Bonjour: What’s behind the zeroconf implementation

Manually organizing a large local network can be a nerve-wracking and very complicated matter. Without your own DHCP and DNS servers to support you in the distribution of addresses and name resolution, all IPs would have to be entered manually and also updated independently if changes are made in the network. Zeroconf implementations like Bonjour, which connect network components without almost no...

Use subnetting to get the most out of your network

Dividing a corporate network into smaller subnets has some advantages in terms of speed, security, and logical organization. However, many people find it difficult to set up. Binary computational operations and long series of numbers are frightening, but the principle itself is not so complicated. We explain what subnetting is, how to calculate a subnetmask, and what you need subnets for, so that...

Ubuntu: The versatile Linux distribution with long-term support

Whether a home PC, work laptop, or website server – without an operating system, the management of hardware resources wouldn’t be possible. Windows systems have proven themselves over the years, and Apple computers run with Mac OS X as the standard, but Linux distributions are no longer a niche in the server environment. Ubuntu, for example, continues to build on traditional open source...

Network types at a glance

When several computers are connected to one another it is known as a network. Networks enable data exchange between different devices, making shared resources available. Different network types are implemented depending on which transmission techniques and standards are used. These differ in terms of the number of connected systems and potential reach.

MySQL tutorial: the comprehensive guide for beginners

Along with Oracle and Microsoft SQL server, MySQL is one of the most popular management systems for relational databases. Nowadays the software developed by MySQL AB belongs to the product portfolio of the Oracle Corporation and is proprietarily marketed under a dual license. Since 2009, an open source MySQL fork, known as MariaDB, has also been available from the original developers. Here we give...

The Docker ecosystem: the best Docker tools at a glance

Docker significantly simplified the use of software containers with its efforts at standardization. The lean container platform is part of a steadily increasing ecosystem that provides users a wide range of application options in the realm of software deployments, orchestration of containers, and multi-container applications, as well as continuous integration (CI) and continuous delivery (CD). In...

ECC RAM – the error-correcting code memory

Memory is one of the most important components of a computer system and is particularly important for processing large amounts of data. In addition to increasing the storage capacity, it is also necessary to guarantee the security of the data. Bit errors, for example, are one of the key foes that ECC RAM is battling against to protect the main memory. To date these error-correcting memory modules...

Remote desktop: Application, troubleshooting, and alternatives

Remote desktop connections are indispensable for day-to-day business. More than anything, allowing remote control access from another computer saves time: Whether for support, online conferences, or home office — with remote desktop, you can easily and conveniently connect your computer to distant devices. Private users also benefit from remote use: By connecting with different operating systems,...

Reverse proxy server – core components in security architecture

Cyber criminality is a big issue for most companies’ IT departments. Online attacks threaten the security of private networks and cause millions of dollars of damage per year. Popular targets are servers that provide online services and therefore require a permanent internet connection. An extra layer of security can be applied by using an upstream network component – the reverse proxy. This...

Server failure: risks, consequences, countermeasures

Server failures can be devastating for businesses, especially if central business areas are controlled by IT systems since the longer the server is down, the costlier is it for the company. This can result in loss of sales and in the worst case, the loss of business or customer data. Here we demonstrate the internal and external sources of danger that can lead to server failure, explain the...