Skip to content

Glossary

Comprehensive glossary of cloud-native, Kubernetes, and software distribution terminology

Air gapped

Understanding air gapped systems, networks, and environments. Their purpose, use cases, and practical applications.

BYOC Definition

BYOC - Bring Your Own Cloud deployment model definition and explanation

Common Vulnerabilities and Exposures (CVE)

Understanding CVEs: What they are, how they work, and their critical role in cybersecurity and vulnerability management.

Helm Chart

Understanding Helm charts, their role in Kubernetes package management, and how they simplify the process of deploying, managing, and scaling applications

Independent Software Vendor (ISV)

Understanding who ISVs are, what they do and who they serve.

Kubernetes

Understanding the Kubernetes platform, its architecture, and its role in modern application deployment

OCI Container and Artifact Registry

All you need to know about OCI Container and Artifact Registries: Definition, examples, and how to use it.

On-Premises Definition

Understanding the On-Premises deployment targets

SaaS Definition

Understanding the Software as a Service deployment model definition and explanation

Self Managed Software

Understanding the Self-Managed software deployment model

Software Bill of Materials (SBOMs)

Discover what SBOMs are, their importance, and their role in software security supply chains.

Software License Management

Find out what Software License Management is, why it is important, and how to track software licenses effectively.

Vulnerability Scanning

Understanding how vulnerability scanning identifies security weaknesses, its types, benefits, and role in a comprehensive security strategy