TikTok marketing

TikTok marketing: strategies for companies

 

What exactly is TikTok marketing and how is it implemented by businesses? The video-based social network TikTok has captured the world’s attention with its entertaining, user-generated clips, making it an attractive platform for targeted marketing campaigns. Keep reading to find...

 

How do you buy a domain name?

How do you buy a domain name? A guide

 

A suitable Internet address is the be-all and end-all when it comes to being found online. Thanks to new, modern top-level domains such as .beauty or .blog, the possibilities for finding a suitable name for your own web project have increased considerably in recent years. How do...

 

How to set up a Zoom meeting

How to set up a Zoom meeting: creating your own Zoom meeting

 

Virtual meetings with the video conferencing tool Zoom are an excellent option when it comes to staying in touch with others despite working from home or separate company locations. Private conversations using your camera and microphone can also be quickly set up using the...

 

Click and Collect

What is Click & Collect and how do you get started with it?

 

Ordering food or goods online has become a habit for many. The advantages are obvious: products are rarely out of stock and delivered right to one’s doorstep, making this a very convenient way to shop. However, Click & Collect provides an alternative to traditional home delivery,...

 

Most popular domain extensions

Would you have guessed? These are the most popular domain extensions in 2021!

 

The most popular domain extensions (also called ‘top-level domains’ or ‘TLDs’ for short) have been available on the Internet for over thirty years. Millions of websites have opted for these endings. Country-specific domain extensions are up high in the top 10 list – is the .us...

 

Restaurants selling on Facebook and Instagram

Cafes and restaurants on Instagram and Facebook

 

Social media profiles are worthwhile for companies in various ways. In addition to the extra marketing, Instagram and Facebook can be used to sell products directly. Restaurants and cafes can also take advantage of this. Convenient buttons on the platforms point customers to...

 

How to recognize and remove malware

Malware removal: how to recognise, remove, and prevent malware

 

Practically every PC user fears Trojan horses and computer viruses. Security is paramount if you are managing sensitive data or setting up a server. You need a comprehensive security concept to protect yourself against insidious malware. It’s helpful to know the different types...

 

Canonical tag: what’s behind the canonical URL?

When certain website content is used multiple times, it’s not always due to inattentiveness, but could be intentional: international websites or online shops, for example, display lots of similar content. To ensure that search engines don’t classify this as duplicate content, there are certain methods, such as the canonical tag, which enable you to link to the original content.

Predictive analytics – definition and examples

What is predictive analytics? The subsection of big data analysis has similarities to data mining. But what exactly is the difference and how does predictive analysis actually work? We provide the answers on this method of data analysis, show you what it is used for, and what tools there are for using the technique of predictive analytics.

NAT: Network Address Translation in the router

NAT, the network address translation, is closely tied to the internet standard IPv4 and will disappear from the internet along with it. But the implementation of IPv6 is slow to take over, and many internet users worldwide still surf with the fourth version of the internet protocol. As a result, network address translation via NAT tables remains current. In our guide, we answer the questions: What...

SVG format: how to embed graphic files into your website

Increasing the size of a raster graphic beyond its actual resolution comes with a loss of quality, which can lead to serious problems in your responsive web design, including increased loading times and a lower ranking in search engine results pages. Optimizing GIF, PNG, and JPG images to display properly across different devices can rapidly turn into a mammoth task. Because of this, vector...

Node.js: the JavaScript runtime environment at a glance

With the software platform, Node.js, you can use JavaScript server-side and benefit from the asynchronous, event-based programming and the range of options for developing server applications. In this Node.js tutorial, we give you an overview of the program’s modular structure, explain how you can install program modules at any time using the integrated package manager, NPM, and use them to set up...

Log analysis: What the web server log reveals about your visitors

How many pages are accessed by a single user when they’re visiting your website? And which links or search queries did they use to lead them to you? To answer such questions, well-known web analysis tools like Google Analytics seem to be the only option. But the web server’s automatically generated log file also provides a solid foundation for user information. The following guide discusses the...

Newsletter subject line: how to make customers curious

E-mail advertising is the ideal supplement to online marketing methods such as SEO or SEA. With the correct newsletter subject line, you can attract the reader’s attention – but it is crucial to choose the right content and text. Here are a few important basic rules for increasing your newsletter’s opening rate and, with that, your conversions.

How port scanning contributes to your system’s security

It’s easy to lose track of all the different programs that are responsible for inbound and outbound data traffic. Networks hosting a large number of computer systems that are constantly communicating with online services often require technical backup. High-performance tools check the activities of various applications or computers and can close existing security gaps. Using port scanners is one...

The inverted pyramid: how to optimise your writing style for online reader behaviour

We read online texts differently to how we read printed newspapers: Online, we quickly skim through the most important paragraphs, filter through the relevant information, and click on the next link. The requirements for a text are clear: information must be easily and quickly found. The most effective way to achieve this is by using the inverted pyramid principle. Our article explains what this...

Ransomware, adware, etc. – how can you protect yourself?

The internet is a playground for cybercriminals and fraudsters – for many, this is an annoying and frightening reality. The threats from unwanted software range from harmless advertising to trojans, which can paralyse complete computer networks. The forms of malicious software or malware are diverse, the countermeasures often very simple. In our article, you can read about how ransomware, spyware,...


Own your online success
IONOS takes care of your online challenges
Create your website with the perfect domain and the UK's fastest hosting!