Slide 8
Slide 8 text
DATA CORRUPTING ARCHITECTURES WE KNOW AND LOVE
WE COULD GET MORE DETAILED STILL…
REQUEST
to the
APPLICATION
on to the
DATABASE
back to the
APPLICATION
and out as a
RESPONSE
(WEB BROWSER)
to the
(WEB SERVER + DEVELOPER CODE)
on to the
DATABASE
back to the
(WEB SERVER + DEVELOPER CODE)
and out as a
(WEB BROWSER)