<?xml version="1.0" encoding="utf-8" standalone="yes"?><feed xmlns="http://www.w3.org/2005/Atom"><title>Tech on Sinetris's viewpoints</title><id>https://sinetris.info/glossary-contexts/tech/</id><link href="https://sinetris.info/glossary-contexts/tech/index.atom.xml" rel="self" type="application/atom+xml" hreflang="en" title="Tech on Sinetris's viewpoints"/><link href="https://sinetris.info/glossary-contexts/tech/" rel="alternate" type="text/html" hreflang="en" title="Tech on Sinetris's viewpoints"/><link href="https://sinetris.info/glossary-contexts/tech/index.atom.xml" rel="alternate" type="application/atom+xml" hreflang="en" title="Tech on Sinetris's viewpoints"/><link href="https://sinetris.info/glossary-contexts/tech/index.rss.xml" rel="alternate" type="application/rss+xml" hreflang="en" title="Tech on Sinetris's viewpoints"/><subtitle>Recent content in Tech on Sinetris's viewpoints</subtitle><generator uri="https://github.com/sinetris/sine-die/">Sine Die theme for Hugo</generator><author><name>Duilio Ruggiero</name><email>duilio@sinetris.info</email></author><rights type="html">&amp;copy; 2023 - 2026, Duilio Ruggiero</rights><updated>2025-11-24T07:28:53Z</updated><entry><title>Subject Matter Expert</title><link href="https://sinetris.info/glossary/subject-matter-expert/" rel="alternate" type="text/html" hreflang="en" title="Tech on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/subject-matter-expert/" type="text/html"/><published>2025-11-24T07:28:53+00:00</published><updated>2025-11-24T07:28:53Z</updated><id>https://sinetris.info/glossary/subject-matter-expert/#atom</id><summary type="html">A professional with in-depth, specialized knowledge in a particular field, process,
or technology who acts as a trusted advisor, guiding teams, validating information,
and solving complex problems to ensure accuracy, efficiency, and successful project
outcomes.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Single Source of Truth</title><link href="https://sinetris.info/glossary/single-source-of-truth/" rel="alternate" type="text/html" hreflang="en" title="Tech on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/single-source-of-truth/" type="text/html"/><published>2025-11-20T09:01:34+00:00</published><updated>2025-11-20T09:01:34Z</updated><id>https://sinetris.info/glossary/single-source-of-truth/#atom</id><summary type="html">Practice of centralizing all of an organization&amp;rsquo;s data related to a given subject
in a single, reliable location, ensuring that every person and every system operates
with the same up-to-date information.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/gitops" label="context: GitOps"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Drift</title><link href="https://sinetris.info/glossary/drift/" rel="alternate" type="text/html" hreflang="en" title="Tech on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/drift/" type="text/html"/><published>2025-11-10T13:50:07+00:00</published><updated>2025-11-10T13:50:07Z</updated><id>https://sinetris.info/glossary/drift/#atom</id><summary type="html">&lt;p&gt;Drift is the difference between the &lt;a class="glossary-term" href="/glossary/desired-state/"&gt;Desired State&lt;/a&gt; of
a system and its &lt;a class="glossary-term" href="/glossary/actual-state/"&gt;Actual State&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Detecting and resolving this drift is essential to prevent security vulnerabilities,
compliance violations, and operational failures.&lt;/p&gt;</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/gitops" label="context: GitOps"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Actual State</title><link href="https://sinetris.info/glossary/actual-state/" rel="alternate" type="text/html" hreflang="en" title="Tech on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/actual-state/" type="text/html"/><published>2025-11-10T13:47:54+00:00</published><updated>2025-11-10T13:47:54Z</updated><id>https://sinetris.info/glossary/actual-state/#atom</id><summary type="html">Current and factual condition of a system or its data as opposed to the
&lt;a class="glossary-term" href="/glossary/desired-state/"&gt;Desired State&lt;/a&gt;.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/gitops" label="context: GitOps"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Desired State</title><link href="https://sinetris.info/glossary/desired-state/" rel="alternate" type="text/html" hreflang="en" title="Tech on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/desired-state/" type="text/html"/><published>2025-11-10T13:47:45+00:00</published><updated>2025-11-10T13:47:45Z</updated><id>https://sinetris.info/glossary/desired-state/#atom</id><summary type="html">The planned state of a system, usually defined as data or code in a
&lt;a class="glossary-term" href="/glossary/single-source-of-truth/"&gt;&lt;abbr title="Single Source of Truth"&gt;SSOT&lt;/abbr&gt;&lt;/a&gt;.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/gitops" label="context: GitOps"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Non-Human Identity</title><link href="https://sinetris.info/glossary/non-human-identity/" rel="alternate" type="text/html" hreflang="en" title="Tech on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/non-human-identity/" type="text/html"/><published>2025-07-26T10:27:48+00:00</published><updated>2025-07-26T10:27:48Z</updated><id>https://sinetris.info/glossary/non-human-identity/#atom</id><summary type="html">Identity belonging to a machine, service account, containerized workload, or autonomous agent.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Identity and Access Management</title><link href="https://sinetris.info/glossary/identity-and-access-management/" rel="alternate" type="text/html" hreflang="en" title="Tech on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/identity-and-access-management/" type="text/html"/><published>2025-07-16T15:07:33+00:00</published><updated>2025-07-16T15:07:33Z</updated><id>https://sinetris.info/glossary/identity-and-access-management/#atom</id><summary type="html">Identity and access management is a framework of policies, technologies, and
business processes aimed at facilitating the management of digital identities
and their access.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/tech" label="context: Tech"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/></entry><entry><title>SSL-Bridging</title><link href="https://sinetris.info/glossary/ssl-bridging/" rel="alternate" type="text/html" hreflang="en" title="Tech on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/ssl-bridging/" type="text/html"/><published>2025-07-02T07:50:28+00:00</published><updated>2025-07-02T07:50:28Z</updated><id>https://sinetris.info/glossary/ssl-bridging/#atom</id><summary type="html">The load balancer decrypts the incoming encrypted traffic (same as in
SSL-Termination) and re-encrypts it when sending to the destination (e.g.
backend instances).</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/tech" label="context: Tech"/><category term="/contexts/networking" label="context: Networking"/></entry><entry><title>SSL-Passthrough</title><link href="https://sinetris.info/glossary/ssl-passthrough/" rel="alternate" type="text/html" hreflang="en" title="Tech on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/ssl-passthrough/" type="text/html"/><published>2025-07-02T07:50:28+00:00</published><updated>2025-07-02T07:50:28Z</updated><id>https://sinetris.info/glossary/ssl-passthrough/#atom</id><summary type="html">&lt;p&gt;The load balancer passes the encrypted traffic to the destination (e.g. backend
instances) without decrypting it.&lt;/p&gt;
&lt;p&gt;Because the load balancer only sees encrypted traffic, it is not possible to
perform layer 7 (OSI model) actions.&lt;/p&gt;</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/tech" label="context: Tech"/><category term="/contexts/networking" label="context: Networking"/></entry><entry><title>SSL-Termination</title><link href="https://sinetris.info/glossary/ssl-termination/" rel="alternate" type="text/html" hreflang="en" title="Tech on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/ssl-termination/" type="text/html"/><published>2025-07-02T07:50:28+00:00</published><updated>2025-07-02T07:50:28Z</updated><id>https://sinetris.info/glossary/ssl-termination/#atom</id><summary type="html">The load balancer decrypts the incoming encrypted traffic and sends it to the
destination (e.g. backend instances) unencrypted.</summary><category term="/types/glossary" label="type: glossary"/><category term="/categories/tech" label="category: Tech"/><category term="/categories/networking" label="category: Networking"/><category term="/contexts/tech" label="context: Tech"/><category term="/contexts/networking" label="context: Networking"/></entry><entry><title>Information and Communication Technology</title><link href="https://sinetris.info/glossary/information-and-communication-technology/" rel="alternate" type="text/html" hreflang="en" title="Tech on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/information-and-communication-technology/" type="text/html"/><published>2023-08-06T10:15:25+00:00</published><updated>2023-08-06T10:15:25Z</updated><id>https://sinetris.info/glossary/information-and-communication-technology/#atom</id><summary type="html">&lt;p&gt;An umbrella term that encompasses all technical means used to handle information
and facilitate communication through the use of computing devices (e.g., desktops,
laptops, servers, mainframes, smartphones, tablet, or any other CPU-equipped device),
network equipment (e.g., routers, switches, modems, cables), other peripherals (e.g.,
printers, scanners, external hard drives), and any related software.&lt;/p&gt;</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Out of the box</title><link href="https://sinetris.info/glossary/out-of-the-box/" rel="alternate" type="text/html" hreflang="en" title="Tech on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/out-of-the-box/" type="text/html"/><published>2023-08-06T10:15:25+00:00</published><updated>2023-08-06T10:15:25Z</updated><id>https://sinetris.info/glossary/out-of-the-box/#atom</id><summary type="html">Native or built-in feature or functionality of a product, included by default
and that works immediately after first setup.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Best Effort</title><link href="https://sinetris.info/glossary/best-effort/" rel="alternate" type="text/html" hreflang="en" title="Tech on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/best-effort/" type="text/html"/><published>2023-08-06T10:10:15+00:00</published><updated>2023-08-06T10:10:15Z</updated><id>https://sinetris.info/glossary/best-effort/#atom</id><summary type="html">Reasonable effort to satisfy a request but without guaranteeing success.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/tech" label="context: Tech"/><category term="/contexts/networking" label="context: Networking"/></entry><entry><title>Information Technology</title><link href="https://sinetris.info/glossary/information-technology/" rel="alternate" type="text/html" hreflang="en" title="Tech on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/information-technology/" type="text/html"/><published>2023-08-06T10:10:15+00:00</published><updated>2023-08-06T10:10:15Z</updated><id>https://sinetris.info/glossary/information-technology/#atom</id><summary type="html">&lt;p&gt;The study or use of hardware and software to manage, store, retrieve, and deliver
data.&lt;/p&gt;
&lt;p&gt;A subset of &lt;a class="glossary-term" href="/glossary/information-and-communication-technology/"&gt;&lt;abbr title="Single Source of Truth"&gt;ICT&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Real-Time Computing</title><link href="https://sinetris.info/glossary/real-time-computing/" rel="alternate" type="text/html" hreflang="en" title="Tech on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/real-time-computing/" type="text/html"/><published>2023-08-06T10:10:15+00:00</published><updated>2023-08-06T10:10:15Z</updated><id>https://sinetris.info/glossary/real-time-computing/#atom</id><summary type="html">&lt;h2 id="description"&gt;Description&lt;/h2&gt;
&lt;p&gt;Real-time computing, also known as reactive computing, is used to describe a computer system that guarantees the processing of inputs and the execution of tasks within specified time limits, often referred to as “deadlines”.&lt;/p&gt;
&lt;p&gt;We can divide real-time systems into three categories based on expectations:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href="/glossary/real-time-computing/"&gt;soft real-time&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="/glossary/real-time-computing/"&gt;firm real-time&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="/glossary/real-time-computing/"&gt;hard real-time&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="soft-real-time"&gt;soft real-time&lt;/h2&gt;
&lt;p&gt;The system continues to operate even if it’s unable to perform operations within the allotted time.&lt;/p&gt;
&lt;h2 id="firm-real-time"&gt;firm real-time&lt;/h2&gt;
&lt;p&gt;Deadlines are crucial, but occasional non-compliance is tolerable.&lt;/p&gt;</summary><category term="/types/glossary" label="type: glossary"/><category term="/categories/tech" label="category: Tech"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Real-Time Operating System</title><link href="https://sinetris.info/glossary/real-time-os/" rel="alternate" type="text/html" hreflang="en" title="Tech on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/real-time-os/" type="text/html"/><published>2023-08-06T10:10:15+00:00</published><updated>2023-08-06T10:10:15Z</updated><id>https://sinetris.info/glossary/real-time-os/#atom</id><category term="/types/glossary" label="type: glossary"/><category term="/categories/tech" label="category: Tech"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Recovery Point Objective</title><link href="https://sinetris.info/glossary/recovery-point-objective/" rel="alternate" type="text/html" hreflang="en" title="Tech on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/recovery-point-objective/" type="text/html"/><published>2023-08-06T10:10:15+00:00</published><updated>2023-08-06T10:10:15Z</updated><id>https://sinetris.info/glossary/recovery-point-objective/#atom</id><summary type="html">Targeted duration of time between the event of failure and the point where operations resume.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/tech" label="context: Tech"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Recovery Time Objective</title><link href="https://sinetris.info/glossary/recovery-time-objective/" rel="alternate" type="text/html" hreflang="en" title="Tech on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/recovery-time-objective/" type="text/html"/><published>2023-08-06T10:10:15+00:00</published><updated>2023-08-06T10:10:15Z</updated><id>https://sinetris.info/glossary/recovery-time-objective/#atom</id><summary type="html">Agreed maximum time, based on risk analysis, between the failure event and the restoration of operations.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/tech" label="context: Tech"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Software Bill of Materials</title><link href="https://sinetris.info/glossary/software-bill-of-materials/" rel="alternate" type="text/html" hreflang="en" title="Tech on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/software-bill-of-materials/" type="text/html"/><published>2023-08-06T10:10:15+00:00</published><updated>2023-08-06T10:10:15Z</updated><id>https://sinetris.info/glossary/software-bill-of-materials/#atom</id><summary type="html">&lt;p&gt;A Software Bill of Materials (SBOM) is a comprehensive inventory of all the components,
including dependencies and related installed tools, used in a software.&lt;/p&gt;</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/tech" label="context: Tech"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/grc" label="context: GRC"/></entry></feed>