Ajax Security & Best Practices
Ajax is perhaps the best known RIA technology today. While several implementations of Ajax have arrived, and many software projects
Read moreAjax is perhaps the best known RIA technology today. While several implementations of Ajax have arrived, and many software projects
Read moreThis discussion looks at the changes Java has undergone and is likely to undergo in the near future. Do these
Read moreDigital signature mimics a pen-paper signature. When we sign on a piece of paper using a pen, we vouch for
Read moreAjax allows us to build Web 2.0 applications with ease. However, it also raises a number of questions. One such
Read moreSince its inception, the Enterprise JavaBeans (EJB) technology has been a bit of an enigma. While almost all other Java/J2EE
Read moreAtul Kahate looks at Unicode charater encoding, the facts the myths, the need and the use. He talks of traditional
Read moreThe importance of security is often realized only after an application’s security is breached. One of the reasons why security
Read moreODF versus OOXML has been a widely debated subject of late. What does this mean? Why does it matter to
Read moreIdentity management is one of the most interesting security problems to solve. How do we establish and then confirm the
Read moreThe question of how best to perform user authentication is a puzzle that is quite tough to solve. While newer
Read more
You must be logged in to post a comment.