Amit Shah

An IT Professional

Google Struggles with Its "Do First, Ask Forgiveness Later" Strategy PDF Print E-mail
User Rating: / 2
There’s an old saying: It’s easier to ask for forgiveness than permission. Few companies embody the concept more thoroughly than Google (GOOG). Boldly undertaking business and dealing later with consequences is as much a part of Google as search algorithms. However, the tactic takes as much from the company as it gives.
Memcached in Zend Framework PDF Print E-mail
User Rating: / 3

What is Memcached

Taken straight from the Memcached website, “Memcached is a high-performance, distributed memory object caching system”. In other words, Memcached helps you increase application perfomance by caching data in memory. Using Memcached to load data instead of a database or file system can have a major impact on your applications performance. (Insert meaningless benchmark term such as “ten-fold” here.) The best part is these benefits only increase as load increases, so you get increase scalability for free.

How Google Works PDF Print E-mail
User Rating: / 2
If you aren’t interested in learning how Google creates the index and the database of documents that it accesses when processing a query, skip this description. I adapted the following overview from Chris Sherman and Gary Price’s wonderful description of How Search Engines Work in Chapter 2 of The Invisible Web (CyberAge Books, 2001).
Controller vs Model in Zend Framework PDF Print E-mail
User Rating: / 12

The Model-View-Controller

The Model-View-Controller Pattern (or MVC as it's usually abbreviated) is a general solution to the question of how to separate responsibilities in an application in a highly structured manner. The pattern's name mentions all three separations: Model, View and Controller. Although MVC may seem to be one of those esoteric concepts in programming, it's actually quite a simple concept. You pick some nugget of functionality, determine it's purpose, and assign to one of the three separations, and then to a specific class. Once everything is split correctly, you end up with small pieces which are reusable, centralised, accessible, and fit together into building blocks with an abstract API - working now with abstracted APIs makes incremental changes extremely simple (if done correctly of course ;-)). With everything tidily organised into objects with specific responsibilities the cost of change is normally reduced significantly (which is really the whole point - we want change to be cheap, easy and horror free).
On the Security of PHP - Part 1 PDF Print E-mail
User Rating: / 4
PHP has achieved a stable and solid presence on the Web in the last several years, and its popularity as a server-side scripting language is only increasing. Its primary use is for providing dynamically generated interfaces between Web users and the host. As such, PHP scripts fall a natural prey to many Internet attacks. Despite the fact that the language is designed with security in mind, a familiarity with its more dangerous aspects and conformance to common secure programming guidelines is essential to minimizing the possibility of security compromises. The aim of this document is to provide an overview of various security issues with PHP and to offer advice on secure PHP programming practices.
<< Start < Prev 1 2 3 Next > End >>

Results 1 - 9 of 21

Tag Here