Introduction - If you have any usage issues, please Google them yourself
There is no inherent security weakness in Ajax but adaptation of this technology vector has
changed the Web application development approach and methodology significantly. Data and
object serialization was very difficult in the old days when DCOM and CORBA formed the core
middleware tier. Ajax can consume XML, HTML, JS Array, JSON, JS Objects and other
customized objects using simple GET, POST or SOAP calls all this without invoking any
middleware tier.