CPU Scheduling

/ˌsiː-piː-ˈjuː ˈskɛd.jʊ.lɪŋ/

noun — “deciding which process gets the CPU’s attention next without starting a fistfight.”

CPU Scheduling is the mechanism by which an operating system decides the order in which ready-to-run processes get to use the CPU. In multitasking environments, multiple processes often compete for CPU time, and CPU Scheduling determines who runs when and for how long. Its primary goals are fairness, responsiveness, and optimal utilization of the processor.

Anomaly Detection

/əˈnɑːməli dɪˈtɛkʃən/

noun — "finding the needle in the data haystack before it ruins your day."

Anomaly Detection is a field in information technology and data science focused on identifying unusual patterns, outliers, or unexpected behaviors in datasets, systems, or network traffic. These anomalies may indicate errors, security breaches, fraud, system malfunctions, or rare but important events. Detecting anomalies helps organizations respond proactively to irregularities that could affect performance, security, or decision-making.

Cipher-based Message Authentication Code

/siː-mæk/

noun — "the cryptographic signature that proves a message hasn’t been tampered with."

CMAC, short for Cipher-based Message Authentication Code, is a cryptographic algorithm used to verify the integrity and authenticity of messages. It generates a fixed-size tag from a variable-length message using a block cipher, such as AES, ensuring that any alteration in the message can be detected.

Hash function

/hæʃ ˈfʌŋk.ʃən/

noun — "a function that converts data into a fixed-size digital fingerprint."

Hash Function is a mathematical algorithm that transforms input data of arbitrary length into a fixed-size value, called a hash or digest. This process is deterministic, meaning the same input always produces the same hash, but even a tiny change in input drastically changes the output. Hash Functions are widely used in data integrity verification, cryptography, digital signatures, password storage, and blockchain technologies.