Ethical hacking

Ethical hacking – addressing security breaches and preventing cybercrime

 

Ethical hacking has been booming worldwide for several years. A growing number of companies voluntarily choose to be hacked and commission skilled IT professionals to target them by attacking their own infrastructure. Real stress tests under real conditions are intended to reveal...

 

PHP 7.2

PHP 7.2 – end-of-life (EOL) on November 30, 2020

 

PHP 7.2 will not be supported much longer. Now is the time to take advantage of the time left before the end-of-life date and replace outdated versions with more recent PHP code. This will make sure security gaps are closed, bugs are fixed, and the performance of web offers won’t...

 

Zoom fatigue

Zoom fatigue: how to avoid getting tired during video conferences

 

The number of people working from home has increased rapidly since the start of the coronavirus pandemic and so has, of course, the number of online meetings. Video conferencing is an indispensable tool in working remotely, but also comes with drawbacks. Video calls quickly...

 

What is the EU-US Privacy-Shield?

Privacy Shield – controversial data transfer agreement between the EU and the US

 

For some years, the Privacy Shield has regulated the transfer of personal data from the EU to the US. But in July 2020, the Court of Justice for the European Union (CJEU) invalidated the Privacy Shield. For many companies, the end of the privacy agreement came as a complete...

 

What is Instagram Reels?

Instagram Reels: video clips a la TikTok

 

Instagram Reels is Instagram’s new video feature. Much like Chinese app TikTok, Reels lets users create and share short video clips with added background music. But what exactly is Instagram Reels and what are the differences to TikTok? We’ll show you what the new feature can do....

 

PHP 8

PHP 8: What you need to know about the latest update

 

PHP is one of the most important languages on the Internet. Many content management systems like WordPress, TYPO3 or Joomla are based on PHP. The release of PHP 8 is imminent, but we’ve already had some information about its new features. Also some old features will be reworked,...

 

The best TeamViewer alternatives

Alternatives to TeamViewer

 

You don’t always have to use the market leader – this also applies to remote access. TeamViewer is still the most widely-used solution for remote management and online meetings, but there are numerous alternatives on the market which can be considered. We present some serious...

 

Instagram for businesses, part 2: strategy and planning

Finding success on Instagram — if unknown members of the public can expand their follower base and become famous influencers in just a couple of months, it seems like it should be easy for a business to do the same. But there’s more to creating a successful Instagram account than just posting pretty pictures. To gain many long-term followers and lots of interactions it takes hard work and...

What is a network? Definition, explanation, and examples

What is a network? Simply put, one of the most fundamental achievements in IT. Nowadays, most of us can no longer imagine a world without Wi-Fi, cell phones or the Internet. But how exactly do these computer networks work? And what does setting up a network involve? In this article, we’ll explain the most important principles of networks.

JSON Web Token (JWT): an introduction

JSON Web Tokens (JWT) are an open standard for flexible user authentication. Data is securely transferred between two parties and can be verified. Digital signatures ensure the credibility of the data. Keep reading to find out what exactly a JWT is and how it works with JWT examples.

What is sentiment analysis?

Sentiment analysis is a process that involves automatic opinion detection. The method analyzes text to find out what people think about a certain product or brand. Using the insights gained from sentiment analysis, marketing campaigns can be steered more systematically. Sentiment analysis also uses text mining tools to analyze product reviews and comments on social media.

Dark Patterns in UX design – deception and deceit!

Dark Patterns are all over the internet – on shopping sites, email platforms, download portals, search engines, social networks, and so on. But their goal is always the same: to coerce visitors into buying a particular product or click on a link. If you want to find out more about Dark Patterns and how they manipulate the user experience (UX), continue reading.

Git basics: first steps with the version control system

Born out of need, Git – developed by the Linux team – has quickly become the dominant version control system for many programmers. That’s because large developer platforms like GitHub or BitBucket are based on the open-source software. Read our complete Git tutorial for beginners and learn the key basics of Git.

User Generated Content

Texts, images and videos are all online content, and this content is often used by brands and companies for marketing purposes when created by independent consumers. User generated content is an inexpensive and effective way to increase awareness and customer loyalty. In the following article you will learn all about consumer generated content and what advantages this content format has.

Image file formats: An overview of 10 image file types

JPG, PNG, TIFF, and more: there are many image file formats out there. Most users don’t know the exact differences and fall back on a standard image file type. It’s worth looking into the differences, so that you can make sure you’re presenting your pictures in their best possible quality. We’ll explain which image file formats exist and dig into their advantages and disadvantages.

What is SIEM (Security Information and Event Management)?

Security gaps in IT infrastructure can risk a company’s reputation or even threaten its survival. Where criminals manage to shut down company networks or gain access to sensitive data, financial and image-related damage becomes a certainty. SIEM (Security Information and Event Management) allows businesses to detect danger in real-time, allowing for appropriate and timely reactions.


Wrap up 2020 with online success
We’re dropping our prices on some of our best products to help you
get your business ready for the holiday season.
Save up to 75 %