Summary


Here are the main points of this chapter:

  • The business application fortress design is critical to your overall enterprise architecture.

  • Business application fortresses are built on components and component-oriented middleware (COMWare).

  • The main benefits of COMWare are automatic transaction boundary management and fortress wall reinforcements through role-based security.

  • The automatic transaction boundary management algorithms lead to the golden rule: Component-level methods should be self-contained transactions.

  • The golden rule implies that state should be read in and flushed out within the method.

  • Components following the golden rule and managing their state correctly will be amenable to high levels of reliability and scale-out scalability through the use of loosely coupled clusters.

  • Be careful to distinguish between object-level methods and component-level methods.

  • Avoid putting unnecessary workload in the form of stored procedures in the database.

  • Use .NET where low cost is important.

  • Use .NET where support for non-Java-like languages is important.

  • Use J2EE where support for official Java is important.

  • Use J2EE technologies where non-Windows platform support is important.



Software Fortresses. Modeling Enterprise Architectures
Software Fortresses: Modeling Enterprise Architectures
ISBN: 0321166086
EAN: 2147483647
Year: 2003
Pages: 114

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net