Encyclopedia

JHipster

JHipster: the framework suite for modern websites

Framework use has become an integral part of modern web development. Designing back and front ends based on ready-made basic structures saves a lot of time. The website generator JHipster is an interesting solution that uses several tools to create server-and-client-side components. Which components distinguish the suite and how to install and use the software for your own project will be...

What is a CDN (Content Delivery Network)?

What is a CDN (content delivery network)?

If your online project is growing and beginning to attract international customers, the workload of your server is also increasing. High user numbers and the large geographical distribution of the clients result in ever-increasing loading times and slow transfer rates. By using a CDN (content delivery network), you’ll be able to react to increasing demands and optimise your data delivery.

UML: activity diagram

Activity diagrams: clearly present chronological activity processes with UML

UML activity diagrams help you to graphically illustrate the chronological sequence of system processes in object-oriented programming. They show which actions take place in which order to execute an activity. With a finished diagram, you can create code frames using XML transfer. Or do you want to map business processes? We show examples of how to create an activity diagram, which symbols belong...

Agile software development about

Agile development: what it’s all about

If you have ever dealt with modern working techniques, the term "agile development" is certainly already familiar to you. But most don't understand exactly what’s behind it. This is also due to the fact that agile software development itself does not want to be defined and only acts as an umbrella term. Nevertheless, we’ll explain its ways to you!

Create outlook rules

Create Outlook rule: a step-by-step guide

A tidy mailbox is the basis of professional e-mail communication. With Outlook “Rules and Alerts” you keep track and ensure that important requests are processed promptly. We will explain how to set up the appropriate automatic rules using illustrated step-by-step instructions.

Newsletter KPIs: indicators in e-mail marketing

Click rate & opening rate – newsletter KPIs in e-mail marketing

In e-mail marketing, KPIs (Key Performance Indicators) are extremely important for analysing campaigns. Various indicators can help you to determine the final success rate of your marketing activities. But how exactly can you measure metrics like a newsletter’s conversion rate, opening rate, and click-through rate? And which other KPIs are important?

REST: the HTTP solution for web services

Resource-oriented web services based on REST

Combining different application systems has become increasingly important over the past few years. This trend is especially due to the increasing number of web applications being developed. In order to react to this trend, many different web services were developed that make data transfer across multiple systems possible. The Representational State Transfer (REST) is an architectural style that...

URL: What is a Uniform Resource Locator?

URL: definition and areas of application

The Uniform Resource Locator (short: URL) is one of the basic standard tools of the internet. URLs make it easy to uniquely identify resources on the internet and find their location. Internet users use webpage URLs to surf the web, follow hyperlinks or download files. The concept is based on a human tangible syntax that is automatically read out and interpreted by machines.

SCTP

SCTP (Stream Control Transmission Protocol) – the reliable, message-orientated transport protocol

If two computer systems are to exchange data, they must agree on a common protocol basis. For example, the selected transport protocol determines how the information is to be transferred. One of the more recent representatives of this protocol division is the Stream Control Transmission Protocol (SCTP), which the IETF (Internet Engineering Task Force) published in 2000 as an alternative to known...

What is a rootkit?

What you need to know about rootkits

If you ask the IT community which malware is the most harmful, the answer is typically not viruses, worms or Trojan horses. Experts unanimously agree that rootkits pose much greater problems even to experienced users. The rootkit’s special ability is to conceal other malware and thereby enable cybercriminals to misuse others’ computers for their own criminal activities undetected – such as for bot...


Wait! We’ve got something for you!
Get your .co.uk domain now, the first year is free.

Enter the web address of your choice in the search bar to check its availability.
12 month for £0/year
then £10/year