Home › Glossary
CRYPTOCURRENCY
Bitcoin The first decentralized cryptocurrency, running on a proof-of-work blockchain since 2009.
Blockchain A distributed ledger that records transactions across many computers in tamper-resistant blocks.
Mempool The waiting room for unconfirmed transactions before they are added to a block.
Hashrate The total computational power being used to mine and secure a blockchain network.
Fear and Greed Index A sentiment indicator that scores crypto market emotion from 0 (extreme fear) to 100 (extreme greed).
Halving A scheduled event that cuts Bitcoin's block reward in half roughly every four years.
BTC Dominance Bitcoin's share of the total cryptocurrency market cap, used as a rotation signal.
Bitcoin ETF Exchange-traded fund that holds Bitcoin and trades on traditional stock exchanges.
UTXO Unspent Transaction Output: the data structure Bitcoin uses to track ownership.
Taproot 2021 Bitcoin upgrade improving privacy, efficiency, and smart contract flexibility.
Gas Fees Transaction fees paid to validators on networks like Ethereum for processing operations.
Mining Pool A group of miners who combine computational resources and share block rewards proportionally.
Satoshi The smallest unit of Bitcoin, equal to 0.00000001 BTC, named after Bitcoin's creator.
Lightning Network A layer-2 payment protocol that enables fast, low-cost Bitcoin transactions off-chain.
DeFi Decentralized finance: financial services built on blockchain without traditional intermediaries.
Stablecoin A cryptocurrency pegged to a stable asset like the US dollar to reduce price volatility.
Cold Storage Keeping cryptocurrency private keys completely offline to protect against hacking.
Smart Contract Self-executing code deployed on a blockchain that runs automatically when conditions are met.
Whale An individual or entity holding a large enough amount of cryptocurrency to move market prices.
Layer 2 (L2) A blockchain built on top of another (typically Ethereum) that handles transactions off the main chain to scale throughput and cut fees.
Rollup A Layer 2 design that bundles many transactions and posts a compressed summary plus proof back to Layer 1.
Optimistic Rollup A rollup that assumes batches are valid and uses a 7-day fraud-proof window to catch invalid state.
ZK Rollup A rollup that posts a cryptographic validity proof with every batch, eliminating the optimistic-rollup challenge window.
Crypto Bridge A protocol that moves assets between blockchains by locking on one side and minting an equivalent on the other.
Blockchain Oracle A service that posts off-chain data on-chain so smart contracts can react to real-world events.
Staking Locking up cryptocurrency to participate in proof-of-stake consensus or earn protocol rewards.
Validator A node operator on a proof-of-stake blockchain that proposes and attests to blocks for staking rewards.
Liquidity Pool A smart contract holding two tokens that traders can swap between, with prices set by a formula.
Automated Market Maker An exchange that uses a liquidity pool and a pricing formula instead of an order book.
Slippage The difference between an expected trade price and the actual execution price, especially on AMMs.
Seed Phrase A 12 or 24-word mnemonic that encodes a wallet's master key and grants full control of the funds.
DEVELOPMENT
API Application Programming Interface: a set of rules that lets software applications communicate with each other.
REST Representational State Transfer: an architectural style for building web APIs using standard HTTP methods.
GraphQL A query language for APIs that lets clients request exactly the data they need in a single call.
JSON JavaScript Object Notation: a lightweight text format for storing and transmitting structured data.
YAML A human-readable data serialization format often used for configuration files.
Base64 An encoding scheme that converts binary data into ASCII text for safe transmission over text-only channels.
JWT JSON Web Token: a compact, self-contained token used for authentication and secure data exchange.
OAuth An authorization framework that lets apps access user data from third-party services without sharing passwords.
Regex Regular expressions: a pattern-matching language for searching and manipulating text strings.
UUID Universally Unique Identifier: a 128-bit label used to identify resources without a central registry.
Hash Function A mathematical function that converts input data into a fixed-size string of characters, used for verification.
HTTP Status Code A three-digit number returned by a server to indicate the result of a client's request.
CORS Cross-Origin Resource Sharing: a browser security mechanism controlling which domains can access an API.
WebSocket A protocol that enables persistent two-way communication between a browser and a server.
API Rate Limiting Throttling the number of API requests a client can make within a given time window.
WebAssembly (Wasm) A binary instruction format that runs in browsers and servers at near-native speed, supporting many languages.
Edge Computing Running application code at points of presence close to users instead of in a centralized data center.
Serverless A cloud model where you write functions and the provider handles all server provisioning, scaling, and lifecycle.
Kubernetes (k8s) An open-source platform for orchestrating containerized applications across clusters of machines.
Webhook An HTTP callback where one service POSTs an event to a URL hosted by another, the inverse of polling.
gRPC A high-performance RPC framework using HTTP/2 and Protocol Buffers for typed services and binary serialization.
Semantic Versioning (SemVer) A versioning scheme where MAJOR.MINOR.PATCH numbers signal breaking changes, features, and fixes.
Idempotent An operation that produces the same result no matter how many times it is performed, critical for safe retries.
ETag An HTTP header that uniquely identifies a resource version, used for conditional requests and cache validation.
Monorepo A single repository holding multiple projects, services, or packages with shared tooling and dependencies.
NETWORKING
DNS Domain Name System: the internet's phonebook that translates domain names into IP addresses.
SSL/TLS Encryption protocols that secure data in transit between a browser and a server (the lock icon).
CDN Content Delivery Network: a global network of servers that delivers cached content from the closest location.
IP Address A numerical label assigned to every device on a network, used for routing data packets.
Port A numbered endpoint on a networked device that directs traffic to specific services or applications.
SECURITY
Encryption The process of converting readable data into an unreadable format that can only be decoded with a key.
Two-Factor Authentication A login method requiring two different forms of verification, such as a password plus a phone code.
Phishing A social engineering attack that tricks people into revealing passwords, keys, or sensitive data.
Zero-Day A software vulnerability that is exploited before the vendor knows about it or has released a patch.
CSRF Cross-Site Request Forgery: an attack that tricks a user's browser into making unwanted requests.
Cross-Site Scripting (XSS) A vulnerability where attacker-supplied scripts run in another user's browser with the privileges of the targeted site.
SQL Injection A vulnerability where untrusted input becomes part of a SQL query, letting attackers read or modify the database.
DDoS Attack A Distributed Denial of Service attack that floods a target from many sources to make it unavailable to real users.
Mutual TLS (mTLS) TLS where both client and server present and verify certificates, used for service-to-service authentication.
Zero Trust A security model where every request is authenticated and authorized regardless of network location.
AI & MACHINE LEARNING
Large Language Model An AI system trained on massive text datasets that can generate, summarize, and reason about language.
AI Agent An autonomous AI system that can take actions, use tools, and complete multi-step tasks on its own.
Embeddings Numerical vector representations of text, images, or data that capture semantic meaning for AI models.
llms.txt A standardized file that websites publish to help AI agents discover and understand their content and APIs.
Prompt Engineering The practice of crafting inputs to large language models to get more accurate, useful outputs.
Model Context Protocol (MCP) An open standard for AI agents to discover and call tools, data sources, and prompts from any compatible server.
Agent-to-Agent (A2A) A protocol for autonomous agents to delegate tasks to each other across vendor boundaries.
Function Calling A model capability to output structured JSON conforming to developer-defined function signatures, used to invoke external tools.
Tool Use The umbrella term for an LLM invoking external functions, APIs, or systems to extend its capabilities beyond text.
Retrieval-Augmented Generation (RAG) Grounding LLM responses by retrieving relevant documents from a knowledge base and including them in the prompt.
Vector Database A database optimized for storing and similarity-searching high-dimensional vectors, the backbone of semantic search and RAG.
Context Window The maximum number of tokens a language model can process at once, including prompt, history, and response.
Prompt Injection Attacks where untrusted input causes a language model to ignore instructions and follow attacker-supplied directives instead.
Token (LLM) The atomic subword unit a language model uses to read and generate text, roughly 0.75 English words per token.
Inference The act of running a trained model to produce predictions, as opposed to training it.
Fine-Tuning Training a pre-existing language model on new data to specialize behavior for a specific domain or task.
Chain-of-Thought (CoT) A prompting technique that asks language models to reason step-by-step before answering, dramatically improving accuracy.
Agent Loop The core control flow of an AI agent: observe, decide, act, repeat until done or a stop condition fires.
ReAct (Reason + Act) An agent design pattern that interleaves reasoning steps with actions for better multi-step planning.
Hallucination (LLM) When a language model confidently outputs incorrect or fabricated information, often presented as fact.
Zero-Shot Learning A model performing a task with only a description, no examples, in the prompt.
Few-Shot Learning Including a small number of input/output examples in the prompt to demonstrate the desired task format and style.
AI Alignment The technical and research effort to make AI systems behave according to human intentions, especially as they grow more capable.
Mixture of Experts (MoE) A neural architecture where only a fraction of parameters activate per input, enabling huge models at modest inference cost.
Context Caching A pricing feature where repeated prompt prefixes are stored on the inference server, cutting cost and latency.
MARKETS
Prediction Market A platform where users trade contracts on the outcome of real-world events, revealing crowd probabilities.
Polymarket The largest decentralized prediction market, built on Polygon, where users bet on event outcomes.
Fed Funds Rate The interest rate at which US banks lend reserves to each other overnight, set by the Federal Reserve.
CPI Consumer Price Index: a measure of the average change in prices paid by consumers for goods and services.
Treasury Yield The return earned on US government debt securities, used as a benchmark for interest rates globally.
Order Book The list of all open buy and sell orders for an asset, organized by price and size, used to match trades.
Volatility A measure of how much an asset's price varies over a time window, the key input to risk management.
Market Capitalization The total value of an asset's circulating supply, calculated as price multiplied by quantity outstanding.
No matching terms found.