Glossary
A
AVS
Autonomous Verifiable Services; the Protocol responsible for validation of tasks related to Node deployment and operations.
- Learn more about EigenLayer's AVS from our blog
B
Bots
A bot is a software agent. In Web3, bots are often employed by people attempting to creating mutiple instances of wallets to airdrop hunt. Therefore, the concept is linked to Sybils.
C
Console
NodeOps Console is the user interface which Node Runners use to deploy and manage their Nodes.
Compute Unit
The unit of measurement for the provider machine's capacity.
D
DePIN
Decentralized Physical Infrastructure Networks: leveraging blockchain and decentralized technologies to power and govern real-world physical infrastructure. This approach supports systems where infrastructure —such as telecommunications, energy grids, transportation networks, or IoT devices— is owned, operated, and maintained by decentralized participants rather than centralized entities.
Learn more about DePIN from our blog
Docker image
A Docker image is a pre-packaged environment containing everything needed to run an application, including code, dependencies, and system libraries.
When specifying a Docker image in your template, ensure:
• The image is public so that it can be pulled during deployment
• You provide the correct image version using a digest (SHA256) or tag
Example:
image: jupyter/base-notebook@sha256:8c903974902b0e9d45d9823c2234411de0614c5c98c4bb782b3d4f55b3e435e6
F
Federation
Federation is the process of linking identity information across multiple systems or organizations, enabling secure collaboration and single sign-on across domains.
Failover
Failover is the capability to automatically switch to a redundant or standby system in the event of a failure, ensuring high availability and business continuity.
Federated Identity Management
Federated Identity Management (FIM) is a system that allows the sharing of identity information across trusted domains, enabling users to access multiple applications with a single set of credentials.
Full Disk Encryption
Full Disk Encryption (FDE) is a best-practice security measure that encrypts all data on a disk drive, protecting information even if the physical device is lost or stolen.
Learn more about disk encryption
Federated learning
Federated learning is a Machine Learning (ML) technique whereby models are trained across multiple decentralized devices or servers holding local data samples, without exchanging them, enhancing both privacy and security.
Learn more about federated learning
L
localhost
Localhost refers to the current device used to access a network service. It's often associated with the IP address 127.0.0.1
and the hostname localhost
.
It's used for:
- Testing web applications locally
- Accessing services running on the same machine
- Loopback communication
M
Machine
Machines are individual Compute infrastructure units that a provider wants to add to NodeOps Cloud. Machines have to added to the NodeOps Network under each provider using the "Add Machine" process which is part of the provider onboarding process.
N
NaaS
Node as a Service: a simplified way for anyone to run Web3 Protocol or blockchain Nodes.
Node Operators
Node Operators are end users, the Node Runners who deploy the Nodes that they own using partner service provider front ends.
The NodeOps team is the team behind the NodeOps Network, which is why we are our own favored partner! Run a Node from the NodeOps Console.
O
Operator
Operators are individuals or groups interested in participating in the validation of tasks related to Node deployment through the NodeOps Network Autonomous Verifiable Services (AVS).
Operator Onboarding
Operator onboarding refers to a series of steps a restaking operator must perform to opt into supporting the NodeOps Network AVS.
P
Provider
A provider is an individual or group interested in lending their underutilized or un-utilized hardware infrastructure(machines) for workloads deployed using NodeOps Network.
Provider Onboarding
Provider onboarding is a collection of steps that a provider must perform to join the NodeOps Network's pool of providers.
Provider Pool
A collection of Compute providers registered with the NodeOps Network to lend their Compute resources for any workloads deployed using the console.
S
Software Bill of Materials
Software Bill of Materials (SBOM) is a security and compliance audit that analyzes the full list of components used in a software application. This audit includes code auditing, configuration scanning, and vulnerability testing to ensure that the application is secure and capable of protecting sensitive data from attackers.
SBOM is a component of compliance to allow applications to meet standards such as Executive Order 14028 (U.S. government) or ISO/IEC 5230.
Users may compile an SBOM report from NodeOps Marketplace using the code vulnerability scanner.
Security
The rapid growth of Cloud-native and containerized deployments has increased security risks, making continuous, automated vulnerability scanning essential for anyone managing modern infrastructure. When setting up infrastructure on NodeOps Compute Marketplace, consider using the code vulnerability scanner and following the best practices for handling secrets.
Scheduling
Scheduling means the process of finding the right machine for a Node deployment request.
Secrets
Secrets such as API keys are sensitive data. Storing such data on disk can pose security risks.
Here are some best practices for handling secrets:
- Use environment variables for sensitive configuration.
- Implement secret management systems (e.g., Kubernetes Secrets, HashiCorp Vault).
- Encrypt data at rest if disk storage is necessary.
- Use temporary in-memory storage for short-lived sensitive data.
Browse the OWASP secret management cheat sheet to learn more.
Staking
Under proof-of-stake blockchains, staking is the locking of a token to support the blockchain operations. In return for staking your crypto, you may earn more cryptocurrency.
To validate proof-of-stake blockchains, validator Nodes must first “stake” set amounts of the native token for the chain to be in a position to validate new transactions and add new blocks.
The stake will be slashed (forefit) if the validator fails to build legitimate blocks. This ensures that only valid data and transactions are added to a blockchain. Validators are rewarded with the native token when they successfully add new blocks.
Sybils
A Sybil is essentially a copy. While each human individual is unique, Sybils are attempts to create multiple identities. This strategy is often employed by airdrop hunters in an attempt to capture an unfair share of the available rewards.
- Learn more about how NodeOps controls for Sybils from our blog
T
Template
A template is Infrastructure as configuration playbook: a YAML file that defines how an application should run within our marketplace. It specifies:
• The public Docker image to be used
• Resource allocation (CPU, memory)
• Environment variables (with placeholders for user input)
• Whether the application should be exposed to the internet
It acts as a blueprint, ensuring consistent deployment configurations for users.
W
Workload
A Node deployed on a Provider machine is called the Workload.