Dev Concepts Type: other View reference Related Concepts Context Layering Prompt Templates Air-Gapped Backup You Aren't Gonna Need It (YAGNI) N-of-1 Experiments Pseudonymization Feature Flags SOLID Principles Graph Database Local-First Branch Summative Assessment Continuous Deployment Need-to-Know Principle Delegation Board Data Privacy Data Portability Technical Writing Build-Measure-Learn Four Eyes Principle Attention Mechanism Prompt Compression AI Context Governance GitFlow Dummy Object Dead Code Sparse Models Daily Standup Context Isolation Scrumban Malware Iterative Development Determinism Threat Modeling Docker Virtual Private Network (VPN) Mulder Effect Specification-Driven Design Database Strangler Fig Pattern Computer Virus Golden Path Documentation Debt Offline Backup Durability Monolithic Architecture Onboarding Pull System Encapsulation Code Smell FUBAR Rootkit Distributed Systems Git Bash Test Fake Structured Thinking Smishing Data Security Beads Agent System Engineering Separation of Concerns Client-Server Architecture Design Debt Resume-Driven Development Definition of Ready Lead Time Problem Solving Cycle Scully Effect Retrospective Context File Hierarchy Staging Area Botnet Self-Documenting Code Microservices Architecture Fork AI Agent Portability Tribal Knowledge Brute Force Attack Continuous Discovery Penetration Testing Host Leadership Agile Manifesto Iterative and Incremental Note-Taking Obsidian Clean Architecture Transformer Digital Twin Zero Trust Chaos Engineering Anonymization Harness Engineering Backlog Refinement Given-When-Then Waterfall Methodology Agile Delegation Poker Unit Testing AI Heartbeat Pattern Distributed Version Control System (DVCS) Prompt Lazy Loading Drive-by Download Value Stream Fifth Column Burndown Chart Open Source Initiative (OSI) User Acceptance Testing Customer Discovery Cycle Time Format Obsolescence URL Structure Scrum User Stories Clean Code Red Teaming SNAFU End-to-End Encryption Software Supply Chain Security GraphQL Phishing Agent Loop Coupling Confused Deputy Definition of Done PostgreSQL Decentralization Sprint Planning Watering Hole Attack Digital Preservation Context Mapping Edge AI Job Story Weighted Shortest Job First Stale-While-Revalidate (SWR) Sample Size Specification by Example Bit Rot Visual Management Innovation Tokens Business Email Compromise Static Analysis Continuous Integration T-Shirt Sizing Gource Micro SaaS Entity-Relationship Model Rapid Experimentation Design Thinking Process Recognition-Production Gap Whaling Design Patterns Test-Driven Development Side Effects Guardrails Data Availability API Slopsquatting Privilege Escalation Unix Philosophy Information Lifecycle Management Clone Authorization Saga Pattern Velocity Pair Programming DevOps Manifesto AI Skill Scoping Supabase Scrum Master Cross-Site Scripting Session Hijacking Project Context Management DDoS Attack Data Visualization Boring Technology Open Source Transparency Least Privilege Code Kata Separation of Duties Data Confidentiality REST Prototyping DNS Spoofing Merge Pull Request (PR) Anti-Corruption Layer WireGuard Data Breach Spear Phishing Evolutionary Architecture Guerrilla Usability Testing BSD License Cold Storage Knowledge Worker Tools Static Site Generation Information Radiators Indie Hacking State Machine SQL Injection Modularity Firewall Lean Startup Technical Debt Multi-Factor Authentication Data Masking Atomic Design Cherry-pick Literate Programming Remote Architectural Fitness Functions Privacy by Design Runbook ACID Properties Trojan Horse Accessibility Ransomware NoteCards Cryptojacking INVEST Criteria Graph Theory Insider Threat Cumulative Flow Diagram Cognitive Complexity Patch Management Design Systems Receptionist AI Design Pattern Design Rationale Hypothesis-Driven Development Resilience Engineering Continuous Inspection DevOps Schema Adware Release Early, Release Often Three Amigos Sustainable Pace Aggregate UI Design Commit Remote Access Trojan AI Skill Testing Test Stub Cross-Functional Teams Story Points HTML Sprint Disaster Recovery Credential Stuffing TOML Integration Testing Intrusion Detection System Data Minimization Treemap BDFL LazyDocker Package Registry Security Typosquatting Encryption GitHub CLI Software Composition Analysis Feature Branching Trunk-based Development Two-Factor Authentication Stash Digital Hygiene Jailbreaking AI Conway's Law Mixture of Experts Cross-Site Request Forgery JavaScript SQLite Shift Left Context Inheritance CAP Theorem Mindset Over Tools Software Entropy Behavior-Driven Development Desired State Management AI Skill Supply Chain Security Man-in-the-Middle Attack Conceptual Integrity Opinionated Software Not Invented Here Syndrome Quishing Relational Database Management System Technology Radar Documentation Tools for Thought Zero-Day Vulnerability Developer Experience Mock Object Domain Event Merge Conflict Vaporware Namesquatting Starjacking Rebase Continuous Delivery Refactoring Domain-Driven Design CQRS Advanced Persistent Threat Cohesion Computer Worm Looks Good To Me (LGTM) Dependency Confusion Event Sourcing Offline-First Kubernetes Supply Chain Attack Role-Based Access Control Legacy Code Outliner Vishing Extreme Programming Git Service-Oriented Architecture Repository Single Responsibility Principle Lava Flow Spyware Planning Poker KISS Principle GitHub You Are Not Your Code CIA Triad Backdoor Incident Response Affinity Estimation Screenshot Driven Development Backlog Single File Component Murphy's Law Test Double Throughput Flow Efficiency Problem Management Data Integrity Differential Privacy Authentication Data Structures Data Retention Policy Reductionism Gating Network Product Owner Eventual Consistency Security Debt Affero General Public License (AGPL) Architecture Decision Records Response Bias Sprint Retrospective Modulith Context-as-Code Agentic Engineering Directed Acyclic Graph (DAG) Linus' Law Vulnerability Assessment Social Engineering Replication Crisis Version Control Code Coverage Software Architecture Zero Knowledge Bounded Context Test Spy Blue-Green Deployment Domain Model Type I and Type II Errors Context Rot Personal Knowledge Management Process Defense in Depth Prompt-Driven Development (PDD) Infrastructure as Code (IaC) Security Audit Software Estimation GitLab Prompt Injection DevSecOps Agent Orchestration Pretexting Keylogger Data Redundancy Pure Functions AI Skill Best Practices User Story Mapping Acceptance Criteria Server-Side Rendering Incident Management Agent Harness ← Back to all references