Robo-advisor
Robo-advisors: what’s behind the virtual financial management?
  • Web development

Investing money in stocks, bonds, or commodities and doing nothing else but collecting the profits years later – this has been possible for some years now with automated asset management advisors called robo-advisors. The digital financial advisors offered by financial institutes and FinTech use algorithms to create a customized strategy for private investors, taking over the entire asset...

Robo-advisors: what’s behind the virtual financial management?
Keylogger
Keyloggers: how do they work and how do you protect yourself from them?
  • Security

Keyloggers are programs or devices that get access to your credentials by recording your keystrokes. Keyloggers hide in operating system software and leak data. Some keylogger hardware is even more sophisticated, since it can document your keyboard behavior or tap directly into the data stream. Learn how keyloggers work and which variants are available in our guide. We also give you tips on how to...

Keyloggers: how do they work and how do you protect yourself from them?
B2G – Business-to-Government
B2G – business-to-government
  • Online sales

In the course of setting up a business, there is no way around important authorities such as the tax or trade office. But a relationship to the tax returns office need not just be a purely functional one – sometimes, it is possible to enter into a business relationship with these authorities too. This kind of business relationship between companies and authorities is called B2G...

B2G – business-to-government
How to write a briefing
How to write a briefing that results in the perfect text
  • Online sales

If you commission someone to write copy, a copywriter briefing is the most important tool for communicating your ideas and specifications. Good text briefings are clear, precise, and highlight the most important content and key points of the commissioned text in such a way that writers can execute the assignments well. This step-by-step guide lays out which sub-items are essential to writing a...

How to write a briefing that results in the perfect text
Token ring
Token ring – IEEE 802.5
  • Know-how

A glance back into history can reveal a lot. Although token ring networks, or ring topologies, are nowhere to be found nowadays, token rings remain an interesting form of technology. Why the model, which is actually quite good, was outdone by its competitor Ethernet is due to the merciless nature of the tech market. Read the history behind token rings, along with a definition of the system that...

Token ring – IEEE 802.5
SNMP: Simple Network Management Protocol
SNMP (Simple Network Management Protocol): the protocol for network management
  • Know-how

The communication protocol SNMP (Simple Network Management Protocol) is an elementary component of many network management applications. It defines a number of message types that greatly simplify the monitoring and administration of individual network participants such as PCs, routers, servers, switches, firewalls, or printers. How exactly the SNMP protocol works and what fundamental adjustments...

SNMP (Simple Network Management Protocol): the protocol for network management
IGMP snooping
IGMP snooping: eavesdropping for multicast traffic
  • Know-how

If a system in IP networks is to send data packets to different target hosts as efficiently as possible, an IP multicasting connection is the perfect solution. When it comes to multipoint transmission, the data packets are able to reach all interested parties thanks to various protocols such as GMP, for example. Switches and internet routers can also use the communication protocol for IGMP...

IGMP snooping: eavesdropping for multicast traffic
SNTP: simple network time protocol
Simple network time protocol: the stripped-back protocol for time synchronization
  • Know-how

An exact system time on a computer is especially important when devices need to exchange data. Cross-system processes quickly come to a standstill if the generated time stamps are very different from the time that applies to the system. Synchronization methods that keep the clocks of the individual network participants in sync are utterly indispensable. One of the simplest methods to achieve time...

Simple network time protocol: the stripped-back protocol for time synchronization
IGMP - Internet Group Management Protocol
IGMP: what is behind the Internet Group Management Protocol
  • Know-how

Using multicast connections, data streams can be transferred to a large number of clients easily and in such a way that saves resources – provided that the accessing systems are part of the same multicast group. In IPv4 networks, the organization and management of these groups is based on the Internet Group Management Protocol (IGMP), which was published as early as 1989. What exactly this...

IGMP: what is behind the Internet Group Management Protocol
Class diagrams with UML
Creating class diagrams with UML
  • Web development

Class diagrams are structural diagrams in the UML modeling language. The UML class diagram is suitable for visualizing system elements and their dependencies for object-oriented programming languages. If you are a modeler creating a class diagram, it is advantageous to adhere to the official notation and semantics. This is the only way to avoid misunderstandings. We will explain notation for the...

Creating class diagrams with UML