David Brumbaugh

David Brumbaugh is CTO of SaaS provider 3B Alliance, LLC, and owner and technical director of Pazzam Studio, a producer of HTML5-based family games. He’s been involved in Internet development since 1994. His articles have been published by C/C++ User's Journal, PC Techniques and John Wiley & Sons. David specializes in software design in PHP/mySQL, HTML/Javascript, C++ and C#/SQL Server, focused on application security, eCommerce, social media programming and game development.

Resources for Building Web Apps in a BYOD World

BYOD
Web apps are probably the closest programmers are going to get to the “write once, deploy anywhere” ideal. These apps are best suited for users that need to collaborate, share, publish and/or distribute data. Often, the “heavy lifting” for a Web app is done on the server side. They’re available anywhere there’s a Web browser and an Internet connection. This makes them ideal for a BYOD environment. No matter which device a user is carrying, it will have some form… continue…

WordPress as a Secure Application Framework

WordPress-Thumbnail
Many people know about WordPress as “that blog site.” Those who recognize that it’s open source know it primarily as “blog” software. However, more accurately put, WordPress software is a full “publishing platform.” According to W3Techs, over 20 percent of all websites use the WordPress content management system. There are several good reasons for this: It is a mature platform. It’s been around since 2003. At its core it’s simple to use. Its target audience is primarily content publishers, not… continue…

Web Development UI: Managing Complexity with jQuery

jQuery-Thumbnail
UI Paradox Creating a “Good” User Interface is a matter of balancing competing needs. It’s part art, part science and all work. Users expect a lot of functionality, yet also demand simplicity. A familiar UI is one where the key features are already well-understood. However if it’s too familiar, the UI could be seen as boring. Users want a UI that is intuitively obvious, to them. For the developer, the problem is that intuition is very much a matter of… continue…

Developing Cloud-Based SaaS Web Applications

Cloud computing
The demand for Web development skills needed to design, build and deploy Software as a Service applications should continue to increase over the next several years as more companies seek solutions tailored to the capabilities of the cloud. According to SaaS blogger Dave Key, designing software for SaaS is fundamentally different from designing software for the more traditional client/server model in terms of architecture, user interface design and the exposure and use of APIs. Key points to consider: Design for… continue…

Adding Custom Fonts to Your Web Pages

Typeface
The Need for Custom Web Fonts On the Web, fonts have traditionally been limited to those regarded as “Web safe,” which in turn leads to something of a generic look to most company pages. Fonts — that is, the style in which letters, numbers, punctuation and special characters are visually presented — have long been a way in which brands and businesses  distinguish themselves in the marketplace. For example, the distinctive Coca Cola font has been nearly unchanged for over… continue…

Finding and Fixing Ajax’s Elusive Bugs

Ajax Thumbnail
Let’s start with some background. Google was an early pioneer of the Web development technique called “Ajax.” Ironically, when you Google the phrase “What is Ajax?” the search engine comes back with A Greek hero of the Trojan war, son of Telamon, king of Salamis. He was proverbial for his size and strength.  In Web development, however, AJAX is an acronym for Asynchronous JavaScript And XML. It’s a technique for refreshing only part of a Web page — rather than… continue…

A Brute Force Defense Against Injection Attacks

Injection
Injection attacks are a common security problem for Web developers. The interpreted nature of most development languages makes them especially vulnerable to these attacks. This article explains what an injection attack is and provides some simple steps that you can take to defend your site against them. What is an Injection Attack? An injection attack takes place when a malevolent programmer puts code in the query string or other parts of the HTTP request. The interpreter executes the malicious code,… continue…