<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Glossary on Sinetris's viewpoints</title><link>https://sinetris.info/glossary/</link><description>Recent content in Glossary on Sinetris's viewpoints</description><generator>Sine Die theme for Hugo</generator><language>en</language><webMaster>duilio@sinetris.info (Duilio Ruggiero)</webMaster><lastBuildDate>Sun, 07 Dec 2025 23:58:31 GMT</lastBuildDate><atom:link href="https://sinetris.info/glossary/index.rss.xml" rel="self" type="application/rss+xml"/><item><title>Risk Owner</title><link>https://sinetris.info/glossary/risk-owner/</link><pubDate>Sun, 07 Dec 2025 23:58:31 GMT</pubDate><guid>https://sinetris.info/glossary/risk-owner/</guid><description>Person directly responsible for identifying, assessing, monitoring, reporting,
responding to, and defining intervention strategies in relation to risks associated
with an &lt;a class="glossary-term" href="https://sinetris.info/glossary/information-technology-asset/"&gt;IT asset&lt;/a&gt;.</description></item><item><title>Information Technology Asset</title><link>https://sinetris.info/glossary/information-technology-asset/</link><pubDate>Sun, 07 Dec 2025 23:19:32 GMT</pubDate><guid>https://sinetris.info/glossary/information-technology-asset/</guid><description>Hardware and software (e.g., applications, systems, virtual resources, data) that
an organization uses to support its business objectives.</description></item><item><title>Responsive Controls</title><link>https://sinetris.info/glossary/responsive-controls/</link><pubDate>Sun, 07 Dec 2025 21:35:56 GMT</pubDate><guid>https://sinetris.info/glossary/responsive-controls/</guid><description>Measures designed to respond to and rectify security violations or incidents after they have been identified.</description></item><item><title>Detective Controls</title><link>https://sinetris.info/glossary/detective-controls/</link><pubDate>Sun, 07 Dec 2025 21:23:57 GMT</pubDate><guid>https://sinetris.info/glossary/detective-controls/</guid><description>Measures designed to identify, record, and report a security incident after it has occurred.</description></item><item><title>General Data Protection Regulation</title><link>https://sinetris.info/glossary/general-data-protection-regulation/</link><pubDate>Sun, 07 Dec 2025 21:22:17 GMT</pubDate><guid>https://sinetris.info/glossary/general-data-protection-regulation/</guid><description>Regulation that governs how the personal data of individuals in the EU may be processed and transferred.</description></item><item><title>Entitlements</title><link>https://sinetris.info/glossary/entitlements/</link><pubDate>Mon, 01 Dec 2025 11:17:25 GMT</pubDate><guid>https://sinetris.info/glossary/entitlements/</guid><description>The access rights an account has on an asset.</description></item><item><title>Access Recertification Campaigns</title><link>https://sinetris.info/glossary/access-recertification-campaigns/</link><pubDate>Mon, 01 Dec 2025 10:25:02 GMT</pubDate><guid>https://sinetris.info/glossary/access-recertification-campaigns/</guid><description>Periodic review of user &lt;a class="glossary-term" href="https://sinetris.info/glossary/entitlements/"&gt;entitlements&lt;/a&gt;
to enforce the &lt;a class="glossary-term" href="https://sinetris.info/glossary/principle-of-least-privilege/"&gt;Principle of Least Privilege&lt;/a&gt;,
ensure &lt;a class="glossary-term" href="https://sinetris.info/glossary/orphaned-account/"&gt;orphaned accounts&lt;/a&gt; are removed,
and reduce internal threats and compliance violations.</description></item><item><title>Access Request</title><link>https://sinetris.info/glossary/access-request/</link><pubDate>Mon, 01 Dec 2025 10:22:15 GMT</pubDate><guid>https://sinetris.info/glossary/access-request/</guid><description>A user-initiated process to gain permission to access an &lt;a class="glossary-term" href="https://sinetris.info/glossary/information-technology-asset/"&gt;IT asset&lt;/a&gt; within an organization&amp;rsquo;s infrastructure.</description></item><item><title>Birthright Access</title><link>https://sinetris.info/glossary/birthright-access/</link><pubDate>Sat, 29 Nov 2025 15:32:02 GMT</pubDate><guid>https://sinetris.info/glossary/birthright-access/</guid><description>&lt;a class="glossary-term" href="https://sinetris.info/glossary/entitlements/"&gt;Entitlements&lt;/a&gt; automatically granted to a user when
they join an organization or change roles within it.</description></item><item><title>Orphaned Account</title><link>https://sinetris.info/glossary/orphaned-account/</link><pubDate>Sat, 29 Nov 2025 15:24:33 GMT</pubDate><guid>https://sinetris.info/glossary/orphaned-account/</guid><description>Account that retains access to an asset without an active owner.</description></item><item><title>Data Breach</title><link>https://sinetris.info/glossary/data-breach/</link><pubDate>Thu, 27 Nov 2025 22:08:23 GMT</pubDate><guid>https://sinetris.info/glossary/data-breach/</guid><description>Incident involving copying, transmitting, viewing, or processing sensitive,
protected, or confidential information by unauthorized individuals or for
unauthorized purposes.</description></item><item><title>Data Anonymization</title><link>https://sinetris.info/glossary/data-anonymization/</link><pubDate>Mon, 24 Nov 2025 14:47:49 GMT</pubDate><guid>https://sinetris.info/glossary/data-anonymization/</guid><description>The process of removing Personally Identifiable Information from a dataset in an irreversible and permanent manner.
This can serve as a mechanism of privacy protection. In the context of data governance,
anonymized data is no longer considered Personally Identifiable Information
according to the current regulatory interpretation.</description></item><item><title>Proactive Controls</title><link>https://sinetris.info/glossary/proactive-controls/</link><pubDate>Mon, 24 Nov 2025 12:56:03 GMT</pubDate><guid>https://sinetris.info/glossary/proactive-controls/</guid><description>&lt;p&gt;Proactive Controls are a strategy designed to prevent attacks and identify vulnerabilities
before they are exploited, focusing on prediction and prevention rather than simply
reacting, anticipating potential problems or targets and taking action to prepare
in advance, rather than waiting for them to occur.&lt;/p&gt;</description></item><item><title>Preventative Controls</title><link>https://sinetris.info/glossary/preventative-controls/</link><pubDate>Mon, 24 Nov 2025 11:42:20 GMT</pubDate><guid>https://sinetris.info/glossary/preventative-controls/</guid><description>Designed to prevent an event or an unauthorized action from occurring.</description></item><item><title>Security Controls</title><link>https://sinetris.info/glossary/security-controls/</link><pubDate>Mon, 24 Nov 2025 11:36:55 GMT</pubDate><guid>https://sinetris.info/glossary/security-controls/</guid><description>Safeguards and countermeasures that help protect an organization&amp;rsquo;s assets, systems,
and data from potential risks and threats.</description></item><item><title>Subject Matter Expert</title><link>https://sinetris.info/glossary/subject-matter-expert/</link><pubDate>Mon, 24 Nov 2025 07:28:53 GMT</pubDate><guid>https://sinetris.info/glossary/subject-matter-expert/</guid><description>A professional with in-depth, specialized knowledge in a particular field, process,
or technology who acts as a trusted advisor, guiding teams, validating information,
and solving complex problems to ensure accuracy, efficiency, and successful project
outcomes.</description></item><item><title>Asset Administrator</title><link>https://sinetris.info/glossary/asset-administrator/</link><pubDate>Mon, 24 Nov 2025 01:27:13 GMT</pubDate><guid>https://sinetris.info/glossary/asset-administrator/</guid><description>Manages user roles, account assignments, and performs access reviews and audits
for an &lt;a class="glossary-term" href="https://sinetris.info/glossary/information-technology-asset/"&gt;IT asset&lt;/a&gt;.</description></item><item><title>Brute-Force Attack</title><link>https://sinetris.info/glossary/brute-force-attack/</link><pubDate>Sat, 22 Nov 2025 09:03:19 GMT</pubDate><guid>https://sinetris.info/glossary/brute-force-attack/</guid><description>Often used to guess authentication credentials or discover hidden content/pages
within a web application using a trial-and-error method.</description></item><item><title>Zero Trust</title><link>https://sinetris.info/glossary/zero-trust/</link><pubDate>Sat, 22 Nov 2025 08:11:15 GMT</pubDate><guid>https://sinetris.info/glossary/zero-trust/</guid><description>Security framework that requires all users, devices, and systems, whether inside
or outside the organization&amp;rsquo;s network, to be continuously authenticated, authorized,
and validated before gaining access to applications and data.</description></item><item><title>Authentication Assurance Level</title><link>https://sinetris.info/glossary/authentication-assurance-level/</link><pubDate>Sat, 22 Nov 2025 08:02:00 GMT</pubDate><guid>https://sinetris.info/glossary/authentication-assurance-level/</guid><description>NIST standard to assess the degree of confidence and reliability of an authentication
process.</description></item><item><title>Asset Owner</title><link>https://sinetris.info/glossary/asset-owner/</link><pubDate>Sat, 22 Nov 2025 08:01:09 GMT</pubDate><guid>https://sinetris.info/glossary/asset-owner/</guid><description>Person or group responsible for an &lt;a class="glossary-term" href="https://sinetris.info/glossary/information-technology-asset/"&gt;IT asset&lt;/a&gt;.</description></item><item><title>Account Lockout</title><link>https://sinetris.info/glossary/account-lockout/</link><pubDate>Sat, 22 Nov 2025 08:00:36 GMT</pubDate><guid>https://sinetris.info/glossary/account-lockout/</guid><description>A security feature typically used to prevent a &lt;a class="glossary-term" href="https://sinetris.info/glossary/brute-force-attack/"&gt;Brute-Force Attack&lt;/a&gt;
by temporarily disabling a user account after a set number of failed login attempts.</description></item><item><title>Single Source of Truth</title><link>https://sinetris.info/glossary/single-source-of-truth/</link><pubDate>Thu, 20 Nov 2025 09:01:34 GMT</pubDate><guid>https://sinetris.info/glossary/single-source-of-truth/</guid><description>Practice of centralizing all of an organization&amp;rsquo;s data related to a given subject
in a single, reliable location, ensuring that every person and every system operates
with the same up-to-date information.</description></item><item><title>Web Authentication</title><link>https://sinetris.info/glossary/web-authentication/</link><pubDate>Mon, 10 Nov 2025 15:34:37 GMT</pubDate><guid>https://sinetris.info/glossary/web-authentication/</guid><description>Specification that defines an API enabling the creation and use of strong, attested,
scoped, public key-based credentials by web applications, for the purpose of strongly
authenticating users.</description></item><item><title>Client-to-Authenticator Protocols</title><link>https://sinetris.info/glossary/client-to-authenticator-protocols/</link><pubDate>Mon, 10 Nov 2025 15:29:40 GMT</pubDate><guid>https://sinetris.info/glossary/client-to-authenticator-protocols/</guid><description>Protocol developed by the FIDO Alliance and complementary to the &lt;a class="glossary-term" href="https://sinetris.info/glossary/web-authentication/"&gt;W3C&amp;#39;s WebAuthn specification&lt;/a&gt; that allows
a client (for example, an operating system, browser, or application) to communicate
with a device designed to authenticate the user.</description></item><item><title>FIDO Specifications</title><link>https://sinetris.info/glossary/fido-specifications/</link><pubDate>Mon, 10 Nov 2025 15:10:26 GMT</pubDate><guid>https://sinetris.info/glossary/fido-specifications/</guid><description>A set of open standards published by the 
&lt;a href="https://fidoalliance.org/" rel="external"&gt;FIDO Alliance&lt;/a&gt;
for stronger, simpler, and phishing-resistant user authentication.</description></item><item><title>Information Technology Asset Management</title><link>https://sinetris.info/glossary/information-technology-asset-management/</link><pubDate>Mon, 10 Nov 2025 14:55:30 GMT</pubDate><guid>https://sinetris.info/glossary/information-technology-asset-management/</guid><description>Systems to manage the lifecycle of &lt;a class="glossary-term" href="https://sinetris.info/glossary/information-technology-asset/"&gt;IT assets&lt;/a&gt;, including tracking, maintaining and disposing of hardware
and software.</description></item><item><title>Anomaly Detection</title><link>https://sinetris.info/glossary/anomaly-detection/</link><pubDate>Mon, 10 Nov 2025 14:26:54 GMT</pubDate><guid>https://sinetris.info/glossary/anomaly-detection/</guid><description>A fundamental process in cybersecurity, used to identify events or patterns that
deviate from expected behavior within systems, networks, or datasets and that could
indicate a security threat, such as a network intrusion, malware, or unauthorized access.</description></item><item><title>Drift</title><link>https://sinetris.info/glossary/drift/</link><pubDate>Mon, 10 Nov 2025 13:50:07 GMT</pubDate><guid>https://sinetris.info/glossary/drift/</guid><description>&lt;p&gt;Drift is the difference between the &lt;a class="glossary-term" href="https://sinetris.info/glossary/desired-state/"&gt;Desired State&lt;/a&gt; of
a system and its &lt;a class="glossary-term" href="https://sinetris.info/glossary/actual-state/"&gt;Actual State&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Detecting and resolving this drift is essential to prevent security vulnerabilities,
compliance violations, and operational failures.&lt;/p&gt;</description></item><item><title>Actual State</title><link>https://sinetris.info/glossary/actual-state/</link><pubDate>Mon, 10 Nov 2025 13:47:54 GMT</pubDate><guid>https://sinetris.info/glossary/actual-state/</guid><description>Current and factual condition of a system or its data as opposed to the
&lt;a class="glossary-term" href="https://sinetris.info/glossary/desired-state/"&gt;Desired State&lt;/a&gt;.</description></item><item><title>Desired State</title><link>https://sinetris.info/glossary/desired-state/</link><pubDate>Mon, 10 Nov 2025 13:47:45 GMT</pubDate><guid>https://sinetris.info/glossary/desired-state/</guid><description>The planned state of a system, usually defined as data or code in a
&lt;a class="glossary-term" href="https://sinetris.info/glossary/single-source-of-truth/"&gt;&lt;abbr title="Single Source of Truth"&gt;SSOT&lt;/abbr&gt;&lt;/a&gt;.</description></item><item><title>Segregation of Duties</title><link>https://sinetris.info/glossary/segregation-of-duties/</link><pubDate>Thu, 04 Sep 2025 12:33:22 GMT</pubDate><guid>https://sinetris.info/glossary/segregation-of-duties/</guid><description>&lt;h2 id="description"&gt;Description&lt;/h2&gt;
&lt;p&gt;Segregation of Duties (SoD) is a mechanism designed to prevent the risks of errors and fraudulent behavior by dividing the actions required to complete a task among different employees.&lt;/p&gt;
&lt;h3 id="examples"&gt;Examples&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;To prevent financial fraud: the person approving an invoice cannot be the same person who issued it.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Reason:&lt;/strong&gt; they could potentially approve and pay fraudulent invoices to themselves or a fictitious supplier.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To prevent both fraud and errors: the software engineer that approve code changes to critical assets cannot be the same person who submitted the changes.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Reason:&lt;/strong&gt; they could miss mistakes made by them (prevent errors) or abuse the system to their own advantage (prevent fraud).&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;[Truncated]&lt;/div&gt;</description></item><item><title>Non-Human Identity</title><link>https://sinetris.info/glossary/non-human-identity/</link><pubDate>Sat, 26 Jul 2025 10:27:48 GMT</pubDate><guid>https://sinetris.info/glossary/non-human-identity/</guid><description>Identity belonging to a machine, service account, containerized workload, or autonomous agent.</description></item><item><title>Identity and Access Management</title><link>https://sinetris.info/glossary/identity-and-access-management/</link><pubDate>Wed, 16 Jul 2025 15:07:33 GMT</pubDate><guid>https://sinetris.info/glossary/identity-and-access-management/</guid><description>Identity and access management is a framework of policies, technologies, and
business processes aimed at facilitating the management of digital identities
and their access.</description></item><item><title>Identity Threat Detection &amp; Response</title><link>https://sinetris.info/glossary/identity-threat-detection-and-response/</link><pubDate>Wed, 16 Jul 2025 11:30:52 GMT</pubDate><guid>https://sinetris.info/glossary/identity-threat-detection-and-response/</guid><description>Cybersecurity discipline that includes tools and best practices for protecting
user identities and identity systems from cyber threats.</description></item><item><title>SSL-Bridging</title><link>https://sinetris.info/glossary/ssl-bridging/</link><pubDate>Wed, 02 Jul 2025 07:50:28 GMT</pubDate><guid>https://sinetris.info/glossary/ssl-bridging/</guid><description>The load balancer decrypts the incoming encrypted traffic (same as in
SSL-Termination) and re-encrypts it when sending to the destination (e.g.
backend instances).</description></item><item><title>SSL-Passthrough</title><link>https://sinetris.info/glossary/ssl-passthrough/</link><pubDate>Wed, 02 Jul 2025 07:50:28 GMT</pubDate><guid>https://sinetris.info/glossary/ssl-passthrough/</guid><description>&lt;p&gt;The load balancer passes the encrypted traffic to the destination (e.g. backend
instances) without decrypting it.&lt;/p&gt;
&lt;p&gt;Because the load balancer only sees encrypted traffic, it is not possible to
perform layer 7 (OSI model) actions.&lt;/p&gt;</description></item><item><title>SSL-Termination</title><link>https://sinetris.info/glossary/ssl-termination/</link><pubDate>Wed, 02 Jul 2025 07:50:28 GMT</pubDate><guid>https://sinetris.info/glossary/ssl-termination/</guid><description>The load balancer decrypts the incoming encrypted traffic and sends it to the
destination (e.g. backend instances) unencrypted.</description></item><item><title>Account Takeover</title><link>https://sinetris.info/glossary/account-take-overs/</link><pubDate>Wed, 25 Jun 2025 11:55:55 GMT</pubDate><guid>https://sinetris.info/glossary/account-take-overs/</guid><description>Gaining unauthorized access to a user account.</description></item><item><title>Color Wheel</title><link>https://sinetris.info/glossary/color-wheel/</link><pubDate>Fri, 30 May 2025 06:55:18 GMT</pubDate><guid>https://sinetris.info/glossary/color-wheel/</guid><description>A circular diagram used to show the relationships between colors.</description></item><item><title>Color Theory</title><link>https://sinetris.info/glossary/color-theory/</link><pubDate>Tue, 27 May 2025 15:46:33 GMT</pubDate><guid>https://sinetris.info/glossary/color-theory/</guid><description>The study of how colors interact with each other and how they can influence people&amp;rsquo;s emotions and perceptions.</description></item><item><title>Color Harmonies</title><link>https://sinetris.info/glossary/color-harmonies/</link><pubDate>Tue, 27 May 2025 14:18:00 GMT</pubDate><guid>https://sinetris.info/glossary/color-harmonies/</guid><description>&lt;h2 id="definition"&gt;Definition&lt;/h2&gt;
&lt;p&gt;The term &amp;ldquo;color harmonies&amp;rdquo; refers to the creation of balanced and aesthetically
pleasing color combinations based on the principles and concepts outlined in
&lt;a class="glossary-term" href="https://sinetris.info/glossary/color-theory/"&gt;Color Theory&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id="color-combinations"&gt;Color combinations&lt;/h2&gt;
&lt;h3 id="analogous"&gt;Analogous&lt;/h3&gt;
&lt;h3 id="complementary"&gt;Complementary&lt;/h3&gt;
&lt;h3 id="split-complementary"&gt;Split-Complementary&lt;/h3&gt;
&lt;h3 id="triadic"&gt;Triadic&lt;/h3&gt;
&lt;p&gt;The triadic color harmony uses three colors equally spaced on the color wheel,
forming a triangle, to create vibrant, balanced, and visually appealing color
palette.&lt;/p&gt;</description></item><item><title>Information Assurance</title><link>https://sinetris.info/glossary/information-assurance/</link><pubDate>Mon, 17 Mar 2025 10:43:09 GMT</pubDate><guid>https://sinetris.info/glossary/information-assurance/</guid><description>&lt;p&gt;Information Assurance (IA) is the practice of assuring information quality and managing risks related to the use, processing, storage, and transmission of information.&lt;/p&gt;
&lt;p&gt;The 5 pillars of information assurance includes protection of the &lt;strong&gt;Confidentiality&lt;/strong&gt;, &lt;strong&gt;Integrity&lt;/strong&gt;, &lt;strong&gt;Availability&lt;/strong&gt;, &lt;strong&gt;Authenticity&lt;/strong&gt;, and &lt;strong&gt;Non-repudiation&lt;/strong&gt; of information.&lt;/p&gt;
&lt;p&gt;In IT systems, when possible, assets should be tagged/labeled with proper Information Assurance level.&lt;/p&gt;
&lt;h2 id="confidentiality"&gt;Confidentiality&lt;/h2&gt;
&lt;p&gt;The property that information is not made available or disclosed to unauthorized individuals, entities, or processes.&lt;/p&gt;
&lt;div&gt;[Truncated]&lt;/div&gt;</description></item><item><title>Information and Communication Technology</title><link>https://sinetris.info/glossary/information-and-communication-technology/</link><pubDate>Sun, 06 Aug 2023 10:15:25 GMT</pubDate><guid>https://sinetris.info/glossary/information-and-communication-technology/</guid><description>&lt;p&gt;An umbrella term that encompasses all technical means used to handle information
and facilitate communication through the use of computing devices (e.g., desktops,
laptops, servers, mainframes, smartphones, tablet, or any other CPU-equipped device),
network equipment (e.g., routers, switches, modems, cables), other peripherals (e.g.,
printers, scanners, external hard drives), and any related software.&lt;/p&gt;</description></item><item><title>Out of the box</title><link>https://sinetris.info/glossary/out-of-the-box/</link><pubDate>Sun, 06 Aug 2023 10:15:25 GMT</pubDate><guid>https://sinetris.info/glossary/out-of-the-box/</guid><description>Native or built-in feature or functionality of a product, included by default
and that works immediately after first setup.</description></item><item><title>Best Effort</title><link>https://sinetris.info/glossary/best-effort/</link><pubDate>Sun, 06 Aug 2023 10:10:15 GMT</pubDate><guid>https://sinetris.info/glossary/best-effort/</guid><description>Reasonable effort to satisfy a request but without guaranteeing success.</description></item><item><title>Information Technology</title><link>https://sinetris.info/glossary/information-technology/</link><pubDate>Sun, 06 Aug 2023 10:10:15 GMT</pubDate><guid>https://sinetris.info/glossary/information-technology/</guid><description>&lt;p&gt;The study or use of hardware and software to manage, store, retrieve, and deliver
data.&lt;/p&gt;
&lt;p&gt;A subset of &lt;a class="glossary-term" href="https://sinetris.info/glossary/information-and-communication-technology/"&gt;&lt;abbr title="Single Source of Truth"&gt;ICT&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>Principle of Least Privilege</title><link>https://sinetris.info/glossary/principle-of-least-privilege/</link><pubDate>Sun, 06 Aug 2023 10:10:15 GMT</pubDate><guid>https://sinetris.info/glossary/principle-of-least-privilege/</guid><description>Security concept whereby a user or service is granted the minimum levels of access
and authorization necessary to perform the requested task.</description></item><item><title>Real Time</title><link>https://sinetris.info/glossary/real-time/</link><pubDate>Sun, 06 Aug 2023 10:10:15 GMT</pubDate><guid>https://sinetris.info/glossary/real-time/</guid><description>&lt;p&gt;Reported at the same time something takes place or delivered in a short time.&lt;/p&gt;
&lt;p&gt;What we consider real-time is a matter of expectations, for example a postal package
delivered in few minutes would still be considered as delivered in real-time.&lt;/p&gt;</description></item><item><title>Real-Time Computing</title><link>https://sinetris.info/glossary/real-time-computing/</link><pubDate>Sun, 06 Aug 2023 10:10:15 GMT</pubDate><guid>https://sinetris.info/glossary/real-time-computing/</guid><description>&lt;h2 id="description"&gt;Description&lt;/h2&gt;
&lt;p&gt;Real-time computing, also known as reactive computing, is used to describe a computer system that guarantees the processing of inputs and the execution of tasks within specified time limits, often referred to as “deadlines”.&lt;/p&gt;
&lt;p&gt;We can divide real-time systems into three categories based on expectations:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://sinetris.info/glossary/real-time-computing/"&gt;soft real-time&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://sinetris.info/glossary/real-time-computing/"&gt;firm real-time&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://sinetris.info/glossary/real-time-computing/"&gt;hard real-time&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="soft-real-time"&gt;soft real-time&lt;/h2&gt;
&lt;p&gt;The system continues to operate even if it’s unable to perform operations within the allotted time.&lt;/p&gt;
&lt;h2 id="firm-real-time"&gt;firm real-time&lt;/h2&gt;
&lt;p&gt;Deadlines are crucial, but occasional non-compliance is tolerable.&lt;/p&gt;
&lt;div&gt;[Truncated]&lt;/div&gt;</description></item><item><title>Real-Time Operating System</title><link>https://sinetris.info/glossary/real-time-os/</link><pubDate>Sun, 06 Aug 2023 10:10:15 GMT</pubDate><guid>https://sinetris.info/glossary/real-time-os/</guid></item><item><title>Recovery Point Objective</title><link>https://sinetris.info/glossary/recovery-point-objective/</link><pubDate>Sun, 06 Aug 2023 10:10:15 GMT</pubDate><guid>https://sinetris.info/glossary/recovery-point-objective/</guid><description>Targeted duration of time between the event of failure and the point where operations resume.</description></item><item><title>Recovery Time Objective</title><link>https://sinetris.info/glossary/recovery-time-objective/</link><pubDate>Sun, 06 Aug 2023 10:10:15 GMT</pubDate><guid>https://sinetris.info/glossary/recovery-time-objective/</guid><description>Agreed maximum time, based on risk analysis, between the failure event and the restoration of operations.</description></item><item><title>Software Bill of Materials</title><link>https://sinetris.info/glossary/software-bill-of-materials/</link><pubDate>Sun, 06 Aug 2023 10:10:15 GMT</pubDate><guid>https://sinetris.info/glossary/software-bill-of-materials/</guid><description>&lt;p&gt;A Software Bill of Materials (SBOM) is a comprehensive inventory of all the components,
including dependencies and related installed tools, used in a software.&lt;/p&gt;</description></item></channel></rss>