In Kubernetes, a name is a user-defined string that identifies a specific object in a resource URL, for example, /api/v1/pods/some-name. Each object of a certain kind should have a unique name within its namespace. However, if you delete an object, you can create another object with the same name. external-link


In order to support the isolation of the different resource groups withing the individual clusters the Namespace abstract is used. Namespaces facilitate organizing objects in a cluster and dividing cluster resources.Resource names need to be unique within a namespace, but not across namespaces. Namespace-based scoping is applicable only for namespaced objects (e.g. Deployments, Services, etc) and not for cluster-wide objects (e.g. StorageClass, Nodes, PersistentVolumes, etc). external-link


This is a user association with a global membership that focuses on automation technology and digitalization in process industries. external-link


The automatic translation of an IPv4 address to another IPv4 address is called NAT-44. external-link


The automatic translation of IPv6 addresses into IPv4 addresses is called NAT64. By using NAT64, it is possible to enable communication between IPv6 and IPv4 networks. external-link

Nationale E-Government-Strategie

On September 24, 2010, the IT Planning Council adopted the National E-Government Strategy (NEGS). This was the first joint agreement between the federal, state and local governments on how to further develop the electronic handling of administrative matters via the Internet. The NEGS defines six central goals that will guide future projects. These include focusing on the benefits for citizens, companies and the administration, increasing the efficiency of government action, transparency with regard to data and processes, data protection and promoting social participation through online government offerings. At the 6th meeting of the IT Planning Council on October 13, 2011, an implementation concept was adopted that includes the establishment and expansion of a service-oriented federal e-government infrastructure as one of the central measures. external-link

Near Field Communication

Near Field Communication" wireless technology enables the contactless exchange of data between devices at extremely short distances of just a few centimeters. external-link

Network Address Translation

When connecting different networks, the automatic translation of addresses in data packets is called Network Address Translation. external-link

Network Analytics

Analyzing the network offers a more profound understanding of its performance and the organization's utilization of it. By utilizing analytics, IT can enhance security measures, optimize performance, identify and resolve intricate issues, forecast traffic patterns, detect potential problems, and conduct thorough forensic investigations and audits. external-link

Network Bandwidth (in Gbps)

Maximum rate of data transfer for peer-2-peer data exchange, possibly shared among multiple users.

Data Intelligence Hub

Network Filesystem

NFS, or Network File System, is a type of client/server software that allows a user to access and manipulate files on a remote computer as if they were on their own local computer. The user's computer must have an NFS client installed, while the remote computer must have an NFS server running. external-link

Network Function Virtualization

NFV, an idea put forward by a community of interest situated in ETSI, aims to define network functions such as gateways, routers, application servers, etc., which have conventionally been a product of software and dedicated hardware, in such a way that they can operate as software-only solutions on standard IT servers. external-link

Network of Stakeholders

A collective of parties involved in data space development, actively engaged by the DSSC to achieve its goals, with the community of practice being a central focus. external-link

Network Policy

Network Policies define the guidelines for communication between groups of Pods and other network endpoints. By using labels, Network Policies enable the selection of Pods and the creation of rules that specify which traffic is allowed to reach the selected Pods. These rules can be used to configure connectivity between Pods, namespaces, and port numbers. It is essential to note that Network Policies are executed by a network plugin supplied by a network provider. Without a controller to implement them, creating a network resource will not be effective. external-link

Networked Learning

Networked Learning is a term used to describe the process of utilizing the internet to develop or provide access to information and individuals in order to support one's own educational, learning, and qualification goals. external-link


NewSQL is a recently developed language used for accessing databases. It is defined in a clear, concise, and consistent manner and is considered more user-friendly than SQL. It should be noted that it is not a subset or an extension of SQL, nor is it an object-oriented database language. Instead, it is built on top of the cross-database library LDBC. external-link

Next Generation Access

The term "next generation access" refers to next-generation access networks that enable high bit rates. These networks can either consist of fiber-optic lines with a minimum speed of 40 Mbit/s downstream and 15 Mbit/s upstream, or a cable network with a speed of up to 50 Mbit/s or more. In addition, new office and residential buildings can be connected via a fiber-optic cable network with speeds of up to 100 Mbit/s, as specified in the EU Broadband Expansion Guideline of September 2010. external-link

Next Generation Network

This network technology enables access to services regardless of location through mobile and fixed network connections. external-link


Moderated and chaired by the Federal Network Agency, the NGA Forum is intended to address issues at an early stage in order to drive forward broadband expansion in Germany, which requires enormous investment, and to solve practical implementation problems. external-link


The Directive (EU) 2016/1148 aims to establish a high, consistent level of security for network and information systems across the European Union. For further information, please refer to the following link: external-link

Node (Master)

The Kubernetes control server is a physical or virtual server that manages the cluster. external-link

Node (Worker)

Nodes are physical or virtual servers where container workloads are executed in a specific container technology. external-link

Node Gaia-X

A Gaia-X Node is a versatile computing and storage resource that can be used to deploy a wide range of different services. Nodes are characterized by their well-defined certification levels and geographic locations, which helps ensure that Participants have clear visibility into the characteristics and capabilities of available resources. external-link

Node-pressure eviction

Node-pressure eviction is a method employed by kubelet to free up resources on nodes by proactively terminating pods. The kubelet continuously monitors various resources such as CPU, memory, disk space, and filesystem inodes on the nodes of your cluster. If the consumption of any of these resources reaches a certain threshold, the kubelet can take action by terminating one or more pods on the node to reclaim resources and prevent resource starvation. It is crucial to note that node-pressure eviction differs from API-initiated eviction. external-link

Nodes (Netzwerk)

In a communications network, a network node serves as a connection point. Each node acts as either a source or a destination for data transmissions and redistribution. They possess the ability to identify, process, and transmit data to other network nodes, either through programming or engineering. external-link

Non Disclosure Agreement

A Non-Disclosure Agreement (NDA), also known as a non-disclosure agreement, is a contract between two parties. Under this contract, one party agrees to disclose confidential information about its company or products to the other party. In return, the second party agrees not to disclose this information to third parties for a specified period of time. The main purpose of NDAs is to protect sensitive information and intellectual property by clarifying what information must be kept confidential and what information may be shared or published. external-link

Non-discriminatory access

Energy network operators are obligated to provide access to their transmission and distribution networks for electricity and gas to third parties. In doing so, they must pass on their own costs plus a reasonable profit margin. It is not allowed to discriminate against external energy suppliers compared to their own distribution (in the case of integrated energy providers). In the context of smart grids, this means that every user must be connected to the network under equal conditions. external-link

Non-personal data

Non-personal data includes all data that does not fall under the category of personal data. external-link

Non-Relational Database

A database that doesn't follow the table/key model promoted by relational database management systems (RDBMS) is referred to as a non-relational database. Manipulating data in these databases requires specific techniques and processes to address big data challenges encountered by large companies. external-link

NoSQL Databases

The concept of NoSQL revolves around a flexible database management approach capable of supporting diverse data models such as key-value, document, columnar, and graph formats. Unlike relational and SQL databases, NoSQL databases are generally non-relational, distributed, and scalable, offering features like data clustering, replication support, and eventual consistency. Notably, they do not adhere to a rigid database schema and often follow an open-source model. external-link