Parallel Data Analysis

Parallel data analysis refers to the process of analyzing large volumes of data by dividing the workload across multiple computing resources that work in parallel. It involves breaking down the data and distributing the analysis tasks across multiple processors, servers, or computing nodes, allowing for faster and more efficient data processing. Parallel data analysis is commonly used in high-performance computing, big data analytics, and scientific research to expedite complex data analysis tasks.

https://www.techopedia.com/definition/30352/parallel-data-analysis external-link

Pattern Recognition

Pattern recognition is a field of study within artificial intelligence and machine learning that focuses on the identification and analysis of patterns or regularities in data. It involves developing algorithms and models that can recognize and classify patterns in various types of data, such as images, text, sound, or numerical data. Pattern recognition techniques are widely used in applications like image recognition, speech recognition, data mining, and predictive analytics. The goal of pattern recognition is to enable computers to automatically identify and understand patterns, leading to automated decision-making and intelligent data analysis.

https://www.arm.com/glossary/pattern-recognition#:~:text=Pattern%20recognition%20is%20a%20data,familiar%20patterns%20quickly%20and%20accurately. external-link

PCF – Product Carbon Footprint

The total greenhouse gas emissions (in carbon dioxide equivalents) associated with a product, regardless of the type of product (e.g., a single item, a quantity of items, or a service).

https://www.carbon-transparency.com/media/1qcdbdyn/pathfinder-network_technical-specifications-for-use-case-001.pdf external-link

Personal Data

Personal data refers to any information pertaining to a living individual that can be identified or is identifiable. Additionally, the combination of various pieces of information that can lead to the identification of a specific person is also considered personal data.

https://commission.europa.eu/law/law-topic/data-protection/reform/what-personal-data_en external-link

Pharmaceutical Central Number

The Pharmaceutical Central Number (PZN) is assigned by the Information Center for Medicinal Products (IFA) [1] for all products available in pharmacies (according to §25 of the Pharmacy Operation Regulation). In addition to providing a unique identification for a packaged finished medicinal product (supplier, dosage form, strength, package size), the PZN also serves as the basis for ordering and billing of medications in the healthcare sector.

http://www.pruefziffernberechnung.de/P/PZN.shtml external-link

Physical Resource

A physical resource refers to a resource with a measurable weight and a spatial position, representing a tangible entity that serves as a host, manipulator, or participant in interactions with other physical entities.

https://gaia-x.gitlab.io/glossary/ external-link

pilot project

Pilot projects serve the purpose of testing and, if necessary, adapting the effective functionality of the developed tools, processes, and methods under real conditions. During practical implementation, aspects may arise that were not or insufficiently considered during the development of the methods, tools, and processes. The goal is to identify these aspects and make corresponding adjustments.

http://www.projektmanagementhandbuch.de/projektmanagement-handbuch-das-online-handbuch-fuer-projektmanager/implementierung-von-projektmanagement/ external-link

Plant Resources

The Bill of Equipment (BoE) is a comprehensive list of all the available resources, including both human and machine resources, provided by a production system.

Catena-X Automotive Network e.V.

Platform Operations Management

Operation management involves planning, coordinating, and directing the activities that transform resources into the desired products and services, while also aligning with the company's overall business strategy.

http://www.businessdictionary.com/definition/operations-management.html external-link

PLCopen

An institution that develops norms and standards in the field of industrial automation.

https://it-gipfelglossar.hpi-web.de/plcopen/ external-link

Pod Disruption

Pod disruption refers to the procedure of terminating Pods on Nodes, either deliberately or unintentionally. Voluntary disruptions are initiated on purpose by application owners or cluster administrators. On the other hand, involuntary disruptions occur inadvertently and may be triggered by unavoidable problems such as Nodes running low on resources or accidental deletions.

https://kubernetes.io/docs/reference/glossary/?all=true external-link

Pod Lifecycle

The Pod Lifecycle refers to the series of stages that a Pod goes through during its existence. It is defined by a set of states or phases that a Pod can be in. These phases include Pending, Running, Succeeded, Failed, and Unknown. The overall status of a Pod is represented by the PodStatus phase field, which provides a concise description of its current state.

https://kubernetes.io/docs/reference/glossary/?all=true external-link

Pod Priority

Pod Priority is a feature that determines the relative significance of a Pod compared to other Pods. It enables the scheduling priority of a Pod to be adjusted to a higher or lower level than other Pods, which is particularly useful for managing workloads in production clusters.

https://kubernetes.io/docs/reference/glossary/?all=true external-link

Pod Security Policy

PodSecurityPolicy provides a mechanism for precise authorization of Pod creation and modifications. It is a cluster-level resource that manages security-sensitive aspects of the Pod specification. PodSecurityPolicy objects establish a set of conditions that a Pod must meet in order to be accepted into the system, as well as defaults for related fields. The control of Pod Security Policy is implemented as an optional admission controller. However, it was deprecated as of Kubernetes v1.21 and removed in v1.25. Instead, users can utilize Pod Security Admission or third-party admission plugins as alternatives.

https://kubernetes.io/docs/reference/glossary/?all=true external-link

Pods

A pod is a group of containers and volumes that share the same network space.

https://www.mirantis.com/blog/kubernetes-cheat-sheet/ external-link

Port Adress Translation

In Port Address Translation (PAT), a specific port number is assigned to each IP address range within a corporate network. This allows a private network to operate with only one registered IP address. However, with this method, computers within the corporate network cannot be directly accessed from external sources. Users of PAT technology appear externally under a shared IP address and have shared access to the internet.

http://www.itwissen.info/definition/lexikon/port-address-translation-PAT.html external-link

Portal

The Portal facilitates the registration of organizations as new participants by providing a step-by-step process to verify and authorize their participation. Once authorized, participants can use the graphical user interface to interact with central functions of the Federation Service.

https://www.gxfs.eu/glossary/ external-link

Presentation

Data that originates from one or multiple verifiable credentials, which were issued by one or multiple issuers and are shared with a specific verifier.

https://gaia-x.gitlab.io/glossary/ external-link

Principal

A Principal is a person (either a human or a digital entity) who is accountable or granted permission to act on behalf of the organization.

https://www.gxfs.eu/de/glossar/ external-link

Privacy by Design (PBD)

Privacy by Design refers to the practice of taking data protection into account during the creation and production of software and hardware for data processing. By implementing user-friendly default settings, only the data necessary for the specific processing purposes are collected, with the aim of reducing any infringement upon the privacy rights of the relevant users.

https://www.gxfs.eu/de/glossar/ external-link

Private Cloud

The user has access to their applications and data in a cloud that is specifically operated for them by an organization. Access is typically through an internal network and is restricted to a defined user group. If the private cloud is not hosted on the organization's servers but instead provided by a third-party company in their data center, it is referred to as a "Hosted Private Cloud."

https://it-gipfelglossar.hpi-web.de/private-cloud/ external-link

Product Lifecycle Management

Product Lifecycle Management (PLM) is a holistic approach to the comprehensive management and control of all product information and processes throughout the entire lifecycle in the extended value chain - from development and production to sales, disposal, and recycling. Product Lifecycle Management is a comprehensive concept aimed at effectively and efficiently designing products throughout their entire lifecycle.

http://www.plm-info.de/de/default.html external-link

Production on demand

On-demand manufacturing or production on demand is a production strategy that involves manufacturing goods only when they are ordered or requested by customers. This approach enables scalable and flexible production, allowing for the production of goods that are tailored to the specific needs of the customer based on real-time data.

Catena-X Automotive Network e.V.

Proof of Concept

A proof of concept (POC) is an exhibition aimed at validating the potential practicality of specific concepts or theories. It serves as a prototype to assess feasibility, but it should be noted that a POC does not encompass final deliverables. Proof of concept is also referred to as proof of principle.

http://www.techopedia.com/definition/4066/proof-of-concept-poc external-link

Prosumer

There is a social trend in which individuals act not only as buyers (consumers) but also as providers (producers) of products or services. This trend, which is observed in the energy industry context in particular, is based on the growing spread of decentralized renewable energy generation plants among private customers

https://it-gipfelglossar.hpi-web.de/prosumer/ external-link

Provider Access Management (Provider AM) 

The process of ordering a service will require the involvement of both the consumer and the provider. This particular component is managed internally by the service provider, who will create the service instance and provide the consumer access to it.

https://www.gxfs.eu/de/glossar/ external-link

Public Cloud

A public cloud, accessible to everyone, allows various organizations and individuals to access provided services over the Internet. These services often include email, office applications, and online storage such as photo portals. Users can utilize the services as needed and pay accordingly.

https://it-gipfelglossar.hpi-web.de/public-cloud/ external-link

Public Switched Telephone Network

A long-distance communication network is a public communication system that enables verbal exchange between geographically distant participants.

https://it-gipfelglossar.hpi-web.de/pstn/ external-link

Public transport

In contrast to local public transport, the term public transport also includes long-distance transport operators such as Deutsche Bahn, without any regional limitations applying here.

https://it-gipfelglossar.hpi-web.de/%C3%96pv/ external-link

Public-Key-Infrastructure

A security system that issues, distributes, and verifies digital certificates for secure computer-based communication.

https://it-gipfelglossar.hpi-web.de/public-key-infrastruktur/ external-link