The OSI model: a reference for standards and protocols
OSI Model
  • Know-how

Those working with network technology are bound to encounter the ISO-OSI model sooner or later. This system subdivides communication between computer systems into seven different layers. Each of these layers is assigned a certain task. With the help of this layer model, subareas of abstract processes are able to be descriptively explained.

OSI Model
SSD vs. HDD
SSD vs. HDD
  • Know-how

What are the differences between SSD and HDD? Our SSD vs. HDD comparison presents the essential information of both storage technologies. We’ll also give you tips as to which hard drive technology is best suited for select applications. Will it be the mature and inexpensive hard disk drive or the fast and more expensive solid-state drive?

SSD vs. HDD
Software Defined Networking
SDN (Software Defined Networking)
  • Know-how

Renting cloud resources is common practice in many companies. This is because the use of external, visualized hardware is attractive both for cost reasons and because of the associated flexibility: Many providers now use Software Defined Networking (SDN), a modern network approach that makes it possible to manage and scale hardware around the clock using software.

SDN (Software Defined Networking)
Software Defined Data Center
Software Defined Data Center (SDDC)
  • Know-how

Software-defined Infrastructure-as-a-Service options have taken the market by storm. More and more providers are offering these flexible IT resources, ranging from storage and servers to complete networks. With the software defined data center (SDDC), there is now a solution that combines all IaaS models and grants access to an entirely virtual data center.

Software Defined Data Center (SDDC)
SFTP (SSH File Transfer Protocol)
SFTP (SSH File Transfer Protocol)
  • Know-how

Using SSH File Transfer Protocol (SFTP), you can transfer data bidirectionally within an authorized group of people in a particularly secure way. The transfer between the client and server takes place via an encrypted IP-based data tunnel. The basic File Transfer Protocol (FTP) has major security vulnerabilities, which were eliminated in the refined SSH File Transfer Protocol.

SFTP (SSH File Transfer Protocol)
Servers with storage: storage solutions for the future
Servers with SSD storage
  • Know-how

SSDs have been gaining ground for years now. Until recently, these flash-based storage devices have been mostly used by mobile devices, like smartphones or MP3 players. But more recently desktops and servers have been making use of this technology. What advantages do SSDs have over traditional storage devices? Find out here.

Servers with SSD storage
Server operating systems: a history and overview
The History of Server Operating Systems
  • Know-how

Operating systems have gone through some major changes over the years. While their beginnings are rooted in more humble, purely text-based user interfaces, today’s options have evolved into complex software packages with graphical interfaces, comprising an elegant go-between for hardware and software applications. Users, who have long since been equipped with a keyboard and mouse, are able to...

The History of Server Operating Systems
Server Containers: virtualisation without emulation
Server Containers explained
  • Know-how

The introduction of Software containers is widely regarded as a revolution in server administration. The idea of isolating applications in virtual runtime environments is nothing new, but with platforms like Docker, users can enjoy extensive functionality, which facilitates working with server containers. So, what exactly can application containers do?

Server Containers explained
RFID (radio frequency identification)
Radio Frequency Identification (RFID)
  • Know-how

RFID, technology to identify objects with the help of electromagnetic waves, is revolutionizing logistics processes and merchandise management systems. Concepts for automating production processes in the context of the future project Industry 4.0 also rely on RFID systems. We explain to you how radio frequency identification works and what fields of application there are.

Radio Frequency Identification (RFID)
Reverse ARP
RARP (Reverse Address Resolution Protocol)
  • Know-how

Out-dated technology can still be interesting. Even though the Reverse Address Resolution Protocol was introduced in 1984, and considered obsolete the following year due to the Bootstrap Protocol, it continued to be used long after. The RARP has not completely disappeared from network technology even today. As the Reverse ARP, this protocol is a counterpart to the Address Resolution Protocol. But...

RARP (Reverse Address Resolution Protocol)