What is LDAP and how does it differ from Active Directory? The LDAP Protocol is a lightweight variant of the DAP (Directory Access Protocol). With LDAP, directories can be searched in large quantities for data, information, devices, and resources. The basic idea behind LDAP is to quickly browse or make changes to a server-wide distributed directory tree.LDAP (Lightweight Directory Access Protocol)
High Performance Computing is also known as supercomputing and refers to powerful computing. HPC solutions use specific technologies to handle computationally intensive tasks and process large amounts of data. For this, parallel computing processes and aggregated systems are used. Find out more about HPC and which processes are available here.High Performance Computing (HPC)
More is more – this also applies to grid computing. This technology refers to a network of loosely connected computers that act as a virtual supercomputer. Grid computing networks provide more computing power and resources thanks to an interconnected computer cluster. Find out how grid computing works and how it differs from cloud computing.What is grid computing?
Traditionally, cloud solutions are designed for central data processing. IoT devices generate data, send it to a central computing platform in the cloud, and await a response. However, with large-scale cloud architectures, such a system inevitably leads to bandwidth problems. For future projects such as connected cities and smart manufacturing, classic cloud computing is a hindrance to growth. The...Fog computing
Autonomous cars, intelligent factories and self-regulating supply networks – a dream world for large-scale data-driven projects that will make our lives easier. However, what the cloud model is and how it works is not enough to make these dreams a reality. The challenge of effectively capturing, evaluating and storing mass data requires new data processing concepts. With edge computing, IT...Edge Computing
Memory is one of the most important components of a computer system and is particularly important for processing large amounts of data. In addition to increasing the storage capacity, it is also necessary to guarantee the security of the data. Bit errors, for example, are one of the key foes that ECC RAM is battling against to protect the main memory. To date these error-correcting memory modules...ECC RAM
Without the Domain Name System, users of the World Wide Web would have serious problems when trying to load websites and other online presences. It’s only thanks to this system that internet addresses appear in their trusted text format: they’re actually nothing more than combinations of numbers. The communication between browser and name server responsible for this isn’t actually as secure as you...DNSSEC
For businesses, a reliable IT infrastructure is just as integral to day-to-day operations as competent management, productive employees, and reasonable working conditions. A server outage is able to paralyze an entire company. Adequate preparation can help prevent some of the most common errors from occurring; unforeseen risks, however, will always remain a factor. In order to be on top of your...The IT disaster recovery plan
The IP addresses of all participants in a network are not always known. If you still want to send information to all devices, you can use the broadcast method to do so. The recipients of a broadcast are free to decide how to use the transmitted data. What exactly is behind a broadcast and how does this technology work?What is a Broadcast?
If you want to connect a computer, smartphone, etc. to a network (LAN or WiFi), you can either assign the IP address manually or get it automatically. The latter is possible thanks to the DHCP (dynamic host configuration protocol) communication protocol, which has established itself as the cross-platform standard solution for address management. The forerunner was the BOOTP bootstrap protocol that...The Bootstrap Protocol (BOOTP)