General Data Protection Regulation: new laws from 2018

On 25 May 2018 a new European law on data protection will take effect. However, many companies and website operators are unprepared for the new...

Gender marketing

What makes men and women tick? As we know, it’s not always the same thing. Advertisers have long been aware of this fact, and over the years, gender...

User experience design – for the perfect user experience

User experience design is becoming more and more important among web designers and software developers: a good user experience (UX) is now the goal as well as the standard for serious websites and software. But what exactly is UX design? It is often difficult to define due to the many related terms, such as user interface (UI). Read everything you need to know about user experience design and get [...]   

MPLS: What’s behind the network technology

Speed and reliability play an important role for data transfer in networks. They reflect the quality of the connection, which is why providers do everything they can to guarantee the agreed services. A method primarily used in virtual private networks is the so-called multiprotocol label switching (MPLS).   

SSL stripping: Basics and protection options

Data transmission via SSL/TLS is one of the most effective means to give a web project more security. Even before packets are sent, powerful algorithms ensure the encryption of the information. If third parties capture the data on the transmission path, the true content remains hidden from them. However, it becomes problematic if attackers are active with their tools, even before the encryption [...]   

The right configuration to secure your server

If you operate or rent your own server, it is your responsibility to protect it against failures and external access. You can immediately begin to set the foundation for this when configuring the server, if you have the necessary administrative rights. The correct settings can work wonders, especially with encrypted remote connections via SSH protocol, and greatly increase security.   

HTTPoxy: Threatening the security of CGI applications

Fifteen years after the discovery of the security flaw HTTPoxy, it’s still an issue with CGI applications. The reason for this is the fact that the Common Gateway Interface standard provides the use of environment variables to process HTTP requests. These can include header contents that modify the original proxy configuration, allowing hackers to redirect data packets to a completely foreign [...]   

White Paper – A document used for advertising with facts

How do you write a white paper? And what actually is white paper marketing? The term white paper can often create confusion as it is not clearly defined. This article gives you an overview of what types of white paper documents there are, as well as useful tips on how to create a white paper.   

Affinity marketing: Advertising through reference groups

What is affinity marketing? This form of online marketing is relevant to all of us, whether we want it to be or not. The techniques of affinity-based advertising are particularly successful in e-commerce. This article defines the term affinity marketing, and provides information about the methods and relevance of this marketing technique.   

Recommendation systems in e-commerce

Admittedly, automated systems also make mistakes, but overall, it’s quite impressive that online stores can suggest products that users like. By streaming movies and series, the respective platforms are able to 'learn' the users’ tastes and then generate playlists automatically. This isn’t a coincidence, but rather the ability of modern recommendation systems.   

Spring – the framework for complex Java applications

Java doesn’t play a big role when it comes to simple web development, although the programming language has still maintained a strong appeal. The language, which is no longer supported by browsers, has established itself as an efficient solution finding tool, especially when designing backends for business applications. The Spring framework contains various modules that serve as a basis for [...]   

Guerrilla marketing: effective ads in the age of advertising

In this era of Facebook, Twitter, etc. it’s more important than ever for businesses to attract consumers’ attention. But in such a barrage of multimedia ads, how do you succeed in getting noticed? Through the use of remarkable advertising techniques, so-called guerilla marketing offers the opportunity to reach millions of social media users worldwide. Welcome to guerilla marketing 2.0 – where [...]