Tech notes

Acronyms

Acronyms and abbreviations that I always forget

ACME

Automatic Certificate Management Environment is a Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. https://datatracker.ietf.org/doc/html/rfc8555

DDD

Domain-driven design is an approach to developing software for complex needs by deeply connecting the implementation to an evolving model of the core business concepts.

DSN

Data source name is a string that has an associated data structure used to describe a connection to a data source.

https://en.wikipedia.org/wiki/Data_source_name

FQDN

A Fully Qualified Domain Name, sometimes also referred to as an absolute domain name, is a domain name that specifies its exact location in the tree hierarchy of the Domain Name System (DNS). It specifies all domain levels, including the top-level domain and the root zone.

https://en.wikipedia.org/wiki/Fully_qualified_domain_name

GDPR

The European Union (EU) General Data Protection Regulation. It regulates the processing by an individual, a company or an organisation of personal data relating to individuals in the EU.

NAT

Network address translation is a method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device. The technique was originally used as a shortcut to avoid the need to readdress every host when a network was moved. It has become a popular and essential tool in conserving global address space in the face of IPv4 address exhaustion. One Internet-routable IP address of a NAT gateway can be used for an entire private network.

https://en.wikipedia.org/wiki/Network_address_translation

RTT

Round-trip time. In telecommunications, round-trip delay (RTD) or round-trip time (RTT) is the amount of time it takes for a signal to be sent plus the amount of time it takes for acknowledgement of that signal having been received. This time delay includes propagation times for the paths between the two communication endpoints. In the context of computer networks, the signal is typically a data packet. RTT is also known as ping time, and can be determined with the ping command.

https://en.wikipedia.org/wiki/Round-trip_delay

SOA

Service-oriented architecture is a style of software design where services are provided to the other components by application components, through a communication protocol over a network.The basic principles of service-oriented architecture are independent of vendors, products and technologies.

https://en.wikipedia.org/wiki/Service-oriented_architecture

A Start of Authority record is a type of resource record in the Domain Name System (DNS) containing administrative information about the zone, especially regarding zone transfers. The SOA record format is specified in RFC 1035.

https://en.wikipedia.org/wiki/SOA_record

SOLID

  • S for The Single-responsibility principle: “There should never be more than one reason for a class to change.” In other words, every class should have only one responsibility.
  • O for The Open–closed principle: “Software entities should be open for extension, but closed for modification.”
  • L for The Liskov substitution principle: “Functions that use pointers or references to base classes must be able to use objects of derived classes without knowing it.”
  • I for The Interface segregation principle: “Many client-specific interfaces are better than one general-purpose interface.”
  • D for The Dependency inversion principle: “Depend upon abstractions, not concretions.”

https://en.wikipedia.org/wiki/SOLID

TLS

Transport Layer Security (TLS), the successor of the now-deprecated Secure Sockets Layer (SSL), is a cryptographic protocol designed to provide communications security over a computer network.

The TLS protocol aims primarily to provide cryptography, including privacy (confidentiality), integrity, and authenticity through the use of certificates, between two or more communicating computer applications. It runs in the application layer and is itself composed of two layers: the TLS record and the TLS handshake protocols.