Mastering Enterprise Javabeans™

Total Page:16

File Type:pdf, Size:1020Kb

Mastering Enterprise Javabeans™ Mastering Enterprise JavaBeans™ Second Edition Mastering Enterprise JavaBeans™ Second Edition Ed Roman Scott Ambler Tyler Jewell Wiley Computer Publishing John Wiley & Sons, Inc. NEW YORK • CHICHESTER • WEINHEIM • BRISBANE • SINGAPORE • TORONTO Publisher: Robert Ipsen Editor: Robert M. Elliott Developmental Editor: Emilie Herman Managing Editor: John Atkins Associate New Media Editor: Brian Snapp Text Design & Composition: MacAllister Publishing Services, LLC Designations used by companies to distinguish their products are often claimed as trade- marks. In all instances where John Wiley & Sons, Inc., is aware of a claim, the product names appear in initial capital or ALL CAPITAL LETTERS. Readers, however, should con- tact the appropriate companies for more complete information regarding trademarks and registration. This book is printed on acid-free paper. Copyright © 2002 by The Middleware Company. All rights reserved. Published by John Wiley & Sons, Inc. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copy- right Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4744. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 605 Third Avenue, New York, NY 10158-0012, (212) 850-6011, fax (212) 850- 6008, E-Mail: [email protected]. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in professional services. If professional advice or other expert assistance is required, the services of a competent professional person should be sought. Library of Congress Cataloging-in-Publication Data: ISBN: 0-471-41711-4 Printed in the United States of America. 10 9 8 7 6 5 4 3 2 1 To my wonderful wife, Younhi. —Ed Roman CONTENTS Acknowledgments xix Preface xxi Introduction xxv About the Author xxxi Part One Overview 1 Chapter 1 Overview 3 The Motivation for EJB 4 Divide and Conquer to the Extreme 5 Component Architectures 12 Introducing Enterprise JavaBeans 13 Why Java? 14 EJB as a Business Solution 14 The EJB Ecosystem 16 The Bean Provider 17 The Application Assembler 17 The EJB Deployer 18 The System Administrator 19 The Container and Server Provider 19 The Tool Vendors 20 Summary of Roles 20 The Java 2 Platform, Enterprise Edition (J2EE) 22 The J2EE Technologies 23 Summary 26 Chapter 2 EJB Fundamentals 29 Enterprise Beans 29 Types of Beans 30 Distributed Objects: The Foundation for EJB 32 Distributed Objects and Middleware 34 Explicit Middleware 34 Implicit Middleware 35 What Constitutes an Enterprise Bean? 37 The Enterprise Bean Class 37 vii viii CONTENTS The EJB Object 38 The Home Object 44 The Local Interfaces 46 Deployment Descriptors 50 Vendor-Specific Files 51 Ejb-Jar File 51 Summary of Terms 52 Summary 54 Chapter 3 Writing Your First Bean 55 How to Develop an EJB Component 55 The Remote Interface 57 The Local Interface 58 The Home Interface 58 The Local Home Interface 59 The Bean Class 62 The Deployment Descriptor 66 The Vendor-Specific Files 67 The Ejb-jar File 67 Deploying the Bean 68 The Optional EJB Client JAR file 68 Understanding How to Call Beans 69 Looking up a Home Object 70 Running the System 74 The Server-Side Output 75 The Client-Side Output 75 Implementing Component Interfaces 75 A Solution 76 Summary 77 Part Two The Triad of Beans 79 Chapter 4 Introduction to Session Beans 81 Session Bean Lifetime 81 Session Bean Subtypes 82 Stateful Session Beans 82 Stateless Session Beans 83 Special Characteristics of Stateful Session Beans 84 Achieving the Effect of Pooling with Stateful Beans 85 The Rules Governing Conversational State 86 Activation and Passivation Callbacks 87 CONTENTS ix Method Implementation Summary 89 A Simple Stateful Session Bean 89 Life Cycle Diagrams for Session Beans 100 Summary 103 Chapter 5 Introduction to Entity Beans 105 Persistence Concepts 105 Java Object Serialization 106 Object-Relational Mapping 106 Object Databases 109 What Is an Entity Bean? 109 About the Files that Make up an Entity Bean 112 Features of Entity Beans 112 Entity Beans Survive Failures 112 Entity Bean Instances Are a View into a Database 113 Several Entity Bean Instances May Represent the Same Underlying Data 114 Entity Bean Instances Can Be Pooled 116 There Are Two Ways to Persist Entity Beans 118 Creation and Removal of Entity Beans 119 Entity Beans Can Be Found 121 You Can Modify Entity Bean Data without Using EJB 123 Entity Contexts 124 getEJBLocalObject() / getEJBObject() 124 getPrimaryKey() 125 Summary 126 Chapter 6 Writing Bean-Managed Persistent Entity Beans 127 Entity Bean Coding Basics 127 Finding Existing Entity Beans: ejbFind() 129 Bean-Managed Persistence Example: A Bank Account 136 Account.java 137 AccountLocal.java 138 AccountHome.java 138 AccountLocalHome.java 138 AccountPK.java 139 AccountBean.java 143 AccountException.java 156 Client.java 156 The Deployment Descriptor 156 The Container-Specific Deployment Descriptor 161 Setting up the Database 161 Running the Client Program 161 Server-Side Output 162 Client-Side Output 163 x CONTENTS Putting It All Together: Walking through a BMP Entity Bean’s Life Cycle 163 Summary 166 Chapter 7 Writing Container-Managed Persistent Entity Beans 167 Features of CMP Entity Beans 167 CMP Entity Beans Are Subclassed 167 CMP Entity Beans Have No Declared Fields 168 CMP Get/Set Methods Are Defined in the Subclass 170 CMP Entity Beans Have an Abstract Persistence Schema 172 CMP Entity Beans Have a Query Language 173 CMP Entity Beans Can Have ejbSelect() Methods 175 Implementation Guidelines for Container-Managed Persistence 176 Container-Managed Persistence Example: A Product Line 180 Product.java 181 ProductLocal.java 182 ProductHome.java 182 ProductLocalHome.java 184 ProductPK.java 184 ProductBean.java 187 The Deployment Descriptor 191 The Container-Specific Deployment Descriptor 195 Client.java 196 Running the Client Program 196 The Life Cycle of a CMP Entity Bean 200 Summary 200 Chapter 8 Introduction to Message-Driven Beans 201 Motivation to Use Message-Driven Beans 201 The Java Message Service (JMS) 203 Messaging Domains 204 The JMS API 206 Integrating JMS with EJB 211 What Is a Message-Driven Bean? 212 Developing Message-Driven Beans 214 The Semantics 214 A Simple Example 215 Advanced Concepts 223 Message-Driven Bean Gotchas 225 Message Ordering 225 Missed ejbRemove() Calls 226 Poison Messages 228 CONTENTS xi How to Return Results Back to Message Producers 230 The Future: Asynchronous Method Invocations 235 Summary 236 Chapter 9 Adding Functionality to Your Beans 237 Calling Beans from Other Beans 237 Default JNDI Lookups 238 Understanding EJB References 239 Resource Factories 241 Environment Properties 244 Understanding EJB Security 245 Security Step 1: Authentication 246 Security Step 2: Authorization 257 Security Propagation 266 Understanding Handles 268 Home Handles 269 Summary 270 Part Three Advanced Enterprise JavaBeans Concepts 271 Chapter 10 Transactions 275 Motivation for Transactions 276 Atomic Operations 276 Network or Machine Failure 277 Multiple Users Sharing Data 278 Benefits of Transactions 279 The ACID Properties 280 Transactional Models 282 Flat Transactions 282 Nested Transactions 284 Other Transactional Models 286 Enlisting in Transactions with Enterprise JavaBeans 286 Underlying Transaction System Abstraction 287 Declarative, Programmatic, and Client-Initiated Transactions 287 Choosing a Transaction Style 290 Container-Managed Transactions 292 EJB Transaction Attribute Values 294 Programmatic Transactions in EJB 300 CORBA’s Object Transaction Service (OTS) 300 The Java Transaction Service (JTS) 301 The Java Transaction API (JTA) 301 Declarative versus Programmatic Transactions Example 304 xii CONTENTS Transactions from Client Code 306 Transactional Isolation 307 The Need for Concurrency Control 308 Isolation and EJB 309 The Dirty Read Problem 311 The Unrepeatable Read Problem 312 The Phantom Problem 313 Transaction Isolation Summary 314 Isolation and EJB 315 Pessimistic and Optimistic Concurrency Control 316 Distributed Transactions 316 Durability and the Two-Phase Commit Protocol 317 The Transactional Communications Protocol and Transaction Contexts 318 Designing Transactional Conversations in EJB 320 Summary 323 Chapter 11 BMP and CMP Relationships 325 The CMP and BMP Difference 326 Cardinality 326 1:1 Relationships 328 1:N Relationships 332 M:N Relationships 336 Directionality 344 Implementing Directionality with BMP 344 Implementing Directionality with CMP 345 Directionality May Not Map to Database Schemas 347 Bidirectional or Unidirectional? 349 Lazy Loading 349 Aggregation vs. Composition and Cascading Deletes 350 Relationships and EJB-QL 352 Recursive Relationships 353 Circular Relationships 354 Referential Integrity 355 Relationships, Referential Integrity, and Client Code 357 Summary 360 Chapter 12 Persistence Best Practices 361 When to Use Entity Beans 362 Control 362 Parameter Passing Analogy 362 Procedural Versus Object-Oriented 363 Caching 363 CONTENTS xiii Enforcement of Schema Independence 364 Ease of Use 364 Migration
Recommended publications
  • We Are on the Right Track for Ensuring Our Success
    s »We have made great progress in »We are on the right track for networking our internal value ensuring our success as the chain electronically and in linking it to our customers, suppliers and Global network of innovation.« partners. This is enabling us to accelerate processes and cut costs.« Annual Report 2001 Annual s Annual Report 2001 Siemens Aktiengesellschaft Order No. A19100-F-V055-X-7600 Siemens Siemens is a network encompassing well over 400,000 people in 190 countries. information on contents for external orders We take pride in possessing in-depth knowledge of customers' requirements, the Telephone +49 89 636-33032 (Press Office) e-mail [email protected] expertise to create innovative solutions in electrical engineering and electronics, and +49 89 636-32474 (Investor Relations) Internet http://www.siemens.de/geschaeftsbericht_2001/order Fax +49 89 636-32825 (Press Office) Telephone +49 89 636-32910 the experience to successfully navigate even rough economic waters. But our greatest +49 89 636-32830 (Investor Relations) Fax +49 89 636-32908 e-mail [email protected] asset is undoubtedly our people, with their unparalleled motivation and their passion [email protected] for outperforming our competitors. Linked via a global network that enables them address for internal orders to exchange ideas with colleagues around the world, Siemens employees strive Siemens AG Wittelsbacherplatz 2 LZF, Fürth-Bislohe continuously to increase company value. D-80333 Munich Intranet http://c4bs.spls.de/ We at Siemens do not measure value solely in terms of short-term profitability. For Federal Republic of Germany Fax +49 911 654-4271 Internet http://www.siemens.com German Order no.
    [Show full text]
  • Mobile Banking
    MOBILE BANKING Overview of the banking industry The Indian Banking industry, which is governed by the Banking Regulation Act of India, 1949 can be broadly classified into two major categories, non-scheduled banks and scheduled banks. Scheduled banks comprise commercial banks and the co-operative banks. In terms of ownership, commercial banks can be further grouped into nationalized banks, the State Bank of India and its group banks, regional rural banks and private sector banks .These banks have over 67,000 branches spread over the country.The first phase of financial reforms resulted in the nationalization of 14 major banks in 1969 and resulted in a shift from Class banking to Mass banking. This in turn resulted in a significant growth in the geographical coverage of banks. Every bank had to earmark a minimum percentage of their loan portfolio to sectors identified as “priority sectors”. After the second phase of financial sector reforms and liberalization of the sector in the early nineties, the Public Sector Banks (PSB) s found it extremely difficult to compete with the new private sector banks and the foreign banks. The new private sector banks first made their appearance after the guidelines permitting them were issued in January 1993. Eight new private sector banks are presently in operation. These banks due to their late start have access to state-of-the-art technology, which in turn helps them to save on manpower costs and provide better services. Current scenario The industry is currently in a transition phase. On the one hand, the PSBs, which are the mainstay of the Indian Banking system, are in the process of shedding their flab in terms of excessive manpower, excessive non-Performing Assets (Npas) and excessive governmental equity, while on the other hand the private sector banks are consolidating themselves through mergers and acquisitions.
    [Show full text]
  • The Economics of Information the Relationship Between IT Spending, Profits, and Knowledge Capital®
    Concept Report Research and Advisory Services The Economics of Information The Relationship Between IT Spending, Profits, and Knowledge Capital® Concept Report, July 2001 Research by: Paul Strassmann Editied by: Jacques Halé Publishing by: Peter Bristow Chris Dickinson Steve Duke Samantha Henry Paul Makey Published July 2001 © 2001 by Paul A. Strassmann Important Notice The information available in this publication is given in good faith and is believed to be reliable. Butler Group expressly excludes any representation or warranty (express or implied) about the suitability of materials in this publication for your purposes and excludes to the fullest extent possible any liability in contract, tort or howsoever for implementation of, or reliance upon, the information contained in this publication. © P a u l A . S t r The Economics of Information a s s m a n n J u l y 2 0 0 CONCEPT REPORT 1 CONTENTS 5 Management Summary 11 Part 1: Transforming IT Costs into Profits 11 1.1 The Challenge 21 1.2 The Strategic Positioning of a Firm in Relation to IT 29 1.3 The Competitive Advantage in the Information Age 39 Part 2: Knowledge Capital® in European Firms 41 Introduction 45 2.1 Analysis of European Firms 55 2.2 Country Case – The UK Knowledge Capital® 65 Appendix A: Valuation of Knowledge Capital® 71 Appendix B: Valuation of Knowledge Capital® Rankings by Country 71 Belgian Firms 77 Danish Firms 83 Dutch Firms 91 Finnish Firms 97 French Firms 119 German Firms 139 Irish Firms 143 Italian Firms 151 Norwegian Firms 157 Portuguese Firms 161 Spanish Firms 167 Swedish Firms 177 UK Firms C o n c e p t R e p o r t Management Summary Concept Report, July 2001 © P a u l A .
    [Show full text]
  • List of Section 13F Securities, Fourth Quarter 2001
    OFFICIAL LIST OF SECTION 13(F) SECURITIES USER INFORMATION SHEET General This list of "Section 130securities" as defined by Rule 13f-1(c) [I7 CFR 240.13f-1 (c)] is made available to the public pursuant to Section13 (f) (3) of the Securities Exchange Act of 1934 [15 USC 78m(f) (3)]. It is made available for use in the preparation of reports filed with the Securities and Exhange Commission pursuant to Rule 13f-1 [17 CFR 240.13f-'I] under Section 13(f) of the Securities Exchange Act of 1934. An updated list is published on a quarterly basis. This list is current as of December. 15. 2001 ,and may be relied on by institutional investment managers filing Form 13F reports for the calendar quarter ending December30. 2001 . Institutional investment managers should report holdings-number of shares and fair market value--as of the last day of the calendar quarter as required by [ Section 13(f)(1) and Rule 13f-11 thereunder. Features (1) Additions and Deletions: Revisions made to the list of Section 13(f) securities are indicated in a column titled "STATUS." The word "ADDED" in the status column opposite the name of a security indicates that the security has become a Section 13(f) security. The word "DELETED" in the status col~~mnopposite the name of a security indicates that the security ceases to be a 13(f) security since the date of the last list. (2) List of options: An asterisk is placed next to the name of any security having a listed option and each option is individually listed with its own CUSlP number immediately below the name of the security having the option.
    [Show full text]
  • Weblogic Server 6.0 Review Inside Page 30
    WEBLOGIC SERVER 6.0 REVIEW INSIDE PAGE 30 TM The World’s Leading Java Resource Java COM June 2001 Volume:6 Issue:6 FREE! PRODUCT Sept 23–26, 2001 New York, NY PAGE 16 SHOWCASE CD! INSIDE! SHOW PROGRAM 183 From the Editor by Alan Williamson pg. 7 Industry Commentaries by Richard Green pg. 8 by Bruce Scott pg. 146 EXCLUSIVE: INTERVIEW WITH KEYNOTER...SCOTT DIETZEN Product Reviews Sun Blade pg. 20 WebLogic 6.0 pg. 30 JDJJ2EE: The Challenges and Pitfalls of J2EE Chris Kampmeier 36 ServletExec pg. 54 iPlanet pg. 62 2.0J2EE: Growing JSP and Servlet Sites Patrick Sean Neville 44 J2EE Editorial SPECIAL FOCUS by Ajit Sagar pg. 22 ON J2EE, J2SEJ2EE: & J2ME WebSphere Column Brady Flowers 56 Interview J2EE: The Impact of EJB 2.0 Tyler Jewell 64 Larry Freeman, Manager J2EE Blueprints Team pg. 26 J2SE: Building a Telephone/Voice Portal Klinner & Walker 78 First Look Optimal J pg. 140 J2SE: Making a Mountain out of an Anthill Neal Ford 86 J2ME Editorial J2SE: JNI Programming in C/C+ Blair Wyman 96 by Jason Briggs pg. 144 J2SE: Evolving Functionality Satya Komatineni 104 $AVE BIG J2SE: Optimization and Java Irvin J. Lustig 110 J2SE: Using JavaBeans in Dreamweaver Barbarelli & Deming 118 J2SE: Deployment of JavaServer Pages John Goodson 126 J2SE: Java Quirks – Dates and Calendars Roedy Green 134 ONE-TIME OFFER! J2ME: The Incredibly Shrinking Platform Jason Briggs 148 Stop by our booth for special pricing J2ME: A UI Framework for the MIDP API Glen Cordrey 154 J2ME: Java Thick Clients with J2ME Glenn Coates 164 Sonic Software www.sonicsoftware.com 2 JUNE 2001 Java COM Zero G www.zerog.com/installs JUNE 2001 3 Java COM BEA www.developer.bea.com 4 JUNE 2001 Java COM BEA www.developer.bea.com JUNE 2001 5 Java COM TogetherSoft www.togethersoft.com/jdjspecial.html 6 JUNE 2001 Java COM FROM THE EDITOR ALANWILLIAMSON, EDITOR-IN-CHIEF The rational The Dawn alternative of Content Version 4.5 t has been one hell of a journey to get where here at JDJ are looking forward to working with we are today.
    [Show full text]
  • Safari | J2EE" Technology in Practice: Building Business Applications With
    Table of Contents Foreword..............................................................................................................................................................1 Acknowledgments...............................................................................................................................................3 About the Editors................................................................................................................................................5 Chapter 1. A Multi−Vendor Standard for Distributed Enterprise Applications.........................................7 1.1 The Networked Economy..................................................................................................................7 1.2 Why Standardize?..............................................................................................................................7 1.3 Why Standardize on J2EE?................................................................................................................8 1.4 Why a Standard Based on Java Technologies?................................................................................10 1.5 Why a Book of Success Stories?.....................................................................................................11 Chapter 2. Overview of the J2EE Technology and Architecture.................................................................13 2.1 The Evolution of Distributed, Multitier Applications.....................................................................13
    [Show full text]
  • Growing Development of Foreign Encryption Products in the Face of U
    10 June 1999 Source: http://www.seas.gwu.edu/seas/institutes/cpi/library/docs/cpi-1999-02.pdf Growing Development of Foreign Encryption Products in the Face of U. S. Export Regulations Lance J. Hoffman David M. Balenson Karen A. Metivier-Carreiro Anya Kim Matthew G. Mundy June 10, 1999 Report GWU-CPI-1999-02 Cyberspace Policy Institute The George Washington University School of Engineering and Applied Science 2033 K St. NW Suite 340 . Washington, DC 20006 Phone: 202.994.5512 . Fax: 202.994.5505 Website: http://www.seas.gwu.edu/seas/institutes/cpi/ Email: [email protected] GROWING DEVELOPMENT OF FOREIGN ENCRYPTION PRODUCTS IN THE FACE OF U.S. EXPORT REGULATIONS Lance J. Hoffman* David M. Balenson** Karen A. Metivier-Carreiro* Anya Kim* Matthew G. Mundy** June 10, 1999 Report No. GWU-CPI-1999-02 *Cyberspace Policy Institute, School of Engineering and Applied Science, The George Washington University, Washington, DC **NAI Labs, The Security Research Division of Network Associates, Inc., Glenwood, MD This research was supported in part by Americans for Computer Privacy (ACP). EXECUTIVE SUMMARY Development of cryptographic products outside the United States is not only continuing but is expanding to additional countries; with rapid growth of the Internet, communications-related cryptography especially is experiencing high growth, especially in electronic mail, virtual private network, and IPsec products. This report surveys encryption products developed outside the United States and provides some information on the effect of the United States export control regime on American and foreign manufacturers. We have identified 805 hardware and/or software products incorporating cryptography manufactured in 35 countries outside the United States.
    [Show full text]
  • Innovation in Financial Services: Home Banking
    INDUSTRIAL PERFORMANCE CENTER Massachusetts Institute of Technology Cambridge, MA 02139 I NNOVATION IN FINANCIAL SERVICES CASE STUDY : H OME B ANKING Jeremy Shapiro MIT IPC Working Paper 99-004 March 1999 The views expressed herein are the author’s responsibility and do not necessary reflect those of the MIT Industrial Performance Center or the Massachusetts Institute of Technology. Innovation in Financial Services Case Study: Home Banking I. THE DEFINITION OF HOME BANKING AS AN INNOVATION.......................1 II. CONTEXT: MARKET STRUCTURE AND REGULATORY SYSTEM................5 A. UNITED STATES: A PORTRAIT OF FRAGMENTATION...............................................................5 B. GERMANY: ORGANIZED COMPETITION.................................................................................8 III. HISTORY AND STATE OF HOME BANKING ..........................................13 A. UNITED STATES ..............................................................................................................13 B. GERMANY......................................................................................................................22 IV. CONCLUSION: THE HOME BANKING INNOVATION IN COMPARATIVE PERSPECTIVE .....................................................................................34 A. SOURCES OF INNOVATION................................................................................................34 B. COMPARISON OF THE INNOVATION PROCESS.......................................................................35 I. The
    [Show full text]
  • Executive Summary
    EXECUTIVE SUMMARY Mobile banking is a system that allows customers of a financial institution to conduct a number of financial transactions through a mobile device such as a mobile phone or personal digital assistant.There are three types of mobile banking technology used.They are receive and send data via text messaging, web browsers and smart phone applications.The mobile banking services are funds transfer of inter bank and intra bank, balance enquiry services, request services like cheque book, bill payments and credit card payments, demat account services, mobile top up ,merchant payment, life insurance premium and stop payment instructions. The mobile banking service is benefitted to the customers and thebanks. The customers benefits are the funds or the banking transactions can be done without visiting the bank and there is no need of internet facility. It is also more secure than online banking. Any transactions taken is immediately made noticed to the customers thus reducing the frauds. It is cost saving to banks thus helps them to give more attention to their loyal customers and can perform better customer relationship. The mobile banking also has its other side of the coin. The banks charge the customers for providing them this service thus increasing their expense. The customers cannot do much transaction due to limit on the transaction. The profit earned by the banks is low due to increase in the expense in providing the service. The disadvantage of development in mobile banking is handset operability, security, reliability and scalability, application distribution and personalization. The precaution to be taken before using mobile banking are see that the mobile banking is activated the auto lock, keep the confidential details are not disclosed,download those sites which is a trustworthy and keep the Bluetooth always switched off because virus can destroy it.
    [Show full text]
  • Siemens Aktiengesellschaft
    As filed with the Securities and Exchange Commission on December 6, 2002 SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 20-F REGISTRATION STATEMENT PURSUANT TO SECTION 12(b) OR (g) OF THE SECURITIES EXCHANGE ACT OF 1934 n OR ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended September 30, 2002. ¥ OR TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to . n Commission file number: 1-15174 Siemens Aktiengesellschaft (Exact name of Registrant as specified in its charter) Federal Republic of Germany (Jurisdiction of incorporation or organization) Wittelsbacherplatz 2 D-80333 Munich Federal Republic of Germany (Address of principal executive offices) Securities registered or to be registered pursuant to Section 12(b) of the Act: Name of each exchange Title of each class on which registered American Depositary Shares, each representing one New York Stock Exchange Common Share, no par value Common Shares, no par value* New York Stock Exchange * Listed, not for trading or quotation purposes, but only in connection with the registration of American Depositary Shares pursuant to the requirements of the Securities and Exchange Commission. Securities registered or to be registered pursuant to Section 12(g) of the Act: None Securities for which there is a reporting obligation pursuant to Section 15(d) of the Act: None The number of outstanding shares of each of the issuer’s classes of capital or common stock as of September 30, 2002: 890,374,001 common shares, no par value.
    [Show full text]
  • Siemens Aktiengesellschaft
    As filed with the Securities and Exchange Commission on August 27, 2002 SECURITIES ANDEXCHANGE COMMISSION Washington, D.C. 20549 FORM 20-F/A REGISTRATION STATEMENT PURSUANT TO SECTION 12(b) OR (g) OF THE SECURITIES EXCHANGE ACT OF 1934 □ OR ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended September 30, 2001. ࠚ OR TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to . □ Commission file number: 1-15174 Siemens Aktiengesellschaft (Exact name of Registrant as specified in its charter) Federal Republic of Germany (Jurisdiction of incorporation or organization) Wittelsbacherplatz 2 D-80333 Munich Federal Republic of Germany (Address of principal executive offices) Securities registered or to be registered pursuant to Section 12(b) of the Act: Name of each exchange Title of each class on which registered American Depositary Shares, each representing one NewYork Stock Exchange Common Share, no par value Common Shares, no par value* NewYork Stock Exchange * Listed, not for trading or quotation purposes, but only in connection with the registration of American Depositary Shares pursuant to the requirements of the Securities and Exchange Commission. Securities registered or to be registered pursuant to Section 12(g) of the Act: None Securities for which there is a reporting obligation pursuant to Section 15(d) of the Act: None The number of outstanding shares of each of the issuer’s classes of capital or common stock as of September 30, 2001: 888,230,245 common shares, no par value.
    [Show full text]
  • List of Section 13F Securities, First Quarter 2002
    OFFICIAL LIST OF SECTION 13(F) SECURITIES USER INFORMATION SHEET General This list of "Section 13(f) securities" as defined by Rule 13f-1(c) [I7 CFR 240.13f-1 (c)] is made available to the public pursuant to Section13 (f) (3) of the Securities Exchange Act of 1934 [15 USC 78m(f) (311. It is made available for use in ,the preparation of reports filed with the Securities and Exhange Commission pursuant to Rule 13f-1 [17 CFR 240.13f-I] under Section 130of the Securities Exchange Act of 1934. An updated list is published on a quarterly basis. This list is current as of March, 15.2002, and may be relied on by institutional investment managers filing Form 13F reports for the calendar quarter ending March 30, 2002. Institutional investment managers should report holdings--number of shares and fair market value-as of the last day of the calendar quarter as required by [ Section 13(f)(l) and Rule 13f-11 thereunder. Features (1 ) Additions and Deletions: Revisions made to the list of Section 13(f) securities are indicated in a column titled "STATUS." The word "ADDED" in the status column opposite the name of a security indicates that the security has become a Section 13(f) security. The word "DELETED" in the status column opposite the name of a security indicates that the security ceases to be a 13(f) security since the date of the last list. (2) List of options: An asterisk is placed next to the name of any security having a listed option and each option is individually listed with its own CUSlP number immediately below the name of the sec~~rityhaving the option.
    [Show full text]