A Taint is a fundamental Kubernetes object that includes three mandatory properties: key, value, and effect. Its main purpose is to prevent the scheduling of Pods on nodes or node groups that do not meet certain requirements. Taints work in conjunction with tolerations to ensure that Pods are scheduled only on appropriate nodes. Nodes are assigned one or more taints, and a Pod can only be scheduled on a node that has the corresponding toleration for the specified taints.

https://kubernetes.io/docs/reference/glossary/?all=true external-link

Technical readiness

The degree to which a product, service, or system is technologically developed and refined for use.

https://www.twi-global.com/technical-knowledge/faqs/technology-readiness-levels external-link

Technology readiness level

The Technology Readiness Level (TRL) is a scale used to evaluate the level of readiness of new technologies. It ranges from 1 to 9, with higher numbers indicating greater technological advancement.

Catena-X Automotive Network e.V.

Telco Device Supplier

A rarely used term for manufacturers of telecommunications devices is "Telco Device". These devices can include smartphones, cable modems, and so on.

https://it-gipfelglossar.hpi-web.de/telco-device-supplier/ external-link


Teleconsultation refers to a medical procedure in which a physician either speaks to a patient at a distance if the patient is involved, or in which multiple physicians communicate at a distance without involving a patient.

https://it-gipfelglossar.hpi-web.de/telekonsultation/ external-link


The term "telediscipline" covers various specialist methods that enable medical services to be provided over a spatial distance. Examples include telepathology and teleradiology.

https://it-gipfelglossar.hpi-web.de/teledisziplin/ external-link


Telemedicine encompasses all medical diagnosis and treatment measures carried out using information and communication technologies to bridge spatial or temporal ("asynchronous") distances between doctors (tele-doctors), pharmacists, and patients or between two consulting physicians. The term telemedicine is used as an umbrella term for telehealth, telecare, and tele-disciplines.

https://it-gipfelglossar.hpi-web.de/telemedizin/ external-link


The exchange of a patient's physiological data, collected in their everyday environment, between medical professionals is called telemonitoring.

https://it-gipfelglossar.hpi-web.de/telemonitoring/ external-link


Testbeds serve as comprehensive representations of systems and are employed to examine system elements and their interactions in order to deepen our understanding of the actual system. These testbeds consist of prototypes and fragments of real system components, enabling us to gain valuable insights into the functioning of specific elements within a system.

https://www.sciencedirect.com/topics/computer-science/testbed external-link


This category involves the use of linguistic and semantic methods to extract relevant information from texts, identify structures, and establish connections between the data and other data sources. This enables the application of text-based business intelligence.

https://www.bitkom.org/sites/default/files/file/import/140228-Big-Data-Technologien-Wissen-fuer-Entscheider.pdf external-link

The Broadband Office of the Federal Government

The Broadband Office of the Federal Government (BBB) was established in late 2010. Since the parliamentary election in 2013, the responsibility for telecommunications infrastructures lies within the domain of the Federal Ministry of Transport and Digital Infrastructure (BMVI). The main objective of the Broadband Office of the Federal Government is to support the broadband strategy of the federal government.

http://www.breitbandbuero.de/index.php?id=aufgaben&PHPSESSID=666dc3e8a766724803fe0a0af727bcab external-link

The Federal Ministry of Economics and Technology

The Federal Ministry of Economics and Technology (BMWi) is a ministry of the federal government in Germany. It is responsible for shaping and implementing the country's economic and technological policies. The BMWi works to strengthen the competitiveness of the German economy, promote innovation, support the labor market, and improve the business and consumer environment. The ministry is also responsible for energy policy, the digitalization of the economy, foreign trade and industrial policy.

https://www.bmwk.de/ external-link


A fundamental item comprising three essential characteristics - key, value, and effect - is used for scheduling pods on nodes or node groups that have corresponding taints. Taints and tolerations collaborate to prevent pods from being scheduled on unsuitable nodes. A pod is assigned one or more tolerations, which signify that it can be scheduled on nodes or node groups with matching taints, although it is not mandatory.

https://kubernetes.io/docs/reference/glossary/?all=true external-link

Total Cost of Ownership

The total costs associated with the purchase, use, and disposal (if applicable) of an asset, such as a computer system, are referred to as Total Cost of Ownership. These costs are an important aspect in product design and are intended to help understand and influence customer purchasing decisions.

http://wirtschaftslexikon.gabler.de/Definition/total-cost-of-ownership.html external-link


The process of verifying the history, location, or application of an item using documented recorded identification.

https://t2informatik.de/wissen-kompakt/traceability/ external-link

Traffic Data Marketplace

A digital platform or marketplace for traffic data enables the exchange and use of information in the field of transportation. An example of this is the Mobility Data Marketplace (MDM) of the Federal Highway Research Institute (Bundesanstalt für Straßenwesen or BAST in German).

http://www.bast.de external-link

Traffic guidance systems

Information and communication technologies are used to collect, transmit, process and use traffic-related data locally. The main objective of traffic control systems is to organize traffic efficiently, provide information and control the flow of traffic.

https://it-gipfelglossar.hpi-web.de/verkehrsleitsysteme/ external-link

Traffic Light Protocol (TLP)

The TLP (Traffic Light Protocol) is an internationally recognized framework for exchanging sensitive information. It was developed by the National Infrastructure Security Coordination Centre in the UK. Data and documents are classified into four categories, which determine the conditions for their disclosure.

https://it-gipfelglossar.hpi-web.de/tlp/ external-link

Traffic strategic route planning

Traffic-strategic route planning uses data from traffic guidance systems. Depending on the utilization of the traffic infrastructure, different alternatives for route planning are automatically compared. The most favorable option is then selected dynamically to reach the destination.

https://it-gipfelglossar.hpi-web.de/verkehrs%C2%8Dstrategische-routenplanung/ external-link

Transaction data

Transactional data refers to data that is collected from transactions. It encompasses details such as the transaction time, location, item prices, payment methods, applicable discounts, and various other transaction-related quantities and attributes. Typically, transactional data is collected at the point of sale.

https://www.tibco.com/reference-center/what-is-transactional-data external-link

Transaction databases

To highlight the distinction from newer types of databases, it should be noted that transactional databases, which belong to the class of relational databases, are only mentioned for completeness. They are specifically optimized for the OLTP27 (Online Transaction Processing) use case and enable the concurrent work of hundreds of thousands of users.

https://www.bitkom.org/sites/default/files/file/import/140228-Big-Data-Technologien-Wissen-fuer-Entscheider.pdf external-link

Transmission Control Protocol

A component of the internet protocols that serves as the foundation for HTTP.

https://it-gipfelglossar.hpi-web.de/tcp/ external-link


Fair and honest business and financial activities are conducted in a transparent manner, without any secrets, to establish trust among people.

https://dictionary.cambridge.org/dictionary/english/transparency external-link

Transport Gateway

A tool that transforms data from one format or protocol to another is known as a gateway. A network gateway is used to convert packets from one protocol to another, while an application gateway is responsible for converting data and/or commands between different formats. Similarly, an e-mail gateway converts messages from one mail format to another.

http://www.pcmag.com/encyclopedia/term/43670/gateway external-link

Transport Layer Security

There is a protocol for encryption called TLS for the transport layer. Nowadays, encryption based on TLS is mainly used for HTTPS. TLS supports various encryption methods. The achieved level of security depends not only on the encryption method used but also on the specific version of TLS.

https://it-gipfelglossar.hpi-web.de/tls/ external-link

Transportation telematics

Transportation telematics refers to the use of telematics technologies in the transportation sector. The aim is to make traffic flows more efficient, increase traffic safety, reduce traffic-related environmental impacts, improve comfort, or optimize operational processes.

https://www.bmdv.bund.de/blaetterkatalog/catalogs/219096/pdf/complete.pdf external-link

Trust level

The Trust Level of a computer system is determined by assessing the potential risks associated with its intended use. This involves conducting a comprehensive risk analysis that takes into account the probability and potential consequences of a system attack. Based on the results of this analysis, an appropriate level of hardware and software protection mechanisms is established to ensure the system is adequately protected.

https://link.springer.com/referenceworkentry/10.1007/978-1-4419-5906-5_907 external-link

Trust platform

DIH TRUST Platform offers Verified Credentials for Organizations, Eco-Systems and Data Spaces to prove the provenance and authenticity of entities and digital assets.

Telekom Data Intelligence Hub

Trusted Data Source

The Gaia-X Association has established a roster of Reliable Data Sources for Gaia-X Compliance, which are utilized by issuers to authenticate attestations.

https://gaia-x.gitlab.io/glossary/ external-link


It cooperates with the respective operating system, verifying, for example, the system BIOS and firmware, and starts the operating system. If errors are detected, the operating system receives feedback. It then decides how the computer continues to function. Essentially, it strengthens platforms that are exposed to attacks on hypervisors, the BIOS, or other firmware, such as malicious rootkits or malware. This function can also be seen as an extension of Virtual Machine Extensions (VMX), Intel's technology for virtual environments.

http://www.datacenter-insider.de/hardware/komponenten/articles/488444/ external-link