Encyclopedia

Unicast

Unicast: Targeted connection between two points

Do you want your data to reach just one recipient? Then send a unicast. Whether it is IPv4 or IPv6, unicasts find the right target. Accessing websites, sending e-mails, file transfers all use this form of addressing. But what is technically behind it, and how do unicast and multicast differ?

Outlook read receipts

Outlook read receipts: How do you set one up?

Sending an e-mail is child’s play. As soon as the text has been written and the subject and destination address have been entered, just click on “send” and the electronic message is on its way. However, if the answer is delayed, doubts quickly arise as to whether the mail has arrived and been read. A remedy is to request a read receipt, which you can set up in Outlook in just a few steps.

What is a CDN (Content Delivery Network)?

What is a CDN (content delivery network)?

If your online project is growing and beginning to attract international customers, the workload of your server is also increasing. High user numbers and the large geographical distribution of the clients result in ever-increasing loading times and slow transfer rates. By using a CDN (content delivery network), you’ll be able to react to increasing demands and optimize your data delivery.

Agile software development about

Agile development: what it’s all about

If you have ever dealt with modern working techniques, the term "agile development" is certainly already familiar to you. But most don't understand exactly what’s behind it. This is also due to the fact that agile software development itself does not want to be defined and only acts as an umbrella term. Nevertheless, we’ll explain its ways to you!

Newsletter KPIs: indicators in e-mail marketing

Click rate & opening rate – newsletter KPIs in e-mail marketing

In e-mail marketing, KPIs (Key Performance Indicators) are extremely important for analyzing campaigns. Various indicators can help you to determine the final success rate of your marketing activities. But how exactly can you measure metrics like a newsletter’s conversion rate, opening rate, and click-through rate? And which other KPIs are important?

URL: What is a Uniform Resource Locator?

URL: definition and areas of application

The Uniform Resource Locator (short: URL) is one of the basic standard tools of the internet. URLs make it easy to uniquely identify resources on the internet and find their location. Internet users use webpage URLs to surf the web, follow hyperlinks or download files. The concept is based on a human tangible syntax that is automatically read out and interpreted by machines.

SCTP

SCTP (Stream Control Transmission Protocol) – the reliable, message-oriented transport protocol

If two computer systems are to exchange data, they must agree on a common protocol basis. For example, the selected transport protocol determines how the information is to be transferred. One of the more recent representatives of this protocol division is the Stream Control Transmission Protocol (SCTP), which the IETF (Internet Engineering Task Force) published in 2000 as an alternative to known...

IGMP - Internet Group Management Protocol

IGMP: what is behind the Internet Group Management Protocol

Using multicast connections, data streams can be transferred to a large number of clients easily and in such a way that saves resources – provided that the accessing systems are part of the same multicast group. In IPv4 networks, the organization and management of these groups is based on the Internet Group Management Protocol (IGMP), which was published as early as 1989. What exactly this...

SNMP tutorial

SNMP tutorial: how snmpwalk and snmpget work

The central monitoring and managing of network devices such as routers, switches, or firewalls is often carried out using the Simple Network Management Protocol (SNMP). Both snmpwalk and snmpget tools use SNMP messages, for example, to retrieve data sets of selected network participants. In our SNMP tutorial, we show what these two command line tools can do and how data retrieval works.

Token ring

Token ring – IEEE 802.5

A glance back into history can reveal a lot. Although token ring networks, or ring topologies, are nowhere to be found nowadays, token rings remain an interesting form of technology. Why the model, which is actually quite good, was outdone by its competitor Ethernet is due to the merciless nature of the tech market. Read the history behind token rings, along with a definition of the system that...


Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.


Enter the web address of your choice in the search bar to check its availability.
.club
$1/1st year
then $15/year
.com
$1/1st year
then $15/year
.info
$1.60/1st year
then $20/year
.org
$1/1st year
then $25/year