Author: Ivo Andreev

Web Security Threats and Solutions

Web Security Threats and Solutions

Have you heard the words : "Why would anyone hack me?". Sec...


To TOGAFor not to TOGAF

To TOGAFor not to TOGAF

TOGAF, Enterprise Architecture


The two faces of sql parameter sniffing

The two faces of sql parameter sniffing

MS SQL parameter sniffing (or "Bind Variable Peeking" in Or...


Артериални заболявания_Сити Клиник

Артериални заболявания_Сити Клиник

Диагностика и лечение на съдови заболявания в Сити Клиник....


Катетърна аблация_Сити Клиник

Катетърна аблация_Сити Клиник

Научете повече за аритмиите (учестен пулс) и различните фор...


Scalability and Real-time Queries with Elasticsearch

Scalability and Real-time Queries with Elasticsearch

Elasticsearch is designed to easily scale and lay the found...


Project Management with Atlassian

Project Management with Atlassian

Project Management guide for using Atlassian Tools Jira and...


Practical SQL query monitoring and optimization

Practical SQL query monitoring and optimization

Practical SQL query monitoring and optimization Today the p...


Js Saturday 2013 your jQuery could perform better

Js Saturday 2013 your jQuery could perform better

Doing it, then doing right and finally improving. Have you...


Going Beyond Cross Domain Boundaries (jQuery Bulgaria)

Going Beyond Cross Domain Boundaries (jQuery Bulgaria)

Same-origin policy is an important security concept of the...


Data Warehouse Design and Best Practices

Data Warehouse Design and Best Practices

A data warehouse is a database designed for query and analy...