What do EU cookie laws mean for you?

EU cookie laws and how they affect your business

 

Cookies can be helpful business tools, but they often toe the data protection line dangerously. As a result of this tendency towards uncertainty, the EU has introduced a new cookie policy to protect its users. The new policy makes opt-in procedures compulsory, because the user...

 

What is a QR code?

What is a QR code?

 

What do stamps, tickets, and posters have in common in the 21st century? More than you might think: Many companies now use QR codes on printed items for a variety of purposes. They can be used to quickly read data and execute commands. How does a QR code work? Which QR code...

 

Video conferencing

Video conferencing: How to make virtual meetings a success

 

Flexible working models are hard to imagine without video conferencing. Employees from different locations can meet easily for personal exchanges on a digital platform. But which software is recommended for optimal video conferencing? How can you make video conferencing more...

 

The best Facebook alternatives

What are the best alternatives to Facebook?

 

We once used phone calls and text messages to carry out all our communication, but now our private conversations are largely digitalised and carried out almost entirely online. We write to each other via messenger apps and share photos, thoughts, and feelings on social networks....

 

The best TeamViewer alternatives

Alternatives to TeamViewer

 

You don’t always have to use the market leader – this also applies to remote access. TeamViewer is still the most widely-used solution for remote management and online meetings, but there are numerous alternatives on the market which can be considered. We present some serious...

 

Best Video editing programs

The 7 best video editing programs of 2020: beginner, advanced, and professional

 

Professionals use video editing software to create amazing films. However, video editing is not just for professionals. The best video editing programs of 2020 manage a balancing act between suitability for amateurs and professionals. With the right video editing software, you...

 

How to identify phishing e-mails and protect your data

Identifying phishing e-mails: the telltale signs at a glance

 

Scammers send out dubious e-mails attempting to obtain sensitive data from internet users every day. This is known as phishing and isn’t just annoying; fraudulent e-mails cost millions each year as internet users fall victim to them. We reveal how to identify phishing e-mails and...

 

The best continuous integration tools at a glance

Continuous integration tools make everyday work easier for developers. If you want to use agile methods for software development (continuous integration), it requires either a lot of discipline and effort, or you can make use of helpful CI tools. These tools assist you with automation and other useful features. In this article, we provide an overview of some of the most popular and best continuous...

Continuous delivery – software development in the pipeline

With continuous delivery, software developers automate the process of development, quality assurance, testing, production, and delivery. This gives them the opportunity to deliver software to the customer at a much earlier stage of development while the program continues to be developed. The continuous delivery pipeline required for this is divided into different test phases. What are these, what...

CTAP: A protocol for more security & convenience on the web

Try and imagine a world where you don’t have to memorise passwords: Thanks to FIDO2, this could soon become a reality. Authentication in online shops or for online banking can be done through a fingerprint or hardware token. The latter can communicate with laptops of PCs through a USB, NFC or Bluetooth. To enable conversations between two devices, FIDO2 uses the Client to Authenticator Protocol...

Zero-day exploit: Explanation and protection measures

The risk for businesses to fall victim to a zero-day exploit has increased in recent years. More and more often, cybercriminals can take advantage of as-yet undiscovered weak points in business software in order to steal or manipulate data. It is difficult to protect against these attacks, but businesses can take some measures to improve their security.

URN: The Uniform Resource Name Explained

How can we be sure that we are all talking about the same object? The Uniform Resource Name (URN) makes it possible to clearly identify a resource – regardless of when and where. This has proven especially useful for libraries. Books and magazines, as well as movies and videos, can be assigned a name with URN, regardless of where the media is presently located.

Reverse engineering software

The process of “reverse engineering” allows you to understand the functionality and structure of software. By reverse engineering software down to the source code, it is not only possible to understand incorrect messages, but also to analyse competing programs. Reverse engineering can therefore be used in many ways. But how exactly is reverse engineering applied in software development?

GPT partitions: What is a GUID partition table?

In order to provide the best support for the rapid progress in hardware development, system software is also constantly being improved. Along with comfort, performance and security are crucial factors. One good example is the GUID Partition Table (GPT) partition style, which has already replaced the classic master boot record in many system architectures. We’ll show you why.

MBR or GPT: a comparison

Partitions help you to manage disk space more efficiently. For example, by splitting up the available disk space into smaller sections, you can easily separate system files from application files and personal data. However, if you want to create a partition, you will have to decide whether to use MBR or GPT. So how does each of these partitioning styles work? And what’s the difference between...

Empathy Map: The Quick Way to Understanding Customers

How do companies get a clear idea of the needs of their target group? The empathy map is a simple way to get a good impression of the real problems of potential and existing customers, provided that you use a method that has a degree of sensitivity. In this article, we define the empathy map using concrete examples.

Raspberry Pi: Alexa tutorial

If you own an Amazon smart speaker like the Amazon Echo, you’re probably quite familiar with Alexa. The speech software, which gives the interactive speakers a voice and reacts to the user's voice commands, can also be integrated into your own devices. With some preparation and an Amazon Developer account, for example, you can turn Raspberry Pi into an Alexa speaker.


We’re all in this together. At IONOS we are
#hereforyou
Coronavirus is a challenge we need to face together.
We've created special offers on key products to help
your business keep going.
3 months free
Online Shop
Be where your customers are with your own online store.