EU LDT Toolbox glossary
S
A scalable object storage service provided by Amazon Web Services (AWS) for storing and retrieving any amount of data at any time. Often used for backups, archives, and data lakes.
The action of increasing or decreasing the number of running instances of an application based on workload.
A configuration of entities and relationships describing a use case within the UC&S tool, often linked to a specific experiment.
Enables the creation and configuration of scenarios within cases, handles scenario associations with experiments and data models, and facilitates integration with the AI Notebook for simulations.
(As used in the context of Use Case embedded from Tool 2) A defined configuration of models and data used to explore potential solutions to urban challenges.
A JSON Schema is a formal, machine-readable definition for JSON data, specifying structure, constraints, and validation rules for a data model.
A process where the system generates a sample of data from a schema and calculates metrics for Similarity (how close it is to real data patterns) and Quality. This helps the developer decide if the schema is ready for production use.
A logical isolation mechanism that separates data, entities, and operations across different organisations or contexts.
A Kubernetes object used to store sensitive information such as passwords, tokens, and keys in a secure way. Secrets are used to manage sensitive configuration data like database credentials and OIDC client secrets.
A set of practices and settings aimed at protecting the infrastructure from vulnerabilities and attacks.
A set of rules and procedures that define how data is protected during transmission and storage, ensuring confidentiality, integrity, and availability.
A Kubernetes object that defines a logical set of pods and a policy by which to access them. Services provide stable network endpoints for pods, enabling load balancing and service discovery.
An abstraction that defines a logical set of pods and enables network access to them, either within or outside the cluster.
A Kubernetes object that provides an identity for processes running in a pod. ServiceAccounts are used to control access to the Kubernetes API and other services.
A background job processing framework used in Ruby applications to run asynchronous tasks such as email delivery or data processing.
Standardised data specifications used for interoperability within the EU LDT Toolbox. The system uses Minimum Interoperability Mechanisms (MIMs), specifically MIM 2, to ensure that KPI definitions and data retrieval are compatible with external systems and the broader EU data ecosystem.
A standard programming language for managing and manipulating relational databases. It is used to query, insert, update, and delete data, as well as to define and control database structures.
A Kubernetes health check that determines if a container has completed startup initialisation. Startup probes allow applications with long startup times to avoid premature restarts.
A Kubernetes object that manages stateful applications. StatefulSets provide stable network identities and persistent storage for pods, making them suitable for databases and other stateful workloads.
A general and high-level purpose of smart City evolution that relies on Objectives that can be measured through KPI related to Key Results of an Objective
A user role that defines and manages the municipality’s long-term strategy and key initiatives. They ensure alignment between high-level goals and operational OKRs.
A configuration that defines which changes should be monitored and to which endpoint notifications are sent.
Is a software framework designed to generate synthetic data (artificially created data that mimics real datasets) - https://www.getsynth.com/
The underlying core engine (referenced as "Synth") used by the backend to process schema definitions and computationally generate the synthetic data records.
Artificially generated data that mimics the statistical properties and structure of real-world data but does not contain any sensitive or personally identifiable information (PII). It is safe for use in testing, training AI models, and public simulations.
A user role responsible for the overall functionality, security, and compliance of the system. This includes managing user access, configuring audit retention policies, and ensuring data protection standards are met.