In the first part, we looked at the basic mechanics of MySQL and Couchbase Server 2.0, and compared the ways in which you would model the data, and how the basic queries and lists of records operate, from the MySQL SQL statement, to the Couchbase Server View.
The data-centric development features of Adobe Flash Builder 4 allow you to connect to your Flex applications to multiple back ends with minimal coding, but the database introspector for PHP takes it to a whole new level by generating back end sample code. This article introduces the database introspector and how to use it to build a Flex application.
This article discusses: * Setting up automatically updated slaves of a server based on a SQL dump * Setting up automatically updated slaves of a selection of tables based on a SQL dump * Setting up automatically updated slaves using data file copy * Sharing read load across multiple machines
Many web developers consider security a low priority. Security is frequently relegated to the end of the software development life cycle, as little more than an afterthought. Sometimes, software security is neglected entirely, resulting in applications rife with common vulnerabilities. Because such bugs might manifest only under conditions present during an attack, they can be hard to detect prior to such events without knowledge of how the exploitation process works. Using a web application built with jQuery Mobile, PHP, and MySQL, this tutorial shows how many types of vulnerabilities occur along with common methods of exploitation and, most importantly, their respective countermeasures.
This article present techniques to help prevent the gaming of your MySQL-PHP Website. Some of them rely on shutting down scripts; others try to find the humans who are manually executing this behavior.
This two-part article shares some of the lessons learned and take you step by step through a standard process of scaling your PHP-MySQL application based on real-world experiences at Digg, TripAdvisor, and other high-traffic sites.