MOOC – the online education platform

MOOC opens the door to a new era of learning. Massive open online courses give everyone with internet access the opportunity to receive education at...

What is Chrome 68?

Early next month, Chrome 68 will be launched and the new browser will distrust all webpages that do not have HTTPS encryption as “not secure”. This is...

Selling online: the top English-speaking online marketplaces

You want to sell online – but where? If you don’t want to be entirely responsible for your own online shop, then you should offer your products on...

Raspberry Pi and Plex: how to turn a single-board computer into a media server

Plex is among the most popular and user-friendly solutions for creating a media server in your home network. In contrast to many other applications, which are often Windows-only, the Plex server is compatible with Linux, Mac, and even single-board computers like the Raspberry Pi. In this Raspberry Pi and Plex tutorial, you will learn what technical requirements must be fulfilled and how...

Blockchain

Blockchains are a rather hot topic right now. Though the term is far less common than Bitcoin itself, its significance in today’s world far exceeds that of the latter. After all, cryptocurrencies are run entirely on blockchain technology, which combines peer-to-peer networks with cryptographic methods and various assumptions of game theory. The result: reliable infrastructures tailored for...

How are websites accessed?

In order to access a web page in a browser, you just have to enter the URL into the address bar in your web browser and the requested website will pop up on your screen. This seems simple enough, but the process that’s taking place in the background is a highly complex one. Learn about what happens when you access a website – from the URL translation to the relevant IP address via data transfer,...

Clearing your RAM: our step-by-step guide

Computers simplify our working life and everyday life in many ways. However, if they do not run as usual, they can become more of a hindrance than a help. The various possible causes of performance problems include excessive memory usage, which plays an important role in managing active processes. One possible solution is to clear the RAM, and thereby increase your RAM.

Token ring – IEEE 802.5

A glance back into history can reveal a lot. Although token ring networks, or ring topologies, are nowhere to be found nowadays, token rings remain an interesting form of technology. Why the model, which is actually quite good, was outdone by its competitor Ethernet is due to the merciless nature of the tech market. Read the history behind token rings, along with a definition of the system that...

Edge Computing – Calculating at the edge of the network

Autonomous cars, intelligent factories and self-regulating supply networks – a dream world for large-scale data-driven projects that will make our lives easier. However, what the cloud model is and how it works is not enough to make these dreams a reality. The challenge of effectively capturing, evaluating and storing mass data requires new data processing concepts. With edge computing, IT...

SNMP (Simple Network Management Protocol): the protocol for network management

The communication protocol SNMP (Simple Network Management Protocol) is an elementary component of many network management applications. It defines a number of message types that greatly simplify the monitoring and administration of individual network participants such as PCs, routers, servers, switches, firewalls, or printers. How exactly the SNMP protocol works and what fundamental adjustments...

IGMP snooping: eavesdropping for multicast traffic

If a system in IP networks is to send data packets to different target hosts as efficiently as possible, an IP multicasting connection is the perfect solution. When it comes to multipoint transmission, the data packets are able to reach all interested parties thanks to various protocols such as GMP, for example. Switches and internet routers can also use the communication protocol for IGMP...

Simple network time protocol: the stripped-back protocol for time synchronization

An exact system time on a computer is especially important when devices need to exchange data. Cross-system processes quickly come to a standstill if the generated time stamps are very different from the time that applies to the system. Synchronization methods that keep the clocks of the individual network participants in sync are utterly indispensable. One of the simplest methods to achieve time...

MAC address (media access control)

Without a MAC address, nothing in a network will work on your device. Just as your postman needs a valid address to reliably deliver the mail, the transmission of data packets in computer networks is only possible with the unique hardware address of the target device. When it comes to a MAC address, at least there is one address available on each network-compatible device. But what is the MAC...