Encyclopedia

Play to earn
What is play to earn? How to make money with NFT games
  • Online sales

Play to earn is a gaming concept that allows players to make money while playing computer games. This business model refers to NFT games. In this article, we’ll show you how to make money playing NFT games and what you need to know to get started. Read on to explore a list of some of the top play-to-earn games.

What is play to earn? How to make money with NFT games
Hash table
Hash table | Fast database access to hash values
  • Security

A hash table is created using the hash function. This is a method for reducing digital information in such a way that extensive data sets can be retrieved quickly in internet-based databases. This method also makes it possible to implement sophisticated security features using encryption when transferring data.

Hash table | Fast database access to hash values
File sharing services
7 free file sharing services
  • Know-how

File share services like WeTransfer or File.io make it easy to share large files. They’re free to use and users don’t even need to register. A growing number of file sharing services such as Google Drive and Dropbox require registration to use cloud storage features. Find out when registration makes sense and which document sharing platform has what you need.

7 free file sharing services
What is the cloud?
What is the cloud?
  • Know-how

The cloud is accessible at any time and from almost any place with an internet connecting, allowing you to access saved data and software for business processes or private use. Data that is stored in the cloud is located on external providers’ servers, outside of your own IT network. Cloud computing is increasingly becoming an efficiency factor in companies but is also of growing interest to...

What is the cloud?
What is a screenshot?
What is a screenshot?
  • Web design

What is a screenshot and how do you take them? Perhaps you have already had to ask yourself this question when technical support asked you for a screenshot of error messages you were receiving. You are probably also familiar with tutorials that usually provide step-by-step instructions with screenshots. Here you will learn all about screenshots.

What is a screenshot?
What is cloud gaming?
What is cloud gaming?
  • Know-how

Cloud gaming is an alternative to classic games. The video games are streamed online and can be played on a variety of devices without high-end hardware. Read on to find out how this works, available cloud gaming providers, and why game streaming may be a good option for you.

What is cloud gaming?
FPS
Frames per second (FPS) in TV, cinema, and gaming
  • Know-how

Frames per second (FPS) are an important metric in gaming, determining how smoothly a game can run. How many frames per second can a human being process and what use are higher frame rates? In our article, we’ll explain in which cases movies, videos, and games benefit from higher FPS and in which cases they don’t. Let’s begin.

Frames per second (FPS) in TV, cinema, and gaming
OAuth
OAuth (Open Authorization)
  • Security

The “pathway to hell” – this is how Eran Hammer-Lahav once called the security protocol OAuth 2.0, on which he himself had worked for years. Others, however, use the service without issue. It enables users to use data and functions across multiple platforms in multiple services – for example, with the convenient single sign-on – using secure API authorization. But how exactly does OAuth2 work and...

OAuth (Open Authorization)
What is a rootkit?
What is a Rootkit?
  • Security

If you ask the IT community which malware is the most harmful, the answer is typically not viruses, worms or Trojan horses. Experts unanimously agree that rootkits pose much greater problems even to experienced users. The rootkit’s special ability is to conceal other malware and thereby enable cybercriminals to misuse others’ computers for their own criminal activities undetected – such as for bot...

What is a Rootkit?
SAML
What is SAML?
  • Security

Simplifying log-in processes makes websites more user friendly, and also helps to increase the security of user data. One of the most popular solutions for implementing authentication processes is SAML (security assertion markup language). Through a variety of components such as special protocols and message formats, this XML-based framework helps to implement internal and cross-company log-on...

What is SAML?