Taos Glossary

An explanation of industry terms that is a quick read, and knowledge base.



Red Hat’s Ansible Automation Platform was developed to help organizations build and manage automation elements across their operational processes. It provides a comprehensive foundation for implementing enterprise-wide automation for workflows such as cloud provisioning, configuration management, application deployment, intra-service orchestration, and many others. 

Application Modernization

Application modernization is the process of porting, converting, or otherwise rewriting an existing application, transforming it to take advantage of new technologies and functionality that better align with modern business opportunities. 


Cloud Migration

Cloud migration is the process of relocating an organization’s on-premises data, applications, and IT processes into a cloud or from one cloud to another. Cloud migrations are often driven by inefficient hardware, aging infrastructure, and legacy systems that are costly to maintain, challenging to configure for the best performance, and difficult to secure for privacy and resiliency. 



DevOps is a software delivery model aimed at promoting collaboration between the product engineering and IT operations teams to function at peak performance, thereby increasing their ability to release products and services at high velocity with as little friction and latency as possible. Organizations adopting DevOps have been found to deploy code 30x more frequently with 50% fewer failures.


Defined in connection with the DevOps model, DevSecOps is both a model and a cultural movement that aims to bake security directly into the application development process, shifting the security requirements of a solution “left” (closer to the beginning) in the software development lifecycle. 


Hybrid Cloud

Hybrid cloud solution combines a private cloud with at least one or multiple public clouds, with data orchestrated between the private and public services via proprietary software or third-party solutions. Hybrid clouds integrate on-premises infrastructure cloud-based services, facilitating management and data portability between the different systems.



Kubernetes is an open-source system for orchestrating the scale, deployment, and management of containerized workloads and services. Kubernetes, which is both portable and extensible, automates many manual processes required for the scalable deployment and management of containerized applications. 


Multi Cloud

Multi-cloud operations materialize when an organization engages a variety of cloud solutions such as public cloud, hybrid cloud, on-premises IT infrastructure, and edge computing. Multiple cloud computing and storage services are involved in a single network architecture for one organization.


Private Cloud

Establishing a private cloud means an organization engages a cloud computing infrastructure that is solely dedicated to company usage. A private cloud can be based on a company’s own data center, a colocation facility hosted by third-party vendors, or through a private cloud provider.

Public Cloud

Public cloud computing is the infrastructure that’s available and accessible to all users in a national region or globally. It is most often owned and managed by third-party providers. Public clouds give users remote access to enterprise-grade operational processing and storage.



Software as a service (SaaS) provides applications via the Internet instead of a business installing and maintaining software on its own. With SaaS, organizations can access the necessary software online, which helps to free them from complex and costly software and hardware management. SaaS applications are also labeled “Web-based software,” or known as on-demand software and hosted software.



Terraform is an infrastructure-as-code, open-source software tool that lets developers and IT teams build, change, and iterate resources safely and efficiently, whether in the cloud or on-premises. Terraform codifies cloud APIs into declarative configuration files and enables a consistent CLI workflow to manage hundreds of cloud services across an organization’s data infrastructure.


Zero Trust

As a security framework, the zero trust methodology requires all users, both within and outside a specific network, to be authorized and validated on an ongoing, per-use basis for security configuration and posture before being allowed to access in-network applications and data. A zero trust approach is a framework for securing infrastructure and data by assuming that there is no traditional network edge and that no entity attempting to gain access can be trusted by default.