Encyclopedia

SSl certificate

SSL certificates

Security on the internet is always paramount: regardless of whether you run a website yourself or just surf the web, you should always understand the basics of internet security. Here we explain exactly what SSL certificates are and what you need them for. Encryption and authentication are the main purposes of certificates. They are intended to protect internet users’ personal data from criminal...

Graphic file formats: which formats are important?

Graphic file formats: the most important storage formats for images online

Whether you own an online store, run a corporate website, or write a blog, none of your web projects won’t be successful without photos or graphics. Images create visual stimuli that can enhance the content of your text and appeal to your visitors. However, it is crucial not only to find suitable graphical elements - but also to choose the appropriate graphic file format. The format needs to meet...

Token ring

Token ring – IEEE 802.5

A glance back into history can reveal a lot. Although token ring networks, or ring topologies, are nowhere to be found nowadays, token rings remain an interesting form of technology. Why the model, which is actually quite good, was outdone by its competitor Ethernet is due to the merciless nature of the tech market. Read the history behind token rings, along with a definition of the system that...

JHipster

JHipster: the framework suite for modern websites

Framework use has become an integral part of modern web development. Designing back and front ends based on ready-made basic structures saves a lot of time. The website generator JHipster is an interesting solution that uses several tools to create server-and-client-side components. Which components distinguish the suite and how to install and use the software for your own project will be...

SAML

SAML: the XML framework for SSO at a glance

Simplifying log-in processes makes websites more user friendly, and also helps to increase the security of user data. One of the most popular solutions for implementing authentication processes is SAML (security assertion markup language). Through a variety of components such as special protocols and message formats, this XML-based framework helps to implement internal and cross-company log-on...

Clearing the Cache

Clearing the cache: deleting the browser’s cache

Information is often cached so that visited website can be loaded quickly and videos and gifs can be viewed offline. However, if the cache contains a large, or very large amount of data, it can cause problems and adversely affect computer performance. Therefore, it makes sense to delete the cache from time to time.

Scrum

Scrum: modern and flexible agile project management

What exactly is the Scrum framework? If you deal with agile project management, you can’t ignore Scrum. Originally used in software development, Scrum has also found a home in many other industries. Fans of the model rave about greater efficiency and transparency, and praise the framework’s open approach. Are you also considering establishing Scrum teams in your company? We explain the most...

IGMP - Internet Group Management Protocol

IGMP: what is behind the Internet Group Management Protocol

Using multicast connections, data streams can be transferred to a large number of clients easily and in such a way that saves resources – provided that the accessing systems are part of the same multicast group. In IPv4 networks, the organization and management of these groups is based on the Internet Group Management Protocol (IGMP), which was published as early as 1989. What exactly this...

IGMP snooping

IGMP snooping: eavesdropping for multicast traffic

If a system in IP networks is to send data packets to different target hosts as efficiently as possible, an IP multicasting connection is the perfect solution. When it comes to multipoint transmission, the data packets are able to reach all interested parties thanks to various protocols such as GMP, for example. Switches and internet routers can also use the communication protocol for IGMP...

MAC address

MAC address (media access control)

Without a MAC address, nothing in a network will work on your device. Just as your postman needs a valid address to reliably deliver the mail, the transmission of data packets in computer networks is only possible with the unique hardware address of the target device. When it comes to a MAC address, at least there is one address available on each network-compatible device. But what is the MAC...

1