Know-how

What is a root server? Definition and mechanics

When you call up a website, the entered domain first needs to be turned into an IP address and read out from the browser so that the page can finally appear in the browser. This process is known as name resolution. Here, the root name server or (DNS) root server in the domain name system plays a key role. But what is a root server? And what exactly goes on when they receive requests for translating a domain name into an IP address? [...]  

Network types at a glance

When several computers are connected to one another it is known as a network. Networks enable data exchange between different devices, making shared resources available. Different network types are implemented depending on which transmission techniques and standards are used. These differ in terms of the number of connected systems and potential reach. [...]  

Linux vs. Windows: a comparison of the best web server solutions

The duel between Linux and Windows may have an obvious victor on the home computer front, but the battle for server use paints a very different picture: since the beginning, Linux has defeated Windows, as usage figures show. But many users remain unconvinced by statistics and rightfully ask the question: what are the actual differences between the two platforms? [...]  

MySQL tutorial: the comprehensive guide for beginners

Along with Oracle and Microsoft SQL server, MySQL is one of the most popular management systems for relational databases. Nowadays the software developed by MySQL AB belongs to the product portfolio of the Oracle Corporation and is proprietarily marketed under a dual license. Since 2009, an open source MySQL fork, known as MariaDB, has also been available from the original developers. Here we give an introduction into dealing with relational databases, as well as providing you with a practical beginner’s tutorial for MySQL and MariaDB. [...]  

Apache Hadoop: distributed storage architecture for data quantities

Are you looking to execute complicated computing processes with large amounts of data? This is exactly what the Big Data framework, Hadoop, focuses on. The open source Apache software offers a Java based frame with which various Big Data applications on computer clusters can be parallelised. Hadoop’s modular expandability, which offers users an enormous range of functions, is a particularly advantageous feature of this system. [...]  

The Docker ecosystem: the best Docker tools at a glance

Docker significantly simplified the use of software containers with its efforts at standardisation. The lean container platform is part of a growing ecosystem that provides users a wide range of application options in the realm of software deployments, orchestration of containers, and multi-container applications, as well as continuous integration (CI) and continuous delivery (CD). In this guide, we present the most popular Docker tools and extensions, and elaborate on the role of container technology within a digital infrastructure platform. [...]  

ECC RAM – the error-correcting code memory

Memory is one of the most important components of a computer system and is particularly important for processing large amounts of data. In addition to increasing the storage capacity, it is also necessary to guarantee the security of the data. Bit errors, for example, are one of the key foes that ECC RAM is battling against to protect the main memory. To date these error-correcting memory modules have so far been used primarily in the server environment. [...]  

Remote desktop: Application, troubleshooting, and alternatives

Remote desktop connections are indispensable for day-to-day business. More than anything, allowing remote control access from another computer saves time: Whether for support, online conferences, or home office — with remote desktop, you can easily and conveniently connect your computer to distant devices. Private users also benefit from remote use: By connecting with different operating systems, you can, for example, manage all of your apps from a single location. Read here with us about how it works and whether it’s right for you. [...]  

Reverse proxy server – core components in security architecture

Cyber criminality is a big issue for most companies’ IT departments. Online attacks threaten the security of private networks and cause millions of dollars of damage per year. Popular targets are servers that provide online services and therefore require a permanent internet connection. An extra layer of security can be applied by using an upstream network component – the reverse proxy. This retrieves resources on behalf of a client and then returns them to the client as if they came from the proxy server itself. [...]  

Server failure: risks, consequences, countermeasures

Server failures can be devastating for businesses, especially if central business areas are controlled by IT systems since the longer the server is down, the costlier is it for the company. This can result in loss of sales and in the worst case, the loss of business or customer data. Here we demonstrate the internal and external sources of danger that can lead to server failure, explain the consequences for the business, and provide you with some possible countermeasures. [...]