PHP 8

PHP 8: What you need to know about the latest update

 

PHP is one of the most important languages on the Internet. Many content management systems like WordPress, TYPO3 or Joomla are based on PHP. The release of PHP 8 is imminent, but we’ve already had some information about its new features. Also some old features will be reworked,...

 

Create Alexa Skills

Program Alexa Skills easily by yourself

 

Alexa Skills extends the functionality of your Amazon Echo, Echo Dot, or any other smart speaker from the Echo series with additional abilities. You can activate extensions for the virtual voice assistant in the Alexa Skills Store for free. With the Alexa Skills Kit, Amazon also...

 

What do EU cookie laws mean for you?

EU cookie laws and how they affect your business

 

Cookies can be helpful business tools, but they often toe the data protection line dangerously. As a result of this tendency towards uncertainty, the EU has introduced a new cookie policy to protect its users. The new policy makes opt-in procedures compulsory, because the user...

 

Zoom alternative

Zoom alternatives: a comparison of the main competitors

 

Alternatives to the popular video conferencing software Zoom are having their moment in the spotlight as a growing number of people are organising video calls daily. Free alternatives to Zoom include a wide range of features, especially since the market for video conferencing...

 

What is a QR code?

What is a QR code?

 

What do stamps, tickets, and posters have in common in the 21st century? More than you might think: Many companies now use QR codes on printed items for a variety of purposes. They can be used to quickly read data and execute commands. How does a QR code work? Which QR code...

 

Best Video editing programs

The 7 best video editing programs of 2020: beginner, advanced, and professional

 

Professionals use video editing software to create amazing films. However, video editing is not just for professionals. The best video editing programs of 2020 manage a balancing act between suitability for amateurs and professionals. With the right video editing software, you...

 

Perfect out of office message: Examples and templates

How to create the perfect out of office message

 

The out of office message is a crucial part of email communication in the workplace. If you don’t have access to your email, your contacts will want to know when you’ll be back and whether or not you’ll be represented by someone else in your absence. An out of office reply may be...

 

The best continuous integration tools at a glance

Continuous integration tools make everyday work easier for developers. If you want to use agile methods for software development (continuous integration), it requires either a lot of discipline and effort, or you can make use of helpful CI tools. These tools assist you with automation and other useful features. In this article, we provide an overview of some of the most popular and best continuous...

Continuous delivery – software development in the pipeline

With continuous delivery, software developers automate the process of development, quality assurance, testing, production, and delivery. This gives them the opportunity to deliver software to the customer at a much earlier stage of development while the program continues to be developed. The continuous delivery pipeline required for this is divided into different test phases. What are these, what...

CTAP: A protocol for more security & convenience on the web

Try and imagine a world where you don’t have to memorise passwords: Thanks to FIDO2, this could soon become a reality. Authentication in online shops or for online banking can be done through a fingerprint or hardware token. The latter can communicate with laptops of PCs through a USB, NFC or Bluetooth. To enable conversations between two devices, FIDO2 uses the Client to Authenticator Protocol...

Zero-day exploit: Explanation and protection measures

The risk for businesses to fall victim to a zero-day exploit has increased in recent years. More and more often, cybercriminals can take advantage of as-yet undiscovered weak points in business software in order to steal or manipulate data. It is difficult to protect against these attacks, but businesses can take some measures to improve their security.

URN: The Uniform Resource Name Explained

How can we be sure that we are all talking about the same object? The Uniform Resource Name (URN) makes it possible to clearly identify a resource – regardless of when and where. This has proven especially useful for libraries. Books and magazines, as well as movies and videos, can be assigned a name with URN, regardless of where the media is presently located.

Reverse engineering software

The process of “reverse engineering” allows you to understand the functionality and structure of software. By reverse engineering software down to the source code, it is not only possible to understand incorrect messages, but also to analyse competing programs. Reverse engineering can therefore be used in many ways. But how exactly is reverse engineering applied in software development?

GPT partitions: What is a GUID partition table?

In order to provide the best support for the rapid progress in hardware development, system software is also constantly being improved. Along with comfort, performance and security are crucial factors. One good example is the GUID Partition Table (GPT) partition style, which has already replaced the classic master boot record in many system architectures. We’ll show you why.

MBR or GPT: a comparison

Partitions help you to manage disk space more efficiently. For example, by splitting up the available disk space into smaller sections, you can easily separate system files from application files and personal data. However, if you want to create a partition, you will have to decide whether to use MBR or GPT. So how does each of these partitioning styles work? And what’s the difference between...

Empathy Map: The Quick Way to Understanding Customers

How do companies get a clear idea of the needs of their target group? The empathy map is a simple way to get a good impression of the real problems of potential and existing customers, provided that you use a method that has a degree of sensitivity. In this article, we define the empathy map using concrete examples.


We’re all in this together. At IONOS we are
#hereforyou
Coronavirus is a challenge we need to face together.
We've created special offers on key products to help
your business keep going.
3 months free
Online Shop
Be where your customers are with your own online store.