A Taint is a fundamental Kubernetes object that includes three mandatory properties: key, value, and effect. Its main purpose is to prevent the scheduling of Pods on nodes or node groups that do not meet certain requirements. Taints work in conjunction with tolerations to ensure that Pods are scheduled only on appropriate nodes. Nodes are assigned one or more taints, and a Pod can only be scheduled on a node that has the corresponding toleration for the specified taints.
The Technical Architecture outlines the general framework and its constituent parts for accomplishing Gaia-X's objectives. The Technical Committee disseminates updates on the current state of progress through the Technical Architecture Paper.
Technology readiness level
The Technology Readiness Level (TRL) is a scale used to evaluate the level of readiness of new technologies. It ranges from 1 to 9, with higher numbers indicating greater technological advancement.
Telco Device Supplier
A rarely used term for manufacturers of telecommunications devices is "Telco Device". These devices can include smartphones, cable modems, and so on.
Telemedicine encompasses all medical diagnosis and treatment measures carried out using information and communication technologies to bridge spatial or temporal ("asynchronous") distances between doctors (tele-doctors), pharmacists, and patients or between two consulting physicians. The term telemedicine is used as an umbrella term for telehealth, telecare, and tele-disciplines.
Term of Usage (ref. Data Exchange)
A particular representation of a Data License that is part of a Signed Data Product Self-Description, outlining all the limitations related to sharing data.
A testbed, alternatively spelled as test bed, is a specialized platform designed for conducting systematic and transparent testing of scientific theories, computing tools, and emerging technologies, with a focus on rigor, replicability, and reliability.
A fundamental item comprising three essential characteristics - key, value, and effect - is used for scheduling pods on nodes or node groups that have corresponding taints. Taints and tolerations collaborate to prevent pods from being scheduled on unsuitable nodes. A pod is assigned one or more tolerations, which signify that it can be scheduled on nodes or node groups with matching taints, although it is not mandatory.
Top Leadership Team
Real-time analytics refers to the practice of accessing analytics in real-time as they are generated within a system. Analytics, in general, is a term that is used to describe the process of analyzing data patterns to provide insights and meaning to a business or entity. Analysts typically collect valuable information by analyzing and sorting through data.
Total Cost of Ownership
The total costs associated with the purchase, use, and disposal (if applicable) of an asset, such as a computer system, are referred to as Total Cost of Ownership. These costs are an important aspect in product design and are intended to help understand and influence customer purchasing decisions.
The capacity to uncover details regarding the place and manner in which a product was produced.
To obtain information about the whereabouts of goods at a certain point in time, a system is used that also captures the history of raw materials, semi-finished products, and finished products in the production chain. This makes it possible to trace the production and shipping process.
Traffic Light Protocol (TLP)
The TLP (Traffic Light Protocol) is an internationally recognized framework for exchanging sensitive information. It was developed by the National Infrastructure Security Coordination Centre in the UK. Data and documents are classified into four categories, which determine the conditions for their disclosure.
To highlight the distinction from newer types of databases, it should be noted that transactional databases, which belong to the class of relational databases, are only mentioned for completeness. They are specifically optimized for the OLTP27 (Online Transaction Processing) use case and enable the concurrent work of hundreds of thousands of users.
Transmission Control Protocol
A component of the internet protocols that serves as the foundation for HTTP.
Fair and honest business and financial activities are conducted in a transparent manner, without any secrets, to establish trust among people.
A tool that transforms data from one format or protocol to another is known as a gateway. A network gateway is used to convert packets from one protocol to another, while an application gateway is responsible for converting data and/or commands between different formats. Similarly, an e-mail gateway converts messages from one mail format to another.
Transport Layer Security
There is a protocol for encryption called TLS for the transport layer. Nowadays, encryption based on TLS is mainly used for HTTPS. TLS supports various encryption methods. The achieved level of security depends not only on the encryption method used but also on the specific version of TLS.
Transportation telematics refers to the use of telematics technologies in the transportation sector. The aim is to make traffic flows more efficient, increase traffic safety, reduce traffic-related environmental impacts, improve comfort, or optimize operational processes.
Trust Anchors, which can be either the direct controller of the Trusted Data Source or a Notary, are entities that have been approved by Gaia-X. Although Ecosystems can choose their own Trust Anchors, cross-ecosystem trust provided by Gaia-X necessitates that the selected Trust Anchors follow the rules established by the Gaia-X Association. The Gaia-X Registry stores the list of approved Trust Anchors.
It is a framework that enables individuals and organizations to conduct business online with security and dependability.
One of the three Gaia-X models symbolizes three tiers of interoperability, reflecting a worldwide digital governance system shared across ecosystems. The Trust Framework defines the standards of this collective governance, and the Gaia-X Compliance service and the Gaia-X Registry service operationalize these rules.