An introduction to gRPC

gRPC – Paving the way to the client-server communication of the future

Remote procedure calls have long played a critical role in inter-machine communication when it comes to client-server architectures. For several years now, gRPC has proven to be a worthy successor. This framework uses powerful strategies to fulfill the increased demands of global networking and end-to-end digitization.

DNS over HTTPS

DNS over HTTPS: more security on the net

The Domain Name System (DNS) is considered “the phone book of the Internet”. You can use it to find the right IP address for each URL. However, the system traditionally works without any encryption. Virtually anyone can listen in when you send a request. Not only is this slightly worrying, but it can also be dangerous. DNS over HTTPS tries to close the decade-old security gap.

TCP ports and UDP ports

UDP and TCP ports: A list of the most important ports

Protocols control communication on the Internet. Doors have to be opened so that packages of data can get into systems and come out of them. These ports are an important aspect of the Internet. There are over 65,000 possible UDP and TCP ports, which are broken down into well-known ports, registered ports, and dynamic ports. Which ports are important?

What is Kubernetes?

Kubernetes: what can this tool do?

Container technology has revolutionized software development. However, working with multiple containers at the same time can quickly become confusing. Kubernetes provides a solution to this. This orchestration tool allows developers to monitor all containers, effectively scale them and automate lots of work processes. How does Kubernetes do this?

TMP file

TMP files: what is the deal with temporary files?

TMP files are automatically created and then deleted when they are no longer needed. They help to free up memory and are used to back up data. So, what exactly are temporary files, which programs create them and do these files also have disadvantages? In the following article, you will learn all you need to know about the function of temporary files.

A comparison of different servers

Web hosting: servers by comparison

Carry out a server comparison and you will notice that website operators have a large selection to choose from. Professional hosts offer virtual, dedicated, and cloud based servers in different performance levels. How do these server models differ from one another? What features does a root server have in comparison to a managed server? Which type of hosting is best for your web project? Take a...

Network protocol: Standards for data exchange

Network protocol: The basis of electronic data exchange

For computer systems to be able to communicate with each other and exchange information, they need common ground, just like humans must share a common language. But computers don’t rely on foreign language lessons, and instead only need the appropriate network protocol to successfully communicate. This provides guidelines and structures for the data transfer, and so plays a decisive role in the...

UDP - User Datagram Protocol

UDP: What is the User Datagram Protocol?

The Internet protocol family – the cornerstone for communication on the Internet – has around 500 members who work on a wide variety of layers. For example, the connectionless User Datagram Protocol (UDP) is responsible on the transport layer for the transmission of packets that were previously addressed via the Internet Protocol (IP). In this guide, you can find out exactly what distinguishes...

How to connect Bluetooth

How to turn on Bluetooth on Windows 10 (and lower), macOS, Linux, Android and iOS

The Bluetooth wireless technology standard is well established in the IoT industry and enables wireless connections between all kinds of digital devices, regardless of the operating system. The process of connecting Bluetooth devices, called Bluetooth pairing, is similar for all devices. But sometimes you may encounter problems. Learn how to fix pairing problems and how to connect Bluetooth...

What is MAC spoofing?

What is MAC spoofing?

MAC spoofing is a method by which unique hardware addresses are masked using a Locally Administered Address (LAA) in the software. MAC spoofing can offer protection for your privacy when using public LAN or WLAN networks, but can also be used for illegal network activities. We explain to you here how MAC spoofing works and which settings in Windows must be accessed in order to change your MAC...


We’re all in this together. IONOS is
#HereForYou
For your business. When times are tough. When it matters most.
Keep your business going or start one with your own online store.
3 months free
Online Store
Get started in the world of eCommerce free for 3 months.