Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of thomasortegaii

thomasortegaii

Send thomasortegaii an email

Latest from thomasortegaii

  • Application Design: Dynamically change state and city drop-down boxes with DHTML
    Developer

    Application Design: Dynamically change state and city drop-down boxes with DHTML

    Application developers can integrate JavaScript, ColdFusion, and DHTML to create dynamic drop-down selection boxes where the information in one data array is determined from the choice made in another array. Here is the code that shows you how to do it.

    thomasortegaii
    Published:  March 17, 2004, 12:00 AM PST Modified:  June 8, 2007, 9:50 AM PDT Read More See more Developer
  • Web application security frameworks, part 5: Wrap-up
    Cloud

    Web application security frameworks, part 5: Wrap-up

    Often you will want parts of your Web application to be exclusive to certain users. Continuing our series on Web application security, we explore the decision making criteria for determining the proper security framework for your particular situation.

    thomasortegaii
    Published:  January 28, 2004, 12:00 AM PST Modified:  June 8, 2007, 9:49 AM PDT Read More See more Cloud
  • Web application security frameworks, part 4: Digital certificates
    Security

    Web application security frameworks, part 4: Digital certificates

    Often you will want parts of your Web application to be exclusive to certain users. This access distinction requires the use of Web application security frameworks. We explore digital certificate authentication in this continuing series.

    thomasortegaii
    Published:  January 15, 2004, 12:00 AM PST Modified:  June 8, 2007, 9:49 AM PDT Read More See more Security
  • Web application security frameworks, part 3: Operating system level authentication
    Project Management

    Web application security frameworks, part 3: Operating system level authentication

    Often you will want parts of your Web application to be exclusive to certain users. This access distinction requires the use of Web application security frameworks. Continuing our series on Web app security, we explore OS level authentication.

    thomasortegaii
    Published:  January 5, 2004, 12:00 AM PST Modified:  June 8, 2007, 9:48 AM PDT Read More See more Project Management
  • Web application security frameworks, part 2: Database lookup
    Data Management

    Web application security frameworks, part 2: Database lookup

    Often, you will want parts of your Web application to be exclusive to certain users. This access distinction requires the use of Web application security frameworks. Continuing our series on Web app security, we explore the database lookup framework.

    thomasortegaii
    Published:  December 8, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:48 AM PDT Read More See more Data Management
  • Web application security frameworks, part 1: Introduction
    Collaboration

    Web application security frameworks, part 1: Introduction

    Often you will want parts of your Web application to be exclusive to certain users. This access distinction requires the use of Web application security frameworks. This first article in the series introduces you to the three most often used methods.

    thomasortegaii
    Published:  November 26, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:48 AM PDT Read More See more Collaboration
  • Application development: Get details on the cflogin tag in ColdFusion MX
    Security

    Application development: Get details on the cflogin tag in ColdFusion MX

    Through the tag, ColdFusion MX provides a mechanism for authenticating users of your Web application. See how this simple tag can speed up development time by creating reusable username and password methods.

    thomasortegaii
    Published:  November 21, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:48 AM PDT Read More See more Security
  • Cache complex Web service objects with ColdFusion
    Enterprise Software

    Cache complex Web service objects with ColdFusion

    Sometimes software development in an enterprise requires reconciling what is desired with what is doable. See how the flexibility of ColdFusion MX and caching was used to get the best Web service possible even with a legacy system.

    thomasortegaii
    Published:  October 24, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:47 AM PDT Read More See more Enterprise Software
  • Optimizing interaction between CFMX and BEA WebLogic
    Developer

    Optimizing interaction between CFMX and BEA WebLogic

    A Web service application that takes too long to run can be a project breaking problem. In such situations, optimization is a must. See how one developer overcame bottlenecks in ColdFusion MX to cut response times to less than thirty seconds.

    thomasortegaii
    Published:  September 29, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:47 AM PDT Read More See more Developer
  • Avoid CFMX/BEA WebLogic pitfalls in your Web service
    Enterprise Software

    Avoid CFMX/BEA WebLogic pitfalls in your Web service

    Any Web service implementation is going to see its share of gotchas, and Web services developed with ColdFusion MX and BEA WebLogic are not immune. Minimize your efforts by learning from the problems one developer encountered in his implementation.

    thomasortegaii
    Published:  September 11, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:46 AM PDT Read More See more Enterprise Software
  • 1
  • 2
  • Next
11 results

TechRepublic Premium

  • TechRepublic Premium

    Hiring kit: Business information analyst

    PURPOSE A large segment of internal and external modern business now takes place on computers, tablets and other mobile devices. The information technology infrastructure that has sprung up around that business can be daunting in its scope. This Hiring Kit from TechRepublic Premium provides an adjustable framework your business can use to find, recruit and ...

    Provided By TechRepublic Premium Published:  Mar 2023 Modified:  Mar 2023 Read More
    View This Now
  • TechRepublic Premium

    Grant writing guide

    PURPOSE This grant writing guide from TechRepublic Premium will help you identify a grant that fits your idea, build a team to help you compile a proposal, and set a timeline to meet the application deadline. From the guide: BEFORE YOU START This list of steps will help the grant writing process go more smoothly. ...

    Provided By TechRepublic Premium Published:  Mar 2023 Modified:  Mar 2023 Read More
    View This Now
  • TechRepublic Premium

    Guidelines for building security policies

    PURPOSE These guidelines from TechRepublic Premium will help you define the necessary ingredients of a security policy and assist in its proper construction. They’re designed to work hand in hand with the subjective knowledge you have of your company, environment and employees. Using this information, your business can establish new policies or elaborate on those ...

    Provided By TechRepublic Premium Published:  Mar 2023 Modified:  Mar 2023 Read More
    View This Now
  • TechRepublic Premium

    Hiring kit: Artificial intelligence architect

    PURPOSE Recruiting an Artificial Intelligence Architect with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit from TechRepublic Premium provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job. From the hiring kit: DETERMINING FACTORS, DESIRABLE PERSONALITY ...

    Provided By TechRepublic Premium Published:  Mar 2023 Modified:  Mar 2023 Read More
    Learn More

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice