When several computers are connected to one another it is known as a network. Networks enable data exchange between different devices, making shared resources available. Different network types are implemented depending on which transmission techniques and standards are used. These differ in terms of the number of connected systems and potential reach.
HTTP status codes emerge when something isn’t running properly on the internet. In this respect, the 502 Bad Gateway error is no exception. But this familiar error message can be particularly tricky: It’s not actually clear where the source of the problem lies. In the chain of gateways along which internet requests run, the error could occur at a number of different points. This article explains...
A computer’s unique name on a network is the hostname, site name or computer name. The hostname is part of the fully qualified domain name, which can be used (for example) to find and access websites on the internet. Here you’ll learn what a hostname looks like, and we’ll show you various ways to determine the hostname using an IP address or how to change it.
Growing sums of data require cost-effective, high-performance storage solutions. One option for fulfilling this requirement is a network attached storage. In business contexts, this model has already established itself as a viable alternative to file servers, hard drives, and the cloud. Private users have also caught on and use NAS systems at home. But what is a NAS? Read on, and we’ll show you...
A unique address is needed for a letter to reach the right person by post. It is similar on the internet. The network equivalent of a postal address is an IP address. One of the tasks of the Internet Assigned Numbers Authority (IANA) is to coordinate the worldwide pool of IP addresses, and thereby contributing to an integral part of millions of people’s lives.
Should data and processes be handled in a private or public cloud? If a company wants to use cloud computing, they first need to choose one of the many providers available. Using the personalized services offered by a private cloud, companies can address a wide range of business related and operational challenges. Separating operations also makes a private cloud more secure than a public cloud.
Microsoft Exchange Server is considered the standard solution for business e-mail traffic and computer-supported collaborative work. The software has many different usage models of available and these require purchasing special licenses. We’ll show you the licensing model here and give you an overview of the different functions of the collaborative software.
The internet – just like other large networks – must be precisely subdivided. The network classes, used until the 1990s and not yet completely gone from the scene, were far too inflexible for the requirements of the digital world. CIDR can help: With classless inter-domain routing, it’s possible to create effective subnets and routes. We explain how this works.
Apache Kafka is an open source software which is highly regarded among many companies for its versatility. This data storage and processing solution sets itself apart through its high performance, scalability and fault tolerance. This is why it is used whenever information needs to be transferred reliably in real time.
Those who want to access computer systems and applications in networks need host (or rather, domain) names. As long as the Domain Name System, which is responsible for the name conversions, is functioning normally, users remain unaware that machine-readable IP addresses are hidden behind these names. However, if complications with the DNS and the involved name servers arise, they can be quickly...