Glossary

#

The 8ra Initiative is a European umbrella initiative to build a resilient, open, sovereign, and future-proof digital infrastructure in Europe which centers on IPCEI-CIS that unites 12 EU member states and around 120 partners.
At 8ra’s core lies the Multi-Provider Cloud-Edge Continuum – a connected IT architecture that enables the flexible use of distributed cloud and edge resources across providers and national borders.​
The 8ra initiative delivers the development of open reference architecture and software solutions. Moreover, it is creating a decentralised cloud ecosystem allowing for seamless access to key technologies such as cloud-edge, AI, IoT, and many more. All key components will be available as free open-source software. ​

C

Creative Commons Attribution – A license that allows others to copy, distribute and adapt a work, as long as they give appropriate credit to the original creator. All materials developed by FACIS are published under the CC BY license, for example code, white papers, and tools.

Cloud

The cloud refers to digital services such as data storage and software that are provided over the internet from large data centers. It allows organizations to use applications and store information without running their own servers. Cloud services can easily grow or shrink as needed and are managed centrally.

D

A loose set of interacting actors that directly or indirectly consume, produce, or provide data and other related resources

E

EasyStack Builder (ESB) is a tool that automatically sets up and manages a complete digital system in minutes, making it the fastest way to deploy your digital infrastructure. It allows organizations to easily connect, share data, and work together securely. It is called Stack Builder because it automatically builds a complete “software stack,” which means a full set of different software components that work together as one system.

Its built-in security component, ESB ICAM (Identity and Access Management), controls who can log in and what they are allowed to access, ensuring safe and trusted collaboration. Within the FACIS project, ESB ICAM is being further developed to support secure and reliable digital cooperation.

Edge

Edge refers to the processing of data directly where it is generated, for example on machines, vehicles, or sensors. This enables very fast responses, as data does not need to be sent to a remote data center first. In practice, Edge is often combined with the Cloud: Edge for real-time decisions on site, Cloud for large-scale analysis and storage. Together, they form a Multi-Provider Cloud-Edge Continuum.

F

Abbrevation for Federation Architecture for Composed Infrastructure Services aiming at fostering trustworthy collaboration among all participants in a cloud-edge ecosystem by developing practical and validated tools, services, and a regulatory framework for service-level agreements for Europe’s digital ecosystem. ​

A loose set of interacting actors that directly or indirectly consume, produce or provide Assets and related Resources. Federations are operational independent of other federations.

M

A federated environment that interconnects independent cloud and edge providers, enabling the seamless access and collaboration between on-site devices (Edge) and multiple cloud providers. “Continuum” means there is no fixed boundary between Edge and Cloud: tasks are carried out wherever it makes the most sense – on the device, nearby, or in a data center. “Multi-Provider” means that more than one cloud provider can be used, rather than relying on a single provider. This creates a connected, flexible system – from sensor to cloud – across different providers.

S

Service Level Agreement – A formal contract between a service provider and a customer defining performance and service standards for the digital service

X

A toolbox that compromises the GXFS federation services that were developed on the basis of the five GXFS work packages and offers free and open source code for all interested

Z

An IT security principle in which no entity is trusted automatically. Every user, device, and application must be verified each time access is requested before data or services can be used. This approach helps prevent unauthorized access – even if an attacker is already inside the system. In short, trust is never assumed; it is verified every time.

FACIS Update

Stay connected with the FACIS community

Discover perspectives, the latest research insights, practical tools and frameworks for cloud-edge ecosystems, and real-world scenarios – all shaping Europe’s digital future.

 

Start by following us on LinkedIn.

Prefer deeper updates?

Subscribe to receive selected papers, events, and project insights directly in your inbox.

Subscription Form