Core PHP and PHP frameworks: comparative analysis of two approaches for backend development
The advantages and disadvantages of PHP web development using Core PHP and PHP frameworks. Security and performance are investigated. The recommendations on using both approaches. The structure of application and key development things are highlighted.
Подобные документы
The current state of application and development of cloud computing, the main advantages and disadvantages of their use in the states, enterprises and in scientific activity. Guidance documents in the field of cloud computing information security.
статья, добавлен 23.10.2020This paper explores the development and application of a long-short-term memory model for virtual distributed system control optimization using the TensorFlow and Keras frameworks. In the context of the rapid development of information technologies.
статья, добавлен 18.09.2024Сравнение 18-ядерного Core i9-7980X и 16-ядерного Core i9-7960X. Рассмотрение возможностей нового процессора на базе Intel. Определение преимуществ ячеистой структуры процессора. Тестирование 18-ядерного процессора Core i9 на производительность.
реферат, добавлен 11.12.2017The comparison of the computer development in the USA and Ukraine. At the time when the computer science was just uprising this two countries were one of the most noticeably influential. Howard Aiken's contributions to the development of the computer.
эссе, добавлен 13.09.2011Features a combination of different approaches to work with sets of objects, their classes to the design and development of artificial intelligence systems to analyze information using object-oriented programming. Determining properties of object class.
статья, добавлен 28.02.2016Cyberspace as a medium through which people engage in more complex processes. The history and development of information security principles in the World Wide Web, an assessment of their effectiveness in practice, the prospects for further development.
реферат, добавлен 24.03.2015Characteristics and features of the information society. Advantages and disadvantages of virtual life in the digital world. Development of computer technologies and network security tools. Discussion of problems and tasks in the field of cybersecurity.
статья, добавлен 01.12.2017Problems of security of biometric authentication systems and analysis of the author's approach to increasing their reliability. Features and conditions of use of these systems for the security of information resources, their advantages and disadvantages.
статья, добавлен 06.05.2018- 9. Gamifying "Whole-person education": the development of a mobile application with augmented reality
Description of the development of a gaming mobile application that integrates augmented reality. Augmented reality and gamification "Formation of a holistic personality" as educational strategies in learning in the period of innovative technologies.
статья, добавлен 11.07.2023 Rapid application development - a software approach of construction of end-user products in conditions of changing user requirements and limited time resources. Specific features of high-level description of Framework for domain data organization.
дипломная работа, добавлен 13.07.2020Assessing the acceptability of the developed Integrated Development Environment (ICP). C-SOLVIS as a web-based application designed to facilitate the process of teaching and learning the basics of programming in higher education institutions in Malaysia.
статья, добавлен 11.07.2023The elements of computer security. Cryptography approaches and attacks. An advanced encryption standard. Key generation and distribution approaches and attacks. The qualities of workable security solutions. The trusted platform module at biometrics.
книга, добавлен 08.03.2014The creation of an intuitive family tree on the basis of the online service Coggle, which is designed to develop mental maps. The main criteria that should be in the program for mobile application development. Structure of the mobile application.
статья, добавлен 06.06.2023Будова двоядерного процесору Intel Core i5-650 та особливості його специфікації. Intel Turbo Boost - механізм інтелектуального налаштовування характеристик процесора під потрібні параметри. Будова комп’ютера на базі мікропроцесора Intel Core i5-661.
реферат, добавлен 11.03.2011The overview of the development of systemic therapy, which arose on the basis of general systems theory. An analysis of the viewsof the biologist Ludwig von Bertalanffy, as well as the concept of cybernetics developed by Norbert Wiener and W. Ross Ashby.
статья, добавлен 18.10.2021Using C ++ Builder to create a binary file. The development of a dynamic array structure of the binary data using the individual functions, located in the library user. The general analysis of the data. Create screensaver with information about the task.
курсовая работа, добавлен 13.07.2014Problems of creation and application of the original mechanism of cataloging of digital information resources ISO 15836: 2003. Initiation of multiple metadata Dublin core, which is used for system-wide description of electronic information resources.
статья, добавлен 05.03.2023Characteristics of the segment of cloud technologies in Russia, an analysis of their advantages and disadvantages. The main types of cloud services models, the problems of their use (confidentiality, security). Preferences of using clouds in Russia.
статья, добавлен 06.05.2018Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.
статья, добавлен 27.10.2020- 20. Task models
Methods to analyse people's jobs. Approaches to task analysis. Development of the script processing, review grammar. Description of the procedure subtasks, hierarchical evaluation tasks using temporary operators. Refinement description of the model.
лекция, добавлен 28.12.2013 - 21. National cyber security system of Ukraine: perspectives of policy development and capacity building
The main need is to build a national cybersecurity system that will allow Ukraine to counter current cyber threats to its security, stability and prosperity. Characteristics of identifying the main problems that hinder the further development of NCSS.
статья, добавлен 03.12.2020 Analysis of data mining systems, development of document management systems. Development of an integrated system for intelligent information analysis. A model for using various statistical data of any format in the source of a digital organization.
статья, добавлен 01.02.2024Analysis of the widespread approach to modeling and verification of systems, known as Model Checking, which allows to identify errors at different stages of development and maintenance of territorial development programs in order to eliminate them.
статья, добавлен 30.04.2018Analysis of the influence of information processes on the development of the state. The use of computer technology in the banking sector. Development of an automated terminal monitoring system and a database management system. Thin client functions.
статья, добавлен 26.01.2021Research and analysis of ways to solve the problem of reducing the expressions obtained in solving the naval system. Structure of Stokes equations. Development and analysis of an equivalent reduction algorithm based on the theory of chain fractions.
статья, добавлен 22.12.2016