What is a GUID partition table (GPT)?
GPT partitions: What is a GUID partition table?
  • Configuration

In order to provide the best support for the rapid progress in hardware development, system software is also constantly being improved. Along with comfort, performance and security are crucial factors. One good example is the GUID Partition Table (GPT) partition style, which has already replaced the classic master boot record in many system architectures. We’ll show you why.

GPT partitions: What is a GUID partition table?
Google Knowledge Graph
Google Knowledge Graph: What Is It and What Does It Do?
  • Search engine marketing

Google’s Knowledge Graph summarizes relevant information and links for a search request in a clear and visually appealing manner. This extra information on search results is provided in a separate widget. In this guide, we explain how the Knowledge Graph works and where the information comes from.

Google Knowledge Graph: What Is It and What Does It Do?
How to delete a Google Account
Deleting your Google Account: A step-by-step guide
  • Social media

Google’s services are very popular around the world. In addition to the well-known search engine, Gmail, Google Maps and the in-house browser Google Chrome are standard applications for many users. An active Google account is required to use these services and their features. But how can you delete your Google account if you no longer want to use the Google apps?

Deleting your Google Account: A step-by-step guide
What is a reverse proxy?
Reverse proxy server – core components in security architecture
  • Know-how

Cyber criminality is a big issue for most companies’ IT departments. Online attacks threaten the security of private networks and cause millions of dollars of damage per year. Popular targets are servers that provide online services and therefore require a permanent internet connection. An extra layer of security can be applied by using an upstream network component – the reverse proxy. This...

Reverse proxy server – core components in security architecture
HTTPoxy: Behind the CGI vulnerability
HTTPoxy: Threatening the security of CGI applications
  • Configuration

Fifteen years after the discovery of the security flaw HTTPoxy, it’s still an issue with CGI applications. The reason for this is the fact that the Common Gateway Interface standard provides the use of environment variables to process HTTP requests. These can include header contents that modify the original proxy configuration, allowing hackers to redirect data packets to a completely foreign...

HTTPoxy: Threatening the security of CGI applications
Virtual Machines
An introduction to virtual machines
  • Know-how

Virtual machines are extremely practical and versatile: Do you want to set up an isolated test environment, run a Linux application on your Windows computer, or provide different operating systems for cross-platform software tests? With the right virtualization software and an appropriate image file, this is easy. We will introduce you to the basics of hypervisor-supported hardware virtualization...

An introduction to virtual machines
Binary Large Object
BLOBs (Binary Large Objects): introduction
  • Web development

BLOB is short for Binary Large Object. The data types in a BLOB are typically classified as being unstructured data. A typical example of an unstructured data type is multimedia files, which are usually stored in databases as a BLOB. Since databases cannot read the unstructured data in BLOBs, special data processing methods are required.

BLOBs (Binary Large Objects): introduction
Character Large Object
What are CLOBs (Character Large Objects)?
  • Web development

Databases normally save information in database blocks. The size of the data plays a key role here: Especially large data objects that exclusively comprise strings are saved as CLOBs (Character Large Objects) or TEXT and are usually stored with a reference. Read the following article to find out what’s behind the CLOB data type as well as the advantages and disadvantages it provides.

What are CLOBs (Character Large Objects)?
Ruby on Rails: creating your own with less code
Ruby on rails: the MVC framework for complex web applications
  • Web development

Frameworks tremendously simplify web application development. Fundamental architectures, predefined paradigms, and integrated libraries create the perfect platform on which your planned app can be built. One name that’s often mentioned hand-in-hand with web applications frameworks is Ruby on Rails. Based on the script language Ruby, this web framework has attracted many fans through its clean, and...

Ruby on rails: the MVC framework for complex web applications
Graph Neural Network
Graph Neural Network: the next step in deep learning
  • Search engine marketing

Artificial intelligence, machine learning, neural networks: In the quest to improve software , computer scientists around the world are always working on new methods. Right now, graph neural networks are a hot topic because of their great potential. In these artificial neural networks, the connections between pieces of information are just as important as the data itself. What are the advantages...

Graph Neural Network: the next step in deep learning