Articles Written by Eugene Mayevski

Choosing the Right Storage for Application Data

Suppose you have to develop software for managing a custom storage of end-user documents and files. There are several approaches to data storage possible. Right choice of data storage technique will make your software versatile, robust and scalable, while mistakes made at this step will cause additional expenses, loss of competitive qualities and, of course, clients. This article discusses the advantages and disadvantages of each technique.

FTPS vs. SFTP: What to Choose

FTP over SSL (FTPS) and SFTP (SSH File Transfer Protocol) are the most often used and confused protocols for secure file transfer. Learn about both of them and evaluate their pros and cons.

Securing PDF documents

Review of encryption and signing schemes, offered by PDF specification and supported by PDF management tools and components.

An Introduction to SSL

Learn some of the details on how the Secure Socket Layer (SSL) works in providing security to your Web site's data transfer.

Distributed Applications, the Easy Way

There are many ways of transferring data from one process to another. Learn a way to have a flexible data exchange system and to avoid going deep into technical details.

Top White Papers and Webcasts

  • U.S. companies are desperately trying to recruit and hire skilled software engineers and developers, but there is simply not enough quality talent to go around. Tiempo Development is a nearshore software development company. Our headquarters are in AZ, but we are a pioneer and leader in outsourcing to Mexico, based on our three software development centers there. We have a proven process and we are experts at providing our customers with powerful solutions. We transform ideas into reality.

  • When individual departments procure cloud service for their own use, they usually don't consider the hazardous organization-wide implications. Read this paper to learn best practices for setting up an internal, IT-based cloud brokerage function that service the entire organization. Find out how this approach enables you to retain top-down visibility and control of network security and manage the impact of cloud traffic on your WAN.

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date