Labels are metadata that provide identifying attributes relevant to users. They are key/value pairs that can be attached to Kubernetes objects such as Pods, Services, and Nodes. Labels are primarily used to organize and select subsets of objects, enabling users to apply a set of labels to objects and then use label selectors to find objects that match those labels. Labels are also used by other Kubernetes components, such as Replication Controllers, to manage groups of objects.
Entities designated by the Gaia-X Association to create and distribute Labels are known as Label Issuers. To create a Label, the Label Issuer breaks down all the Label requirements into Verifiable Credentials, which are subsequently encoded within the Compliance and Labelling framework to facilitate automated verification whenever possible. The entity responsible for issuing a Label can be either Gaia-X or another Issuer that has been verified and approved by Gaia-X.
Label Level 1
Regarding the three fundamental Gaia-X Labels, Label Level 1 ensures compliance with the Gaia-X Policy Rules Document and the set of basic technical requirements derived from the Gaia-X Architecture Document, thus guaranteeing data protection, transparency, security, portability, and flexibility. In terms of cybersecurity, the minimum requirement is to meet the Basic Level of ENISA's European Cybersecurity Scheme.
Label Level 2
Regarding the three fundamental Gaia-X Labels, Label Level 2 builds upon the basic requirements of Level 1 and reflects a higher level of security, transparency of applicable legal rules, and potential dependencies. Additionally, it requires the option of a service location in Europe to be provided to the consumer. In terms of cybersecurity, the minimum requirement is to meet the Substantial Level of ENISA's European Cybersecurity Scheme.
Label Level 3
Referring to the three Gaia-X Basic Labels: Label Level 3 aims to achieve the highest standards of data protection, security, transparency, portability, and flexibility, with European control as a key factor. It builds upon the requirements of Levels 1 and 2, with additional criteria that guarantee protection against non-European access and provide a strong level of control over vendor lock-in. Having a service location in Europe is compulsory. In terms of cybersecurity, meeting ENISAs European Cybersecurity Scheme - High Level is the minimum requirement.
Label Owners are entities that choose to create a particular Label for their organization. Such entities may include Service Providers, Service Users, Governmental Authorities, Standardization Authorities, Trade Associations, Industrial Associations, and others. The decision to develop a Gaia-X Label is based on its potential use and benefits. For instance, a Banking Association may decide to create a Label specifically for banks to ensure that all cloud services used by their members meet certain requirements. In this example, the Banking Association determines the Label's name and specifies the verification requirements (e.g., territorial jurisdiction, service location, required certifications, etc.). The Label Owner collaborates with the Gaia-X Association to design and issue the Label and must obtain formal approval from Gaia-X.
The detailed criteria that define the various levels of Gaia-X Basic Labels are outlined in the Policy Rules and Labelling Document, and they are structured by attributes that fall into different categories such as data protection, transparency, security, portability, flexibility, and European control.
Labels are pairs of key/value that are linked to objects like Pods. These labels serve the purpose of specifying identifying attributes of objects that hold significance and relevance to users. However, they do not directly imply any meaning to the core system. Labels offer the ability to organize and select specific subsets of objects. They can be assigned to objects during their creation and can be added or modified at any point afterward. Each object can possess a collection of unique key/value labels, with each key being distinct for a particular object.
A constructively usable template for conception and Big data application design is Nathan's Marz and James Warren published the lambda Architecture40. The modularization provided for in the architecture corresponds to typical requirements of big data Applications broader and systematized them. In this way, the architecture approach is useful to technical and non-functional requirements for new ones Uncover and assess applications independently of what form and to what extent the Module as technical components of the application will be realized.
LAMP - Linux, Apache, MySQL, PHP
This term refers to a "standard toolkit" used to provide dynamic web pages and applications.
Latency (delay time)
In the case of latency, an action remains hidden and only becomes visible through a reaction. In common language, reactions with low latency are referred to as real-time responses.
The LCM Engine is a service that is part of the Portal. It serves as an interface between the Portal, LCM services, and PPR during the life cycle management of a Gaia-X service.
Within the field of computer science, an algorithm is a precise set of instructions that can be followed to accomplish a specific task. In the context of machine learning, this task involves refining a model using training data to achieve optimization.
The collection, compilation, analysis, and reporting of personal data related to learning for the purpose of optimizing the learning process and the learning environment. The customization of the learning process enhances the effectiveness of the educational operation.
Learning Management Systems
A complex software system that serves the provision of learning content and the organization of learning processes is known as a Learning Management System (LMS). It enables communication between learners and educators. Modern LMSs also integrate Content Management Systems (Learning Content Management Systems, LCMS) and are connected to campus management systems through interfaces.
Legal Person Credential
A Legal Person Credential is a digital representation of legal entity information, such as the registration details, business identification, or legal status of a company or organization. It serves as a verifiable proof of the entity's legal existence and can be used in digital transactions, regulatory compliance, or business interactions.
Lightweight Directory Access Protocol
The Lightweight Directory Access Protocol (LDAP) is a software protocol designed to allow easy access to information regarding organizations, individuals, and various resources like files and devices within a network. This applies to both the public internet and internal corporate intranets.
LimitRange is a Kubernetes resource that allows you to set constraints on resource consumption per Pods or Containers in a namespace. It limits the number of objects that can be created by type and the amount of CPU, memory, and storage resources that each Container or Pod can request or consume.
The name of a well-known open-source Unix derivative is based on the name of its creator, Linus Torvalds. This operating system is freely available and can be modified and distributed without any licensing fees or restrictions.
The Telekom Data Intelligence Hub (DIH) offers a managed, pre-configured and resettable dataspace sandbox, called DIH Living Lab. It provides an end-to-end dataspace experience and allows users to prototype and test different use cases or applications within dataspace environment.
The integration of the demand side (electricity consumption) into the flexible management of the power supply system enables a more effective coordination of generation and consumption. The goal of demand management is to balance generation and price fluctuations, provide balancing and regulating energy, and relieve overloaded network sections, especially in the distribution network, in the long term.
Local Area Network
A local communication network allows users in a limited geographical region or at a specific location to communicate and exchange information with each other. It is utilized in various environments and plays a significant role in enhancing collaboration and coordination of activities at the local level.
Local Business Unit
A Local Business Unit (LBU) refers to a distinct operational division or branch within a larger organization that operates within a specific geographical area or region. LBUs are often established to cater to the unique needs and characteristics of the local market. They have a certain level of autonomy and decision-making authority, allowing them to adapt their strategies and operations to the local environment. LBUs are responsible for managing their own resources, such as personnel, budget, and assets, while aligning with the overall goals and objectives of the larger organization. This decentralized structure enables organizations to effectively serve diverse markets and customers at the local level.
Local public transport
In professional, educational, shopping and everyday transport, people are transported by road, rail and water transport vehicles. This is done in regular transport, which covers a certain spatial area.
Logs refer to the recorded events or messages generated by the cluster or application. They provide useful information about the internal workings of the cluster and can be used to troubleshoot issues or monitor the activity of the cluster. Application and system logs are especially helpful for understanding what is happening inside the cluster.
Logistics, which encompasses both transport and storage, is not considered a direct part of the production process in terms of creating the final product. However, it is a necessary component in the overall production system to facilitate the movement of components and intermediate products between modules, as well as temporary storage. Logistics considerations must take into account the requirements of each module and intermediate product, such as size, weight, and transfer methods, and be integrated into the processing logic of the production system.
Long Term Evolution
LTE, as the successor standard to UMTS, provides a significantly higher bandwidth of over 100 Mbit/s per cell.
Low Cost Storage (Object Storage)
Object storage, also known as object-based storage, refers to a method of managing and accessing individual storage units called objects. These storage objects contain both data content and context information.
LTE-Advanced offers download and upload speeds that are two to three times faster than standard LTE. Moreover, all LTE Advanced devices maintain compatibility with standard LTE, allowing seamless integration.
LTE-FDD and LTE-TDD
FDD-LTE (Frequency Division Duplexing) and TDD-LTE (Time Division Duplexing) are two different 4G variants that use an existing broadband spectrum differently. FDD-LTE uses different frequency bands for downloading and uploading, while TDD-LTE uses a band with a time offset for transmitting and receiving. Switching between uplink and downlink happens so quickly that it is not noticeable to the user. FDD-LTE is considered the modern 4G variant and is the most widespread worldwide.