Featured | Featured article

How to Manipulate Schema in SQL

Schema manipulation in SQL follows a template similar to that of database manipulation.

Rheinwerk Computing
Rheinwerk Computing

Rheinwerk Computing is an imprint of Rheinwerk Publishing and publishes books by leading experts in the fields of programming, administration, security, analytics, and more.

Blogs by Rheinwerk Computing

Featured

How to Manipulate Schema in SQL

Schema manipulation in SQL follows a template similar to that of database manipulation.

Featured

Prototypes in UX: Types and Best Practices

By prototype in the field of data-driven UX design, we mean a fast and simulated implementation of the solution idea.

We agree with all approaches...

Featured

How to Integrate JavaScript into a Web Page

In this blog post, we’ll discuss how to integrate JavaScript code into a web page created using HTML.

Featured

How to Read and Write Files in Python

In this post, we’ll teach you how to read and write files using Python.

Featured

What Is the Jakarta Persistence Entity Bean?

Entity beans, also known as persistent objects, have a key property that distinguishes

Web Development

What Is a Click Dummy in Web Design?

When you present a screen flow for evaluation by a group of users, most people will have a tough time imagining how using the tool will feel to them...

Web Development

What Is a Rapid User Test in Software Development?

Curious how to get user feedback faster than ever? Discover the ins and outs of rapid user testing—an efficient, cost-effective way to refine your...

Featured

Understanding HTML Character Encoding: Why UTF-8 Matters

Ensure your HTML documents display special characters correctly by understanding character encoding and why UTF-8 is the preferred standard for...

Featured

What Are the Most Popular Programming Languages and Which Should You Learn?

In addition to the basic differences between the individual programming languages, beginners may wonder what a programming language is at all, what...

Featured

How to Authenticate the Nest CLI

For authentication, Nest uses an established library—Passport—and integrates it into the framework via an abstraction layer.