(Alejandro Gervasio) Here we are again. This is the tutorial you’ve been waiting for! Welcome to the last part of the series “Abstract classes in PHP.” If you’ve already read the previous articles, then you’ll know that this series introduces the basics of abstract classes in PHP 4/PHP 5, and illust
Tag: Development
Help fellow developers by writing useful documentation
(Tony Patton) Every developer knows what it’s like to have to make changes to an existing application. It is the true test of a developer’s skills to reverse engineer a previous team’s thinking. One thing that can really hinder this process is when there’s no documentation and all the developers inv
Securing your web application against dangerous request
(Abey George) While programming with web applications it is common to split the task to different pages. Most of the times we will have to pass parameters to other pages using query string and sometimes it is the only viable method to accomplish certain tasks. You can pass values to other pages usi
Deriving Order from Chaos: Creating an Information Integration Strategy
(Dennis Cahill) Disconnected departmental knowledge systems make it difficult for employees to find the information they need to make critical decisions. Marketing portals, CRM (customer relationship management) systems, financial tracking systems and collaboration solutions are important tools, yet
Understanding Access Modifiers in VB 2005
(Paul Kimmel) Access modifiers in Visual Basic .NET are represented by the four words—public, protected, friend, and private—that support a cornerstone of object-oriented programming (OOP): encapsulation. Encapsulation supports information hiding, and the general purpose of an access modifier is to
Data Access for Partially Connected Applications
(Markus Egger) All but the simplest applications store data in a central location and access it over a network. However, in many scenarios, distributed applications cannot assume a certain kind of network connection, both in terms of performance and reliability. In scenarios where users access their
Authorization and Programmatic Impersonation
(Sonu Chauhan) If your application uses Forms or Passport authentication, you can impersonate the anonymous Internet user account associated by IIS with your application’s virtual directory. You can impersonate the original caller, which might be the anonymous Internet user account or a fixed identi
TGIF: The .Net framework – an architectural overview
(george.p.alexander) Coming back to where we left off in my last article, this is the next part of my presentation for the Java developers in my team. This article will have a focus on the .Net framework from an architectural perspective.
Security Features in ASP.NET – Authentication
(Cynthia Carolina) Security is one of the primary concerns for both developers and application architects. As there are lots of different types of website with varying security needs, the developers need to know how the security works and choose the appropriate security model for different applicati
Self-Healing Application Architecture, Part 1
(Ira W. Whiteside) This two-part series will address areas of opportunity for implementation of the specific data profiling constructs to create datamaps and support the creation of a self-healing application architecture. A datamap is an iconic display grid that highlights data quality problems and