Mahesh K Punjabi

Subscribe to Mahesh K Punjabi: eMailAlertsEmail Alerts
Get Mahesh K Punjabi: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Mahesh K Punjabi

With the onslaught of mobile devices and platforms from multiple vendors, the current technology underpinnings of mobility solutions are in a state of flux. With the hype surrounding the hardware and software offerings across the mobility solutions, it's a challenge for enterprises to differentiate between the offerings and also to plan for enterprise mobility strategies. Across the solutions, however, there are four distinct patterns that have emerged, which are fundamental to the underlying architecture of various mobility solutions. Each of these patterns solves a broad use case and has their own advantages and disadvantages. Understanding these patterns enables enterprises to evaluate multiple solution offerings, compare the pros and cons and also determine a mix of technologies that they can adopt for strategic mobile offerings. This article presents multiple b... (more)

Architecture Evaluation Framework for ORM Technologies

Object Relational Technologies form the backbone of most of the enterprise Java applications. Choosing the appropriate technology however is one of the most important decisions for an enterprise architect. More often than not, such a decision is either a hit or miss. Mistakes done in selecting the appropriate technology results in performance bottlenecks, lack of scalability, unreliable transaction handling etc. More than the problem with the specific ORM technology, it's the suitability of that technology to the underlying business needs and non-functional requirements. This ar... (more)

Common Web Application Security Vulnerabilities and Mitigation

Web applications are vulnerable to a multitude of security attacks. This exposes the underlying businesses and the consumer data to public view. However it is a common observation that web developers hardly take any preventive steps to secure their web applications. Most of the time web application developers focus only on authentication and authorization to secure the web applications. This may be a viable approach for designing an intranet application. However, for the Internet application, multiple programming practices need to be followed to prevent such attacks. This article... (more)