Standards
These are some of the top open-source standards we have identified in use across all of the companies we are profiling. We have prioritized the standards that are relevant to conversations we are having and a variety of capabilities we are working to develop.
Predefined conditions that a product, feature, or user story must meet to be considered complete and acceptable by stakeholders. These criteria establish clear, testable requirements that guide development and validate when work is done.
A design pattern in which objects receive their dependencies from external sources rather than creating them internally, promoting loose coupling and easier testing. Effective use of this practice reduces bugs in production and supports a culture of quality-driven development.
Entity Relationship is a specialized technology or methodology in the entity domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
Event Sourcing is a specialized technology or methodology in the event domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
Lean Manufacturing is a manufacturing or industrial technology used to design, produce, or manage physical products and production processes. It leverages automation, precision engineering, and digital controls to improve quality, efficiency, and throughput.
Object-Oriented Programming is a software development technology or practice that supports the creation, maintenance, or improvement of software systems. It helps developers and engineering teams work more efficiently and deliver higher-quality software products.
TCP/IP (Transmission Control Protocol/Internet Protocol) is the foundational communication protocol suite that powers the internet and most computer networks. It provides reliable, ordered delivery of data between applications across diverse network hardware through a layered architecture of protocols.
A communication protocol providing full-duplex communication channels over a single TCP connection, enabling real-time data exchange between client and server. It is fundamental to modern network architectures and enables reliable communication between systems.
Security Operations - the practice of integrating security practices into IT operations to identify, manage, and respond to security threats and vulnerabilities in real-time while maintaining system performance and availability. It plays a critical role in protecting organizational assets and maintaining a strong security posture.
SSO is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
REST (Representational State Transfer) is an architectural style for designing networked applications that uses stateless communication and standard HTTP methods to interact with resources identified by URLs. Its simplicity, scalability, and alignment with the web's architecture have made it the dominant approach for building web APIs.
Security policy document describing supported versions, vulnerability reporting procedures, and responsible disclosure guidelines for a project.
The International Organization for Standardization (ISO) develops and publishes international standards covering technology, manufacturing, food safety, and many other industries. ISO standards provide globally recognized frameworks that help organizations ensure quality, safety, interoperability, and consistency in their products and processes.
File describing how users can get help with a project, including links to documentation, forums, issue trackers, and support channels.
National Institute of Standards and Technology - develops and promotes measurement standards, cybersecurity frameworks, and technology guidelines
Scaled Agile Framework (SAFe) is an enterprise-scale agile framework that provides guidance for implementing agile practices across large organizations with multiple teams working together. Teams use it to align stakeholders, track progress, and adapt to changing requirements throughout the project lifecycle.
Scaled Agile is a project management practice or tool that helps teams plan, organize, and execute work effectively. It supports structured collaboration, progress tracking, and adaptive planning to deliver results on time and within scope.
A Write-Ahead Log (WAL) is a standard technique in database systems where changes are first recorded to a sequential log file before being applied to the actual data files. It ensures durability and crash recovery by guaranteeing that committed transactions can be reconstructed from the log even if the system fails during a write operation.
Lean Management is the discipline of planning, organizing, and overseeing lean-related activities to achieve optimal outcomes. It encompasses the processes, tools, and strategies needed to effectively coordinate and control lean resources across an organization.
HTML is an artificial intelligence technology or practice that leverages machine learning, data analysis, or intelligent automation to solve complex problems. It is increasingly applied across industries to improve efficiency, accuracy, and decision-making in both technical and business contexts.
Protocol Buffers is a networking technology or protocol that facilitates communication, data transfer, or traffic management between systems and devices. It enables reliable, efficient, and secure connectivity across local and distributed network environments.
Functional Programming is a software development technology or practice that supports the creation, maintenance, or improvement of software systems. It helps developers and engineering teams work more efficiently and deliver higher-quality software products.
Regulation is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Documented step-by-step instructions for routine operations and processes to ensure consistency, quality, and compliance across an organization. It is essential for organizations operating in regulated industries with strict oversight requirements.
The Actor Model is a mathematical model of concurrent computation where the fundamental unit of computation is an actor—an entity that processes messages asynchronously and maintains its own private state. It provides a powerful abstraction for building highly concurrent and distributed systems, used in frameworks like Akka and languages like Erlang.
IAM is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Regulatory is a compliance-related concept that helps organizations meet regulatory requirements and maintain adherence to industry standards. It supports audit readiness, risk management, and the demonstration of accountability to regulators and stakeholders.
Methodology is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
A software architecture pattern promoting the production, detection, consumption of, and reaction to events. Systems are designed to respond to state changes asynchronously through event messages.
File specifying the legal license under which a project is distributed, defining permissions, conditions, and limitations for use and redistribution.
Agile is a set of software development principles and practices that emphasize iterative delivery, collaboration, and responsiveness to change over rigid planning and documentation. Its frameworks—including Scrum, Kanban, and XP—help teams deliver working software incrementally and adapt quickly to evolving requirements.
An iterative approach to software development and project management that emphasizes flexibility, collaboration, and customer feedback. Agile methodologies include frameworks like Scrum, Kanban, and XP that focus on delivering working software in short cycles.
SSL/TLS is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
SQL (Structured Query Language) is the standard programming language for managing and querying relational databases. It provides commands for creating, reading, updating, and deleting data, as well as defining schemas, managing permissions, and performing complex analytical queries.
Guidelines for contributing to a project, including coding standards, pull request processes, issue reporting, and development setup instructions.
MapReduce is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
HTTP/2 is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
OpenAPI (formerly Swagger Specification) is a standard, language-agnostic specification for describing RESTful APIs in a machine-readable format. It enables automated documentation generation, client code generation, and API testing, serving as a contract between API providers and consumers.
A responsibility assignment matrix that defines roles and responsibilities using four key designations - Responsible (those who do the work), Accountable (the ultimate decision maker), Consulted (those whose input is needed), and Informed (those who need to be kept updated). RACI matrices help clarify ownership, reduce confusion, and improve project coordination by mapping stakeholders to specific tasks or deliverables.
Early models or preliminary versions of products built to test areas, validate designs, and gather feedback before full-scale production or development. Effective use of this practice reduces bugs in production and supports a culture of quality-driven development.
CSS is a web development technology or practice used to build, enhance, or manage web-based applications and experiences. It supports the creation of responsive, performant, and interactive digital products accessible through web browsers.
Frameworks and benchmarks that define acceptable levels of quality for products, services, or processes to ensure consistency and meet customer expectations. Proper implementation reduces legal and operational risk while supporting audit readiness.
DevOps is a cultural and technical movement that combines software development and IT operations to shorten the development lifecycle and deliver high-quality software continuously. It emphasizes automation, collaboration, monitoring, and infrastructure as code to bridge the gap between building software and running it in production.
Design patterns and best practices for integrating different software systems and applications, including messaging, data transformation, and service orchestration approaches. Organizations adopt it to address specific technical or business challenges in their environments.
Enterprise Integration Patterns is a business or enterprise practice that helps organizations manage operations, make strategic decisions, and achieve their objectives. It encompasses the processes, tools, and methodologies needed to run an effective and efficient organization.
Reactive Programming is a software development technology or practice that supports the creation, maintenance, or improvement of software systems. It helps developers and engineering teams work more efficiently and deliver higher-quality software products.
JSON (JavaScript Object Notation) is a lightweight data interchange format that uses human-readable text to represent structured data as key-value pairs and arrays. It has become the de facto standard for data exchange in web APIs, configuration files, and NoSQL databases due to its simplicity and broad language support.
PDF is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Templates is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
An architectural pattern where software components provide services to other components through a communication protocol over a network. Services are loosely coupled, reusable, and can be independently deployed and maintained.
SOA is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Detailed technical requirements, standards, and parameters that define the characteristics and performance criteria of a product, system, or service. Organizations adopt it to address specific technical or business challenges in their environments.
Scrum is an agile project management framework that organizes work into fixed-length iterations called sprints, typically lasting two to four weeks. It defines clear roles (Product Owner, Scrum Master, Developers) and ceremonies (sprint planning, daily standups, retrospectives) to enable teams to deliver value incrementally and continuously improve.
Structured representations of data entities, their attributes, and relationships used to organize and define how data is stored, accessed, and managed within a system or database. Effective implementation supports data-driven strategies and helps maintain data integrity across systems.
Practical applications and scenarios demonstrating how a technology or product can be implemented to solve real-world problems. It is used across a range of industries and technical contexts to improve efficiency and outcomes.
A prioritized list of features, enhancements, and fixes that serves as the single source of requirements for product development, typically used in Agile and Scrum methodologies. Teams use it to align stakeholders, track progress, and adapt to changing requirements throughout the project lifecycle.
XML (Extensible Markup Language) is a markup language and data format that defines rules for encoding documents in a way that is both human-readable and machine-readable. It is widely used for data interchange between systems, configuration files, web services (SOAP), and document formats like SVG and XHTML.
Software Development Life Cycle - A systematic process for planning, creating, testing, and deploying software systems. Effective use of this practice reduces bugs in production and supports a culture of quality-driven development.
Framework of policies and procedures designed to provide reasonable assurance regarding the achievement of objectives in operational effectiveness, reliable financial reporting, and compliance with laws and regulations. It helps organizations meet regulatory requirements and demonstrate accountability to stakeholders.
Consensus is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Detailed technical specifications and requirements documentation for products. Teams use it to align stakeholders, track progress, and adapt to changing requirements throughout the project lifecycle.
A structured process for planning, creating, testing, and deploying software systems through distinct phases including requirements gathering, design, implementation, testing, deployment, and maintenance. It helps development teams catch defects early and maintain confidence in software releases.
Accounting Standards are the formal rules and guidelines that govern how financial transactions and statements are recorded, reported, and disclosed. They ensure consistency, transparency, and comparability across financial reports, and include frameworks like GAAP and IFRS.
The General Data Protection Regulation (GDPR) is a comprehensive data privacy law enacted by the European Union that governs how organizations collect, process, and store personal data of EU residents. It grants individuals significant rights over their data and imposes strict obligations on organizations, with substantial penalties for non-compliance.
The process of creating a visual representation of data structures and relationships to organize information and define how data is stored, accessed, and managed within a system. Effective implementation supports data-driven strategies and helps maintain data integrity across systems.
Security Standards is a cybersecurity technology or practice designed to protect systems, networks, and data from unauthorized access, attacks, and vulnerabilities. It plays a critical role in an organization's defense strategy by reducing risk and strengthening overall security posture.
A structured process for planning, creating, testing, and deploying software systems through defined phases including requirements analysis, design, implementation, testing, deployment, and maintenance. It helps teams plan, execute, and deliver projects on time and within scope through structured methodologies.
Citation File Format providing machine-readable citation metadata for software projects, enabling proper academic attribution and referencing.
Document defining standards for community engagement, acceptable behavior, and enforcement procedures for project participants.
A software development approach that focuses on modeling software to match a domain according to input from domain experts, emphasizing collaboration between technical and domain experts to create a shared understanding through ubiquitous language. It is used across a range of industries and technical contexts to improve efficiency and outcomes.
Structured documentation outlining test objectives, scope, approach, resources, schedule, and deliverables for software testing activities. It supports the full software development lifecycle from design through deployment and maintenance.
A data-driven methodology and set of techniques for process improvement that seeks to reduce defects and variability in business processes to achieve near-perfect quality (3.4 defects per million opportunities). Organizations adopt it to address specific technical or business challenges in their environments.
Machine Learning Operations - practices and tools for deploying, monitoring, and maintaining machine learning models in production environments. It is increasingly applied across industries to automate complex tasks, uncover patterns, and drive innovation.
Reusable solutions to commonly occurring problems in software design, including creational, structural, and behavioral patterns that help developers write more maintainable and scalable code. Organizations adopt it to address specific technical or business challenges in their environments.
A tool or practice for capturing software requirements from an end-user perspective, typically following the format "As a [user], I want [goal], so that [benefit]". Teams use it to align stakeholders, track progress, and adapt to changing requirements throughout the project lifecycle.
DNS (Domain Name System) is the distributed naming system that translates human-readable domain names (like example.com) into the numerical IP addresses computers use to communicate. It functions as the internet's phone book, enabling users to access websites and services using memorable names instead of numeric addresses.
Convention Over Configuration is a specialized technology or methodology in the convention domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
ITIL is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
ITSM is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Reusable solutions to commonly occurring problems in software design, providing templates for how to solve problems in various contexts. Organizations adopt it to address specific technical or business challenges in their environments.
Occupational Safety and Health Administration - U.S. federal agency responsible for setting and enforcing workplace safety and health standards
BDD is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Design Standards is a specialized technology or methodology in the design domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
Frameworks and documented guidelines that establish security requirements, controls, and best practices for protecting organizational assets and information systems. It plays a critical role in protecting organizational assets and maintaining a strong security posture.
File recognizing individuals and organizations that have contributed to a project through code, documentation, design, or other means.
A methodology that combines Lean manufacturing principles and Six Sigma quality management techniques to improve business processes by eliminating waste and reducing variation, focusing on data-driven decision making and continuous improvement. Organizations adopt it to address specific technical or business challenges in their environments.
FinOps is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
OAuth is an open authorization framework that enables third-party applications to access user resources without exposing credentials. It provides a secure, token-based delegation mechanism widely used across the web for granting limited access to APIs and services on behalf of users.
A security framework that requires all users and devices to be authenticated, authorized, and continuously validated before being granted access to applications and data, regardless of whether they are inside or outside the network perimeter. Organizations rely on it to strengthen their defenses and meet evolving cybersecurity challenges.
A security framework that requires all users and devices to be authenticated, authorized, and continuously validated before being granted access to applications and data, regardless of whether they are inside or outside the network perimeter. It is widely adopted across industries to safeguard digital assets and reduce security risks.
ACID (Atomicity, Consistency, Isolation, Durability) is a set of properties that guarantee database transactions are processed reliably even in the face of errors, power failures, or system crashes. These four properties ensure that data remains accurate and consistent, making ACID compliance a fundamental requirement for relational databases and financial systems.
A sequential software development methodology where progress flows steadily downwards through phases of conception, initiation, analysis, design, construction, testing, deployment, and maintenance. It supports the full software development lifecycle from design through deployment and maintenance.
A software development approach where tests are written before the actual code, following a red-green-refactor cycle to ensure code quality and maintainability. It supports the full software development lifecycle from design through deployment and maintenance.
A graphical representation of data flow through a system, showing how data is processed, stored, and transformed between different components and external entities. Organizations adopt it to address specific technical or business challenges in their environments.
A VPN (Virtual Private Network) creates an encrypted tunnel between a user's device and a remote network, protecting data from interception and masking the user's IP address. It is widely used for secure remote access to corporate networks, protecting privacy on public Wi-Fi, and bypassing geographic content restrictions.
California Consumer Privacy Act - A state statute intended to enhance privacy rights and consumer protection for residents of California, USA. Provides consumers with rights to know what personal information is collected, delete personal data, opt-out of data sales, and non-discrimination for exercising privacy rights.
Frameworks and guidelines that establish best practices for protecting information systems, networks, and data from cyber threats, including standards like NIST, ISO 27001, and CIS Controls. It is widely adopted across industries to safeguard digital assets and reduce security risks.
Structured scenarios that verify software functionality by defining inputs, execution conditions, and expected results to ensure quality and correctness. It is widely used by developers to build, maintain, and scale software applications efficiently.
Inversion Of Control is a specialized technology or methodology in the inversion domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
Role-Based Access Control (RBAC) is a security paradigm that restricts system access based on assigned roles rather than individual user identities. Users are granted permissions through their role membership, simplifying access management and ensuring principle of least privilege.
SOAP (Simple Object Access Protocol) is a messaging protocol for exchanging structured information in web services using XML over HTTP and other transport protocols. It provides built-in standards for security, transactions, and reliability, making it a common choice for enterprise integrations and legacy system communication.
Visual representations that illustrate the sequential steps and decision points in a process, showing how inputs are transformed into outputs through various activities and pathways. It is used across a range of industries and technical contexts to improve efficiency and outcomes.
The fifth major version of the Hypertext Markup Language, used for structuring and presenting content on the web. It is widely used by developers to build, maintain, and scale software applications efficiently.
Kanban is a visual workflow management method that uses boards and cards to represent work items flowing through defined stages. It emphasizes continuous delivery, work-in-progress limits, and incremental improvements, helping teams optimize throughput and identify bottlenecks in their processes.
Schema Validation is a specialized technology or methodology in the schema domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
A query language for APIs and a runtime for executing those queries with existing data, providing a complete and understandable description of the data in your API.
The process of defining the structure, organization, and relationships of data in a database system, including tables, columns, constraints, and indexes to optimize data storage and retrieval. Effective implementation supports data-driven strategies and helps maintain data integrity across systems.
Development, Security, and Operations methodology that integrates security practices within the DevOps process, emphasizing security automation and collaboration throughout the software development lifecycle. It is widely adopted across industries to safeguard digital assets and reduce security risks.
A software development approach where tests are written before the implementation code, ensuring code quality and driving design decisions through test requirements. It is widely used by developers to build, maintain, and scale software applications efficiently.
QoS is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Quality Of Service provides specialized quality of capabilities delivered as a managed offering, often accessible via APIs or cloud interfaces. It allows organizations to leverage quality of functionality without building and maintaining the underlying infrastructure themselves.
Documented procedures and step-by-step instructions for handling routine operations, troubleshooting issues, and responding to incidents in IT systems and infrastructure. It reduces manual effort and human error while increasing throughput and operational consistency.
Standardized rules and conventions for communication between network devices, including protocols like TCP/IP, HTTP, DNS, and others that enable data exchange across networks. It is fundamental to modern network architectures and enables reliable communication between systems.
A system of processes, procedures, and documentation that ensures products are consistently produced and controlled according to quality standards, commonly used in pharmaceutical, food, and medical device manufacturing. Proper implementation reduces legal and operational risk while supporting audit readiness.
A set of rules and standards that define how data is transmitted securely over networks, including protocols like SSL/TLS, HTTPS, SSH, and IPsec that provide encryption, authentication, and data integrity. It plays a critical role in protecting organizational assets and maintaining a strong security posture.
FTP is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
SSH (Secure Shell) is a cryptographic network protocol for secure remote login, command execution, and file transfer between computers over unsecured networks. It provides strong encryption, authentication, and data integrity, replacing insecure protocols like Telnet and serving as a fundamental tool for system administration and DevOps.
RPC is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Health Insurance Portability and Accountability Act - U.S. legislation providing data privacy and security provisions for safeguarding medical information
SAML (Security Assertion Markup Language) is an XML-based open standard for exchanging authentication and authorization data between identity providers and service providers. It enables single sign-on (SSO) across different applications and domains, reducing the need for users to manage multiple sets of credentials.
Flowcharts is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Automated scripts used to verify software functionality, validate code behavior, and ensure quality through repeatable testing procedures. It supports the full software development lifecycle from design through deployment and maintenance.
UML is an artificial intelligence technology or practice that leverages machine learning, data analysis, or intelligent automation to solve complex problems. It is increasingly applied across industries to improve efficiency, accuracy, and decision-making in both technical and business contexts.
An iterative approach to project management and software development that helps teams deliver value to customers faster and with fewer headaches through collaboration, adaptability, and continuous improvement. It is widely used by developers to build, maintain, and scale software applications efficiently.
Guidelines and technical specifications that ensure digital content, applications, and technologies are usable by people with disabilities, including standards like WCAG, Section 508, and ARIA. It helps organizations meet regulatory requirements and demonstrate accountability to stakeholders.
Low-fidelity visual representations of user interface layouts used in early design stages to establish structure, hierarchy, and functionality before high-fidelity design work begins. It is used across a range of industries and technical contexts to improve efficiency and outcomes.
Architecture Pattern is a specialized technology or methodology in the architecture domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
Configuration Language is a specialized technology or methodology in the configuration domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
MVC is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Visual representations or prototypes of user interfaces and designs used to demonstrate the look and feel of a product before development. It is used across a range of industries and technical contexts to improve efficiency and outcomes.
Prioritized list of features, enhancements, and fixes that represent work to be done in a product development process, typically used in Agile and Scrum methodologies. Teams use it to align stakeholders, track progress, and adapt to changing requirements throughout the project lifecycle.
Network architecture approach that enables dynamic, programmatically efficient network configuration to improve performance and monitoring by decoupling the network control plane from the data plane. It is a key component of modern cloud-native architectures and digital transformation strategies.
DSL is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
OIDC is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
OpenID Connect is a specialized technology or methodology in the openid domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
Open Web Application Security Project - A nonprofit foundation that works to improve the security of software through community-led open source projects, hundreds of chapters worldwide, and educational resources. It is widely adopted across industries to safeguard digital assets and reduce security risks.
A software development approach that prioritizes security from the initial design phase through implementation, ensuring security considerations are built into the foundation of systems rather than added as an afterthought. It is widely adopted across industries to safeguard digital assets and reduce security risks.
Sketches is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment. It plays a critical role in protecting organizational assets and maintaining a strong security posture.
Communication Protocols is a networking technology or protocol that facilitates communication, data transfer, or traffic management between systems and devices. It enables reliable, efficient, and secure connectivity across local and distributed network environments.
Framework and guidelines for ensuring accuracy, completeness, consistency, validity, and timeliness of data across an organization's data assets and systems. It is a foundational component in modern data architectures and enterprise data management practices.
A data architecture paradigm that combines the best features of data lakes and data warehouses, providing ACID transactions, schema enforcement, and governance on low-cost storage with support for both business intelligence and machine learning workloads. Effective implementation supports data-driven strategies and helps maintain data integrity across systems.
Reusable solutions to commonly occurring problems in software architecture that provide templates for designing system structure, component interactions, and overall organization of applications. It is used across a range of industries and technical contexts to improve efficiency and outcomes.
DHCP is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
SCADA is a visual computing technology used for creating, processing, or displaying graphical content. It supports applications in design, simulation, entertainment, and data visualization.
RDP is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
A sequence of characters that define a search pattern, commonly used for string matching, validation, and text manipulation in programming and data processing. It supports the full software development lifecycle from design through deployment and maintenance.
Reusable solutions and best practices for organizing software system architecture, including patterns like MVC, Microservices, Layered Architecture, Event-Driven, and CQRS that provide proven approaches to common design problems. It is used across a range of industries and technical contexts to improve efficiency and outcomes.
Lightweight Directory Access Protocol - an industry-standard protocol for accessing and maintaining distributed directory information services over an IP network. It plays a critical role in protecting organizational assets and maintaining a strong security posture.
A security framework that eliminates implicit trust and requires continuous verification of all users, devices, and applications attempting to access resources, regardless of their location inside or outside the network perimeter. It is widely adopted across industries to safeguard digital assets and reduce security risks.
Big O Notation is a specialized technology or methodology in the big domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
File Format is a specialized technology or methodology in the file domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
WCAG is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Financial Regulation is a financial management concept, tool, or practice used to manage monetary operations, reporting, or compliance. It helps organizations maintain accurate financial records, optimize cash flow, and meet regulatory requirements.
JPA is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Normalization is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
A messaging pattern where publishers send messages to topics without knowledge of subscribers, and subscribers receive messages from topics they're interested in, enabling asynchronous and decoupled communication between services. Modern distributed architectures rely on it to coordinate workloads across multiple nodes and regions.
Jakarta EE is a specialized technology or methodology in the jakarta domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
Java EE is a specialized technology or methodology in the java domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
Framework of rules and guidelines that govern how organizations collect, store, process, and share personal data to protect individual privacy rights and ensure compliance with regulations like GDPR, CCPA, and other data protection laws. Organizations rely on it to strengthen their defenses and meet evolving cybersecurity challenges.
Banking Regulation is a specialized technology or methodology in the banking domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
A operational framework that takes DevOps best practices used for application development such as version control, collaboration, compliance, and CI/CD, and applies them to infrastructure automation. GitOps uses Git as a single source of truth for declarative infrastructure and applications.
RDF is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Technology Standards is a specialized technology or methodology in the technology domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
A collection of organized test cases designed to validate specific functionality or features of software applications. It is widely used by developers to build, maintain, and scale software applications efficiently.
Partitioning is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
File listing the original creators and primary authors of a project, often required by certain open-source licenses.
A framework and approach that embeds privacy protections into the design and operation of IT systems, networked infrastructure, and business practices from the ground up, rather than as an afterthought. It is widely adopted across industries to safeguard digital assets and reduce security risks.
JMS is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
An open-source framework for designing, building, documenting, and consuming RESTful web services. Swagger provides a specification (OpenAPI) and tools for API development including interactive documentation, code generation, and API testing capabilities.
IT Standards is a specialized technology or methodology in the it domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
A software development approach that integrates security considerations and practices from the initial design phase through the entire development lifecycle, rather than adding security as an afterthought. It plays a critical role in protecting organizational assets and maintaining a strong security posture.
A central bank regulation requiring commercial banks to hold a minimum percentage of customer deposits as reserves, either as cash in their vaults or as deposits with the central bank, to ensure liquidity and stability in the banking system. It is used across a range of industries and technical contexts to improve efficiency and outcomes.
Data Format is a data technology or practice used to collect, process, store, analyze, or govern information assets. It helps organizations extract value from their data and make informed decisions through systematic data management.
Monolithic Architecture is a structural design approach that defines how monolithic components are organized, interact, and scale within a system. It provides a blueprint for building maintainable, performant, and resilient solutions that meet both current and future requirements.
Circuit Breaker is a specialized technology or methodology in the circuit domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
SFTP is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Schema Design is a specialized technology or methodology in the schema domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
Development Methodology is a software development technology or practice that supports the creation, maintenance, or improvement of software systems. It helps developers and engineering teams work more efficiently and deliver higher-quality software products.
A systematic approach or framework for planning, executing, and controlling projects to achieve specific goals within defined constraints of time, budget, and resources. It helps teams plan, execute, and deliver projects on time and within scope through structured methodologies.
Advanced certification in Lean Six Sigma methodology focused on leading complex improvement projects, statistical analysis, and change management to reduce defects and variability in business processes. It helps teams plan, execute, and deliver projects on time and within scope through structured methodologies.
JSF is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
A data modeling technique used in data warehousing that structures data into fact tables containing measurable metrics and dimension tables containing descriptive attributes, optimized for query performance and business intelligence reporting. Organizations use it to track key metrics, identify trends, and optimize business outcomes.
JCR is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
OData is a data technology or practice used to collect, process, store, analyze, or govern information assets. It helps organizations extract value from their data and make informed decisions through systematic data management.
Disclosure Requirements is a specialized technology or methodology in the disclosure domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
Documentation that defines the requirements, procedures, and expected outcomes for testing software systems. Effective use of this practice reduces bugs in production and supports a culture of quality-driven development.
A database design approach that organizes data into tables (relations) with rows and columns, establishing relationships between tables through keys to ensure data integrity and minimize redundancy. It is used across a range of industries and technical contexts to improve efficiency and outcomes.
Component Model is a specialized technology or methodology in the component domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
NFC is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
An international standard query language for property graph databases, developed by ISO/IEC to provide a declarative way to query and manipulate graph data structures. Effective implementation supports data-driven strategies and helps maintain data integrity across systems.
Organizational patterns for structuring data in warehouses, including star schema, snowflake schema, and galaxy schema designs that optimize query performance and data relationships. Organizations use it to track key metrics, identify trends, and optimize business outcomes.
Capital Requirements is a specialized technology or methodology in the capital domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
Health Standards is a specialized technology or methodology in the health domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
Kerberos is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
VNC is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
CNCF is a manufacturing or industrial technology used to design, produce, or manage physical products and production processes. It leverages automation, precision engineering, and digital controls to improve quality, efficiency, and throughput.
JDBC is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Schema Evolution is a specialized technology or methodology in the schema domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
XSLT (Extensible Stylesheet Language Transformations) is a language for transforming XML documents into other formats such as HTML, plain text, or different XML structures. It uses template-based rules and XPath expressions to select and restructure XML data, commonly used in data integration and document publishing pipelines.
Apache Parquet is an open source, column-oriented data file format designed for efficient data storage and retrieval. It provides efficient data compression and encoding schemes with enhanced performance to handle complex data in bulk.
Federal regulations governing the safety, efficacy, and security of food, drugs, medical devices, and other products under FDA jurisdiction. Organizations adopt it to address specific technical or business challenges in their environments.
RFID is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Document tracking notable changes between project versions, following conventions like Keep a Changelog. Lists additions, fixes, deprecations, and breaking changes.
A framework that integrates security practices into every phase of the software development process, from design and development through testing and deployment, to identify and mitigate vulnerabilities early. It is widely adopted across industries to safeguard digital assets and reduce security risks.
Lean Operations is a business or enterprise practice that helps organizations manage operations, make strategic decisions, and achieve their objectives. It encompasses the processes, tools, and methodologies needed to run an effective and efficient organization.
SMTP is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Documentation that defines the contract between different software components, including API endpoints, data formats, protocols, and integration requirements. It is used across a range of industries and technical contexts to improve efficiency and outcomes.
Design patterns and architectural approaches for building microservices and service-oriented applications. Modern distributed architectures rely on it to coordinate workloads across multiple nodes and regions.
Gherkin is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Pre-built document templates for generating standardized reports, dashboards, and data presentations with consistent formatting and structure. Organizations use it to track key metrics, identify trends, and optimize business outcomes.
Specifications and guidelines that define how web technologies should work, ensuring interoperability and consistency across browsers and platforms. It supports the full software development lifecycle from design through deployment and maintenance.
A framework that integrates security practices and considerations into every phase of the software development process, from initial design through deployment and maintenance, to minimize vulnerabilities and ensure secure applications. It is used across a range of industries and technical contexts to improve efficiency and outcomes.
A security framework that requires strict identity verification for every person and device attempting to access resources on a network, regardless of whether they are inside or outside the network perimeter. ZTNA operates on the principle of "never trust, always verify" and provides granular access control based on user identity, device posture, and context.
Table Format is a specialized technology or methodology in the table domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
Standard repository documentation file providing project overview, setup instructions, and usage examples. Automatically displayed on repository landing pages by GitHub, GitLab, and other hosting platforms.
RTSP is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Sharding is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
A security design principle where systems and software are configured with the most secure settings from the initial deployment, requiring users to explicitly opt-in to less secure options rather than having to manually enable security features. It plays a critical role in protecting organizational assets and maintaining a strong security posture.
Network protocols that create encrypted tunnels for secure data transmission over untrusted networks, including VPN technologies like IPsec, SSL/TLS, WireGuard, and SSH tunneling for protecting communication channels. It is widely adopted across industries to safeguard digital assets and reduce security risks.
Programming Paradigm is a software development technology or practice that supports the creation, maintenance, or improvement of software systems. It helps developers and engineering teams work more efficiently and deliver higher-quality software products.
Underwriting Standards is a specialized technology or methodology in the underwriting domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
WSDL is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Modeling Language is a visual computing technology used for creating, processing, or displaying graphical content. It supports applications in design, simulation, entertainment, and data visualization.
Agile Software Development Life Cycle is an iterative and incremental approach to software development that emphasizes flexibility, collaboration, and rapid delivery of working software through short development cycles called sprints. It is widely used by developers to build, maintain, and scale software applications efficiently.
Department of Transportation regulations governing the safe transportation of hazardous materials and other commercial transport activities in the United States. It helps organizations meet regulatory requirements and demonstrate accountability to stakeholders.
Basel III is a specialized technology or methodology in the basel domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
CQRS is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Messaging Protocol is a networking technology or protocol that facilitates communication, data transfer, or traffic management between systems and devices. It enables reliable, efficient, and secure connectivity across local and distributed network environments.
An open and independent enterprise architecture modeling language to support the description, analysis and visualization of architecture within and across business domains in an unambiguous way.
IMAP is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
SPARQL is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Markup Language is a specialized technology or methodology in the markup domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
Reusable prompt template files for AI coding assistants, defining task-specific instructions that can be executed from chat interfaces. Used for standardizing common development tasks like code review, refactoring, and test generation.
A collection of serverless architectures and patterns for building applications on AWS, featuring ready-to-use templates and best practices for Lambda, API Gateway, EventBridge, and other serverless services. Cloud adoption of this technology supports flexibility, cost optimization, and rapid deployment.
openCypher is an open-source project that provides a standardized graph query language originally developed by Neo4j for querying property graphs. It enables developers to write expressive pattern-matching queries against graph databases, and its specification has been adopted by multiple graph database vendors.
Gantt Charts is a specialized technology or methodology in the gantt domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
ISO Standard is a specialized technology or methodology in the iso domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
A text file that contains instructions for building Docker container images, defining the application environment, dependencies, and configuration in a reproducible way. It accelerates software delivery cycles and improves collaboration between development and operations teams.
A software architecture pattern that separates an application into logical layers or tiers, typically presentation, business logic, and data access layers, to improve modularity, scalability, and maintainability. It is used across a range of industries and technical contexts to improve efficiency and outcomes.
An architectural pattern that structures a monolithic application into loosely coupled, well-defined modules with clear boundaries and dependencies, combining the operational simplicity of a monolith with the organizational benefits of modular design. Organizations adopt it to address specific technical or business challenges in their environments.
AMQP (Advanced Message Queuing Protocol) is an open standard application-layer protocol for message-oriented middleware supporting reliable queuing, routing, and publish/subscribe messaging patterns. It enables interoperable, asynchronous communication between applications and services across different platforms and languages.
Gremlin is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Reserve Requirements is a specialized technology or methodology in the reserve domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
GitHub Dependabot configuration file defining automated dependency update schedules, package ecosystems to monitor, and review assignment rules.
A development approach where APIs are treated as first-class citizens and designed before implementation begins, ensuring consistent and well-documented interfaces across services and applications. Organizations adopt it to address specific technical or business challenges in their environments.
A development approach where code is the primary source of truth, with database schemas, API definitions, or infrastructure configurations generated from the code rather than designed separately or visually. Organizations adopt it to address specific technical or business challenges in their environments.
JAX-WS is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
OSGi is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
POSIX is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Standards and methodologies for managing changes and updates to APIs, software interfaces, and data formats while maintaining backward compatibility and clear communication of breaking changes. It is widely used by developers to build, maintain, and scale software applications efficiently.
A text file containing instructions for building container images, compatible with Docker's Dockerfile format and commonly used with Podman and other OCI-compliant tools. It accelerates software delivery cycles and improves collaboration between development and operations teams.
Binary Format is a specialized technology or methodology in the binary domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
Database Normalization is a data storage and management technology designed to organize, persist, and efficiently retrieve structured or semi-structured information. It supports the data needs of applications and analytics systems through reliable storage, querying, and transaction management.
File crediting third-party software, libraries, inspirations, and other works that the project builds upon or is indebted to.
Basel Compliance ensures that basel practices and systems adhere to relevant laws, regulations, industry standards, and internal policies. It helps organizations avoid legal penalties, maintain trust, and demonstrate accountability to regulators and stakeholders.
JSON Binding is a specialized technology or methodology in the json domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
MXML is an artificial intelligence technology or practice that leverages machine learning, data analysis, or intelligent automation to solve complex problems. It is increasingly applied across industries to improve efficiency, accuracy, and decision-making in both technical and business contexts.
Configuration file for Cursor AI code editor containing project-specific rules, coding conventions, and behavioral instructions for the AI assistant.
An open source specification and tool for real-time cost monitoring of Kubernetes infrastructure and cloud spending, enabling teams to measure, allocate, and optimize cloud costs across workloads.
A collaborative visualization tool used to articulate what we know about a particular type of user. It externalizes knowledge about users in order to create a shared understanding of user needs, and aid in decision making.
Pre-designed templates for organizing and filing tax documents and returns. Financial institutions and enterprises use it to streamline operations and manage fiscal responsibilities.
Pre-built templates and frameworks for meeting regulatory compliance requirements across various industries and jurisdictions. Proper implementation reduces legal and operational risk while supporting audit readiness.
Pre-built templates and frameworks for generating tax reports, compliance documents, and financial summaries required for tax filing and regulatory purposes. It helps organizations meet regulatory requirements and demonstrate accountability to stakeholders.
Bean Validation is a specialized technology or methodology in the bean domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
DFDL is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Fixed Format is a specialized technology or methodology in the fixed domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
JSON Processing is a specialized technology or methodology in the json domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
JSR-303 is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.
Pig Latin is a specialized technology or methodology in the pig domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
Schema Free is a specialized technology or methodology in the schema domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.
File defining individuals or teams responsible for code in a repository. Used by GitHub and GitLab to automatically request reviews from designated owners on pull requests.
Template file that pre-populates new issue forms with structured sections, guiding contributors to provide necessary information when reporting bugs or requesting features.
Template file that pre-populates pull request descriptions with structured sections like change summary, testing steps, and checklist items.
Open standard file for guiding AI coding agents, providing project context, coding standards, build commands, and development practices. Supported by OpenAI Codex, Google Jules, Cursor, Amp, and other tools. Stewarded by the Agentic AI Foundation under the Linux Foundation.
Vendor-neutral AI coding agent configuration file providing project context and instructions. Alternative to AGENTS.md serving the same purpose of unifying agent guidance across tools.
Configuration file for Claude Code providing project-specific context, coding conventions, build commands, and behavioral instructions that persist across sessions.
Configuration file for Google Gemini CLI providing project context, coding standards, and development instructions for AI-assisted coding workflows.
Configuration file for Google Jules AI coding agent, providing project-specific instructions, architecture context, and coding standards.
Configuration file for OpenAI Codex CLI providing project instructions, coding conventions, and build commands for AI-assisted development.
GitHub Copilot custom instructions file placed in .github/ directory, providing repository-specific coding standards, framework preferences, and behavioral guidelines for Copilot Chat and coding agent.
File-scoped custom instruction files for GitHub Copilot and VS Code, using applyTo patterns to target specific file types or tasks with tailored AI guidance.
Configuration file for Windsurf AI code editor containing project-specific rules, coding conventions, and instructions for the Cascade AI assistant.
Configuration file for Cline AI coding assistant providing project-specific rules, coding conventions, and behavioral instructions.
Configuration file for Roo Code AI coding assistant providing project-specific rules and coding conventions.
Project conventions file documenting coding standards, naming conventions, architecture decisions, and development practices. Used by AI coding assistants and human developers alike.
Configuration file specifying files and directories that AI coding agents should not process or modify, similar to .gitignore but for AI tools. Used by JetBrains Junie and other AI agents.
JetBrains Junie AI agent configuration file stored in .junie/ directory providing persistent project-level context and coding guidelines.
Git configuration file specifying intentionally untracked files and directories that Git should ignore, preventing build artifacts, dependencies, and secrets from being committed.
Git configuration file defining path-specific settings for line endings, diff handling, merge strategies, and binary file detection.
Cross-editor configuration file defining coding style preferences like indentation, line endings, and character encoding to maintain consistent formatting across different editors and IDEs.
GitHub configuration file specifying funding platforms and links for project sponsorship, displayed as a Sponsor button on the repository page.
Renovate bot configuration file for automated dependency updates, supporting multiple package managers and customizable update strategies.
Model Context Protocol configuration file defining MCP server connections for AI coding assistants, enabling tool integration and enhanced AI capabilities.