A central processing unit (CPU) is a complex electronic circuit which performs all numerical, logic, IO and control computations inside a computer. There are generally two types of CPUs, ie reduced instruction set computers (RISC) and Complex Instruction Set Computers (CISC). There are also other similar circuits to a CPU, with a more specialized scope ... Read more

cross validation

In machine learning (ML), cross validation is a method in which the data scientists perform an evaluation of an ML model's performance on unlabelled data, i.e. data which the ML model has not seen before. In the method of cross validation, the data which is available in the dataset is split into multiple subsets. One ... Read more


Desktop As A Service (VDI or Hosted Shared Desktops) or Diagnostics As A Service. For Diagnostics as a service, read the following Microsoft article for more details.https://azure.microsoft.com/en-in/blog/daas/. 


Definition of DCOM The Microsoft Distributed Component Object Model (DCOM) protocol is used to expose application objects via remote procedure calls (RPCs). DCOM has extensions layered on top of the Remote Procedure Call extensions. Refer to the following Microsoft article for more details on DCOM: https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-dcom/4a893f3d-bd29-48cd-9f43-d9777a4415b0.


DDOS DDOS stands for distributed denial-of-service attack (DoS attack). It uses similar approach to Denial of Service (DOS) but in this case, the DOS cyber attack is distributed from numerous source networks.


DRaaS (Disaster Recovery As A Service) is a managed service in which disaster recovery is offered as a cloud service. Disaster recovery includes business continuity (BCDR) and backup as a service (BaaS). DRaaS management server can be either an on-premise or a cloud server. There are various DRaaS providers, most of which are already providing ... Read more

Edge computing

Edge computing refers to placing computing devices and services at the other edge of a cloud computing environment. Edge computing refers to low form factor devices, such as IoT devices, with low processing power and streaming data via network interface cards. The Cloud has the datacenters, the Edge has the IoT devices and in-between one ... Read more


ETL stands for extract, transform, and load. It refers to a data science and machine learning procedure, in which ML model data is being collected (extracted) from data sources, then data is transformed and finally loaded into an ML model.


Firmware Firmware is low level system software, which provides access and control to a computing device hardware and hardware abstraction layers to the computing device operating system. Depending on the complexity of a computing device, there may be devices with lower complexity, such as IoT devices and sensors, which do not need a full operating ... Read more


Cloud computing dictionary

good fit

A "good fit" or "best fit" or "sweet spot" is when a machine learning (ML) model can predict values for a system with the minimum error, ideally that error being zero. In this case, the ML model is said to have a good fit on the data. The good fit sits between the underfitting and ... Read more


Graphics Processing Units (GPUs) have been traditionally used in computing systems for image processing (graphics cards). Their usage has largely been expanded to AI and ML tasks and are largely used for optimizing performance of neural networks.


Definition of gRPC RPC is an evolution to remote procedure call (RPC) application protocol for streaming messages between clients and servers. gRPC was originally developed by Google. It is an open source protocol and it is part of the Cloud Native Computing Foundation (CNCF) services.


HCI Hyperconverged infrastructure (HCI) is a software-defined IT infrastructure which virtualizes all layers of a conventional IT infrastructure (compute, networking and storage). Under the term HCI one can classify hypervisors, software-defined networking (SDN) and software-defined storage or (SDS).


In machine learning, holdout validation is a data sampling method in which the dataset is split into two: the training dataset and the test. The split is equal, i.e. training is performed on the 50% of the dataset and testing is performed on the remaining 50% of the dataset. Holdout validation is not recommended in ... Read more


IaaS stands for Infrastructure As A Service. This term covers a wide range of cloud services related to compute power, including but not limited to virtual machines, containers and services for compute intensive workloads.


ITSM stands for IT Service Management. The term ITSM encompasses all processes and activities related to the design, creation, delivery and support of IT services. In some cases, ITSM focuses on IT technical support and helpdesk systems, such as Service Now and BMC Helix. An example is BMC Helix ITSM platform.


Jasypt is a java library which allows developers to add basic encryption to applications.


jQuery jQuery is a well-known JavaScript library. It specializes in HTML document traversal and manipulation, event handling, animation, and Ajax. It utilizes an API which is compatible with all major browsers.

k-fold cross validation

In machine learning, k-fold cross validation is a type of cross validation in which the dataset is split into k subsets and the validation process is repeated k times. Each time k-1 subsets are used for training the ML model, while one (1) subset is used for testing/validation. The final validation generalization capability/performance of the ... Read more