Collaboration tools: a comparison of the best solutions

Collaboration tools: the best apps for better productivity

 

The bigger your business, the more difficult it is to manage all the different teams and projects. It’s especially difficult if not all employees are located in the same place – this is when planning resources and communicating quickly becomes a gigantic task. Collaboration...

 

Joy of Missing Out

JOMO: The mindful countertrend to FOMO

 

JOMO (joy of missing out) is the antithesis of FOMO (fear of missing out). Younger people especially are discovering the joy of missing out for themselves. They’re enjoying the moment, instead of chasing after trendy events and comparing themselves to others on social media. JOMO...

 

Video conferencing

Video conferencing: How to make virtual meetings a success

 

Flexible working models are hard to imagine without video conferencing. Employees from different locations can meet easily for personal exchanges on a digital platform. But which software is recommended for optimal video conferencing? How can you make video conferencing more...

 

Skype alternatives

The best alternatives to Skype: 13 free applications for video calls

 

For millions of people around the world, video chats and conferences are an essential part of daily life – for both work and leisure. When it comes to video telephony software and applications, Skype is by far the leader of the pack. In fact, many people are unaware that there’s...

 

Promote your website

Promoting your website: crash course for beginners

 

There are well over one billion websites worldwide. If you’re a newcomer and want to improve your online presence, you need a well-thought-out strategy and a lot of patience. But solid online marketing efforts can give a website the desired reach. From SEM, to display, to mobile:...

 

The best TeamViewer alternatives

Alternatives to TeamViewer

 

You don’t always have to use the market leader – this also applies to remote access. TeamViewer is still the most widely-used solution for remote management and online meetings, but there are numerous alternatives on the market which can be considered. We present some serious...

 

How to identify phishing e-mails and protect your data

Identifying phishing e-mails: the telltale signs at a glance

 

Scammers send out dubious e-mails attempting to obtain sensitive data from internet users every day. This is known as phishing and isn’t just annoying; fraudulent e-mails cost millions each year as internet users fall victim to them. We reveal how to identify phishing e-mails and...

 

Image SEO: improve your Google ranking with image optimisation

There’s no doubt that having engaging images on your website is of central importance. Photographs and graphics can be much more than just decorative; they can inspire visitors to read more content and possibly lead to conversions. Many webmasters neglect to take appropriate measures here. In adjusting the standard SEO of the website, all too often, little or no attention is paid to the search...

Growth hacking: how to grow your company with smart and affordable ideas

In order to get new products or services onto the market, it’s more important than ever before to carve out new, more creative paths to achieve this goal. While search engine optimisation and social media marketing have since established themselves as indispensable components of any marketing mix, growth hacking is, for the most part, still in its infancy. This latter term refers to the principle...

Domain allocation: how are Neustar and ICANN involved?

It’s now easier than ever to register your own web address. Customers just need to apply to a web-hosting provider with their desired domain, and the rights to the address could be theirs in next to no time. But what processes are going on in the background? The application goes from pillar to post, beginning with the registrar, then sent on to a central registry for the chosen top-level domain,...

Multivariate testing: the complex process for optimising the conversion rate

Conversions are highly contested, whether it’s regarding newsletter registrations, transactions, or how many clicks an advertisement receives. It is therefore important to critique your project daily and search for alternative ways to get visitors to carry out the desired action. Multivariate testing is one of the most complex ways to determine user behavior and it promises success when it comes...

Protecting your email address: how to prevent spam

Spam robots, so-called harvesters, consistently search the internet for e-mail addresses that can be used for unlawful advertising, phishing e-mails, and spreading viruses, worms, and Trojans. You’re recommended to have your contact details on your website, but how do you stop them from being misused? This article gives you advice on how to protect your e-mail address.

ZURB Foundation: The CSS framework for responsive frontends

If you don’t have a ready-made template or a homepage kit for the development of a front-end, but also don’t want to completely start from square one, then you should think about using a CSS framework such as ZURB Foundation. The open source solution offers a flexible grid system, numerous other pre-made code snippets, and everything you need to implement a responsive web presence.

E-Mail marketing basics: the double opt in process

An inbox full of spam is enough to grind anyone’s gears. Too many marketers try to worm their way into the inboxes of potential customers without seeking permission. The double opt in process is used in the UK to try to combat spam. To ensure you don’t drive any customers away or ruin your company’s reputation by sending undesired newsletters, you should look into the double opt in process.

Domain change: how to set up your new web address

If you own a website, you should know that it needs to be continually maintained and adjusted. But in addition to normal tasks such as administration, maintaining content, and web design, sometimes radical, fundamental changes need to be made. These are especially necessary if you decide to rename your website, a process which is known as a domain change. But how exactly does a website operator go...

Hardware firewall – the external security system

Most computer users are at least aware of the term firewall. When activated, they help protect computers. But notifications about blocked applications can become a source of irritation for many users, especially when the background information for such messages is unknown. But how do firewalls work? And what role do hardware firewalls play in protecting your computer?


We’re all in this together. At IONOS we are
#hereforyou
Coronavirus is a challenge we need to face together.
We've created special offers on key products to help
your business keep going.
3 months free
Online Shop
Be where your customers are with your own online store.