Perfect out of office message: Examples and templates

How to create the perfect out of office message

 

The out of office message is a crucial part of email communication in the workplace. If you don’t have access to your email, your contacts will want to know when you’ll be back and whether or not you’ll be represented by someone else in your absence. An out of office reply may be...

 

Chrome Updates

What is Chrome 68?

 

Early next month, Chrome 68 will be launched and the new browser will distrust all webpages that do not have HTTPS encryption as “not secure”. This is a big step in the recent trend towards emphasizing user safety on the internet, a not entirely selfless strategy from Google. In...

 

The biggest online marketplaces that you should know

Selling online: the top English-speaking online marketplaces

 

You want to sell online – but where? If you don’t want to be entirely responsible for your own online shop, then you should offer your products on e-commerce platforms. Aside from the giants Amazon and eBay, there are other interesting online marketplaces that are worth checking...

 

The best WhatsApp alternatives

The best WhatsApp alternatives

 

Invitations to dinner parties; updates about work; an away day with the college football team: if you’re not using WhatsApp, you run the risk of missing out on important information. With more than a billion worldwide users to date, the app is more popular than almost any other...

 

What is a podcast?

Podcasts have become one of the most popular forms of content. They are seen as being a convenient and multi-layered medium perfect for listening to on the go. It’s not only private individuals who use the format as an uncomplicated and effective platform for their ideas and content, for quite some time now podcasts have become a very powerful marketing tool. As well as answering the question of...

Altcoin: What are the alternatives to Bitcoin?

Bitcoin’s success has spawned hundreds of cryptocurrencies now available on the market. Known as altcoins, they try to fix Bitcoin’s weaknesses or else have a completely different focus. In this article, we present the most popular and important alternatives to Bitcoin and explain their main differences: what are the advantages and disadvantages of each cryptocurrency?

Spotify alternatives: a comparison of 6 streaming services

For music lovers, streaming services are the best option for easily listening to music no matter where you are. But not every streaming service offers the same functions. The little additional offers of each music streaming service are crucial differences when it comes to making a decision. In this article, we describe them in detail.

Raspberry Pi: activating and using SSH access

Raspberry Pi has established itself as a reliable basis for servers of various types. Access – for configuration and maintenance purposes – rarely takes place on the mini computer itself, but mostly on a desktop computer in the same network. The communication protocol is the secure SSH (secure shell), which isn’t enabled by default and hasn’t been for some time. How to activate the Raspberry Pi...

Create a ZIP File: compress your files

Send multiple images and videos via email, archive large amounts of data without using too much space, or encrypt confidential documents - you can do all of this by zipping files. We show you how to create a compressed ZIP file in Windows as well as macOS in our step-by-step guide. We also show you how to protect your files with a password if needed. This way, you can manage your storage space...

Network time protocol (NTP): definition and functionality

Computer systems and applications use time stamps for communication purposes. Synchronous system times are highly important for these so-called temporal signatures to be of any use – especially for systems that exchange information via the internet. A protocol that has provided valuable assistance for decades is the network time protocol (NTP) – here is an introduction to NTP, as well as some...

Introduction to PowerShell – Tools for system administrators

For a long time, Windows users were left behind when it came to command interpreters because the command prompt did not allow full access to operating system internal components, and scripting also offered only limited possibilities. This should finally change thanks to Microsoft’s PowerShell. The cross-platform program not only does much better than cmd.exe, it also provides remote computer...

CSMA/CD: Explanation of the process

Rules must be observed when communicating in a group. This is no different with local networks: CSMA/CD regulates how data packet collisions must be handled in a LAN network. But what happens if several participants attempt to simultaneously carry out a transmission and the information gets lost? Carrier Sense Multiple Access with Collision Detection is an important procedure for smooth network...

CSMA/CA: definition and explanation of the method

How do you achieve order in a wireless network? If all devices were to send information amongst themselves in an uncoordinated way, the data would rarely reach the recipient without problems. With CSMA/CA, there is a protocol that organizes the process and avoids collisions – without the need for central coordination. It’s a complex time management system. We go through the process step by step so...

CIDR: what is classless inter-domain routing?

The internet – just like other large networks – must be precisely subdivided. The network classes, used until the 1990s and not yet completely gone from the scene, were far too inflexible for the requirements of the digital world. CIDR can help: With classless inter-domain routing, it’s possible to create effective subnets and routes. We explain how this works.