Abstract Factory Pattern
A creational design pattern that provides an interface for creating families of related or dependent objects without specifying their …
Clear definitions of AI terms, concepts, and jargon for practitioners.
Plain-language definitions of AI terminology — from fundamentals to cutting-edge concepts.
A creational design pattern that provides an interface for creating families of related or dependent objects without specifying their …
A fundamental programming principle that hides complex implementation details behind simplified interfaces, allowing developers to work with …
Frameworks for controlling who can access resources, including DAC, MAC, RBAC, and ABAC.
The four guarantees that database transactions provide to ensure data reliability: Atomicity, Consistency, Isolation, and Durability.
What activation functions are, how they enable neural networks to learn non-linear patterns, and which functions are used in modern …
Framework for intelligently selecting the most informative data points to label, reducing annotation costs while maximizing model …
A UML behavioral diagram for modeling workflows, business processes, and algorithms with support for parallel execution, branching, and …
A structural design pattern that converts the interface of a class into another interface that clients expect, enabling incompatible …
How evasion, poisoning, and model extraction attacks threaten ML systems, and the defenses available to mitigate them.
What an aggregate root is in DDD, how it enforces consistency boundaries, and how to design aggregates correctly.
What AI agents are, how they autonomously plan and execute tasks, and the architectural patterns that distinguish agents from simple …
A centralized proxy layer that routes, governs, monitors, and optimizes requests to LLM providers, serving as the control plane for …
Comparing GPUs, TPUs, and custom ASICs from NVIDIA, Google, Groq, and Cerebras for training and inference workloads.
What AI literacy means, why it matters for organizations adopting AI, and what competencies are required across technical and non-technical …
A dedicated adversarial testing team that probes AI systems for vulnerabilities, biases, safety failures, and misuse potential before and …
What AI safety is, the categories of harm it addresses, and the technical and organizational approaches to preventing AI systems from …
How invisible signatures are embedded in AI-generated text, images, and audio to enable detection and attribution of model outputs.
What AIOps means, how AI-driven operations improve alerting, root cause analysis, and automated remediation, and when to adopt AIOps …
What Aurora is, how it provides managed relational database performance, and when to choose Aurora for AI application backends.
Amazon Bedrock AgentCore is a managed runtime and governance layer for deploying, operating, and securing AI agents at enterprise scale on …
What DynamoDB is, how its key-value model works, and when to choose DynamoDB for AI application data.
What Amazon Kinesis is, how it processes streaming data in real time, and when to use Kinesis versus other streaming options.
Methods for identifying outliers and unusual patterns in data, including Isolation Forest, One-Class SVM, and autoencoder-based approaches.
What Kafka is, how it provides distributed event streaming, and when to choose Kafka for AI data pipelines.
What an API gateway is, how it manages API traffic, and when to use managed gateways versus custom solutions.
An open and independent modeling language for enterprise architecture, maintained by The Open Group.
Autoregressive Integrated Moving Average model for time series forecasting, including SARIMA for seasonal patterns.
Pattern discovery techniques including Apriori and FP-Growth algorithms for finding frequent itemsets and meaningful associations in …
Public-key cryptography using mathematically related key pairs, including RSA and elliptic curve algorithms.
What attention mechanisms are, how they enable transformers to process sequences, and why they matter for modern AI architectures.
The distinction between verifying identity (authentication) and granting access permissions (authorization), including the AAA model.
What auto-scaling is, how it adjusts capacity dynamically, and how to configure scaling policies for cost-efficient AI workloads.
What autoencoders are, how they learn compressed data representations, and practical applications in anomaly detection and dimensionality …
The study of abstract computational machines and the formal languages they recognize, forming the theoretical foundation for parsing, …
The legal framework under GDPR Article 22 governing decisions made solely by automated systems, including AI, that produce legal or …
What backpropagation is, how it computes gradients for neural network training, and why it matters for understanding AI systems.
What batch normalization is, how it stabilizes neural network training, and when to apply it in model architectures.
Gaussian process-based sequential optimization method for efficient hyperparameter tuning of expensive-to-evaluate functions.
What the bias-variance tradeoff is, how it explains model generalization, and how to use it to guide model selection decisions.
The mathematical foundation of digital logic, from George Boole's algebraic system to physical circuit implementations.
What a bounded context is, how it defines model boundaries in DDD, and how it guides microservice decomposition.
A standardized graphical notation for specifying business processes in workflow and process diagrams.
A structural design pattern that decouples an abstraction from its implementation so that the two can vary independently.
A creational design pattern that separates the construction of a complex object from its representation, allowing the same construction …
A discipline for designing, executing, monitoring, and optimizing organizational business processes.
A fundamental theorem in distributed systems stating that a distributed data store can provide at most two of three guarantees: Consistency, …
What CDNs do, how CloudFront accelerates content delivery, and when to use a CDN for AI application frontends.
The CE marking applied to high-risk AI systems under the EU AI Act, indicating conformity with EU requirements and enabling market access.
A behavioral design pattern that passes a request along a chain of handlers, where each handler decides whether to process the request or …
What change data capture (CDC) is, how Debezium and AWS DMS enable real-time data replication, and why CDC matters for keeping AI feature …
What chaos engineering is, how controlled experiments improve system resilience, and how to start practicing it safely.
The three fundamental objectives of information security that guide the design and evaluation of security controls.
The most widely used UML diagram type, showing classes with their attributes and methods along with the relationships between them.
What clean architecture is, how dependency inversion organizes code layers, and when this structure benefits AI applications.
A distributed architecture where clients send requests to centralized servers that provide services and resources.
The framework of policies, processes, and controls that organizations use to manage cloud resources, ensure compliance, control costs, and …
What clustering is, major clustering algorithms, and practical applications for grouping data without labels.
A process improvement framework that helps organizations improve performance across projects, divisions, and the enterprise.
An IT governance and management framework developed by ISACA for aligning IT with business goals.
Indicators of design problems in code and systematic techniques for improving code structure without changing behavior.
A behavioral design pattern that encapsulates a request as an object, allowing parameterization of clients with different requests, queuing, …
Programs that translate human-readable source code into machine-executable instructions, through compilation or interpretation.
Classifications of computational problems by resource requirements, including P, NP, and NP-complete.
A UML structural diagram that shows the organization of system components, their interfaces, and the dependencies between them.
Component-driven development is the practice of building UIs from isolated, reusable components, formalized by Brad Frost's Atomic Design …
A structural design pattern that composes objects into tree structures to represent part-whole hierarchies, letting clients treat individual …
A design principle that favors object composition over class inheritance for code reuse, resulting in more flexible and maintainable …
An AI architecture that combines multiple models, retrievers, tools, and programmatic logic to solve tasks that exceed the capabilities of …
What concept drift is, how the relationship between inputs and outputs changes over time, and strategies for detecting and responding to it …
Techniques for managing concurrent execution in operating systems and applications, including mutexes, semaphores, monitors, and strategies …
The EU AI Act process for evaluating whether a high-risk AI system meets regulatory requirements before it can be placed on the market.
What a confusion matrix is, how to read it, and how it connects to precision, recall, and other classification metrics.
The practice of frequently merging code changes into a shared repository with automated builds and tests.
What continuous training is, how automated retraining pipelines keep ML models current, and the triggers and safeguards needed for …
What contract testing is, how it verifies service integration agreements, and when to use it instead of end-to-end tests.
How contrastive learning methods like SimCLR, CLIP, and MoCo learn useful representations by comparing positive and negative pairs without …
How CNNs extract spatial features from images and why architectures like ResNet, EfficientNet, and MobileNet remain foundational in computer …
Operating system algorithms that determine which process or thread runs on the CPU, including FCFS, SJF, Round Robin, and priority-based …
What CQRS is, how it separates read and write models, and when this pattern improves AI application architecture.
A schedule analysis technique that identifies the longest sequence of dependent activities determining the minimum project duration.
What cross-validation is, how it provides robust model performance estimates, and when to use different cross-validation strategies.
The study of control, communication, and feedback in systems, whether mechanical, biological, or social.
What a data catalog is, how metadata management and data discovery tools help AI teams find, understand, and trust their data assets.
What data contracts are, how schema-first agreements between data producers and consumers prevent breaking changes, and why AI systems need …
The entity that determines the purposes and means of processing personal data under GDPR, bearing primary responsibility for compliance in …
What data drift is, how input data distributions change over time, and methods for detecting and responding to drift in production ML …
What a data lake is, how it stores raw data at scale, and when to use a data lake versus a data warehouse.
What data lineage is, how tracking data from origin through transformations supports compliance, debugging, and trust in AI systems.
What data mesh is, how it decentralizes data ownership, and when this organizational pattern is appropriate.
The process of creating visual representations of data structures at conceptual, logical, and physical levels to define how data is stored, …
An entity that processes personal data on behalf of a data controller under GDPR, relevant to AI service providers, cloud platforms, and ML …
A self-contained, discoverable unit of data managed as a product with clear ownership, quality guarantees, and consumer interfaces, …
What data quality means for AI systems, the dimensions of data quality, and how validation, profiling, and monitoring prevent …
The principle that data is subject to the laws and governance of the country or region where it is collected or stored, critical for AI …
What a data warehouse is, how it supports analytical queries on structured data, and how it complements data lakes for AI workloads.
Data structures that improve query performance by providing fast lookup paths to rows in database tables, including B-tree, hash, and bitmap …
A systematic approach to organizing relational database tables to reduce data redundancy and improve data integrity, progressing through …
Units of work in a database that group multiple operations into a single atomic, consistent, isolated, and durable sequence with commit and …
Density-Based Spatial Clustering of Applications with Noise, a clustering algorithm that discovers arbitrary-shape clusters and identifies …
A condition where two or more processes are permanently blocked, each waiting for a resource held by another, along with the Coffman …
What decision trees are, how they make predictions through hierarchical rules, and their role as building blocks for ensemble methods.
A structural design pattern that attaches additional responsibilities to an object dynamically, providing a flexible alternative to …
What deep learning is, how it differs from traditional machine learning, and when deep learning is the right approach for your problem.
How deep RL algorithms like DQN, PPO, and A3C combine neural networks with reward-based learning, including RLHF for aligning LLMs.
A SOLID design principle stating that high-level modules should not depend on low-level modules, and both should depend on abstractions.
A UML structural diagram that shows the physical deployment of software artifacts on hardware nodes, modeling the runtime architecture of a …
What design systems are, how Brad Frost's Atomic Design formalized the methodology, and how component libraries, style guides, and pattern …
What design tokens are, how Jina Anne coined the term at Salesforce in 2014, and how the W3C Design Tokens Community Group is standardizing …
What DevSecOps means, how it integrates security into every stage of CI/CD, and why shifting security left is essential for AI/ML systems …
What diffusion models are, how they generate images and other media, and their role in enterprise AI applications.
Public key infrastructure (PKI) mechanisms for verifying authenticity and integrity using X.509 certificates and digital signature schemes.
What dimensionality reduction is, common techniques including PCA and t-SNE, and when to reduce feature dimensions in your ML pipeline.
An algorithmic paradigm that recursively breaks a problem into smaller subproblems, solves them independently, and combines the results.
The hierarchical, distributed naming system that translates human-readable domain names into IP addresses, serving as the Internet's …
What Docker is, how containers package applications, and best practices for containerizing AI workloads.
What domain-driven design is, how it aligns software architecture with business domains, and when to invest in DDD.
EU regulation requiring financial entities to ensure ICT resilience, covering risk management, incident reporting, testing, and third-party …
A structured process required under GDPR Article 35 to identify and mitigate data protection risks in high-risk processing, including most …
What dropout is, how it prevents overfitting in neural networks, and practical guidance on when and how to apply it.
A software development principle stating that every piece of knowledge must have a single, unambiguous, authoritative representation within …
An algorithmic technique that solves complex problems by breaking them into overlapping subproblems and storing their solutions.
A project performance measurement technique that integrates scope, schedule, and cost metrics to assess project health.
What edge computing is, how it brings computation closer to data sources, and when edge deployment is appropriate for AI workloads.
What the Elastic Stack is, how Elasticsearch, Logstash, and Kibana work together, and when to use it for log management.
What ELT is, how it differs from ETL, and why modern data architectures favor loading raw data before transforming.
The CSS-in-JS paradigm introduced by Christopher Chedeau (Vjeux) in 2014 and the Emotion library created by Kye Hohenberger in 2017 that …
A fundamental object-oriented programming principle that bundles data and the methods that operate on that data within a single unit, …
What end-to-end testing is, how browser automation validates full-stack AI applications, and why E2E tests are essential but expensive.
What ensemble methods are, how combining models improves predictions, and when to use bagging, boosting, and stacking.
An overview of the enterprise architecture discipline, covering its purpose, frameworks, and role in aligning IT with business strategy.
A conceptual data modeling technique that represents data as entities, attributes, and relationships, typically visualized through ER …
A flowchart-based modeling notation for business processes, originating from the ARIS framework.
What an error budget is, how it balances reliability with feature velocity, and how to implement error budget policies.
What an essential entity is under the NIS2 Directive, which sectors are classified as essential, and the cybersecurity obligations that …
What ETL is, how it powers data pipelines, and how it compares to ELT for modern data architectures.
What experiment tracking is, why systematic logging of ML experiments is essential, and the tools and practices that make it work.
What the F1 score measures, when to use it as a model evaluation metric, and its limitations.
A structural design pattern that provides a simplified interface to a complex subsystem, reducing the coupling between clients and subsystem …
A creational design pattern that defines an interface for creating objects but lets subclasses decide which class to instantiate.
What feature branching is, how it isolates development work, and the tradeoffs compared to trunk-based development.
What a feature store is, how it serves as a centralized repository for ML features, and why it solves the training-serving skew problem.
What few-shot learning is, how it enables models to generalize from minimal examples, and practical prompting strategies.
The methods and data structures operating systems use to organize, store, and retrieve data on storage devices, including ext4, NTFS, …
Network security devices and techniques that control traffic flow between networks, including packet filtering, stateful inspection, and …
What flaky tests are, why they are especially common in AI systems, and strategies for managing non-deterministic test failures.
How Flash Attention makes transformer self-attention memory-efficient by restructuring computation to minimize GPU memory reads and writes.
A structural design pattern that uses sharing to support large numbers of fine-grained objects efficiently by externalizing shared state.
What GANs are, how generator-discriminator training works, and where GANs remain relevant alongside diffusion models.
A horizontal bar chart used to visualize project schedules, showing tasks, durations, dependencies, and progress over time.
The EU's comprehensive data protection law governing how personal data is collected, processed, and stored, with significant implications …
What GitHub Pages is, how it provides static site hosting directly from Git repositories, and its role in popularizing the static site …
What GitOps is, how it uses Git as the single source of truth for infrastructure and deployments, and practical implementation.
What a golden dataset is, how it serves as a curated evaluation benchmark for measuring AI model quality, and best practices for building …
Ensemble learning method that builds models sequentially to correct previous errors, including XGBoost, LightGBM, and CatBoost …
What gradient descent is, how it optimizes neural networks, and the variants used in modern deep learning.
What Grafana is, how it visualizes metrics and logs, and best practices for building operational dashboards.
Algorithms for traversing and finding paths in graphs, including BFS, DFS, Dijkstra's, and A*.
How GNNs process graph-structured data for node classification, link prediction, and graph-level tasks using message passing.
Algorithms that make the locally optimal choice at each step, aiming for a globally optimal or near-optimal solution.
What ground truth is in machine learning, how verified correct labels are obtained, and why ground truth quality directly bounds model …
What gRPC is, how Protocol Buffers and streaming RPCs work, and why gRPC is well-suited for high-performance ML inference services.
What AI hallucination is, why language models generate plausible but incorrect information, and strategies for detection and mitigation.
Data structures that map keys to values using hash functions for near-constant-time lookup, insertion, and deletion.
One-way functions that produce fixed-size digests from arbitrary input, including SHA-256, MD5, and bcrypt.
Tree-based data structures that efficiently support finding and extracting the minimum or maximum element.
What Helm charts are, how they package Kubernetes deployments, and best practices for managing charts in production.
What hexagonal architecture is, how ports and adapters decouple business logic from infrastructure, and practical implementation guidance.
Agglomerative and divisive clustering methods that produce a tree-like hierarchy of clusters visualized through dendrograms.
How homomorphic encryption enables computation on encrypted data, allowing ML inference without exposing sensitive inputs.
The foundational web protocols for transferring hypertext documents and resources, with HTTPS adding encryption via TLS for secure …
What hyperparameter tuning is, the main strategies for finding optimal settings, and how to approach it efficiently.
What idempotency means, how idempotency keys work for API endpoints, and why safe retry behaviour is critical for AI inference APIs handling …
Strategies for handling skewed class distributions including SMOTE, undersampling, class weighting, and evaluation considerations.
What immutable infrastructure means, how it replaces mutable servers with disposable instances, and why it improves reliability.
The practice of allocating additional computation during model inference to improve reasoning quality, including chain-of-thought, search, …
An overview of the information systems discipline, covering types of IS, their role in organizations, and foundational concepts.
Core object-oriented programming mechanisms: inheritance creates class hierarchies for code reuse, while polymorphism enables objects of …
What integration testing is, how it verifies component interactions, and where test boundaries belong in AI systems.
A SOLID design principle stating that no client should be forced to depend on methods it does not use, favoring small, specific interfaces …
A behavioral design pattern that defines a representation for a language's grammar and provides an interpreter to evaluate sentences in that …
The system of numerical addresses used to identify devices on IP networks, including IPv4, IPv6, CIDR notation, and subnet design for …
The international standard specifying requirements for establishing, implementing, and improving an AI management system within …
What Istio is, how it implements a service mesh on Kubernetes, and when the operational overhead is justified.
An overview of IT governance principles and frameworks for ensuring IT investments support business objectives.
The discipline of designing, delivering, managing, and improving IT services to meet business needs.
A behavioral design pattern that provides a way to access elements of an aggregate object sequentially without exposing its underlying …
A framework of best practices for IT service management, originally developed by the UK government.
The web architecture pattern coined by Mathias Biilmann of Netlify in 2016, combining JavaScript, APIs, and Markup to deliver fast, secure, …
What K-means clustering is, how the algorithm works, and practical guidance for applying it to enterprise data.
Instance-based lazy learning algorithm that classifies data points by majority vote of their nearest neighbors, using various distance …
What Kiro is, how AWS's spec-driven AI IDE structures development through requirements, design, and task specifications, and how it differs …
A design principle stating that systems work best when they are kept simple rather than made complex, favoring straightforward solutions …
How teacher-student training compresses large models into smaller, faster ones while preserving most of the original accuracy.
How KANs replace fixed activation functions with learnable functions on edges, offering interpretable and efficient alternatives to standard …
What Kubernetes is, how it orchestrates containers at scale, and when to use EKS versus simpler alternatives.
What a lakehouse is, how it combines data lake flexibility with warehouse performance, and practical implementation options.
A design guideline for developing software, particularly object-oriented programs, that promotes loose coupling by restricting the set of …
A software architecture pattern that organizes components into horizontal layers with strict dependency rules.
Foundational supervised learning algorithm for continuous prediction, including Ridge, Lasso, and ElasticNet regularization variants.
Fundamental linear data structures for organizing and accessing data sequentially.
A SOLID design principle stating that objects of a supertype should be replaceable with objects of a subtype without altering the …
The practices, tools, and infrastructure for deploying, monitoring, and managing large language model applications in production …
What load balancers do, the types available on AWS, and how to choose the right one for your workload.
Binary and multinomial classification algorithm using the sigmoid function and log-loss optimization.
How modern architectures handle 100K to 1M+ token contexts through positional encoding advances, memory-efficient attention, and …
What loss functions are, how they guide model training, and which loss functions apply to common AI tasks.
The open-source React component library implementing Google's Material Design system, one of the most widely adopted UI frameworks in the …
A behavioral design pattern that defines an object that encapsulates how a set of objects interact, promoting loose coupling by preventing …
A behavioral design pattern that captures and externalizes an object's internal state so it can be restored later, without violating …
Operating system techniques for managing physical and virtual memory, including paging, segmentation, virtual address spaces, and page …
What message queues are, how they decouple services, and when to use SQS versus other messaging patterns.
How multi-LLM collaboration frameworks improve response quality by combining outputs from diverse language models.
What MLOps is, how it applies DevOps principles to machine learning, and the practices that enable reliable, repeatable ML system delivery.
Test doubles for AI systems: mocks, stubs, fakes, and spies explained, with guidance on when to use each for testing AI applications.
Techniques for producing reliable probability estimates from classifiers, including Platt scaling and isotonic regression.
What a model card is, why standardized ML model documentation matters, and what information a model card should contain.
What model drift is, how model performance degrades over time in production, and the monitoring and response strategies to address it.
The complete provenance record of an AI model, tracking its training data, code, hyperparameters, parent models, and transformations …
What a model registry is, how it provides versioned storage and lifecycle management for trained ML models, and why it is essential for …
A software architecture where all components are built and deployed as a single, self-contained unit.
What a monorepo is, how Google's approach was documented in the landmark 2016 ACM paper, and how modern tools like Nx and Turborepo make …
Multi-agent orchestration is the pattern of coordinating multiple specialized AI agents to collaborate on complex tasks, with roots in …
How models like GPT-4o and Gemini process text, images, audio, and video together within a unified architecture.
An architectural pattern that separates application concerns into model (data), view (presentation), and controller (input handling).
An architectural pattern that uses data binding to connect the View to a ViewModel, enabling separation of UI from business logic.
Probabilistic classification algorithm based on Bayes' theorem with strong independence assumptions, widely used for text classification.
What NAT gateways do, how they enable private subnet internet access, and cost considerations for AWS deployments.
A survey of essential network protocols beyond TCP, UDP, and HTTP, including ARP, ICMP, DHCP, FTP, SMTP, and SSH.
How automated methods discover optimal neural network architectures using reinforcement learning, evolutionary algorithms, and …
What neural networks are, how they learn from data, and where they fit in modern AI system architecture.
How NeRF reconstructs photorealistic 3D scenes from 2D images using neural networks to represent volumetric scene functions.
How brain-inspired spiking neural networks and specialized hardware like Intel Loihi enable ultra-low-power AI at the edge.
The React framework created by Vercel (formerly Zeit) in 2016 that popularized server-side rendering, file-based routing, and hybrid …
The EU's updated cybersecurity directive requiring essential and important entities to implement risk management measures, with direct …
The US National Institute of Standards and Technology's voluntary framework for managing risks in AI systems throughout their lifecycle.
The server-side JavaScript runtime created by Ryan Dahl in 2009, built on Chrome's V8 engine with an event-driven, non-blocking I/O …
A broad category of non-relational database systems designed for specific data models and access patterns, including document, key-value, …
The package manager for Node.js created by Isaac Schlueter in 2010, which established the registry model and semantic versioning conventions …
Binary, hexadecimal, and character encoding systems (ASCII, Unicode) that underpin how computers represent data.
OAuth is an open standard for delegated authorization, originating from Blaine Cook and Chris Messina's work at Twitter in 2006-2007 and …
A behavioral design pattern that defines a one-to-many dependency between objects so that when one object changes state, all its dependents …
An architecture pattern placing the domain model at the core with infrastructure concerns on the outside, inverting traditional …
Incremental machine learning approach that updates models continuously with streaming data rather than retraining from scratch.
A SOLID design principle stating that software entities should be open for extension but closed for modification.
What the OpenAPI Specification is, how schema-first API design works, and why code generation from OpenAPI specs improves consistency for AI …
The core concepts of operating systems including the kernel, system calls, resource management, and the role of the OS as an intermediary …
The Open Systems Interconnection model, a seven-layer conceptual framework that standardizes how network communication functions are …
What overfitting is, how to detect it, and practical strategies to prevent models from memorizing training data instead of learning …
An extension of the CAP theorem that addresses the trade-off between latency and consistency even when no network partition is present.
What Pagefind is, how it provides static search for static sites using WebAssembly-based indexing, and why its chunked index design enables …
What PCA is, how it identifies principal components, and when to use it for dimensionality reduction in ML pipelines.
Authorized simulated attacks on systems to identify security vulnerabilities before malicious actors exploit them.
An architecture pattern where data flows through a sequence of independent processing components connected by channels.
What platform engineering means, how internal developer platforms accelerate AI/ML teams, and why self-service infrastructure reduces …
Playwright browser automation framework: what it is, key features, and why it is well-suited for testing AI-powered web applications.
A comprehensive standard published by PMI that defines project management processes, knowledge areas, and best practices.
What the ports and adapters pattern is, how it structures application boundaries, and its relationship to hexagonal architecture.
How transformers represent sequence order using sinusoidal, rotary (RoPE), and ALiBi positional encoding schemes.
What precision and recall measure, how to choose between them, and why the tradeoff matters for business-critical AI systems.
A structured, process-based project management methodology originally developed by the UK government.
A data-driven technique for discovering, monitoring, and improving business processes by extracting knowledge from event logs.
The fundamental units of execution in operating systems, covering process lifecycle, thread management, context switching, and inter-process …
Programmatic video is the practice of generating video content from code and data rather than manual editing, using frameworks like …
What progressive delivery means, how feature flags, canary releases, and automated rollback combine to reduce deployment risk for AI …
Progressive Web Apps are web applications that use service workers, manifests, and modern browser APIs to deliver app-like experiences, a …
What Prometheus is, how it collects and stores metrics, and how it fits into cloud-native monitoring stacks.
An attack technique where malicious input manipulates an LLM into ignoring its instructions, executing unintended actions, or revealing …
A creational design pattern that creates new objects by cloning an existing instance, avoiding the cost of standard construction.
A structural design pattern that provides a surrogate or placeholder for another object to control access to it.
How structured and unstructured pruning reduce neural network size by removing redundant weights, neurons, or layers.
What the pub/sub pattern is, how it enables event-driven architectures, and when to use SNS versus direct messaging.
How INT8 and INT4 quantization compress neural network models for faster inference and lower memory usage with minimal accuracy loss.
How quantum computing intersects with machine learning through variational quantum circuits, quantum kernels, and potential speedups for …
Methods and metrics for measuring the quality of Retrieval Augmented Generation systems, covering retrieval accuracy, generation …
What random forests are, how they combine decision trees for robust predictions, and when they are the right model choice.
The declarative, component-based JavaScript UI library created at Facebook in 2013 that introduced the virtual DOM and fundamentally changed …
The standard client-side routing library for React, created by Ryan Florence and Michael Jackson in 2014, which evolved from Ember-inspired …
How RNNs, LSTMs, and GRUs process sequential data, the vanishing gradient problem, and where recurrent models still apply.
Self-referential functions and systematic trial-and-error with pruning for exploring solution spaces.
What red teaming is in AI, how adversarial testing discovers vulnerabilities and failure modes before deployment, and best practices for …
What Redis is, how it provides in-memory data storage, and common use cases for caching and real-time AI applications.
What reinforcement learning is, how agents learn from rewards, and where RL applies in enterprise AI systems.
The formal mathematical foundation for querying relational databases, defining operations like select, project, and join that underpin SQL …
The full-stack React framework created by Ryan Florence and Michael Jackson in 2021, built on web standards and the loader/action pattern …
Remotion is a React framework for creating videos programmatically, treating video as code and rendering MP4 files from JSX components using …
What the repository pattern is, how it abstracts data access, and when to use it in AI application architectures.
The process of eliciting, analyzing, documenting, and validating the needs and constraints that a software system must satisfy.
What responsible AI is, the principles of fairness, transparency, accountability, and safety that guide ethical AI development and …
The right under GDPR Article 22 for individuals to obtain meaningful information about the logic involved in automated decisions that …
A structured document for recording identified project risks, their analysis, response plans, and tracking status.
What ROC curves and AUC measure, how to interpret them, and when to use ROC versus precision-recall analysis.
The fundamental network operations of forwarding data at Layer 2 (switching via MAC addresses) and Layer 3 (routing via IP addresses) to …
Software robots that automate repetitive, rule-based tasks by mimicking human interactions with digital systems.
What the saga pattern is, how it manages distributed transactions across microservices, and implementation approaches.
Algorithms for finding elements in data structures, including linear search, binary search, and interpolation search.
How multiple organizations can collaboratively train ML models or compute joint analytics without sharing their private data.
Structured approaches for identifying and prioritizing security threats, including STRIDE, DREAD, and attack trees.
What semantic versioning is, how MAJOR.MINOR.PATCH communicates change impact, and best practices for versioning APIs and models.
Machine learning approach that leverages both labeled and unlabeled data through label propagation, self-training, and consistency …
A UML behavioral diagram that shows how objects interact through messages exchanged over time, with vertical lifelines and horizontal …
The web rendering paradigm where HTML is generated on the server for each request, from its origins as the default web model through its …
What a service mesh is, how it manages service-to-service communication, and when the complexity is justified.
An architectural style that structures applications as a collection of loosely coupled, interoperable services.
What Sessionize is, how it manages conference call-for-papers, speaker profiles, and schedule generation, and how its API enables …
Post-hoc explanation methods for interpreting predictions of black-box machine learning models.
What the sidecar pattern is, how it extends service functionality without code changes, and common sidecar use cases.
A SOLID design principle stating that a class should have only one reason to change, meaning it should encapsulate exactly one …
The web application architecture where a single HTML page dynamically rewrites its content in the browser, tracing from Gmail (2004) through …
A creational design pattern that ensures a class has only one instance and provides a global point of access to it.
What SRE is, how it applies software engineering to operations, and key SRE practices for AI platform reliability.
What SLAs, SLOs, and SLIs are, how they relate to each other, and how to define them for AI services.
What snapshot testing is, how it captures and compares output snapshots for regression detection, and its application in AI systems.
An approach recognizing that organizational performance depends on the joint optimization of social and technical factors.
The discipline of tracking and controlling changes to software artifacts, rooted in military standards and formalized by IEEE 828, …
The structured process of planning, creating, testing, and deploying software systems through defined phases.
Core concepts of software testing including testing levels, techniques, and principles for verifying software quality.
Five foundational object-oriented design principles that promote maintainable, flexible, and understandable software: Single Responsibility, …
Spec-driven development is the pattern of writing structured specifications before code, formalized by Kiro's requirements.md, design.md, …
Structured Query Language, the standard language for defining, manipulating, and querying data in relational database management systems.
The visual editing platform for Jamstack sites founded by Ohad Eder-Pressman in 2019, which pioneered real-time inline editing for headless …
The process of identifying stakeholders, assessing their interests and influence, and developing engagement strategies.
A UML behavioral diagram that models the states of an object and the transitions between them in response to events, based on Harel …
A behavioral design pattern that allows an object to alter its behavior when its internal state changes, appearing to change its class.
How structured state space models like Mamba and S4 achieve linear-time sequence modeling as an alternative to transformers.
The approach of pre-rendering web pages to static HTML at build time, tracing from Jekyll (Tom Preston-Werner, 2008) through modern …
Server-side database programs that encapsulate reusable logic and automatically respond to data events, executing within the database engine …
A behavioral design pattern that defines a family of algorithms, encapsulates each one, and makes them interchangeable at runtime.
What stream processing is, how Flink, Spark Streaming, and Kafka Streams enable real-time data transformation, and why streaming matters for …
What subnets are, how they segment VPC networks, and best practices for subnet architecture on AWS.
What supervised learning is, how it works with labeled data, and when to choose it over other learning paradigms.
Cybersecurity practices for managing risks across the chain of vendors, open-source components, and third-party services that AI systems …
Margin-maximizing classifier that uses the kernel trick to handle high-dimensional and non-linear classification problems.
Encryption algorithms that use the same key for both encryption and decryption, including AES and DES.
What synthetic data is, how artificially generated data is used for ML training and testing, and the tradeoffs between synthetic and …
An interdisciplinary framework for studying complex systems as wholes, focusing on interactions, feedback, and emergent properties.
Non-linear dimensionality reduction technique for visualizing high-dimensional data in two or three dimensions.
The two primary transport-layer protocols of the Internet: TCP provides reliable, ordered delivery while UDP provides fast, connectionless …
The four-layer Internet protocol suite that defines how data is transmitted across networks, forming the architectural foundation of the …
The accumulated cost of shortcuts, compromises, and deferred improvements in a software system that increase future maintenance effort.
A behavioral design pattern that defines the skeleton of an algorithm in a base class, letting subclasses override specific steps without …
How causal dilated convolutions provide an efficient alternative to RNNs for sequence modeling with parallelizable training.
What test fixtures are, how they provide predefined data and state for reproducible tests, and fixture patterns for AI systems.
The TDD red-green-refactor cycle and how it applies to AI application development where outputs are non-deterministic.
How machine learning runs on microcontrollers and resource-constrained devices using TensorFlow Lite Micro and similar frameworks.
Transport Layer Security and its predecessor Secure Sockets Layer, cryptographic protocols that provide encrypted communication and …
A comprehensive framework for enterprise architecture development, providing methods and tools for designing, planning, and governing IT …
What toil is in the SRE context, how to identify it, and strategies for reducing operational burden through automation.
The maximum number of tokens allocated for an LLM request or workflow, used to control costs, latency, and context window utilization.
What training-serving skew is, how mismatches between training and serving environments degrade model performance, and strategies to prevent …
What transfer learning is, how pre-trained models reduce training costs, and when to fine-tune versus train from scratch.
What the transformer architecture is, how it differs from prior approaches, and why it dominates modern AI systems.
Hierarchical data structures including BSTs, AVL trees, red-black trees, and B-trees for efficient searching and storage.
What trunk-based development is, how it differs from long-lived branches, and why it accelerates delivery.
What the twelve-factor methodology is, how it guides cloud-native application design, and which factors matter most in practice.
The statically typed superset of JavaScript created by Anders Hejlsberg at Microsoft in 2012, introducing structural typing and compile-time …
Uniform Manifold Approximation and Projection for faster dimensionality reduction that preserves both local and global structure.
The Unified Modeling Language, a standardized visual notation for specifying, constructing, and documenting software systems through 14 …
What underfitting is, how to identify it, and strategies to improve model performance when the model is too simple.
What the unit of work pattern is, how it coordinates database changes, and when to apply it in application architecture.
What unit testing is, how isolation and test doubles work, and assertion patterns relevant to AI application development.
What unsupervised learning is, how it discovers patterns without labels, and practical enterprise applications.
A UML behavioral diagram that captures system functionality from the user's perspective, showing actors, use cases, and system boundaries.
How VAEs learn structured latent spaces for generation, interpolation, and representation learning.
Core concepts of version control systems including branching, merging, and distributed workflows with Git.
The Virtual DOM is an in-memory representation of the real DOM introduced by React in 2013, enabling efficient UI updates through a diffing …
The technology of creating virtual instances of computing resources, including hypervisor-based virtual machines, containers, and the formal …
How Vision Transformers (ViT) apply the transformer architecture to image recognition by treating images as sequences of patches.
A behavioral design pattern that lets you add new operations to existing object structures without modifying the classes of the elements on …
The next-generation frontend build tool created by Evan You in 2020 that leverages native ES modules for near-instant dev server startup and …
What a VPC is, how it provides network isolation on AWS, and essential VPC design considerations for AI workloads.
Web Components are a set of W3C standards (Custom Elements, Shadow DOM, HTML Templates) for creating reusable, encapsulated UI elements, …
Webhooks are user-defined HTTP callbacks that deliver real-time event notifications between web applications, a term coined by Jeff Lindsay …
What WebSockets are, how they enable real-time bidirectional communication, and why they are used for streaming LLM token delivery to …
A hierarchical decomposition of project scope into manageable deliverables and work packages.
Software that automates the execution of business processes by coordinating tasks, decisions, and integrations according to a defined …
What XGBoost is, why it dominates structured data tasks, and practical guidance for using gradient-boosted trees in production.
A software development principle from Extreme Programming stating that functionality should not be added until it is actually needed.
A two-dimensional classification schema for organizing the descriptive representations of an enterprise, considered foundational to …
What zero trust means, how it replaces perimeter-based security, and why AI model serving and data access require zero trust principles.
What zero-shot learning is, how models perform tasks without examples, and when zero-shot approaches are sufficient.
What an API is, REST vs GraphQL vs gRPC, authentication patterns, rate limiting, and how AI services are accessed through standardized API …
How computers represent all data in base-2 (binary), why transistors make this fundamental, and how number systems connect to AI model …
The Well-Architected pillar covering right-sizing, reserved capacity, spot instances, and cost allocation - and how it applies to AI …
Arrays, hash maps, trees, graphs, queues, and vector stores - how the choice of data structure shapes the performance of AI pipelines.
IEEE 754, FP32, FP16, BF16, and INT8 - how number precision determines model size, inference speed, and accuracy tradeoffs in AI deployment.
CPU vs GPU, VRAM limits, memory bandwidth, and how hardware choices determine what AI models you can run and at what cost.
What hybrid cloud is, why it matters for AI workloads with data gravity and compliance constraints, and AWS hybrid options including FSx for …
Classes, objects, inheritance, encapsulation, and polymorphism - how OOP concepts apply directly to AI frameworks like CrewAI and Pydantic.
The Well-Architected pillar covering runbooks, automation, observability, incident response, and continuous improvement - and how it applies …
The Well-Architected pillar covering compute selection, storage, database, and networking choices - and how it applies to AI workloads …
The Well-Architected pillar covering fault tolerance, disaster recovery, health checks, and scaling - and how it applies to AI workloads …
The Well-Architected pillar covering IAM, encryption, network security, and detection - and how it applies to AI workloads including …
The Well-Architected pillar added in 2021 covering efficient resource usage, managed services, and data lifecycle management - and how it …
What blue-green deployment is, how it works, why it matters for zero-downtime AI model updates, and how it compares to canary and rolling …
What canary deployment is, how gradual traffic shifting works, which metrics to watch, and how to configure automatic rollback triggers for …
What CI/CD is, why it matters for AI projects, the tools involved, and the AI-specific considerations that extend standard pipelines.
What the circuit breaker pattern is, why AI services need it for handling model timeouts and rate limits, and how to implement it with AWS …
What event sourcing is, why it matters for AI audit trails and pipeline replay, its relationship to CQRS, and when to apply it in AI …
What feature flags are, how they enable safe AI model rollouts, A/B testing, and instant rollback - and the tools available for implementing …
What drift is, the three types (data, concept, prediction), how to detect them using SageMaker Model Monitor, and when to trigger model …
What observability means, the three pillars of logs, metrics, and traces, and why AI systems need specialized observability for token costs, …
What the Open Practice Library is, its key practices for AI projects, and how it structures discovery and delivery for teams building …
What property-based testing is, why it is ideal for AI systems that cannot be tested with exact-output assertions, and the tools available …
What the shared responsibility model is, how AWS, Azure, and GCP divide security duties, and special considerations for AI and ML workloads.
What makes AI agentic vs assistive, autonomous task execution, tool use, planning capabilities, and current limitations.
What AI agents are, how they differ from simple LLM calls, the key design patterns, and what makes agents fail in production.
What AI guardrails are, the types of controls they enforce, how to implement them in enterprise applications, and Amazon Bedrock Guardrails …
What computer vision is, how it works in AI applications, and how AWS Rekognition, Azure Computer Vision, and GCP Vision AI compare.
What container registries are, how ECR, Docker Hub, Azure ACR, and GCP Artifact Registry compare, and patterns for AI workload container …
Definition of document extraction, the main techniques (OCR, NLP, template-based), AWS services used at each stage, and accuracy …
What embeddings are, how they enable semantic search, which embedding models to use, and how to choose vector database infrastructure.
What event-driven architecture is, how S3 triggers, EventBridge, and Step Functions patterns enable scalable AI pipelines.
The three main approaches to customizing LLM behavior for specific use cases - when each is appropriate and how they compare.
What foundation models are, how they differ from task-specific models, the major model families, and the practical implications for …
Definition, why it matters in AI systems, implementation patterns, and when it is legally or regulatorily required.
What inference means in AI context, the key operational parameters that matter (latency, throughput, cost), and the main deployment options …
What Infrastructure as Code is, and how Terraform, AWS CDK, and CloudFormation compare for managing AI project infrastructure.
What an AI knowledge base is, how it differs from a traditional knowledge base, vector stores, and RAG integration.
What large language models are, how they work at a high level, key characteristics, and what they can and cannot do reliably.
What model cards document, why they matter for AI governance, and how to create one.
Definition, architecture patterns, and frameworks for multi-agent AI systems - and the signals that indicate a single-agent approach is no …
What prompt engineering is, why it matters in enterprise AI applications, and the most effective techniques for getting reliable outputs …
What RAG is, how it works, when to use it, and the common implementation pitfalls that reduce retrieval quality.
What serverless computing means, how Lambda, Fargate, and Step Functions fit AI workloads, and when serverless is and is not the right …
What speech-to-text technology is, how AWS Transcribe, Azure Speech, and GCP Speech-to-Text compare, and key features like speaker …
What text-to-speech technology is, how AWS Polly, Azure Speech, and GCP Text-to-Speech compare, and key features like neural voices and …
What tokens are, how different models tokenize text, why token count matters for cost and context limits.
What vector databases are, how they enable semantic search, popular options including Pinecone, Weaviate, and pgvector, and when to use …
Definition, formula, and how to adapt WSJF for scoring and prioritizing AI use cases and backlog items.
An introduction to Big-O notation and how it describes the asymptotic behavior of algorithms.