Fog computing: decentralised approach for IoT clouds

Traditionally, cloud solutions are designed for central data processing. IoT devices generate data, send it to a central computing platform in the cloud, and await a response. However, with large-scale cloud architectures, such a system inevitably leads to bandwidth problems. For future projects such as connected cities and smart manufacturing, classic cloud computing is a hindrance to growth. The...

An introduction to virtual machines

Virtual machines are extremely practical and versatile: Do you want to set up an isolated test environment, run a Linux application on your Windows computer, or provide different operating systems for cross-platform software tests? With the right virtualization software and an appropriate image file, this is easy. We will introduce you to the basics of hypervisor-supported hardware virtualization...

Golang: the simple programming language from Google

Google is best known for its search engine, but also for services like AdWords, Maps, or Gmail. Since 2012, the mega-corporation has had its own programming language in its product range: Go. Also known under the name Golang, it has drawn attention to itself through its simplicity. But how does it differ from established representatives like C++ or JavaScript? And when does it make sense to...

Screenshots for Mac – here’s how it’s done

Screenshots can be extremely helpful and beneficial. Regardless of whether you are sending them to friends or using them professionally, it is always going to be easier to demonstrate it this way than having to describe it. Making iMac or MacBook screenshots is very easy – as long as you know how it all works. Here we show you all the keyboard shortcuts for making screenshots on a Mac, as well as...

Create a screenshot on Windows: How it works

With screenshots, you can show your colleagues and friends with just a few clicks what you’ve just seen on your screen. This can be an important part of your daily workload as well as something you use in your free time. But how do you actually create a screenshot? On Windows, the necessary resources are already built in. We explain to you how to use them correctly.

What is the hosts file and how do you edit it?

The hosts file used to resolve website names so that certain IP addresses could be accessed. The method was largely replaced by the DNS (domain name system). However, the hosts file is still indispensable for local networks. In addition, certain rules can be set for websites e.g. to block them. We show you where you can find and edit the hosts file in your operating system.

SAN storage: how to safely store large volumes of data

Due to rising worldwide data usage, more and more companies around the world are moving away from dedicated data servers and instead opting for more holistic solutions in the form of centrally stored data networks. This structure is carried out in the form of storage area networks, or SANs. SAN storage users profit from quick data access and comprehensive hardware redundancy.

Raspberry Pi: activating and using SSH access

Raspberry Pi has established itself as a reliable basis for servers of various types. Access – for configuration and maintenance purposes – rarely takes place on the mini computer itself, but mostly on a desktop computer in the same network. The communication protocol is the secure SSH (secure shell), which isn’t enabled by default and hasn’t been for some time. How to activate the Raspberry Pi...

Create a ZIP File: compress your files

Send multiple images and videos via email, archive large amounts of data without using too much space, or encrypt confidential documents - you can do all of this by zipping files. We show you how to create a compressed ZIP file in Windows as well as macOS in our step-by-step guide. We also show you how to protect your files with a password if needed. This way, you can manage your storage space...

Network time protocol (NTP): definition and functionality

Computer systems and applications use time stamps for communication purposes. Synchronous system times are highly important for these so-called temporal signatures to be of any use – especially for systems that exchange information via the internet. A protocol that has provided valuable assistance for decades is the network time protocol (NTP) – here is an introduction to NTP, as well as some...

Server

1&1 IONOS Server Guide: professional tips on configuration and administration

Servers are what make up the physical basis of the internet. Setting up your own professional site, putting products online for sale, or connecting multiple company locations with one another: all of these tasks require the support of high-performance computers. And it doesn’t matter if you purchase hardware resources for your own data center or opt for the flexibility of cloud services: operating a server comes with the challenge of independently configuring and administering hardware components. But don’t worry, there’s a lot of support out there for these tasks. In the Server Guide of 1&1 IONOS’s Digital Guide series, you’ll find regular articles, news, and tutorials on how to operate this indispensable component of today’s IT infrastructure.

Server information for businesses, developers, and tech hobbyists

Packed with practical tips, our guide covers a wide spectrum of topics primarily aimed at mid-sized companies, freelance developers, and tech hobbyists. While some articles, like ‘What is a server?’ or ‘DNS – name resolution online’ cater more to beginners, experts are by no means left hanging; there’s a wide range of detailed texts and tutorials on important tasks like choosing the best operating system, filling security gaps, or getting the best possible performance out of your software and hardware.

What you can expect in the 1&1 IONOS Server Guide

If you take a look, you’ll notice our guide is divided into four different subcategories, each covering a different topic. The ‘KnowHow’ area sets out to familiarise beginners with the basics of operating a server. Details on different server types and how to use them are also laid out here. Tips and tricks on managing server software is found under the keyword, ‘Configuration’. The category, ‘Security’ is all about dealing with potential problems server operators may encounter from online threats. Conventional methods of attack, like viruses, worms, and Trojans, and what you can do to combat them are explained here. And the category, ‘Tools’, provides useful guidance on what resources can help make administering your server a more manageable task.