A Taint is a fundamental Kubernetes object that includes three mandatory properties: key, value, and effect. Its main purpose is to prevent the scheduling of Pods on nodes or node groups that do not meet certain requirements. Taints work in conjunction with tolerations to ensure that Pods are scheduled only on appropriate nodes. Nodes are assigned one or more taints, and a Pod can only be scheduled on a node that has the corresponding toleration for the specified taints.

https://kubernetes.io/docs/reference/glossary/?all=true external-link

Technical Architecture

The Technical Architecture outlines the general framework and its constituent parts for accomplishing Gaia-X's objectives. The Technical Committee disseminates updates on the current state of progress through the Technical Architecture Paper.

https://www.gxfs.eu/de/glossar/ external-link

Technology readiness level

The Technology Readiness Level (TRL) is a scale used to evaluate the level of readiness of new technologies. It ranges from 1 to 9, with higher numbers indicating greater technological advancement.

Catena-X Automotive Network e.V. external-link

Telco Device Supplier

A rarely used term for manufacturers of telecommunications devices is "Telco Device". These devices can include smartphones, cable modems, and so on.

https://it-gipfelglossar.hpi-web.de/telco-device-supplier/ external-link


Telemedicine encompasses all medical diagnosis and treatment measures carried out using information and communication technologies to bridge spatial or temporal ("asynchronous") distances between doctors (tele-doctors), pharmacists, and patients or between two consulting physicians. The term telemedicine is used as an umbrella term for telehealth, telecare, and tele-disciplines.

https://it-gipfelglossar.hpi-web.de/telemedizin/ external-link

Term of Usage (ref. Data Exchange)

A particular representation of a Data License that is part of a Signed Data Product Self-Description, outlining all the limitations related to sharing data.

https://gaia-x.gitlab.io/glossary/ external-link

Test bed

A testbed, alternatively spelled as test bed, is a specialized platform designed for conducting systematic and transparent testing of scientific theories, computing tools, and emerging technologies, with a focus on rigor, replicability, and reliability.

https://en.wikipedia.org/wiki/Testbed external-link


A fundamental item comprising three essential characteristics - key, value, and effect - is used for scheduling pods on nodes or node groups that have corresponding taints. Taints and tolerations collaborate to prevent pods from being scheduled on unsuitable nodes. A pod is assigned one or more tolerations, which signify that it can be scheduled on nodes or node groups with matching taints, although it is not mandatory.

https://kubernetes.io/docs/reference/glossary/?all=true external-link

Top Leadership Team

Real-time analytics refers to the practice of accessing analytics in real-time as they are generated within a system. Analytics, in general, is a term that is used to describe the process of analyzing data patterns to provide insights and meaning to a business or entity. Analysts typically collect valuable information by analyzing and sorting through data.

http://www.techopedia.com/definition/29160/real-time-analytics external-link

Total Cost of Ownership

The total costs associated with the purchase, use, and disposal (if applicable) of an asset, such as a computer system, are referred to as Total Cost of Ownership. These costs are an important aspect in product design and are intended to help understand and influence customer purchasing decisions.

http://wirtschaftslexikon.gabler.de/Definition/total-cost-of-ownership.html external-link


The capacity to uncover details regarding the place and manner in which a product was produced.

https://dictionary.cambridge.org/dictionary/english/traceability external-link

Tracking &Tracing

To obtain information about the whereabouts of goods at a certain point in time, a system is used that also captures the history of raw materials, semi-finished products, and finished products in the production chain. This makes it possible to trace the production and shipping process.

https://it-gipfelglossar.hpi-web.de/tracking-tracing/ external-link

Traffic Light Protocol (TLP)

The TLP (Traffic Light Protocol) is an internationally recognized framework for exchanging sensitive information. It was developed by the National Infrastructure Security Coordination Centre in the UK. Data and documents are classified into four categories, which determine the conditions for their disclosure.

https://it-gipfelglossar.hpi-web.de/tlp/ external-link

Transaction databases

To highlight the distinction from newer types of databases, it should be noted that transactional databases, which belong to the class of relational databases, are only mentioned for completeness. They are specifically optimized for the OLTP27 (Online Transaction Processing) use case and enable the concurrent work of hundreds of thousands of users.

http://www.bitkom.org/files/documents/BITKOM_Leitfaden_Big-Data-Technologien-Wissen_fuer_Entscheider_Febr_2014.pdf external-link

Transmission Control Protocol

A component of the internet protocols that serves as the foundation for HTTP.

https://it-gipfelglossar.hpi-web.de/tcp/ external-link


Fair and honest business and financial activities are conducted in a transparent manner, without any secrets, to establish trust among people.

https://dictionary.cambridge.org/dictionary/english/transparency external-link

Transport Gateway

A tool that transforms data from one format or protocol to another is known as a gateway. A network gateway is used to convert packets from one protocol to another, while an application gateway is responsible for converting data and/or commands between different formats. Similarly, an e-mail gateway converts messages from one mail format to another.

http://www.pcmag.com/encyclopedia/term/43670/gateway external-link

Transport Layer Security

There is a protocol for encryption called TLS for the transport layer. Nowadays, encryption based on TLS is mainly used for HTTPS. TLS supports various encryption methods. The achieved level of security depends not only on the encryption method used but also on the specific version of TLS.

https://it-gipfelglossar.hpi-web.de/tls/ external-link

Transportation telematics

Transportation telematics refers to the use of telematics technologies in the transportation sector. The aim is to make traffic flows more efficient, increase traffic safety, reduce traffic-related environmental impacts, improve comfort, or optimize operational processes.

www.bmwi.de external-link

Trust Anchor

Trust Anchors, which can be either the direct controller of the Trusted Data Source or a Notary, are entities that have been approved by Gaia-X. Although Ecosystems can choose their own Trust Anchors, cross-ecosystem trust provided by Gaia-X necessitates that the selected Trust Anchors follow the rules established by the Gaia-X Association. The Gaia-X Registry stores the list of approved Trust Anchors.

https://gaia-x.gitlab.io/glossary/ external-link

Trust Framework

It is a framework that enables individuals and organizations to conduct business online with security and dependability.

https://dssc.eu/wp-content/uploads/2023/01/Starterkit-Interim-Version-Release-19-Dec-2022.pdf external-link

Trust plane

One of the three Gaia-X models symbolizes three tiers of interoperability, reflecting a worldwide digital governance system shared across ecosystems. The Trust Framework defines the standards of this collective governance, and the Gaia-X Compliance service and the Gaia-X Registry service operationalize these rules.

https://gaia-x.gitlab.io/glossary/ external-link

Trusted Data Source

The Gaia-X Association has established a roster of Reliable Data Sources for Gaia-X Compliance, which are utilized by issuers to authenticate attestations.

https://gaia-x.gitlab.io/glossary/ external-link