Explore >> Select a destination


You are here

www.craigpardey.com
| | www.securityjourney.com
5.4 parsecs away

Travel
| | SQL Injection vulnerabilities are still prevalent. In this article, we will discuss prepared statements, how they work, and how you can implement them.
| | www.eliza-ng.me
6.3 parsecs away

Travel
| | In the world of Java development, one topic that has sparked debate and frustration for many developers is Object-Relational Mapping (ORM). ORM is a technique used to bridge the gap between object-oriented programming languages, such as Java, and relational databases, like MySQL or PostgreSQL. The purpose of ORM is to simplify the data access layer and eliminate the need for developers to write raw SQL queries. However, a recent text expressing strong criticism of ORM on Java, particularly Hibernate, has garnered attention among developers. The author claims that ORM, in general, has always been a disappointing solution. One of the arguments presented is that the ability to use different databases, which was once touted as a selling point of ORM, is a featur...
| | hartenfeller.dev
6.3 parsecs away

Travel
| | APEX_T_VARCHAR2 is a database type that comes with an Oracle APEX installation. I use it quite frequently and think that with it you can write better code.
| | sookocheff.com
41.0 parsecs away

Travel
| Most new applications are built as a single codebase and deployed as a monolith until product-market fit or the need for additional scale is required. Such monolithic applications are easy to write and maintain, and allow you to iterate quickly when there are a smaller number of users and the traffic is low. However, as traffic increases you will need to scale the application to handle the increase in load. One framework for scaling is the "Scale Cube" describe by AKF partners.