With the new website, the presentations below have (at least temporarily) lost their home. So, they are being archived for the time being here.
The EJB programming model as well as common J2EE design patterns such as the Value Object Pattern impose a non Object Oriented structure on the resulting applications. This lack of Object Oriented structure exists because:
- relationships between business objects (represented by EJBs) are not modeled as object relationships but as foreign keys, and
- coarse grained ValueObjects are great for performance but are in effect simple data structures that lack the behavior commonly associated with Objects.
This seminar will introduce the Domain Facade pattern that solves the above-mentioned problems without sacrificing any performance or compliance with the specifications. J2EE applications developed with the Domain Facade pattern adhere more closely to Object Oriented Principles and are therefore easier to develop, understand, and maintain. Numerous source code examples will be provided.
The JavaTM Authentication and Authorization Service is a powerful new security library integrated with the J2SE 1.4 platform. The pluggable nature of the authentication API allows applications to utilize technologies such as Solaris NIS, Windows NT security, LDAP, Kerberos, and others with ease. And the authorization service guards access to sensitive resources based not only on the code being executed but also on the user running the code. This seminar will cover the basics required to harness this technology to secure your applications as well as more advanced topics such as developing custom LoginModules, implementing your own LoginConfiguration, extending the default Policy, and creating your own Permissions. Fully functional source code examples will be provided and demonstrated.
For many enterprise level applications, the important question is not whether a user can call a particular method on a particular class, but whether that user can call that method on a particular instance of the class — not whether Jack can edit an order, but whether Jack can edit Susan?s order. That is instance based security. This session will cover all relevant Java security APIs (such as JAAS) as well as ways to extend those security APIs to implement instance based security in Java. The instructor will provide code examples as well as a fully functional demonstration of all presented concepts. J2EE developers have long felt the painful absence of instance based security from the J2EE specification. This seminar helps soothe that pain.
Object Reuse has long been the elusive holy grail of software development. Some are even beginning to question its existence. But this seminar will reveal two production examples of successful large-scale object reuse and provide a road map for others to follow. A capability/maturity model for object reuse will be presented along with examples of practices typically found at each maturity level. The role of practices such as software configuration management (SCM), build management, dependency tracking, branching, and refactoring will be presented. This seminar will conclude with an examination how object reuse was successfully put into practice at two companies (Alamo and FedEx Custom Critical).
Java 2 Enterprise Edition offers a great platform for developing enterprise level applications. Unfortunately, too often the success of J2EE projects is threatened by poor performance. This seminar presents the results of a benchmark study conducted by Urbancode comparing four different J2EE design patterns. The seminar also covers J2EE architecture best practices that can help you develop high performance as well as maintainable, reusable, and readable code.