Case Study – Implementing an HTML5/JavaScript Enterprise Java Application

David Pitt Architecture, Articles, Development Technologies & Tools, HTML5, Java, JavaScript, Keyhole Creations 4 Comments

Attention: The following article was published over 12 years ago, and the information provided may be aged or outdated. Please keep that in mind as you read the post.The Keyhole team has had recent engagements that involve applying HTML5 technology to create rich client web applications. In order to explore and validate application architecture design patterns and best practices in …

The Data Access Layer, Part 2 – Using the Criteria API

Mark Adelsberger API Development, Architecture, Articles, Tutorial 3 Comments

Attention: The following article was published over 13 years ago, and the information provided may be aged or outdated. Please keep that in mind as you read the post.In Part One of this series, I reviewed the basic design goals of a Data Access Layer (DAL), those being: Contain all of the information about the persistence mechanism; and Contain none …

The Data Access Layer, Part 1 – The Basics (And When Things Aren’t So Basic)

Mark Adelsberger Architecture, Articles 5 Comments

Attention: The following article was published over 13 years ago, and the information provided may be aged or outdated. Please keep that in mind as you read the post.Today, I’d like to talk about the data access layer (DAL). I’ll start with a brief review: the motivation behind the DAL, the design principles that define a theoretically “good” DAL, and …

Mobile HTML5 Enterprise Application Architecture

David Pitt Architecture, Articles, HTML5, JavaScript, Mobile, Tutorial 10 Comments

Attention: The following article was published over 13 years ago, and the information provided may be aged or outdated. Please keep that in mind as you read the post.If you’re thinking that you can prevent end-user demand for mobility, just remember this: when PCs were first introduced, IT attempted to hold them at bay. How did that work out? Mobile device …

Code Design Decision – Protecting Delegate Access?

David Pitt Architecture, Articles, Consulting Leave a Comment

Attention: The following article was published over 13 years ago, and the information provided may be aged or outdated. Please keep that in mind as you read the post.I ran into a design decision on one my engagements. Consider an abstract class implementation that references another (delegate) object. Convenience methods are in the primary class that are called by concrete classes. This …