Evaluating web frameworks

Abundance

Article from Issue 145/2012
Author(s):

Stop re-inventing the wheel and build your web applications with the excellent tools already available.

One theme I’ve noticed in many large web applications is badly reinvented wheels. I suspect a lot of this is caused by the “not invented here” syndrome or by developers who want to avoid external dependencies (portability is nice). The problem is that virtually all web applications have a rather complex set of requirements and security needs that often are not implemented well (if at all). And, a lot of us who have been programming web applications for more than a decade might still be a bit mentally stuck in the 2000s, when a little HTML and some form fields were all you needed to make an “interactive” site that actually worked quite well. Conversely, I can’t help but think newer programmers aren’t aware of all the problems already discovered and solved in frameworks during the past decade and a half.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Security Lessons – Ruby Tools

    Great tools and resources are available to help you write secure Ruby on Rails code. Kurt examines some tools and offers some tips.

  • Security Lessons: OpenShift

    OpenShift and other PaaS products can help take some of the work out of deploying and managing systems.

  • Security Lessons – Hash Maps

    What do all programs have in common? They store data at some point, usually in arrays – everything from commandline options to the input and output. But how is data actually stored by the program? Kurt explains.

  • Security Lessons: Database Security

    Your database can be one of the most vulnerable elements in your organization. We share some tips for detecting and preventing attacks.

  • Security Lessons

    When it comes to security, public disclosure of vulnerabilities and working exploit code is now common. We look at why this can be both harmful and helpful to securing your systems.

comments powered by Disqus

Direct Download

Read full article as PDF:

054-055_kurt.pdf (205.74 kB)

News