high-performance RPC framework enabling clients to call server methods across services as if local, suited for microservice communication.

Related terms:Service DiscoveryProtocol Gateway

Replication Strategy

Platform Architecture

A defined approach for creating and maintaining copies of data across nodes or sites. It determines durability, read performance, and behavior during failures or network partitions.

Related terms:Disaster RecoveryRecovery Point Objective (RPO)

Request Timeout

Platform Architecture

A defined maximum duration for a request or operation before it is considered failed. Correct timeout design prevents resource exhaustion and supports predictable failure handling paths.

Related terms:Timeout BudgetCircuit Breaker

Resource Allocation

Operations & Governance

Assigning and adjusting resources—compute, storage, or staff—to align with operational and strategic priorities.

Related terms:Capacity PlanningStrategic Alignment

Resource Isolation

Platform Architecture

The enforcement of boundaries for CPU, memory, I/O, and network usage between workloads or tenants. It reduces noisy-neighbor effects and supports predictable performance under mixed workloads.

Related terms:Bulkhead IsolationResource Quota

Resource Quota

Platform Architecture

A constraint that caps the amount of resources a team, tenant, or namespace can consume. It prevents noisy-neighbor effects and enforces capacity planning boundaries.

Related terms:Kubernetes NamespaceCapacity Envelope

Resource Requests and Limits

Platform Architecture

Declared compute and memory expectations used by orchestration to schedule workloads and enforce isolation. They reduce resource contention by making capacity needs explicit and preventing uncontrolled consumption.

Related terms:Resource QuotaNode Pool

Responsible Disclosure

Responsible AI

Policies encouraging confidential reporting of AI safety or security flaws, allowing remediation before public disclosure.

Related terms:Red TeamingRobustness Verification

Retrieval-Augmented Generation (RAG)

AI & Intelligence

Grounding generative outputs by retrieving relevant context from knowledge bases before generation, reducing hallucinations and aligning responses with authoritative sources.

Related terms:Vector DatabaseSemantic Search

Retry Policy

Platform Architecture

A defined strategy for re-attempting failed operations, including limits, delays, and backoff behavior. It reduces transient failure impact while preventing amplification of outages through uncontrolled retries.

Related terms:Timeout BudgetCircuit Breaker

Right to Explanation

Responsible AI

The entitlement of individuals affected by automated decisions to receive a meaningful explanation of how those decisions were reached.

Related terms:Model CardTransparency Reports

Risk Management

Operations & Governance

Identifying, evaluating, and prioritizing risks, then applying controls to reduce their likelihood or impact.

Related terms:Compliance GovernanceBusiness Impact Analysis (BIA)

Robustness Testing

Responsible AI

Stress and edge-case evaluation to ensure models behave safely under unexpected or noisy conditions.

Related terms:Adversarial RobustnessRobustness Verification

Robustness Verification

Responsible AI

Formal or systematic proofs that a model behaves correctly within defined input bounds, used for safety-critical deployments.

Related terms:Robustness TestingAdversarial Robustness

Role-Based Access Control (RBAC)

Security & Compliance

An access model that assigns permissions to roles rather than individuals, ensuring users receive only the access required for their duties.

Related terms:Least Privilege PrincipleIdentity and Access Management (IAM)

Rolling Update

Platform Architecture

A deployment approach that replaces instances incrementally to avoid full downtime. It requires compatibility and health checks to maintain service continuity during update windows.

Related terms:Pod Disruption BudgetReadiness Probe

Root Cause Analysis (RCA)

Operations & Governance

A structured investigation to identify underlying causes of incidents or failures to prevent recurrence.

Related terms:Incident ManagementContinuous Improvement

Runtime Compatibility Matrix

Platform Architecture

A defined mapping of supported versions across runtimes, dependencies, and platform components. It is used to prevent unsupported combinations during deployment and to guide upgrade planning.

Related terms:Dependency PinningPlatform Profile

Runtime Isolation

Platform Architecture

The enforcement of separation between workloads to prevent interference and unauthorized access. It includes process/container isolation, resource controls, and policy-enforced boundaries.

Related terms:Service MeshTrusted Execution Environment (TEE)
S

Safety Guardrails

Responsible AI

Rule-based or secondary model safeguards that block harmful or policy-violating outputs, keeping AI actions within defined boundaries.

Related terms:Misuse DetectionFail-Safe Mechanism

Saga Pattern

Platform Architecture

A coordination pattern for distributed workflows where a sequence of local transactions is linked through compensating actions. It provides an alternative to distributed transactions in loosely coupled systems.

Related terms:Distributed LockEvent-Driven Architecture

SAST (Static Application Security Testing)

Security & Compliance

Analyzing source code or binaries for vulnerabilities before runtime to prevent exploitable flaws from reaching production.

Related terms:DevSecOpsVulnerability Assessment

Scheduling Constraint

Platform Architecture

Rules that influence where workloads are placed, based on labels, affinity, taints, or compliance requirements. In HexxLock context, scheduling constraints can enforce isolation and locality requirements for sensitive workloads.

Related terms:Node PoolTaints and Tolerations

Schema Evolution

Platform Architecture

The controlled process of changing data schemas over time while maintaining compatibility. It requires versioning rules, validation, and migration strategies to avoid breaking producers and consumers.

Related terms:Schema RegistryVersioned Contract

Schema Governance

Deployment & Integration

Managing data and API schemas with versioning and validation to prevent breaking changes across integrated systems.

Related terms:API ContractIntegration Fabric

Schema Migration

Platform Architecture

The controlled process of changing a data schema while preserving correctness and availability. It includes compatibility planning, validation, and rollback strategies to avoid service disruption.

Related terms:Schema EvolutionOnline Migration

Schema-on-Read

Data & Infrastructure

An approach where data structure is applied at query time rather than at ingest. It supports flexible exploration of raw data, especially in lakes and exploratory analytics.

Related terms:Data LakeELT (Extract, Load, Transform)

Schema-on-Write

Data & Infrastructure

An approach where data must conform to a defined schema before being stored. It promotes high data quality and predictable performance in warehouses and relational systems.

Related terms:Data WarehouseData Modeling

Schema Registry

Platform Architecture

A centralized service for managing and validating data or event schemas used across producers and consumers. It supports compatibility checks and reduces integration breakage during schema evolution.

Related terms:Data ContractSchema Evolution

Secrets Management

Platform Architecture

The controlled storage and distribution of sensitive values such as credentials and tokens. It reduces exposure risk by limiting plaintext usage and supporting rotation and access auditing.

Related terms:Key Management Service (KMS)Attestation

Secure Boot Chain

Platform Architecture

A sequence of verifications that ensure only trusted firmware and software are executed from boot onward. It provides a foundational trust mechanism for platform runtime integrity.

Related terms:Hardware Root of TrustAttestation

Secure Compute

Security & CompliancePlatform Architecture

A hardened execution environment enforcing isolation, encryption, access control, and auditability across workloads.

Related terms:AuditabilityPolicy Gates

Secure Configuration Management

Security & Compliance

Establishing and monitoring hardened baselines to prevent configuration drift that could introduce vulnerabilities.

Related terms:Configuration BaselineVulnerability Assessment

Secure Multi-Party Computation

Responsible AI

Cryptographic methods allowing multiple parties to compute jointly while keeping their inputs private, enabling collaborative AI without sharing raw data.

Related terms:Privacy-Preserving AIData Stewardship

Security Operations Center (SOC)

Security & Compliance

A centralized function combining people, processes, and technology to monitor, detect, investigate, and respond to security incidents.

Related terms:SIEM (Security Information and Event Management)SOAR (Security Orchestration, Automation, and Response)

Security Posture

Security & Compliance

The overall effectiveness and readiness of security controls, processes, and detection/response capabilities across the environment.

Related terms:Compliance GovernanceAttack Surface Management

Segregation of Duties (SoD)

Operations & Governance

Dividing key tasks among individuals so no single person controls all steps, reducing fraud and error risk.

Related terms:Least Privilege PrincipleAudit Trail

Self-Attention

AI & Intelligence

An attention mechanism that relates positions within a sequence to build contextualized representations, enabling long-range dependency capture.

Related terms:Transformer ModelAttention Mechanism

Semantic Search

AI & Intelligence

Search using meaning and context rather than exact keywords, often via embeddings, to retrieve conceptually related results.

Related terms:Vector EmbeddingRetrieval-Augmented Generation (RAG)

Semantic Versioning

Deployment & Integration

A versioning scheme (MAJOR.MINOR.PATCH) that signals compatibility expectations, aiding predictable rollout and integration management.

Related terms:API ContractCI/CD Pipeline

Semi-Supervised Learning

AI & Intelligence

Combining small labeled datasets with larger unlabeled datasets to improve performance where labels are scarce.

Related terms:Unsupervised LearningActive Learning

Sentiment Analysis

AI & Intelligence

Extracting subjective tone from text to classify attitudes or emotions for monitoring feedback, risk signals, or opinion trends.

Related terms:Natural Language Processing (NLP)Classification

Serverless Data Platform

Data & Infrastructure

A data architecture where compute and storage scale automatically with demand and the provider manages servers. It reduces operational overhead and aligns cost with consumption.

Related terms:ELT (Extract, Load, Transform)Query Engine

Service Boundary

Platform Architecture

The defined scope of responsibility for a service, including its data ownership and interface contract. Strong service boundaries reduce coupling and simplify evolution of the platform over time.

Related terms:Domain ModelAPI Gateway

Service Delivery

Operations & Governance

Managing how services are provided to customers to ensure consistent quality, reliability, and value.

Related terms:Service Level Agreement (SLA)Performance Monitoring

Service Discovery

Platform Architecture

A mechanism by which services locate each other dynamically at runtime. It supports resilient routing in environments where endpoints change due to scaling or failover.

Related terms:DNS-Based Service DiscoveryHealth Check Endpoint

Service Level Agreement (SLA)

Operations & Governance

A formal commitment defining expected service levels such as availability, response times, and throughput, used to manage quality and performance expectations.

Related terms:Performance MonitoringCompliance Reporting

Service Mesh

Platform Architecture

An infrastructure layer that provides service-to-service communication features such as mTLS, routing, and telemetry. It reduces application-level implementation of networking controls by standardizing them at runtime.

Related terms:Sidecar ProxyRuntime Isolation

Service Virtualization

Deployment & Integration

Simulating dependent services (APIs, DBs) so development and testing can proceed when real components are unavailable.

Related terms:Ephemeral EnvironmentCI/CD Pipeline

Session Affinity

Platform Architecture

A routing behavior that consistently directs a client’s requests to the same backend instance for a period of time. It is used when state or cache locality makes strict stateless routing impractical.

Related terms:Load BalancerStateful Service

Shadow IT Discovery

Security & Compliance

Identification of unapproved IT assets or services to close hidden exposure and align them with governance policies.

Related terms:Attack Surface ManagementCompliance Governance

Shadow Read

Platform Architecture

A technique where reads are executed against a secondary data path for comparison while continuing to serve results from the primary path. It is used during migrations or refactors to validate correctness without impacting operations.

Related terms:Shadow TrafficRead Replica

Shadow Traffic

Platform Architecture

A technique where production traffic is mirrored to a secondary system without affecting user-facing responses. It is used to validate behavior, performance, and compatibility of new components under real conditions.

Related terms:Shadow ReadCanary Deployment

Sharding

Platform Architecture

A partitioning approach where a dataset is split across multiple storage nodes based on a shard key. It improves horizontal scale but requires careful handling of rebalancing and cross-shard queries.

Related terms:Data PartitioningGlobal Identifier Strategy

Shared-Nothing Architecture

Platform Architecture

An approach where each node or instance operates without shared state, relying on partitioning and replication instead. It supports horizontal scaling and failure isolation but requires careful design for data distribution.

Related terms:Horizontal ScalabilityData Partitioning

Shared-State Architecture

Platform Architecture

An approach where multiple components rely on a common state store or shared resources. It can simplify certain coordination tasks but increases coupling and requires strong controls to avoid contention and cascading failures.

Related terms:Stateful ServiceConsistency Boundary

Sidecar Proxy

Platform Architecture

A companion process or container deployed alongside a service to handle cross-cutting networking and observability responsibilities. It enables consistent controls without modifying the service code path.

Related terms:Service MeshRuntime Isolation

Side-Channel Defense

Security & Compliance

Protections against attacks that extract secrets via physical leakages such as power, timing, or electromagnetic emissions.

Related terms:Hardware SecurityCryptographic Agility

SIEM (Security Information and Event Management)

Security & Compliance

Aggregation, correlation, and analysis of log and event data across the environment to detect incidents and support compliance reporting.

Related terms:Audit LoggingThreat Hunting

Signal Fusion

AI & Intelligence

Correlating and combining data from diverse sources such as telemetry, sensors, and event streams into a unified intelligence picture to reduce noise and improve fidelity.

Related terms:Anomaly DetectionVector Embedding

Simultaneous Localization and Mapping (SLAM)

AI & Intelligence

Constructing or updating a map of an unknown environment while tracking an agent’s position within it, essential for autonomous navigation.

Related terms:Path PlanningAutonomous Agent

Snapshotting

Platform Architecture

The creation of point-in-time copies of system state or data for backup, recovery, or migration. In distributed systems, snapshotting requires coordinated consistency guarantees and retention controls.

Related terms:Disaster RecoveryReplication Strategy

SOAR (Security Orchestration, Automation, and Response)

Security & Compliance

Automation and coordination of security response workflows across tools to reduce manual effort and speed containment.

Related terms:SIEM (Security Information and Event Management)Incident Response

Social Engineering Defense

Security & Compliance

Training and controls to prevent manipulation-based attacks like phishing or pretexting, including verification procedures and anti-phishing controls.

Related terms:Insider ThreatMulti-Factor Authentication (MFA)

Social License to Operate

Responsible AI

Ongoing acceptance of an organization’s AI activities by the public and stakeholders, beyond formal legal compliance.

Related terms:Stakeholder EngagementTransparency Reports

Societal Impact Analysis

Responsible AI

Evaluating how an AI deployment may affect labor, social dynamics, or public discourse beyond technical performance.

Related terms:Algorithmic Impact AssessmentSocial License to Operate

Software Bill of Materials (SBOM)

Platform Architecture

A structured inventory of components and dependencies included in a software artifact. It supports vulnerability management and traceability of third-party and internal components.

Related terms:Supply Chain SecurityDependency Pinning

Sovereign Cloud

Security & Compliance

Cloud architecture that ensures data and metadata remain under specified jurisdictional control, meeting national or sectoral sovereignty needs.

Related terms:Data SovereigntyCompliance Governance

Split-Brain

Platform Architecture

A failure mode where two or more nodes believe they are the active leader or primary, leading to conflicting writes or control actions. It is mitigated through quorum, fencing, and robust leader election.

Related terms:Leader ElectionQuorum

SQL Database

Data & Infrastructure

A relational database that enforces structured schemas and ACID properties for transactional or analytical workloads. It supports predictable queries and strong integrity constraints.

Related terms:Schema-on-WriteData Modeling

Stakeholder Engagement

Responsible AI

Involving affected users, communities, and employees in AI design and governance to align outcomes with societal expectations.

Related terms:Human-Centered Design (HCD)Social License to Operate

Stakeholder Management

Operations & Governance

Engaging and balancing needs of parties affected by initiatives to maintain alignment and reduce delivery risk.

Related terms:Governance BoardStrategic Alignment

Stale Read

Platform Architecture

A read that returns data that may not include the most recent writes due to replication lag or caching. In HexxLock context, stale reads are acceptable only where explicitly defined by consistency requirements.

Related terms:Eventual ConsistencyRead Replica

Standard Operating Procedure (SOP)

Operations & Governance

Documented, step-by-step instructions to execute routine tasks consistently, reducing error and ensuring compliance.

Related terms:Change ManagementKnowledge Management

Stateful Service

Platform Architecture

A service that maintains or relies on persistent state across requests, sessions, or time. It requires careful coordination for replication, failover, and data consistency.

Related terms:Replication StrategyFailover

Stateless Service

Platform Architecture

A service design where request handling does not depend on local persistent state between requests. It supports easy horizontal scaling and simplified failure recovery.

Related terms:Horizontal ScalabilityService Discovery

State Store

Platform Architecture

A dedicated component used to persist and retrieve state for services and workflows. It defines durability, consistency, and recovery behavior for platform operations.

Related terms:Stateful ServiceWrite-Ahead Log (WAL)

Strategic Alignment

Operations & Governance

Ensuring structure, investments, and activities support long-term goals, connecting strategy to daily execution.

Related terms:Objectives and Key Results (OKR)Portfolio Management

Strategic Planning

Operations & Governance

Setting priorities, allocating resources, and guiding actions to achieve long-term objectives and mission outcomes.

Related terms:Objectives and Key Results (OKR)Governance Board

Stream Processing

Data & Infrastructure

Continuous processing of data in motion to generate near real-time insights or actions. It supports low-latency detection of anomalies, telemetry aggregation, and operational signals.

Related terms:Change Data Capture (CDC)Event-Driven Architecture

Strong Consistency

Platform Architecture

A consistency model where reads reflect the most recent successful write, within the defined consistency boundary. It simplifies correctness reasoning but can increase latency and reduce availability under partitions.

Related terms:Consistency BoundaryRead-After-Write Consistency

Structured Logging

Platform Architecture

A logging approach where entries are emitted in a consistent, machine-parsable format with defined fields. It improves filtering, correlation, and automated analysis compared to free-text logs.

Related terms:Log Aggregation PipelineOpenTelemetry Instrumentation

Supervised Learning

AI & Intelligence

Learning from labeled input-output pairs to map inputs to targets, dependent on label quality and generalization beyond the training set.

Related terms:ClassificationRegression Analysis

Supply Chain Security

Platform Architecture

Controls that protect the software delivery lifecycle from source to deployment. It includes build integrity, dependency management, and validation of artifacts before execution.

Related terms:Software Bill of Materials (SBOM)Build Provenance

Supply Chain Visibility

Operations & Governance

Tracking components and products end-to-end to improve efficiency and anticipate disruptions.

Related terms:Demand ForecastingVendor Management

Support Vector Machine (SVM)

AI & Intelligence

A supervised model that finds maximum-margin separators for classification or regression, effective in high-dimensional spaces.

Related terms:ClassificationKernel Methods

Swarm Intelligence

AI & Intelligence

Collective behavior emerging from decentralized agents following simple rules, used to coordinate fleets of drones or robots.

Related terms:Autonomous AgentPath Planning

Synthetic Data

AI & Intelligence

Artificially generated data used to augment or replace sensitive or sparse real data, improving coverage and privacy.

Related terms:Data AugmentationBias Mitigation

Synthetic Monitoring

Deployment & Integration

Scripted user journeys run continuously to detect availability and performance issues before users encounter them.

Related terms:Health CheckObservability Stack

System Context

Platform Architecture

A boundary-level view of a system showing external actors, upstream/downstream systems, and key interfaces. It establishes what is inside the platform scope and what is managed as an external dependency.

Related terms:Context MapNetwork Boundary
T

Taints and Tolerations

Platform Architecture

A placement mechanism that repels workloads from nodes unless explicitly allowed. It is used to reserve node pools for specific workload classes and to prevent accidental co-location.

Related terms:Node PoolScheduling Constraint

Target Architecture

Platform Architecture

A defined future-state architecture describing intended capabilities, constraints, and system shape at a given horizon. It is used to guide incremental change and to evaluate deviations from the planned platform direction.

Related terms:Reference ArchitectureArchitecture View

Telemetry

Data & InfrastructureOperations & Governance

Continuous streams of system measurements and events used for monitoring and analysis.

Related terms:Operational Intelligence

Tenant Context Propagation

Deployment & Integration

Passing tenant identifiers and policies through microservice calls to maintain isolation and correct scoping in multi-tenant systems.

Related terms:Identity FederationPolicy-Driven Routing

Tenant Isolation

Platform Architecture

The enforcement of separation between tenants so that one tenant cannot access or impact another tenant’s data or resources. Isolation can be logical, network-based, compute-based, or a combination depending on risk requirements.

Related terms:Network SegmentationResource Isolation

Threat Hunting

Security & Compliance

Proactive investigation to find hidden or advanced threats that bypass automated controls, assuming breach conditions.

Related terms:SIEM (Security Information and Event Management)Threat Intelligence

Threat Intelligence

Security & Compliance

Evidence-based insights on threat actors, campaigns, and indicators used to inform detection and response actions.

Related terms:Threat HuntingSIEM (Security Information and Event Management)

Timeout Budget

Platform Architecture

An allocated portion of end-to-end latency reserved for a dependency call or operation. Timeout budgets prevent indefinite waiting and help keep distributed workflows within acceptable response or processing windows.

Related terms:Request TimeoutRetry Policy

Time-Series Database (TSDB)

Data & Infrastructure

A database optimized for time-indexed data with high-ingest and efficient aggregations. It is used for telemetry, monitoring, and IoT scenarios that demand rapid rollups over large histories.

Related terms:Metrics PipelineLog Aggregation Pipeline

Time-to-Live (TTL)

Platform Architecture

A defined lifetime for data, cache entries, locks, or credentials before automatic expiry. TTL policies limit accumulation, reduce stale state risk, and support predictable retention behavior.

Related terms:Cache Invalidation StrategyLease

Tokenization

AI & Intelligence

Breaking text into tokens for model ingestion, influencing context window usage, cost, and overall model accuracy.

Related terms:Context WindowTransformer Model

Total Cost of Ownership (TCO)

Operations & Governance

Calculating direct and indirect costs over an asset’s lifecycle to inform investment and operational decisions.

Related terms:Cost-Benefit AnalysisProcurement Strategy

Traceability Logging

Responsible AI

Immutable logging of data inputs, model versions, and decisions to enable accountability and post-incident analysis.

Related terms:Decision LineageAlgorithmic Accountability

Traffic Mirroring (Shadowing)

Deployment & Integration

Duplicating production traffic to a new version without affecting users to observe behavior under real load before full rollout.

Related terms:Deployment CanaryChaos Engineering

Traffic Routing Policy

Platform Architecture

Rules that determine how requests are routed between services, versions, regions, or instances. In HexxLock context, routing policies are used to support safe rollouts, fault isolation, and operational constraints.

Related terms:Load BalancerRate Limiting

Traffic Steering

Deployment & Integration

Directing traffic along optimal paths based on latency, congestion, or policy to place users on the best-performing or nearest endpoint.

Related terms:Policy-Driven RoutingGlobal Traffic Management

Transfer Learning

AI & Intelligence

Reusing a model trained on one task as a starting point for another, reducing data and time needs for specialized tasks.

Related terms:Fine-TuningFew-Shot Learning

Transformer Model

AI & Intelligence

An architecture based on attention mechanisms that processes sequences in parallel, foundational for large language and multi-modal models.

Related terms:Attention MechanismSelf-Attention

Transparency Reports

Responsible AI

Disclosures of an AI system’s capabilities, limits, and intended uses to build trust and clarify safe operating conditions.

Related terms:Model CardIntended Use Policy

Trust Boundary

Platform Architecture

A boundary where the level of trust changes and additional controls are required. Crossing a trust boundary typically triggers authentication, authorization, validation, and auditing requirements.

Related terms:Network SegmentationPolicy Plane

Trusted Execution Enclave

Deployment & Integration

A hardware-isolated region that protects code and data from disclosure or modification, enabling secure computation on sensitive data in untrusted environments.

Related terms:Remote AttestationRuntime Isolation

Trusted Execution Environment (TEE)

Platform Architecture

A hardware-backed isolated execution area designed to protect code and data from the rest of the system. It supports workloads requiring stronger confidentiality and integrity guarantees.

Related terms:Runtime IsolationAttestation

Trusted Platform Module (TPM)

Security & Compliance

A hardware component that stores cryptographic keys and supports secure boot and attestation, providing a hardware root of trust.

Related terms:Remote AttestationEncryption at Rest
U

Unintended Consequences Analysis

Responsible AI

Structured assessment to surface potential negative side effects of AI systems that were not part of original design goals.

Related terms:Algorithmic Impact AssessmentDual-Use Assessment

Unsupervised Learning

AI & Intelligence

Discovering patterns in data without labeled outcomes, used for clustering, structure discovery, and dimensionality reduction.

Related terms:ClusteringDimensionality Reduction

Upstream Dependency

Deployment & Integration

A service or component another system relies on; managing it includes graceful degradation and compatibility during changes.

Related terms:Circuit BreakerBackpressure
V

Validation Set

AI & Intelligence

A held-out dataset used to tune hyperparameters and prevent overfitting before final testing.

Related terms:Model TrainingHyperparameter Tuning

Value Alignment

Responsible AI

Ensuring AI goals and behaviors remain consistent with human and organizational values to avoid harmful objective pursuit.

Related terms:Ethical AI FrameworkMoral Reasoning Module

Value Sensitive Design

Responsible AI

A methodology that incorporates human values explicitly into technology design throughout the development process.

Related terms:Human-Centered Design (HCD)Stakeholder Engagement

Value Stream Mapping

Operations & Governance

Analyzing and redesigning the flow from concept to delivery to eliminate waste and improve throughput.

Related terms:Process OptimizationLean Practices

Vector Clock

Platform Architecture

A mechanism for tracking partial ordering of events across distributed nodes. Vector clocks support detection of concurrency and can inform deterministic conflict resolution strategies.

Related terms:Causal ConsistencyLamport Timestamp

Vector Database

AI & Intelligence

A store optimized for high-dimensional embeddings to perform similarity search efficiently, essential for semantic retrieval and RAG pipelines.

Related terms:Vector EmbeddingSemantic Search

Vector Embedding

AI & Intelligence

Dense numerical representations that capture semantic similarity between items such as text, images, or signals, powering search and matching.

Related terms:Vector DatabaseSemantic Search

Vendor Management

Operations & Governance

Controlling cost, risk, and performance of suppliers through evaluation, contracting, and ongoing oversight.

Related terms:Procurement StrategyContract Management

Versioned Contract

Platform Architecture

A contract that includes explicit versioning rules to support safe evolution. It defines how changes are introduced, how compatibility is preserved, and when older versions may be retired.

Related terms:Data ContractBackward Compatibility

Virtual Private Network (VPN)

Platform Architecture

A secure tunnel mechanism used to connect networks or endpoints over untrusted infrastructure. It is often used to provide controlled access to private services and environments.

Related terms:Network BoundaryPrivate Service Endpoint

VPC Peering

Deployment & Integration

Private networking between VPCs that routes traffic over internal addresses, enabling cross-VPC communication without public exposure.

Related terms:Hybrid ConnectivityNetwork Segmentation

Vulnerability Assessment

Security & Compliance

Systematic identification and prioritization of known weaknesses with recommended remediation paths.

Related terms:Penetration TestingRisk Scoring
W

Web Application Firewall (WAF)

Security & Compliance

Filtering and monitoring HTTP/S traffic to protect applications and APIs from common attacks like SQL injection and XSS.

Related terms:DDoS MitigationDevSecOps

Webhook Integration

Deployment & Integration

Event-driven callbacks where one system pushes updates to another on specific events, avoiding polling overhead.

Related terms:Event-Driven ArchitectureAPI Contract

Workflow Orchestration

Operations & Governance

Coordinating and automating multi-step processes across systems and teams so tasks run in order, with secure data handoffs and enforced dependencies.

Related terms:Process OptimizationChange Management

Workforce Management

Operations & Governance

Planning, scheduling, and optimizing staffing and skills to meet operational demand and maintain productivity.

Related terms:Capacity PlanningDemand Forecasting

Workload Isolation

Deployment & Integration

Separating applications or processes so they cannot interfere or access each other's data, using virtualization, containers, or network segmentation.

Related terms:Runtime IsolationMicro-segmentation

Write-Ahead Log (WAL)

Platform Architecture

An append-only log used to record changes before they are applied to primary storage. It supports recovery after crashes and provides a durable sequence of state transitions.

Related terms:Event SourcingState Store
Z

Zero-Shot Learning

AI & Intelligence

Handling tasks or classes unseen during training by leveraging auxiliary knowledge or semantics, useful where labeled data is scarce.

Related terms:Few-Shot LearningTransfer Learning

Zero-Trust Architecture

Security & Compliance

A security model built on continuous verification of identity, device, and context for every access, regardless of network location. It assumes breach and enforces least-privilege, authenticated, and authorized interactions.

Related terms:Least Privilege PrincipleMulti-Factor Authentication (MFA)

Zero Trust Segmentation

Platform Architecture

A segmentation approach where access is explicitly verified for each request, regardless of network location. In HexxLock context, it aligns network boundaries with identity- and policy-based controls.

Related terms:Identity Provider IntegrationPolicy Plane
This glossary provides informational descriptions only and does not create legal, contractual, or service commitments. Terminology may evolve alongside platform updates and governance requirements.