PHP 7.2

PHP 7.2 – end-of-life (EOL) on November 30, 2020

 

PHP 7.2 will not be supported much longer. Now is the time to take advantage of the time left before the end-of-life date and replace outdated versions with more recent PHP code. This will make sure security gaps are closed, bugs are fixed, and the performance of web offers won’t...

 

Zoom fatigue

Zoom fatigue: how to avoid getting tired during video conferences

 

The number of people working from home has increased rapidly since the start of the coronavirus pandemic and so has, of course, the number of online meetings. Video conferencing is an indispensable tool in working remotely, but also comes with drawbacks. Video calls quickly...

 

What is the EU-US Privacy-Shield?

Privacy Shield – controversial data transfer agreement between the EU and the US

 

For some years, the Privacy Shield has regulated the transfer of personal data from the EU to the US. But in July 2020, the Court of Justice for the European Union (CJEU) invalidated the Privacy Shield. For many companies, the end of the privacy agreement came as a complete...

 

What is Instagram Reels?

Instagram Reels: video clips a la TikTok

 

Instagram Reels is Instagram’s new video feature. Much like Chinese app TikTok, Reels lets users create and share short video clips with added background music. But what exactly is Instagram Reels and what are the differences to TikTok? We’ll show you what the new feature can do....

 

PHP 8

PHP 8: What you need to know about the latest update

 

PHP is one of the most important languages on the Internet. Many content management systems like WordPress, TYPO3 or Joomla are based on PHP. The release of PHP 8 is imminent, but we’ve already had some information about its new features. Also some old features will be reworked,...

 

Zoom alternatives

Zoom alternatives: a comparison of the main competitors

 

Alternatives to the popular video conferencing software Zoom are having their moment in the spotlight as a growing number of people are organizing video calls daily. Free alternatives to Zoom include a wide range of features, especially since the market for video conferencing...

 

The best TeamViewer alternatives

Alternatives to TeamViewer

 

You don’t always have to use the market leader – this also applies to remote access. TeamViewer is still the most widely-used solution for remote management and online meetings, but there are numerous alternatives on the market which can be considered. We present some serious...

 

Showing hidden files and folders on a Mac

How do you show hidden files and folders on your Mac? And why are folders and files hidden at all? In this how-to article, we’ll answer these questions and offer additional practical tips. For example, we’ll explain how to use Terminal commands to show files on a Mac and how to access hidden files using a file manager.

How to use the Excel COUNT function

Analyses and calculations in Excel can be highly complex. Excel’s worksheets let you create huge tables, but sometimes you just want to answer a very simple question: How many cells in the table contain a number? In big worksheets, it can be virtually impossible to check the whole thing manually. The COUNT function in Excel was created specifically to solve this problem.

Screencasting: how to do a screencast with screen recording

When it comes to explaining the complex features of computer programs, written instructions only go so far. Screencasts can help you to explain complex processes in a simple and entertaining way, to show what’s happening on your screen. Keep reading to find out how to make a screencast and what you should take into consideration during preparation and editing.

What is a hash function? Definition, usage, and examples

Hash functions are used in many areas of computer science. They generate hash values that represent digital information in a consistent manner according to defined parameters. They provide additional security (using encryption) during data transmission and allow data to be accessed more quickly. We explain what hash functions are, how they are used and provide some examples.

Fuchsia OS – Google’s operating system of the future?

Since 2016, Google developers have been working on a new open source operating system. Unlike Chrome OS and Android, Fuchsia OS is not based on the Linux kernel. Google is trying out a different path. We introduce you to the software project, take a look at the state of development, and dare to make some initial predictions about what Google has in store for Fuchsia OS.

KVM – virtualization in the Linux kernel

Through KVM, the open-source operating system Linux provides a powerful integrated virtualization function. This makes it possible to run one or more operating systems as guest systems on a Linux computer. Being directly integrated into the operating system’s kernel, it ensures high stability and good performance. Since this virtualization solution is available free of charge, it’s worth checking...

Mandatory Access Control (MAC): how does it work?

Data protection is very important, especially when it comes to high-security branches like the government and the military. Users in most organizations only have access to the data they need to do their job, and when it comes to highly sensitive data, it’s important to have a system that’s as tamper-proof as possible. That’s where Mandatory Access Control comes in. Keep reading to find out how...

How to use the IF OR function in Excel

Using a combination of the IF function and the OR function, you can perform specific evaluations in Excel in which you can define multiple conditions in the same function. Therefore, the return value will be “TRUE” if either one of the conditions is met. We will explain when and how to use the IF OR formula in Excel using simple examples.

How does role-based access control (RBAC) work?

Organizations restrict access permissions in systems to protect sensitive data from unauthorized access and modification. However, assigning access permissions to users individually is a high-maintenance and error-prone process. In the case of role-based access control (RBAC), permissions are assigned based on previously assigned roles. Here, we explain how role-based access control works.

Clear Linux OS: the performant Linux distribution for the cloud

From Ubuntu to Debian, there is a wide range of Linux distributions to choose from. In 2015, Intel introduced another alternative which is specially designed for Intel hardware: the cloud operating system Clear Linux. Since then, Clear Linux OS has become a popular choice as a desktop operating system and for use with hardware from other manufacturers. Here, we provide a more detailed introduction...


Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.


Enter the web address of your choice in the search bar to check its availability.
.club
$1/1st year
then $15/year
.com
$1/1st year
then $15/year
.info
$1.60/1st year
then $20/year
.org
$1/1st year
then $25/year