Index[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] lagom language, ubiquitous language layering DDD layers 2nd BLL (Business Logic Layer) DAL (Data Access Layer) Layer Supertype Service Layer 2nd example Layer Supertype Lazy Load 2nd 3rd list orders when looking at specific customers NHibernate legacy databases, mapping life cycle of persisitent entities (NHiber-nate) Liskoy Substitution Principle (LSP) list orders for customers 2nd lists of orders, fetching LoadView_test locating set-based processing methods, domain-related rules location of Domain Model of Entity of queries in consumers of Repositories in Domain Model in Repositories location transparency lock enforcement advice, implementing locking aspects, applying to domain objects locking introduction, implementing locks Coarse-Grained Lock Implicit Lock Optimistic Offline Lock 2nd Pessimistic Offline Lock 2nd LockViolationException logging Fake logging advice applying creating logging code modularizing with aspects LSP (Liskoy Substitution Principle) Lundberg, Ingemar 2nd Pragmatism and the Nontraditional Approach background and history overview of the |