Image SEO: improve your Google ranking with image optimisation

There’s no doubt that having engaging images on your website is of central importance. Photographs and graphics can be much more than just decorative; they can inspire visitors to read more content and possibly lead to conversions. Many webmasters neglect to take appropriate measures here. In adjusting the standard SEO of the website, all too often, little or no attention is paid to the search engine optimisation of images – but good image SEO is crucial and can have a permanent effect on your ranking in general search engine results pages. [...]  

Attribution models in web analytics

Any marketer will tell you that getting your marketing strategy right is the most important thing for businesses online. To reach your potential target group as effectively as possible, it makes sense to have an ideal mix of different advertising channels. But how do you know that you’re spending your marketing budget in the right areas? Which ad channel is the best one for you to invest in? This is where web analytics come into play, helping you see which channels will bring you the best returns through the use of different attribution models. [...]  

Growth hacking: how to grow your company with smart and affordable ideas

In order to get new products or services onto the market, it’s more important than ever before to carve out new, more creative paths to achieve this goal. While search engine optimisation and social media marketing have since established themselves as indispensable components of any marketing mix, growth hacking is, for the most part, still in its infancy. This latter term refers to the principle that billionaire companies, like Facebook or Twitter, used in order to grow from start-up to global player. [...]  

Reverse proxy server – core components in security architecture

Cyber criminality is a big issue for most companies’ IT departments. Online attacks threaten the security of private networks and cause millions of dollars of damage per year. Popular targets are servers that provide online services and therefore require a permanent internet connection. An extra layer of security can be applied by using an upstream network component – the reverse proxy. This retrieves resources on behalf of a client and then returns them to the client as if they came from the proxy server itself. [...]  

Creating a delivery note: what is a delivery note and how do you design one?

It’s not compulsory to include a delivery note when shipping goods, but it is advisable: this correspondence enables you to provide customers with a quick overview of the delivered products and also makes sure that all of the ordered items are included in the delivery. [...]  

Domain allocation: how are Neustar and ICANN involved?

It’s now easier than ever to register your own web address. Customers just need to apply to a web-hosting provider with their desired domain, and the rights to the address could be theirs in next to no time. But what processes are going on in the background? The application goes from pillar to post, beginning with the registrar, then sent on to a central registry for the chosen top-level domain, such as Neustar, which is responsible for a variety of popular TLDs including .co, .us, and .biz. The domain application finally ends up at ICANN – an entity which is often considered a ‘global governor of the internet’. In this helpful guide, we explain in detail how this process works. [...]  

Ruby on rails: the MVC framework for complex web applications

Frameworks tremendously simplify web application development. Fundamental architectures, predefined paradigms, and integrated libraries create the perfect platform on which your planned app can be built. One name that’s often mentioned hand-in-hand with web applications frameworks is Ruby on Rails. Based on the script language Ruby, this web framework has attracted many fans through its clean, and elegant code and database-friendly structure. [...]  

The best alternatives to PayPal a glance

The conveniences of online retail have helped the sector gradually chip off traditional retailer’s market share over the past decade. Fast, easy, and secure payment methods have contributed to the rise of this sector. Until recently, online payment systems have been heavily dominated by one industry heavyweight: PayPal. But not everyone’s enthused by this payment method, having been criticised for both security as well as data protection issues. Fortunately, there are plenty of PayPal alternatives out there. We’ll introduce a few here. [...]  

Server failure: risks, consequences, countermeasures

Server failures can be devastating for businesses, especially if central business areas are controlled by IT systems since the longer the server is down, the costlier is it for the company. This can result in loss of sales and in the worst case, the loss of business or customer data. Here we demonstrate the internal and external sources of danger that can lead to server failure, explain the consequences for the business, and provide you with some possible countermeasures. [...]  

CRUD: the basis for data management

It won’t take long for those looking to get into to software development to encounter the term CRUD. The acronym stands for the typical operations used for communicating with database systems; these normally form the basis of database management. But just how are these access functions for data management actually set up? And how much of role does CRUD play when it comes to the databases’ programming language and language environment? [...]