IT Glossary - K - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Kryo Serialization

A method of converting objects into byte streams for storage or transmission over a network, commonly used in Java programming for efficient serialization of Java objects.

You will find this term commonly used in Programming, Data Storage

Kubernetes

An open-source platform for automating deployment, scaling, and operations of application containers across clusters of hosts, providing container-centric infrastructure.

You will find this term commonly used in Cloud Computing, DevOps

Kubernetes API

The application programming interface (API) provided by Kubernetes, allowing for the creation, modification, and management of Kubernetes resources programmatically.

You will find this term commonly used in Cloud Computing, DevOps

Kubernetes API Server

The component of the Kubernetes master that exposes the Kubernetes API, serving as the front-end for the Kubernetes control plane, handling and processing requests to manage Kubernetes resources.

You will find this term commonly used in Cloud Computing, DevOps

Kubernetes Autoscaling

The capability of Kubernetes to automatically adjust the number of running Pods based on the current demand and performance metrics, ensuring efficient resource use and maintaining application performance.

You will find this term commonly used in Cloud Computing, Performance Management

Kubernetes Cluster

A set of node machines for running containerized applications managed by Kubernetes, allowing for the deployment and management of applications at scale.

You will find this term commonly used in Cloud Computing, DevOps

Kubernetes ConfigMap

An API object in Kubernetes used to store non-confidential data in key-value pairs. Pods can consume ConfigMaps as environment variables, command-line arguments, or as configuration files in a volume.

You will find this term commonly used in Cloud Computing, Configuration Management

Kubernetes Custom Resource Definitions (CRDs)

Extensions of the Kubernetes API that allow users to create new resources without adding them to the Kubernetes core codebase, enabling the creation of custom objects to support advanced configurations.

You will find this term commonly used in Cloud Computing, Configuration Management

Kubernetes Deployment

A Kubernetes object that manages the deployment and scaling of a set of Pods, ensuring that a specified number of replicas of a pod are running at any given time.

You will find this term commonly used in Cloud Computing, DevOps

Kubernetes Horizontal Pod Autoscaler (HPA)

A feature in Kubernetes that automatically scales the number of Pods in a replication controller, deployment, or replica set based on observed CPU utilization or other select metrics.

You will find this term commonly used in Cloud Computing, DevOps

Kubernetes Ingress

An API object that manages external access to the services in a Kubernetes cluster, typically HTTP, allowing fine-grained control over the traffic routing and SSL/TLS termination.

You will find this term commonly used in Cloud Computing, Network Management

Kubernetes Master

The controlling unit in a Kubernetes cluster that makes global decisions about the cluster (such as scheduling), as well as detecting and responding to cluster events.

You will find this term commonly used in Cloud Computing, DevOps

Kubernetes Namespace

A way to divide cluster resources between multiple users via a mechanism known as namespacing, essentially segmenting the cluster for resource management and access control.

You will find this term commonly used in Cloud Computing, DevOps

Kubernetes Network Policies

A set of rules that dictate how pods can communicate with each other and with other network endpoints. Kubernetes Network Policies provide a way to implement network segmentation and isolation within a cluster.

You will find this term commonly used in Cloud Computing, Network Security

Kubernetes Node

A worker machine in Kubernetes, where containers are deployed. Each node contains the services necessary to run Pods and is managed by the master components.

You will find this term commonly used in Cloud Computing, DevOps

Kubernetes Operator

An application-specific controller for Kubernetes that extends its functionality to more easily manage complex stateful applications on behalf of a Kubernetes user.

You will find this term commonly used in Cloud Computing, DevOps

Kubernetes Persistent Volume

An object in Kubernetes that represents a piece of storage in the cluster, independent of the lifecycle of individual Pods, allowing data to persist across Pod restarts.

You will find this term commonly used in Cloud Computing, Data Management

Kubernetes Pod

The smallest deployable unit in Kubernetes, which can contain one or more containers that are scheduled on the same host and share the same network namespace, IP address, and storage.

You will find this term commonly used in Cloud Computing, DevOps

Kubernetes Pod Networking

The networking model and implementations used in Kubernetes to provide communication between Pods within the same cluster, as well as between Pods and external resources.

You will find this term commonly used in Cloud Computing, Networking

Kubernetes Secrets

Objects in Kubernetes that store sensitive data, such as passwords, OAuth tokens, and ssh keys, offering a more secure option for managing confidential information than putting it directly into the pod configuration.

You will find this term commonly used in Cloud Computing, Security

Kubernetes Service

An abstraction layer which defines a logical set of Pods and a policy by which to access them, often used to enable external network access to a set of services within a cluster.

You will find this term commonly used in Cloud Computing, DevOps

Kubernetes StatefulSet

A Kubernetes workload API object used for managing stateful applications. It manages the deployment and scaling of a set of Pods and provides guarantees about the ordering and uniqueness of these Pods.

You will find this term commonly used in Cloud Computing, DevOps

Kubernetes Volume

A directory, possibly with data in it, accessible to containers in a pod in a Kubernetes cluster, allowing data to persist beyond the lifetime of a single container.

You will find this term commonly used in Cloud Computing, Data Management

Kudos

A term often used in professional and technical communities to express praise or recognition for a job well done.

You will find this term commonly used in Workplace Culture, Social Networking

KVM (Kernel-based Virtual Machine)

An open-source virtualization technology built into Linux, allowing a user to turn Linux into a hypervisor that runs multiple, isolated virtual environments called virtual machines (VMs).

You will find this term commonly used in Virtualization, Cloud Computing

KVM (Keyboard, Video, Mouse)

A hardware device that allows a user to control multiple computers from a single keyboard, monitor, and mouse setup, often used in data centers and IT environments to manage servers.

You will find this term commonly used in Hardware, IT Infrastructure

KVM Switch

A hardware device that allows a user to control multiple computers from one or more sets of keyboards, video monitors, and mice.

You will find this term commonly used in Hardware, Network Infrastructure

Kyber

A post-quantum cryptographic algorithm designed to be secure against the potential future threat posed by quantum computers.

You will find this term commonly used in Security, Cryptography

What's Your
Career Path?
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Hrs 43 Min
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Hrs 29 Min
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart