What is Docker?
Docker (The container technology)
  • Know-how

The Docker virtualization solution has transformed application development. In some cases, standardized containers are used to create gigantic clusters of loosely coupled microservices. They run as distributed swarms across system and infrastructure boundaries. Special tools and workflows are used to deal with the resulting complexity.

Docker (The container technology)
What is DBaaS
DBaaS (Database as a Service)
  • Know-how

Relational database systems such as MySQL no longer necessarily have to be hosted in-house. With Database as a Service – or DBaaS for short – one or more databases are outsourced to the cloud, saving costs and capacity. Here we explain how DBaaS works, what it’s suitable for, and what advantages and disadvantages it has.

DBaaS (Database as a Service)
What is Cloud Storage?
Cloud Storage
  • Know-how

Portable storage media such as CDs or USB sticks are still in demand when making backups or transferring files to another device. More and more often however, users also rely on cloud storage solutions that allow data to be outsourced to an external server environment. But what exactly is cloud storage? And how does this storage model offered by various providers work?

Cloud Storage
What is Ceph?
Ceph
  • Know-how

Ceph is a storage solution that enables the shared filing of data in a network, which ensures the redundancy, scalability, and maximum performance of the existing infrastructure. The system was released with a GNU General Public License and can be used free of charge.

Ceph
What is CAP theorem?
CAP Theorem
  • Know-how

The CAP theorem states that distributed systems can only guarantee two out of the following three points at the same time: consistency, availability, and partition tolerance. In this article, we will explain where the CAP theorem originated and how it is defined. We will then provide some concrete examples which prove the validity of Brewer’s theorem, as it is also called.

CAP Theorem
What is block storage?
Block Storage explained
  • Know-how

Save your file and voilà! When deciding on a storage method, many users concentrate on the amount of space provided and don’t take anything else into account. However, there are a vast array of storage options, each with their own qualities. Let’s look at block storage. How does block storage work and what are its advantages?

Block Storage explained
What is BIOS
What is BIOS? The Basic Input/Output System
  • Know-how

BIOS has been around for almost as long as PCs themselves. If you frequently struggle with computer issues, you may have heard of the term, but few users know exactly what it is. Yet, the BIOS is fundamental to the operability of every PC. In this article, we discuss what’s behind the acronym, which functions the BIOS performs, and what its successors look like.

What is BIOS? The Basic Input/Output System
What is a VPS (virtual private server)?
What is a VPS (Virtual Private Server)?
  • Know-how

A virtual private server (VPS) is a compromise between shared hosting and a dedicated server. The VPS product allows web hosts to combine the strengths of both hosting models in one, cost-efficient IaaS solution. We’ll take a closer look at this hosting solution, demonstrating how a virtual private server works, exploring the advantages and disadvantages of it, and deciding who the model is best...

What is a VPS (Virtual Private Server)?
What is a VPN (virtual private network)?
VPN (Virtual Private Network)
  • Know-how

VPN implementations offer an affordable alternative for locally connecting networks, as well as making network resources available for external devices. In contrast to corporate networks, no private communication network is required. Instead, like the internet, VPNs rely on networks, and protect sensitive data through a process known as tunneling.

VPN (Virtual Private Network)
What is an IP address?
IP Address
  • Know-how

Without IP addresses, online communication wouldn’t work. After all, routers – the “post offices” of the internet – need a specific instruction on where to send a data packet. But the topic also has its drawbacks: what else are IP addresses used for, besides websites and emails? Employed as a tool by trackers and hackers, they’re increasingly attracting the attention of data protection advocates.

IP Address