Collaboration tools: a comparison of the best solutions

Collaboration tools: the best apps for better productivity

 

The bigger your business, the more difficult it is to manage all the different teams and projects. It’s especially difficult if not all employees are located in the same place – this is when planning resources and communicating quickly becomes a gigantic task. Collaboration...

 

Joy of Missing Out

JOMO: The mindful countertrend to FOMO

 

JOMO (joy of missing out) is the antithesis of FOMO (fear of missing out). Younger people especially are discovering the joy of missing out for themselves. They’re enjoying the moment, instead of chasing after trendy events and comparing themselves to others on social media. JOMO...

 

Video conferencing

Video conferencing: How to make virtual meetings a success

 

Flexible working models are hard to imagine without video conferencing. Employees from different locations can meet easily for personal exchanges on a digital platform. But which software is recommended for optimal video conferencing? How can you make video conferencing more...

 

Skype alternatives

The best alternatives to Skype: 13 free applications for video calls

 

For millions of people around the world, video chats and conferences are an essential part of daily life – for both work and leisure. When it comes to video telephony software and applications, Skype is by far the leader of the pack. In fact, many people are unaware that there’s...

 

Promote your website

Promoting your website: crash course for beginners

 

There are well over one billion websites worldwide. If you’re a newcomer and want to improve your online presence, you need a well-thought-out strategy and a lot of patience. But solid online marketing efforts can give a website the desired reach. From SEM, to display, to mobile:...

 

The best TeamViewer alternatives

Alternatives to TeamViewer

 

You don’t always have to use the market leader – this also applies to remote access. TeamViewer is still the most widely-used solution for remote management and online meetings, but there are numerous alternatives on the market which can be considered. We present some serious...

 

How to identify phishing e-mails and protect your data

Identifying phishing e-mails: the telltale signs at a glance

 

Scammers send out dubious e-mails attempting to obtain sensitive data from internet users every day. This is known as phishing and isn’t just annoying; fraudulent e-mails cost millions each year as internet users fall victim to them. We reveal how to identify phishing e-mails and...

 

From Panda to Penguin: the main Google updates at a glance

It took less than two decades for Google to rise to power. The search engine giant determines what can be found online and decides whether web projects are successful or not. If you want to appear at the top of the search results, you have to abide by Google’s guidelines – even those that are regularly changed and continually tweaked through algorithm updates. Here are the main Google updates of...

An overview of the most important Linux commands

Under Linux, all actions that you can carry out with the mouse and window system via the graphical user interface can also be performed using programme calls in the terminal – provided you know the appropriate command and how to use it according to the correct syntax. To make working in the terminal easier, we provide you with an overview of basic Linux commands with detailed descriptions and...

Malware on the server: consequences and countermeasures

A website operator is responsible for the security of a web project as well as the content. Neglecting security may lead to hackers easily infiltrating the system through security gaps. If a malware-infected website goes unnoticed, it could cause serious damage. It is therefore important to make sure your site is fully protected.

Spear phishing: targeted attacks on your data

Internet users are constantly the target of cyberattacks. Most attacks are easy to fend off, but a new form of scam has proven to be especially dangerous. Spear phishing messages don’t contain absurd claims or bad spelling. These deceitful messages target specific individuals and look frighteningly real. How do these attacks work?

Creating an online store with WordPress and WooCommerce: This tutorial shows you how

  • CMS

In order to successfully sell products in the age of mobile internet and digital offers, having a well-functioning online shop is a necessity. But how can you create your own online shop without resorting to expensive help? With WordPress and WooCommerce, you can quickly and easily set up your own web shop. We will show you how to do it with this step by step WooCommerce tutorial.

Creating a Joomla! website: Step by step to your own website

If you create your website with Joomla!, you benefit from a well-structured content management system, which already offers many features in the standard installation. However, you first have to master tasks such as hosting or installing the software, and to learn how to use the system. The following Joomla! tutorial supports you in this project.

System calls: What are system calls and why are they necessary?

The core component of operating systems like Windows or Linux, known as the kernel, is crucial to be able to use the underlying hardware effectively. For security reasons, this system core works on a higher layer than application programs can normally access. It is only with so-called system calls that processes from system-external software can temporarily access the kernel mode.

Digital marketing: tips for small businesses

Traditional offline advertising is gradually losing its significance and luckily alternative “online marketing” is perfectly suitable for lots of smaller companies. Many online marketing measures do not require a large budget and can be easily scaled to your project. If you follow our online marketing tips for small businesses, practically nothing can go wrong!

Outlook: how to change your password for mail accounts, data files, and in the web app

Microsoft Outlook is one of the most popular client solutions for retrieving and managing e-mails. Using the software, multiple e-mail accounts can be easily combined and controlled through one interface. For this purpose, Outlook only needs information about the corresponding mail server and the respective log-in data. If you change these, you only have to adjust them in the client settings. But...

What is a podcast?

Podcasts have become one of the most popular forms of content. They are seen as being a convenient and multi-layered medium perfect for listening to on the go. It’s not only private individuals who use the format as an uncomplicated and effective platform for their ideas and content, for quite some time now podcasts have become a very powerful marketing tool. As well as answering the question of...


We’re all in this together. At IONOS we are
#hereforyou
Coronavirus is a challenge we need to face together.
We've created special offers on key products to help
your business keep going.
3 months free
Online Shop
Be where your customers are with your own online store.