Skip to main content

Hard bounce

What does Hard Bounce mean? The term Hard Bounce is used to describe an e-mail that cannot be delivered. The sender usually receives an error message. Newsletters are particularly affected by this problem if they do not maintain and update the e-mail addresses of their target audience correctly. However,...

Hardware Security Modules

What is a Hardware Security Module? Hardware Security Module means Hardware Security Mode and is also known under the abbreviation HSM. It is a so-called peripheral device that is used in the environment of a computer, for example to secure its data exchange. The HMS can be used in...

Hash function

What is a hash function? A hash function is a mapping that shreds a larger input quantity into smaller target quantities, which in turn reference the original input quantity. By means of hashing, the individual elements from the input set are first assigned to a key and then to...

Hash value

Data security and the speed with which data is processed are central aspects of IT. Hash values play an important role in both data security and processing speed. What is a hash value? A hash value, or hash for short, is a unique alphanumeric value with a fixed length...

Hashtag

What is a hashtag? The term hashtag is used to describe a composite of a word/word combination with a preceding hash. By using hashtags, postings on social networks such as Twitter can be listed or searched for specific terms. The thing that makes hashtags so popular on the World...

Header Bidding

What is Header Bidding? Header bidding is a code snippet that is built into the non-visible part of a web presence. When the page is called, this code is executed. This happens while the web page is being built and before the ad tags are executed. Header bidding has...

High Availability

What does high availability mean? According to the official definition of the Institute of Electrical and Electronics Engineers (IEEE), high availability means that access to IT resources is maintained even if individual system components fail. For this purpose, data is continuously copied to a backup server and can be...

Honeypot

A honeypot is designed to entice hackers and malware to attack a fake target and thus provide information about the attackers and their methods. The sweet honey pot can distract the eye from the actual targets. The seductive lure attracts a target group (honeypot as a tourist destination) or...

HootSuite

What is HootSuite? A platform for managing and administering various social media accounts, such as Facebook, Instagram and Twitter. The tool aims to make it easier for users to implement social media marketing strategies across multiple platforms simultaneously. What are the advantages of the tool? The management tool allows...

Hosts file

Description A hosts file is a computer file (operating system file) that assigns host names to IP addresses. It is a pure text file. Originally, a file called hosts.txt was maintained manually and provided by the Stanford Research Institute for Arpanet membership via file sharing. It contained the hostnames...

Hot linking

What is hot linking? Hot linking (also known as inline linking, piggy-backing, leching) is the use of a linked object, often an image, on one page by a web page belonging to a second page. One page should have a hot linking to the other page where the object...

HSTS (HTTP Strict Transport Security)

What does HSTS (HTTP Strict Transport Security) mean? It is still common practice on the Internet to use encrypted and unencrypted connections via the Hypertext Transport Protocol (HTTP). HSTS can force the use of the encrypted connection. However, it also provides other security mechanisms. What HTTP Strict Transport Security...

Htaccess

What does htaccess mean? htaccess or an htaccess file is a configuration file for web servers, such as the Apache web server. With this file you can influence the configuration of the web server without necessarily having direct access to the main configuration file of the server. Since the...

Human Computer Interaction (HCI)

What is Human Computer Interaction (HCI)? In recent years, the interaction between computers and humans has developed into a central area of computer science. This Human-Computer Interaction (HCI) explores the use and design of computer technologies, targeting the interface between humans and computers. “The meaningful, human-centered design of the...

Human Solution Design

The term Human Solutions Design refers to a design and management framework that places people at the center of product development. It is therefore sometimes also referred to as Human Centered Design. It is about getting to know the user, customer, guest, client, etc. and understanding their needs. This...

Hybrid app

There are basically three different approaches to the development of modern apps, namely native app development hybrid app development Development of Web Apps A hybrid app is a combination of the other two types. Hybrid Apps at a glance In order to understand what a hybrid app actually is,...