Acceptance Criteria
Predefined conditions that a product, feature, or user story must meet to be considered complete and acceptable by stakeholders. These criteria establish clear, testable requirements that guide dev...
Predefined conditions that a product, feature, or user story must meet to be considered complete and acceptable by stakeholders. These criteria establish clear, testable requirements that guide dev...
Guidelines and technical specifications that ensure digital content, applications, and technologies are usable by people with disabilities, including standards like WCAG, Section 508, and ARIA. It ...
Accounting Standards are the formal rules and guidelines that govern how financial transactions and statements are recorded, reported, and disclosed. They ensure consistency, transparency, and comp...
File crediting third-party software, libraries, inspirations, and other works that the project builds upon or is indebted to.
The Actor Model is a mathematical model of concurrent computation where the fundamental unit of computation is an actor—an entity that processes messages asynchronously and maintains its own privat...
Vendor-neutral AI coding agent configuration file providing project context and instructions. Alternative to AGENTS.md serving the same purpose of unifying agent guidance across tools.
The Agent2Agent (A2A) Protocol is an open standard for communication and interoperability among independent—often opaque—AI agent systems. Because agents may be built with different frameworks, lan...
Open standard file for guiding AI coding agents, providing project context, coding standards, build commands, and development practices. Supported by OpenAI Codex, Google Jules, Cursor, Amp, and ot...
An iterative approach to project management and software development that helps teams deliver value to customers faster and with fewer headaches through collaboration, adaptability, and continuous ...
An iterative approach to software development and project management that emphasizes flexibility, collaboration, and customer feedback. Agile methodologies include frameworks like Scrum, Kanban, an...
Agile Software Development Life Cycle is an iterative and incremental approach to software development that emphasizes flexibility, collaboration, and rapid delivery of working software through sho...
Agile is a set of software development principles and practices that emphasize iterative delivery, collaboration, and responsiveness to change over rigid planning and documentation. Its frameworks—...
Configuration file specifying files and directories that AI coding agents should not process or modify, similar to .gitignore but for AI tools. Used by JetBrains Junie and other AI agents.
The Automatic Identification System (AIS) is a shipboard broadcast transponder system operating in the VHF maritime band that transmits and receives vessel identification, position, speed, heading,...
API Commons is a collection of open-source building blocks for API operations. It began as a machine-readable way to define the parts of an API, and works in concert with APIs.json to translate hum...
A development approach where APIs are treated as first-class citizens and designed before implementation begins, ensuring consistent and well-documented interfaces across services and applications....
APIOps Cycles is a Lean and service design–inspired methodology for designing, improving, and scaling APIs throughout their entire lifecycle. Developed since 2017 and continuously refined through c...
APIs.json is a machine-readable metadata format used to describe APIs (Application Programming Interfaces) and their associated resources. It acts as a discovery format similar to how robots.txt he...
The Arazzo Specification is a community-driven, open standard within the OpenAPI Initiative (a Linux Foundation Collaborative Project). It defines a programming-language-agnostic way to express seq...
An open and independent enterprise architecture modeling language to support the description, analysis and visualization of architecture within and across business domains in an unambiguous way.
Reusable solutions to commonly occurring problems in software architecture that provide templates for designing system structure, component interactions, and overall organization of applications. I...
Architecture Pattern is a specialized technology or methodology in the architecture domain that addresses specific technical or business requirements. It provides targeted capabilities that help pr...
AsyncAPI is an open-source, protocol-agnostic specification for describing event-driven APIs and message-driven applications. It serves as the OpenAPI of the asynchronous, event-driven world—overla...
The AT Protocol (Authenticated Transfer Protocol) is a decentralized social networking protocol designed to provide users with more control over their data, identity, and online interactions. Devel...
File listing the original creators and primary authors of a project, often required by certain open-source licenses.
Apache Avro is a data serialization system that provides compact binary encoding of structured data along with schema definitions, enabling efficient data exchange and storage with built-in schema ...
Backstage’s Software Catalog format is a structured, YAML-based specification that describes software components, services, APIs, resources, and their relationships, enabling teams to discover, doc...
Banking Regulation is a specialized technology or methodology in the banking domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitio...
Basel Compliance ensures that basel practices and systems adhere to relevant laws, regulations, industry standards, and internal policies. It helps organizations avoid legal penalties, maintain tru...
Basel III is a specialized technology or methodology in the basel domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and or...
Bean Validation is a specialized technology or methodology in the bean domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners a...
Big O Notation is a specialized technology or methodology in the big domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and...
Binary Format is a specialized technology or methodology in the binary domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners a...
Bruno collections are organized sets of API requests and environments within the Bruno API client, allowing developers to structure, test, and share their API workflows efficiently.
A Bruno environment is a set of key–value variables that let you switch configurations—such as URLs, tokens, or credentials—so you can run the same API requests across different contexts like devel...
Capital Requirements is a specialized technology or methodology in the capital domain that addresses specific technical or business requirements. It provides targeted capabilities that help practit...
California Consumer Privacy Act - A state statute intended to enhance privacy rights and consumer protection for residents of California, USA. Provides consumers with rights to know what personal i...
Protocols and standards for automating the process of requesting, issuing, and renewing digital certificates from Certificate Authorities, including ACME, SCEP, EST, and CMP. It is widely adopted a...
Document tracking notable changes between project versions, following conventions like Keep a Changelog. Lists additions, fixes, deprecations, and breaking changes.
Circuit Breaker is a specialized technology or methodology in the circuit domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioner...
Citation File Format providing machine-readable citation metadata for software projects, enabling proper academic attribution and referencing.
Configuration file for Claude Code providing project-specific context, coding conventions, build commands, and behavioral instructions that persist across sessions.
Configuration file for Cline AI coding assistant providing project-specific rules, coding conventions, and behavioral instructions.
A development approach where code is the primary source of truth, with database schemas, API definitions, or infrastructure configurations generated from the code rather than designed separately or...
Document defining standards for community engagement, acceptable behavior, and enforcement procedures for project participants.
File defining individuals or teams responsible for code in a repository. Used by GitHub and GitLab to automatically request reviews from designated owners on pull requests.
Configuration file for OpenAI Codex CLI providing project instructions, coding conventions, and build commands for AI-assisted development.
Communication Protocols is a networking technology or protocol that facilitates communication, data transfer, or traffic management between systems and devices. It enables reliable, efficient, and ...
Component Model is a specialized technology or methodology in the component domain that addresses specific technical or business requirements. It provides targeted capabilities that help practition...
Configuration Language is a specialized technology or methodology in the configuration domain that addresses specific technical or business requirements. It provides targeted capabilities that help...
Consensus is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improv...
A text file containing instructions for building container images, compatible with Docker's Dockerfile format and commonly used with Podman and other OCI-compliant tools. It accelerates software de...
Guidelines for contributing to a project, including coding standards, pull request processes, issue reporting, and development setup instructions.
File recognizing individuals and organizations that have contributed to a project through code, documentation, design, or other means.
Convention Over Configuration is a specialized technology or methodology in the convention domain that addresses specific technical or business requirements. It provides targeted capabilities that ...
Project conventions file documenting coding standards, naming conventions, architecture decisions, and development practices. Used by AI coding assistants and human developers alike.
GitHub Copilot custom instructions file placed in .github/ directory, providing repository-specific coding standards, framework preferences, and behavioral guidelines for Copilot Chat and coding ag...
CORS (Cross-Origin Resource Sharing) is a security feature implemented in web browsers that controls how resources on a web server can be requested from a different origin (domain, protocol, or por...
CSV (Comma-Separated Values) is a simple text format for storing tabular data where each line represents a row and values within rows are separated by commas (or other delimiters).
Configuration file for Cursor AI code editor containing project-specific rules, coding conventions, and behavioral instructions for the AI assistant.
Frameworks and guidelines that establish best practices for protecting information systems, networks, and data from cyber threats, including standards like NIST, ISO 27001, and CIS Controls. It is ...
A graphical representation of data flow through a system, showing how data is processed, stored, and transformed between different components and external entities. Organizations adopt it to addres...
Data Format is a data technology or practice used to collect, process, store, analyze, or govern information assets. It helps organizations extract value from their data and make informed decisions...
The process of creating a visual representation of data structures and relationships to organize information and define how data is stored, accessed, and managed within a system. Effective implemen...
Structured representations of data entities, their attributes, and relationships used to organize and define how data is stored, accessed, and managed within a system or database. Effective impleme...
Framework of rules and guidelines that govern how organizations collect, store, process, and share personal data to protect individual privacy rights and ensure compliance with regulations like GDP...
Framework and guidelines for ensuring accuracy, completeness, consistency, validity, and timeliness of data across an organization's data assets and systems. It is a foundational component in moder...
Organizational patterns for structuring data in warehouses, including star schema, snowflake schema, and galaxy schema designs that optimize query performance and data relationships. Organizations ...
Database Normalization is a data storage and management technology designed to organize, persist, and efficiently retrieve structured or semi-structured information. It supports the data needs of a...
The process of defining the structure, organization, and relationships of data in a database system, including tables, columns, constraints, and indexes to optimize data storage and retrieval. Effe...
Defense In Depth is a specialized technology or methodology in the defense domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitione...
GitHub Dependabot configuration file defining automated dependency update schedules, package ecosystems to monitor, and review assignment rules.
A design pattern in which objects receive their dependencies from external sources rather than creating them internally, promoting loose coupling and easier testing. Effective use of this practice ...
Reusable solutions to commonly occurring problems in software design, providing templates for how to solve problems in various contexts. Organizations adopt it to address specific technical or busi...
Design Standards is a specialized technology or methodology in the design domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioner...
Development Methodology is a software development technology or practice that supports the creation, maintenance, or improvement of software systems. It helps developers and engineering teams work ...
DevOps is a cultural and technical movement that combines software development and IT operations to shorten the development lifecycle and deliver high-quality software continuously. It emphasizes a...
Development, Security, and Operations methodology that integrates security practices within the DevOps process, emphasizing security automation and collaboration throughout the software development...
A data modeling technique used in data warehousing that structures data into fact tables containing measurable metrics and dimension tables containing descriptive attributes, optimized for query pe...
Disclosure Requirements is a specialized technology or methodology in the disclosure domain that addresses specific technical or business requirements. It provides targeted capabilities that help p...
DNS (Domain Name System) is the distributed naming system that translates human-readable domain names (like example.com) into the numerical IP addresses computers use to communicate. It functions a...
A text file that contains instructions for building Docker container images, defining the application environment, dependencies, and configuration in a reproducible way. It accelerates software del...
A software development approach that focuses on modeling software to match a domain according to input from domain experts, emphasizing collaboration between technical and domain experts to create ...
Department of Transportation regulations governing the safe transportation of hazardous materials and other commercial transport activities in the United States. It helps organizations meet regulat...
Cross-editor configuration file defining coding style preferences like indentation, line endings, and character encoding to maintain consistent formatting across different editors and IDEs.
A collaborative visualization tool used to articulate what we know about a particular type of user. It externalizes knowledge about users in order to create a shared understanding of user needs, an...
Enterprise Integration Patterns is a business or enterprise practice that helps organizations manage operations, make strategic decisions, and achieve their objectives. It encompasses the processes...
Entity Relationship is a specialized technology or methodology in the entity domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitio...
A risk management framework adopted by financial institutions for determining, assessing and managing environmental and social risk in projects, primarily for project finance and related lending ac...
A software architecture pattern promoting the production, detection, consumption of, and reaction to events. Systems are designed to respond to state changes asynchronously through event messages.
Event Sourcing is a specialized technology or methodology in the event domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners a...
Extreme Programming is a software development technology or practice that supports the creation, maintenance, or improvement of software systems. It helps developers and engineering teams work more...
Federal regulations governing the safety, efficacy, and security of food, drugs, medical devices, and other products under FDA jurisdiction. Organizations adopt it to address specific technical or ...
File Format is a specialized technology or methodology in the file domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and o...
Financial Regulation is a financial management concept, tool, or practice used to manage monetary operations, reporting, or compliance. It helps organizations maintain accurate financial records, o...
Fixed Format is a specialized technology or methodology in the fixed domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and...
Flowcharts is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or impro...
Functional Programming is a software development technology or practice that supports the creation, maintenance, or improvement of software systems. It helps developers and engineering teams work m...
GitHub configuration file specifying funding platforms and links for project sponsorship, displayed as a Sponsor button on the repository page.
Gantt Charts is a specialized technology or methodology in the gantt domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and...
Configuration file for Google Gemini CLI providing project context, coding standards, and development instructions for AI-assisted coding workflows.
Git configuration file defining path-specific settings for line endings, diff handling, merge strategies, and binary file detection.
Git configuration file specifying intentionally untracked files and directories that Git should ignore, preventing build artifacts, dependencies, and secrets from being committed.
A operational framework that takes DevOps best practices used for application development such as version control, collaboration, compliance, and CI/CD, and applies them to infrastructure automatio...
A system of processes, procedures, and documentation that ensures products are consistently produced and controlled according to quality standards, commonly used in pharmaceutical, food, and medica...
An international standard query language for property graph databases, developed by ISO/IEC to provide a declarative way to query and manipulate graph data structures. Effective implementation supp...
A query language for APIs and a runtime for executing those queries with existing data, providing a complete and understandable description of the data in your API.
JetBrains Junie AI agent configuration file stored in .junie/ directory providing persistent project-level context and coding guidelines.
Health Standards is a specialized technology or methodology in the health domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioner...
Health Insurance Portability and Accountability Act - U.S. legislation providing data privacy and security provisions for safeguarding medical information
The fifth major version of the Hypertext Markup Language, used for structuring and presenting content on the web. It is widely used by developers to build, maintain, and scale software applications...
HTTP/2 is a binary, multiplexed version of HTTP that uses streams, header compression (HPACK), and optional server push to reduce latency and improve performance over a single TCP connection.
HTTP/3 is the latest HTTP version that runs over QUIC (on UDP), providing multiplexed streams with built-in TLS 1.3 and connection migration to avoid TCP head-of-line blocking and improve performance.
IANA media types, also known as MIME types, are names for the types of data that are transmitted over the internet. They identify the format and nature of a file, document, or group of bytes.
File-scoped custom instruction files for GitHub Copilot and VS Code, using applyTo patterns to target specific file types or tasks with tailored AI guidance.
Design patterns and best practices for integrating different software systems and applications, including messaging, data transformation, and service orchestration approaches. Organizations adopt i...
Documentation that defines the contract between different software components, including API endpoints, data formats, protocols, and integration requirements. It is used across a range of industrie...
Framework of policies and procedures designed to provide reasonable assurance regarding the achievement of objectives in operational effectiveness, reliable financial reporting, and compliance with...
Inversion Of Control is a specialized technology or methodology in the inversion domain that addresses specific technical or business requirements. It provides targeted capabilities that help pract...
ISO Standard is a specialized technology or methodology in the iso domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and o...
The International Organization for Standardization (ISO) develops and publishes international standards covering technology, manufacturing, food safety, and many other industries. ISO standards pro...
Template file that pre-populates new issue forms with structured sections, guiding contributors to provide necessary information when reporting bugs or requesting features.
IT Standards is a specialized technology or methodology in the it domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and or...
Jakarta EE is a specialized technology or methodology in the jakarta domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and...
JSON Binding is a specialized technology or methodology in the json domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and ...
JSON-LD (JavaScript Object Notation for Linking Data) is a W3C standard for expressing linked data in JSON. It adds lightweight semantics to ordinary JSON so machines can understand what the data m...
JSON Processing is a specialized technology or methodology in the json domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners a...
JSON Schema enables the confident and reliable use of the JSON data format, bringing consistency, validity, and interoperability to enterprise operations. JSON Schema defines the digital objects th...
JWT (JSON Web Token) is a compact, self-contained, and secure method for transmitting information between parties as a JSON object. JWT has become essential for addressing the following needs at sc...
JSON (JavaScript Object Notation) is a lightweight, text-based data format used for storing and exchanging data. It is easy for humans to read and write, and simple for machines to parse and genera...
JSONPath is a query language used to extract, filter, and manipulate data from JSON (JavaScript Object Notation) structures. It provides a syntax similar to XPath (used for XML) but is designed spe...
Configuration file for Google Jules AI coding agent, providing project-specific instructions, architecture context, and coding standards.
A JSON Web Token (JWT) is a compact, URL-safe token format used to securely transmit information between parties as a JSON object, commonly used for authentication and authorization in web applicat...
A data architecture paradigm that combines the best features of data lakes and data warehouses, providing ACID transactions, schema enforcement, and governance on low-cost storage with support for ...
Lightweight Directory Access Protocol - an industry-standard protocol for accessing and maintaining distributed directory information services over an IP network. It plays a critical role in protec...
Lean Management is the discipline of planning, organizing, and overseeing lean-related activities to achieve optimal outcomes. It encompasses the processes, tools, and strategies needed to effectiv...
Lean Manufacturing is a manufacturing or industrial technology used to design, produce, or manage physical products and production processes. It leverages automation, precision engineering, and dig...
Lean Operations is a business or enterprise practice that helps organizations manage operations, make strategic decisions, and achieve their objectives. It encompasses the processes, tools, and met...
Advanced certification in Lean Six Sigma methodology focused on leading complex improvement projects, statistical analysis, and change management to reduce defects and variability in business proce...
A methodology that combines Lean manufacturing principles and Six Sigma quality management techniques to improve business processes by eliminating waste and reducing variation, focusing on data-dri...
File specifying the legal license under which a project is distributed, defining permissions, conditions, and limitations for use and redistribution.
A central bank regulation requiring commercial banks to hold a minimum percentage of customer deposits as reserves, either as cash in their vaults or as deposits with the central bank, to ensure li...
MapReduce is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improv...
Markdown is a lightweight markup language that uses plain text formatting syntax (such as asterisks for emphasis, hashes for headings, and brackets for links) to create formatted documents that are...
Markup Language is a specialized technology or methodology in the markup domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners...
Model Context Protocol configuration file defining MCP server connections for AI coding assistants, enabling tool integration and enhanced AI capabilities.
Messaging Protocol is a networking technology or protocol that facilitates communication, data transfer, or traffic management between systems and devices. It enables reliable, efficient, and secur...
Methodology is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or impr...
APIExamples format is Microcks’ own specification format for defining examples intended to be used by Microcks mocks.
Machine Learning Operations - practices and tools for deploying, monitoring, and maintaining machine learning models in production environments. It is increasingly applied across industries to auto...
Visual representations or prototypes of user interfaces and designs used to demonstrate the look and feel of a product before development. It is used across a range of industries and technical cont...
MCP (Model Context Protocol) is an open protocol that standardizes how applications provide context to large language models (LLMs). It offers a consistent way to connect AI models to diverse data ...
Modeling Language is a visual computing technology used for creating, processing, or displaying graphical content. It supports applications in design, simulation, entertainment, and data visualizat...
An architectural pattern that structures a monolithic application into loosely coupled, well-defined modules with clear boundaries and dependencies, combining the operational simplicity of a monoli...
Monolithic Architecture is a structural design approach that defines how monolithic components are organized, interact, and scale within a system. It provides a blueprint for building maintainable,...
A software architecture pattern that separates an application into logical layers or tiers, typically presentation, business logic, and data access layers, to improve modularity, scalability, and m...
Standardized rules and conventions for communication between network devices, including protocols like TCP/IP, HTTP, DNS, and others that enable data exchange across networks. It is fundamental to ...
National Institute of Standards and Technology - develops and promotes measurement standards, cybersecurity frameworks, and technology guidelines
Normalization is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or im...
OAuth 2.0 is an authorization framework that allows third-party applications to securely access a user's resources (such as accounts or data) on another service without sharing passwords. It is wid...
Object-Oriented Programming is a software development technology or practice that supports the creation, maintenance, or improvement of software systems. It helps developers and engineering teams w...
ODBC (Open Database Connectivity) is a standard API specification that provides a database-agnostic interface for applications to connect to and interact with various relational database management...
A modern, developer-first specification pioneered by Bruno for defining and sharing API collections. Designed for simplicity and collaboration.
Open Policy Agent (OPA) is an open-source, policy-based control engine that allows you to define and enforce fine-grained access control and policy decisions across microservices, APIs, and infrast...
The Overlay Specification is an auxiliary standard that complements the OpenAPI Specification. An OpenAPI description defines API operations, data structures, and metadata—the overall shape of an A...
OpenAPI (formerly known as Swagger) is a specification for building, documenting, and consuming RESTful APIs. It defines a standard, language-agnostic format for describing APIs, enabling both huma...
An open source specification and tool for real-time cost monitoring of Kubernetes infrastructure and cloud spending, enabling teams to measure, allocate, and optimize cloud costs across workloads.
openCypher is an open-source project that provides a standardized graph query language originally developed by Neo4j for querying property graphs. It enables developers to write expressive pattern-...
OpenID Connect is a specialized technology or methodology in the openid domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners ...
Occupational Safety and Health Administration - U.S. federal agency responsible for setting and enforcing workplace safety and health standards
Open Web Application Security Project - A nonprofit foundation that works to improve the security of software through community-led open source projects, hundreds of chapters worldwide, and educati...
Apache Parquet is an open source, column-oriented data file format designed for efficient data storage and retrieval. It provides efficient data compression and encoding schemes with enhanced perfo...
Partitioning is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or imp...
Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain ...
Pig Latin is a specialized technology or methodology in the pig domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and orga...
A Postman Collection is a portable JSON artifacts that organizes one or more API requests—plus their params, headers, auth, scripts, and examples—so you can run, share, and automate them in the Pos...
Postman environments are collections of variables that let you easily switch between different configurations (like development, staging, and production server URLs) without manually changing value...
A framework and approach that embeds privacy protections into the design and operation of IT systems, networked infrastructure, and business practices from the ground up, rather than as an aftertho...
Problem Details for HTTP APIs is a standardized way to represent error responses in HTTP APIs, defined in RFC 7807. It provides a structured format for conveying error details to clients, making it...
Visual representations that illustrate the sequential steps and decision points in a process, showing how inputs are transformed into outputs through various activities and pathways. It is used acr...
Prioritized list of features, enhancements, and fixes that represent work to be done in a product development process, typically used in Agile and Scrum methodologies. Teams use it to align stakeho...
A prioritized list of features, enhancements, and fixes that serves as the single source of requirements for product development, typically used in Agile and Scrum methodologies. Teams use it to al...
Detailed technical specifications and requirements documentation for products. Teams use it to align stakeholders, track progress, and adapt to changing requirements throughout the project lifecycle.
Programming Paradigm is a software development technology or practice that supports the creation, maintenance, or improvement of software systems. It helps developers and engineering teams work mor...
A systematic approach or framework for planning, executing, and controlling projects to achieve specific goals within defined constraints of time, budget, and resources. It helps teams plan, execut...
Reusable prompt template files for AI coding assistants, defining task-specific instructions that can be executed from chat interfaces. Used for standardizing common development tasks like code rev...
Protocol Buffers is a networking technology or protocol that facilitates communication, data transfer, or traffic management between systems and devices. It enables reliable, efficient, and secure ...
Early models or preliminary versions of products built to test areas, validate designs, and gather feedback before full-scale production or development. Effective use of this practice reduces bugs ...
A messaging pattern where publishers send messages to topics without knowledge of subscribers, and subscribers receive messages from topics they're interested in, enabling asynchronous and decouple...
Template file that pre-populates pull request descriptions with structured sections like change summary, testing steps, and checklist items.
Quality Of Service provides specialized quality of capabilities delivered as a managed offering, often accessible via APIs or cloud interfaces. It allows organizations to leverage quality of functi...
Frameworks and benchmarks that define acceptable levels of quality for products, services, or processes to ensure consistency and meet customer expectations. Proper implementation reduces legal and...
A responsibility assignment matrix that defines roles and responsibilities using four key designations - Responsible (those who do the work), Accountable (the ultimate decision maker), Consulted (t...
Role-Based Access Control (RBAC) is a security paradigm that restricts system access based on assigned roles rather than individual user identities. Users are granted permissions through their role...
Reactive Programming is a software development technology or practice that supports the creation, maintenance, or improvement of software systems. It helps developers and engineering teams work mor...
Standard repository documentation file providing project overview, setup instructions, and usage examples. Automatically displayed on repository landing pages by GitHub, GitLab, and other hosting p...
A sequence of characters that define a search pattern, commonly used for string matching, validation, and text manipulation in programming and data processing. It supports the full software develop...
Regulation is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or impro...
Pre-built templates and frameworks for meeting regulatory compliance requirements across various industries and jurisdictions. Proper implementation reduces legal and operational risk while support...
Regulatory is a compliance-related concept that helps organizations meet regulatory requirements and maintain adherence to industry standards. It supports audit readiness, risk management, and the ...
A database design approach that organizes data into tables (relations) with rows and columns, establishing relationships between tables through keys to ensure data integrity and minimize redundancy...
Renovate bot configuration file for automated dependency updates, supporting multiple package managers and customizable update strategies.
Pre-built document templates for generating standardized reports, dashboards, and data presentations with consistent formatting and structure. Organizations use it to track key metrics, identify tr...
Reserve Requirements is a specialized technology or methodology in the reserve domain that addresses specific technical or business requirements. It provides targeted capabilities that help practit...
REST (Representational State Transfer) is an architectural style for designing networked applications that uses stateless communication and standard HTTP methods to interact with resources identifi...
Configuration file for Roo Code AI coding assistant providing project-specific rules and coding conventions.
Documented procedures and step-by-step instructions for handling routine operations, troubleshooting issues, and responding to incidents in IT systems and infrastructure. It reduces manual effort a...
Scaled Agile Framework (SAFe) is an enterprise-scale agile framework that provides guidance for implementing agile practices across large organizations with multiple teams working together. Teams u...
SAML (Security Assertion Markup Language) is an XML-based open standard for exchanging authentication and authorization data between identity providers and service providers. It enables single sign...
Scaled Agile is a project management practice or tool that helps teams plan, organize, and execute work effectively. It supports structured collaboration, progress tracking, and adaptive planning t...
Schema Design is a specialized technology or methodology in the schema domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners a...
Schema Evolution is a specialized technology or methodology in the schema domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioner...
Schema Free is a specialized technology or methodology in the schema domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and...
Schema.org is a collaborative, community-driven vocabulary (launched in 2011 by Google, Microsoft, Yahoo!, and Yandex) that defines shared types and properties to describe things on the web—people,...
Schema Validation is a specialized technology or methodology in the schema domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitione...
Scrum is an agile project management framework that organizes work into fixed-length iterations called sprints, typically lasting two to four weeks. It defines clear roles (Product Owner, Scrum Mas...
Software Development Life Cycle - A systematic process for planning, creating, testing, and deploying software systems. Effective use of this practice reduces bugs in production and supports a cult...
Security Operations - the practice of integrating security practices into IT operations to identify, manage, and respond to security threats and vulnerabilities in real-time while maintaining syste...
A security design principle where systems and software are configured with the most secure settings from the initial deployment, requiring users to explicitly opt-in to less secure options rather t...
A software development approach that prioritizes security from the initial design phase through implementation, ensuring security considerations are built into the foundation of systems rather than...
A framework that integrates security practices and considerations into every phase of the software development process, from initial design through deployment and maintenance, to minimize vulnerabi...
A framework that integrates security practices into every phase of the software development process, from design and development through testing and deployment, to identify and mitigate vulnerabili...
Network protocols that create encrypted tunnels for secure data transmission over untrusted networks, including VPN technologies like IPsec, SSL/TLS, WireGuard, and SSH tunneling for protecting com...
A software development approach that integrates security considerations and practices from the initial design phase through the entire development lifecycle, rather than adding security as an after...
Security policy document describing supported versions, vulnerability reporting procedures, and responsible disclosure guidelines for a project.
A set of rules and standards that define how data is transmitted securely over networks, including protocols like SSL/TLS, HTTPS, SSH, and IPsec that provide encryption, authentication, and data in...
Frameworks and documented guidelines that establish security requirements, controls, and best practices for protecting organizational assets and information systems. It plays a critical role in pro...
Security Standards is a cybersecurity technology or practice designed to protect systems, networks, and data from unauthorized access, attacks, and vulnerabilities. It plays a critical role in an o...
Semantic versioning (SemVer) is a versioning system designed to convey meaningful information about software updates through a standardized format. It follows the structure MAJOR.MINOR.PATCH, where...
A collection of serverless architectures and patterns for building applications on AWS, featuring ready-to-use templates and best practices for Lambda, API Gateway, EventBridge, and other serverles...
An architectural pattern where software components provide services to other components through a communication protocol over a network. Services are loosely coupled, reusable, and can be independe...
Design patterns and architectural approaches for building microservices and service-oriented applications. Modern distributed architectures rely on it to coordinate workloads across multiple nodes ...
A data-driven methodology and set of techniques for process improvement that seeks to reduce defects and variability in business processes to achieve near-perfect quality (3.4 defects per million o...
Network architecture approach that enables dynamic, programmatically efficient network configuration to improve performance and monitoring by decoupling the network control plane from the data plan...
Reusable solutions and best practices for organizing software system architecture, including patterns like MVC, Microservices, Layered Architecture, Event-Driven, and CQRS that provide proven appro...
Reusable solutions to commonly occurring problems in software design, including creational, structural, and behavioral patterns that help developers write more maintainable and scalable code. Organ...
A structured process for planning, creating, testing, and deploying software systems through defined phases including requirements analysis, design, implementation, testing, deployment, and mainten...
A structured process for planning, creating, testing, and deploying software systems through distinct phases including requirements gathering, design, implementation, testing, deployment, and maint...
Specification is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or im...
SQL (Structured Query Language) is the standard programming language for managing and querying relational databases. It provides commands for creating, reading, updating, and deleting data, as well...
Documented step-by-step instructions for routine operations and processes to ensure consistency, quality, and compliance across an organization. It is essential for organizations operating in regul...
Standard Webhooks is a set of open source tools and guidelines to send webhooks easily, securely and reliably. Webhooks are becoming increasingly popular, though every webhooks provider implements ...
The process of implementing and developing technical standards based on the consensus of different parties, including firms, users, interest groups, standards organizations, and governments, to est...
Established specifications, protocols, and guidelines that define technical requirements and best practices for consistency and interoperability across systems and organizations. It is essential fo...
File describing how users can get help with a project, including links to documentation, forums, issue trackers, and support channels.
An open-source framework for designing, building, documenting, and consuming RESTful web services. Swagger provides a specification (OpenAPI) and tools for API development including interactive doc...
Table Format is a specialized technology or methodology in the table domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and...
Pre-built templates and frameworks for generating tax reports, compliance documents, and financial summaries required for tax filing and regulatory purposes. It helps organizations meet regulatory ...
Pre-designed templates for organizing and filing tax documents and returns. Financial institutions and enterprises use it to streamline operations and manage fiscal responsibilities.
Detailed technical requirements, standards, and parameters that define the characteristics and performance criteria of a product, system, or service. Organizations adopt it to address specific tech...
Technology Standards is a specialized technology or methodology in the technology domain that addresses specific technical or business requirements. It provides targeted capabilities that help prac...
Templates is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improv...
Structured scenarios that verify software functionality by defining inputs, execution conditions, and expected results to ensure quality and correctness. It is widely used by developers to build, m...
A software development approach where tests are written before the actual code, following a red-green-refactor cycle to ensure code quality and maintainability. It supports the full software develo...
A software development approach where tests are written before the implementation code, ensuring code quality and driving design decisions through test requirements. It is widely used by developers...
Structured documentation outlining test objectives, scope, approach, resources, schedule, and deliverables for software testing activities. It supports the full software development lifecycle from ...
Automated scripts used to verify software functionality, validate code behavior, and ensure quality through repeatable testing procedures. It supports the full software development lifecycle from d...
Documentation that defines the requirements, procedures, and expected outcomes for testing software systems. Effective use of this practice reduces bugs in production and supports a culture of qual...
A collection of organized test cases designed to validate specific functionality or features of software applications. It is widely used by developers to build, maintain, and scale software applica...
Underwriting Standards is a specialized technology or methodology in the underwriting domain that addresses specific technical or business requirements. It provides targeted capabilities that help ...
Practical applications and scenarios demonstrating how a technology or product can be implemented to solve real-world problems. It is used across a range of industries and technical contexts to imp...
A tool or practice for capturing software requirements from an end-user perspective, typically following the format "As a [user], I want [goal], so that [benefit]". Teams use it to align stakeholde...
RuleSets are how to configure vacuum to know which rules to run for each specification, and how it should evaluate those rules, and a RuleSet is a style guide with each rule being an individual req...
A vCard is a digital file format used to store and exchange contact information, such as names, phone numbers, email addresses, and addresses, in a standardized, portable way.
Standards and methodologies for managing changes and updates to APIs, software interfaces, and data formats while maintaining backward compatibility and clear communication of breaking changes. It ...
A VPN (Virtual Private Network) creates an encrypted tunnel between a user's device and a remote network, protecting data from interception and masking the user's IP address. It is widely used for ...
A sequential software development methodology where progress flows steadily downwards through phases of conception, initiation, analysis, design, construction, testing, deployment, and maintenance....
Specifications and guidelines that define how web technologies should work, ensuring interoperability and consistency across browsers and platforms. It supports the full software development lifecy...
A communication protocol providing full-duplex communication channels over a single TCP connection, enabling real-time data exchange between client and server. It is fundamental to modern network a...
Configuration file for Windsurf AI code editor containing project-specific rules, coding conventions, and instructions for the Cascade AI assistant.
Low-fidelity visual representations of user interface layouts used in early design stages to establish structure, hierarchy, and functionality before high-fidelity design work begins. It is used ac...
A Write-Ahead Log (WAL) is a standard technique in database systems where changes are first recorded to a sequential log file before being applied to the actual data files. It ensures durability an...
YAML (YAML Ain’t Markup Language) is a human-readable, data serialization format commonly used for configuration files and data exchange between programming languages. It emphasizes simplicity and ...
A security framework that requires all users and devices to be authenticated, authorized, and continuously validated before being granted access to applications and data, regardless of whether they...
A security framework that requires strict identity verification for every person and device attempting to access resources on a network, regardless of whether they are inside or outside the network...
A security framework that eliminates implicit trust and requires continuous verification of all users, devices, and applications attempting to access resources, regardless of their location inside ...
A security framework that requires all users and devices to be authenticated, authorized, and continuously validated before being granted access to applications and data, regardless of whether they...