Chris Richardson
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Automatically Detecting ORM Performance Anti-Patterns on C# Applications Tuba Kaya Master's Thesis 23–09-2015
Automatically Detecting ORM Performance Anti-Patterns on C# Applications Tuba Kaya Master's Thesis 23–09-2015 Master Software Engineering University of Amsterdam Supervisors: Dr. Raphael Poss (UvA), Dr. Giuseppe Procaccianti (VU), Prof. Dr. Patricia Lago (VU), Dr. Vadim Zaytsev (UvA) i Abstract In today’s world, Object Orientation is adopted for application development, while Relational Database Management Systems (RDBMS) are used as default on the database layer. Unlike the applications, RDBMSs are not object oriented. Object Relational Mapping (ORM) tools have been used extensively in the field to address object-relational impedance mismatch problem between these object oriented applications and relational databases. There is a strong belief in the industry and a few empirical studies which suggest that ORM tools can cause decreases in application performance. In this thesis project ORM performance anti-patterns for C# applications are listed. This list has not been provided by any other study before. Next to that, a design for an ORM tool agnostic framework to automatically detect these anti-patterns on C# applications is presented. An application is developed according to the designed framework. With its implementation of analysis on syntactic and semantic information of C# applications, this application provides a foundation for researchers wishing to work further in this area. ii Acknowledgement I would like to express my gratitude to my supervisor Dr. Raphael Poss for his excellent support through the learning process of this master thesis. Also, I like to thank Dr. Giuseppe Procaccianti and Prof. Patricia Lago for their excellent supervision and for providing me access to the Green Lab at Vrije Universiteit Amsterdam. -
1. Domain Modeling
Software design pattern seminar sse, ustc Topic 8 Observer, Mediator, Facade Group K 1. The observer pattern (Behavioral pattern, chapter 16 and 17) 1) the observer is an interface or abstract class defining the operations to be used to update itself 2) a solution to these problems A. Decouple change and related responses so that such dependencies can be added or removed freely and dynamically 3) solution A. Observable defines the operations for attaching, de-attaching and notifying observers B. Observer defines the operations to update itself 4) liabilities A. Unwanted concurrent update to a concrete observable may occur Figure 1 Sample Observer Pattern 2. The mediator pattern (Behavioral pattern, chapter 16 and 17) 1) the mediator encapsulates how a set of objects interact and keeps objects from referring to each other explicitly 2) a solution to these problems A. a set of objects communicate in well-defined but complex ways. The resulting interdependencies are unstructured and difficult to understand B. reusing an object is difficult because it refers to and communicates with many other objects C. a behavior that's distributed between several classes should be customizable without a lot of subclassing 3) solution A. Mediator defines an interface for communicating with Colleague objects, knows the colleague classes and keep a reference to the colleague objects, and implements the communication and transfer the messages between the colleague classes 1 Software design pattern seminar sse, ustc B. Colleague classes keep a reference to its Mediator object, and communicates with the Mediator whenever it would have otherwise communicated with another Colleague 4) liabilities A. -
FAKULT¨AT F¨UR INFORMATIK Architectural Design And
FAKULTAT¨ FUR¨ INFORMATIK DER TECHNISCHEN UNIVERSITAT¨ MUNCHEN¨ Masterarbeit in Informatik Architectural Design and Implementation of a Web Application for Adaptive Data Models Stefan Bleibinhaus FAKULTAT¨ FUR¨ INFORMATIK DER TECHNISCHEN UNIVERSITAT¨ MUNCHEN¨ Masterarbeit in Informatik Architectural Design and Implementation of a Web Application for Adaptive Data Models Architektur Design und Implementierung einer Web Anwendung fur¨ adaptive Datenmodelle Author: Stefan Bleibinhaus Supervisor: Prof. Florian Matthes Advisor: Matheus Hauder Date: April 15, 2013 Ich versichere, dass ich diese Masterarbeit selbstandig¨ verfasst und nur die angegebenen Quellen und Hilfsmittel verwendet habe. I assure the single handed composition of this master thesis only supported by declared resources. Munchen,¨ den 15. April 2013 Stefan Bleibinhaus Acknowledgments I would like to express my very great appreciation to Prof. Florian Matthes for offering me to write my thesis on such a delightful topic and showing so much interest in my work. I am particularly grateful for the assistance given by Matheus Hauder and his will to support me in my research. vii Abstract This thesis discusses the architectural design and implementation of an Enterprise 2.0 collaboration web application. The designed web application uses the concept of hybrid wikis for enabling business users to capture easily content in structured form. A Hybrid wiki is a wiki, which empowers business users to incrementally structure and classify content objects without the struggle of being enforced to use strict information structures. The emergent information structure in a hybrid wiki evolves in daily use by the interaction with its users. Whenever a user wants to extend the content, the system guides them to automatically structure it by using user interface friendly methods like auto-completion and unobtrusive suggestions based on previous similar content. -
Software Architecture: Past, Present, Future
Software Architecture: Past, Present, Future Wilhelm Hasselbring 1 Introduction For large, complex software systems, the design of the overall system structure (the software architecture) is an essential challenge. The architecture of a software system defines that system in terms of components and connections among those components [55, 58]. It is not the design of that system which is more detailed. The architecture shows the correspondence between the requirements and the constructed system, thereby providing some rationale for the design decisions. This level of design has been addressed in a number of ways including informal diagrams and descriptive terms, module interconnection languages, and frameworks for systems that serve the needs of specific application domains. An architecture embodies decisions about quality properties. It represents the earliest opportunity for evaluating those decisions. Furthermore, reusability of components and services depends on how strongly coupled they are with other components in the system architecture. Performance, for instance, depends largely upon the complexity of the required coordination, in particular when the components are distributed via some network. The architecture is usually the first artifact to be examined when a programmer (particularly a maintenance programmer) unfamiliar with the system begins to work on it. Software architecture is often the first design artifact that represents decisions on how requirements of all types are to be achieved. As the manifestation of early design decisions, it represents design decisions that are hardest to change and hence most deserving of careful consideration. W. Hasselbring () Kiel University, Kiel, Germany e-mail: [email protected] © The Author(s) 2018 169 V. -
Dynamic Data Access Object Design Pattern (CECIIS 2008)
Dynamic Data Access Object Design Pattern (CECIIS 2008) Zdravko Roško, Mario Konecki Faculty of Organization and Informatics University of Zagreb Pavlinska 2, 42000 Varaždin, Croatia [email protected], [email protected] Abstract . Business logic application layer accessing 1 Introduction data from any data source (databases, web services, legacy systems, flat files, ERPs, EJBs, CORBA This paper presents a pattern that help to desing the services, and so forth) uses the Dynamic Data Access data access layer for any data source (not just Object which implements the Strategy[1] design relational) such as CICS, JMS/MQ, iSeries, SAP, pattern and hides most of the complexity away from Web Services, and so forth. Dynamic Data Access an application programmer by encapsulating its Object (DDAO) is an implementation of the Strategy dynamic behavior in the base data access class. By design pattern [1] which defines a family of using the data source meta data, it automates most of algorithms, encapsulate each one, and make them the functionality it handles within the application. interchangeable through an interface. Application programmer needs only to implement Having many options available (EJB, Object specific „finder“ functions, while other functions such Relational Mapping, POJO, J2EE DAO, etc.) to use as „create, store, remove, find, removeAll, storeAll, while accessing a data source, including persistent createAll, findAll“ are implemented by the Dynamic storage, legacy data and any other data source, the Data Access Object base class for a specific data main question for development is: what to use to source type.. bridge the business logic layer and the data from a Currently there are many Object Relational data source ? Assuming that the data access code is Mapping products such as Hibernate, iBatis, EJB not coded directly into the business logic layer (Entity CMP containers, TopLink, which are used to bridge Bean, Session Bean, Servlet, JSP Helper class, POJO) objects and relational database. -
Ioc Containers in Spring
301AA - Advanced Programming Lecturer: Andrea Corradini [email protected] http://pages.di.unipi.it/corradini/ AP-2018-11: Frameworks and Inversion of Control Frameworks and Inversion of Control • Recap: JavaBeans as Components • Frameworks, Component Frameworks and their features • Frameworks vs IDEs • Inversion of Control and Containers • Frameworks vs Libraries • Decoupling Components • Dependency Injection • IoC Containers in Spring 2 Components: a recap A software component is a unit of composition with contractually specified interfaces and explicit context dependencies only. A software component can be deployed independently and is subject to composition by third party. Clemens Szyperski, ECOOP 1996 • Examples: Java Beans, CLR Assemblies • Contractually specified interfaces: events, methods and properties • Explicit context dependencies: serializable, constructor with no argument • Subject to composition: connection to other beans – Using connection oriented programming (event source and listeners/delegates) 3 Towards Component Frameworks • Software Framework: A collection of common code providing generic functionality that can be selectively overridden or specialized by user code providing specific functionality • Application Framework: A software framework used to implement the standard structure of an application for a specific development environment. • Examples: – GUI Frameworks – Web Frameworks – Concurrency Frameworks 4 Examples of Frameworks Web Application Frameworks GUI Toolkits 5 Examples: General Software Frameworks – .NET – Windows platform. Provides language interoperability – Android SDK – Supports development of apps in Java (but does not use a JVM!) – Cocoa – Apple’s native OO API for macOS. Includes C standard library and the Objective-C runtime. – Eclipse – Cross-platform, easily extensible IDE with plugins 6 Examples: GUI Frameworks • Frameworks for Application with GUI – MFC - Microsoft Foundation Class Library. -
An Experimental Study on Microservices Based Edge Computing Platforms Qian Qu, Ronghua Xu, Seyed Yahya Nikouei, Yu Chen Dept
1 An Experimental Study on Microservices based Edge Computing Platforms Qian Qu, Ronghua Xu, Seyed Yahya Nikouei, Yu Chen Dept. of Electrical & Computer Engineering, Binghamton University, SUNY, Binghamton, NY 13902, USA fqqu2, rxu22, snikoue1, [email protected] Abstract—The rapid technological advances in the Internet of development and easy deployment among multiple service Things (IoT) allows the blueprint of Smart Cities to become providers. feasible by integrating heterogeneous cloud/fog/edge computing Because of many attractive features, such as good scalabil- paradigms to collaboratively provide variant smart services in our cities and communities. Thanks to attractive features like fine ity, fine granularity, loose coupling, continuous development, granularity and loose coupling, the microservices architecture and low maintenance cost, the microservices architecture has has been proposed to provide scalable and extensible services in emerged and gained a lot of interests both in industry and large scale distributed IoT systems. Recent studies have evaluated academic community [17], [21]. Compared to traditional SOAs and analyzed the performance interference between microser- in which the system is a monolithic unit, the microservices vices based on scenarios on the cloud computing environment. However, they are not holistic for IoT applications given the architecture divides an monolithic application into multiple restriction of the edge device like computation consumption and atomic microservices that run independently on distributed network capacity. This paper investigates multiple microservice computing platforms. Each microservice performs one specific deployment policies on edge computing platform. The microser- sub-task or service, which requires less computation resource vices are developed as docker containers, and comprehensive ex- and reduces the communication overhead. -
Inversion of Control in Spring – Using Annotation
Inversion of Control in Spring – Using Annotation In this chapter, we will configure Spring beans and the Dependency Injection using annotations. Spring provides support for annotation-based container configuration. We will go through bean management using stereotypical annotations and bean scope using annotations. We will then take a look at an annotation called @Required, which allows us to specify which dependencies are actually required. We will also see annotation-based dependency injections and life cycle annotations. We will use the autowired annotation to wire up dependencies in the same way as we did using XML in the previous chapter. You will then learn how to add dependencies by type and by name. We will also use qualifier to narrow down Dependency Injections. We will also understand how to perform Java-based configuration in Spring. We will then try to listen to and publish events in Spring. We will also see how to reference beans using Spring Expression Language (SpEL), invoke methods using SpEL, and use operators with SpEL. We will then discuss regular expressions using SpEL. Spring provides text message and internationalization, which we will learn to implement in our application. Here's a list of the topics covered in this chapter: • Container configuration using annotations • Java-based configuration in Spring • Event handling in Spring • Text message and internationalization [ 1 ] Inversion of Control in Spring – Using Annotation Container configuration using annotation Container configuration using Spring XML sometimes raises the possibility of delays in application development and maintenance due to size and complexity. To solve this issue, the Spring Framework supports container configuration using annotations without the need of a separate XML definition. -
Comparing Service- Based Architectures
Comparing Service- based Architectures @neal4d nealford.com 1 agenda Micro Service-oriented Service-based 2 Service-oriented Architecture 3 origins: hubs System B System A System C 4 origins: hubs System B System A System C System D (ftp only) 5 origins: hubs System E (http only) System B System A System C System D (ftp only) 6 origins: hubs System E (http only) System B System A System C System D (ftp only) 7 origins: hubs System E (http only) System B Integration System A Hub System C System D (ftp only) 8 origins: hubs System E (http only) System B Integration System A Hub System C System D (ftp only) 9 origins: hubs System E (http only) System B Integration System A Hub System C System D (ftp only) 10 origins: hubs looks great, but what about single point of failure and performance bottleneck considerations? 11 orchestration hub intelligent hub service oriented architecture / enterprise service bus pattern 12 service-oriented architecture abstraction service taxonomy shared resources middleware interoperability 13 service-oriented architecture business services BS BS BS BS BS BS message bus process choreographer service orchestrator enterprise services ES ES ES ES ES ES application services AS infrastructure services IS 14 service-oriented architecture business services BS BS BS BS BS BS messageabstract bus enterprise-level coarse-grained process choreographer owned and defined by business users data represented as WSDL, BPEL, XML, etc. service orchestrator no implementation - only name, input, and output enterpriseAre we services -
Data Loader Guide
Data Loader Guide Version 53.0, Winter ’22 @salesforcedocs Last updated: August 24, 2021 © Copyright 2000–2021 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com, inc., as are other names and marks. Other marks appearing herein may be trademarks of their respective owners. CONTENTS Chapter 1: Data Loader . 1 Chapter 2: When to Use Data Loader . 2 Chapter 3: Installing Data Loader . 3 Install Data Loader on macOS . 4 Install Data Loader on Windows . 5 Considerations for Installing Data Loader . 6 Chapter 4: Configure Data Loader . 8 Data Loader Behavior with Bulk API Enabled . 12 Configure the Data Loader to Use the Bulk API . 12 Chapter 5: Using Data Loader . 13 Data Types Supported by Data Loader . 14 Export Data . 15 Define Data Loader Field Mappings . 17 Insert, Update, or Delete Data Using Data Loader . 17 Perform Mass Updates . 18 Perform Mass Deletes . 19 Upload Attachments . 19 Upload Content with the Data Loader . 20 Review Data Loader Output Files . 21 Data Import Dates . 21 View the Data Loader Log File . 22 Configure the Data Loader Log File . 22 Chapter 6: Running in Batch Mode (Windows Only) . 23 Installed Directories and Files . 24 Encrypt from the Command Line . 24 Upgrade Your Batch Mode Interface . 25 Run Batch File With Windows Command-Line Interface . 25 Configure Batch Processes . 26 Data Loader Process Configuration Parameters . 27 Data Loader Command-Line Operations . 35 Configure Database Access . 36 Spring Framework . 37 Data Access Objects . 38 SQL Configuration . 38 Map Columns . 40 Contents Run Individual Batch Processes . 42 Chapter 7: Command-Line Quick Start (Windows Only) . -
Experimental Algorithmics from Algorithm Desig
Lecture Notes in Computer Science 2547 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen 3 Berlin Heidelberg New York Barcelona Hong Kong London Milan Paris Tokyo Rudolf Fleischer Bernard Moret Erik Meineche Schmidt (Eds.) Experimental Algorithmics From Algorithm Design to Robust and Efficient Software 13 Volume Editors Rudolf Fleischer Hong Kong University of Science and Technology Department of Computer Science Clear Water Bay, Kowloon, Hong Kong E-mail: [email protected] Bernard Moret University of New Mexico, Department of Computer Science Farris Engineering Bldg, Albuquerque, NM 87131-1386, USA E-mail: [email protected] Erik Meineche Schmidt University of Aarhus, Department of Computer Science Bld. 540, Ny Munkegade, 8000 Aarhus C, Denmark E-mail: [email protected] Cataloging-in-Publication Data applied for A catalog record for this book is available from the Library of Congress. Bibliographic information published by Die Deutsche Bibliothek Die Deutsche Bibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data is available in the Internet at <http://dnb.ddb.de> CR Subject Classification (1998): F.2.1-2, E.1, G.1-2 ISSN 0302-9743 ISBN 3-540-00346-0 Springer-Verlag Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer-Verlag. -
From Zero to 1000 Tests in 6 Months
From Zero to 1000 tests in 6 months Or how not to lose your mind with 2 week iterations Name is Max Vasilyev Senior Developer and QA Manager at Solutions Aberdeen http://tech.trailmax.info @trailmax Business Does Not Care • Business does not care about tests. • Business does not care about internal software quality. • Business does not care about architecture. • Some businesses don’t care so much, they even don’t care about money. Don’t Tell The Business Just do it! Just write your tests, ask no one. Honestly, tomorrow in the office just create new project, add NUnit package and write a test. That’ll take you 10 minutes. Simple? Writing a test is simple. Writing a good test is hard. Main questions are: – What do you test? – Why do you test? – How do you test? Our Journey: Stone Age Started with Selenium browser tests: • Recording tool is OK to get started • Boss loved it! • Things fly about on the screen - very dramatic But: • High maintenance effort • Problematic to check business logic Our Journey: Iron Age After initial Selenium fever, moved on to integration tests: • Hook database into tests and part-test database. But: • Very difficult to set up (data + infrastructure) • Problematic to test logic Our Journey: Our Days • Now no Selenium tests • A handful of integration tests • Most of the tests are unit-ish* tests • 150K lines of code in the project • Around 1200 tests with 30% coverage** • Tests are run in build server * Discuss Unit vs Non-Unit tests later ** Roughly 1 line of test code covers 2 lines of production code Testing Triangle GUI Tests GUI Tests Integration Tests Integration Tests Unit Tests Unit Tests Our Journey: 2 Week Iterations? The team realised tests are not optional after first 2-week iteration: • There simply was no time to manually test everything at the end of iteration.