In Kubernetes, a name is a user-defined string that identifies a specific object in a resource URL, for example, /api/v1/pods/some-name. Each object of a certain kind should have a unique name within its namespace. However, if you delete an object, you can create another object with the same name. external-link


In order to support the isolation of the different resource groups withing the individual clusters the Namespace abstract is used. Namespaces facilitate organizing objects in a cluster and dividing cluster resources.Resource names need to be unique within a namespace, but not across namespaces. Namespace-based scoping is applicable only for namespaced objects (e.g. Deployments, Services, etc) and not for cluster-wide objects (e.g. StorageClass, Nodes, PersistentVolumes, etc). external-link


This is a user association with a global membership that focuses on automation technology and digitalization in process industries. external-link


The automatic translation of IPv6 addresses into IPv4 addresses is called NAT64. By using NAT64, it is possible to enable communication between IPv6 and IPv4 networks. external-link

Nationale E-Government-Strategie

On September 24, 2010, the IT Planning Council adopted the National E-Government Strategy (NEGS). This was the first joint agreement between the federal, state and local governments on how to further develop the electronic handling of administrative matters via the Internet. The NEGS defines six central goals that will guide future projects. These include focusing on the benefits for citizens, companies and the administration, increasing the efficiency of government action, transparency with regard to data and processes, data protection and promoting social participation through online government offerings. At the 6th meeting of the IT Planning Council on October 13, 2011, an implementation concept was adopted that includes the establishment and expansion of a service-oriented federal e-government infrastructure as one of the central measures. external-link

Near Field Communication

Near Field Communication" wireless technology enables the contactless exchange of data between devices at extremely short distances of just a few centimeters. external-link

Network Address Translation

When connecting different networks, the automatic translation of addresses in data packets is called Network Address Translation. external-link

Network Analytics

Analyzing the network offers a more profound understanding of its performance and the organization's utilization of it. By utilizing analytics, IT can enhance security measures, optimize performance, identify and resolve intricate issues, forecast traffic patterns, detect potential problems, and conduct thorough forensic investigations and audits. external-link

Network Bandwidth (in Gbps)

Maximum rate of data transfer for peer-2-peer data exchange, possibly shared among multiple users.

Data Intelligence Hub

Network Filesystem

NFS, or Network File System, is a type of client/server software that allows a user to access and manipulate files on a remote computer as if they were on their own local computer. The user's computer must have an NFS client installed, while the remote computer must have an NFS server running. external-link

Network Function Virtualization

NFV, an idea put forward by a community of interest situated in ETSI, aims to define network functions such as gateways, routers, application servers, etc., which have conventionally been a product of software and dedicated hardware, in such a way that they can operate as software-only solutions on standard IT servers. external-link

Network of stakeholders

In the realm of business, stakeholders are entities with vested interests in a company, capable of exerting influence on or being impacted by its operations. The principal stakeholders within a standard corporation encompass investors, employees, customers, and suppliers. These key parties play vital roles in shaping the company's trajectory and success. external-link

Network Policy

Network Policies define the guidelines for communication between groups of Pods and other network endpoints. By using labels, Network Policies enable the selection of Pods and the creation of rules that specify which traffic is allowed to reach the selected Pods. These rules can be used to configure connectivity between Pods, namespaces, and port numbers. It is essential to note that Network Policies are executed by a network plugin supplied by a network provider. Without a controller to implement them, creating a network resource will not be effective. external-link

Networked Learning

Networked Learning is a term used to describe the process of utilizing the internet to develop or provide access to information and individuals in order to support one's own educational, learning, and qualification goals. external-link


NewSQL is a recently developed language used for accessing databases. It is defined in a clear, concise, and consistent manner and is considered more user-friendly than SQL. It should be noted that it is not a subset or an extension of SQL, nor is it an object-oriented database language. Instead, it is built on top of the cross-database library LDBC. external-link

Next Generation Access

The term "next generation access" refers to next-generation access networks that enable high bit rates. These networks can either consist of fiber-optic lines with a minimum speed of 40 Mbit/s downstream and 15 Mbit/s upstream, or a cable network with a speed of up to 50 Mbit/s or more. In addition, new office and residential buildings can be connected via a fiber-optic cable network with speeds of up to 100 Mbit/s, as specified in the EU Broadband Expansion Guideline of September 2010. external-link

Next Generation Network

This network technology enables access to services regardless of location through mobile and fixed network connections. external-link


Moderated and chaired by the Federal Network Agency, the NGA Forum is intended to address issues at an early stage in order to drive forward broadband expansion in Germany, which requires enormous investment, and to solve practical implementation problems. external-link


The Directive (EU) 2016/1148 aims to establish a high, consistent level of security for network and information systems across the European Union. For further information, please refer to the following link: external-link

Node (Master)

The Kubernetes control server is a physical or virtual server that manages the cluster. external-link

Node (Worker)

Nodes are physical or virtual servers where container workloads are executed in a specific container technology. external-link

Node Gaia-X

A Gaia-X Node is a versatile computing and storage resource that can be used to deploy a wide range of different services. Nodes are characterized by their well-defined certification levels and geographic locations, which helps ensure that Participants have clear visibility into the characteristics and capabilities of available resources. external-link

Nodes (Netzwerk)

In a communications network, a network node serves as a connection point. Each node acts as either a source or a destination for data transmissions and redistribution. They possess the ability to identify, process, and transmit data to other network nodes, either through programming or engineering. external-link

Non Disclosure Agreement

A Non-Disclosure Agreement (NDA), also known as a non-disclosure agreement, is a contract between two parties. Under this contract, one party agrees to disclose confidential information about its company or products to the other party. In return, the second party agrees not to disclose this information to third parties for a specified period of time. The main purpose of NDAs is to protect sensitive information and intellectual property by clarifying what information must be kept confidential and what information may be shared or published. external-link

Non-discriminatory access

Energy network operators are obligated to provide access to their transmission and distribution networks for electricity and gas to third parties. In doing so, they must pass on their own costs plus a reasonable profit margin. It is not allowed to discriminate against external energy suppliers compared to their own distribution (in the case of integrated energy providers). In the context of smart grids, this means that every user must be connected to the network under equal conditions. external-link

Non-Relational Database

A database that doesn't follow the table/key model promoted by relational database management systems (RDBMS) is referred to as a non-relational database. Manipulating data in these databases requires specific techniques and processes to address big data challenges encountered by large companies. external-link

NoSQL Databases

The concept of NoSQL revolves around a flexible database management approach capable of supporting diverse data models such as key-value, document, columnar, and graph formats. Unlike relational and SQL databases, NoSQL databases are generally non-relational, distributed, and scalable, offering features like data clustering, replication support, and eventual consistency. Notably, they do not adhere to a rigid database schema and often follow an open-source model. external-link


An entity recognized by Gaia-X that translates a Trusted Data Source into verifiable credentials on behalf of the entity managing the Trusted Data Source external-link

Number of users

This specifies the maximum number of users who can use the portal (i.e., the management interface) and the Connector UI, not necessarily simultaneously. Please note that the use of additional services may be allowed for more users than specified here, depending on the configuration of the service itself.

Data Intelligence Hub

Number Portability

In telecommunications, there is the option of number portability. This allows customers to keep their phone number when they switch providers and transfer it to the new provider's systems. external-link