Archive for June, 2009

Web Services and Security

June 16, 2009

System-level security allows for restricting access to the web services from unauthorized clients. It is done in a declarative fashion, whereas application-level security is more flexible. With system-level security, you will most likely have the list of authorized clients’ IP addresses that you will let access your web service through the use of some configuration-management [...]

Tags: ,
Posted in Security 18 Comments »

What are Triggers?

June 16, 2009

A trigger is a special type of stored procedure that executes when a specified DML operation (an INSERT, DELETE, or UPDATE, or any combination thereof) occurs. They’re typically used to ensure that business rules are followed or to do other work when a data modification occurs. A trigger is the SQL equivalent of a 3GL [...]

Tags: ,
Posted in Database 2 Comments »

Advantages and Disadvantages of Wireless Internet Architectures

June 16, 2009

Advantages
The following are the key advantages of wireless Internet (thin client) architecture:

Minimal to zero software deployment. This allows applications to be deployed without any additional client-side configuration. Updates to these applications are also straightforward since only the server has to be updated.
Extends Internet computing model. Many corporate applications are based on the Internet model. Wireless [...]

Tags:
Posted in Mobile Technology 2 Comments »