Bare metal server – dedicated hardware for high-level web projects

Bare metal – the latest product on the web hosting market evokes power from its name alone, and not for nothing: servers with this nickname focus on high-performance hardware. With a bare metal server, the user's access extends practically down to the bare metal. Software components based on this product are subject to user control and can be installed and configured according to individual...

Container-as-a-Service – CaaS provider comparison

CaaS – Container-as-a-Service – is the latest model in the cloud computing market: users can find suitable platforms for all established infrastructure providers. But what actually is CaaS? And what is the difference between CaaS and other cloud services, like Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS)? Here we introduce hosted container...

What is a root server? Definition and mechanics

When you call up a website, the entered domain first needs to be turned into an IP address and read out from the browser so that the page can finally appear in the browser. This process is known as name resolution. Here, the root name server or (DNS) root server in the domain name system plays a key role. But what is a root server? And what exactly goes on when they receive requests for...

Alternatives to Docker: an overview of the container platform

Docker is currently doing very well for itself, but there are many forerunner technologies and competitor products following in the market leader’s wake. They also offer attractive alternative solutions for resource-saving virtualization on an operating system level. We give you an overview of the most important options in the container industry, and introduce established container formats and...

MPLS: What’s behind the network technology

Speed and reliability play an important role for data transfer in networks. They reflect the quality of the connection, which is why providers do everything they can to guarantee the agreed services. A method primarily used in virtual private networks is the so-called multiprotocol label switching (MPLS).

Neighbor Discovery Protocol (NDP) – what is it?

Network configurations today are done quickly. For those who do not rely on their own fixed settings for routers, computers, and more, the Internet Protocol family provides the appropriate set of automatic mechanisms to determine critical parameters, such as the default gateway, IP address, and MAC address.

Dynamic DNS (DynDNS): making remote control easier

Being able to access your home computer from another location is no longer a complicated matter thanks to remote connection. It is handy to be able to use your computer from the office and swap files. But IP addresses change often and this throws a spanner in the works. DynDNS (DDNS) services are the solution. In this article, we explain what these are and how you can access your computer via the...

Debian: what does this Linux kernel offer?

Anyone looking to learn about Linux operating systems will come across Debian soon enough. The GNU/Linux distribution was one of the first of its kind and is still one of the most widely used today. Over 1,000 community members work on the Debian project, furthering the development of the collection. But how did Debian become so successful? And what makes this system software so interesting to...

Network protocol: The basis of electronic data exchange

For computer systems to be able to communicate with each other and exchange information, they need common ground, just like humans must share a common language. But computers don’t rely on foreign language lessons, and instead only need the appropriate network protocol to successfully communicate. This provides guidelines and structures for the data transfer, and so plays a decisive role in the...

Penetration test: how to find weak points in your network

The more complex a network is, the more vulnerable it is to attacks. In times when customers and partners have access to internal network structures via the internet, and can control various applications via web interfaces, IT employees are encountering more and more problems. Large companies, in particular, prefer to use penetration testing to check how well their security concept works. This...