Skip to main content

Glossary

A

AVS

Autonomous Verifiable Services; the Protocol responsible for validation of tasks related to Node deployment and operations.

B

Bots

A bot is a software agent. In Web3, bots are often employed by people attempting to creating mutiple instances of wallets to airdrop hunt. Therefore, the concept is linked to Sybils.

C

Console

NodeOps Console is the user interface which Node Runners use to deploy and manage their Nodes.

Compute Unit

The unit of measurement for the provider machine's capacity.

D

DePIN

Decentralized Physical Infrastructure Networks: leveraging blockchain and decentralized technologies to power and govern real-world physical infrastructure. This approach supports systems where infrastructure —such as telecommunications, energy grids, transportation networks, or IoT devices— is owned, operated, and maintained by decentralized participants rather than centralized entities.

Learn more about DePIN from our blog

Docker image

A Docker image is a pre-packaged environment containing everything needed to run an application, including code, dependencies, and system libraries.

Using Docker in NodeOps Cloud?

When specifying a Docker image in your template, ensure:

• The image is public so that it can be pulled during deployment

• You provide the correct image version using a digest (SHA256) or tag

Example:

image: jupyter/base-notebook@sha256:8c903974902b0e9d45d9823c2234411de0614c5c98c4bb782b3d4f55b3e435e6

F

Federation

Federation is the process of linking identity information across multiple systems or organizations, enabling secure collaboration and single sign-on across domains.

Learn more about federation

Failover

Failover is the capability to automatically switch to a redundant or standby system in the event of a failure, ensuring high availability and business continuity.

Learn more about failover

Federated Identity Management

Federated Identity Management (FIM) is a system that allows the sharing of identity information across trusted domains, enabling users to access multiple applications with a single set of credentials.

Learn more about FIM

Full Disk Encryption

Full Disk Encryption (FDE) is a best-practice security measure that encrypts all data on a disk drive, protecting information even if the physical device is lost or stolen.

Learn more about disk encryption

Federated learning

Federated learning is a Machine Learning (ML) technique whereby models are trained across multiple decentralized devices or servers holding local data samples, without exchanging them, enhancing both privacy and security.

Learn more about federated learning

L

localhost

Localhost refers to the current device used to access a network service. It's often associated with the IP address 127.0.0.1 and the hostname localhost.

It's used for:

  • Testing web applications locally
  • Accessing services running on the same machine
  • Loopback communication

M

Machine

Machines are individual Compute infrastructure units that a provider wants to add to NodeOps Cloud. Machines have to added to the NodeOps Network under each provider using the "Add Machine" process which is part of the provider onboarding process.

N

NaaS

Node as a Service: a simplified way for anyone to run Web3 Protocol or blockchain Nodes.

Node Operators

Node Operators are end users, the Node Runners who deploy the Nodes that they own using partner service provider front ends.

tip

The NodeOps team is the team behind the NodeOps Network, which is why we are our own favored partner! Run a Node from the NodeOps Console.

O

Operator

Operators are individuals or groups interested in participating in the validation of tasks related to Node deployment through the NodeOps Network Autonomous Verifiable Services (AVS).

Operator Onboarding

Operator onboarding refers to a series of steps a restaking operator must perform to opt into supporting the NodeOps Network AVS.

P

Provider

A provider is an individual or group interested in lending their underutilized or un-utilized hardware infrastructure(machines) for workloads deployed using NodeOps Network.

Provider Onboarding

Provider onboarding is a collection of steps that a provider must perform to join the NodeOps Network's pool of providers.

Provider Pool

A collection of Compute providers registered with the NodeOps Network to lend their Compute resources for any workloads deployed using the console.

S

Software Bill of Materials

Software Bill of Materials (SBOM) is a security and compliance audit that analyzes the full list of components used in a software application. This audit includes code auditing, configuration scanning, and vulnerability testing to ensure that the application is secure and capable of protecting sensitive data from attackers.

SBOM is a component of compliance to allow applications to meet standards such as Executive Order 14028 (U.S. government) or ISO/IEC 5230.

Users may compile an SBOM report from NodeOps Marketplace using the code vulnerability scanner.

Security

The rapid growth of Cloud-native and containerized deployments has increased security risks, making continuous, automated vulnerability scanning essential for anyone managing modern infrastructure. When setting up infrastructure on NodeOps Compute Marketplace, consider using the code vulnerability scanner and following the best practices for handling secrets.

Scheduling

Scheduling means the process of finding the right machine for a Node deployment request.

Secrets

Secrets such as API keys are sensitive data. Storing such data on disk can pose security risks.

Secrets best practices

Here are some best practices for handling secrets:

  1. Use environment variables for sensitive configuration.
  2. Implement secret management systems (e.g., Kubernetes Secrets, HashiCorp Vault).
  3. Encrypt data at rest if disk storage is necessary.
  4. Use temporary in-memory storage for short-lived sensitive data.

Browse the OWASP secret management cheat sheet to learn more.

Staking

Under proof-of-stake blockchains, staking is the locking of a token to support the blockchain operations. In return for staking your crypto, you may earn more cryptocurrency.

To validate proof-of-stake blockchains, validator Nodes must first “stake” set amounts of the native token for the chain to be in a position to validate new transactions and add new blocks.

The stake will be slashed (forefit) if the validator fails to build legitimate blocks. This ensures that only valid data and transactions are added to a blockchain. Validators are rewarded with the native token when they successfully add new blocks.

Sybils

A Sybil is essentially a copy. While each human individual is unique, Sybils are attempts to create multiple identities. This strategy is often employed by airdrop hunters in an attempt to capture an unfair share of the available rewards.

T

Template

A template is Infrastructure as configuration playbook: a YAML file that defines how an application should run within our marketplace. It specifies:

• The public Docker image to be used

Resource allocation (CPU, memory)

Environment variables (with placeholders for user input)

• Whether the application should be exposed to the internet

It acts as a blueprint, ensuring consistent deployment configurations for users.

W

Workload

A Node deployed on a Provider machine is called the Workload.