DWH | What is a data warehouse?
Data warehouse systems: get success with big data analysis
  • Web analytics

More and more businesses are adopting dispositive data with the aim of making strategic decisions shaped by reports, prognoses, and patterns. The database is usually supplied by an information system that functions as a central data repository, separate from a data operating system. This is known as a data warehouse, or a DWH for short. A data warehouse is a modularly built system made up of...

Data warehouse systems: get success with big data analysis
Excel: TEXT function
Excel Text: using the TEXT function to convert numbers into individually formatted text
  • Online sales

The Excel TEXT function converts any number into a text string. The best part is that you can format the number as text in almost any way you like (e.g. as a decimal number, fraction, currency or by adding user-defined text before, between or after). Learn how to make the most of the Excel TEXT function using the format codes.

Excel Text: using the TEXT function to convert numbers into individually formatted text
How to protect your website from malware
Malware on the server: consequences and countermeasures
  • Technical matters

A website operator is responsible for the security of a web project as well as the content. Neglecting security may lead to hackers easily infiltrating the system through security gaps. If a malware-infected website goes unnoticed, it could cause serious damage. It is therefore important to make sure your site is fully protected.

Malware on the server: consequences and countermeasures
Creating an online store with WordPress
Creating an online store with WordPress and WooCommerce: This tutorial shows you how
  • CMS

In order to successfully sell products in the age of mobile internet and digital offers, having a well-functioning online store is a necessity. But how can you create your own online store without resorting to expensive help? With WordPress and WooCommerce, you can quickly and easily set up your own web store. We will show you how to do it with this step by step WooCommerce tutorial.

Creating an online store with WordPress and WooCommerce: This tutorial shows you how
What are system calls?
System calls: What are system calls and why are they necessary?
  • Know-how

The core component of operating systems like Windows or Linux, known as the kernel, is crucial to be able to use the underlying hardware effectively. For security reasons, this system core works on a higher layer than application programs can normally access. It is only with so-called system calls that processes from system-external software can temporarily access the kernel mode.

System calls: What are system calls and why are they necessary?
What is a podcast?
What is a podcast?
  • Online sales

Podcasts have become one of the most popular forms of content. They are seen as being a convenient and multi-layered medium perfect for listening to on the go. It’s not only private individuals who use the format as an uncomplicated and effective platform for their ideas and content, for quite some time now podcasts have become a very powerful marketing tool. As well as answering the question of...

What is a podcast?
Graphic file formats: which formats are important?
Graphic file formats: the most important storage formats for images online
  • Web design

Whether you own an online store, run a corporate website, or write a blog, none of your web projects won’t be successful without photos or graphics. Images create visual stimuli that can enhance the content of your text and appeal to your visitors. However, it is crucial not only to find suitable graphical elements - but also to choose the appropriate graphic file format. The format needs to meet...

Graphic file formats: the most important storage formats for images online
Spear phishing
Spear phishing: targeted attacks on your data
  • E-Mail security

Internet users are constantly the target of cyberattacks. Most attacks are easy to fend off, but a new form of scam has proven to be especially dangerous. Spear phishing messages don’t contain absurd claims or bad spelling. These deceitful messages target specific individuals and look frighteningly real. How do these attacks work?

Spear phishing: targeted attacks on your data
snackable content
Snackable content – bite-sized web content
  • Online sales

Snackable content has become an online marketing buzzword. The term refers to content on the web that can be taken in quickly and easily. Examples of snackable content include posts and tweets, pictures or memes, and short videos. Snackable content is designed to suit the average attention span of web surfers, and is usually sensationalist or emotional, designed to pique a reader’s interest...

Snackable content – bite-sized web content
SSL stripping – how to protect your web project
SSL stripping: Basics and protection options
  • Technical matters

Data transmission via SSL/TLS is one of the most effective means to give a web project more security. Even before packets are sent, powerful algorithms ensure the encryption of the information. If third parties capture the data on the transmission path, the true content remains hidden from them. However, it becomes problematic if attackers are active with their tools, even before the encryption...

SSL stripping: Basics and protection options