This glossary is intended to provide a single refernce to be reused across multiple projects - and design artifacts. Defining localized/specialized terms may then be limited to being addressed in specific design artifacts. The intent is to avoid duplication of a large corpus of glossary entries, in many places.
| Term | Definition |
|---|---|
| __ | |
| 2FA | Two-Factor Authentication |
| 3LOD | Three Lines of Defence Model (Codified by the Basel Committee on Banking Supervision in its 2011 Principles for the sound management of operational risk) |
| 3PL | Third-Party Logistics providers |
| 4+1 | 4+1 Architecture View Model |
| 7 Rs | Refactor, Replatform, Repurchase, Rehost, Relocate, Retain, Retire - Re: AWS Migration Readiness |
| A__ | |
| A11y | Accessibility [see: Mozzila, W3C] |
| A2A | Agent2Agent Protocol |
| A2C | Advantage Actor-Critic (re: Reinforcement Learning algorithm) |
| A3C | Asynchronous Advantage Actor-Critic (re: Reinforcement Learning algorithm, Parallel and asynchronous version of A2C) |
| AA | Agile Alliance |
| AA | Alternatives Analysis |
| AA | Architecture Advisory (~ ARB) |
| AAD | Average absolution deviation |
| AAD | Azure Active Directory |
| ABB | Architecture Building Blocks |
| ABAC | Attribute-Based Access Control (see CBAC, PBAC) |
| ABACUS | Algorithm-Based Analysis, Communication and Understanding of Systems |
| ABC | Activity Based Costing |
| ABC | Area of Business Concern |
| ABI | Application Binary Interface |
| ABNF | Augmented Backus-Naur Form (see RFC-5234) |
| ABS | As Built Section |
| AC | Axiom of Choice |
| ACDPs | Attention Capture Damaging Patterns |
| ACE | Access Control Entry |
| ACG | Automatic Code Generators |
| ACH | Automated Clearing House |
| ACI | Artificial Capable Intelligence |
| ACID | Atomicity, Consistency, Isolation, and Durability |
| ACK | Acknowledgement |
| ACL | Access Control List |
| ACL | Anti-Corruption Layer |
| ACM | Access Control Mechanism |
| ACME | Automatic Certificate Management Environment, also see RFC 8555 |
| ACP | Agent Communication Protocol - Note: ACP merged into A2A, after donation to Linux Foundation |
| ACPI | Advanced Configuration and Power Interface |
| ACPT | Access Control Policy Tool |
| ACR | Access Control Rule |
| ACS | Azure Communication Service |
| ACT | Automated Combinatorial Testing |
| ACTS | Automated Combinatorial Testing for Software |
| ACV | Annual Contract Value |
| ACVP | Automated Cryptographic Validation Protocol |
| ACVTS | Automated Cryptographic Validation Test System |
| AD | Active Directory |
| AD | Application Delivery |
| AD | Architecture Decision |
| ADA | Advanced Data Analysis |
| ADA | The Americans with Disabilities Act of 1990 or ADA (42 U.S.C. § 12101) |
| ADAL | Active Directory Authentication Library |
| ADCS | Active Directory Certificate Services |
| ADDIE | (analyze, design, development, implement, evaluate) a methodology developed by Florida State University for the U.S. Army as a repeatable and standard set of tasks to create training. Wikipedia Article |
| ADDS | Active Directory Domain Service(s) |
| ADOMS | Adapting, Defining, Operating, Managing and Supporting |
| ADR | Address Resolution Protocol |
| ADSL | Asymmetric digital subscriber line |
| ADT | Algebraic Data Type |
| AE | Authenticated Encryption |
| AEA | Adaptive Enterprise Architecture |
| AEAD | Authentication Encryption with Associated Data |
| AES | Advanced Encryption Standard |
| AFCE | Authorization for Capital Expenditure |
| AGI | Artificial General Intelligence |
| AI | Artificial Intelligence |
| AIBOM | Artificial Intelligence Bill of Materials |
| AKA | Also Known As |
| AKA | Authentication and Key Agreement |
| AKI | Amazon Kernel Image |
| AKM | Authentication and Key Management |
| AKP | Advanced Key Processor |
| AKS | Azure Kubernetes Service |
| ALM | Application Lifecycle Management |
| ALM | Audio Language Models |
| AMASS | Autonomous Multi-Domain Adaptive Swarms-of-Swarms |
| AMI | Advanced Machine Intelligence |
| AMI | Amazon Machine Image |
| AML | Anti-Money Laundering |
| AMMERSE | Agile, Minimal, Maintainable, Environmental, Reachable, Solvable, Extensible |
| AMMS | Autonomous Mobility Management System: |
| AMS | Agency Management System (domain: Insurance) |
| AMS | Application Managed Service |
| AMQP | Advanced Message Queuing Protocol |
| ANC | Adaptive Network Control |
| ANI | Artificial Narrow Intelligence |
| ANM | Additive Noise Model |
| ANN | Approximate Nearest Neighbor |
| ANN | Artificial Neural Network |
| ANOVA | Analysis of Variance |
| ANSI | American National Standards Institute |
| AOD | Architecture Overview Document |
| AOL | Attorney Opinion Letters |
| AOP | Aspect-Oriented Programming |
| AOT | Ahead of Time (i.e. compiled ahead of time) |
| AP | Access Point |
| AP | Average Precision |
| aPaaS | Application Platform as a Service |
| APAC | Asia/Pacfic |
| API | Application Programming Interface |
| APM | Application Portfolio Management |
| APM | Application Performance Management |
| APM | Application Performance Monitoring |
| APNIC | Asia Pacific Network Information Centre |
| APNS | Apple Push Notification service |
| APO | Automatic Prompt Optimization |
| APT | Advanced Persistent Threat |
| AP@N | Average Precision |
| ARB | Architecture Review Board (aka ARC) |
| ARC | Architecture Review Committee, or Council (aka ARB) |
| ARHR | Average Reciprocal Hit Ratio |
| ARI | Amazon Ramdisk Image |
| ARIMA | Auto-Regressive Integrated Moving Average |
| ARM | Architectural Reference Model |
| ARM | Azure Resource Manager |
| ARN | Amazon Resource Name |
| ARP | Address Resolution Protocol |
| ARPA | Average Revenue Per Account |
| ARPU | Average Revenue Per User |
| ARR | Annual Recurring Revenue |
| ART | Agile Release Train (re: Scaled Agile Framework, SAFe) |
| AS | Authoritative Source |
| ASCII | American Standard Code for Information Interchange |
| ASD | Architecturally Significant Decisions |
| ASI | Artificial Superintelligence |
| ASM | Advanced Statistical Methods |
| ASN | Advanced Shipment Notification |
| ASN | Application Service Name |
| ASN | Autonomous System Number |
| ASP | Application Service Provider |
| ASPM | Application Security Posture Management |
| ASR | Architecturally Significant Requirements |
| ASR | Automatic Speech Recognition |
| AST | Application Security Testing |
| ASVS | Application Security Verification Standard |
| ATDD | Acceptance-Test-Driven-Development |
| ATE | Averate Treatment Effect |
| ATF | Automated Test Framework |
| ATM | Asynchronous Transfer Mode |
| ATO | Authorization to Operate |
| AUC | Area Under the Curve |
| AUC-ROC | Area Under Curve – Receiver Operating Characteristics Curve |
| AUP | Acceptable Use Policy |
| AUROC | Area Under the Receiver Operating Characteristics Curve |
| AVD | Azure Virtual Desktop |
| AWM | Agent Workflow Memory |
| AZ | Availability Zone |
| B__ | |
| B2B | Business-to-Business |
| B2C | Business-to-Consumer |
| BA | Business Analyst |
| BAA | Business Associate Agreement |
| BaaS | Backup as a Service |
| BACM | Business Architecture Core Metamodel (re: OMG.org) |
| BAFO | Best And Final Offer (e.g., RFP negotiations) |
| BAIR | Berkeley Artificial Intelligence Research |
| BASE | Basically Available, Soft state, Eventual consistency |
| BAU | Business As Usual |
| BC | Business Continuity |
| BCD | Binary Coded Decimal |
| BCDR | Business Continuity and Disaster Recovery |
| BCM | Business Continuity Management |
| BCP | Best Current Practice |
| BCP | Business Continuity Planning (or Plan) |
| BDAM | IBM Basic Direct Access Method |
| BDB | Biometric Data Block |
| BDD | Behavior-Driven Development |
| BDFL | Benevolent Dictator For Life |
| BDR | Business Development Resources |
| BDR | Business Development Representative |
| BDS ` | Boot Device Selection |
| BDUF | Big Design Up Front |
| BEC | Business Email Compromise |
| BEC | Business Executive Committee |
| BFT | Byzantine Fault Tolerant |
| BFO | Basic Formal Ontology |
| BFSI | Banking, Financial Services and Insurance |
| BGP | Border Gateway Protocol |
| BHAG | Big Hairy Audacious Goal |
| BI | Business Intelligence |
| BIA | Business Impact Analysis |
| BIAN | Banking Industry Architecture Network |
| BIND | Berkeley Internet Name Domain |
| BIMI | Brand Indicators for Message Identification |
| BIOS | Basic Input-Output System |
| BISO | Business Information Security Officer |
| BLOB | Binary Large Object |
| BLSR | Baseline Security Requirement |
| BMA | Business Mission Area |
| BNA | Business Needs Analysis |
| BNF | Backus-Naur Form |
| BNS | Business Needs Statement |
| BOD | Binding Operational Directive |
| BOE | Basis of Estimate |
| BOF | Buffer Overflow |
| BoK | Body of Knowledge |
| BOM | Basic Order of Magntitude |
| BOM | Bill of Matrials |
| BOOTP | Bootstrap Protocol |
| BOSS | Business Operation Support Services |
| BOSS | Business Operations Support System |
| BPF | Berkeley Packet Filter - see eBPF |
| BPM | Business Process Management |
| BPM | Business Process Model |
| BPML | Business Process Markup Language |
| BPS | Bits Per Second |
| BPSS | Business Process Specification Schema |
| BR | Business Rules |
| BRD | Business Requirements Document |
| BRM | Business Reference Model |
| BRS | Business Requirements Specification |
| BSA | Bank Secrecy Act |
| BSD | Berkeley Software Distribution |
| BSI | British Sandards Institution |
| BSS | Business Support System |
| BTC | Bitcoin |
| BtoS | Business-to-Society |
| BU | Business Unit |
| BYO | Bring Your Own |
| BYOC | Bring Your Own Cloud |
| BYOD | Bring Your Own Device |
| C__ | |
| C | Confidential |
| C-V2X | Celluar-vehicle-to-everything |
| C2 | Command and Control |
| C4 | C4 Model viewpoints: Context, Container, Component, Code |
| C5 | Command, Control, Computers, Communications and Cyber |
| C&A | Certification & Accreditation |
| CA | Certificate Authority |
| CAAS | Container as a Service |
| CAB | Change-Advisory Board |
| CaC | Compliance as Code |
| CAC | Customer Acquisition Cost |
| CAF | Cloud Adoption Framework (Azure) |
| CAG | Cache-Augmented Generation |
| CAGR | Compound Annual Growth Rate |
| CAIs | Chatbot AIs |
| CALM | Communications Access for Land Mobiles |
| CAP | Consistency, Availability, Partition Tolerance |
| CapEx | Capital Expenditure |
| CAS | Compare-And-Swap / Compare-And-Set |
| CAS | Complex Adaptive System |
| CASE | Connected, Autonomous / Automated, Shared, and Electric |
| CAT | Customer Advisory Team |
| CatB | The Cathedral and the Bazaar |
| CATEs | Conditional Average Treatment Effects |
| CBA | Cost Benefit Analysis |
| CBAC | Claim-Based Attirbute Control (see ABAC,PBAC) |
| CBFR | Commenting For Better Reach |
| CBOM | Cryptographic Bill of Materials |
| CBR | Change Blast Radius |
| CBS | Critical Business System |
| CCaaS | Contact Center as a Service |
| CCANM | Cascade Nonlinear Additive Noise Models |
| CCB | Change Control Board, or Change Configuration Board |
| CCC | FINOS: Common Cloud Controls Project |
| CCD | Conceptual Design Document |
| CCPOLDAT | Customer, Channel, Process, Organisation, Location, Data, Application and Technology (see POLDAT) |
| CCoE | Cloud Center of Excellence |
| CCO | Chief Commercial Officer |
| CCO | Client Change Order |
| CCO | Cloud Control Objectives |
| CCPA | California Consumer Privacy Act |
| CCPM | Critical Chain Project Management |
| CD | Candidate Recommendation |
| CD | Continuous Delivery |
| CDAO | Chief Digital and Artificial Intelligence Office |
| CDC | Change Data Capture |
| CDD | Customer Due Dilligence (also see KYC) |
| CDE | Cardholder Data Environment |
| CDE | Cloud Development Environment |
| CDE | Collaborative Development Environment |
| CDE | Common Desktop Environment |
| CDE | Critical Data Element |
| CDF | Cumulative Distribution Function |
| CDI | Contexts and Dependency Injection |
| CDK | Cloud Development Kit |
| CDM | Common Data Model |
| CDN | Content Distribution Network |
| CDO | Chief Data Officer |
| CDO | Care Delivery Organizatoin |
| CDP | Customer Data Platform |
| CE | Community Edition |
| CEA | Cost Effectiveness Analysis |
| CEAF | California Enterprise Architecture Framework |
| CEB | Corporate Executive Board |
| CEH | Certified Ethical Hacker |
| CEP | Complex Event Processing |
| CER | Control Exception Request |
| CERN | European Organization for Nuclear Research, French: Organisation européenne pour la recherche nucléaire |
| CES | Customer Experience Specialist |
| CESGA | Galician Supercomputing Center |
| CFBR | Commenting For Better Reach |
| CFR | Change Failure Rate |
| CFS | Completely Fair Scheduler |
| CFT | Cross-Functional Team |
| CGI | Common Gateway Interface |
| CHAP | Challenge-Handshake Authentication Protocol |
| ChatGPT | Chat Generative Pre-trained Transformer |
| CHF | Cryptographic Hash Function |
| CI | Configuration Item (i.e. in a CMDB, such as ServiceNow) |
| CI | Continuous Improvement |
| CI | Continuous Integration |
| CI/CD | Continuous Integration / Continuous Delivery (or, Continous Deployment) |
| CIA | Confidentiality, Integrity, Availability |
| CIAM | Customer Identity and Access Management |
| CICS | IBM ustomer Information Control System |
| CID | Command Identifier |
| CIF | Customer Information File |
| CIFAR | Canadian Institute for Advanced Research |
| CIFS | Common Internet File System |
| CIO | Chief Information Officer |
| CIP | Critical Infrastructure Protection |
| CIP | Customer Identification Program |
| CIPP | Certified Information Privacy Professional |
| CIR | Critical Incident Response |
| CIR | Cybersecurity Incident Response |
| CISA | Certified Information Systems Auditor |
| CISA | Cybersecurity and Infrastructure Security Agency |
| CISC | Complex Instruction Set Computer |
| CISM | Certified Information Security Manager |
| CISO | Chief Information Security Officer |
| CISSP | Certified Information Systems Security Professionals |
| CL | Change List |
| CLI | Command Line Interface |
| CLT | Central Limit Theorem |
| CMDB | Configuration Management Database |
| CMOS | omplementary Metal Oxide Silicon |
| CMF | Content Monitoring and Filtering (see DLP) |
| CMGR | Compounded Monthly Growth Rate |
| CMK | Customer Managed Keys |
| CMM | Capability Maturity Model |
| CMMC | Cybersecurity Maturity Model Certification |
| CMOS | Complementary metal–oxide–semiconductor |
| cn | Common Name, re: LDAP |
| CNAB | Cloud Native Application Bundles |
| CNAPP | Cloud-Native Application Protection Platform |
| CNCF | Cloud Native Computing Foundation |
| CNN | Convolutional Neural Network |
| COBIT | Control Objectives for Information and related Technology |
| CoE | Center of Excellence |
| COE | Correction of Error (process) |
| COI | Community of Interest |
| CoLA | Cognitive Architectures for Language Agents |
| COLO | Co-Location / Colocation |
| COOP | Continuity of Operations Plan |
| CoP | Community of Practice |
| CORBA | Common Object Request Broker Architecture |
| CORS | Cross-Origin Resource Sharing |
| COSS | Commercial Open Source Software |
| CoT | Chain-of-Thought |
| COTS | Commercial Off-The-Shelf |
| Cow | Clone-On-Write (i.e., In Rust, a smart pointer that can hold either a borrowed reference or an owned value) |
| CPC | Cost Per Click |
| CPE | Customer-Premises Equipment |
| CPG | Consumer Packaged Goods (e.g. industry) |
| CPL | Cost Per Lead |
| CPM | Capability Portfolio Management |
| CPM | Critical Path Method |
| CPU | Central Processing Unit |
| CP-ABE | Cipher Policy — Attributed-Based Encryption |
| CQRS | Command Query Responsibility Segregation |
| CQS | Command Query Separation |
| CR | Conversion Rate |
| CRC | Class Responsibility Collaboration (i.e., usually captured in a form known as "cards", see original OOPSLA 1989 paper) |
| CRCQs | Cryptanalytically-Relevant Quantum Computers |
| CRD | Custom Resource Definitions (e.g., Kubernetes) |
| CRDT | Conflict-Free Replicated Data Type |
| CRF | Conditional Random Fields |
| CRL | Certificate Revocation List |
| CRM | Customer Relationship Management |
| CRO | Chief Risk Officer |
| CRUD | Create, Read, Update, Delete |
| CSA | Cloud Security Alliance |
| CSA | Cloud Service Appliance |
| CSAT | Customer Satisfaction |
| CSB | Cloud Service Broker |
| CSD | Consolidated Service Desk |
| CSF | Critical Success Factors |
| CSDM | Common Service Data Model (re: ServiceNow) |
| CSET | Center for Security and Emerging Technology (CSET) |
| CSF | Common Security Framework |
| CSF | Critical Success Factors |
| CSI | Cloud Service Integrator |
| CSI | Container Storage Interface (e.g. Kubernetes) |
| CSIA | Cost/Schedule Impact Analysis |
| CSM | Customer Service Management |
| CSM | Customer Success Manager |
| CSNS | Cloud Service Network Security |
| CSO | Cloud Service Offering |
| CSP | Cloud Service Provider |
| CSP | Content Security Policy |
| CSPM | CLOUD SECURITY POSTURE MANAGEMENT |
| CSR | Customer Service Representative |
| CSR | Certificate Signing Request |
| CSRB | Cyber Safety Review Board |
| CSRF | Cross-Site Request Forgery |
| CSS | Cascading Style Sheets |
| CTAD | Class Template Argument Deduction |
| CTB | Change The Business |
| CTE | Commono Table Expressions (re: SQL) |
| CTF | Capture the Flag |
| CTI | Cyber Threat Intelligence |
| CTO | Chief Technology Officer |
| CTR | Click-Through-Rate |
| CUI | Controlled Unclassified Information (CUI), as defined by Executive Order 13556 (2010) |
| CUSO | Combined U.S. Operations |
| CV | Capability Viewpoints (re: DoDAF) |
| CV | Cost Variance |
| CV | Cross-Validation |
| CVC | Card Verification Code |
| CVC | Corporate Venture Capital |
| CVD | Coordinated Vulnerability Disclosure |
| CVE | Critical Vulnerabilities and Exposures |
| CVS | Concurrent Version System |
| CWE | Critical Weakness Enumeration (also see: Wikipedia |
| CX | Customer Experience |
| CXO | Customer Experience Officer |
| CXN | Customer Experience Network |
| D__ | |
| DA | Data Architecture |
| DaaS | Data as a Service |
| DAC | Discretionary Access Control |
| DAE | Differential-Algebraic Equation |
| DAG | Directed Acyclic Graph |
| DAIR | Distributed Artificial Intelligence Research Institute (DAIR) |
| DAN | Device Account Number |
| DAO | Data Access Object |
| DAO | Decentralized Autonomous Organization |
| DAP | Directory Access Protocol (X.500) |
| dApps | Decentalized Applications |
| DAR | Decision Analysis and Resolution technique |
| DARQ | Distributed Ledger Technology (DLT), Artificial Intelligence (AI), Extended Reality (XR), Quantum Computing ~ re: Accenture |
| DARPA | Defense Advanced Research Projects Agency |
| DART | Detection and Response Team |
| DAS | Direct Attached Storage |
| DASD | Direct-Access Storage Device |
| DAST | Dynamic Application Security Testing |
| DAU | Daily Active Users |
| DAX | Data Analysis Expressions (re: Microsoft |
| DB | Database |
| DBA | Database Administrator |
| DBMS | Database Management System |
| DBR | Drum-Buffer-Rope (re: see TOC, also see #1) |
| dc | Domain Component, re: LDAP |
| DC | Data Center |
| DCAM | Data Management Capability Assessment Model |
| DCCP | Datagram Congestion Control Protocol |
| DCE | Distributed Computing Environment |
| DCF | Discounted Cash Flow |
| DCG | Discounted Cumulative Gain |
| DCI | Director of Central Intelligence |
| DCL | Data Classification & Labeling |
| DD | Data Dictionary |
| DDA | Data Design Authority |
| DDoS | Distributed Denial-of-Service (i.e. a network traffic attack) |
| DDS | Detailed Design Section |
| DEC | Digital Equipment Corporation |
| DEIB | Diversity, Equity, Inclusion, and Belonging |
| DER | Distinguished Encoding Rules |
| DES | Data Encryption Standard |
| DFIR | Digital Forensics, Incident Response |
| DGB | Data Governance Board (aka DGC) |
| DGC | Data Governance Council, or Committee (aka DGB) |
| DGP | Data Governance Policy |
| DGS | Domain Graph Services |
| DHCP | Dynamic Host Configuration Protocol |
| DHI | Docker Hardened Images |
| DHT | Distributed Hash Table |
| DI | Dependency Injection |
| DIM | Domain Information Model |
| DJIA | Dow Jones Industrial Average |
| DKG | Distributed Key Generation |
| DLD | Detail-Level Design |
| DLM | Database Lifecycle Management |
| DLP | Data Loss Prevention |
| DLT | Distributed Ledger Technology |
| DKIM | Domain Keys Identified Mail |
| DMAIC | Define, Measure, Analayze, Improve, Control (re: Six Sigma) |
| DMARC | Domain-based Message Authentication Reporting and Conformance |
| DML | Double Machine Learning |
| DMN | Demand |
| DMO | Data Management Office |
| DMP | Data Management Platform |
| DMZ | Demilitarized Zone - aka perimeter network or screened subnet |
| DN | Distinguished Name, re: LDAP |
| DNAT | Destination network address translation |
| DNS | Domain Name System |
| DNSSEC | Domain Name Security Extensions |
| DoDAF | Department of Defense Architecture Framework |
| DOP | Data-Oriented Programming |
| DORA | DevOps Research and Assessment (re: metrics: deployment frequency, lead time for changes) |
| DORA | Digital Operational Resilience Act, re: Regulation (EU) 2022/2554 of the European Parliament and of the Council of 14 December 2022 on digital operational resilience for the financial sector |
| DoS | Denial of Service |
| DOS | Disk Operating System |
| DP | Differential Privacy |
| DP | Dynamic Programming |
| DPA | Data Protection Authorities |
| DPC | Discrete Process Control |
| DPO | Direct Preference Optimization (re: LLMs, tuning algorithm) |
| DPoP | Demonstrating Proof-of-Possession |
| DR | Disaster Recovery |
| DRaaS | Disaster Recovery as a Service |
| DRB | Design Review Board |
| DRBG | Deterministic Random Bit Generator - also see PRNG |
| DRG | Dynamic Routing Gateway |
| DRI | Directly Responsible Individual |
| DRIP | Data Rich, Information Poor |
| DRL | Deep Reinforcement Learning |
| DRP | Disaster Recovery Plan |
| DRY | Don't Repeat Yourself (also see WET) |
| DSA | Data Structures and Algorithms |
| DSA | Digital Signature Algorithm |
| DSL | Digital subscriber line |
| DSL | Domain Specific Language |
| DSLAM | Digital subscriber line access multiplexer |
| DSML | Data Science and Machine Learning |
| DSN | Data Source Name |
| DSPM | Data Security Posture Management |
| DSRC | Dedicated short-range communications |
| DSRP | Distinctions, Systems, Relationships, and Perspectives |
| DSS | Data Security Standard |
| DTAP | Development, Test, Acceptance, Production (i.e, typical deployment environment types) |
| DTC | direct-to-consumer |
| DTD | Document Type Definition |
| DTO | Data Transfer Object |
| DTSTTCPW | Do The Simplest Thing That Could Possibly Work |
| DVI | Device Independent file format |
| DVR | Distributed Virtual Router |
| DW | Data Warehouse (also see DWH, EDW) |
| DWH | Data Warehouse (also see DW, EDW) |
| DX | Developer Experience |
| DXP | Digital Experience Platform |
| E__ | |
| EA | Enterprise Architecture |
| EAC | Estimate at Completion |
| EAI | Enterprise Application Integration |
| EAMS | Enterprise Architecture Management Suite |
| EAP | Extensible Authentication Protocol |
| EAR | Export Administration Regulations |
| EAR | Enterprise Application aRchive (file format) |
| EARS | Easy Approach to Requirements Syntax (re: Alistair Mavin, Rolls Royce) |
| EBA | Enterprise Business Architecture |
| EBA | Experience-Based Acceleration |
| EBCIDIC | Extended Binary Coded Decimal Interchange Code |
| EBIT | Earnings Before Interest & Tax |
| EBITDA | Earnings Before Interest, Taxes, Depreciation and Amortization |
| eBPF | extended Berkeley Packet Filter - see BPF |
| EBS | Amazon Elastic Block Storage |
| EBT | Energy-Based Transformer |
| EBV | Equiangular-Basis-Vectors |
| EC | European Commission |
| EC2 | Amazon Elastic Compute Cloud |
| ECA | Embodied Conversational Agent(s) |
| ECAB | Emergency Change-Advisory Board |
| ECC | Elliptic-Curve Cryptography |
| ECDH | Elliptic-Curve Diffie-Hellman |
| EDA | Exploratory Data Analysis |
| ECDSA | Elliptic Curve Digital Signature Algorithm |
| eCF or e-CF | European e-Competence Framework |
| EDA | Enterprise Data Architecture |
| EDA | Event-Driven Architecture |
| EDA | Exploratory Data Analysis |
| EDI | Electronic Data Interchange |
| EDIFECT | Electronic Data Interchange for Administration, Commerce and Transport |
| EDM | Enterprise Data Model |
| EDMC | Enterprise Data Management Council |
| EDR | Endpoint Detection and Response (i.e., cybersecurity security software) |
| EDW | Enterprise Data Warehouse (also see DW, DWH) |
| EEA | European Economic Area |
| EFF | Electronic Frontier Foundation |
| EFTA | European Free Trade Association |
| EHR | Electronic Health Record |
| EIA | Enterprise Information Architecture |
| EIP | Enterprise Integration Patterns, re: Hophe's EIP Messaging Patterns |
| EJB | Enterprise Java Bean |
| EKG | Enterprise Knowledge Graphs |
| EKS | Amazon Amazon Elastic Kubernetes Service |
| EL | Enterprise Linux |
| ELF | Executable and Linkable Format |
| ELT | Executive Leadership Team |
| ELT | Extract, Load, Transform |
| EM | Expectation Management algorithm (re: Machine Learning) |
| EME | Encrypted Media Extensions, re: W3C HTML5 recommendations |
| EMEA | Europe, the Middle East, and Africa |
| EMM | Enterprise Mobility Management |
| EMR | Elastic MapReduce (e.g., AWS) |
| EMR | Electronic Medical Record |
| EMS | Execution Management System |
| ENA | Elastic Network Adapter |
| ENI | Elastic Network Interface (re: AWS) |
| ENs | European Standards |
| EOL | End of Line |
| EOL | End of Life |
| EOLD | End of Life Date |
| EOS | Exactly Once Semantics |
| EOSL | End of Service Life Date |
| EPC | Electronic Product Code |
| EPD | Engineering, Product management, and Design |
| ePHI | Electronically Protected Health Information |
| EPLC | Enterprise Performance Life Cycle |
| EPM | Enterprise Performance Management |
| EPM | Enterprise Program Management |
| EPR | Electronic Patient Record |
| EPS | Extrusion Prevention System (see DLP) |
| ERB | Engineering Review Board |
| ERD | Entity Relationship Diagram |
| ERM | Enterprise Risk Management |
| ERP | Enterprise Resource Planning |
| ES | ECMAScript (aka JavaScript) |
| ES | Event Sourcing |
| ESA | Enterprise Solutions Architecture |
| ESG | Environmental, Social, and Governance |
| ESO | European Standards Organization |
| ESCO | Enterprise Security Operations Center |
| ESOP | Employment Stock Ownership Plan |
| ESP | Event Stream Processing |
| ESPP | Employee Stock Purchase Plan |
| ETA | Enterprise Technical Architecture |
| ETC | Estimate to Complete |
| ETL | Extract, Transform, Load |
| ETSI | European Telecommunications Standards Institute |
| EU | European Union |
| EUC | End-User Computing |
| EUDA | End-User Developed Application |
| EVM | Earned Value Management |
| F__ | |
| FaaS | Function as a Service |
| FAIL | First Attempt In Learning (i.e. agile) |
| FAIR | Facebook/Meta AI Research |
| FAIR | Findable, Accessible, Interoperable, and Reusable |
| FAME | Fast Attribute-based Message Encryption |
| FAR | Federal Acquisition Regulation |
| FASB | Financial Accounting Standards Board |
| FAT | File Allocation Table |
| FATF | Financial Action Task Force |
| FBA | Fixed-Block Architecture |
| FBDI | File-Based Data Import |
| FC | Fulfillment Center, i.e., a third-party logics (3PL) warehouse |
| FCI | Fast Causal Inference algorithm |
| FCF | Free Cash Flow |
| FCFO | Free Cash Flow From Operations |
| FCM | Firebase Cloud Messaging |
| FCoE | Fibre Channel over Ethernet |
| FCP | First Contentful Paint |
| FDDI | Fiber Distributed Data Interface |
| FDE | Forward-Deployed Engineer |
| FDL | (GNU) Free Documentation License |
| FedRAMP | Federal Risk Authorization Management Program |
| FEP | Federal Employee Program |
| FFI | Foreign Function Interface |
| FFT | Full Fine-Tuning |
| FFW | Feedforward |
| FHE | Fully Homomorphic Encryption (e.g., IBM) |
| FHIR | Fast Healthcare Interoperability Resources |
| FIBO | Financial Industry Business Ontology |
| FID | Final Investment Decision |
| FIDO | Fast IDentity Online (FIDO) |
| FinCEN | Financial Crimes Enforcement Network |
| FHIR | Fast Healthcare Interoperability Resources (a draft standard describing data formats and elements and an application programming interface for exchanging electronic health records) |
| FIDO | Fast Identity Online |
| FINRA | Financial Industry Regulatory Authority |
| FIPS | Federal Information Processing Standard, re: FIPS PUB 140-2 |
| FIRST | Fast Independent Repeatable Self-Validating Timely (source) |
| FISMA | Federal Information Security Management Act |
| FLOPS | Floating Point Operations Per Second |
| FMCG | Fast-Moving Consumer Goods |
| FMEA | Failure Mode and Effects Analysis |
| fMRI | functional Magnetic Resonance Imaging |
| FOBO | Fear Of Being Obsolete |
| FOMO | Fear Of Missing Out |
| FoS | Families of Systems |
| FOSS | Free and Open Source Software |
| FOSSA | Free Open Source Software Analysis |
| FP | Functional Programming |
| FP&A | Financial Planning and Analysis |
| FPGA | Field-Programmable Gate Arrays |
| FPR | False Positive Rate |
| FNR | False Negative Rate |
| FQL | Flows Query Language |
| FQDN | Fully Qualified Domain Name |
| FQHE | Fractional Quantum Hall Effect |
| FRC | First Robot Competition |
| FRS | Fellow of the Royal Society |
| FSC | Financial Size Categories |
| FSC | Salesforce Financial Services Cloud |
| FSDG | (GNU) Free System Distribution Guidelines |
| FTP | File Transfer Protocol |
| FUD | Fear, Uncertainty, and Doubt |
| FUE | Full-Use-Equivalent |
| FUSE | Filesystem in Userspace |
| FWaaS | FireWall-as-a-Service |
| G__ | |
| GA | Google Analytics |
| GAAP | Generally Accepted Accounting Principles |
| GADTs | Generalized Algebraic Data Types |
| GAFAM | Google (Alphabet), Apple, Facebook (Meta), Amazon, and Microsoft |
| GAM | Global Asset Management |
| GAT | Generic Associated Types (e.g. introduced in Rust 1.65 |
| GB | Gigabyte |
| GCC | Government Community |
| GCHQ | British intelligence agency Government Communications Headquarters |
| GCP | Google Cloud Platfrom |
| GDG | Generation Date Group |
| GDPR | Genera Data Protection Regulation (re: EU) |
| GERAM | Generalised Enterprise-Referencing Architectures Modelling Framework |
| GFCI | Greedy Fast Causal Interference (GFCI) Algorithm |
| GFO | General Formal Ontology |
| GHAS | GitHub Advanced Security |
| GIL | Global Interpreter Lock |
| GIN | Generalized Inverted Index |
| GIS | Geographic Information System |
| GIST | Generalized Search Tree |
| GJXDM | Global Justice XML Data Model |
| GL | General Ledger |
| GLBA | Gramm Leach Bliley Act |
| GLLMM | Generative Large Language Multi-Modal Model |
| GML | Graph Machine Learning |
| gMSA | Group Managed Service Accounts (e.g. for Swarm) |
| GMV | Gross Merchandise Value |
| GNS | GNU Name System |
| GNU | GNU's Not Unix! (a recursive acronym) |
| GOLAP | Graph OLAP |
| GOST | Goals, Objectives, Strategies, Tactics |
| GPAI | General-Purpose AI |
| GPG | GNU Privacy Guard |
| GPT | Generative Pretrained Transformer |
| GPT | GUID Partition Table |
| GPU | Graphics Processing Uni |
| GQA | Grouped-Query Attention |
| GQL | Graph Query Language ISO/IEC 39075:2024 |
| GQM | Goal, Question, Metric |
| GRC | Governance, Risk, and Compliance |
| GRE | Generic Routing Encapsulation |
| GRO | Generic Receive Offload |
| GRU | Gated Recurrent Unit |
| GSA | General Services Administration |
| GSM | Global System for Mobile Communications |
| GTIG | Google Threat Intelligence Group |
| GTM | Go-To-Market (re: strategy) |
| GUC | Global User Configuration |
| GUI | Graphical User Interface |
| GUID | Globally Unique Identifier - see UUID |
| GWP | Gross Written Premium (insurance industry) |
| H__ | |
| HA | High Availability |
| HAI | Stanford Institute for Human-Centered Artificial Intelligence |
| HAMR | Heat-Assisted Magnetic Recording |
| HATEOAS | Hypermedia As The Engine Of Application State |
| HBM | High-Bandwidth Memory |
| HBOM | Hardware Bill of Materials |
| HCI | Human-Computer Interaction |
| HCL | HashiCorp Configuration Language |
| HDA | Headless Data Architecture |
| HDC | High-Density Computing |
| HDD | Hard Disk Drive |
| HDFS | Hadoop Distributed File System |
| HDLC | High-Level Data Link Control |
| HE | Homomorphic Encryption |
| HEF | Human Error Factor |
| HEIC | High Efficiency Image Container |
| HEIF | High Efficiency Image File Format |
| HEVC | High Efficiency Video Coding |
| HICP | High Impact Control Plane |
| HIPPA | Health Insurance Portability and Accountability Act of 1996 |
| HiPPO | Highly Paid Person's Opinion |
| Hipster | Health IoT Privacy and Security Transferred to Engineering Requirements |
| HITRUST | Health Information Trust Alliance |
| HLD | High-Level Design |
| HLP | Human Level Performance (re: Machine Learning) |
| HLS | High-Level Section |
| HMAC | Hash-based Message Authentication Code |
| HMM | Hidden Markov Models |
| HNSW | Hierarchical Navigable Small World |
| HOLAP | Hybrid OLAP |
| HOT | Heap Oriented Tuples |
| HPC | Horizontal Pod Autoscaling (Kubernetes) |
| HRAA | Highly Restricted Access Area |
| HRS | HTTP request smuggling |
| HSM | Hardware Security Module |
| HSPI | Highly Sensitive Protected Information |
| HTAP | Hybrid Transactional and Analytical Processing |
| HTML | Hyper Text Markup Language |
| HTTP | Hypertext Transfer Protocol |
| HTTPS | Hypertext Transfer Protocol Secure |
| HUD | Head-Up Display |
| HVA | High Value Asset |
| HVCI | HyperVisor-enforced Code Integrity (i.e., introduced in Windows 11) |
| HW | Hardware |
| I__ | |
| IA | Information Assurance |
| IA | Internal Audit |
| IaaS | Infrastructure as a Service |
| IaC | Infrastructure as Code |
| IAM | Identity and Access Management |
| IANA | Internet Assigned Numbers Authority |
| IAS | International Accounting Standard |
| IAST | Integrated Application Security Testing |
| IBC | Investment Business Case |
| IC | Individual Contributor |
| IC | United States IntelligenceCommunity |
| ICANN | Internet Corporation for Assigned Names and Numbers |
| ICAP | Internet Content Adaptation Protocol |
| ICI | Inter-Chip Interconnect (re: networking of AI chips) |
| ICML | International Conference on Machine Learning |
| ICMP | Internet Control Message Protocol |
| ICP | Ideal Customer Profile |
| ICS | Incident Command System |
| ICS | Industrial Control Systems |
| ICT | Information and Communication Technology |
| iDaaS | Identity as a Service |
| IdAM | See IAM |
| IDCG | Ideal Discounted Cumulative Gain |
| IDD | Infrastructure Design Document |
| IDDFS | Iterative Deepening Depth First Search |
| IDE | Integrated Development Environment |
| IDEA | Imagine, Decide, Execute, Assess |
| IDL | Interface {Definition / Description} Language |
| IdM | Identity Management, also see IAM |
| IdP | Identity Provider |
| IDP | Individual Development Plan |
| IDP | Intelligent Document Processing |
| IDP | Internal Developer Platform (or Portal) |
| IDS | Intrusion Detection System |
| IE | Information Extraction, re: NER, DL, ML, NLP |
| IEC | International Electrotechnical Commission |
| IEEE | Institute of Electrical and Electronics Engineers |
| IETF | Internet Engineering Task Force |
| IFB | Invitation for Bids |
| IG | Information Gain (decision tree) |
| IGA | Identity Governance and Administration, see IAM |
| IIoT | Industrial Internet of Things |
| ILDP | Information Leak Detection and Prevention (see DLP) |
| ILM | Information Lifecycle Management |
| IM | Incident Management |
| IM | Information Model |
| IMAP | Internet Message Access Protocol |
| IMEI | International Mobile Equipment Identity |
| IMO | Integration Management Office (i.e., during Mergers & Acquisitions) |
| IMS | Identity Management System |
| IMSI | International Mobile Subscriber Identity |
| INCOSE | International Council on Systems Engineering |
| IND | Inverse Neighbor Discovery |
| INVEST | Independent Negotiable Valuable Estimable Small Testable (source) |
| IoA | Indicator of Attack |
| IoC | Indicator of Compromise |
| IOF | Industrial Ontologies Foundry |
| IOPS | Input/Output Operations Per Second |
| IoT | Internet of Things |
| IP | Intellectual Property |
| IP | Internet Protocol |
| iPaaS | Infrastructure Platform as a Service |
| iPaaS | Integration Platform as a Service |
| IPAM | IP Address Management |
| IPC | Industrial Process Control |
| IPC | Information Proteciton and Control (see DLP) |
| IPC | Inter-Process Communication |
| IPMI | Intelligent Platform Management Interface |
| IPS | Intrusion Prevention System |
| IPSec | Internet Protocol Security |
| IPv4 | Internet Protocol version 4 |
| IPv6 | Internet Protocol version 6 |
| IPW | Inverse Probability Weighting |
| IPX | Internetwork Packet Exchange |
| IQN | iSCSI Qualified Name |
| IR | Incident Response |
| IR | Information Retrieval |
| IR35 | Off-payroll working rules for clients, workers (contractors) and their intermediaries (UK) |
| IRC | Incident Response Capability |
| IRC | Internet Relay Chat |
| IRM | Incident Response Management |
| IRM | Individual Rights Management |
| IRM | Information Risk Management |
| IRM | Integrated Risk Management |
| IRP | I/O Request Packet [re: Windows Kernel Programming] |
| IRR | Internal Rate of Return |
| IRSA | IAM Roles for Service Accounts re: AWS EKS |
| IRT | Incident Response Team |
| IS | Information Security |
| ISA | Information Security Agreement |
| ISA | Information Security Architecture |
| ISA | Instruction Set Architecture |
| ISAM | Indexed Sequential Access Method |
| ISAP | Information Security Automation Program |
| iSCI | Internet Small Computer System Interface |
| ISDN | Integrated Services Digital Network |
| ISG | Industry Specification Group |
| ISM | Industrial, Scientific and Medical |
| ISM | Information Security Management |
| ISMS | Information Security Management System |
| ISO | Information Security Officer |
| ISO | International Standards Organization |
| ISOC | Internet Society |
| ISP | Information Security Policy |
| ISP | Internet Service Provider |
| ISPF | Interactive System Productivity Facility, re: IBM mainframe software product |
| ISPs | Internet service providers |
| ISRS | Information Storage and Retrieval System |
| ISSAP | Information Systems Security Architecture Professional |
| IT | Information Technology |
| IT4IT | The IT4IT Reference Architecture, a standard of the Open Group, is a powerful tool for aligning and managing a Digital Enterprise |
| ITAC | Information Technology Architecture Committee |
| ITAM | IT Asset Management |
| ITAR | International Traffic in Arms Regulations |
| ITD | Intelligent Devices |
| ITG | Intermediate Token Generation |
| ITIL | Information Technology Infrastructure Library |
| ITIM | Information Technology Investment Management |
| ITIRB | Information Technology Investment Review Board |
| ITRM | Information Technology Resource Management |
| ITS | Intelligent Transportation System |
| ITSM | Information Technlogy Service Management |
| ITSP | IT Strategic Plan |
| ITU | International Telecommunication Union |
| IV&V | Independent Verification and Validation |
| IX | Internet Exchange |
| IXPs | Internet exchange points |
| J__ | |
| k8s | Kubernetes |
| JAR | Java ARchive (file format) |
| JCP | Java Community Process |
| JDBC | Java Database Connectivity |
| JDK | Java Development Kit |
| JEPA | Joint Embedding Predictive Architecture |
| JFR | Java Flight Recorder |
| JIT | Just in Time |
| JMS | Jakarta Messaging (formerly Java Messaging Service), re: JSR 343 |
| JSON | JavaScript Object Notation |
| JRT | Java Routines and Types |
| JSON | JavaScript Object Notation |
| JSONL | JSON Lines |
| JSR | Java Specification Request |
| JSR | JavaScript Remoting |
| JTF | Joint Task Force |
| JVM | Java Virtual Machine |
| JVMS | Java Virtual Machine Specification |
| JWKS | JSON Web Key Set |
| JWT | JSON Web Token |
| K__ | |
| KAN | Kolmogorov–Arnold Network 1 |
| KCL | Kinesis Client Library |
| KCSA | Kubernetes and Cloud Security Associate (KCSA) certification, re: CNCF |
| KDC | Key Distribution Center |
| KEM | Key Encapsulation Mechanism |
| KEV | CISA Known Exploited Vulnerabilities Catalog |
| kex | key exchange |
| KMDF | Kernel-Mode Driver Framework |
| KMS | Key Management {System |
| KNN | K-nearest neibhbors (algorithm) |
| KPI | Key Performance Indicators |
| KQL | Kusto Query Language |
| KSA | Knowledge, Skills, and Abilities |
| KT | Knowledge Transfer |
| KVM | Kernel-based Virtual Machine (re: an open source virtualization technology built into Linux) |
| KVM | Keyboard, Video and Mouse |
| KVS | Key-Value Storage |
| Kwok | Kubernetes Without Kubelet |
| KYC | Know Your Client |
| L__ | |
| LAG | Link Aggregation Group |
| LaMDA | Language Model for Dialogue Applications [re: Google] |
| LAN | Local Area Network |
| LASSO | Least Absolute Shrinkage and Selection Operator (aka L1 regularization) |
| LBA | Logical Block Addressing |
| LBaaS | Load-Balancer-as-a-Service |
| LCAP | Low-Code Application Platforms |
| LCC | Lower Camel Case |
| LCM | Life Cycle Management |
| LCMS | Learning & Curriculum Management System |
| LCNC | Low-Code No-Code |
| LDA | Latent Dirichlet Allocation |
| LDA | Linear Discriminat Analysis |
| LDAP | Lightweight Directory Access Protocol |
| LDIF | LDAP Data Interchange Format, RFC 2849 The LDAP Data Interchange Format (LDIF) - Technical Specification |
| LEM | Law of Excluded Middle |
| LeSS | Large Scale Scrum |
| LFM | Liquid Foundation Model |
| LFS | Late Finish Date |
| LGPL | (GNU) Lesser General Public License |
| LID | Language Identification |
| LLaMA | Large Language Model Meta AI |
| LLC | Logical Link Control |
| LLM | Large Language Model |
| LLRT | Low Latency Runtime (e.g., AWS) |
| LMM | Large Multimodal Model |
| LOB | Line of Business |
| LOE | Level of Effort |
| LOI | Letter of Intent |
| LoRA | Low-Rank Adaptation (of Large Language Models) [see Microsoft github repo] |
| LPG | Local Peering Gateway |
| LPU | Language Processing Unit |
| LRM | Large Reasoning Model |
| LS | Late Start Date |
| LSA | Latent Semantic Analysis |
| LSA | Local Service Agreement |
| LSE | Large Scale Event |
| LSH | Locality-Sensitive Hashing |
| LSM | Log-Structured Merge-Tree |
| LSTM | Long Short-Term Memory |
| LTV | Lifetime Value |
| LTV | Loan-to-Value |
| LU | Logical Unit |
| LVM | Logical Volume Manager |
| LWE | Learning with Errors |
| L2TP | Layer 2 Tunneling Protocol |
| M__ | |
| M&A | Mergers & Acquisitions |
| MaaS | Mobility as a Service |
| MAC | Machine Access Control |
| MAC | Managed Application Consulting |
| MAC | Mandatory Access Control |
| MAC | Medium / Media Access control |
| MAC | Message Authentication Code |
| MAD | Mean absolute deviation |
| MAD | Median absolution deviation |
| MAE | Mean Absolute Error |
| MAM | Mobile Application Management |
| MAMOS | Methods, Architecture, Management, Organization, Skills |
| MANOVA | Multivariate Analysis of Variance |
| MAO | Maximum Acceptable Outage |
| MAP | Mean Average Precision |
| MAPE | Mean Absolute Percentage Error |
| MAPI | Messaging Application Programming Interface |
| MAR | Missing At Random (re: systematically missing data) |
| MAU | Monthly Active Users |
| MAU | Multi-station Access Unit |
| MBaaS | Mobile Back End as a Service |
| MBCO | Minimum Business Continuity Objective |
| MBR | Master Boot Record |
| MBRE | Model-Based Requirement Engineering |
| MBSE | Model-Based Systems Engineering |
| MCAR | Missing Completely At Random (re: data quality/completeness) |
| MCP | Model Context Protocol, also see GitHub |
| MCRA | Microsoft Cybersecurity Reference Architectures |
| MD | Markdown Language |
| MD5 | MD5 Message-Digest Algorithm |
| MD6 | MD6 Message-Digest Algorithm |
| MDA | Multi-Dimensional Analytical (i.e. queries) |
| MDAP | Mobile Application Development Platform |
| MDE | Minimum Detectable Effect |
| MDM | Master Data Management |
| MDM | Mobile Device Management |
| MDR | Managed Detection and Response |
| MDR | Marketing Development Representative |
| MDS | Master Data Service |
| MDSL | Microservice-Domain Specific Language |
| ME | Maximum Entropy |
| MEAN | MongoDB, Express.js, Angular.js, Node.js |
| MEAP | Mobile Enterprise Application Platform |
| MECE | Mutually Exclusive, Collectivelivey Exhaustive Principle |
| MED | Management of External Data |
| MEI | Merit, Excellence, and Intelligence |
| MERN | MongoDB, Express.js, React.js, Node.js |
| MFA | Micro Frontend Architecture |
| MFA | Multi-Factor Authentication |
| MFE | Micro-Frontends |
| MFT | Master File Table |
| MGF | Moment-generating function |
| MIM | Major Incident Management |
| MIMD | Multiple instruction streams, multiple data streams |
| MIME | Multipurpose Internet Mail Extensions |
| MIMO | Multiple Input Multiple Output |
| MIPS | Million of Instructions Per Second |
| MIRT | Major Incident Response Team |
| MISD | Multiple Instruction Streams, Single Data Stream |
| MIT/LCS | Massachusetts Institute of Technology Laboratory for Computer Science |
| ML | Machine Learning |
| MLE | Maximum Likelihood Estimation |
| MLLM | Multimodal Large Language Models |
| MLP | Minimum Lovable Product |
| MLP | Multi-Layer Perceptron |
| MLS | Messaging Layer Security (RFC 9420) |
| MMM | Multimodal Models |
| MMS | Massively Multilingual Speech |
| MNAR | Missing Not At Random (re: data quality/completeness) |
| MOA | Memorandum of Agreement |
| MoE | Mixture of Experts |
| MOJO | Maven plain Old Java Object |
| MOLAP | Multidimensional OLAP |
| MoM | Month-on-Month |
| MOM | Message Oriented Middleware |
| MOQ | Minimum Order Quantity |
| MOTS | Modified Off-The-Shelf |
| MOU | Memorandum of Understanding |
| MPL | Mozilla Public License |
| MPLS | Multiprotocol Label Switching |
| MPM | Manufacturing process management |
| MQL | Marketing Qualified Lead |
| MQL | Monitoring Query Language (re: Oracle Cloud?) |
| MRA | Matters Requiring Attention |
| MRC | Management Risk Committee |
| MRD | Marketing Requitements Document |
| MRM | Model Risk Management |
| MRM | Most Responsible Moment |
| MRR | Monthly Recurring Revenue |
| MSA | Microservices Architecture |
| MSA | Microsoft Services Account |
| MSA | Master Service Agreement |
| MSE | Mean Squared Error |
| MSK | AWS Managed Streaming for Apache Kafka |
| MSPF | Mobility Service Platform |
| MSP | Managed Service Provider |
| MSRC | Microsoft Security Response Center |
| MSSP | Managed Security Service Provider |
| MSTC | Microsoft Threat Intelligence Center |
| MTA | Message Transfer Agent |
| MTC | Merkle Tree Certificate |
| MTD | Maximum Tolerable Downtime |
| MTD | Mobile Threat Defense |
| MTDL | Maximum Tolerable Data Loss |
| mTLS | Mutual Transport Layer Security (or, Mutually Authenticated TLS) |
| MTPD | Maximum Tolerable Period of Disruption |
| MTS | Multidimensional Type Structure (e.g. Thomsen Diagrams) |
| MTTD | Mean Time To Detect |
| MTTI | Mean Time To Identify (re: cybersecurity) |
| MTTR | Mean Time to Recovery |
| MTTR | Mean Time to Repair |
| MTTR | Mean Time to Remediate |
| MTTR | Mean Time to Resolution |
| MTU | Maximum Transmission Unit. Maximum frame or packet size for a particular network medium. |
| MUA | Mail User Agent |
| MUPS | Minimum Usable Products/Services |
| MVC | Model-View-Controller |
| MVCC | Multi-Version Concurrency Control |
| MVI | Model-View-Intent |
| MVNO | Mobile Virtual Network Operator |
| MVP | Minimal Viable Product |
| MVS | IBM Multiple Virtual Storage |
| MVVM | Model-View-ViewModel |
| M&A | Mergers & Acquisitions |
| N__ | |
| NA | North America |
| NA | Not Applicable |
| NAF | NATO Architecture Framework |
| NAICS | North American Industry Classification System |
| NAK | Negative Acknolwedgement |
| NAS | National Academy of Sciences |
| NAS | Network Attached Storage |
| NAS | Neural Architecture Search |
| NAT | Network Address Translation |
| NC | Non-Compliant |
| NCSA | National Center for Supercomputing Applications |
| NCSC | National Cyber Security Centre |
| NCT | .NET Community Toolkit |
| ND | Neighbor Discovery |
| NDA | Non-Disclosure Agreement |
| NDCG | Normalized Discounted Cumulative Gain |
| NDP | Neighbor Discovery Protocol |
| NDR | Network Detection and Response |
| NDR | Non-Delivery Report (e.g., Office 365 Exchange Online) |
| NED | Non-Executive Director |
| NER | Named Entity Recognition, re: ML |
| NeRF | Neural Radiance Fields (re: Deep Learning, optimizing continuous volumetric scene function) |
| NGAV | New-Generation Antivirus |
| NIC | Network Interface Card |
| NIDS | Network-based Intrusion Detection System |
| NISQ | Noisy Intermediate-Scale Quantum |
| NIST | National Institute of Standards and Technology |
| NFS | Network File System |
| NFT | Non-Fungible Token |
| NFV | Network Function Virtualization |
| NIDS | Network Intrusion Detection System (see IDS) |
| NIST | National Institute for Standards and Technology |
| NISQ | Noisy Intermediate-Scale Quantum (NISQ) computers |
| NLG | Natural Language Generation |
| NLP | Natural Language Processing |
| NLS | Natural Language Support |
| NLU | Natural Language Understanding |
| NMS | Network Management System |
| NNS | Nearest neighbor search |
| NOC | Network Operations Center |
| NOPAT | Net Operating Profit After Tax |
| NPI | Non-Public Personal Information (aka NPPI) |
| NPM | Node Package Manager |
| NPPI | Non-Public Personal Informaiton (aka NPI) |
| NPV | Net Present Value |
| NRD | Non-Record Disposal |
| NRT | Near Real-Time |
| NSA | National Security Agency |
| NSG | Network Security Group |
| NSH | Network Service Header |
| NSN | nation-state notification |
| NTE | Not To Exceed |
| NTFC | No-Fee Terms and Conditions |
| NTIA | National Telecommunications and Information Administration, U.S. Department of Commerce |
| NTLM | NT LAN Manager |
| NTP | Network Time Protocol |
| NVD | National Vulnerability Database |
| O__ | |
| OASIS | Organization for the Advancement of Structured Information Systems |
| OBS | Organizational Breakdown Structure |
| OCF | Operating Cash Flow |
| OCI | Open Container Initiative |
| OCI | Oracle Cloud Infrastructure |
| OCID | Oracle Cloud Identifier |
| OCIO | Office of the Chief Information Officer |
| OCM | Organizational Change Management |
| OCP | Open Compute Project |
| OCP | OpenShift Container Platform (IBM, RedHat) |
| OCTAVE | Operationally Critical Threat, Asset, and Vulnerability Evaluation |
| OData | Open Data Protocol |
| ODBC | Open Database Connectivity |
| ODD | Observability Driven Development |
| ODE | Ordinary Differential Equation |
| ODM | Object Data Modeling |
| ODP | Open Device Partnership |
| OEF | IBM Open Enterprise Foundation for z/OS |
| OFAC | Office of Foreign Assets Control |
| OG | Open Graph, also see Open Graph Protocol |
| OGL | Open Game License (re: Wizards of the Coast D&D public copyright license) |
| OIA | Office of Intelligence and Analysis |
| OIC | Oracle Integration Cloud (note: renamed in January 2019, to Oracle Integration) |
| OID | Object Identifier |
| OID4VC | OpenID for Verifiable Credentials |
| OIDC | OpenID Connect |
| OIDC | Oracle Identity Cloud Service |
| OIDF | OpenID Foundation |
| OKRs | Objectives and Key Results |
| OLA | Operational-Level Agreement |
| OLAP | Online Analytical Processing |
| OLB | Object Language Bindings |
| OLE | Object Linking and Embedding |
| OLIN | Online Information Network |
| OLTP | Online Transaction Processing |
| OMB | Office of Management and Budget |
| OMG | Object Management Group |
| OMS | Order Management System |
| OO | Object Oriented |
| OOA/D | Object Oriented Analysis and Design |
| OOB | Out-Of-Band |
| OOBE | Out-of-Box Experience |
| OOD | Object Oriented Design |
| OODA | Observe-Orient-Decide-Act |
| OOP | Object Oriented Programming |
| OOTB | Out Of The Box |
| OPA | Open Policy Agent |
| OPEA | Open Platform for Enterprise AI, (GitHub |
| OpenELA | Open Enterprise Linux Association |
| OpEx | Operational Expense |
| OPS | Operations |
| ORB | Object Request Broker |
| ORC | Operational Risk Committee |
| OSF | Open Software Foundation |
| OSFI | Canadanian version of OFAC |
| OSI | Open Systems Interconnection model |
| OSINT | Open-Source Intelligence |
| OSQI | Open Source Quality Institutes - an idea by Tim Bray |
| OSS | Open Source Software |
| OSS | Operations Support System |
| OSSF | Open Source Security Foundation |
| OT | Operational Technology (re: computing systems that are used to manage industrial operations as opposed to administrative operations) |
| OTC | Order-to-Cash |
| OTP | One-Time Passcode |
| ou | Organizational Unit, re: LDAP |
| OV | Operational View (re: DoDAF) |
| OVP | Operational Viewpoints (re: DoDAF) |
| OWA | Outlook Web Access |
| OWASP | Open Web Application Security Project |
| OWL | Web Ontology Language |
| P__ | |
| P | Precision |
| P&L | Profit and Loss |
| PA | Policy Administrator |
| PaaR | Platform as a Runtime |
| PaaS | Platform as a Service, aka aPaaS (i.e., Application Platform as a Service) |
| PaLM | Pathways Language Model |
| PAM | Pluggable Authentication Modules |
| PAM | Privileged Access Management |
| PAP | Password Authentication Protocol |
| PAP | Policy Administration Point |
| PAS | Policy Administration System (domain: Insurance) |
| PAS | Publicly Available Specification |
| PASETO | platform-agnostic security tokens |
| PAT | Profit After Tax |
| PBAC | Policy-Based Access Control (see ABAC, CBAC) |
| PBC | Packaged Business Capability |
| PBI | Product Backlog Item (i.e. Scrum) |
| PBL | Product Backlog (i.e. Scrum) |
| PBX | Private Branch Exchange |
| PC | Percent Complete |
| PCA | Principlal Component Analysis |
| PCAP | Packet Capture |
| PCD | Project Concept Document |
| PCI DSS | Payment Card Industry Data Security Standard |
| PCMCIA | Personal Computer Memory Card International Association |
| PCR | Policy Change Request |
| PCR | Project Change Request |
| PDA | Personal Digital Assistants |
| PDCA | Plan-Do-Check-{Act |
| PDLC | Product Development Life Cycle |
| PDH | Product Development Hub |
| PDI | Personal Developer Instances |
| PDK | Platform Development Kit |
| PDM | Precedence Diagramming Method |
| PDM | Product Data Management |
| PDSA | Plan-Do-Study-Act |
| PDP | Policy Decision Point |
| PDP | Programmed Data Processor |
| PDSA | Plan-Do-Stuy-Act |
| PDU | Protocol data unit |
| PE | Policy Engine |
| PE | Private Equity |
| PEAP | Protected Extensible Authentication Protocol |
| PEER | Parameter Efficient Expert Retrieval |
| PEFT | Parameter Efficient Fine Tuning |
| PEM | Privacy Enhanced Mail |
| PEP | Packet Exchange Protocol |
| PEP | Policy Enforcement Point |
| PERT | Program Evaluation and Review Technique |
| PGM | Program |
| PGP | Pretty Good Privacy |
| PHI | Protected Health Information (re: HIPPA) |
| PI | Personal Information |
| PI | Program Increment (re: Scaled Agile Framework, SAFe) |
| PIA | Privacy Impact Assessment |
| PIA | Project Initiation Approval |
| PII | Personally Identifiable Information |
| PIN | Personal Identification Number |
| PIP | Performance Improvement Plan |
| PIR | Post Incident Review |
| PIT | Platform Information Technology |
| PITR | Point In Time Recovery |
| PIU | Profits Interests Units [a form of equity compensation typically issued by limited liability companies (LLCs) and are popular with private equity investors as a way to incentivize management. PIUs are based on the company's future value and are awarded to employees for their services to the company.] |
| PKCE | Proof Key for Code Exchange (pronounced "pixy"), re: RFC 7636 |
| PKE | Precision Knowledge Editing |
| PKI | Public Key Infrastructure |
| PKM | Personal Knowledge Management |
| PL | Published Language (re: DDD) |
| PLC | Project Life Cycle |
| PLC | Programmable Logic Controller |
| PLM | Product Lifecycle Management |
| PLSA | Probabilistic Latent Semantic Analysis |
| PM | Program Manager |
| PM | Project Management |
| PM | Project Manager |
| PMI | Project Management Institute |
| PMO | Project Management Office |
| PNAS | Proceedings of the National Academy of Sciences |
| PO | Product Owner |
| PO | Purchase Order |
| POC | Point of Contact |
| POC | Proof-of-Concept |
| POD | Point of Delivery |
| PoE | Power-over-Ethernet |
| POJO | Plain Old Java Object |
| POLDAT | Process, Organization and Location (Business Architecture) and Data, Applications and Technology (Systems Architecture) |
| POLO | Plain Old Language Objects |
| PoLP | Principle of Least Privilege |
| POML | Prompt Orchestration Markup Language |
| POOGI | Process Of Ongoing Improvement [see TOC, Theory of Constraints] |
| PoP | Policy on Policies |
| POP3 | Post Office Protocol version 3 |
| POSA | Pattern-Oriented Software Architecture |
| POSIX | Portable Operating System Interface |
| POTS | Plain old telephone service |
| POV | Point of View |
| PPC | Pay Per Click |
| PPI | Protected Personal Information |
| PPL | Policy & Procedure Library |
| PPM | [Project Portfolio Management])(https://en.wikipedia.org/wiki/Project_portfolio_management) |
| PPO | Proximal Policy Optimization (e.g., Deep Reinforcement Learning algorithm) |
| PPPoA | Point-to-Point Protocol over ATM |
| PPPoE | Point-to-Point Protocol over Ethernet |
| PPP | Point-to-Point Protocol |
| PPT | People. Process. Technology. |
| PQC | Post Quantum Cryptography |
| PR | Peer Review |
| PR | Production Ready |
| PR | Proposed Recommendation |
| PR | Pull Request |
| PR | Purchase Request |
| PRC | Product Review Committee |
| PRD | Product Requirements Document |
| PRJ | Project |
| PRNG | Pseudorandom Number Generator |
| PRM | Program |
| PRR | Production Readiness Reviews |
| PRT | Portfolio |
| PSD2 | Payment Services Directive (Directive 2015/2366/EU of the European Parliament andof the Council of 23 December 2015) |
| PSM | Persistent Stored Modules |
| PSM | Propensity Score Matching |
| PSTN | Public switched telephone network |
| PTB | Permit To Build |
| PTD | Permit to Deploy |
| PTP | Procure-to-Pay |
| PUP | PARC Universal Packet |
| PV | Present Value |
| PVA | Power Virtual Agents (re: Microsoft BOT platform) |
| PvP | Player to Player |
| PWA | Progressive Web Application |
| P2P | Peer-to-peer |
| Q__ | |
| QA | Quality Assurance |
| QAOA | Quantum Approximate Optimization Algorithm |
| QAR | Quality Assurance Review |
| QBOM | Quantum Bill of Materials |
| QC | QUality Control |
| QEC | Quantum Error Correction |
| QEMU | Quick Emulator |
| QFT | Quantum Field Theory |
| QFT | Quantum Fourier Transform |
| QI | Quality Improvement |
| QIT | QUality Improvement Team |
| QKD | Quantum Key Distribution |
| QML | Quantum Machine Learning |
| QMLM | Quantum Machine Learing Model |
| QMP | Quality Managemenet Principles (e.g., see: ISO 9000) |
| QMS | Quality Management System |
| QMT | Quality Monitoring Team |
| QNN | Quanvolutional Neural Network |
| QoE | Quality of experience |
| QoS | Quality of Service |
| QRE | Quantum Resource Estimation |
| QSA | Qualified Security Assessor |
| QPS | Queries Per Second |
| QSM | Quantitative Software Management |
| QUIC | QUIC (pronounced "quick") is a general-purpose[2] transport layer[3] network protocol initially designed by Jim Roskind at Google |
| R__ | |
| R2 | R-Squared |
| RA | Registration Authority |
| RA | Risk Assessment |
| RAA | Responsibility, Accountability, Authority |
| RAC | Real Application Cluster |
| RACF | IBM Resource Access Control Facility |
| RACI | Responsible, Accountable, Consulted, Informed |
| RAD | Rapid Application Development |
| RAG | Retrieval-Augmented Generation, (Wkipedia) |
| RAG | Red, Amber (Yellow), Green (see: Traffic Light Rating System) |
| RAID | Redundant Array of Independent Disks |
| RAII | Resouce Acquisition Is Initialization - re: Safe Programming concept |
| RAM | Random Access Memory |
| RAM | Responsibility Assignment Matrix |
| RAML | REST API Modeling Language |
| RAPT | Reverse Address and Port Translation (see RAT) |
| RAR | Roshal Archive (file format), re: archival |
| RARP | Reverse Address Resolution Protocol |
| RAS | Redundancy, Availability, Serviceability |
| RASUI | Reliability, Availability, Serviceability, Usability and Instability |
| RAT | Reverse Address and Port Translation (see RAPT |
| RAT | Remote Access Trojan |
| RBA | Role-Based Authorization |
| RBAC | Role Based Access Control |
| RBFNN | Radial Basis Function Neural Network |
| RCA | Root Cause Analysis |
| RCE | Remote Code Execution |
| RCG | Risk and Controls Group |
| RCS | Rich Communication Services |
| RCT | Randomized Controlled Trial |
| RCU | Read-Copy-Update |
| RD | Remaining Duration |
| RDB | Relational Database |
| RDC | Remote Desktop Connection |
| RDF | Resource Description Framework |
| RDMA | Remote Direct Memory Access |
| RDN | Relative Distinguished Name, re: LDAP |
| RDP | Remote Desktop Protocol |
| RDS | Amazon Relational Database Service |
| RDS | Remote Desktop Services |
| ReLU | Rectified Linear Activation |
| REST | Representational State Transfer |
| RFC | Request for Comments |
| RFE | Recursive Feature Elimination |
| RFI | Request for Information |
| RFID | Radio Frequency Identification |
| RFM | Recency, Frequency, Monetary Value |
| RFO | Reason for Outage |
| RFP | Request for Proposal |
| RFQ | Request for Quote |
| RFS | Request for Service (or, Solution) |
| RHEL | Red Hat Enterprise Linux |
| RIA | Rich Internet Application |
| RICE | Reports, Interfaces, Conversions, and Enhancements |
| RICE | Reach, Impact, Confidence, Effort (re: a scoring model framework - used by product owners/managers) |
| RIDAC | Risk, Issue, Decision, Action, and Request Changes records (re: ServiceNow) |
| RION | Raw Internet Object Notation |
| RIP | Routing Information Protocol |
| RISC | Reduced Instruction Set Computer |
| RITM | Request Item |
| RL | Reinforcement Learning |
| RLHF | Reinforcement Learning from Human Feedback |
| RMA | Return Merchandise Authorization |
| RMA | Risk Management Administration |
| RMAD | Rapid Mobile App Development |
| RMAN | Recovery Manager (re: Oracle only?) |
| RMF | Risk Management Framework |
| RMI | Remote Method Invocation |
| RMIS | Risk Management Information System |
| RMS | Rights Management Service |
| RMSE | Root Mean Squared Error |
| RMT | Recurrent Memory Transformer |
| ROC | Receiver Operating Characteristic |
| ROCE | Return on Capital Employed |
| ROE | Return on Equity |
| ROI | Return on Investment |
| ROIT | Return on Information Technology |
| ROLAP | Relational OLAP |
| ROM | Rough Order of Magnitude (also see SWAG), aka an estimate |
| ROS | Robotic Operating System |
| RP | Relying Party (re: OpenID Connect) |
| RPA | Robotic Process Automation |
| RPC | Remote Procedure Call |
| RPC | Remote Peering Connection (re: Oracle only?) |
| RPM | Redhat Package Manager |
| RPM | Requests Per Minute |
| RPO | Recovery Point Objective |
| RSVP | Resource Reservation Protocol |
| RSA | Rivest–Shamir–Adleman, (re: one of the first public-key cryptosystems) |
| RSG | Risk Strategy & Governance |
| RSU | Restricted Stock Units |
| RTB | Run The Business |
| RTCP | RTP Control Protocol |
| RTE | Release Train Engineer |
| RTF | Runtime Fabric (re: MuleSoft) |
| RTFM | Read The Freaking Manual |
| RTM | Requirements Traceability Matrix |
| RTP | Real-time Transport Protocol |
| RTR | Record-to-Report |
| RTR | Right To Represent |
| RTSP | Real Time Streaming Protocol |
| RTT | Round-Trip Time |
| RTO | Recovery Time Objective |
| RTO | Return To Office |
| RTOS | Real-Time Operating System |
| RTUs | Remote Terminal Units |
| RUM | Real User Measurements (or Monitoring) |
| RUM | Resources Under Management |
| RUP | Rational Unified Process |
| RWKV | Receptance Weighted Key Value (an open-source model that modernizes Recurrent Neural Networks to match the performance of Transformer-based LLMs) |
| S__ | |
| S | Secret |
| S&P | Strategy & Planning |
| S-DBR | Simplified Drum-Buffer-Rope |
| SA | Solution Architect |
| SaaS | Software as a Service |
| SABSA | Sherwood Applied Business Security Architecture |
| SACM | Software Asset Configuration Management (an ITIL process) |
| SAD | System Analysis and Design |
| SAD | Software Architecture Document |
| SAD | Solution Architecture Document |
| SADS | Secure Application Development Standards |
| SAF | Security Adoption Framework (Microsoft) |
| SAFe | Scaled Agile Framework |
| SAM | Segment Anything Model [re: A Foundation model for image segmentation, from FAIR] |
| SAM | Serverless Application Model |
| SAM | Serviceable Addressable Market |
| SAM | Software Asset Management |
| SAM | Successive Approximation Model, created by Allen Interactions |
| SAML | Security Assertion Markup Language |
| SAN | Storage Area Networks |
| SANS | The SANS Institute (officially the Escal Institute of Advanced Technologies) |
| SAP | Service Advertising Protocol |
| SAR | Security Assessment Report |
| SAR | Suspicious Activity Reporting |
| SAS | Shared Access Token (e.g., Azure) |
| SASE | Secure Access Service Edge |
| SAST | Static Application Security Testing |
| SATA | Seria AT Attachment |
| SAW | Statement of Architecture Work |
| SBB | Solution Building Blocks |
| SBE | Specification by Example |
| SBI | Synthetic Biological Intelligence |
| SBOM | Software Bill of Materials, re: Software Supply Chain - also see VEX |
| SCA | Security Composition Analysis |
| SCADA | Supervisory Control and Data Acquisition |
| SCAP | Security Content Automation Protocol |
| SCC | Strongly Connected Components (re: Parsel AI framework |
| SCD | Slowly Changing Dimension |
| SCI | Sensitive Compartmented Information |
| SCIM | System for Cross-Domain Identity Management (re: RFC7644) |
| SCIP | Structure and Interpretation of Computer Programs |
| SCP | Service Control Policy |
| SCSI | Small Computer System Interface |
| SCTP | Stream Control Transmission Protocol |
| SD | Service Desk |
| SDA | Solution Design Authority |
| SDD | Spec-Driven Development |
| SDF | System Data Flow |
| SDG | Sustainable Development Goals |
| SDI | Software Defined Infrastructure |
| SDK | Software Development Kit |
| SDL | Secure Development Lifecycle |
| SDLC | Software Development Life-cycle (aka Software Development Process) |
| SDLC | Synchronous Data Link Control |
| SDLP | Systems Development Lifecycle Process |
| SDN | Software Defined Networking |
| SDN | Specially Designated Nationals and Blocked Persons List |
| SDO | Standards Development Organization |
| SDP | Safe Deployment Practices |
| SDP | Software Defined Perimeter (also see VPN) |
| SDR | Sales Development Representative |
| SDSL | Symmetric digital subscriber line |
| SE | Standard Edition |
| SE | Systems Engineering |
| SEBoK | Systems Engineering Book of Knowledge - wiki |
| SEC | U.S. Securities and Exchange Commission |
| SEMP | Systems Engineering Management Plan |
| SEP | Systems Engineering Plan |
| SEO | Search Engine Optimization |
| SERC | Systems Engineering Research Council |
| SFCC | Salesforce Commerce Cloud |
| SFDC | SalesForce DotCom |
| SFIA | Skills Framework for the Information Age |
| SFRA | Storefront Reference Architecture (i.e., Salesforce B2C Commerce) |
| SFTP | Secure File Transfer Protocol |
| SFPF | Senior Foreign Political Figures |
| SHA-2 | Secure Hash Algorithm 2 |
| SHA-3 | Secure Hash Algorithm 3 - also see NIST/FIPS 202 |
| SHACL | Shapes Constraint Language |
| SHAP | SHapley Additive exPlanations |
| SHIR | Self-Hosted Integration Runtime |
| SI | System Integrator |
| SIAM | Service Integration & Management |
| SIAM | Society for Industrial and Applied Mathematics |
| SIC | Standard Industrial Classification |
| SII | Self-Identified Issue |
| SIAM | Service Integration and Management |
| SIEM | Security Information and Event Management |
| SIKE | Supersingular Isogeny Key Exchange |
| SIMD | Single InstructionStream, Multiple Data Streams |
| SIP | Session Initiation Protocol |
| SIPOC | Supplier, Input, Process, Output, Customer |
| SIRT | Security Intelligence Response Team |
| SISD | Single Instruction Stream, Single Data Stream |
| SIT | System Integration Testing |
| SKG | Semantic Knowledge Graph |
| SKU | Stock Keeping Unit |
| SLA | Service Level Agreement |
| SLES | SUSE Linux Enterprise Server |
| SLI | Service Level Indicator - a quantifiable measure of service reliability |
| SLIM | Software Lifecycle Management |
| SLMs | Small Language Models |
| SLO | Service Level Objectives - a reliability target for an SLI |
| SLO | Single Log-out |
| SLM | Service Level Management |
| SLSA | Supply chain Levels for Software Artifacts |
| SM | System Maanger |
| SMART | Specific, Measurable, {Achievable / Attainable}, {Realistic / Relevant}, and {Time-Bound / Time-Related} |
| SMART | SMART (Substitutable Medical Applications, Reusable Technologies) |
| SME | Subject Matter Expert |
| SMO | Service Management Office |
| SMOTE | Synthetic Minority Over-Sampling Technique |
| SMS | Short Message Service |
| SMT | Simultaneous Multithreading |
| SMTP | Simple Mail Transfer Protocol |
| SMURFS | Specifically Marketable, Useful, Releasable Feature Sets (source |
| sn | Surname, re: LDAP |
| SN | abbreviation for ServiceNow |
| SNA | {Service |
| SNAFU | Situation Normal, All Fucked Up |
| SNI | Server Name Indiciation |
| SNMP | Simple Network Management Protocol |
| SNOW | abbreviation for ServiceNow |
| SO | Sales Order |
| SOA | Service Oriented Architecture |
| SOA | Start of Authority record, re: DNS |
| SOAP | Simple Object Access Protocol |
| SOAR | Security, Orchestration, Automation, and Response |
| SOC | Security Operations Center |
| SOC | System and Organization Controls |
| SoE | System of Engagement |
| SOLID | Single Responsibility, Open-Closed, Liskov Substitution, Interface Segregation, Dependency Inversion |
| SOM | Serviceable Obtainable Market |
| SONET | Synchronous optical networking |
| SOSC | Service Offerings and Support Center |
| SOSL | Salesforce Object Search Language |
| SOP | Standard Operating Procedure |
| SOR | System of Record |
| SoS | System of Systems |
| S.O.S. | Slower, Older, Smarter |
| SOT | Souce of Truth |
| SOW | Statement of Work |
| SOX | Sarbanes-Oxley Act of 2022 |
| SP | Service Provider |
| SPA | Securing Privileged Access |
| SPA | Single-Page Application |
| SPAC | Special Purpose Acquisition Company |
| SPDX | Software Package Data Exchange, re: ISO/IEC 5962:2021 standard |
| SPF | Sender Policy Framework, re: email auth |
| SPICE | Simple Protocol for Independent Computing Environments |
| SPIFFE | Secure Production Identity Framework for Everyone |
| SPII | Sensitive Personally Identifiable Information |
| SPKI | Simple Public Key Infrastructure |
| SPM | Service Portfolio Management |
| SPOC | Single Point of Contact |
| SPOF | Single Point of Failure |
| SPOG | Single Pane of Glass |
| SPOT | Single Point Of Truth |
| SPP | Sequenced Packet Protocol |
| SPX | Sequenced Packet Exchange |
| SOX | Sarbanes-Oxley Act of 2002 |
| SQL | Sales Qualified Lead |
| SQL | Structured Query Language |
| SRA | Security Risk Assessment |
| SRM | Service-Component Reference Model |
| SRMA | Supplier Risk Management Assessment |
| SRP | Single Responsibility Principle |
| SRS | Secure and Reliable Systems |
| SSADM | (structured systems analysis and design methodology) - developed by Tom DeMarco, Ed Yourdon, and Larry Constantine |
| SSD | Solid-State Disk |
| SSDLC | Secure Software Development Lifecycle |
| SSG | Server-Side {Generating / Generation} |
| SSG | Static Site {Generation / Generator} |
| SSH | Secure Shell |
| SSIRP | Software and Services Incident Response Plan |
| SSL | Secure Sockets Layer |
| SSL | Self-Supervised Learning |
| SSM | State Space Model |
| SSML | Speech Synthesis Markup Language |
| SSO | Single Sign-On |
| SSOT | Single Source of Truth |
| SSP | System Security Plan |
| SSPI | Security Support Provider Interface |
| SSR | Server-Side Rendering |
| STaaS | Storage as a Service |
| STAR | Security Trust Assurance and Risk |
| STAR | Situation (20%), Task (10%), Action (60%), Result (10%) [re: method] |
| STM-1 | Synchronous Transport Module level-1 |
| STS | Security Token Service |
| STT | Speech-To-Text |
| SuD | System Under Discussion (re, see book: Writing Effective Use Cases) |
| SUMO | Suggested Upper Merged Ontology |
| SUTVA | Stable Unit Treatment Value Assumption |
| SV | Schedule Variance |
| SV | Systems View (re: DoDAF) |
| SVD | Single Value Decomposition |
| SVG | Scalable Vector Graphics |
| SVP | Systems Viewpoints (re: DoDAF) |
| SW | Software |
| SWA | Azure Static Web Apps (github) |
| SWAG | Silly Wild-Ass Guess (also see ROM), aka an estimate |
| SWE | Software {Engineer / Engineering} |
| SWG | Secure Web Gateway |
| SWOT | Strengths, Weaknesses, Opportunities, and Threats |
| T__ | |
| T2R2 | Transparent, Traceable, Replicable and Reproducible |
| t-SNE | t-distributed Stochastic Neighbor Embedding |
| TA | Throughput Accounting |
| TAG | Technical Advisory Group |
| TAM | Technical Account Manager |
| TAM | Total Addressable Market |
| TAOC | The Art of Computer Programming (re: by Donald Knuth) |
| TAR | Tape Archive (file format). Aka tarball |
| TB | Terabyte |
| TBD | To Be Determined |
| TBM | Technolog Business Management |
| TBM | Technology Business Management Council |
| TBT | Total Blocking Time |
| TCO | Total Cost of Ownership (see TOC) |
| TCP | Transmission Control Protocol |
| TCP/IP | Internet protocol suite |
| TCV | Total Contract Value (TCV) |
| TDD | Test-Driven Development |
| TDMA | Time Division Multiple Access |
| TDS | Traffic Distribution System |
| TEA | Transparency Exchange API |
| TFI | Office of Terrorism and Financial Intelligence |
| TFP | Total Factor Productivity |
| TGB | Technology Governance Board |
| THIRA | Threat and Hazard Identification and Risk Assessment |
| TIME | Tolerate. Invest. Migrate. Eliminate. (re: Gartner categorization) |
| TLA | Three Letter Acronym |
| TLS | Transport Layer Security |
| TM | Topic Model, re: NER, NLP, DL, ML |
| TNR | True Negative Rate |
| TOC | Theory of Constraints |
| TOC | Total Ownership Cost (see TCO) |
| ToM | Theory of Mind |
| TOM | Target Operating Model |
| TOML | Tom's Obvious Minimal Language |
| TOON | Token-Oriented Object Notation |
| TOP | Technology. Organization. People. |
| ToRA | Task-Oriented Reasoning and Action |
| TP | Third-Party |
| TPLC | Total Product Life Cycle |
| TPM | Trusted Platform Module |
| TPR | True Positive Rate |
| TPS | Toyota Production System |
| TPU | Tensor Processing Unit |
| TQM | Temporal Quantum Model |
| TRACTOR | TRanslating All C TO Rust (DARPA project) |
| TRM | Technical Reference Model |
| TRPM | Third-Party Risk Management |
| TS | Top Secret |
| TSD | Technical Specification Document |
| TSO | Time Sharing Option, re: IBM mainframe interactive time-sharing environment |
| TSP | Trust Service Provider |
| TSS | Time Sharing Operating System, re: IBM |
| TSS | Technical Security Standards |
| TTFB | Time to First Byte |
| TTI | Time to Interactive |
| TTL | Time To Live |
| TTM | Time-To-Market |
| TTP | Trusted Third Party |
| TTPs | Tactics, Techniques, and Procedures |
| TTS | Text-To-Speech |
| TV | Technical Stanards View (re: DoDAF) |
| TVPI | Total Value to Paid-In Capital |
| TWh | Terawatt-hours |
| TXN | Transaction |
| U__ | |
| U | Unclassified |
| UAT | User Acceptance Testing |
| UAF | Unified Architecture Framework |
| UBA | User Behavior Analytics |
| UCaaS | Unified Communications as a Service |
| UCC | Unified Communications and Collaboration |
| UCP | Universal Control-Plane |
| UDA | Universal Data Acquisition |
| UDA | Unsupervised Data Augmentation |
| UDDI | Universal Description, Discovery, & Integration |
| UDEF | Universal Data Element Framework |
| UDEM | Unified Endpoint Management |
| UDF | User Defined File |
| UDF | User Defined Function |
| UDN | Unbounded Depth Neural Network |
| UDP | User Datagram Protocol |
| UDR | User-Defined Routes |
| UDS | Unix Domain Socket |
| UEBA | User and Entity Behavior Analytics |
| UEFI | Unified Extensible Firmware Interface |
| UGC | User Generated Content |
| UI | User Interface |
| UIMA | Unstructured Information Management Architecture |
| ULID | Universally unique Lexicographically sortable IDentifier |
| UMB | Ultra Mobile Broadband |
| UML | Unified Modeling Language |
| UPC | Universal Product Code |
| URL | Uniform Resource Locator |
| US-NII | Unlicensed National Information Infrastructure bands |
| USB | Universal Serial Bus |
| USD | Universal Scene Description |
| USL | Universal Scalability Law ~ Neil J. Gunther |
| USP | Unique Selling Point |
| USS | Unix System Services |
| UTC | Coordinated Universal Time |
| UTF | Unicode Transformation Format |
| UUID | Universal Unique Identifier - also GUID |
| UVP | Unique Value Proposition |
| UX | User Experience |
| V__ | |
| V2B | Vehicle-to-Building |
| V2C | Vehcile-to-Cloud |
| V2D | Vehicle-to-Device |
| V2G | Vehicle-to-Grid |
| V2I | Vehicle-to-Infrastructure |
| V2V | Vehicle ad hock netowrk, or vehicle-to-vehicle |
| V2X | Vehicle-to-Everything |
| VA | Validation Authority |
| VAE | Variational Autoencoders |
| VAPT | Vulnerability Assessment and Penetration Testing |
| VAX | Virtual Address eXtension |
| VAS | Value-Added Services |
| VBS | Virtualization-based Security (i.e., introduced in Windows 11) |
| VC | Venture Capital |
| VCF | VMware Cloud Foundation |
| VCN | Virtual Cloud Network |
| vCPU | Virtual Central Processing Unit |
| VDBMS | Vector Database Danagement System, aka vector data, or vector store |
| VDI | Virtual Desktop Infrastructure |
| VEX | Software-Exploitability eXchange |
| VHD | Virtual Hard Disk |
| VIF | Virtual Interfaces |
| VIF | Variance Inflation Factor |
| VII | ehicle Infrasture Integration |
| VIP | Virtual IP address |
| VISP | Virtual ISP |
| VLAN | Virtual Local Area Network |
| VM | Virtual Machine |
| VMI | Virtual Machine Image |
| VNC | Virtual Network Computing |
| VNet | Virtual Network |
| VNI | Virtual Network Interface |
| VNIC | Virtual Network Interface Card |
| VoIP | Voice over Internet Protocol |
| VPDA | Versioning, Packaging, Dependency Management, Artifact Management |
| VPN | Virtual Private Network |
| VPS | Virtual Private Server |
| VQF | Variational Quantum Factoring |
| VR | Virtual Reality |
| VRM | Value Realization Model |
| VRM | Vendor Relationship Manager (aka VRO) |
| VRO | Vendor Relationship Owner (aka VRM) |
| VSA | Vertical Slice Architecture |
| VSAM | Virtual Storage Access Method |
| VSM | Value Stream Mapping |
| VSM | Value Stream Management |
| VSMP | Value Stream Management Platform |
| VSOC | Virtual Security Operations Center |
| VTAP | Virtual Test Access Point |
| VTOC | Volume Table of Contents, re: IBM |
| VUCA | Volatility, Uncertainty, Complexity, Ambiguity - origin: The U.S. Army War College |
| VXLAN | Virtual Extensible LAN |
| W__ | |
| W3 | World Wide Web (i.e. WWW) |
| W3C | World Wide Web Consortium |
| WaaS | Workers as a Service |
| WADL | Web Application Description Language |
| WAF | Web Application Firewall |
| WAFS | Wide Area File Services |
| WAI | Web Accessibility Initiative |
| WAL | Write-ahead Logging |
| WAN | Wide Area Network |
| WAP | Wireless Access Point |
| WAR | Web Application Resource (or, Web application ARchival |
| WASI | WebAssembly System Interface |
| wasm | WebAssembly wikipedia |
| WATG | Web Accessibility and Training Guide |
| WBS | Work Breakdown Structure |
| WCAG | Web Content Accessibility Guidelines |
| WCCP | Web Cache Communication Protocol |
| WCDMA | Wide-band Code-Division Multiple Access |
| WCET | Worst-Case Execution Time |
| WCT | Windows Community Toolkit |
| WD | Working Draft |
| WDM | Windows Driver Model |
| WebPKI | Web Public-Key Infrastructure |
| WET | Write Everything Twice (also see DRY) |
| WFH | Work-From-Home |
| WFM | Windows Filtering Platform |
| Wi-Fi | Wireless Fidelity |
| WLIF | Workload Identity Federation |
| WIP | Work in Progress |
| WISP | Wireless Internet service provider |
| WLAN | Wireless Local Area Network |
| WLM | Work Lifecycle Management |
| WMS | Warehouse Management System |
| WOC | WAN optimization controller |
| WoT | Web of Trust |
| WORM | Write-Once-Read-Many |
| WPA | Wi-Fi Protected Access |
| WPA | Wi-Fi Protected Access II |
| WPA | Wi-Fi Protected Access 3 |
| WPS | Wi-Fi Protected Setup |
| WRT | Work Recovery Time |
| WSDL | Web Service Description Language |
| WSJF | Weighted Shortest Job First (re: Scaled Agile Framework, SAFe) |
| WWW | World Wide Web |
| X__ | |
| XA | EXtended Architecture |
| XDR | Extended Detection and Response |
| XID | Transaction Identifier |
| XML | Extensible Markup Language |
| XNS | Xerox Network Systems |
| XP | eXtreme Programming |
| XR | Extended Reality |
| XSL | XML Style Language |
| XSLT | eXtensible Stylesheet Language Transformations |
| XSS | Cross-Site Scripting |
| Y__ | |
| YAGNI | You Aren't Gonna Need It |
| YAS | Yet Another Silo |
| YB | Yottabyte |
| YBIYRI | You-build-it-you-run-it |
| YBYO | You Build, You Own (alternatively: You Buid It, You Own It) |
| Z__ | |
| ZB | Zettabyte |
| ZBB | Zero-Based Budgeting |
| zkEVM | zero-knowledge Ethereum Virtual Machine |
| ZKP | Zero Knowledge Proof |
| ZPR | Zero Trust Packet Routing |
| ZSP | Zero Standing Privilege |
| ZT | Zero Trust |
| ZTA | Zero Trust Architecture |
| ZTDNS | Zero Trust DNS |
| ZTNA | Zero Trust Network Access |