This website uses cookies
We use cookies to continuously improve your experience on our site. More info.
Software Infrastructure (DevOps) |
|
Active Directory Federation Services (ADFS), a software component developed by Microsoft, can run on Windows Server operating systems to provide users with single sign-on access to systems and applications located across organizational boundaries. |
|
Advanced Interactive eXecutive (AIX) is an enterprise-class UNIX operating system for the POWER and PowerPC IBM processor architecture and also IBM Servers: pSeries, System P and Power Systems. |
|
Akamai is the leading content delivery network (CDN) services provider for media and software delivery, and cloud security solutions. |
|
Amazon Elastic Container Service is a highly scalable, fast, container management service that makes it easy to run, stop, and manage Docker containers on a cluster. |
|
A managed service that makes it easy to run Kubernetes on AWS without needing to install and operate an own Kubernetes clusters. |
|
Amazon Simple Storage Service (S3) is object cloud storage that used for storage and retrieving data in the internet. The storage is secured, always available for the client from any point on the earth via internet and it is limitless (the bigger your storage, the more client has to pay a month rent). |
|
Advanced Message Queuing Protocol is an open protocol for transferring messages between system components with low latency and at high speed. AMQP has three basic concepts: exchange, queue, routing key. |
|
Configuration management system, used to automate the configuration and deployment of software. Typically used to manage Linux nodes, but Windows is also supported. It is often used for management resources of the IT infrastructures. |
|
Cross-platform (can be used on most of operating systems) web-server software. Apache provides the ability to work in a web browser via the HTTP. |
|
A fully managed service that makes it easy for developers to create, publish, maintain, monitor, and secure APIs at any scale. APIs act as the "front door" for applications to access data, business logic, or functionality from your backend services. |
|
A set of middleware technologies for Windows Server that provide enhanced hosting, management, caching capabilities for web applications and middle-tier services. |
|
Argo CD is a native Kubernetes continuous deployment (CD) tool. In contrast to external CD tools that facilitate push-based deployments, Argo CD has the capability to fetch updated code directly from Git repositories and deploy it to Kubernetes resources. This empowers developers to oversee both infrastructure configuration and application updates within a unified system. |
|
Aqua Security is a company and security solutions for cloud-native applications, containerized environments, and serverless computing. The company's primary focus is on safeguarding applications that are built, deployed, and run using modern cloud technologies. |
|
Applicability Statement 2 is an encrypted protocol for transporting data securely and reliably over the internet. It focuses on encrypting data rather than the transport channel, providing end-to-end to ensure security. |
|
Bourne-Again SHell is the most popular command shell in unix-like systems, especially in GNU / Linux. BASH is not only a command shell, it is also an excellent scripting programming language. |
|
Stands for Border Gateway Protocol. An application layer protocol for exchanging information between autonomous systems. Basically, it is the protocol that routes traffic and makes the Internet work. BGP makes routing decisions based on network rules and policies, as well as on the path. |
|
Management control portal made in a web-based browser, used for monitoring and minimizing implementation and maintenance across client consoles for all BMC products. The Portal also offers a common workflow and usage experience across BMC products for sign-on, navigation, reporting, data manipulation. |
|
BMC Remedy is a ITSM solution that provides useful features such as an asset management tool that allows to discover and track all the IT assets within the environments you maintain; a virtual agent with a chat interface that also offers informative articles and other educational materials; mobility and collaboration functionality among technicians/analysts, management, etc.; and on-premises or cloud delivery options. |
|
A web application that collects statistical data for certain time intervals and allows to display them in a graphical form. Primarily used are standard templates for displaying statistics on CPU usage, allocating RAM, the number of running processes, and the use of incoming / outgoing traffic. |
|
A tool used for faster delivery of content. The Content Delivery Network technology using intermediate storage points in data centers located closer to the users for the most popular content. This allows you to load web pages, according to the most frequent requests, much faster than without using this technology.
|
|
A Unix based operating system (Linux distribution) that was created for powerful servers of the enterprise level, but can also run on usual computers. A command line is used to work in this OS, but also a graphical module can be installed for users that don’t work with command line. |
|
A configuration management tool that provides automated configuration and maintenance of large-scale computer systems, used for scheduling, local user/process-management, security hardening, etc. |
|
A software tool for managing configurations, as well as simplifying the configuration and maintenance of IT infrastructure companies. Can be integrated into cloud platforms. The client part of the program is written in Ruby and the server part is written in Erlang. |
|
CI/CD or CICD generally refers to the combined practices of continuous integration and either continuous delivery or continuous deployment. |
|
Clair is an open-source initiative that offers a solution for scrutinizing the security of your containers by conducting a static analysis of vulnerabilities within both apps and docker containers. It functions as an API-powered analysis engine, systematically examining containers step-by-step to identify any established security weaknesses. |