[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] latency (networks) 2nd layers BLL 2nd business rules classes caching data data objects Web applications versus Windows applications 2nd Windows applications versus Web applications 2nd DAL logical layers User Services wrapper layer USL GUI user processes code Web applications Web applications versus Windows applications 2nd Windows applications 2nd Windows applications versus Web applications 2nd level-0 diagrams (DFD) level-n diagrams (DFD) LicenseManager class LicenseProvider class licensing deployment strategies 2nd Web Service licensing 2nd Web Service licensing deployment strategies 2nd licensing (physical deployment design) .NET Licensing 2nd custom licensing listeners listingOfDates element 2nd load tests. [See performance tests] local network users localizability development strategies localization development strategies 2nd multilingual user interfaces Unicode character encoding multilingual user interfaces Unicode character encoding localization (logical design) localized applications 2nd character displays currency symbols date and time formats keyboard layouts number formats sorting data logging custom loggging 2nd database loggging Event Viewer Application logs 2nd exceptions 2nd physical design 2nd 3rd 4th system activity (development strategies) 2nd 3rd WMI logic errors development strategies logical data models designing columns 2nd 3rd 4th 5th 6th 7th 8th 9th data modeling 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th entities, relationships 2nd 3rd 4th 5th 6th 7th tables 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th XML 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th logical design accessibility UI design requirements architectural models, selecting layers legacy integration 2nd tiers 2nd Web applications versus Windows applications 2nd XML Web services asynchronous processing versus synchronous processing 2nd 3rd 4th BLL 2nd business rules classes caching data data objects Web applications versus Windows applications 2nd Windows applications versus Web applications 2nd case studies analyzing 2nd 3rd DAL exception handling strategies 2nd exceptions logging 2nd tracing 2nd 3rd files auditing globalization 2nd 3rd interaction .NET DataSets 2nd .NET Remoting 2nd 3rd 4th 5th 6th 7th COM 2nd 3rd 4th COM+ XML 2nd XML Web services 2nd 3rd 4th internationalization 2nd 3rd localization logical data models data modeling 2nd 3rd 4th 5th 6th 7th defining relationships 2nd 3rd 4th 5th 6th 7th defining tables/columns 2nd 3rd 4th 5th 6th normalizing tables 2nd 3rd 4th 5th 6th 7th 8th 9th XML 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th proof-of-concept deliverables 2nd security 2nd authentication 2nd 3rd 4th 5th authorization 2nd 3rd 4th 5th encryption 2nd 3rd 4th service architectures 2nd BizTalk Server callbacks Windows services state management Application objects 2nd Cache objects Session objects Web applications 2nd 3rd 4th Windows applications synchronous processing versus asynchronous processing 2nd 3rd 4th system block diagrams USL GUI user processes code Web applications Web applications versus Windows applications 2nd Windows applications 2nd Windows applications versus Web applications 2nd validation accessibility requirements availability requirements deployability requirements extensibility requirements maintainability requirements 2nd performance requirements 2nd scalability requirements security requirements 2nd usage scenarios WMI 2nd logical layers logistics management (MSF project development roles) logon policies (security requirements) logs Event Viewer Application logs 2nd WMI |