Joy of Missing Out

JOMO: The mindful countertrend to FOMO

 

JOMO (joy of missing out) is the antithesis of FOMO (fear of missing out). Younger people especially are discovering the joy of missing out for themselves. They’re enjoying the moment, instead of chasing after trendy events and comparing themselves to others on social media. JOMO...

 

Video conferencing

Video conferencing: How to make virtual meetings a success

 

Flexible working models are hard to imagine without video conferencing. Employees from different locations can meet easily for personal exchanges on a digital platform. But which software is recommended for optimal video conferencing? How can you make video conferencing more...

 

Skype alternatives

The best alternatives to Skype: 13 free applications for video calls

 

For millions of people around the world, video chats and conferences are an essential part of daily life – for both work and leisure. When it comes to video telephony software and applications, Skype is one of the pack leaders. In fact, many people are unaware that there’s a...

 

Promote your website

Promoting your website: crash course for beginners

 

There are well over one billion websites worldwide. If you’re a newcomer and want to improve your online presence, you need a well-thought-out strategy and a lot of patience. But solid online marketing efforts can give a website the desired reach. From SEM, to display, to mobile:...

 

The best TeamViewer alternatives

Alternatives to TeamViewer

 

You don’t always have to use the market leader – this also applies to remote access. TeamViewer is still the most widely-used solution for remote management and online meetings, but there are numerous alternatives on the market which can be considered. We present some serious...

 

How to identify phishing e-mails and protect your data

Identifying phishing e-mails: the telltale signs at a glance

 

Scammers send out dubious e-mails attempting to obtain sensitive data from internet users every day. This is known as phishing and isn’t just annoying; fraudulent e-mails cost millions each year as internet users fall victim to them. We reveal how to identify phishing e-mails and...

 

Collaboration tools: a comparison of the best solutions

Collaboration tools: the best apps for better productivity

 

The bigger your business, the more difficult it is to manage all the different teams and projects. It’s especially difficult if not all employees are located in the same place – this is when planning resources and communicating quickly becomes a gigantic task. Collaboration...

 

Digital marketing: tips for small businesses

Traditional offline advertising is gradually losing its significance and luckily alternative “online marketing” is perfectly suitable for lots of smaller companies. Many online marketing measures do not require a large budget and can be easily scaled to your project. If you follow our online marketing tips for small businesses, practically nothing can go wrong!

Outlook: how to change your password for mail accounts, data files, and in the web app

Microsoft Outlook is one of the most popular client solutions for retrieving and managing e-mails. Using the software, multiple e-mail accounts can be easily combined and controlled through one interface. For this purpose, Outlook only needs information about the corresponding mail server and the respective log-in data. If you change these, you only have to adjust them in the client settings. But...

What is a podcast?

Podcasts have become one of the most popular forms of content. They are seen as being a convenient and multi-layered medium perfect for listening to on the go. It’s not only private individuals who use the format as an uncomplicated and effective platform for their ideas and content, for quite some time now podcasts have become a very powerful marketing tool. As well as answering the question of...

Graphic file formats: the most important storage formats for images online

Whether you own an online store, run a corporate website, or write a blog, none of your web projects won’t be successful without photos or graphics. Images create visual stimuli that can enhance the content of your text and appeal to your visitors. However, it is crucial not only to find suitable graphical elements - but also to choose the appropriate graphic file format. The format needs to meet...

Split a screen on Mac – here’s how

The function to split a screen on a Mac desktop or a MacBook provides a convenient way to view and work on two open applications simultaneously. In order to split a screen on Mac, you only need to follow a few simple steps. The opened applications can then be viewed next to one another.

Snackable content – bite-sized web content

Snackable content has become an online marketing buzzword. The term refers to content on the web that can be taken in quickly and easily. Examples of snackable content include posts and tweets, pictures or memes, and short videos. Snackable content is designed to suit the average attention span of web surfers, and is usually sensationalist or emotional, designed to pique a reader’s interest...

SSL stripping: Basics and protection options

Data transmission via SSL/TLS is one of the most effective means to give a web project more security. Even before packets are sent, powerful algorithms ensure the encryption of the information. If third parties capture the data on the transmission path, the true content remains hidden from them. However, it becomes problematic if attackers are active with their tools, even before the encryption...

HPKP: What is behind the public-key pinning extension for HTTP

SSL/TLS certificates play an increasingly important role in the transmission of sensitive data. They guarantee that data packets reach the desired addressee without any detours. Problems only arise when internet users are deliberately redirected by invalid certificates from dubious certification bodies – a scenario that can be prevented using so-called HTTP public key pinning (HPKP).

Deep Learning: When the human brain becomes a model

Deep learning, along with machine learning and artificial intelligence, is one of the main buzzwords in information technology. In discourse, though, the terms often get mixed up. What are the differences? What is the relationship between the methods? We provide you with an overview, show you how deep learning works, and what practical applications are possible.

Reverse engineering software

The process of “reverse engineering” allows you to understand the functionality and structure of software. By reverse engineering software down to the source code, it is not only possible to understand incorrect messages, but also to analyze competing programs. Reverse engineering can therefore be used in many ways. But how exactly is reverse engineering applied in software development?


We’re all in this together. IONOS is
#HereForYou
For your business. When times are tough. When it matters most.
Keep your business going or start one with your own online store.
3 months free
Online Store
Get started in the world of eCommerce free for 3 months.