Create your own visitor counter: How it works

At the start of the internet, a visitor counter on a website was a classic marketing instrument that significantly helped the success of a web presence. Today, the practical scripts are primarily used for presenting click numbers on specific content, such as videos or blog entries, as well as for collecting basic user data for web analysis. If you don’t want to rely on free or paid downloads, or finished CMS modules, you can easily create your own visitor counter in relatively few steps. [...]  

Penetration test: how to find weak points in your network

The more complex a network is, the more vulnerable it is to attacks. In times when customers and partners have access to internal network structures via the internet, and can control various applications via web interfaces, IT employees are encountering more and more problems. Large companies, in particular, prefer to use penetration testing to check how well their security concept works. This article explains what this comprehensive testing process is all about. [...]  

Six tools for creating infographics

Do you want to create high-quality infographics to enhance your content and display information that is easily understood by your readers? With the help of online tools, you can create impressive infographics by yourself – whether for your presentations, websites, blogs, or posts on social networks. With the many free tools on offer, you can even visualise data and enrich your web presence with infographics without any prior specialised knowledge. [...]  

Focusing on your target market: successful content planning

To be able to implement all your content marketing goals, you’ll need a well-structured and thought-out editorial plan. By carrying out proper strategic considerations in advance – including topic research and resource planning – you can be sure to create a solid content plan that gives all your editors a clear view of the tasks ahead. By doing so, you can give more weight to your content marketing activities, because your whole team will understand the goals and methods agreed upon in advance. [...]  

Micro influencers and what they mean for social media marketing

In the world of social media marketing, micro influencers are gaining a more and more prominent role as brand ambassadors. Users are more inclined to trust ‘smaller’ opinion leaders and their recommendations, because they see them as more authentic and interact with them regarding a specific topic. Their credibility and expert status make them particularly appealing to brands, which is why micro influencer marketing is becoming so popular. But just how successful can such collaborations actually be, and how do you even go about finding the right micro influencer? [...]  

The intrusion detection and intrusion prevention systems at a glance

A stable network is characterized not only by the appropriate hardware structures, but also by a watertight security concept. In addition to back-up solutions and intelligent fail-safe systems, protection against external access attempts is a must. Intrusion detection systems (IDS) and intrusion protection systems (IPS) are an excellent addition to the classic firewall and are therefore a sensible safeguard for many computer networks. [...]  

Intelligent search: a user-friendly search bar for your online shop

For many customers, the search bar is the first port of call when visiting an online shop. It is the most important tool for research and shopping online; something which most e-commerce retailers have been aware of now for quite some time. But a search bar is often not enough. Many retailers choose to use very basic standard solutions, despite the fact that an intelligent search with features like autocomplete, error tolerance, and useful filters will all seriously improve the user experience. This article outlines how an intelligent search can improve the search usability. [...]  

Telnet: a client-server protocol for cross-platform remote connections

Remote access to remote computer systems has always been a part of well-organised networks. Administrators can manage individual users as well as work on the move since a remote connection enables access to company data. One of the first protocols developed specifically for this purpose was Telnet. [...]  

Canonical tag: what’s behind the canonical URL?

When certain website content is used multiple times, it’s not always due to inattentiveness, but could be intentional: international websites or online shops, for example, display lots of similar content. To ensure that search engines don’t classify this as duplicate content, there are certain methods, such as the canonical tag, which enable you to link to the original content. [...]  

Predictive analytics – definition and examples

What is predictive analytics? The subsection of big data analysis has similarities to data mining. But what exactly is the difference and how does predictive analysis actually work? We provide the answers on this method of data analysis, show you what it is used for, and what tools there are for using the technique of predictive analytics. [...]