Standards

These are some of the top open-source standards we have identified in use across all of the companies we are profiling. We have prioritized the standards that are relevant to conversations we are having and a variety of capabilities we are working to develop.

294
Standards
253
companies
86%
Acceptance Criteria Optimizing

Predefined conditions that a product, feature, or user story must meet to be considered complete and acceptable by stakeholders. These criteria establish clear, testable requirements that guide development and validate when work is done.

Agile Requirements Testing Quality Assurance User Stories
253
companies
86%

A design pattern in which objects receive their dependencies from external sources rather than creating them internally, promoting loose coupling and easier testing. Effective use of this practice reduces bugs in production and supports a culture of quality-driven development.

Design Patterns Software Architecture Testing Inversion Of Control
253
companies
86%
Entity Relationship Optimizing

Entity Relationship is a specialized technology or methodology in the entity domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Entity Relationship
253
companies
86%
Event Sourcing Optimizing

Event Sourcing is a specialized technology or methodology in the event domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Event Sourcing
253
companies
86%
Lean Manufacturing Optimizing

Lean Manufacturing is a manufacturing or industrial technology used to design, produce, or manage physical products and production processes. It leverages automation, precision engineering, and digital controls to improve quality, efficiency, and throughput.

Lean Manufacturing
253
companies
86%
Object Oriented Programming Optimizing

Object-Oriented Programming is a software development technology or practice that supports the creation, maintenance, or improvement of software systems. It helps developers and engineering teams work more efficiently and deliver higher-quality software products.

Object-Oriented Programming
253
companies
86%
TCP/IP Optimizing

TCP/IP (Transmission Control Protocol/Internet Protocol) is the foundational communication protocol suite that powers the internet and most computer networks. It provides reliable, ordered delivery of data between applications across diverse network hardware through a layered architecture of protocols.

TCP/IP
250
companies
85%
WebSockets Optimizing

A communication protocol providing full-duplex communication channels over a single TCP connection, enabling real-time data exchange between client and server. It is fundamental to modern network architectures and enables reliable communication between systems.

Real-Time Communication Web Technology Networking Bidirectional Communication
249
companies
85%
SecOps Optimizing

Security Operations - the practice of integrating security practices into IT operations to identify, manage, and respond to security threats and vulnerabilities in real-time while maintaining system performance and availability. It plays a critical role in protecting organizational assets and maintaining a strong security posture.

Security Operations DevSecOps Incident Response Threat Management
249
companies
85%
SSO Optimizing

SSO is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

SSO
245
companies
83%
REST Optimizing

REST (Representational State Transfer) is an architectural style for designing networked applications that uses stateless communication and standard HTTP methods to interact with resources identified by URLs. Its simplicity, scalability, and alignment with the web's architecture have made it the dominant approach for building web APIs.

API Web Services Architecture HTTP
245
companies
83%
SECURITY.md Optimizing

Security policy document describing supported versions, vulnerability reporting procedures, and responsible disclosure guidelines for a project.

Security Vulnerability Disclosure Repository Policy
244
companies
83%
ISO Optimizing

The International Organization for Standardization (ISO) develops and publishes international standards covering technology, manufacturing, food safety, and many other industries. ISO standards provide globally recognized frameworks that help organizations ensure quality, safety, interoperability, and consistency in their products and processes.

Standards Certification Quality Management
243
companies
83%
SUPPORT.md Optimizing

File describing how users can get help with a project, including links to documentation, forums, issue trackers, and support channels.

Documentation Community Support Repository
241
companies
82%
NIST Optimizing

National Institute of Standards and Technology - develops and promotes measurement standards, cybersecurity frameworks, and technology guidelines

Standards Cybersecurity Government Compliance
239
companies
81%
SAFe Agile Optimizing

Scaled Agile Framework (SAFe) is an enterprise-scale agile framework that provides guidance for implementing agile practices across large organizations with multiple teams working together. Teams use it to align stakeholders, track progress, and adapt to changing requirements throughout the project lifecycle.

Agile Framework Enterprise Project Management Scaled Agile
239
companies
81%
Scaled Agile Optimizing

Scaled Agile is a project management practice or tool that helps teams plan, organize, and execute work effectively. It supports structured collaboration, progress tracking, and adaptive planning to deliver results on time and within scope.

Scaled Agile
238
companies
81%
Write Ahead Log Optimizing

A Write-Ahead Log (WAL) is a standard technique in database systems where changes are first recorded to a sequential log file before being applied to the actual data files. It ensures durability and crash recovery by guaranteeing that committed transactions can be reconstructed from the log even if the system fails during a write operation.

Write Ahead Log
230
companies
78%
Lean Management Optimizing

Lean Management is the discipline of planning, organizing, and overseeing lean-related activities to achieve optimal outcomes. It encompasses the processes, tools, and strategies needed to effectively coordinate and control lean resources across an organization.

Lean Management
228
companies
78%
HTML Optimizing

HTML is an artificial intelligence technology or practice that leverages machine learning, data analysis, or intelligent automation to solve complex problems. It is increasingly applied across industries to improve efficiency, accuracy, and decision-making in both technical and business contexts.

HTML
224
companies
76%
Protocol Buffers Optimizing

Protocol Buffers is a networking technology or protocol that facilitates communication, data transfer, or traffic management between systems and devices. It enables reliable, efficient, and secure connectivity across local and distributed network environments.

Protocol Buffers
219
companies
75%
Functional Programming Optimizing

Functional Programming is a software development technology or practice that supports the creation, maintenance, or improvement of software systems. It helps developers and engineering teams work more efficiently and deliver higher-quality software products.

Functional Programming
219
companies
75%
Regulation Optimizing

Regulation is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

Regulation Regulations
218
companies
74%

Documented step-by-step instructions for routine operations and processes to ensure consistency, quality, and compliance across an organization. It is essential for organizations operating in regulated industries with strict oversight requirements.

Process Management Documentation Quality Assurance Compliance Operations
218
companies
74%
Actor Model Optimizing

The Actor Model is a mathematical model of concurrent computation where the fundamental unit of computation is an actor—an entity that processes messages asynchronously and maintains its own private state. It provides a powerful abstraction for building highly concurrent and distributed systems, used in frameworks like Akka and languages like Erlang.

Actor Model
218
companies
74%
IAM Optimizing

IAM is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

IAM
217
companies
74%
Regulatory Optimizing

Regulatory is a compliance-related concept that helps organizations meet regulatory requirements and maintain adherence to industry standards. It supports audit readiness, risk management, and the demonstration of accountability to regulators and stakeholders.

Regulatory
213
companies
72%
Methodology Optimizing

Methodology is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

Methodology Methodologies
211
companies
72%

A software architecture pattern promoting the production, detection, consumption of, and reaction to events. Systems are designed to respond to state changes asynchronously through event messages.

Architecture Event Driven Messaging Asynchronous Distributed Systems
211
companies
72%
LICENSE.md Optimizing

File specifying the legal license under which a project is distributed, defining permissions, conditions, and limitations for use and redistribution.

Legal Open Source Licensing Compliance
205
companies
70%
Agile Optimizing

Agile is a set of software development principles and practices that emphasize iterative delivery, collaboration, and responsiveness to change over rigid planning and documentation. Its frameworks—including Scrum, Kanban, and XP—help teams deliver working software incrementally and adapt quickly to evolving requirements.

Project Management Software Development Methodology Iterative Development
205
companies
70%
Agile Methodology Optimizing

An iterative approach to software development and project management that emphasizes flexibility, collaboration, and customer feedback. Agile methodologies include frameworks like Scrum, Kanban, and XP that focus on delivering working software in short cycles.

Agile Methodology Project Management Software Development Iterative Development Collaboration
204
companies
69%
SSL/TLS Optimizing

SSL/TLS is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

SSL/TLS
202
companies
69%
SQL Optimizing

SQL (Structured Query Language) is the standard programming language for managing and querying relational databases. It provides commands for creating, reading, updating, and deleting data, as well as defining schemas, managing permissions, and performing complex analytical queries.

Database Query Language Data Management
200
companies
68%
CONTRIBUTING.md Established

Guidelines for contributing to a project, including coding standards, pull request processes, issue reporting, and development setup instructions.

Documentation Collaboration Open Source Developer Guidelines
198
companies
67%
MapReduce Established

MapReduce is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

MapReduce
195
companies
66%
HTTP/2 Established

HTTP/2 is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

HTTP/2
193
companies
66%
OpenAPI Optimizing

OpenAPI (formerly Swagger Specification) is a standard, language-agnostic specification for describing RESTful APIs in a machine-readable format. It enables automated documentation generation, client code generation, and API testing, serving as a contract between API providers and consumers.

API Specification REST Documentation
187
companies
64%
RACI Optimizing

A responsibility assignment matrix that defines roles and responsibilities using four key designations - Responsible (those who do the work), Accountable (the ultimate decision maker), Consulted (those whose input is needed), and Informed (those who need to be kept updated). RACI matrices help clarify ownership, reduce confusion, and improve project coordination by mapping stakeholders to specific tasks or deliverables.

Project Management Team Collaboration Decision Making Stakeholder Management
182
companies
62%
Prototypes Optimizing

Early models or preliminary versions of products built to test areas, validate designs, and gather feedback before full-scale production or development. Effective use of this practice reduces bugs in production and supports a culture of quality-driven development.

Product Development Design Testing Innovation
182
companies
62%
CSS Established

CSS is a web development technology or practice used to build, enhance, or manage web-based applications and experiences. It supports the creation of responsive, performant, and interactive digital products accessible through web browsers.

CSS
180
companies
61%
Quality Standards Optimizing

Frameworks and benchmarks that define acceptable levels of quality for products, services, or processes to ensure consistency and meet customer expectations. Proper implementation reduces legal and operational risk while supporting audit readiness.

Quality Assurance Compliance Process Improvement Best Practices
176
companies
60%
DevOps Optimizing

DevOps is a cultural and technical movement that combines software development and IT operations to shorten the development lifecycle and deliver high-quality software continuously. It emphasizes automation, collaboration, monitoring, and infrastructure as code to bridge the gap between building software and running it in production.

DevOps Automation CI/CD Continuous Integration Continuous Deployment
174
companies
59%

Design patterns and best practices for integrating different software systems and applications, including messaging, data transformation, and service orchestration approaches. Organizations adopt it to address specific technical or business challenges in their environments.

Software Architecture System Integration Design Patterns Enterprise Architecture
174
companies
59%
Enterprise Integration Patterns Established

Enterprise Integration Patterns is a business or enterprise practice that helps organizations manage operations, make strategic decisions, and achieve their objectives. It encompasses the processes, tools, and methodologies needed to run an effective and efficient organization.

Enterprise Integration Patterns
171
companies
58%
Reactive Programming Established

Reactive Programming is a software development technology or practice that supports the creation, maintenance, or improvement of software systems. It helps developers and engineering teams work more efficiently and deliver higher-quality software products.

Reactive Programming
168
companies
57%
JSON Optimizing

JSON (JavaScript Object Notation) is a lightweight data interchange format that uses human-readable text to represent structured data as key-value pairs and arrays. It has become the de facto standard for data exchange in web APIs, configuration files, and NoSQL databases due to its simplicity and broad language support.

Data Format Serialization Web Development
166
companies
56%
PDF Established

PDF is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

PDF
160
companies
54%
Templates Established

Templates is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

Templates
159
companies
54%

An architectural pattern where software components provide services to other components through a communication protocol over a network. Services are loosely coupled, reusable, and can be independently deployed and maintained.

Architecture Distributed Systems Integration Web Services Service-Oriented Architecture
159
companies
54%
SOA Established

SOA is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

SOA
156
companies
53%

Detailed technical requirements, standards, and parameters that define the characteristics and performance criteria of a product, system, or service. Organizations adopt it to address specific technical or business challenges in their environments.

Documentation Engineering Standards Requirements
154
companies
52%
Scrum Optimizing

Scrum is an agile project management framework that organizes work into fixed-length iterations called sprints, typically lasting two to four weeks. It defines clear roles (Product Owner, Scrum Master, Developers) and ceremonies (sprint planning, daily standups, retrospectives) to enable teams to deliver value incrementally and continuously improve.

Agile Project Management Software Development Framework Iterative Development
154
companies
52%
Data Models Optimizing

Structured representations of data entities, their attributes, and relationships used to organize and define how data is stored, accessed, and managed within a system or database. Effective implementation supports data-driven strategies and helps maintain data integrity across systems.

Data Architecture Database Design Data Management Schema Design
153
companies
52%
Use Cases Optimizing

Practical applications and scenarios demonstrating how a technology or product can be implemented to solve real-world problems. It is used across a range of industries and technical contexts to improve efficiency and outcomes.

Applications Examples Implementation Scenarios Solutions
149
companies
51%
Product Backlog Optimizing

A prioritized list of features, enhancements, and fixes that serves as the single source of requirements for product development, typically used in Agile and Scrum methodologies. Teams use it to align stakeholders, track progress, and adapt to changing requirements throughout the project lifecycle.

Agile Scrum Project Management Requirements Management Product Management
149
companies
51%
XML Established

XML (Extensible Markup Language) is a markup language and data format that defines rules for encoding documents in a way that is both human-readable and machine-readable. It is widely used for data interchange between systems, configuration files, web services (SOAP), and document formats like SVG and XHTML.

XML
146
companies
50%
SDLC Optimizing

Software Development Life Cycle - A systematic process for planning, creating, testing, and deploying software systems. Effective use of this practice reduces bugs in production and supports a culture of quality-driven development.

Software Engineering Development Process Project Management Quality Assurance
144
companies
49%

Framework of policies and procedures designed to provide reasonable assurance regarding the achievement of objectives in operational effectiveness, reliable financial reporting, and compliance with laws and regulations. It helps organizations meet regulatory requirements and demonstrate accountability to stakeholders.

Governance Risk Management Compliance Auditing Internal Controls
144
companies
49%
Consensus Established

Consensus is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

Consensus
143
companies
48%
Product Specifications Optimizing

Detailed technical specifications and requirements documentation for products. Teams use it to align stakeholders, track progress, and adapt to changing requirements throughout the project lifecycle.

Documentation Product Management Technical Specifications
142
companies
48%

A structured process for planning, creating, testing, and deploying software systems through distinct phases including requirements gathering, design, implementation, testing, deployment, and maintenance. It helps development teams catch defects early and maintain confidence in software releases.

Software Engineering Project Management Development Process Quality Assurance
142
companies
48%
Accounting Standards Established

Accounting Standards are the formal rules and guidelines that govern how financial transactions and statements are recorded, reported, and disclosed. They ensure consistency, transparency, and comparability across financial reports, and include frameworks like GAAP and IFRS.

Accounting Standards
140
companies
47%
GDPR Established

The General Data Protection Regulation (GDPR) is a comprehensive data privacy law enacted by the European Union that governs how organizations collect, process, and store personal data of EU residents. It grants individuals significant rights over their data and imposes strict obligations on organizations, with substantial penalties for non-compliance.

GDPR
139
companies
47%
Data Modeling Optimizing

The process of creating a visual representation of data structures and relationships to organize information and define how data is stored, accessed, and managed within a system. Effective implementation supports data-driven strategies and helps maintain data integrity across systems.

Data Architecture Database Design Data Engineering
137
companies
46%
Security Standards Established

Security Standards is a cybersecurity technology or practice designed to protect systems, networks, and data from unauthorized access, attacks, and vulnerabilities. It plays a critical role in an organization's defense strategy by reducing risk and strengthening overall security posture.

Security Standards
132
companies
45%

A structured process for planning, creating, testing, and deploying software systems through defined phases including requirements analysis, design, implementation, testing, deployment, and maintenance. It helps teams plan, execute, and deliver projects on time and within scope through structured methodologies.

Software Engineering Project Management Development Process SDLC
132
companies
45%
CITATION.cff Established

Citation File Format providing machine-readable citation metadata for software projects, enabling proper academic attribution and referencing.

Citation Research Metadata Academic Repository
131
companies
44%
CODE_OF_CONDUCT.md Established

Document defining standards for community engagement, acceptable behavior, and enforcement procedures for project participants.

Community Governance Open Source Standards
127
companies
43%
Domain Driven Design Established

A software development approach that focuses on modeling software to match a domain according to input from domain experts, emphasizing collaboration between technical and domain experts to create a shared understanding through ubiquitous language. It is used across a range of industries and technical contexts to improve efficiency and outcomes.

Software Architecture Design Patterns Modeling Strategic Design Business Logic
125
companies
42%
Test Plans Optimizing

Structured documentation outlining test objectives, scope, approach, resources, schedule, and deliverables for software testing activities. It supports the full software development lifecycle from design through deployment and maintenance.

Testing Quality Assurance Documentation Software Development
119
companies
40%
Six Sigma Established

A data-driven methodology and set of techniques for process improvement that seeks to reduce defects and variability in business processes to achieve near-perfect quality (3.4 defects per million opportunities). Organizations adopt it to address specific technical or business challenges in their environments.

Quality Management Process Improvement Lean Manufacturing Business Excellence Statistical Analysis
118
companies
40%
MLOps Established

Machine Learning Operations - practices and tools for deploying, monitoring, and maintaining machine learning models in production environments. It is increasingly applied across industries to automate complex tasks, uncover patterns, and drive innovation.

Machine Learning DevOps AI Operations Model Deployment ML Engineering
118
companies
40%

Reusable solutions to commonly occurring problems in software design, including creational, structural, and behavioral patterns that help developers write more maintainable and scalable code. Organizations adopt it to address specific technical or business challenges in their environments.

Software Engineering Architecture Best Practices Object-Oriented Programming
115
companies
39%
User Stories Established

A tool or practice for capturing software requirements from an end-user perspective, typically following the format "As a [user], I want [goal], so that [benefit]". Teams use it to align stakeholders, track progress, and adapt to changing requirements throughout the project lifecycle.

Agile Requirements Product Management
113
companies
38%
DNS Established

DNS (Domain Name System) is the distributed naming system that translates human-readable domain names (like example.com) into the numerical IP addresses computers use to communicate. It functions as the internet's phone book, enabling users to access websites and services using memorable names instead of numeric addresses.

Networking Infrastructure Protocol
113
companies
38%
Convention Over Configuration Established

Convention Over Configuration is a specialized technology or methodology in the convention domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Convention Over Configuration
113
companies
38%
ITIL Established

ITIL is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

ITIL
112
companies
38%
ITSM Established

ITSM is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

ITSM
111
companies
38%
Design Patterns Established

Reusable solutions to commonly occurring problems in software design, providing templates for how to solve problems in various contexts. Organizations adopt it to address specific technical or business challenges in their environments.

Software Architecture Best Practices Object-Oriented Programming Software Engineering
111
companies
38%
OSHA Optimizing

Occupational Safety and Health Administration - U.S. federal agency responsible for setting and enforcing workplace safety and health standards

Workplace Safety Compliance Regulatory Health Standards
110
companies
37%
BDD Established

BDD is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

BDD
107
companies
36%
Design Standards Established

Design Standards is a specialized technology or methodology in the design domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Design Standards
106
companies
36%

Frameworks and documented guidelines that establish security requirements, controls, and best practices for protecting organizational assets and information systems. It plays a critical role in protecting organizational assets and maintaining a strong security posture.

Security Compliance Governance Risk Management
105
companies
35%
CONTRIBUTORS.md Established

File recognizing individuals and organizations that have contributed to a project through code, documentation, design, or other means.

Documentation Attribution Community Open Source
103
companies
35%
Lean Six Sigma Established

A methodology that combines Lean manufacturing principles and Six Sigma quality management techniques to improve business processes by eliminating waste and reducing variation, focusing on data-driven decision making and continuous improvement. Organizations adopt it to address specific technical or business challenges in their environments.

Process Improvement Quality Management Continuous Improvement Business Process Methodology
103
companies
35%
FinOps Established

FinOps is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

FinOps
100
companies
34%
OAuth Established

OAuth is an open authorization framework that enables third-party applications to access user resources without exposing credentials. It provides a secure, token-based delegation mechanism widely used across the web for granting limited access to APIs and services on behalf of users.

OAuth
98
companies
33%
Zero Trust Established

A security framework that requires all users and devices to be authenticated, authorized, and continuously validated before being granted access to applications and data, regardless of whether they are inside or outside the network perimeter. Organizations rely on it to strengthen their defenses and meet evolving cybersecurity challenges.

Security Network Security Identity And Access Management Cloud Security
98
companies
33%

A security framework that requires all users and devices to be authenticated, authorized, and continuously validated before being granted access to applications and data, regardless of whether they are inside or outside the network perimeter. It is widely adopted across industries to safeguard digital assets and reduce security risks.

Security Network Security Identity Management Access Control Cybersecurity
98
companies
33%
ACID Established

ACID (Atomicity, Consistency, Isolation, Durability) is a set of properties that guarantee database transactions are processed reliably even in the face of errors, power failures, or system crashes. These four properties ensure that data remains accurate and consistent, making ACID compliance a fundamental requirement for relational databases and financial systems.

ACID
97
companies
33%
Waterfall Optimizing

A sequential software development methodology where progress flows steadily downwards through phases of conception, initiation, analysis, design, construction, testing, deployment, and maintenance. It supports the full software development lifecycle from design through deployment and maintenance.

Software Development Project Management SDLC
97
companies
33%

A software development approach where tests are written before the actual code, following a red-green-refactor cycle to ensure code quality and maintainability. It supports the full software development lifecycle from design through deployment and maintenance.

Software Development Testing Agile Best Practices
96
companies
32%
Data Flow Diagrams Established

A graphical representation of data flow through a system, showing how data is processed, stored, and transformed between different components and external entities. Organizations adopt it to address specific technical or business challenges in their environments.

Software Engineering System Design Documentation Visualization
95
companies
32%
VPN Established

A VPN (Virtual Private Network) creates an encrypted tunnel between a user's device and a remote network, protecting data from interception and masking the user's IP address. It is widely used for secure remote access to corporate networks, protecting privacy on public Wi-Fi, and bypassing geographic content restrictions.

Networking Security Privacy Encryption
94
companies
32%
CCPA Established

California Consumer Privacy Act - A state statute intended to enhance privacy rights and consumer protection for residents of California, USA. Provides consumers with rights to know what personal information is collected, delete personal data, opt-out of data sales, and non-discrimination for exercising privacy rights.

Privacy Compliance Data Protection Legal
94
companies
32%

Frameworks and guidelines that establish best practices for protecting information systems, networks, and data from cyber threats, including standards like NIST, ISO 27001, and CIS Controls. It is widely adopted across industries to safeguard digital assets and reduce security risks.

Cybersecurity Compliance Security Risk Management Information Security
93
companies
31%
Test Cases Optimizing

Structured scenarios that verify software functionality by defining inputs, execution conditions, and expected results to ensure quality and correctness. It is widely used by developers to build, maintain, and scale software applications efficiently.

Testing Quality Assurance Software Development
93
companies
31%
Inversion Of Control Established

Inversion Of Control is a specialized technology or methodology in the inversion domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Inversion Of Control
91
companies
31%
RBAC Established

Role-Based Access Control (RBAC) is a security paradigm that restricts system access based on assigned roles rather than individual user identities. Users are granted permissions through their role membership, simplifying access management and ensuring principle of least privilege.

Security Access Control Authorization Identity Management
90
companies
30%
SOAP Established

SOAP (Simple Object Access Protocol) is a messaging protocol for exchanging structured information in web services using XML over HTTP and other transport protocols. It provides built-in standards for security, transactions, and reliability, making it a common choice for enterprise integrations and legacy system communication.

SOAP
89
companies
30%

Visual representations that illustrate the sequential steps and decision points in a process, showing how inputs are transformed into outputs through various activities and pathways. It is used across a range of industries and technical contexts to improve efficiency and outcomes.

Process Mapping Workflow Visualization Business Process Management Documentation Process Improvement
89
companies
30%
HTML5 Established

The fifth major version of the Hypertext Markup Language, used for structuring and presenting content on the web. It is widely used by developers to build, maintain, and scale software applications efficiently.

Web Development Frontend Markup Language
89
companies
30%
Kanban Developing

Kanban is a visual workflow management method that uses boards and cards to represent work items flowing through defined stages. It emphasizes continuous delivery, work-in-progress limits, and incremental improvements, helping teams optimize throughput and identify bottlenecks in their processes.

Kanban
89
companies
30%
Schema Validation Established

Schema Validation is a specialized technology or methodology in the schema domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Schema Validation
89
companies
30%
GraphQL Established

A query language for APIs and a runtime for executing those queries with existing data, providing a complete and understandable description of the data in your API.

API Query Language Data Fetching
85
companies
29%

The process of defining the structure, organization, and relationships of data in a database system, including tables, columns, constraints, and indexes to optimize data storage and retrieval. Effective implementation supports data-driven strategies and helps maintain data integrity across systems.

Database Data Modeling Software Architecture Schema Design
85
companies
29%
DevSecOps Established

Development, Security, and Operations methodology that integrates security practices within the DevOps process, emphasizing security automation and collaboration throughout the software development lifecycle. It is widely adopted across industries to safeguard digital assets and reduce security risks.

Security DevOps Automation CI/CD Best Practices
84
companies
28%
Test First Established

A software development approach where tests are written before the implementation code, ensuring code quality and driving design decisions through test requirements. It is widely used by developers to build, maintain, and scale software applications efficiently.

Software Development Testing Methodology
81
companies
27%
QoS Developing

QoS is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

QoS
81
companies
27%
Quality Of Service Developing

Quality Of Service provides specialized quality of capabilities delivered as a managed offering, often accessible via APIs or cloud interfaces. It allows organizations to leverage quality of functionality without building and maintaining the underlying infrastructure themselves.

Quality Of Service
80
companies
27%
Runbooks Established

Documented procedures and step-by-step instructions for handling routine operations, troubleshooting issues, and responding to incidents in IT systems and infrastructure. It reduces manual effort and human error while increasing throughput and operational consistency.

Operations Documentation Incident Response Automation
79
companies
27%
Network Protocols Established

Standardized rules and conventions for communication between network devices, including protocols like TCP/IP, HTTP, DNS, and others that enable data exchange across networks. It is fundamental to modern network architectures and enables reliable communication between systems.

Networking Communication Infrastructure
78
companies
26%

A system of processes, procedures, and documentation that ensures products are consistently produced and controlled according to quality standards, commonly used in pharmaceutical, food, and medical device manufacturing. Proper implementation reduces legal and operational risk while supporting audit readiness.

Quality Assurance Compliance Manufacturing Pharmaceuticals Regulatory
77
companies
26%
Security Protocols Established

A set of rules and standards that define how data is transmitted securely over networks, including protocols like SSL/TLS, HTTPS, SSH, and IPsec that provide encryption, authentication, and data integrity. It plays a critical role in protecting organizational assets and maintaining a strong security posture.

Security Networking Encryption Authentication
76
companies
26%
FTP Developing

FTP is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

FTP
75
companies
25%
SSH Developing

SSH (Secure Shell) is a cryptographic network protocol for secure remote login, command execution, and file transfer between computers over unsecured networks. It provides strong encryption, authentication, and data integrity, replacing insecure protocols like Telnet and serving as a fundamental tool for system administration and DevOps.

SSH
74
companies
25%
RPC Developing

RPC is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

RPC
72
companies
24%
HIPAA Established

Health Insurance Portability and Accountability Act - U.S. legislation providing data privacy and security provisions for safeguarding medical information

Compliance Healthcare Privacy Security
72
companies
24%
SAML Established

SAML (Security Assertion Markup Language) is an XML-based open standard for exchanging authentication and authorization data between identity providers and service providers. It enables single sign-on (SSO) across different applications and domains, reducing the need for users to manage multiple sets of credentials.

Authentication Security SSO Identity Management
72
companies
24%
Flowcharts Developing

Flowcharts is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

Flowcharts
71
companies
24%
Test Scripts Established

Automated scripts used to verify software functionality, validate code behavior, and ensure quality through repeatable testing procedures. It supports the full software development lifecycle from design through deployment and maintenance.

Testing Automation Quality Assurance Software Development
70
companies
23%
UML Developing

UML is an artificial intelligence technology or practice that leverages machine learning, data analysis, or intelligent automation to solve complex problems. It is increasingly applied across industries to improve efficiency, accuracy, and decision-making in both technical and business contexts.

UML
68
companies
23%
Agile Delivery Established

An iterative approach to project management and software development that helps teams deliver value to customers faster and with fewer headaches through collaboration, adaptability, and continuous improvement. It is widely used by developers to build, maintain, and scale software applications efficiently.

Agile Project Management Software Development Iterative Development Continuous Improvement
68
companies
23%

Guidelines and technical specifications that ensure digital content, applications, and technologies are usable by people with disabilities, including standards like WCAG, Section 508, and ARIA. It helps organizations meet regulatory requirements and demonstrate accountability to stakeholders.

Accessibility Web Standards Compliance UX
67
companies
22%
Wireframes Established

Low-fidelity visual representations of user interface layouts used in early design stages to establish structure, hierarchy, and functionality before high-fidelity design work begins. It is used across a range of industries and technical contexts to improve efficiency and outcomes.

Design UX Prototyping UI Design
66
companies
22%
Architecture Pattern Developing

Architecture Pattern is a specialized technology or methodology in the architecture domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Architecture Pattern Architecture Patterns
66
companies
22%
Configuration Language Developing

Configuration Language is a specialized technology or methodology in the configuration domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Configuration Language
66
companies
22%
MVC Developing

MVC is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

MVC
65
companies
22%
Mockups Established

Visual representations or prototypes of user interfaces and designs used to demonstrate the look and feel of a product before development. It is used across a range of industries and technical contexts to improve efficiency and outcomes.

Design Prototyping UI/UX
65
companies
22%
Product Backlog Items Established

Prioritized list of features, enhancements, and fixes that represent work to be done in a product development process, typically used in Agile and Scrum methodologies. Teams use it to align stakeholders, track progress, and adapt to changing requirements throughout the project lifecycle.

Agile Scrum Project Management Product Management
65
companies
22%

Network architecture approach that enables dynamic, programmatically efficient network configuration to improve performance and monitoring by decoupling the network control plane from the data plane. It is a key component of modern cloud-native architectures and digital transformation strategies.

Networking Cloud Infrastructure Virtualization Network Architecture
65
companies
22%
DSL Developing

DSL is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

DSL
64
companies
21%
OIDC Developing

OIDC is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

OIDC
64
companies
21%
OpenID Connect Developing

OpenID Connect is a specialized technology or methodology in the openid domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

OpenID Connect
60
companies
20%
OWASP Established

Open Web Application Security Project - A nonprofit foundation that works to improve the security of software through community-led open source projects, hundreds of chapters worldwide, and educational resources. It is widely adopted across industries to safeguard digital assets and reduce security risks.

Security Web Security Application Security Open Source
58
companies
19%
Secure by Design Established

A software development approach that prioritizes security from the initial design phase through implementation, ensuring security considerations are built into the foundation of systems rather than added as an afterthought. It is widely adopted across industries to safeguard digital assets and reduce security risks.

Security Software Development Design Principles Cybersecurity Best Practices
58
companies
19%
Sketches Developing

Sketches is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

Sketches
57
companies
19%
PCI Compliance Established

Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment. It plays a critical role in protecting organizational assets and maintaining a strong security posture.

Security Compliance Payment Processing Data Protection
57
companies
19%
Communication Protocols Developing

Communication Protocols is a networking technology or protocol that facilitates communication, data transfer, or traffic management between systems and devices. It enables reliable, efficient, and secure connectivity across local and distributed network environments.

Communication Protocols
56
companies
19%

Framework and guidelines for ensuring accuracy, completeness, consistency, validity, and timeliness of data across an organization's data assets and systems. It is a foundational component in modern data architectures and enterprise data management practices.

Data Quality Data Governance Data Management Standards
54
companies
18%

A data architecture paradigm that combines the best features of data lakes and data warehouses, providing ACID transactions, schema enforcement, and governance on low-cost storage with support for both business intelligence and machine learning workloads. Effective implementation supports data-driven strategies and helps maintain data integrity across systems.

Data Architecture Data Lake Data Warehouse Analytics Big Data
54
companies
18%

Reusable solutions to commonly occurring problems in software architecture that provide templates for designing system structure, component interactions, and overall organization of applications. It is used across a range of industries and technical contexts to improve efficiency and outcomes.

Software Architecture Design Patterns Best Practices Software Engineering
54
companies
18%
DHCP Developing

DHCP is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

DHCP
54
companies
18%
SCADA Developing

SCADA is a visual computing technology used for creating, processing, or displaying graphical content. It supports applications in design, simulation, entertainment, and data visualization.

SCADA
53
companies
18%
RDP Developing

RDP is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

RDP
52
companies
17%
Regular Expressions Optimizing

A sequence of characters that define a search pattern, commonly used for string matching, validation, and text manipulation in programming and data processing. It supports the full software development lifecycle from design through deployment and maintenance.

Text Processing Pattern Matching String Manipulation Programming
51
companies
17%

Reusable solutions and best practices for organizing software system architecture, including patterns like MVC, Microservices, Layered Architecture, Event-Driven, and CQRS that provide proven approaches to common design problems. It is used across a range of industries and technical contexts to improve efficiency and outcomes.

Software Architecture Design Patterns System Design Best Practices
50
companies
17%
LDAP Established

Lightweight Directory Access Protocol - an industry-standard protocol for accessing and maintaining distributed directory information services over an IP network. It plays a critical role in protecting organizational assets and maintaining a strong security posture.

Directory Services Authentication Protocol Identity Management
50
companies
17%

A security framework that eliminates implicit trust and requires continuous verification of all users, devices, and applications attempting to access resources, regardless of their location inside or outside the network perimeter. It is widely adopted across industries to safeguard digital assets and reduce security risks.

Security Network Security Access Control Identity Management Cybersecurity
50
companies
17%
Big O Notation Developing

Big O Notation is a specialized technology or methodology in the big domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Big O Notation
50
companies
17%
File Format Developing

File Format is a specialized technology or methodology in the file domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

File Format File Formats
50
companies
17%
WCAG Developing

WCAG is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

WCAG
49
companies
16%
Financial Regulation Developing

Financial Regulation is a financial management concept, tool, or practice used to manage monetary operations, reporting, or compliance. It helps organizations maintain accurate financial records, optimize cash flow, and meet regulatory requirements.

Financial Regulation
49
companies
16%
JPA Developing

JPA is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

JPA
47
companies
16%
Normalization Developing

Normalization is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

Normalization
45
companies
15%
Pub/Sub Established

A messaging pattern where publishers send messages to topics without knowledge of subscribers, and subscribers receive messages from topics they're interested in, enabling asynchronous and decoupled communication between services. Modern distributed architectures rely on it to coordinate workloads across multiple nodes and regions.

Messaging Architecture Distributed Systems Asynchronous Pub Sub
45
companies
15%
Jakarta EE Developing

Jakarta EE is a specialized technology or methodology in the jakarta domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Jakarta EE
45
companies
15%
Java EE Developing

Java EE is a specialized technology or methodology in the java domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Java EE
44
companies
15%

Framework of rules and guidelines that govern how organizations collect, store, process, and share personal data to protect individual privacy rights and ensure compliance with regulations like GDPR, CCPA, and other data protection laws. Organizations rely on it to strengthen their defenses and meet evolving cybersecurity challenges.

Privacy Compliance Data Protection Governance Security
44
companies
15%
Banking Regulation Developing

Banking Regulation is a specialized technology or methodology in the banking domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Banking Regulation
41
companies
14%
GitOps Developing

A operational framework that takes DevOps best practices used for application development such as version control, collaboration, compliance, and CI/CD, and applies them to infrastructure automation. GitOps uses Git as a single source of truth for declarative infrastructure and applications.

DevOps Infrastructure As Code Continuous Deployment Automation Version Control
41
companies
14%
RDF Developing

RDF is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

RDF
41
companies
14%
Technology Standards Developing

Technology Standards is a specialized technology or methodology in the technology domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Technology Standards
40
companies
13%
Test Suites Established

A collection of organized test cases designed to validate specific functionality or features of software applications. It is widely used by developers to build, maintain, and scale software applications efficiently.

Testing Quality Assurance Software Development
40
companies
13%
Partitioning Developing

Partitioning is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

Partitioning
40
companies
13%
AUTHORS.md Developing

File listing the original creators and primary authors of a project, often required by certain open-source licenses.

Documentation Attribution Open Source Repository
39
companies
13%
Privacy By Design Developing

A framework and approach that embeds privacy protections into the design and operation of IT systems, networked infrastructure, and business practices from the ground up, rather than as an afterthought. It is widely adopted across industries to safeguard digital assets and reduce security risks.

Privacy Security Framework Compliance Data Protection
39
companies
13%
JMS Developing

JMS is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

JMS
38
companies
13%
Swagger Developing

An open-source framework for designing, building, documenting, and consuming RESTful web services. Swagger provides a specification (OpenAPI) and tools for API development including interactive documentation, code generation, and API testing capabilities.

API Documentation OpenAPI REST Development Tools
37
companies
12%
IT Standards Developing

IT Standards is a specialized technology or methodology in the it domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

IT Standards
36
companies
12%
Security By Design Developing

A software development approach that integrates security considerations and practices from the initial design phase through the entire development lifecycle, rather than adding security as an afterthought. It plays a critical role in protecting organizational assets and maintaining a strong security posture.

Security Software Development Best Practices Development Methodology
36
companies
12%

A central bank regulation requiring commercial banks to hold a minimum percentage of customer deposits as reserves, either as cash in their vaults or as deposits with the central bank, to ensure liquidity and stability in the banking system. It is used across a range of industries and technical contexts to improve efficiency and outcomes.

Central Banking Banking Regulation Monetary Policy Financial Stability Reserve Requirements
35
companies
11%
Data Format Developing

Data Format is a data technology or practice used to collect, process, store, analyze, or govern information assets. It helps organizations extract value from their data and make informed decisions through systematic data management.

Data Format
35
companies
11%
Monolithic Architecture Developing

Monolithic Architecture is a structural design approach that defines how monolithic components are organized, interact, and scale within a system. It provides a blueprint for building maintainable, performant, and resilient solutions that meet both current and future requirements.

Monolithic Architecture
34
companies
11%
Circuit Breaker Developing

Circuit Breaker is a specialized technology or methodology in the circuit domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Circuit Breaker
34
companies
11%
SFTP Developing

SFTP is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

SFTP
34
companies
11%
Schema Design Developing

Schema Design is a specialized technology or methodology in the schema domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Schema Design
33
companies
11%
Development Methodology Developing

Development Methodology is a software development technology or practice that supports the creation, maintenance, or improvement of software systems. It helps developers and engineering teams work more efficiently and deliver higher-quality software products.

Development Methodology Development Methodologies
32
companies
10%

A systematic approach or framework for planning, executing, and controlling projects to achieve specific goals within defined constraints of time, budget, and resources. It helps teams plan, execute, and deliver projects on time and within scope through structured methodologies.

Project Management Methodology Planning Execution Control
32
companies
10%

Advanced certification in Lean Six Sigma methodology focused on leading complex improvement projects, statistical analysis, and change management to reduce defects and variability in business processes. It helps teams plan, execute, and deliver projects on time and within scope through structured methodologies.

Process Improvement Quality Management Statistical Analysis Project Management Lean Manufacturing
32
companies
10%
JSF Developing

JSF is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

JSF
31
companies
10%
Dimensional Modeling Established

A data modeling technique used in data warehousing that structures data into fact tables containing measurable metrics and dimension tables containing descriptive attributes, optimized for query performance and business intelligence reporting. Organizations use it to track key metrics, identify trends, and optimize business outcomes.

Data Warehousing Business Intelligence Data Modeling Analytics
30
companies
10%
JCR Developing

JCR is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

JCR
29
companies
9%
OData Developing

OData is a data technology or practice used to collect, process, store, analyze, or govern information assets. It helps organizations extract value from their data and make informed decisions through systematic data management.

OData
27
companies
9%
Disclosure Requirements Developing

Disclosure Requirements is a specialized technology or methodology in the disclosure domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Disclosure Requirements
26
companies
8%
Test Specifications Established

Documentation that defines the requirements, procedures, and expected outcomes for testing software systems. Effective use of this practice reduces bugs in production and supports a culture of quality-driven development.

Testing Documentation Quality Assurance
26
companies
8%

A database design approach that organizes data into tables (relations) with rows and columns, establishing relationships between tables through keys to ensure data integrity and minimize redundancy. It is used across a range of industries and technical contexts to improve efficiency and outcomes.

Database Design Data Architecture SQL Normalization Entity Relationship
26
companies
8%
Component Model Initial

Component Model is a specialized technology or methodology in the component domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Component Model
26
companies
8%
NFC Initial

NFC is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

NFC
25
companies
8%

An international standard query language for property graph databases, developed by ISO/IEC to provide a declarative way to query and manipulate graph data structures. Effective implementation supports data-driven strategies and helps maintain data integrity across systems.

Query Language Graph Database Database ISO Standard
24
companies
8%

Organizational patterns for structuring data in warehouses, including star schema, snowflake schema, and galaxy schema designs that optimize query performance and data relationships. Organizations use it to track key metrics, identify trends, and optimize business outcomes.

Data Warehousing Database Design Business Intelligence Analytics
23
companies
7%
Capital Requirements Initial

Capital Requirements is a specialized technology or methodology in the capital domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Capital Requirements
23
companies
7%
Health Standards Initial

Health Standards is a specialized technology or methodology in the health domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Health Standards
23
companies
7%
Kerberos Initial

Kerberos is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

Kerberos
23
companies
7%
VNC Initial

VNC is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

VNC
22
companies
7%
CNCF Initial

CNCF is a manufacturing or industrial technology used to design, produce, or manage physical products and production processes. It leverages automation, precision engineering, and digital controls to improve quality, efficiency, and throughput.

CNCF
22
companies
7%
JDBC Initial

JDBC is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

JDBC
20
companies
6%
Schema Evolution Initial

Schema Evolution is a specialized technology or methodology in the schema domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Schema Evolution
20
companies
6%
XSLT Initial

XSLT (Extensible Stylesheet Language Transformations) is a language for transforming XML documents into other formats such as HTML, plain text, or different XML structures. It uses template-based rules and XPath expressions to select and restructure XML data, commonly used in data integration and document publishing pipelines.

XSLT
20
companies
6%
Parquet Developing

Apache Parquet is an open source, column-oriented data file format designed for efficient data storage and retrieval. It provides efficient data compression and encoding schemes with enhanced performance to handle complex data in bulk.

Data Format Column-Oriented Big Data Apache Data Storage
19
companies
6%
FDA Regulations Optimizing

Federal regulations governing the safety, efficacy, and security of food, drugs, medical devices, and other products under FDA jurisdiction. Organizations adopt it to address specific technical or business challenges in their environments.

Regulatory Compliance Healthcare Medical Devices Pharmaceuticals Food Safety
19
companies
6%
RFID Initial

RFID is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

RFID
19
companies
6%
CHANGELOG.md Initial

Document tracking notable changes between project versions, following conventions like Keep a Changelog. Lists additions, fixes, deprecations, and breaking changes.

Documentation Versioning Release Management Change Tracking
18
companies
6%

A framework that integrates security practices into every phase of the software development process, from design and development through testing and deployment, to identify and mitigate vulnerabilities early. It is widely adopted across industries to safeguard digital assets and reduce security risks.

Security Development Process Application Security DevSecOps Risk Management
18
companies
6%
Lean Operations Initial

Lean Operations is a business or enterprise practice that helps organizations manage operations, make strategic decisions, and achieve their objectives. It encompasses the processes, tools, and methodologies needed to run an effective and efficient organization.

Lean Operations
18
companies
6%
SMTP Initial

SMTP is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

SMTP
16
companies
5%

Documentation that defines the contract between different software components, including API endpoints, data formats, protocols, and integration requirements. It is used across a range of industries and technical contexts to improve efficiency and outcomes.

API Documentation Software Architecture System Integration Technical Specifications
16
companies
5%
Services Patterns Developing

Design patterns and architectural approaches for building microservices and service-oriented applications. Modern distributed architectures rely on it to coordinate workloads across multiple nodes and regions.

Microservices Architecture Design Patterns Service-Oriented Architecture
16
companies
5%
Gherkin Initial

Gherkin is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

Gherkin
15
companies
5%
Reporting Templates Developing

Pre-built document templates for generating standardized reports, dashboards, and data presentations with consistent formatting and structure. Organizations use it to track key metrics, identify trends, and optimize business outcomes.

Reporting Templates Documentation Business Intelligence
15
companies
5%
Web Standards Developing

Specifications and guidelines that define how web technologies should work, ensuring interoperability and consistency across browsers and platforms. It supports the full software development lifecycle from design through deployment and maintenance.

Web Development Standards Interoperability Browser Compatibility
14
companies
4%

A framework that integrates security practices and considerations into every phase of the software development process, from initial design through deployment and maintenance, to minimize vulnerabilities and ensure secure applications. It is used across a range of industries and technical contexts to improve efficiency and outcomes.

Application Security SDLC Secure Development Security Engineering DevSecOps
14
companies
4%

A security framework that requires strict identity verification for every person and device attempting to access resources on a network, regardless of whether they are inside or outside the network perimeter. ZTNA operates on the principle of "never trust, always verify" and provides granular access control based on user identity, device posture, and context.

Security Network Access Identity Management Cloud Security Zero Trust
14
companies
4%
Table Format Initial

Table Format is a specialized technology or methodology in the table domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Table Format
14
companies
4%
README.md Initial

Standard repository documentation file providing project overview, setup instructions, and usage examples. Automatically displayed on repository landing pages by GitHub, GitLab, and other hosting platforms.

Documentation Repository Git Project Overview Onboarding
13
companies
4%
RTSP Initial

RTSP is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

RTSP
13
companies
4%
Sharding Initial

Sharding is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

Sharding
12
companies
4%
Secure by Default Developing

A security design principle where systems and software are configured with the most secure settings from the initial deployment, requiring users to explicitly opt-in to less secure options rather than having to manually enable security features. It plays a critical role in protecting organizational assets and maintaining a strong security posture.

Security Best Practices Software Design Security Architecture Design Principles
12
companies
4%

Network protocols that create encrypted tunnels for secure data transmission over untrusted networks, including VPN technologies like IPsec, SSL/TLS, WireGuard, and SSH tunneling for protecting communication channels. It is widely adopted across industries to safeguard digital assets and reduce security risks.

Networking Security VPN Encryption
12
companies
4%
Programming Paradigm Initial

Programming Paradigm is a software development technology or practice that supports the creation, maintenance, or improvement of software systems. It helps developers and engineering teams work more efficiently and deliver higher-quality software products.

Programming Paradigm
12
companies
4%
Underwriting Standards Initial

Underwriting Standards is a specialized technology or methodology in the underwriting domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Underwriting Standards
12
companies
4%
WSDL Initial

WSDL is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

WSDL
11
companies
3%
Modeling Language Initial

Modeling Language is a visual computing technology used for creating, processing, or displaying graphical content. It supports applications in design, simulation, entertainment, and data visualization.

Modeling Language
10
companies
3%
Agile SDLC Developing

Agile Software Development Life Cycle is an iterative and incremental approach to software development that emphasizes flexibility, collaboration, and rapid delivery of working software through short development cycles called sprints. It is widely used by developers to build, maintain, and scale software applications efficiently.

Software Development Project Management Methodology Iterative Development
10
companies
3%
DOT Regulations Established

Department of Transportation regulations governing the safe transportation of hazardous materials and other commercial transport activities in the United States. It helps organizations meet regulatory requirements and demonstrate accountability to stakeholders.

Regulations Transportation Safety Compliance
10
companies
3%
Basel III Initial

Basel III is a specialized technology or methodology in the basel domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Basel III
10
companies
3%
CQRS Initial

CQRS is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

CQRS
10
companies
3%
Messaging Protocol Initial

Messaging Protocol is a networking technology or protocol that facilitates communication, data transfer, or traffic management between systems and devices. It enables reliable, efficient, and secure connectivity across local and distributed network environments.

Messaging Protocol
9
companies
3%
ArchiMate Developing

An open and independent enterprise architecture modeling language to support the description, analysis and visualization of architecture within and across business domains in an unambiguous way.

Enterprise Architecture Modeling Language Business Process Technology Architecture Application Architecture
8
companies
2%
IMAP Initial

IMAP is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

IMAP
8
companies
2%
SPARQL Initial

SPARQL is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

SPARQL
7
companies
2%
Markup Language Initial

Markup Language is a specialized technology or methodology in the markup domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Markup Language
7
companies
2%
.prompt.md Initial

Reusable prompt template files for AI coding assistants, defining task-specific instructions that can be executed from chat interfaces. Used for standardizing common development tasks like code review, refactoring, and test generation.

AI Copilot Prompt Engineering Developer Workflow Templates Automation
6
companies
2%
Serverless Patterns Developing

A collection of serverless architectures and patterns for building applications on AWS, featuring ready-to-use templates and best practices for Lambda, API Gateway, EventBridge, and other serverless services. Cloud adoption of this technology supports flexibility, cost optimization, and rapid deployment.

Serverless AWS Architecture Patterns Cloud
6
companies
2%
openCypher Initial

openCypher is an open-source project that provides a standardized graph query language originally developed by Neo4j for querying property graphs. It enables developers to write expressive pattern-matching queries against graph databases, and its specification has been adopted by multiple graph database vendors.

openCypher
5
companies
1%
Gantt Charts Initial

Gantt Charts is a specialized technology or methodology in the gantt domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Gantt Charts
5
companies
1%
ISO Standard Initial

ISO Standard is a specialized technology or methodology in the iso domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

ISO Standard
4
companies
1%
Dockerfile Developing

A text file that contains instructions for building Docker container images, defining the application environment, dependencies, and configuration in a reproducible way. It accelerates software delivery cycles and improves collaboration between development and operations teams.

Containerization DevOps Infrastructure As Code
4
companies
1%

A software architecture pattern that separates an application into logical layers or tiers, typically presentation, business logic, and data access layers, to improve modularity, scalability, and maintainability. It is used across a range of industries and technical contexts to improve efficiency and outcomes.

Architecture Design Patterns Software Engineering
4
companies
1%

An architectural pattern that structures a monolithic application into loosely coupled, well-defined modules with clear boundaries and dependencies, combining the operational simplicity of a monolith with the organizational benefits of modular design. Organizations adopt it to address specific technical or business challenges in their environments.

Software Architecture Design Patterns Modularity Monolithic Architecture
4
companies
1%
AMQP Initial

AMQP (Advanced Message Queuing Protocol) is an open standard application-layer protocol for message-oriented middleware supporting reliable queuing, routing, and publish/subscribe messaging patterns. It enables interoperable, asynchronous communication between applications and services across different platforms and languages.

AMQP
4
companies
1%
Gremlin Initial

Gremlin is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

Gremlin
4
companies
1%
Reserve Requirements Initial

Reserve Requirements is a specialized technology or methodology in the reserve domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Reserve Requirements
4
companies
1%
dependabot.yml Initial

GitHub Dependabot configuration file defining automated dependency update schedules, package ecosystems to monitor, and review assignment rules.

Dependency Management Security Automation GitHub CI/CD
3
companies
1%
API First Initial

A development approach where APIs are treated as first-class citizens and designed before implementation begins, ensuring consistent and well-documented interfaces across services and applications. Organizations adopt it to address specific technical or business challenges in their environments.

API Design Software Architecture Development Methodology
3
companies
1%
Code First Developing

A development approach where code is the primary source of truth, with database schemas, API definitions, or infrastructure configurations generated from the code rather than designed separately or visually. Organizations adopt it to address specific technical or business challenges in their environments.

Development Methodology Software Architecture Code Generation
3
companies
1%
JAX WS Initial

JAX-WS is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

JAX-WS
3
companies
1%
OSGi Initial

OSGi is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

OSGi
3
companies
1%
POSIX Initial

POSIX is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

POSIX
2
companies
0%

Standards and methodologies for managing changes and updates to APIs, software interfaces, and data formats while maintaining backward compatibility and clear communication of breaking changes. It is widely used by developers to build, maintain, and scale software applications efficiently.

API Design Software Development Version Control Backward Compatibility
2
companies
0%
Containerfile Developing

A text file containing instructions for building container images, compatible with Docker's Dockerfile format and commonly used with Podman and other OCI-compliant tools. It accelerates software delivery cycles and improves collaboration between development and operations teams.

Containers DevOps Infrastructure
2
companies
0%
Binary Format Initial

Binary Format is a specialized technology or methodology in the binary domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Binary Format
2
companies
0%
Database Normalization Initial

Database Normalization is a data storage and management technology designed to organize, persist, and efficiently retrieve structured or semi-structured information. It supports the data needs of applications and analytics systems through reliable storage, querying, and transaction management.

Database Normalization
2
companies
0%
ACKNOWLEDGMENTS.md Initial

File crediting third-party software, libraries, inspirations, and other works that the project builds upon or is indebted to.

Documentation Attribution Licensing Repository
1
companies
0%
Basel Compliance Initial

Basel Compliance ensures that basel practices and systems adhere to relevant laws, regulations, industry standards, and internal policies. It helps organizations avoid legal penalties, maintain trust, and demonstrate accountability to regulators and stakeholders.

Basel Compliance
1
companies
0%
JSON Binding Initial

JSON Binding is a specialized technology or methodology in the json domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

JSON Binding
1
companies
0%
MXML Initial

MXML is an artificial intelligence technology or practice that leverages machine learning, data analysis, or intelligent automation to solve complex problems. It is increasingly applied across industries to improve efficiency, accuracy, and decision-making in both technical and business contexts.

MXML
1
companies
0%
.cursorrules Initial

Configuration file for Cursor AI code editor containing project-specific rules, coding conventions, and behavioral instructions for the AI assistant.

AI Agents Cursor Developer Workflow Coding Standards AI Copilot
0
companies
0%
OpenCost Initial

An open source specification and tool for real-time cost monitoring of Kubernetes infrastructure and cloud spending, enabling teams to measure, allocate, and optimize cloud costs across workloads.

Cloud Cost Management Kubernetes FinOps Observability CNCF
0
companies
0%
Empathy Maps Developing

A collaborative visualization tool used to articulate what we know about a particular type of user. It externalizes knowledge about users in order to create a shared understanding of user needs, and aid in decision making.

User Research Design Thinking UX Design Collaboration
0
companies
0%
Tax Templates Developing

Pre-designed templates for organizing and filing tax documents and returns. Financial institutions and enterprises use it to streamline operations and manage fiscal responsibilities.

Tax Templates Finance Documentation
0
companies
0%
Regulatory Templates Developing

Pre-built templates and frameworks for meeting regulatory compliance requirements across various industries and jurisdictions. Proper implementation reduces legal and operational risk while supporting audit readiness.

Compliance Regulatory Templates Governance
0
companies
0%
Tax Reporting Templates Developing

Pre-built templates and frameworks for generating tax reports, compliance documents, and financial summaries required for tax filing and regulatory purposes. It helps organizations meet regulatory requirements and demonstrate accountability to stakeholders.

Tax Reporting Compliance Templates Documentation
0
companies
0%
Bean Validation Initial

Bean Validation is a specialized technology or methodology in the bean domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Bean Validation
0
companies
0%
DFDL Initial

DFDL is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

DFDL
0
companies
0%
Fixed Format Initial

Fixed Format is a specialized technology or methodology in the fixed domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Fixed Format
0
companies
0%
JSON Processing Initial

JSON Processing is a specialized technology or methodology in the json domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

JSON Processing
0
companies
0%
JSR 303 Initial

JSR-303 is a technology or concept used in computing and information technology to address specific technical challenges. It provides capabilities that help practitioners build, manage, or improve systems and processes in their domain.

JSR-303
0
companies
0%
Pig Latin Initial

Pig Latin is a specialized technology or methodology in the pig domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Pig Latin
0
companies
0%
Schema Free Initial

Schema Free is a specialized technology or methodology in the schema domain that addresses specific technical or business requirements. It provides targeted capabilities that help practitioners and organizations solve problems and improve outcomes in their area of focus.

Schema Free
0
companies
0%
CODEOWNERS Initial

File defining individuals or teams responsible for code in a repository. Used by GitHub and GitLab to automatically request reviews from designated owners on pull requests.

Code Review Repository Governance Automation
0
companies
0%
ISSUE_TEMPLATE.md Initial

Template file that pre-populates new issue forms with structured sections, guiding contributors to provide necessary information when reporting bugs or requesting features.

Templates Issue Tracking Repository Collaboration
0
companies
0%
PULL_REQUEST_TEMPLATE.md Initial

Template file that pre-populates pull request descriptions with structured sections like change summary, testing steps, and checklist items.

Templates Code Review Repository Collaboration
0
companies
0%
AGENTS.md Initial

Open standard file for guiding AI coding agents, providing project context, coding standards, build commands, and development practices. Supported by OpenAI Codex, Google Jules, Cursor, Amp, and other tools. Stewarded by the Agentic AI Foundation under the Linux Foundation.

AI Agents Developer Workflow Coding Standards AI Copilot Open Standard
0
companies
0%
AGENT.md Initial

Vendor-neutral AI coding agent configuration file providing project context and instructions. Alternative to AGENTS.md serving the same purpose of unifying agent guidance across tools.

AI Agents Developer Workflow Coding Standards AI Copilot
0
companies
0%
CLAUDE.md Initial

Configuration file for Claude Code providing project-specific context, coding conventions, build commands, and behavioral instructions that persist across sessions.

AI Agents Claude Code Developer Workflow Coding Standards AI Copilot
0
companies
0%
GEMINI.md Initial

Configuration file for Google Gemini CLI providing project context, coding standards, and development instructions for AI-assisted coding workflows.

AI Agents Gemini Developer Workflow Coding Standards AI Copilot
0
companies
0%
JULES.md Initial

Configuration file for Google Jules AI coding agent, providing project-specific instructions, architecture context, and coding standards.

AI Agents Google Jules Developer Workflow AI Copilot
0
companies
0%
CODEX.md Initial

Configuration file for OpenAI Codex CLI providing project instructions, coding conventions, and build commands for AI-assisted development.

AI Agents OpenAI Codex Developer Workflow Coding Standards AI Copilot
0
companies
0%
copilot instructions.md Initial

GitHub Copilot custom instructions file placed in .github/ directory, providing repository-specific coding standards, framework preferences, and behavioral guidelines for Copilot Chat and coding agent.

AI Copilot GitHub Copilot Developer Workflow Coding Standards Repository
0
companies
0%
.instructions.md Initial

File-scoped custom instruction files for GitHub Copilot and VS Code, using applyTo patterns to target specific file types or tasks with tailored AI guidance.

AI Copilot GitHub Copilot VS Code Developer Workflow Coding Standards
0
companies
0%
.windsurfrules Initial

Configuration file for Windsurf AI code editor containing project-specific rules, coding conventions, and instructions for the Cascade AI assistant.

AI Agents Windsurf Developer Workflow Coding Standards AI Copilot
0
companies
0%
.clinerules Initial

Configuration file for Cline AI coding assistant providing project-specific rules, coding conventions, and behavioral instructions.

AI Agents Cline Developer Workflow Coding Standards AI Copilot
0
companies
0%
.roorules Initial

Configuration file for Roo Code AI coding assistant providing project-specific rules and coding conventions.

AI Agents Roo Code Developer Workflow Coding Standards AI Copilot
0
companies
0%
CONVENTIONS.md Initial

Project conventions file documenting coding standards, naming conventions, architecture decisions, and development practices. Used by AI coding assistants and human developers alike.

Coding Standards Documentation Developer Workflow Best Practices
0
companies
0%
.aiignore Initial

Configuration file specifying files and directories that AI coding agents should not process or modify, similar to .gitignore but for AI tools. Used by JetBrains Junie and other AI agents.

AI Agents Configuration Security Developer Workflow
0
companies
0%
guidelines.md Initial

JetBrains Junie AI agent configuration file stored in .junie/ directory providing persistent project-level context and coding guidelines.

AI Agents JetBrains Developer Workflow Coding Standards AI Copilot
0
companies
0%
.gitignore Initial

Git configuration file specifying intentionally untracked files and directories that Git should ignore, preventing build artifacts, dependencies, and secrets from being committed.

Git Version Control Configuration Repository
0
companies
0%
.gitattributes Initial

Git configuration file defining path-specific settings for line endings, diff handling, merge strategies, and binary file detection.

Git Version Control Configuration Repository
0
companies
0%
.editorconfig Initial

Cross-editor configuration file defining coding style preferences like indentation, line endings, and character encoding to maintain consistent formatting across different editors and IDEs.

Coding Standards Configuration IDE Formatting
0
companies
0%
FUNDING.yml Initial

GitHub configuration file specifying funding platforms and links for project sponsorship, displayed as a Sponsor button on the repository page.

Open Source Sponsorship Repository GitHub
0
companies
0%
renovate.json Initial

Renovate bot configuration file for automated dependency updates, supporting multiple package managers and customizable update strategies.

Dependency Management Automation CI/CD Configuration
0
companies
0%
mcp.json Initial

Model Context Protocol configuration file defining MCP server connections for AI coding assistants, enabling tool integration and enhanced AI capabilities.

AI Agents MCP Configuration Developer Workflow Tool Integration