This website uses cookies

Our website uses first- and third-party cookies to optimize your user experience, personalize advertising and analyze website performance. By clicking "Accept" you agree to the processing and transfer of your data to third parties. You can refuse the use of third-party cookies. An overview of all cookies used can be found in our privacy policy. There you will find a description of how to reject third-party cookies at any time (including retroactively).

Blog

The InterNetX Blog provides you with news and background information on innovations concerning domains, servers, SSL and other industry-related topics.

The domain extension .xyz is a sensible choice in many regards, offering a range of benefits. As with many of the most popular generic domain...

Read more

In this digitally interconnected world, many companies rely heavily on a successful online presence. But, it still comes down to this: no server – no...

Read more

The problem is known to anyone who deals with the topics of search engine optimization or content creation: If there are two pages with almost...

Read more

Companies are constantly experiencing developments that run through the various departments within their corporate structures. While many processes...

Read more

Online retailing is constantly reinventing itself, the choice is becoming ever larger and customer demands too, are growing. In order to attract...

Read more

Subdomains can be useful in terms of search engine optimization and centralized content management, suggesting to users what to expect on a website....

Read more

Voice search is en vogue: Whether it's Alexa or Google Assistant, users are increasingly relying on the help of virtual assistants. Websites and...

Read more

The new gTLDs have surely defined a clear before & after in the DNS’ history timeline.

Read more

Since the introduction of the first new gTLDs, six new domain extensions have crossed the million mark in registration numbers. The undisputed places...

Read more

The human factor is the weakest link in the corporate security chain. More than just a few cyber criminals take advantage of this fact today and try...

Read more