Evaluating web frameworks

Abundance

Article from Issue 145/2012
Author(s):

Stop re-inventing the wheel and build your web applications with the excellent tools already available.

One theme I’ve noticed in many large web applications is badly reinvented wheels. I suspect a lot of this is caused by the “not invented here” syndrome or by developers who want to avoid external dependencies (portability is nice). The problem is that virtually all web applications have a rather complex set of requirements and security needs that often are not implemented well (if at all). And, a lot of us who have been programming web applications for more than a decade might still be a bit mentally stuck in the 2000s, when a little HTML and some form fields were all you needed to make an “interactive” site that actually worked quite well. Conversely, I can’t help but think newer programmers aren’t aware of all the problems already discovered and solved in frameworks during the past decade and a half.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • KDE Frameworks 5

    For the past three years, 20 developers have been working on a revamped version of the KDE libraries. The alpha release appeared in February 2014 with many new features.

  • Security Lessons: OpenShift

    OpenShift and other PaaS products can help take some of the work out of deploying and managing systems.

  • Security Lessons: Database Security

    Your database can be one of the most vulnerable elements in your organization. We share some tips for detecting and preventing attacks.

  • Security Lessons

    Although you give up control of the underlying infrastructure when you use cloud computing, you can still maintain some control over security.

  • Security Lessons: Disposable Computers

    One way to avoid having your personal information stolen is to use a disposable computer set up for sensitive operations.

comments powered by Disqus

Direct Download

Read full article as PDF:

054-055_kurt.pdf (205.74 kB)

News