Encyclopedia

What is Internet protocol? – IP definition, etc.

What is Internet protocol? – IP definition, etc.

When networking a computer system, protocols play an important role. An example is the Internet Protocol, which was published in a first specification in 1981, and is the indispensable basis for the smooth sending and receiving of data packets. But what is behind the RFC standard? And how does the internet protocol actually work?

Sitemap

Sitemap

Sitemaps belong to the standard features of a website, but they seem to be gradually disappearing from the World Wide Web. Some online presences hide the navigation file or even forgo it completely. We explain why search engines like Google still give sitemaps a lot of attention, how important sitemaps are for SEO as a result, and how you can create sitemaps yourself – manually or with a sitemap...

ASCII-Codes | Overview of all characters on the ASCII table

ASCII-Codes | Overview of all characters on the ASCII table

Every day we work with text on PCs, smartphones, tablets and other computer equipment using our keyboards. We expect letters, numbers, and characters to appear on the monitor before us. The fact is that there is a decades-old coding system behind this everyday function. Since the 1960s, ASCII has determined how computers interpret our input. We have prepared a practical ASCII table to help you...

UML: Unified Modeling Language

UML: Unified Modeling Language

If you need to run object-oriented programming, to represent a system clearly, and also make it accessible to external specialists, you may find the Universal Modeling Language to be ideal. UML is a modeling language, but has many other possible uses. Since the introduction of UML 2.0, UML diagrams are also suited to the graphical representation of non-computer-based concepts, such as use case...

What's a hackathon?

What's a hackathon?

What is a hackathon, and what happens at one? Very little sleep, innovative ideas, and a lot of hard work! In addition to a definition of a hackathon, and an explanation of how it works, we also provide a few examples of hackathons in the US, as well as some of the amazing projects that came from them, such as mental health apps, and organ transplant aides.

Ethernet frame

Ethernet frame

Ethernet frames enable the transmission of data over an Ethernet connection and are essential for local area networks. Ethernet frames are structured and sized differently depending on the protocol, and contain important information such as MAC addresses, protocol information, length information, and much more. The established Ethernet standard IEEE 802.3 has also developed special frames for VLAN...

CSMA/CD - Carrier Sense Multiple Access / Collision Detection

CSMA/CD - Carrier Sense Multiple Access / Collision Detection

Rules must be observed when communicating in a group. This is no different with local networks: CSMA/CD regulates how data packet collisions must be handled in a LAN network. But what happens if several participants attempt to simultaneously carry out a transmission and the information gets lost? Carrier Sense Multiple Access with Collision Detection is an important procedure for smooth network...

What is artificial intelligence?

What is artificial intelligence?

Artificial intelligence is one of the most fascinating fields of research in the world today. It will undoubtedly alter our future like no other technology ever has before — this is one thing that all AI researchers agree on. The technology is already present in so many areas of our life. We discuss some of the secrets that surround artificial intelligence, the prospects, and risks involved in...

Create a ZIP file

Create a ZIP file

Send multiple images and videos via email, archive large amounts of data without using too much space, or encrypt confidential documents - you can do all of this by zipping files. We show you how to create a compressed ZIP file in Windows as well as macOS in our step-by-step guide. We also show you how to protect your files with a password if needed. This way, you can manage your storage space...

Intranet | Secure internal data exchange

Intranet | Secure internal data exchange

An intranet provides secure access to web applications within a corporate network for employees. With so-called firewalls and other security technologies, a company can ensure that no unauthorized persons can access the company’s intranet from the publicly-accessible internet. You can use web-like applications within an intranet and adapt your internal network individually to the needs of your...