ACA

ACA stands for Azure Container Apps. Azure Container Apps are a flavor of a hosted Kubernetes services in the Microsoft Azure cloud. ACA is a fully Platform As A Service (PaaS) resource. In the ACA service, Microsoft manages all components of the underlying Kubernetes cluster, including the system nodes (control plane) and the user nodes ... Read more

ACI

ACI stands for Azure Container Instance. It is a lightweight container PaaS service which allows the end customer to deploy, configure and manage a simple container-based solution based on a docker or other container image, without having to manage the underlying container cluster components. ACI can work together with Azure Kubernetes Service (AKS) by making ... Read more

ACR

ACR stands for Azure Container Registry. It is a PaaS resource which encapsulates the management of container images, such as Docker images in the Microsoft Azure Cloud. ACR is tightly integrated to other container services in Azure, such as AKS. An AKS cluster can utilize an ACR registry to pull its container images from. An ... Read more

ACU

ACU The concept of the Azure Compute Unit (ACU) encapsulates infomation about CPU performance in each Azure service which relies on CPU performance to classify its SKU plan. The basic reference for ACU is the Azure Standard_A1 (small) VM corresponding to 100 ACUs. All other Azure compute service SKUs advertise certain levels of ACU, which ... Read more

AI hardware

Artificial Intelligence (AI) relates to computer hardware in multiple ways, as follows: AI platforms are being used to optimize the design and manufacturing of new compute hardware systems. Special computer hardware processor units, referred to as AI accelerators or Neural Processing Units (NPU) are being developed to enhance the performance of AI applications and machine ... Read more

AKS

AKS standards for Azure Kubernetes Service. It is an Azure cloud managed fully-featured Kubernetes cluster service. In AKS, there are system node pools and user node pools. System node pools host the AKS infrastructure components, i.e. the control plane components of the Kubernetes cluster, such as the API server. User node pools host the customer ... Read more

Algorithm

An algorithm is a series of instructions, either in the form of pseudo-code or in a computer programming language, which aim at solving a problem or at performing some sort of computation. Algorithms are therefore strongly connected to various fields of mathematics and physics, such as probability and statics, calculus and linear algebra. Algorithms apply ... Read more

ASIC

Application-Specific Integrated Circuits (ASICs) are custom-built integrated circuit (IC) electronic systems, which are designed to optimize AI and ML workloads. ASICs have a large application spectrum, including for example video and voice codecs. In contrast to ASICs which are application specific, there are various general purpose Integrated Circuit systems, such as FPGAs.

CPU

A central processing unit (CPU) is a complex electronic circuit which performs all numerical, logic, IO and control computations inside a computer. There are generally two types of CPUs, ie reduced instruction set computers (RISC) and Complex Instruction Set Computers (CISC). There are also other similar circuits to a CPU, with a more specialized scope ... Read more

Firmware

Firmware Firmware is low level system software, which provides access and control to a computing device hardware and hardware abstraction layers to the computing device operating system. Depending on the complexity of a computing device, there may be devices with lower complexity, such as IoT devices and sensors, which do not need a full operating ... Read more

GPU

Graphics Processing Units (GPUs) have been traditionally used in computing systems for image processing (graphics cards). Their usage has largely been expanded to AI and ML tasks and are largely used for optimizing performance of neural networks.

MFA

MFA Multi-factor authentication (MFA) is the process of authenticating an identity into a computing system, application or service by providing at least two of the following authentication factors: The following list provides the most common MFA factor implemented today by security companies:

SLAT

SLAT SLAT (Second Level Address Translation) is also known as nested paging. It is a hardware-assisted virtualization technology which makes it possible to avoid the overhead associated with software-managed shadow page tables. SLAT is implemented by AMD via the Rapid Virtualization Indexing (RVI) technology as well as by Intel via the Extended Page Table (EPT) ... Read more

TPU

Tensor Processing Units (TPUs) are electronic circuits which are optimized for AI operations and ML tasks. TPUs utilize the TensorFlow protocol logic to align with AI/ML task performance requirements.

Virtual machine

A virtual machine is a cloud-based or on-premises based virtual computer which runs under the control of a hypervisor host cluster. A hypervisor is computer software, firmware or hardware which is able to create and run virtual machines. There are two basic types of server virtualization, i.e. type 1 and type 2. Type 1 hypervisors ... Read more