Technology & AI Glossary.
491+ terms defined with rich explanations, practical FAQs, and links to free diagnostic tools.
Technical debt, AI economics, SaaS metrics, product management, and engineering leadership — explained.
Technical Debt
Technical debt is the implied cost of future rework caused by choosing an expedient solution now instead of a better approach that would take longer. First coin...
Legacy Code
Legacy code is existing software that is difficult to modify, extend, or replace, typically because it was written with older technologies, lacks documentation,...
Refactoring
Refactoring is the process of restructuring existing code without changing its external behavior. The goal is to improve the code's internal structure — readabi...
Code Smell
A code smell is a surface-level indicator in source code that suggests a deeper problem. The term was popularized by Martin Fowler and Kent Beck. Code smells ar...
DORA Metrics
DORA metrics are four key software delivery performance metrics identified by the DevOps Research and Assessment (DORA) team at Google. They are the industry st...
Monolith to Microservices
Monolith to microservices migration is the process of breaking a single, large application (monolith) into smaller, independent services (microservices) that co...
Dependency Hell
Dependency hell describes the frustrating situation where software packages rely on other packages that conflict with each other, creating complex webs of incom...
Code Coverage
Code coverage is a metric that measures the percentage of source code executed during automated testing. It indicates how thoroughly your test suite exercises t...
Cyclomatic Complexity
Cyclomatic complexity is a quantitative measure of the number of linearly independent paths through a program's source code. Invented by Thomas J. McCabe in 197...
Technical Debt Quadrant
The Technical Debt Quadrant is a classification framework by Martin Fowler that categorizes technical debt along two axes: deliberate vs. inadvertent, and reckl...
Dead Code
Dead code is source code that exists in the codebase but is never executed during normal operation. It includes unreachable code paths, unused functions, commen...
Spaghetti Code
Spaghetti code is a pejorative term for source code with a complex, tangled control flow that makes it extremely difficult to understand, maintain, or modify. T...
Coupling & Cohesion
Coupling and cohesion are complementary software design metrics. Coupling measures how dependent modules are on each other. Cohesion measures how related the el...
Test-Driven Development (TDD)
Test-Driven Development is a software development practice where tests are written before the code they test. The TDD cycle is: Red (write a failing test), Gree...
Code Review
Code review is the systematic examination of source code by peers before it is merged into the main codebase. It is one of the most effective quality assurance ...
Technical Debt Ratio (TDR)
The Technical Debt Ratio is a quantitative metric that expresses the cost of fixing all known technical debt as a percentage of the cost of rewriting the entire...
Boy Scout Rule
The Boy Scout Rule in software engineering states: "Always leave the code better than you found it." Attributed to Robert C. Martin (Uncle Bob), the principle e...
Strangler Fig Pattern
The Strangler Fig Pattern is a migration strategy for incrementally replacing a legacy system with a new system. Named after the strangler fig tree that grows a...
Static Code Analysis
Static code analysis is the automated examination of source code without executing it. Static analysis tools scan code for potential bugs, security vulnerabilit...
Code Documentation
Code documentation encompasses all written descriptions of what code does, why it exists, and how to use it. It includes inline comments, API documentation, REA...
Broken Windows Theory (Software)
The Broken Windows Theory in software development, drawn from urban criminology, states that visible signs of disorder (like poor code quality, ignored warnings...
Feature Flags
Feature flags (also called feature toggles, feature switches, or feature gates) are a software development technique that allows teams to enable or disable func...
Code Duplication
Code duplication occurs when identical or near-identical code blocks exist in multiple locations within a codebase. Also known as copy-paste programming or WET ...
Software Entropy
Software Entropy is the tendency of software systems to become increasingly disordered, complex, and difficult to maintain over time — even without any code cha...
Technical Debt Ratio
The Technical Debt Ratio (TDR) measures the proportion of engineering effort spent on maintaining existing systems versus building new capabilities. It is the s...
Technical Debt
Technical Debt is the accumulated cost of expedient engineering decisions that create future maintenance burden. Coined by Ward Cunningham in 1992, the debt met...
Technical Debt Ratio
Technical Debt Ratio (TDR) is a metric that quantifies the proportion of development time spent on fixing or working around existing technical debt versus build...
Technical Debt Quadrant
The Technical Debt Quadrant is a classification framework (created by Martin Fowler) that categorizes technical debt along two dimensions: deliberate vs. inadve...
Artificial Intelligence (AI)
Artificial intelligence is the simulation of human intelligence by computer systems. AI encompasses machine learning, natural language processing, computer visi...
Large Language Model (LLM)
A Large Language Model is a type of artificial intelligence trained on vast amounts of text data to understand and generate human language. LLMs like GPT-4, Cla...
AI Hallucination
An AI hallucination occurs when an artificial intelligence system generates output that is confident, fluent, and completely wrong. LLMs hallucinate because the...
Agentic AI
Agentic AI refers to artificial intelligence systems that can autonomously plan, reason, and take actions to achieve goals with minimal human oversight. Unlike ...
Prompt Engineering
Prompt engineering is the practice of crafting inputs (prompts) to AI language models to elicit desired outputs. It encompasses techniques like few-shot learnin...
Retrieval-Augmented Generation (RAG)
Retrieval-Augmented Generation (RAG) is an AI architecture pattern that combines a language model with a knowledge retrieval system. Instead of relying solely o...
AI Governance
AI governance is the framework of policies, processes, and controls that guide how an organization develops, deploys, and monitors artificial intelligence syste...
Vibe Coding
Vibe coding is a term that emerged in 2025-2026 to describe the practice of using AI to generate code through natural language prompts rather than writing code ...
AI Response Drift (LLM Inconsistency)
AI Response Drift (or LLM Inconsistency) is the phenomenon where a language model produces different, conflicting, or degraded answers to the exact same prompt ...
Agentic Process Automation (APA)
Agentic Process Automation (APA) is the 2026 evolution of Robotic Process Automation (RPA). Where legacy RPA relied on brittle, deterministic scripts and static...
Model Collapse (Synthetic Data Exhaust)
Model Collapse describes the mathematical degradation of generative AI models when they are trained recursively on AI-generated data (Synthetic Data Exhaust) ra...
Transformer Architecture
The Transformer architecture is the foundational neural network design behind all modern large language models including GPT-4, Claude, Gemini, and Llama. Intro...
Fine-Tuning
Fine-tuning is the process of taking a pre-trained AI model and training it further on a smaller, domain-specific dataset to customize its behavior for a partic...
AI Inference
AI inference is the process of running a trained model to generate predictions or outputs from new input data. Unlike training (which is done once), inference h...
Model Hallucination Rate
Model hallucination rate is the percentage of AI outputs that contain factual errors, fabricated information, or ungrounded claims. It is the primary quality me...
Embedding (Vector Embedding)
An embedding is a dense numerical representation of data (text, images, audio) as a vector of floating-point numbers. Embeddings capture semantic meaning — simi...
Vector Database
A vector database is a specialized database designed to store, index, and query high-dimensional vector embeddings efficiently. Unlike traditional databases tha...
AI Alignment
AI alignment is the challenge of ensuring that artificial intelligence systems behave in ways that are consistent with human values and intentions. It encompass...
MLOps (Machine Learning Operations)
MLOps is the set of practices, tools, and cultural changes needed to deploy, monitor, and maintain machine learning models in production reliably. It applies De...
Model Distillation
Model distillation (also called knowledge distillation) is a technique for creating smaller, faster AI models by training them to mimic the behavior of larger, ...
AI Safety
AI safety is the field focused on ensuring artificial intelligence systems operate safely, reliably, and beneficially. It encompasses technical research (alignm...
Natural Language Processing (NLP)
Natural Language Processing is the branch of artificial intelligence focused on giving computers the ability to understand, interpret, and generate human langua...
Computer Vision
Computer vision is the field of artificial intelligence that enables computers to interpret and understand visual information from the real world — images, vide...
Generative AI
Generative AI refers to artificial intelligence systems that create new content — text, images, audio, video, code, and 3D models — rather than simply analyzing...
AI Bias
AI bias occurs when artificial intelligence systems produce systematically unfair outcomes that favor or disadvantage certain groups. Bias can enter AI systems ...
Multimodal AI
Multimodal AI refers to artificial intelligence systems that can process, understand, and generate multiple types of data — text, images, audio, video, and stru...
AI Agent Framework
An AI agent framework is a software library or platform that provides the infrastructure for building autonomous AI agents — systems that can plan, reason, use ...
Synthetic Data
Synthetic data is artificially generated data that mimics the statistical properties of real-world data without containing any actual real-world records. It's c...
Context Window
A context window is the maximum amount of text (measured in tokens) that a language model can process in a single interaction. It determines how much informatio...
AI Guardrails
AI guardrails are runtime constraints, filters, and validation systems that prevent AI models from producing harmful, inappropriate, or incorrect outputs. They ...
AI Benchmarking
AI benchmarking is the practice of evaluating AI model performance against standardized test sets and metrics. Benchmarks provide objective comparisons between ...
AI Product Business Test
The AI Product Business Test is a framework for validating the unit economics of an AI feature before writing any code. Coined by Richard Ewing, it addresses th...
AI Agent
An AI agent is an autonomous software system that uses large language models (LLMs) to perceive, reason, plan, and take actions in the real world without consta...
Hallucination Debt
Hallucination debt is the accumulated organizational risk from AI systems that generate plausible but incorrect outputs that are accepted as truth and propagate...
Model Right-Sizing
Model right-sizing is the practice of selecting the smallest, cheapest AI model that achieves acceptable accuracy for a given use case. It directly addresses th...
Agentic Workflow
An agentic workflow is a multi-step process executed by AI agents that can make decisions, use tools, and adapt their approach based on intermediate results — w...
Retrieval-Augmented Generation
Retrieval-Augmented Generation (RAG) is a technique that enhances large language model (LLM) responses by first retrieving relevant documents from a knowledge b...
LLM Fine-Tuning
LLM Fine-Tuning is the process of training a pre-trained large language model on a domain-specific dataset to improve its performance on specialized tasks. Unli...
AI Hallucination Debt
AI Hallucination Debt is a term coined by Richard Ewing describing the accumulated organizational risk from AI-generated falsehoods that are accepted as truth a...
AI Unit Economics
AI Unit Economics measures the per-interaction profitability of AI-powered features. Unlike traditional software with near-zero marginal costs, AI features have...
AI Technical Debt
AI Technical Debt is the accumulation of shortcuts, missing infrastructure, and data quality issues in AI/ML systems that create escalating maintenance costs an...
Model Debt
Model Debt is a subcategory of AI Technical Debt referring to the accumulated risk from ML models that are overfitted, under-monitored, poorly versioned, or ope...
Orchestration Debt
Orchestration Debt is an emerging form of AI technical debt (2026) created when autonomous AI agents interact with multiple enterprise systems, creating complex...
AI Observability
AI Observability is the ability to understand the internal state, behavior, and performance of AI systems in production through logging, monitoring, and analysi...
RAG Architecture
Retrieval-Augmented Generation (RAG) is an AI architecture pattern that combines information retrieval with text generation. Instead of relying solely on a mode...
AI Cost Attribution
AI Cost Attribution is the practice of tracking and assigning the full cost of AI features to specific products, features, customers, or business units. Unlike ...
Agentic Workflow
An Agentic Workflow is an automated process where one or more AI agents autonomously plan, execute, and iterate on tasks with minimal human intervention. Unlike...
AI Agent
An AI Agent is an autonomous software system that can perceive its environment, reason about goals, make plans, use tools, and take actions with minimal human i...
Fine-Tuning
Fine-tuning is the process of taking a pre-trained AI model and further training it on a smaller, specialized dataset to adapt it for specific tasks or domains....
Generative AI
Generative AI refers to AI systems that can create new content — text, images, code, audio, video, and 3D models — based on patterns learned from training data....
Retrieval-Augmented Generation (RAG)
Retrieval-Augmented Generation (RAG) is an AI architecture pattern that enhances LLM responses by first retrieving relevant information from external knowledge ...
Vector Database
A Vector Database is a specialized database designed to store, index, and query high-dimensional vector embeddings efficiently. It is the infrastructure backbon...
Embeddings
Embeddings are numerical vector representations of data (text, images, audio) that capture semantic meaning in a high-dimensional space. Similar concepts have s...
Transformer Architecture
The Transformer is the neural network architecture that powers virtually all modern AI — GPT, Claude, Gemini, Llama, and every other LLM. Introduced in the 2017...
Model Drift
Model drift occurs when an AI/ML model's performance degrades over time because the real-world data it encounters differs from the data it was trained on. There...
Token
In AI/LLM context, a token is a chunk of text that a language model processes as a single unit. Tokens are the fundamental unit of both input and output for LLM...
Agentic Workflow
An agentic workflow is a multi-step process where AI agents autonomously plan, execute, evaluate, and iterate on tasks to achieve a defined goal. Unlike simple ...
AI Inference
AI inference is the process of running a trained machine learning model to generate predictions, classifications, or outputs from new input data. Unlike trainin...
Synthetic Data
Synthetic data is artificially generated data that mimics the statistical properties of real data without containing actual user information. It's created by ge...
AI Alignment
AI alignment is the field of ensuring that AI systems behave in accordance with human values, intentions, and goals. It addresses the problem: how do you make s...
Mixture of Experts (MoE)
Mixture of Experts (MoE) is a neural network architecture where the model is divided into multiple specialized "expert" sub-networks, and a gating mechanism rou...
AI Orchestration
AI orchestration is the coordination layer that manages how multiple AI models, tools, and data sources work together to complete complex tasks. It's the "condu...
AI Guardrails
AI guardrails are safety mechanisms that constrain AI model behavior within acceptable bounds — preventing harmful, inaccurate, or policy-violating outputs. Gua...
AI Red Teaming
AI red teaming is the practice of adversarially testing AI systems to discover safety vulnerabilities, harmful behaviors, and failure modes before deployment. R...
Token (AI)
In AI and natural language processing, a token is a unit of text that a language model processes. Tokens are how LLMs "read" — they break text into smaller piec...
Small Language Models (SLMs)
Small Language Models (SLMs) are compact neural networks designed to perform language tasks locally, on-edge, or with minimal compute resources compared to trad...
Open Weights
Open Weights refers to AI models where the trained parameters (weights) are made publicly available for download and execution, but the underlying training data...
Multimodal AI
Multimodal AI systems are neural networks capable of processing, understanding, and generating multiple data types—or "modalities"—simultaneously, such as text,...
Agentic Workflows
Agentic Workflows refer to multi-step, autonomous processes where AI agents dynamically plan, execute, and course-correct to achieve a high-level goal without h...
Sovereign AI
Sovereign AI refers to artificial intelligence capabilities—including physical infrastructure, foundation models, and training datasets—that are entirely owned,...
Model Routing
Model Routing is a dynamic architectural capability where incoming API requests are algorithmically distributed to different AI models (e.g., GPT-4, Claude 3 Ha...
Annual Recurring Revenue (ARR)
Annual Recurring Revenue (ARR) is the annualized value of recurring subscription revenue. It's the single most important metric for SaaS businesses and is calcu...
Monthly Recurring Revenue (MRR)
Monthly Recurring Revenue (MRR) is the predictable, recurring revenue a SaaS business earns each month from its subscription customers. MRR is the building bloc...
Churn Rate
Churn rate is the percentage of customers or revenue lost over a given period. Customer churn (logo churn) measures the percentage of customers who cancel. Reve...
Net Revenue Retention (NRR)
Net Revenue Retention (NRR), also called Net Dollar Retention (NDR), measures the percentage of recurring revenue retained from existing customers over a period...
Rule of 40
The Rule of 40 is a SaaS benchmark that states a healthy software company's combined revenue growth rate and profit margin should equal or exceed 40%. For examp...
SaaS Valuation
SaaS valuation is the process of determining the economic value of a software-as-a-service business. SaaS companies are typically valued as a multiple of their ...
Unit Economics
Unit economics measures the direct revenues and costs associated with a particular business unit — typically a customer, transaction, or product unit. In SaaS, ...
Burn Rate & Runway
Burn rate is the rate at which a company is spending its cash reserves. Monthly burn rate = total monthly expenses minus total monthly revenue. Runway is how ma...
Evergreen Ratio
The Evergreen Ratio is a financial metric coined by Richard Ewing that measures the profitability of AI workflows. It compares the number of times an AI-generat...
Thermodynamic Compute Cost
Thermodynamic Compute Cost is the baseline energy expenditure required to execute an AI inference operation, irrespective of cloud provider markup. It represent...
Customer Acquisition Cost (CAC)
Customer Acquisition Cost is the total cost of acquiring a new customer, including all marketing spend, sales team salaries, tools, and overhead divided by the ...
Gross Margin
Gross margin is the percentage of revenue remaining after subtracting the cost of goods sold (COGS). For SaaS companies, COGS includes: hosting and infrastructu...
Lifetime Value (LTV)
Lifetime Value is the total revenue a company expects to earn from a single customer over the entire duration of their relationship. It's the fundamental metric...
Runway Calculation
Runway is the number of months a startup can continue operating at its current spending rate before running out of cash. It's the most critical operational metr...
Annual Contract Value (ACV)
Annual Contract Value is the average annualized revenue per customer contract. ACV = Total Contract Value ÷ Contract Length in Years. It normalizes contracts of...
Revenue Recognition (ASC 606)
Revenue recognition is the accounting principle that determines when and how revenue is recorded on financial statements. For SaaS companies, ASC 606 (the US st...
Net Dollar Retention (NDR)
Net Dollar Retention is the percentage change in recurring revenue from existing customers, including expansion, contraction, and churn. It measures whether you...
SaaS Magic Number
The SaaS Magic Number measures sales efficiency — how much new ARR is generated for every dollar spent on sales and marketing. It answers the question: "Is our ...
Gross Revenue Retention (GRR)
Gross Revenue Retention measures the percentage of recurring revenue retained from existing customers, excluding expansion revenue. Unlike NRR which includes up...
ARPU / ARPA
ARPU (Average Revenue Per User) and ARPA (Average Revenue Per Account) measure the average revenue generated per unit. ARPU tracks individual users; ARPA tracks...
CAC Payback Period
CAC Payback Period is the number of months it takes for a customer's contribution margin to recoup their acquisition cost. It measures how quickly your sales an...
Cohort Analysis
Cohort analysis groups customers by a shared characteristic (usually their signup month) and tracks their behavior over time. It reveals patterns that aggregate...
Gross Margin Preservation
Gross Margin Preservation is the discipline of protecting software gross margins as AI features are added to the product. Traditional software has near-zero mar...
FinOps
FinOps (Financial Operations) is a cloud financial management discipline that brings financial accountability to the variable cost model of cloud computing. It ...
Operating Leverage
Operating leverage measures how effectively a company converts revenue growth into profit growth. High operating leverage means each additional dollar of revenu...
Burn Multiple
The Burn Multiple is a capital efficiency metric that measures how much cash a company consumes to generate each new dollar of net Annual Recurring Revenue (ARR...
AI COGS
AI COGS (Cost of Goods Sold) refers to the variable costs directly attributable to delivering AI-powered features to customers. Unlike traditional SaaS (near-ze...
FinOps
FinOps (Financial Operations) is the practice of bringing financial accountability to the variable spend model of cloud computing. It brings together technology...
Customer Acquisition Cost (CAC)
Customer Acquisition Cost (CAC) is the total cost of acquiring a new customer, including all sales and marketing expenses. **Formula:** CAC = Total Sales & Mar...
Customer Lifetime Value (LTV / CLTV)
Customer Lifetime Value (LTV or CLTV) is the total revenue expected from a customer account over the entire duration of their relationship with your company. *...
Net Revenue Retention (NRR)
Net Revenue Retention (NRR) — also called Net Dollar Retention (NDR) — measures the percentage of recurring revenue retained from existing customers over a peri...
Burn Multiple
Burn Multiple is a capital efficiency metric that measures how much a company burns to generate each incremental dollar of ARR. It was popularized by David Sack...
Product-Market Fit
Product-market fit (PMF) is the degree to which a product satisfies strong market demand. Marc Andreessen defined it as 'being in a good market with a product t...
RICE Framework
RICE is a prioritization framework used by product managers to score and rank product ideas. RICE stands for Reach (how many people will this impact?), Impact (...
North Star Metric
A North Star Metric is the single metric that best captures the core value your product delivers to customers. It serves as the primary measure of product succe...
Jobs To Be Done (JTBD)
Jobs To Be Done (JTBD) is a product strategy framework that focuses on the underlying 'job' a customer is trying to accomplish rather than the customer's demogr...
Kano Model
The Kano Model is a product development framework that categorizes features based on how they affect customer satisfaction. Developed by Professor Noriaki Kano,...
Product Roadmap
A product roadmap is a strategic document that communicates the planned direction and priorities for a product over time. It aligns stakeholders around what wil...
OKRs (Objectives & Key Results)
OKRs are a goal-setting framework that defines what you want to achieve (Objectives) and how you'll measure progress (Key Results). Popularized by Intel and Goo...
Product-Led Growth (PLG)
Product-Led Growth is a business strategy where the product itself is the primary driver of customer acquisition, conversion, and expansion. Users discover, try...
Feature Prioritization
Feature prioritization is the process of deciding what to build next from a backlog of potential features. It is the most strategically important skill a produc...
User Story
A user story is a short, simple description of a feature from the perspective of the user who needs it. The format is: "As a [type of user], I want [some goal] ...
Minimum Viable Product (MVP)
A Minimum Viable Product is the simplest version of a product that delivers enough value to attract early customers and generate validated learning. Coined by F...
Product Analytics
Product analytics is the practice of measuring, analyzing, and interpreting user behavior data to make better product decisions. It answers questions like: how ...
Product Discovery
Product discovery is the process of determining what to build before engineering starts building it. It answers: Is this a real problem? Does our solution addre...
Product Operations
Product Operations (Product Ops) is an emerging function that supports product management through data infrastructure, process optimization, and tooling. Produc...
A/B Testing
A/B testing (split testing) is a method of comparing two versions of a product experience to determine which performs better. Users are randomly assigned to ver...
Product Debt
Product debt is the accumulation of product decisions that deliver short-term value at the expense of long-term product health. Unlike technical debt (code qual...
P&L Ownership for Product Managers
P&L Ownership for Product Managers is the principle — championed by Richard Ewing in Mind the Product — that senior product managers should own the profit-and-l...
Zombie Feature
A zombie feature is a product feature that is technically alive (deployed, receiving maintenance, consuming resources) but effectively dead (few or no users, mi...
P&L Ownership for Product Managers
P&L Ownership for Product Managers is the practice of making product managers financially accountable for the profit and loss impact of their product decisions....
Product Management
Product Management is the function responsible for defining what to build, for whom, and why — then ensuring it gets built, launched, and iterated on to maximiz...
Product-Led Growth (PLG)
Product-Led Growth (PLG) is a go-to-market strategy where the product itself is the primary driver of customer acquisition, conversion, and expansion. Users dis...
AI Product Management
AI Product Management is a specialized discipline of PM focused on building, scaling, and maintaining products explicitly powered by machine learning, LLMs, or ...
Continuous Discovery
Continuous Discovery is a product management framework popularized by Teresa Torres emphasizing a steady, weekly cadence of customer touchpoints executed jointl...
Engineering Productivity
Engineering productivity measures how effectively a software engineering team converts resources (time, people, money) into valuable software output. It's one o...
Revenue Per Engineer
Revenue Per Engineer is a financial efficiency metric that divides a company's total revenue by the number of engineers. It measures how effectively an engineer...
DevOps
DevOps is a set of practices, tools, and cultural philosophies that combines software development (Dev) and IT operations (Ops) to shorten the development lifec...
CI/CD (Continuous Integration / Continuous Delivery)
CI/CD is a software development practice that automates the process of integrating code changes (CI) and delivering them to production (CD). Continuous Integra...
Engineering Velocity
Engineering velocity measures the rate at which an engineering team delivers value over time. It is commonly tracked as story points per sprint, but this metric...
Engineering Manager
An Engineering Manager (EM) leads a team of software engineers, balancing people management, project delivery, and technical direction. The role exists at the i...
Staff Engineer
A Staff Engineer is a senior individual contributor who operates at the organizational level — influencing technical direction, setting standards, and solving p...
Team Topologies
Team Topologies is a framework by Matthew Skelton and Manuel Pais for organizing engineering teams based on how software flows through the organization. It defi...
Blameless Postmortem
A blameless postmortem (also called blameless retrospective or incident review) is a structured analysis of a production incident that focuses on understanding ...
Developer Experience (DevEx)
Developer Experience encompasses the tools, workflows, processes, and environment that affect how productive and satisfied software developers are in their dail...
On-Call Engineering
On-call engineering is the practice of designating engineers to be available outside business hours to respond to production incidents. On-call rotations are es...
Engineering Career Levels
Engineering career levels define the expectations, scope, and compensation for engineers at different stages of their career. Common levels include: Junior/L3, ...
Technical Specification (Tech Spec / RFC)
A technical specification (tech spec) or Request for Comments (RFC) is a document that describes the design of a system, feature, or architectural change before...
Technical Hiring
Technical hiring is the process of evaluating and selecting software engineers for open positions. It is one of the highest-leverage activities for engineering ...
Audit Interview Protocol
The Audit Interview Protocol is a hiring methodology designed for the AI era, replacing traditional coding interviews with verification-based assessments. Inste...
Ship/No-Ship Decision
The Ship/No-Ship Decision is the judgment call on whether a software release is ready for production deployment, given the known bugs, risks, and trade-offs. It...
Feature Flags
Feature flags (also called feature toggles) are conditional statements in code that allow teams to enable or disable features without deploying new code. They s...
Incident Management
Incident management is the process of detecting, responding to, resolving, and learning from production outages and degradations. A mature incident management p...
Change Failure Rate
Change Failure Rate (CFR) is one of the four DORA metrics. It measures the percentage of deployments to production that cause a failure requiring remediation — ...
Continuous Deployment
Continuous Deployment is the practice of automatically deploying every code change that passes automated tests to production — without any manual approval step....
Engineering Manager
An Engineering Manager (EM) is a people leader responsible for the productivity, growth, and well-being of a software engineering team. Unlike tech leads (who l...
Team Topologies
Team Topologies is a framework by Matthew Skelton and Manuel Pais that defines four fundamental team types and three interaction modes for organizing engineerin...
Developer Experience (DevEx)
Developer Experience (DevEx) is the holistic experience of software developers as they interact with tools, processes, systems, and organizational culture to ac...
Platform Engineering
Platform Engineering is the discipline of designing and building self-service toolchains and workflows that enable software engineering teams to deliver value f...
Fractional CTO
A Fractional CTO is an experienced technology executive who provides part-time CTO services to companies that need senior technology leadership but can't justif...
Digital Transformation
Digital transformation is the process of integrating digital technology into all areas of a business, fundamentally changing how it operates and delivers value ...
Fractional CPO
A Fractional CPO (Chief Product Officer) is a part-time product executive who provides strategic product leadership to companies that need senior product guidan...
Technical Due Diligence
Technical due diligence is the systematic evaluation of a company's technology stack, engineering team, processes, and technical risks, typically performed duri...
Technology Board Reporting
Technology board reporting is the practice of communicating engineering and technology status to a company's board of directors in financial and strategic terms...
Technology Governance
Technology governance is the framework of policies, processes, and organizational structures that ensure technology investments align with business objectives a...
Build vs. Buy Decision
The build vs. buy decision is the strategic choice between developing software in-house or purchasing/licensing existing solutions. It's one of the most consequ...
Change Management
Change management is the structured approach to transitioning individuals, teams, and organizations from a current state to a desired future state. In technolog...
Vendor Lock-In
Vendor lock-in occurs when switching from one technology vendor to another becomes prohibitively expensive due to technical dependencies, data portability issue...
Engineering Manager
An Engineering Manager (EM) is a people manager for software engineers, responsible for team health, career development, hiring, and delivery. The EM role is th...
Architecture Review Board
An Architecture Review Board (ARB) is a governance body that evaluates and approves significant technical decisions — new technologies, architecture changes, pl...
Technical Insolvency Date
The Technical Insolvency Date (TID) is a framework coined by Richard Ewing that identifies the specific future quarter when an organization's technical debt mai...
Innovation Tax
The Innovation Tax is a framework coined by Richard Ewing that measures the hidden cost of maintenance work that gets reported as innovation investment. It is O...
Cost of Predictivity
The Cost of Predictivity is a framework coined by Richard Ewing that measures the variable cost of AI accuracy. Unlike traditional software with near-zero margi...
Kill Switch Protocol
The Kill Switch Protocol is a framework coined by Richard Ewing for identifying and deprecating 'Zombie Features' — code that requires ongoing maintenance but g...
Feature Bloat Calculus
Feature Bloat Calculus is a framework coined by Richard Ewing for determining when a feature's maintenance cost exceeds its value contribution. It quantifies th...
Audit Interview
The Audit Interview is a hiring protocol coined by Richard Ewing that tests verification skills instead of code generation skills. Candidates are given AI-gener...
Product Economist
A Product Economist is a role and methodology coined by Richard Ewing that treats product decisions as economic decisions. Instead of measuring velocity, story ...
AI Volatility Tax
The AI Volatility Tax is a framework developed by Richard Ewing (expanding on concepts from Steve Oppenheim) that measures the hidden labor cost of verifying pr...
Product Debt Index (PDI)
The Product Debt Index is Richard Ewing's proprietary diagnostic score that quantifies an organization's total technical debt in dollar terms. Unlike traditiona...
Enterprise Value Scenario Engine (EV-SE)
The Enterprise Value Scenario Engine is Richard Ewing's tool for modeling how technical decisions affect company valuation. It connects engineering metrics to t...
AI Unit Economics Benchmark (AUEB)
The AI Unit Economics Benchmark is Richard Ewing's framework for measuring the true cost and value of AI features. It goes beyond simple inference costs to calc...
APER (Annualized Productivity to Engineering Ratio)
APER measures revenue generated per engineer, annualized. It is Richard Ewing's recommended alternative to velocity metrics like story points, which measure eff...
R&D Capital Audit
The R&D Capital Audit is Richard Ewing's signature service — a forensic examination of how an organization allocates its engineering and product development res...
Capitalization Matrix
The Capitalization Matrix is a framework introduced by Richard Ewing in CIO.com for bridging the gap between engineering velocity metrics and financial governan...
Systems Governor
The Systems Governor is a role concept introduced by Richard Ewing in Built In that defines the evolved role of a software engineer in the AI age. When AI gener...
4 Laws of Probabilistic Software
The 4 Laws of Probabilistic Software Development are principles coined by Richard Ewing in Built In that define the fundamental constraints of AI-generated code...
AI Liability Gradient
The AI Liability Gradient is an analytical framework introduced by Richard Ewing in Built In that maps the relationship between AI agent autonomy and organizati...
Sunset Protocol
The Sunset Protocol is a structured deprecation methodology introduced by Richard Ewing in Built In for safely removing features from a software product. It pro...
Zombie Features
Zombie Features is a term coined by Richard Ewing to describe product features that are technically alive (still running in production) but functionally dead (n...
Complexity Tax
The Complexity Tax is the compounding cost factor in Feature Bloat Calculus that most organizations entirely miss. It quantifies how every feature in the codeba...
Negative Carry (Features)
Negative Carry is a financial concept applied by Richard Ewing to product features. A feature has negative carry when its total cost (direct maintenance + oppor...
AI Margin Collapse Point
The AI Margin Collapse Point is the specific usage volume at which an AI feature's variable costs exceed the revenue it generates, causing the feature to destro...
Variable Cost of Intelligence
The Variable Cost of Intelligence is a macro-economic concept analyzed by Richard Ewing in Built In that describes how AI fundamentally changes the cost structu...
Macro Regression Loops
Macro Regression Loops are a concept analyzed by Richard Ewing in Built In that describe feedback cycles where AI agent actions create cascading effects that am...
Subprime Code Crisis
The Subprime Code Crisis is an analogy coined by Richard Ewing comparing the hidden risk in enterprise codebases to the 2008 financial crisis. Just as subprime ...
Engineering Capital Allocation
Engineering Capital Allocation is the discipline of treating every engineering hour as a financial investment and evaluating it against expected returns. Most e...
Product Economics
Product Economics is the discipline of treating every product decision as an economic decision — evaluating features, sprints, and roadmaps through the lens of ...
AI COGS (Cost of Goods Sold)
AI COGS is a framework coined by Richard Ewing for quantifying the variable cost of AI features as a component of Cost of Goods Sold. Unlike traditional softwar...
EAAP (Exogram Action Admissibility Protocol)
The Exogram Action Admissibility Protocol (EAAP) is an open standard created by Richard Ewing for verifying whether an AI agent's proposed action should be allo...
Orchestration Debt
Orchestration Debt is a framework coined by Richard Ewing for the technical debt that accumulates in AI agent coordination systems. As multi-agent architectures...
Sovereign AI Substrate
A Sovereign AI Substrate refers to the localized, deeply-controlled deployment of generative AI models (typically open-weights models like Llama, Mistral, or De...
Cloud Architecture
Cloud architecture is the design of software systems to run on cloud computing platforms (AWS, Azure, GCP). It encompasses compute, storage, networking, and ser...
Kubernetes (K8s)
Kubernetes is an open-source container orchestration platform that automates the deployment, scaling, and management of containerized applications. Originally d...
Serverless Computing
Serverless computing is a cloud execution model where the cloud provider manages the server infrastructure and automatically allocates compute resources on dema...
Infrastructure as Code (IaC)
Infrastructure as Code is the practice of managing and provisioning infrastructure through machine-readable configuration files rather than manual processes. It...
Observability
Observability is the ability to understand the internal state of a system by examining its outputs. The three pillars of observability are: metrics (quantitativ...
Site Reliability Engineering (SRE)
Site Reliability Engineering is a discipline that applies software engineering practices to infrastructure and operations problems. Developed at Google, SRE tre...
Edge Computing
Edge computing processes data near the source of data generation rather than in a centralized cloud data center. By moving computation closer to users, edge com...
Vector Database
A vector database is a specialized database designed to store, index, and query high-dimensional vector embeddings — numerical representations of data (text, im...
CI/CD Pipeline
A CI/CD pipeline (Continuous Integration / Continuous Deployment) is an automated workflow that takes code from a developer's commit through build, test, and de...
Infrastructure as Code
Infrastructure as Code (IaC) is the practice of managing infrastructure (servers, networks, databases) through code files rather than manual configuration. Infr...
Kubernetes
Kubernetes (K8s) is an open-source container orchestration platform that automates the deployment, scaling, and management of containerized applications. Origin...
Observability
Observability is the ability to understand the internal state of a system by examining its outputs — logs, metrics, and traces (the "three pillars"). Unlike mon...
Site Reliability Engineering
Site Reliability Engineering (SRE) is a discipline originated by Google that applies software engineering practices to infrastructure and operations problems. S...
Cloud Cost Optimization
Cloud cost optimization is the continuous process of reducing cloud infrastructure spend while maintaining performance and reliability. It addresses the most co...
Serverless Computing
Serverless computing is a cloud execution model where the cloud provider manages server infrastructure and automatically allocates compute resources on-demand. ...
Edge Computing
Edge computing is a distributed computing paradigm where computation and data storage are performed closer to the data source or end user — at the "edge" of the...
Multi-Cloud Strategy
Multi-cloud is the strategy of using services from two or more cloud providers (AWS, GCP, Azure) to avoid vendor lock-in, optimize costs, or meet compliance req...
FinOps
FinOps (Financial Operations) is the practice of bringing financial accountability to cloud spending. It combines engineering, finance, and business to optimize...
Chaos Engineering
Chaos engineering is the practice of intentionally introducing failures into production systems to identify weaknesses before they cause real outages. Pioneered...
Service Level Objectives (SLOs)
Service Level Objectives (SLOs) are specific, measurable targets for service reliability — the percentage of time a service should work correctly. SLOs are the ...
Observability
Observability is the ability to understand the internal state of a system by examining its external outputs — logs, metrics, and traces. Unlike monitoring (whic...
Serverless GPUs
Serverless GPUs are a cloud compute execution model where organizations run artificial intelligence and machine learning workloads on graphics processing units ...
Cloud Repatriation
Cloud Repatriation is the strategic IT trend of migrating workloads from public cloud environments (AWS, GCP, Azure) back to on-premises data centers or bare-me...
WebAssembly (Wasm)
WebAssembly (Wasm) is a binary instruction format that allows code written in languages like Rust, C++, and Go to run at near-native speed across different envi...
Data Warehouse
A data warehouse is a centralized repository of structured, historical data optimized for analytical queries and reporting. Unlike operational databases (optimi...
Data Pipeline
A data pipeline is a series of automated steps that extract data from source systems, transform it for analysis, and load it into a destination (data warehouse,...
Business Intelligence (BI)
Business Intelligence is the technologies, practices, and strategies for collecting, integrating, analyzing, and presenting business data. BI tools turn raw dat...
Metrics Layer (Semantic Layer)
A metrics layer (or semantic layer) is a centralized definition of business metrics that ensures everyone in the organization uses the same calculations. It's t...
Data Governance
Data governance is the framework of policies, processes, and standards for managing data assets across an organization. It covers data quality, data access, dat...
Data Debt
Data Debt is the accumulated quality, governance, and infrastructure deficiencies in an organization's data assets that create escalating costs and risks. In AI...
Data Mesh
Data mesh is a decentralized data architecture paradigm where domain teams own and publish their data as products, rather than centralizing all data into a sing...
Data Lakehouse
A data lakehouse is a modern data architecture that combines the best features of data lakes (cheap storage for all data types) and data warehouses (structured ...
Feature Store
A feature store is a centralized repository for storing, managing, and serving machine learning features — the input variables that ML models use for prediction...
MLOps
MLOps (Machine Learning Operations) is the set of practices for deploying, monitoring, and managing machine learning models in production. It applies DevOps pri...
Data Lake
A data lake is a centralized repository that stores raw data at any scale — structured (databases), semi-structured (JSON, XML), and unstructured (images, logs,...
Semantic Layer
A Semantic Layer is an architectural abstraction that sits between raw database storage (data warehouses/lakehouses) and data consumers (BI tools, AI agents). I...
Graph RAG
Graph RAG (Retrieval-Augmented Generation) is an advanced AI architecture that integrates Knowledge Graphs with traditional vector databases to drastically impr...
Synthetic Data
Synthetic Data is information that is artificially generated by AI algorithms rather than collected from real-world events or users. It is designed to perfectly...
Zero Trust Security
Zero Trust is a security framework based on the principle "never trust, always verify." Unlike traditional perimeter security (castle-and-moat model), Zero Trus...
SOC 2 Compliance
SOC 2 is an auditing standard developed by the AICPA that verifies a service organization's controls for security, availability, processing integrity, confident...
Security Vulnerability Management
Security vulnerability management is the continuous process of identifying, classifying, prioritizing, remediating, and mitigating security vulnerabilities in s...
GDPR Compliance
The General Data Protection Regulation (GDPR) is the EU's comprehensive data privacy law that governs how organizations collect, store, process, and share perso...
Penetration Testing
Penetration testing (pen testing) is the practice of simulating cyberattacks against your systems to identify exploitable vulnerabilities before real attackers ...
Security & Compliance
Security and compliance are two related disciplines that protect organizations from threats and ensure adherence to regulatory requirements. **Security** focus...
Vulnerability Management
Vulnerability management is the continuous process of identifying, evaluating, treating, and reporting security vulnerabilities in software systems and infrastr...
Zero Trust Architecture
Zero Trust is a security model based on the principle "never trust, always verify." Unlike traditional perimeter-based security (castle-and-moat), Zero Trust as...
Prompt Injection
Prompt injection is a security vulnerability where an attacker crafts input that causes an AI model to ignore its original instructions and follow the attacker'...
Zero Trust Architecture
Zero Trust is a security framework based on the principle that no user, device, or system should be implicitly trusted, regardless of whether they are inside or...
SOC 2 Compliance
SOC 2 (Service Organization Control 2) is an auditing framework that evaluates how a company protects customer data. It is the most requested compliance certifi...
Supply Chain Security
Software supply chain security is the practice of securing the entire software delivery pipeline — from source code to dependencies to build systems to deployme...
Incident Response
Incident response is the structured process for identifying, containing, resolving, and learning from production incidents. It defines how teams respond when th...
Zero Trust Security
Zero Trust is a security architecture that requires all users, devices, and applications to be continuously authenticated and authorized — regardless of whether...
DSPM (Data Security Posture Management)
Data Security Posture Management (DSPM) is a cybersecurity framework focused on identifying, mapping, classifying, and protecting sensitive data regardless of w...
SBOM (Software Bill of Materials)
A Software Bill of Materials (SBOM) is a comprehensive, machine-readable inventory detailing every third-party component, open-source library, and exact depende...
Post-Quantum Cryptography
Post-Quantum Cryptography (PQC) refers to cryptographic algorithms designed to be entirely secure against an attack by a quantum computer. Standard encryption ...
AI Explainability Mandate
An AI Explainability Mandate is a formal regulatory or corporate policy requiring that any decision made, influenced, or routed by an Artificial Intelligence sy...
Venture Capital Funding Stages
Venture capital funding follows a structured progression of stages, each corresponding to a company's maturity, risk level, and capital needs. Pre-Seed ($50K-5...
Cap Table (Capitalization Table)
A capitalization table is a spreadsheet or database that shows the ownership structure of a company: who owns what percentage, how many shares, what type (commo...
Total Addressable Market (TAM)
Total Addressable Market is the total revenue opportunity available for a product or service if it achieved 100% market share. TAM is used by investors and stra...
Series A / B / C Funding
Series A, B, and C are sequential rounds of venture capital financing that fund a startup's growth: **Pre-Seed / Seed ($500K-$5M):** Product development, initi...
Cap Table
A capitalization table (cap table) is a spreadsheet or database that records who owns what percentage of a company — all equity shares, stock options, warrants,...
Dilution
Dilution is the reduction in existing shareholders' ownership percentage when a company issues new shares — typically during fundraising, employee option grants...
Venture Capital Due Diligence
Venture capital due diligence is the investigation process investors conduct before committing capital. It covers technology, team, market, financials, legal, a...
Pitch Deck
A pitch deck is a presentation (typically 10-15 slides) used by startups to communicate their business opportunity to potential investors. The standard structur...
Down Round
A down round occurs when a private company raises capital from investors at a lower pre-money valuation than the valuation established in its previous financing...
DPI (Distributions to Paid-In Capital)
DPI (Distributions to Paid-In Capital) is a core private equity and venture capital metric that measures the ratio of actual, realized cash returned to Limited ...
Design System
A design system is a collection of reusable components, patterns, guidelines, and assets that enable consistent product design and development at scale. It serv...
Accessibility (a11y)
Accessibility (a11y) is the practice of designing and developing software that can be used by people with disabilities, including visual, auditory, motor, and c...
User Research
User research is the systematic study of target users to understand their behaviors, needs, motivations, and pain points. It informs product decisions with evid...
Information Architecture (IA)
Information Architecture is the structural design of information spaces — how content and functionality are organized, labeled, and navigated within a digital p...
Conversion Rate Optimization (CRO)
Conversion Rate Optimization is the systematic process of increasing the percentage of users who take a desired action — signing up, subscribing, purchasing, or...
Design System
A design system is a collection of reusable UI components, design tokens, guidelines, and documentation that enables teams to build consistent user interfaces a...
Design Tokens
Design tokens are the smallest atomic units of a design system — named values for colors, spacing, typography, shadows, and other visual properties stored as pl...
Accessibility (A11y)
Accessibility (often abbreviated A11y — "a" + 11 letters + "y") is the practice of designing and building digital products that can be used by people with disab...
Design Sprint
A Design Sprint is a five-day process for rapidly solving design problems through prototyping and user testing. Developed at Google Ventures by Jake Knapp, it c...
User Research
User research is the systematic investigation of users' needs, behaviors, and motivations through observation, task analysis, interviews, and experiments. It pr...
Sprint Planning
Sprint planning is the Scrum ceremony where the team decides what work to commit to for the upcoming sprint (typically 2 weeks). The team selects items from the...
Kanban
Kanban is a workflow management method that visualizes work, limits work in progress (WIP), and optimizes flow. Originating from Toyota's manufacturing system, ...
Sprint Retrospective
A sprint retrospective is a team ceremony held at the end of each sprint to reflect on what went well, what didn't, and what to improve. It's the primary mechan...
Technical Program Management (TPM)
Technical Program Management is the discipline of coordinating complex, cross-team technical initiatives from planning through delivery. TPMs combine project ma...
Story Points
Story points are a unit of estimation used in agile development to measure the relative effort, complexity, and uncertainty of a user story. They use a modified...
Sprint Retrospective
A sprint retrospective is a meeting held at the end of each sprint where the team reflects on what went well, what didn't, and what to improve. It's the core co...
Kanban
Kanban is a workflow management method that visualizes work, limits work-in-progress (WIP), and optimizes flow. Unlike Scrum's fixed sprints, Kanban uses contin...
Story Points
Story points are a relative estimation unit used in agile development to measure the effort, complexity, and uncertainty of user stories. They use the Fibonacci...
AI-Assisted Development
AI-Assisted Development encompasses the integration of advanced Large Language Models, coding agents, and generative copilots directly into the software develop...
R&D Capitalization (ASC 350-40)
R&D capitalization is the accounting practice of recording certain software development costs as assets on the balance sheet rather than expenses on the income ...
Engineering Cost Allocation
Engineering cost allocation is the process of categorizing engineering spend into functional buckets: new feature development (innovation), maintenance and supp...
Internal Developer Platform (IDP)
An Internal Developer Platform (IDP) is a self-service layer that abstracts away infrastructure complexity and enables developers to deploy, manage, and monitor...
Service Mesh
A service mesh is a dedicated infrastructure layer for managing service-to-service communication in microservices architectures. It handles traffic routing, loa...
Feature Flags
Feature flags (also called feature toggles) are a software development technique that decouples deployment from release. Code changes are deployed to production...
API Gateway
An API gateway is a server that acts as the single entry point for all API requests to a system of microservices. It handles request routing, authentication/aut...
Chaos Engineering
Chaos engineering is the discipline of experimenting on a distributed system to build confidence in the system's ability to withstand turbulent conditions in pr...
Golden Paths
Golden paths (also called paved roads) are opinionated, pre-configured workflows that represent the recommended way to accomplish common development tasks withi...
Trunk-Based Development
Trunk-based development (TBD) is a source-control branching model where all developers commit to a single branch ("trunk" or "main") at least once per day. Long...
Canary Deployment
A canary deployment is a release strategy that rolls out changes to a small subset of users (the "canary group") before deploying to the full user base. If the ...
Platform Team
A platform team is an internal team that builds and maintains developer tooling, infrastructure, and self-service capabilities. Unlike traditional DevOps or inf...
Backstage (Spotify)
Backstage is an open-source developer portal framework created by Spotify. It provides a centralized hub where developers can discover services, APIs, documenta...
Developer Experience (DevEx)
Developer Experience (DevEx or DX) is the overall experience that developers have when working with a tool, API, platform, or organization. It encompasses every...
Rate Limiting
Rate limiting is a technique for controlling the number of requests a client can make to an API or service within a given time window. It protects services from...
Platform Engineering
Platform Engineering is the discipline of building and maintaining internal developer platforms (IDPs) that abstract away infrastructure complexity and provide ...
Feature Flag
A feature flag (also called feature toggle) is a software development technique that allows teams to enable or disable features in production without deploying ...
Trunk-Based Development
Trunk-based development (TBD) is a source control branching model where developers integrate their changes into a single shared branch ("trunk" or "main") at le...
Canary Deployment
A canary deployment is a release strategy where a new version of software is rolled out to a small subset of users or servers first — the "canary" — before bein...
Platform Team
A platform team is an internal engineering team that builds and maintains shared infrastructure, tools, and services that other product teams use. They treat in...
SEO (Search Engine Optimization)
Search Engine Optimization (SEO) is the practice of optimizing web content, structure, and technical implementation to increase organic visibility in search eng...
GEO (Generative Engine Optimization)
Generative Engine Optimization (GEO) is the practice of structuring content so that AI language models — ChatGPT, Claude, Perplexity, Google AI Overviews — cite...
Content Marketing
Content marketing is a strategic approach to creating and distributing valuable, relevant content to attract and engage a target audience. For technology leader...
Topical Authority
Topical authority is a search engine ranking factor that measures how comprehensively a website covers a specific subject area. Websites with deep, interconnect...
Viral Coefficient (K-Factor)
The viral coefficient (K-factor) measures how many new users each existing user generates through referrals, sharing, or network effects. A K-factor > 1 means v...
Network Effects
Network effects occur when a product becomes more valuable as more people use it. This creates a self-reinforcing growth loop: more users → more value → more us...
Customer Acquisition Channels
Customer acquisition channels are the pathways through which businesses attract new customers. Each channel has different cost structures (CAC), conversion rate...
PLG Flywheel
The PLG (Product-Led Growth) Flywheel is the self-reinforcing growth loop where the product itself drives user acquisition, activation, retention, and expansion...
Landing Page Optimization
Landing page optimization (LPO) is the process of improving landing page elements to increase conversion rates — the percentage of visitors who take a desired a...
Email Marketing & Automation
Email marketing automation uses software to send targeted, personalized email sequences triggered by user behavior — sign-ups, tool usage, content downloads. It...
Conversion Rate Optimization (CRO)
Conversion Rate Optimization (CRO) is the systematic process of increasing the percentage of users who take a desired action on a website or application. CRO us...
Referral Programs
A referral program is a structured system that incentivizes existing users to recommend the product to their network. Well-designed referral programs are the lo...
Product-Led Growth
Product-Led Growth (PLG) is a go-to-market strategy where the product itself is the primary driver of customer acquisition, expansion, and retention. Users disc...
Revenue Operations
Revenue Operations (RevOps) is the alignment of marketing, sales, and customer success operations to drive full-funnel revenue growth. It breaks down silos betw...
Generative Engine Optimization (GEO)
Generative Engine Optimization (GEO) is the practice of structuring digital content to maximize visibility and citation within AI-generated responses from syste...
Product-Led Growth (PLG)
Product-Led Growth (PLG) is a go-to-market strategy where the product itself is the primary driver of customer acquisition, conversion, and expansion. Users dis...
Product-Led Growth (PLG)
Product-Led Growth (PLG) is a go-to-market strategy where the product itself is the primary driver of customer acquisition, conversion, and expansion. Users can...
Psychological Safety
Psychological safety is a team climate where individuals feel safe to take interpersonal risks — asking questions, admitting mistakes, proposing ideas, and chal...
IC vs. Management Track
The IC (Individual Contributor) vs. Management career track is a dual-ladder career system that allows senior engineers to advance their career without becoming...
One-on-Ones (1:1s)
One-on-ones are recurring private meetings between a manager and their direct report. They are the most important management ritual in engineering organizations...
Skip-Level Meetings
Skip-level meetings are recurring meetings between a senior leader and the people who report to their direct reports. They bypass one level of the reporting cha...
Performance Improvement Plan (PIP)
A Performance Improvement Plan (PIP) is a formal document that outlines specific performance deficiencies, clear improvement expectations, measurable success cr...
Employer Branding
Employer branding is the practice of shaping how potential candidates perceive your organization as a place to work. In engineering, strong employer branding re...
Remote-First Engineering
Remote-first engineering is an organizational model where remote work is the default, not an accommodation. All processes, tools, communication, and culture are...
Engineering Burnout
Engineering burnout is a state of chronic work stress characterized by emotional exhaustion, depersonalization (cynicism about work), and reduced personal accom...
Diversity & Inclusion in Engineering
Diversity and inclusion (D&I) in engineering encompasses systemic practices for building teams that reflect diverse backgrounds, perspectives, and experiences —...
Engineering Onboarding
Engineering onboarding is the structured process of integrating new engineers into an organization and accelerating their time to first meaningful contribution....
Career Levels in Engineering
Engineering career levels (also called career ladders or leveling frameworks) define the progression path for software engineers from junior through staff, prin...
Hiring Bar Calibration
Hiring bar calibration is the process of aligning interviewers on what constitutes a "pass" or "fail" for engineering candidates. Without calibration, hiring de...
One-on-One Meetings
One-on-one (1:1) meetings are regular, private conversations between a manager and their direct report. They are the single most important management practice f...
Staff Engineer
A Staff Engineer (also Staff+ Engineer) is a senior individual contributor role that operates at the intersection of technical depth and organizational influenc...
Technical Interview
A technical interview is an assessment of a candidate's engineering abilities, typically involving coding challenges, system design questions, and behavioral ev...
Cost per Hire
Cost per Hire (CPH) is the total cost to recruit and onboard a new employee, including advertising, recruiter fees, interview time, background checks, and onboa...
Technical Due Diligence Process
Technical due diligence is a systematic evaluation of a target company's technology assets, architecture, team, processes, and technical risks — conducted durin...
Code Audit
A code audit is a comprehensive review of a codebase to assess quality, security, maintainability, and hidden risks. In M&A contexts, code audits reveal technic...
Integration Risk (M&A)
Integration risk is the probability and impact of technical challenges that arise when merging two companies' technology platforms, teams, and processes after a...
Platform Consolidation
Platform consolidation is the process of merging multiple technology platforms — typically after an acquisition or during a portfolio company's growth — into a ...
Earn-Out (M&A)
An earn-out is a contractual provision in M&A that makes a portion of the purchase price contingent on the acquired company achieving specified performance targ...
Key-Person Dependency
Key-person dependency (also: bus factor = 1) exists when critical knowledge, skills, or relationships are concentrated in a single individual. If that person le...
Open-Source License Risk
Open-source license risk refers to legal and financial exposure from using open-source software in ways that violate license terms. In M&A due diligence, OSS li...
SBOM (Software Bill of Materials)
A Software Bill of Materials (SBOM) is a comprehensive inventory of all software components, libraries, dependencies, and their versions used in a software prod...
Technology Valuation
Technology valuation is the process of assigning economic value to a company's technology assets — code, architecture, data, AI models, and engineering team cap...
Acqui-Hire
An acqui-hire is an acquisition made primarily to recruit the target company's engineering team rather than to acquire the product, technology, or customers. Th...
Technical Due Diligence
Technical Due Diligence (Tech DD) is the systematic evaluation of a company's technology, engineering practices, architecture, and technical debt prior to inves...
REST API
REST (Representational State Transfer) is an architectural style for designing networked applications. RESTful APIs use HTTP methods (GET, POST, PUT, DELETE) to...
GraphQL
GraphQL is a query language and runtime for APIs, developed by Facebook (2012, open-sourced 2015). Unlike REST, where the server defines the response structure,...
Webhooks
Webhooks are HTTP callbacks — automated messages sent from one application to another when a specific event occurs. Instead of polling (repeatedly asking "did a...
API Versioning
API versioning is the practice of maintaining multiple versions of an API simultaneously to support existing clients while evolving the API for new capabilities...
Idempotency
An operation is idempotent if performing it multiple times produces the same result as performing it once. In distributed systems, idempotency is critical for h...
Event-Driven Architecture
Event-driven architecture (EDA) is a design pattern where system components communicate by producing and consuming events — asynchronous notifications that some...
SDK (Software Development Kit)
An SDK (Software Development Kit) is a packaged set of tools, libraries, documentation, and code samples that enables developers to build applications for a spe...
OAuth 2.0
OAuth 2.0 is an authorization framework that enables third-party applications to access user resources without exposing credentials. It's the industry standard ...
API Design Principles
API design principles are guidelines for creating APIs that are intuitive, consistent, and developer-friendly. Good API design reduces integration time, lowers ...
Microservices Communication Patterns
Microservices communication patterns define how distributed services exchange data and coordinate work. Choosing the right pattern for each interaction is criti...
API Design
API design is the practice of defining the interface through which software components communicate. Good API design creates clear, consistent, well-documented c...
GraphQL
GraphQL is a query language for APIs developed by Meta (Facebook) that allows clients to request exactly the data they need — no more, no less. Unlike REST APIs...
API Gateway
An API gateway is a server that acts as the single entry point for all API requests in a microservices architecture. It handles routing, authentication, rate li...
Test Pyramid
The test pyramid is a testing strategy that prescribes many fast, cheap unit tests at the base, fewer integration tests in the middle, and a small number of slo...
Unit Testing
Unit testing is the practice of testing individual functions, methods, or classes in isolation from the rest of the system. Unit tests are the foundation of the...
Integration Testing
Integration testing verifies that multiple components work correctly together — testing the interfaces and interactions between modules, services, databases, an...
End-to-End (E2E) Testing
End-to-end testing verifies complete user flows through the entire application — from UI interaction to backend processing to database persistence and back. E2E...
Shift-Left Testing
Shift-left testing is the practice of moving testing activities earlier in the software development lifecycle — from post-development QA to during and before de...
Test-Driven Development (TDD)
Test-Driven Development (TDD) is a development methodology where you write a failing test before writing the code to make it pass. The cycle is Red → Green → Re...
Contract Testing
Contract testing verifies that the interactions between service providers and consumers conform to a shared contract (API specification). Instead of testing the...
Regression Testing
Regression testing verifies that previously working functionality still works after code changes. It catches "regressions" — bugs introduced by new code that br...
Visual Regression Testing
Visual regression testing captures screenshots of UI components or pages and compares them pixel-by-pixel against baseline images to detect unintended visual ch...
Load Testing & Performance Testing
Load testing measures how a system performs under expected and peak traffic conditions. It identifies performance bottlenecks, memory leaks, and scalability lim...
Execution Layer
The Execution Layer is the deterministic boundary within a software application that translates probabilistic AI intent into safe, verifiable, and predictable s...
Domain-Driven Design (DDD)
Domain-Driven Design is a software design approach that centers the architecture around the business domain, using a shared language (ubiquitous language) betwe...
Event Sourcing
Event sourcing stores every state change as an immutable event, building current state by replaying the event history. Instead of storing "the account balance i...
CQRS (Command Query Responsibility Segregation)
CQRS separates the read model (queries) from the write model (commands) into distinct data stores optimized for each purpose. Writes go to a normalized, consist...
Saga Pattern
The saga pattern manages distributed transactions across multiple microservices using a sequence of local transactions, each with a compensating action for roll...
Strangler Fig Pattern
The strangler fig pattern gradually replaces a legacy system by incrementally building new functionality around the old system, routing traffic from legacy to n...
Hexagonal Architecture (Ports & Adapters)
Hexagonal architecture (also called Ports and Adapters) structures applications so that the core business logic is isolated from external concerns (databases, A...
Twelve-Factor App
The Twelve-Factor App methodology (by Adam Wiggins/Heroku) defines 12 principles for building scalable, maintainable cloud-native applications: 1. Codebase (on...
Modular Monolith
A modular monolith is a single deployable application that is internally structured as well-defined, loosely coupled modules with clear boundaries. It combines ...
Microservices
Microservices architecture structures an application as a collection of small, independent services that communicate over APIs. Each service is owned by a singl...
Monolith Architecture
A monolith is a software application built as a single, unified codebase where all components share the same process, database, and deployment pipeline. Monolit...
Event-Driven Architecture
Event-driven architecture (EDA) is a software design pattern where services communicate by producing and consuming events — asynchronous messages that represent...
CQRS
CQRS (Command Query Responsibility Segregation) is an architecture pattern that separates read operations (queries) from write operations (commands) into differ...
Strangler Fig Pattern
The Strangler Fig pattern is a migration strategy for incrementally replacing a legacy system with a modern one — without a risky "big bang" rewrite. Named afte...
Usage-Based Pricing
Usage-based pricing (UBP) charges customers based on how much they use the product — API calls, compute hours, data processed, active users, or messages sent. I...
Seat-Based Pricing
Seat-based pricing charges per user who accesses the product. It's the most common SaaS pricing model — simple to understand, predictable for both vendor and cu...
Reverse Trial
A reverse trial starts users on the full premium product (not freemium), then downgrades to free tier after the trial period. Unlike traditional trials (upgrade...
Freemium Model
Freemium offers a permanently free product tier alongside paid premium tiers. The free tier serves as a massive top-of-funnel acquisition channel, while paid ti...
Land & Expand
Land and expand is a sales strategy that starts with a small initial deal (the "land") and grows revenue within the account over time through upsells, cross-sel...
Value-Based Pricing
Value-based pricing sets the price based on the value the product delivers to the customer, not on the cost to produce it or competitive pricing. If your produc...
Pricing Psychology
Pricing psychology leverages cognitive biases and behavioral economics to influence purchasing decisions. Pricing is not a math problem — it's a psychology prob...
Monetization Model
A monetization model defines how a product or service generates revenue. For technology businesses, common models include: **SaaS Subscription**: Recurring fee...
Usage-Based Pricing
Usage-based pricing (UBP) is a monetization model where customers pay based on how much they use the product — API calls, data volume, compute hours, active use...
Freemium Model
Freemium is a pricing strategy where a basic product is offered for free, with premium features or capabilities available for a paid upgrade. The free tier serv...
PCI DSS
PCI DSS (Payment Card Industry Data Security Standard) is a set of security requirements for organizations that handle credit card data. Compliance is mandatory...
HIPAA
HIPAA (Health Insurance Portability and Accountability Act) is US legislation that protects the privacy and security of health information. Any organization tha...
EU AI Act
The EU AI Act is the world's first comprehensive legal framework for artificial intelligence, adopted in 2024 with enforcement beginning in 2025-2026. It classi...
Data Residency
Data residency requirements mandate that data about a country's citizens must be stored and/or processed within that country's borders. These requirements are d...
Model Cards (AI Transparency)
Model cards are structured documentation for machine learning models that provide transparency about a model's purpose, performance, limitations, and ethical co...
Section 230
Section 230 of the Communications Decency Act (1996) provides legal immunity to online platforms for content posted by users. The key provision: "No provider or...
GDPR
The General Data Protection Regulation (GDPR) is the European Union's comprehensive data privacy law enacted in 2018. It governs how organizations collect, stor...
SOC 2
SOC 2 (Service Organization Control Type 2) is an auditing standard developed by the AICPA that evaluates an organization's controls related to security, availa...
EU AI Act
The EU AI Act is the world's first comprehensive legal framework for artificial intelligence, enacted by the European Union. It classifies AI systems by risk le...
NIST AI Risk Management Framework
The NIST AI Risk Management Framework (AI RMF) is a voluntary framework published by the National Institute of Standards and Technology to help organizations ma...
Open-Source Licensing
Open-source licenses define the terms under which software can be used, modified, and distributed. Choosing the right license is a critical business decision th...
Copyleft
Copyleft is a licensing concept that requires derivative works to be distributed under the same license as the original work. It ensures that software remains f...
Permissive License
A permissive license allows virtually unrestricted use of software — including commercial use, modification, and distribution — with minimal requirements (typic...
Open-Core Business Model
Open-core is a business model where the core product is open-source (usually AGPL or similar copyleft) and premium features are available only in a proprietary ...
Maintainer Burnout (OSS)
Maintainer burnout is the chronic stress and exhaustion experienced by open-source maintainers who maintain widely-used projects, often without compensation. Sy...
Fork (Open Source)
A fork is a copy of an open-source repository that diverges from the original to follow a different development direction. Forks can be: Collaborative (contribu...
Truth Ledger
A truth ledger is a versioned, timestamped, source-attributed record of facts that AI systems rely upon. Unlike traditional databases where data can be silently...
Constraint Engine
A constraint engine is a system that enforces lockable rules that no AI model can violate. Policy becomes executable law. Unlike guardrails (which suggest behav...
Conflict Detection (AI)
Conflict detection in AI systems identifies when new information contradicts existing verified facts. Instead of silently merging conflicting data (which causes...
Provenance Registry
A provenance registry tracks the origin, lineage, and chain of custody for every piece of information in an AI system. Every fact is source-bound — you always k...
Temporal Tracking (AI)
Temporal tracking gives facts explicit time boundaries in AI systems. Information has a valid-from date, a valid-until date, and expired context is explicitly m...
AI Audit System
An AI audit system maintains an immutable, hash-chained event log where every mutation to the AI's knowledge, every decision, and every action is attributable a...
PII Air Gap
A PII air gap is a security architecture that automatically scrubs personally identifiable information (SSNs, emails, phone numbers, credentials) before it reac...
Multi-LLM Consistency
Multi-LLM consistency ensures that a single source of truth is shared across every AI model an organization uses — ChatGPT, Claude, Gemini, open-source models, ...
Action Admissibility
Action admissibility is the process of determining whether a proposed AI agent action should be permitted based on truth, constraints, scope, provenance, and te...
Execution Control Plane
An execution control plane is an infrastructure layer that sits between AI models and the actions they take, governing what AI agents are allowed to do. It's th...
Deterministic Governance
Deterministic governance applies provably correct rules to AI behavior, as opposed to probabilistic governance (which relies on model training and alignment to ...
Cryptographic Execution Gating
Cryptographic execution gating uses cryptographic proofs (hash chains, digital signatures, zero-knowledge proofs) to ensure that AI actions are authorized, tamp...
Agent Memory Architecture
Agent memory architecture defines how AI agents store, retrieve, and manage information across conversations, sessions, and tasks. Unlike human memory, AI agent...
AI Liability Gradient
The AI liability gradient is a framework by Richard Ewing that maps how organizational liability increases non-linearly as AI agent autonomy increases. At low a...
AI Bias & Fairness
AI bias refers to systematic errors in AI system outputs that create unfair outcomes for certain groups. Bias can enter AI systems through training data (histor...
AI Guardrails
AI guardrails are technical and procedural controls that constrain AI system behavior within acceptable boundaries. They prevent AI from generating harmful, ina...
Truth Ledger
The Truth Ledger is Exogram's core innovation — a versioned, timestamped, source-attributed knowledge store that serves as the single source of truth for AI age...
Constraint Engine
The Constraint Engine is Exogram's policy enforcement layer — lockable rules that no AI model can violate, regardless of prompt or context. Unlike prompt-level ...
Action Admissibility
Action Admissibility is Exogram's core filtering concept. When an autonomous AI agent proposes an action, Action Admissibility determines whether that action is...
Execution Control Plane
The Execution Control Plane is Exogram's product category — described as "IAM for autonomous AI agents." Just as IAM (Identity and Access Management) governs wh...
AI Liability Gradient
The AI Liability Gradient is a framework coined by Richard Ewing that maps the relationship between AI agent autonomy and organizational liability. As AI system...
Provenance Registry
The Provenance Registry is Exogram's source attribution system — every fact stored in the Truth Ledger is permanently linked to its original source. You always ...
PII Air Gap
The PII Air Gap is Exogram's data protection mechanism that automatically detects and scrubs personally identifiable information (PII) before it enters persiste...
Multi-LLM Consistency
Multi-LLM Consistency is Exogram's capability to maintain a single, verified truth layer across multiple AI model providers — ChatGPT, Claude, Gemini, Llama, an...
Agentic Governance
Agentic Governance is the management and oversight framework required for autonomous AI agents operating in production environments. It encompasses policies, co...
Shadow AI
Shadow AI refers to the use of artificial intelligence tools, models, and systems by employees or teams without the knowledge, approval, or governance of IT, se...
AI Agent Identity & Access Management
AI Agent IAM (Identity and Access Management) is the practice of applying IAM principles — authentication, authorization, permissions, and audit logging — to au...
AI Red-Teaming
AI Red-Teaming is the practice of systematically testing AI systems for vulnerabilities, biases, harmful outputs, and failure modes by simulating adversarial at...
Prompt Injection
Prompt Injection is a security vulnerability where malicious input causes an AI model to ignore its system instructions, reveal internal prompts, or perform uni...
Master The Architecture
Our diagnostic tools put these definitions into direct, mathematically precise execution—evaluate your enterprise today.