Category: IT Glossary

Blade Server: Rationalize computers

Blade servers are based on the idea of operating several computers on a single power supply, on a single shared storage medium and with a single ventilation system. This saves space, energy and simplifies the system architecture.

 

The boards with the microprocessors and RAM are pushed into the server side by side like 'blades'. Today, the standard rack accommodates more than 80 such blades, i.e. far more than 5,000 processors. The main advantages are the compact design, high power density, scalability, simple cabling and quick and easy maintenance.

 

However, the energy design and ventilation of this 'high-density computing power' requires a great deal of technical expertise, which is why small and medium-sized enterprises (SMEs) in particular are increasingly outsourcing such tasks to external companies.

Customize data protection: The Binding Corporate Rules (BCR)

In 1995, the EU adopted Directive 95/46/EC. Since then, it has regulated the protection of natural persons with regard to the processing of personal data. For each data transfer to 'unsafe third countries' (e.g. USA or India), individual contracts had to be concluded at first, which proved to be a cost-intensive obstacle, especially for large companies. The first companies then developed corporate guidelines that sought to standardize the process.
In June 2003, the term 'Binding Corporate Rules' appeared for the first time in the EU Data Protection Group. The idea was to create a flexible instrument for data transfer that would also meet the requirements of the Data Protection Act. The result was a procedure that allows companies to individually structure data protection when transferring data to third countries, provided that the 'Binding Corporate Rules' applied meet certain minimum standards. These include, among others:

- Development and implementation of a security concept
- Data protection training for employees
- Mandatory participation in an audit program
- Payment of compensation in the event of breaches
- Regulated complaints procedure
- Assurance of transparency
- Definition of the scope of application

The advantage of introducing 'corporate binding rules' is the possibility of individually structuring the transfer of data to 'unsafe third countries'. The main disadvantage is the high organizational effort and the lengthy review process. A BCR process can take around two years to implement. This is currently only worthwhile for large companies.

No job like any other: Order processing (AV)

Article 28 of the GDPR, Section 26 of the Federal Data Protection Act (2018) and Section 80 of the Tenth Book of the Social Security Act regulate 'data processing by order' or 'order processing (AV)' in Germany. They govern the 'outsourcing' of data processing contracts to external third parties.

The order processing replaces the 'order data processing (ADV)' from the "old" Federal Data Protection Act. The new regulation leaves many of the previously applicable requirements for the controller unchanged.

Since the GDPR, the legal framework for a DP is generally provided by a data processing agreement in accordance with Art. 28 para. 3 GDPR. This defines, among other things, the subject matter, purpose, type and duration of the processing as well as the type of personal data, the categories of data subjects and the rights and obligations of the controller and the processor.

Depending on the type of data collected, the controller must ensure that the processor is certified for the task and that it implements a security concept that ensures that the data processing complies with the legal requirements through appropriate technical and organizational measures. This is usually done by means of written information. Only then may the controller transmit personal data.

Under liability law, it is usually not the service provider who is responsible for breaches, but the controller. The processor, on the other hand, is liable if it has not fulfilled its obligations as a processor. This is the case if the processor has not followed the instructions of the controller or has even acted against the instructions.

No job like any other: Order data processing (ADV)

In Germany, Section 11 of the Federal Data Protection Act and Section 80 of the Tenth Book of the Social Security Act regulate 'commissioned data processing' or 'commissioned data processing (ADV)'. They determine the 'outsourcing' of data processing orders to external third parties.

Since 2009, the Federal Data Protection Act has provided the legal framework for data processing with a ten-point rule that covers issues such as deletion, the obligation to report and monitoring rights.

Depending on the type of data collected, the client must ensure that the contractor is certified for the task and that it implements a security concept. This is usually done by providing written information. Only then may the client transmit personal data. Under liability law, it is usually not the service provider who is responsible for breaches, but still the client.

AdWords: Google's business model

Google introduced its AdWord system in 2000. AdWord is an artificial word made up of 'advertising' and 'keywords'. Google's customers pay for their advertising to appear to the side of the results form in the form of snippets with a link - whenever the user of the search system calls up a specific keyword.

Until 2008, the AdWords system was billed as Cost-Per-Click (see CPC); since then, a complex model has emerged that also takes into account loading times, the quality of the ad and the type of device used (mobile, PC), among other things. In the blog 'Inside AdWords' (also in German since 2008), Google provides continuous information about changes on its most important advertising platform worldwide.

Pay attention to the pointed clip

Fake sender IDs in email correspondence have become a plague - mainly because they are so easy to forge. In principle, any layman can create a new 'war name', a 'pseudo', in the browser. The astonished users then often even receive an email from themselves that they never wrote.

The method of fake sender identification is mainly used by senders of spam emails. If you open such an e-mail - especially the attached files - the mishap happens in no time at all. In the end, your own computer even becomes part of a network of spam mail slingers because you blindly trusted a fake sender ID.

The first and simple remedy is to check the sender line, which usually contains the sender's name in plain text - followed by the e-mail address in angle brackets:

Amazon.de versandbestaetigung@amazon.de

Identifier E-mail address

As mentioned above, anyone can easily manipulate the identifier in their browser. It is therefore particularly important to check the email address in the angle brackets before opening each inbox. This is because no spam mail sender can so easily install an email server whose domain name is 'amazon.de', for example.

Therefore, when checking your mails, always pay attention to the angle bracket in your mail client!