Category: Theory


What is Big Data?

As IT and personal computing took over a mostly analogical world the amount of data generated by the impact is quickly growing to a size no one would’ve been able to predict. But when data is...


What is Data Science?

Data science is probably going to be one of the hottest IT trends in the current decade, but what exactly is Data Science? How does it relate to Machine Learning? And how does Big Data fit...


BIOS and UEFI explained, all you need to know about

BIOS and UEFI are two of a kind, but completely different from each other. They serve one major purpose: booting the machine and they do it in different ways and with different options. Without them, all...

Git 0

Git: learn how to manage your code

If you are a developer, chances are that sooner or later you will start working with lots of files, and if you distribute your code, chances are you will start working with lots of people too....

RAM module 0

Swap partitions: what are they? Do I need them?

One of the most asked question by Linux beginners is: “What is this swap partition?” usually followed by “Do I need it?”. In this article I try to explain what these partitions are and if you...

Ethernet switch with cables 0

Ethernet Cables: The complete guide

Ethernet cables are everywhere. From your home network to large enterprises to places where you wouldn’t expect them. Learning cable types and cabling is often regarded as less important than learning networks, but as a matter...

Containers in the wild 0

Containers: What are they and why do you need them?

Virtual machines revolutionised pretty much the industry at the time of their inception. Today another huge revolution is happening in the IT: containers. Many are speaking of it, but as any buzz-word, it can be difficult...

server OpenStack 0

What is a Virtual Machine?

One of the biggest revolutions in the IT industry was Virtual Machines. The capability of using a machine to host different operating systems (and consequently parallelize workloads) opened a whole new world. But what is a...

linux permissions security text hash crypt encryption decryption cryptography 0

Encryption and Hashing differences and use cases

One of the most common misunderstanding among beginners (and sometimes even IT professionals) is the difference between encryption and Hashing. Let’s take this as a good chance to make things clear.

Secured By miniOrange