Joy of Missing Out

JOMO: The mindful countertrend to FOMO

 

JOMO (joy of missing out) is the antithesis of FOMO (fear of missing out). Younger people especially are discovering the joy of missing out for themselves. They’re enjoying the moment, instead of chasing after trendy events and comparing themselves to others on social media. JOMO...

 

Video conferencing

Video conferencing: How to make virtual meetings a success

 

Flexible working models are hard to imagine without video conferencing. Employees from different locations can meet easily for personal exchanges on a digital platform. But which software is recommended for optimal video conferencing? How can you make video conferencing more...

 

Skype alternatives

The best alternatives to Skype: 13 free applications for video calls

 

For millions of people around the world, video chats and conferences are an essential part of daily life – for both work and leisure. When it comes to video telephony software and applications, Skype is one of the pack leaders. In fact, many people are unaware that there’s a...

 

Promote your website

Promoting your website: crash course for beginners

 

There are well over one billion websites worldwide. If you’re a newcomer and want to improve your online presence, you need a well-thought-out strategy and a lot of patience. But solid online marketing efforts can give a website the desired reach. From SEM, to display, to mobile:...

 

The best TeamViewer alternatives

Alternatives to TeamViewer

 

You don’t always have to use the market leader – this also applies to remote access. TeamViewer is still the most widely-used solution for remote management and online meetings, but there are numerous alternatives on the market which can be considered. We present some serious...

 

How to identify phishing e-mails and protect your data

Identifying phishing e-mails: the telltale signs at a glance

 

Scammers send out dubious e-mails attempting to obtain sensitive data from internet users every day. This is known as phishing and isn’t just annoying; fraudulent e-mails cost millions each year as internet users fall victim to them. We reveal how to identify phishing e-mails and...

 

Collaboration tools: a comparison of the best solutions

Collaboration tools: the best apps for better productivity

 

The bigger your business, the more difficult it is to manage all the different teams and projects. It’s especially difficult if not all employees are located in the same place – this is when planning resources and communicating quickly becomes a gigantic task. Collaboration...

 

Graph Neural Network: the next step in deep learning

Artificial intelligence, machine learning, neural networks: In the quest to improve software , computer scientists around the world are always working on new methods. Right now, graph neural networks are a hot topic because of their great potential. In these artificial neural networks, the connections between pieces of information are just as important as the data itself. What are the advantages...

Windows 10: split your screen with your mouse or shortcuts

When you use two or more programs at the same time, the back and forth between them can be tiresome and ineffective. Luckily, there’s a practical solution to this in Windows 10: split screen mode. With split screen, two windows can be presented in one half of the monitor (or four programs for a quarter of the monitor). We’ll show you how to split your screen in Windows 10 using your mouse or...

From Panda to Penguin: the main Google updates at a glance

It took less than two decades for Google to rise to power. The search engine giant determines what can be found online and decides whether web projects are successful or not. If you want to appear at the top of the search results, you have to abide by Google’s guidelines – even those that are regularly changed and continually tweaked through algorithm updates. Here are the main Google updates of...

An overview of the most important Linux commands

Under Linux, all actions that you can carry out with the mouse and window system via the graphical user interface can also be performed using program calls in the terminal – provided you know the appropriate command and how to use it according to the correct syntax. To make working in the terminal easier, we provide you with an overview of basic Linux commands with detailed descriptions and...

Malware on the server: consequences and countermeasures

A website operator is responsible for the security of a web project as well as the content. Neglecting security may lead to hackers easily infiltrating the system through security gaps. If a malware-infected website goes unnoticed, it could cause serious damage. It is therefore important to make sure your site is fully protected.

Spear phishing: targeted attacks on your data

Internet users are constantly the target of cyberattacks. Most attacks are easy to fend off, but a new form of scam has proven to be especially dangerous. Spear phishing messages don’t contain absurd claims or bad spelling. These deceitful messages target specific individuals and look frighteningly real. How do these attacks work?

Creating an online store with WordPress and WooCommerce: This tutorial shows you how

  • CMS

In order to successfully sell products in the age of mobile internet and digital offers, having a well-functioning online store is a necessity. But how can you create your own online store without resorting to expensive help? With WordPress and WooCommerce, you can quickly and easily set up your own web store. We will show you how to do it with this step by step WooCommerce tutorial.

Creating a Joomla! website: Step by step to your own website

If you create your website with Joomla!, you benefit from a well-structured content management system, which already offers many features in the standard installation. However, you first have to master tasks such as hosting or installing the software, and to learn how to use the system. The following Joomla! tutorial supports you in this project.

System calls: What are system calls and why are they necessary?

The core component of operating systems like Windows or Linux, known as the kernel, is crucial to be able to use the underlying hardware effectively. For security reasons, this system core works on a higher layer than application programs can normally access. It is only with so-called system calls that processes from system-external software can temporarily access the kernel mode.


We’re all in this together. IONOS is
#HereForYou
For your business. When times are tough. When it matters most.
Keep your business going or start one with your own online store.
3 months free
Online Store
Get started in the world of eCommerce free for 3 months.