Amount of virtual CPUs available in runtime to the components contained in the bundle.

Data Intelligence Hub external-link

Verifiable Credential

A tamper-evident credential that allows for cryptographic verification of its authorship is called a verifiable credential. Verifiable credentials can be utilized to create verifiable presentations, which can also be cryptographically verified. external-link

Verifiable Credential Wallet

A Verifiable Credential Wallet is a digital application or platform that allows individuals to securely store and manage their verifiable credentials. The verifiable credentials stored in a Verifiable Credential Wallet are tamper-evident and cryptographically secured, ensuring that they cannot be altered or forged without detection. external-link

Verifiable Presentation

A presentation that can be verified is an encoded display that includes evidence of tampering, ensuring the trustworthiness of the data's authorship through cryptographic verification. external-link


An entity's function is carried out by obtaining one or more verifiable credentials, which may be enclosed in a verifiable presentation for processing purposes. external-link


A digital platform or marketplace for traffic data enables the exchange and use of information in the field of transportation. An example of this is the Mobility Data Marketplace (MDM) of the Federal Highway Research Institute (Bundesanstalt für Straßenwesen or BAST in German). external-link

Vertical Ecosystems

Vertical Ecosystems refer to ecosystems that are designed for specific domains with the goal of facilitating the sharing of data, knowledge, and the development of cross-border use-cases. external-link

Virtual Resource

A Virtual Resource denotes unchanging information in various formats, including but not limited to datasets, configuration files, licenses, key pairs, AI models, and neural network weights. external-link


An anonymous, unregistered entity such as a natural person or bot that is browsing a Gaia-X Catalogue. external-link

Visual Exploration

The purpose of visual exploration is to provide an overview of the data and enable users to navigate through different segments of the data in an interactive manner. In this situation, users may not have any or only a basic understanding of the data, and their goal is to identify patterns or relationships. Visual exploration can be viewed as an unguided search for pertinent information in the data. To aid users in this search process, visual exploration techniques must have a high level of interactivity. external-link

Vocabulary Hub

A server that offers maintenance capabilities for browsing, editing, and downloading vocabularies and related documents. It also mirrors a collection of external third-party vocabularies, which guarantees their seamless availability and resolution. external-link

Voice over IP

IP-telephony refers to voice communication over IP-based computer networks. external-link


A Kubernetes volume is a directory that stores data, which is accessible to containers within a Pod. The volume has the same lifespan as the Pod that it belongs to, meaning that it will persist even if the containers running in the Pod are restarted or terminated. This makes it possible to preserve data across container restarts. For more information on storage, please refer to the Kubernetes documentation. external-link

Volume Plugin

A Volume Plugin is a feature that allows for seamless integration of storage within a Kubernetes Pod. With a Volume Plugin, storage volumes can be attached and mounted for use by the Pod. Volume plugins can be classified as either in-tree or out-of-tree. In-tree plugins are part of the Kubernetes code repository and are released in accordance with its schedule. On the other hand, out-of-tree plugins are developed independently and can be maintained outside of the Kubernetes codebase. external-link


A real-time software platform for embedded systems, such as M2M systems, is provided by Wind River Systems. external-link