E-Mail marketing trends 2018: 7 ideas for the New Year

To ensure that your newsletter campaigns continue to be effective in the future, you shouldn’t miss these e-mail marketing trends in 2018: more...

General Data Protection Regulation: new laws from 2018

On 25 May 2018 a new European law on data protection will take effect. However, many companies and website operators are unprepared for the new...

Selling online: the top English-speaking online marketplaces

You want to sell online – but where? If you don’t want to be entirely responsible for your own online shop, then you should offer your products on...

Gender marketing

What makes men and women tick? As we know, it’s not always the same thing. Advertisers have long been aware of this fact, and over the years, gender...

Brand ambassadors and their importance in online marketing

Brand ambassadors are often the face of a company on social networks like Facebook or Instagram, company blog posts, at fairs, conferences, and other such events. They give a brand a friendly face. These days, brand ambassadors operate in a field, which, in this era of web 2.0, is getting a whole new lease of life: authentic influencers and standard employees are replacing famous celebrities as [...]   

An Overview of the Best Paint Alternatives

Microsoft Paint is a classic among graphics programs. However, the software, which is standard on all Windows systems since Windows 95, has long since been surpassed by other software. That’s why Microsoft will not be developing the program any longer. Find out which free paint alternatives are available in this comprehensive review.   

Plesk file sharing: basics and tutorial

Plesk is undoubtedly one of the best solution for managing web and other server services. The server administration tool, which impresses with its intuitive interface, can also be used to save files on your own server and publish them to selected users. How exactly Plesk file sharing functions, and how you can set it up is explained in this guide.   

Office 365 vs. Office 2016: a comparison of both models

With Office 365, Microsoft introduced a subscription model for the popular software package for the first time. Instead of paying a one-off fee for the license, as with Office 2016, you pay a monthly or annual fee for the use of the included programs such as Word or Excel. The advantages and disadvantages of both models are shown in our comprehensive comparison: Office 365 vs. Office 2016. So [...]   

Referral spam: attack patterns and countermeasures

Do you find that lots of the traffic that arrives on your site comes from suspicious sources? There’s no need to worry since website operators encounter inconsistencies in reports from analysis tools (such as Google Analytics, Piwik, or etracker). The reason: referral spam falsifies visitor statistics. Learn how hackers can manipulate referrer information and traffic data, as well as which [...]   

S/MIME: how to encrypt and sign your e-mails

If you send an e-mail without additional security measures, it’s like sending a postcard: if everything goes as planned, the information should arrive unchanged and unread in the recipient’s inbox. However, if someone intercepts the card or the e-mail in transit, they can read the contents without any problem and make as many changes as possible. Just like you would use an opaque envelope to [...]   

Testing Socratic: an App for Homework

The Socratic app claims to be able to assist with homework from a wide range of subjects thanks to artificial intelligence and text recognition features. The homework app solves mathematical equations with just a photo from the phone’s camera, and the app is also helpful with physics, English grammar, and world history. It is also available for iOS and Android. Our test guide will show you what [...]   

Content Security Policy: more security with web content

Websites can be full of security risks, especially when it comes to active content like JavaScript. Cross-site scripting enables cyber criminals to modify this content for their own purposes. This is dangerous for website operators and especially for internet users. The Content Security Policy tries to reduce this risk. Learn what’s behind the security standard and how it works.   

E-mail etiquette: tips for good internet communication

Every day, over 200 billion e-mails are sent around the world – although many of them aren’t received with much enthusiasm. In order for your business e-mails to stand out in all this chaos, you should pay attention to e-mail etiquette. If you stick to the most important rules, your e-mails will appear polite, but at the same time, serious. Messages like these will be happily answered.   

Write the perfect e-mail: tips for business mails

Do you want to write a professional mail but are not sure of the business e-mail format? Are you worried about making embarrassing mistakes? First, you must learn how to format a professional e-mail, to ensure that your message is received well. What should the greeting be? What is the perfect e-mail structure? How can you avoid that the subject line leads to your e-mail being disregarded? Here [...]