Software principle advising against implementing features until they are necessary, useful when scoping MVPs for dapps and AI integrations.

Human friendly data serialization format used for config files, CI pipelines, and infrastructure as code; sensitive to indentation and whitespace.

Mechanism to reuse and override configuration blocks within YAML files, reducing duplication in CI workflows, k8s manifests, and ML experiment configs.

YAMNet

Audio event classification model trained on YouTube AudioSet embeddings, used for tagging sounds in video and real time monitoring applications.

Colloquial phrase for rug pull, when creators drain liquidity or revoke functionality to steal user funds; watch for upgrade keys and admin powers.

Secure two party computation technique that allows evaluation of a function over private inputs without revealing them, basis for private matching and auctions.

Classic secure computation problem where two parties learn who has a larger value without revealing the actual numbers, motivating privacy preserving protocols.

Pattern based malware detection language used by security teams to hunt for payloads or indicators of compromise in codebases, images, and logs.

Node package manager known for lockfiles and monorepo workflows; often used in dapp frontends with PnP and workspaces for deterministic installs.

Cluster resource management layer in Hadoop ecosystems that schedules compute across nodes, powering big data and some on chain analytics pipelines.

DeFi protocol offering automated vault strategies and yield products; emits yvTokens as vault receipts that appreciate versus the deposit asset over time.

Formal specification of the Ethereum protocol covering state transition function, gas costs, and VM semantics, authored initially by Gavin Wood.

Experimental end to end encrypted IPv6 mesh networking protocol that can be used to interconnect nodes over the public internet without central routing.

Smart contract vaults that automate yield strategies across pools or lenders and auto-compound rewards, charging a management or performance fee.

Token whose balance or exchange rate increases as underlying assets earn interest or rewards, e.g., staked ETH derivatives or vault receipts.

Strategy of moving liquidity across protocols to earn fees, incentives, or interest, balancing APY against smart contract and market risk.

Family of real time object detection models that predict bounding boxes and classes in a single forward pass, widely used for edge and browser inference.

Extended private key corresponding to ypub for BIP49 derivations; compromising a yprv exposes all descendant keys for that branch, store with strong isolation.

Version prefix indicating an extended public key for P2WPKH-in-P2SH addresses per BIP49; used by some wallets for format clarity alongside xpub/zpub variants.

Compact hardware security module for server side key storage and signing, used to protect validator keys, hot wallets, and admin credentials in production.

Hardware security key that stores private credentials and performs FIDO2/WebAuthn, OTP, and PIV operations, commonly used for exchange and admin MFA.

Low level, chain agnostic intermediate language used by Solidity and Vyper compilers for optimized bytecode generation and inlined assembly sections.

Tongue in cheek reference to tracking luxury and meme indicators as a proxy for risk appetite; not scientific but often used in crypto narratives.

Receipt token representing a share in a Yearn vault; its price in the underlying asset increases as the strategy harvests and compounds yields.