cAdvisor, short for Container Advisor, is a daemon that gathers information about running containers and provides users with insights into their resource usage and performance characteristics. It collects and processes data such as resource isolation parameters, historical usage, histograms, and network statistics for each container, and exports this data by container and machine-wide. external-link


In a standardized skill ontology, capabilities refer to the specific requirements needed to execute a production step, also known as a BOP operation. These capabilities can be described in varying degrees of detail depending on the specific production step.

Catena-X Automotive Network e.V.

Carrier Aggregation

LTE technology has a component that allows for the use of multiple frequency bands that are not necessarily adjacent. This feature enables mobile network operators to provide users with large bandwidths even when they only have fragmented frequency bands available. external-link


The functionality of browsing, searching, and filtering services and resources is made possible through the implementation of a specific subclass of Service Offering known as Catalogue service. external-link

Catalogue of building blocks

The catalogue is a well-organized inventory of endorsed building blocks for dataspaces, which not only defines them but also offers several options for their implementation. By enabling the reuse of commonly implemented building blocks across numerous data spaces, the catalogue ensures consistency. The Data Spaces Support Centre has a structured process for adding, maintaining, and approving building blocks in the catalogue, ensuring that it continues to evolve over time. external-link


Assurance is the act of an independent body providing written confirmation that the relevant Participants, Assets, and Resources fulfill specific requirements. external-link

chief technology officer

The role of a Chief Technology Officer (CTO) involves serving as a senior executive responsible for supervising an organization's research and development (R&D) efforts and managing its technology-related needs. The CTO evaluates both the immediate and future requirements of the organization and strategically allocates resources to make investments that align with its objectives. Generally, the CTO directly reports to the Chief Executive Officer (CEO) of the company. external-link


CIDR stands for Classless Inter-Domain Routing, which is a way of describing blocks of IP addresses in networking. In Kubernetes, each Node is assigned a range of IP addresses through CIDR notation, which consists of a start address and a subnet mask. This enables Nodes to assign each Pod a unique IP address. While CIDR was originally used for IPv4, it has also been expanded to include IPv6. external-link


City hubs serve as central points for supplying retail and industrial companies in urban areas and are not dependent on freight forwarders or logistics service providers. They can be operated through the use of networked information and communication technology (ICT), which fills gaps in the mobility and logistics network, enabling dynamic delivery and pick-up routes. external-link


A claim concerning entities articulated using the RDF data model external-link

Cloud Controller Manager

The cloud controller manager is a crucial component of the Kubernetes control plane that integrates cloud-specific control logic. It allows you to connect your Kubernetes cluster to your cloud provider's API and separates the components that interact with the cloud platform from those that interact only with the cluster. By doing so, it helps to decouple the integration logic between Kubernetes and the underlying cloud infrastructure. This decoupling enables cloud providers to release new features at a different pace than the main Kubernetes project, giving them greater flexibility and control over their offerings. external-link


A cluster consists of worker nodes that run containerized applications. Each cluster must have at least one worker node. Pods, which make up the application workload, are hosted on the worker nodes. The control plane oversees the worker nodes and the Pods in the cluster. In production environments, the control plane usually runs on multiple computers. A cluster typically has multiple nodes to ensure fault-tolerance and high availability. external-link

Cognitive Computing

Cognitive Computing refers to the simulation of human thought processes through a computerized model. This involves self-learning systems that use techniques such as data mining, pattern recognition, and natural language processing to imitate the functioning of the human brain. The ultimate goal of cognitive computing is to create automated IT systems capable of independently solving problems without human intervention. Machine learning algorithms are used by cognitive computing systems to continuously acquire knowledge from the data fed into them. The systems refine their approach to pattern recognition and data processing to become capable of anticipating new problems and generating possible solutions. external-link

Combined heat and power

Kraft-Wärme-Kopplung (KWK) is the process of "simultaneously converting input energy into electrical power and useful heat within a stationary technical installation." This is commonly achieved through the use of combustion engines external-link

Command Line Interface

A command line interface (CLI) is a type of user interface that allows users to interact with a computer's operating system or application by typing in commands on a specific line in response to visual prompts. The system responds to the command and the user can then enter another command, and so on. external-link

Computing Services & Solutions

Computing Services & Solutions refer to a wide array of technologies, resources, and expertise offered to organizations to address their computing needs and overcome technological obstacles. These services encompass cloud computing, managed IT services, and solutions in areas such as network infrastructure, cybersecurity, data analytics, software development, and enterprise resource planning (ERP). By leveraging these services and solutions, organizations can streamline operations, enhance data security, access scalable computing resources, and leverage specialized expertise. This enables businesses to focus on their core activities, improve efficiency, and drive digital transformation for sustainable growth and competitive advantage. external-link


A ConfigMap is an API object that can hold data in key-value pairs, which is not considered confidential. ConfigMaps are used by Pods to consume data as environment variables, command-line arguments, or as configuration files in a volume. By using ConfigMaps, you can separate environment-specific configuration from container images, making it easier to move applications between environments. external-link

Conformity Assessment Body (CAB)

The Gaia-X Association reserves the right to select its own Conformity Assessment Bodies (CABs) using its three basic labels. The CABs are responsible for providing conformity assessment services. external-link


The IDS-G specification "Connector" refers to a specialized server designed to send and receive data according to the standard Connector specification. There are various types of Connectors, including the Base Connector and the Trusted Connector, as well as the Internal Connector and the External Connector. These different types of Connectors are defined based on specific criteria outlined in the IDS-G specification. external-link

Constrained Application Protocol

CoAP is a web transfer protocol created by the Internet Engineering Task Force (IETF) that uses the Representational State Transfer (REST) architecture model for web services. In REST, resources are managed by an application process on servers and are identified using Universal Resource Identifiers (URI). external-link

Construction site map

A continuously updated overview of planned underground construction projects with the aim of enabling cost-effective co-installation of other infrastructures and avoiding repetitive construction sites. external-link

consumer package goods

Consumer packaged goods (CPG) encompass products intended for direct consumption, including food and beverages, apparel and footwear, tobacco, and cleaning items. CPGs are typically items that are consumed or used up regularly and require frequent replenishment, distinguishing them from durable goods like cars and furniture, which are generally retained for extended periods. external-link

Consumer to Administration (e.g. tax return of private individuals, residence registration)

Consumer to Administration refers to interactions where private individuals engage with governmental or administrative bodies for activities such as filing tax returns or registering changes of residence

Quelle [AM 13] S. 301 Abts, D.; Mülder, W.: Grundkurs Wirtschaftsinformatik. Eine kompakte und praxisorientierte Einführung. Springer Vieweg, Wiesbaden, 2013.


A portable executable image that includes software and all of its dependencies. Containers separate programs from the underlying host infrastructure, making deployment and scaling easier in diverse cloud or OS environments. Containerized apps are programs that operate inside containers. Containerization refers to the act of combining these apps and their dependencies into a container image. external-link

Container Environment Variables

Container environment variables are name=value pairs that offer important information to pod containers. Container environment variables offer information required by containerized programs as well as information about essential resources to the containers. For example, file system data, container information, and other cluster resources such as service endpoints. external-link

Container Runtime Interface

The Kubernetes Container Runtime Interface (CRI) is the primary protocol used for communication between the kubelet and container runtime components in a cluster. It uses the gRPC protocol for this purpose. external-link

Container runtime interface (CRI)

The container runtime interface (CRI) is a set of standards and guidelines that provide an API for container runtimes to integrate with the kubelet on a node. The CRI defines a standard interface between Kubernetes and container runtimes, enabling Kubernetes to be compatible with any container runtime that implements the CRI. To learn more about the CRI API and specifications, additional information is available. external-link

Continuous Replenishment Program

Inventory replenishment refers to the deliberate and systematic transfer of stock from an upstream point in the supply chain to a downstream location where enough inventory is needed to meet demand. The approach to inventory replenishment can vary depending on the nature of the business and the specific circumstances involved. external-link


A CronJob in Kubernetes is responsible for managing a Job that needs to be run on a recurring basis. It operates similarly to a crontab file in a Unix/Linux system, where the schedule is specified using the cron format. The CronJob object defines the schedule and other settings for the job to be executed periodically. external-link

Cyber Physical Systems

A coupling and coordination of computing power and mechanical elements through a communication infrastructure such as the Internet is made possible by Cyber-Physical Systems (CPS). Through the integration of sensors and actuators into the overall system, CPS provide real-time system functions for the integration of information, data, and functions. external-link