Glossary
A developer glossary, written to teach — built to be cited.
1.4k terms across 32 categories — definitions, examples, common mistakes and fixes. Authored under one editorial standard. Cross-linked, searchable, and openly crawled by AI agents.
Trending categories
AI citations · 7d
Popular tags
by term count
🤖 Adoption
8
AI edits
1
agent
✦ Open for AI-assisted contributions
Bring your AI. Propose verified edits.
HMAC-authenticated, scored against sources, reviewed by a human. Accepted edits earn a public backlink and model badge.
Get started →🤖 AI Guestbook educational data only
|
|
Last 30 days
Agents 386
Perplexity 38
Amazonbot 37
ChatGPT 22
Google 5
Ahrefs 2
You.com 1
ChatGPT 24
Amazonbot 13
Perplexity 10
Google 5
Unknown AI 1
Amazonbot 10.7k
Perplexity 8.9k
ChatGPT 6.5k
Google 4.4k
Unknown AI 2.9k
Ahrefs 2.8k
SEMrush 1.1k
Majestic 487
Meta AI 234
Claude 232
You.com 98
Qwen 56
DuckDuckGo 12
Bing 2
Backlinks.com 1
Most referenced terms
Exception Handling (try/catch/finally) 3
Accessible Forms 3
Observer Pattern 3
Amortized Analysis 3
Destructuring & Spread (JS) 2
PHP 5 OOP Revolution — Objects by Reference 2
InnerSource 2
Intersection Observer API 2
Most active categories
How they use it
crawler 36k
crawler_json 1.7k
rag 1
pre-tracking
739
First ping
23 Mar 2026
Last 7 days
3.6k pings
Distinct agents
14
Unidentified
2.9k
Memory Pressure Detection PHP 7.0+
Proactively identifying when a PHP process approaches its memory limit so corrective action can be taken before a fatal error.
2d ago
performance intermediate
Database Query Result Streaming PHP 8.0+
Processing large result sets row-by-row without loading the entire dataset into memory - essential for PHP CLI scripts handling millions of rows.
5d ago
database intermediate
Error Recovery Patterns
Design strategies for gracefully handling failures and restoring system functionality without data loss or user disruption.
6d ago
general intermediate
Client-Side Template Injection (CSTI)
Attacker-controlled input rendered as a template expression by a client-side framework (AngularJS, Vue, Handlebars), executing JavaScript in the victim's browser.
CWE-1336 OWASP A3:2021
1w ago
security advanced
7.5
Constitutional AI (CAI)
Anthropic's training methodology where models critique and revise their own outputs against a set of written principles, reducing reliance on human labellers for alignment.
1w ago
ai_ml advanced
CSS Injection & Data Exfiltration via Stylesheets
Attacker-controlled CSS injected into a page or stylesheet that exfiltrates data via attribute selectors and `url()` callbacks, defaces UI, or enables phishing — all without a single line of JavaScript.
CWE-79 OWASP A3:2021
1w ago
security advanced
6.5
DOM Clobbering
Attack where injected HTML elements with controlled `id` or `name` attributes overwrite JavaScript globals or document properties, weaponising script-less HTML injection into code execution.
CWE-79 OWASP A3:2021
1w ago
security advanced
6.5
Mixture of Experts (MoE)
Neural network architecture where a gating network routes each token to a small subset of specialist 'expert' sub-networks, enabling huge total parameter counts at moderate per-token compute cost.
1w ago
ai_ml advanced
NoSQL Injection PHP 5.4+
Attacker-controlled input embedded into NoSQL queries (MongoDB, Redis, Couchbase) that subverts query intent — bypassing auth, exfiltrating data, or executing server-side code.
CWE-943 OWASP A3:2021
1w ago
security intermediate
8.8
Prompt Caching
API feature where a static prompt prefix (system instructions, large context) is cached server-side, dramatically reducing cost and latency on repeated calls that share the prefix.
1w ago
ai_ml intermediate
Reasoning Models & Test-Time Compute
A class of LLMs trained to allocate extra inference-time compute to internal reasoning before answering, achieving large gains on math, code, and logic at the cost of latency and tokens.
1w ago
ai_ml intermediate
RLHF — Reinforcement Learning from Human Feedback
Post-training method where human preference rankings train a reward model that fine-tunes an LLM via reinforcement learning, aligning outputs with human preferences.
1w ago
ai_ml advanced
Server-Side Includes (SSI) Injection
Attacker-controlled SSI directives (`<!--#exec ... -->`) injected into pages parsed by Apache or another SSI-enabled server, achieving file disclosure or remote command execution.
CWE-97 OWASP A3:2021
1w ago
security intermediate
9.8
cgroups — Linux Control Groups
A Linux kernel feature that groups processes and meters or limits their access to CPU, memory, I/O, network, and other resources — the core primitive that makes Docker, systemd, and Kubernetes resource limits possible.
3w ago
linux advanced
Diffusion Models
A class of generative models that learn to reverse a gradual noising process — starting from pure noise and iteratively denoising into coherent images, audio or video; the core technique behind Stable Diffusion, Midjourney and DALL·E 3.
3w ago
ai_ml advanced
Internal Developer Platform (IDP)
A curated, self-service layer on top of cloud and CI/CD infrastructure that product teams use to ship services without filing tickets — paved roads that make the right thing the easy thing.
3w ago
devops intermediate
Load Balancer Types — L4 vs L7
Layer-4 load balancers forward raw TCP/UDP packets based on IP and port; layer-7 load balancers terminate HTTP and route based on paths, headers and cookies — different trade-offs for different traffic.
3w ago
cloud intermediate
Shadow DOM
A browser feature that attaches a scoped, encapsulated DOM subtree to an element — styles and IDs inside the shadow tree do not leak in or out, enabling true component isolation on the web.
3w ago
frontend intermediate
Software Composition Analysis (SCA)
The practice and tooling for identifying all open-source and third-party components in a codebase, detecting known vulnerabilities (CVEs) in them, and flagging licence risks — distinct from static analysis of your own code.
3w ago
security intermediate
Technical Writing for Developers
The craft of writing documentation, READMEs, design docs, RFCs, and comments clearly enough that another engineer can act on them without asking you — a force multiplier that most developers undertrain.
3w ago
general beginner