Buyer personas for optimal targeting

Buyer personas: Getting to know your customers better

 

When it comes to online marketing, data is what counts most today. But what good is the information you have collected and analyzed if you address indefinite groups of people in your messages? It is better to identify the people behind the data set and focus on them. Creating...

 

CMS comparison: A review of the best platforms

CMS comparison 2018/2019: The 5 most popular open source systems

 

Range of functions, ease of use, and technical aspects: If you’re searching for the right content management system (CMS) for your website, many factors must be taken into consideration. Worlds lie between a small blog and a huge company website, but sometimes the same system is...

 

Ancillary copyright for press publishers in Europe

Ancillary Copyright for Press Publishers

 

Upload filters and ancillary copyright are two changes to EU copyright law that will soon be implemented and are viewed with great concern by internet activists and various associations. This is because ancillary copyright law is criticized for restricting freedom of...

 

Upload filters

Upload filters: a danger to free internet content?

 

The redesign of European Union’s copyright laws includes two very controversial acts. What is especially receiving a fair share of criticism though, is the projected commitment of website operators to establish upload filters designed to protect the intellectual property of...

 

Conversational Marketing

What is Conversational Marketing?

 

Conversational marketing is a hot topic for SMBs looking to change the way they reach out to new and existing customers. Learn more about how to engage customers on a one-to-one basis and grow your business with a more human approach to marketing.

 

The best Alexa Skills

Amazon Echo upgrade: the best Alexa Skills

 

So you think Alexa can do a lot? Well, it’s now possible to add even more capabilities to the smart Amazon Echo speaker. If you network it with external providers, you can extend the pre-configured functions with different applications. With Amazon Alexa Skills, Alexa becomes a...

 

Setting up your own Minecraft server

Many players of the popular game, Minecraft, need or want to use their own servers. Hosting your own Minecraft world is the only way users are able to adjust the general settings of the online multiplayer mode. Setting up a personal Minecraft server isn’t as daunting as it sounds, however. Find out just exactly how it works and what type of server is best suited for hosting Minecraft.

Responsive typography - part 1: the basics

The evolution of responsive web design has had a huge effect on typography, and the appearance of a text now needs to be adjustable to any device. Responsive typography therefore needs flexible, adaptable fonts to ensure maximum readability. Learn more in our overview of font in responsive web design.

Web hosting: servers by comparison

Carry out a server comparison and you will notice that website operators have a large selection to choose from. Professional hosts offer virtual, dedicated, and cloud based servers in different performance levels. How do these server models differ from one another? What features does a root server have in comparison to a managed server? Which type of hosting is best for your web project? Take a...

Introduction to Linux directory rights

With Linux, access rights for directories and files are often set through the terminal. There, file owners can be defined and groups can be assigned. With the command, chmod, user classes can be assigned certain file rights. Access rights in the Unix file system can be changed in two different ways: symbolic or numeric. Find out more about both notation types here.

Buying a complete website: what is there to know?

Instead of creating a website yourself, buying a ready-made website is also an option. This way you can reduce your workload and receive a complete web presence including existing visitors and customer base. But which risks are associated with buying a ready-made website? And what costs can you expect?

Website security: how to protect your web presence

Would you leave your window open at night if you knew there were intruders lurking about? Obviously the answer to this question is ‘no’. Many companies and individuals leave their virtual window open to cyber criminals by not adequately protecting their websites. Website security is an extremely important topic. Only by regularly carrying out security checks and following the proper precautions...

What is SEA? The basics of search engine advertising

With search engine advertising (SEA), you can embed links to your website in the exact place that internet users search for products and services like yours. How does SEA work? And how much does it cost to advertise with a search engine? Discover everything you need to know about SEA, including the Google AdWords’ bidding process, and to what extent SEA can help you achieve your business goals.

Malware on the server: consequences and countermeasures

A website operator is responsible for the security of a web project as well as the content. Neglecting security may lead to hackers easily infiltrating the system through security gaps. If a malware-infected website goes unnoticed, it could cause serious damage. It is therefore important to make sure your site is fully protected.

Four reasons to switch to cloud hosting

Say goodbye to dedicated server hosting. The future belongs to the cloud. Still not sure if you should make the switch to flexible Cloud hosting? These four arguments for a contemporary web hosting strategy illustrate how you can achieve effective IT requirements for a competitive business.

MySQLDumper: from installation to backup

“Data is the new oil!”. So when it comes to online businesses, loss of data means loss of capital. Important and sensitive data should be backed up at regular intervals. Thanks to free programs such as MySQLDumper you can create MySQL database backups in minutes! Once installed, you can use the software to automatize and administer backups.