IDUG NA 2007 Gary Ben Israel: Hitchhikers Guide To

Total Page:16

File Type:pdf, Size:1020Kb

IDUG NA 2007 Gary Ben Israel: Hitchhikers Guide To Session: L12 Hitchhikers Guide to JEE Gary Ben-Israel National Institute for Testing & Evaluation May 10, 2007 9:20 a.m. – 10:20 a.m. Platform: Cross Platform 1 Agenda • What is Java Enterprise Edition • The Web container • The EJB Container 2 2 Agenda • What is Java Enterprise Edition • Definition • The three tier model • UI Design • The Web container • The EJB Container 3 3 What is Java Enterprise Edition Java Platform, Enterprise Edition (Java EE) • Is the industry standard for developing portable, robust, scalable and secure server-side Java applications. • Built on the solid foundation of Java SE • Provides web services, component model, management, and communications APIs • Is the industry standard for implementing enterprise class service-oriented architecture (SOA) and Web 2.0 applications. 4 4 JEE three tier model 5 5 UI Design • UI Solutions • Rich Client Vs. Thin Client 6 6 UI Solutions • Rich Client (Desktop Applications) • Thin Client (Classic web Applications) Both address similar missions: Event handling Layouting Data Binding Input validation Navigation flow I18N (Internationalization) Serialization L10N (Localization) 7 7 Rich Client Vs. Thin Client ☺ Asynchronous Synchronous Uninterrupted user UI reloaded and rendered interaction with each request ☺ Client-side logic may be Client-side logic may be implemented in Java implemented in Javascript Requires Installation ☺Runs anywhere Multiple client With a browser deployments 8 8 Agenda • What is Java Enterprise Edition • The Web container • The framework universe • Why so many? • Framework categories • AJAX • The EJB Container 9 9 The framework universe is vastly hugely mind-bogglingly big Wicket WebObjects Chrysalis OpenEmcee FacesFreeway Struts JPublish (OpenLaszlo) Scope JSPWidget JSF Stripes VRaptor Warfare Caramba WebWork ThinkCap JX Swinglets JWAA Xopolon Spring MVC OXF wingWeb Helma Tapestry Canyamo Verge Jacuard Cocoon Anvil XUI Macaw And Turbine Jaffa Japple JOSSO many Expresso Millstone ZK XAMJ Maverick Jucas Bishop Smile More… Echo2 (FreeMarker) SwingWeb Chiba Sofia (Velocity) Weblets JBanana JATO Common Controls Baracuda Jeenius Rialto Folium Action Framework JWarp Dinamica Click Shocks Genie EchoPoint JAT TeaServlet Avatar SWF MyFaces wingS Dovetail Hijax Facelets Bento Cameleon OpenXava WebOnSwing jStateMachine JFormulator RIFE DWR jZonic Melati Trails Thinlet qooXdoo10 Struts Ti 10 Why so many? • Different needs • A bad case of NIH syndrome • It’s fun writing • The de-facto standard isn’t good enough • No framework is good enough (we got to have more!) 11 11 Framework categories • Action-Based frameworks • Struts, WebWork (Struts 2), Spring-MVC • Component oriented frameworks • Wicket, Tapestry, Facelets (JSF), Echo2, ZK, Zimbra, Millstone • Template Engines integration • FreeMarker, Velocity, JSP, Tiles, Tapestry, Facelets (JSF) • Full Stack frameworks • RIFE • CRUD applications frameworks (Influenced by Ruby on Rails) • Trails, FacesFreeway, Struts Ti, RIFE-CRUD 12 12 AJAX Basics Asynchronous Javascript + XML(HttpRequest) Not a single technology but a methodology • Built on two standards: • XMLHttpRequest • DOM (XHTML) • Relies on Javascript availability 13 13 Classic web 14 14 AJAX layer added 15 15 AJAX: to the server and back again 16 16 AJAX Consequences Mostly great but… • May increase server load • User interaction is innately synchronous • May require specialized, “dirty” model behavior • No common user experience (the Feel in L&F) 17 17 The EJB Container • Entity beans • Session beans • Message Driven Beans • Resource Management and Primary Services 18 18 Entity Beans Entity beans in Java Persistence 1.0 specification are available only as plain old java objects (POJOs). To implement an entity bean you need to define a bean class and decide what field you will use as the identifier (primary key) of that identifier. In Java persistence, entity beans are not components like their EJB 2.1 counterparts. Application code works directly with the bean. So how is an entity queried? How is it stored? Is some magic involved? NO. Interaction with entity beans is done via a new service called the EntityManager. No Magic. No bytecode manipulation. No special proxies. Just Plain Java. 19 Unlike other EJB types entities can be allocated, serialized and sent across the network like any other POJO. Entity beans model real world objects. These objects are usually persistent records in some kind of database. In Java persistence application code works directly with the entity bean and does not interact through a component interface as you would with an EJB Session bean. 19 Entity bean example import javax.presistence; @Entity @Table(name=“CABIN”) public class Cabin { private int id; private string name; @Id @GeneratedValue @Column(name=“CABIN_ID”) public int getId() { return id } public void setId(int pk) { this.id = pk; } @Column(name=“CABIN_NAME”) public string getName() { return name; } public void setName(string str) { this.name = str; } } 20 20 Session beans • Definition • Interfaces • Stateful and Stateless session beans 21 21 Definition • Session beans are server side components that can be accessed using a variety of distributed object protocols. They are an extension of the client application that manage processes or tasks. • Example: A ship entity provides methods for doing things directly to a ship, but it doesn’t say anything about the context under which those actions are taken. • Session beans act as agents that manage business processes or tasks for the client. • Session beans are not persistent. They work with entity beans, data, and other resources to control workflow. 22 Booking passengers on a ship requires a ship entity, but also requires a lot of things that have nothing to do with the ship itself. We’ll need to know about passengers, ticket rates, schedules, and so on. 22 Interfaces To implement a session bean you need to define their interfaces. • Remote interface The remote interface defines a session bean’s business methods, which can be accessed from applications outside the EJB container. • Local interface The local interface defines a session bean’s business methods that can be used by other beans in the same EJB container. • Endpoint interface The endpoint interface defines business methods that can be accessed from applications outside the EJB container via SOAP. 23 The session bean class contains business logic and must have at least one remote, local or endpoint interface. bean class may also have more then one interface of a given type. The EJB container usually determines whether a session bean is remote and/or local by the interfaces it implements. The session bean class must also be tagged with the @javax.ejb.stateful or @javax.ejb.stateless annotation so that the EJB container knows what session bean type it is. 23 Stateful and Stateless session beans Session beans can be either stateful or stateless • Stateful session beans maintain conversational state when used by a client. Conversational state is not written to a database. It’s information that is kept in memory during the conversation and is lost when the conversation ends. • Stateless session beans do not maintain any conversational state. Each method is completely independent and uses only data passed in it’s parameters. Stateless session beans provide better performance and consume fewer resources then entity and stateful session beans. 24 Conversational state is kept only as long as the client application is using the bean. Once the client shuts down or releases the EJB, the conversational state id lost forever. Stateful session beans are not shared among clients;they are dedicated to the same client for the life of the enterprise bean. A few stateless session beans can serve hundreds and possibly thousands of clients. 24 Message Driven Beans • Message driven beans are integration points for other applications interested in working with EJB applications. • EJB 3.0 is not limited to JMS based message driven beans. Message driven beans can support any messaging system the implements the correct JCA 1.5 contracts. • In many ways the message driven beans are like stateless session beans. But unlike session beans that respond to business method invoked on their component interfaces, a JMS MDB responds to messages delivered through its onMesage() method. Since the messages are asynchronous the client that sends them does not expect a reply. 25 EJB 3.0 is not limited to JMS based message driven beans. Message driven beans can support any messaging system the implements the correct JCA 1.5 contracts. However, support for JMS based message driven beans in EJB 3.0 is mandatory. 25 Resource Management and Primary Services • Instance pooling • The activation mechanism • Java EE connector architecture • Primary services 26 26 Instance pooling • It’s common to pool database connections so that business objects in the system can share database access. • Most EJB containers also apply resource pooling to server side components. This technique is called instance pooling. Instance pooling is possible because clients never access beans directly. Therefore, there’s no fundamental reason to keep a separate copy of each EJB for each client. • Stateless beans exist in one of 3 states: • No state • Pooled state • Ready state 27 The server can keep a much smaller number of enterprise beans around to do the work, reusing each enterprise bean object to service different requests. No state When a bean instance is in this state it has not yet been instantiated. We identify this state to provide a beginning and end for the life cycle of a bean instance. Pooled state When an instance is in this state., it has been instantiated by the container but has not yet been associates eith an EJB request. Ready State When a bean instance id in this state, it has been associated with an EJB request and is ready to respond to business method invocation. 27 The activation mechanism • Unlike other enterprise beans stateful session beans maintain state between method invocations. Hence they cannot participate in instance pooling. • Passivation is the act of disassociating a stateful bean instance from its EJB object and saving its state.
Recommended publications
  • Working with System Frameworks in Python and Objective-C
    Working with System Frameworks in Python and Objective-C by James Barclay Feedback :) j.mp/psumac2015-62 2 Dude, Where’s My Source Code? CODE https://github.com/futureimperfect/psu-pyobjc-demo https://github.com/futureimperfect/PSUDemo SLIDES https://github.com/futureimperfect/slides 3 Dude, Where’s My Source Code? CODE https://github.com/futureimperfect/psu-pyobjc-demo https://github.com/futureimperfect/PSUDemo SLIDES https://github.com/futureimperfect/slides 3 Dude, Where’s My Source Code? CODE https://github.com/futureimperfect/psu-pyobjc-demo https://github.com/futureimperfect/PSUDemo SLIDES https://github.com/futureimperfect/slides 3 Agenda 1. What are system frameworks, and why should you care? 2. Brief overview of the frameworks, classes, and APIs that will be demonstrated. 3. Demo 1: PyObjC 4. Demo 2: Objective-C 5. Wrap up and questions. 4 What’s a System Framework? …and why should you care? (OS X) system frameworks provide interfaces you need to write software for the Mac. Many of these are useful for Mac admins creating: • scripts • GUI applications • command-line tools Learning about system frameworks will teach you more about OS X, which will probably make you a better admin. 5 Frameworks, Classes, and APIs oh my! Cocoa CoreFoundation • Foundation • CFPreferences - NSFileManager CoreGraphics - NSTask • Quartz - NSURLSession - NSUserDefaults • AppKit - NSApplication 6 CoreFoundation CoreFoundation is a C framework that knows about Objective-C objects. Some parts of CoreFoundation are written in Objective-C. • Other parts are written in C. CoreFoundation uses the CF class prefix, and it provides CFString, CFDictionary, CFPreferences, and the like. Some Objective-C objects are really CF types behind the scenes.
    [Show full text]
  • Impassive Modernism in Arabic and Hebrew Literatures
    UNIVERSITY OF CALIFORNIA Los Angeles Against the Flow: Impassive Modernism in Arabic and Hebrew Literatures A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Comparative Literature by Shir Alon 2017 © Copyright by Shir Alon 2017 ABSTRACT OF THE DISSERTATION Against the Flow: Impassive Modernism in Arabic and Hebrew Literatures by Shir Alon Doctor of Philosophy in Comparative Literature University of California, Los Angeles, 2017 Professor Gil Hochberg, Co-Chair Professor Nouri Gana, Co-Chair Against the Flow: Impassive Modernism in Arabic and Hebrew Literatures elaborates two interventions in contemporary studies of Middle Eastern Literatures, Global Modernisms, and Comparative Literature: First, the dissertation elaborates a comparative framework to read twentieth century Arabic and Hebrew literatures side by side and in conversation, as two literary cultures sharing, beyond a contemporary reality of enmity and separation, a narrative of transition to modernity. The works analyzed in the dissertation, hailing from Lebanon, Palestine, Israel, Egypt, and Tunisia, emerge against the Hebrew and Arabic cultural and national renaissance movements, and the establishment of modern independent states in the Middle East. The dissertation stages encounters between Arabic and Hebrew literary works, exploring the ii parallel literary forms they develop in response to shared temporal narratives of a modernity outlined elsewhere and already, and in negotiation with Orientalist legacies. Secondly, the dissertation develops a generic-formal framework to address the proliferation of static and decadent texts emerging in a cultural landscape of national revival and its aftermaths, which I name impassive modernism. Viewed against modernism’s emphatic features, impassive modernism is characterized by affective and formal investment in stasis, immobility, or immutability: suspension in space or time and a desire for nonproductivity.
    [Show full text]
  • Vmware Fusion 12 Vmware Fusion Pro 12 Using Vmware Fusion
    Using VMware Fusion 8 SEP 2020 VMware Fusion 12 VMware Fusion Pro 12 Using VMware Fusion You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2020 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents Using VMware Fusion 9 1 Getting Started with Fusion 10 About VMware Fusion 10 About VMware Fusion Pro 11 System Requirements for Fusion 11 Install Fusion 12 Start Fusion 13 How-To Videos 13 Take Advantage of Fusion Online Resources 13 2 Understanding Fusion 15 Virtual Machines and What Fusion Can Do 15 What Is a Virtual Machine? 15 Fusion Capabilities 16 Supported Guest Operating Systems 16 Virtual Hardware Specifications 16 Navigating and Taking Action by Using the Fusion Interface 21 VMware Fusion Toolbar 21 Use the Fusion Toolbar to Access the Virtual-Machine Path 21 Default File Location of a Virtual Machine 22 Change the File Location of a Virtual Machine 22 Perform Actions on Your Virtual Machines from the Virtual Machine Library Window 23 Using the Home Pane to Create a Virtual Machine or Obtain One from Another Source 24 Using the Fusion Applications Menus 25 Using Different Views in the Fusion Interface 29 Resize the Virtual Machine Display to Fit 35 Using Multiple Displays 35 3 Configuring Fusion 37 Setting Fusion Preferences 37 Set General Preferences 37 Select a Keyboard and Mouse Profile 38 Set Key Mappings on the Keyboard and Mouse Preferences Pane 39 Set Mouse Shortcuts on the Keyboard and Mouse Preference Pane 40 Enable or Disable Mac Host Shortcuts on the Keyboard and Mouse Preference Pane 40 Enable Fusion Shortcuts on the Keyboard and Mouse Preference Pane 41 Set Fusion Display Resolution Preferences 41 VMware, Inc.
    [Show full text]
  • In Re Equifax Inc. Securities Litigation 17-CV-03463-Consolidated Class
    Case 1:17-cv-03463-TWT Document 49 Filed 04/23/18 Page 1 of 198 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF GEORGIA ATLANTA DIVISION IN RE EQUIFAX INC. SECURITIES Consolidated Case No. LITIGATION 1:17-cv-03463-TWT CONSOLIDATED CLASS ACTION COMPLAINT FOR VIOLATIONS OF THE FEDERAL SECURITIES LAWS Case 1:17-cv-03463-TWT Document 49 Filed 04/23/18 Page 2 of 198 TABLE OF CONTENTS Page I. PRELIMINARY STATEMENT .....................................................................2 II. PARTIES .......................................................................................................10 A. Lead Plaintiff ...................................................................................... 10 B. Defendants .......................................................................................... 10 1. Equifax, Inc. ............................................................................. 10 2. Individual Defendants .............................................................. 12 III. JURISDICTION AND VENUE ....................................................................13 IV. SUMMARY OF THE FRAUD .....................................................................13 A. Equifax’s Business is to Collect and Sell Sensitive Personal Information About Global Consumers ............................................... 13 B. Defendants Knew that Securing the Information Equifax Collected Was Critical to the Company’s Business ........................... 16 C. Defendants Issue Statements Touting Cybersecurity, Compliance with
    [Show full text]
  • 1. the ZK User Interface Markup Language
    1. The ZK User Interface Markup Language The ZK User Interface Markup Language (ZUML) is based on XML. Each XML element describes what component to create. XML This section provides the most basic concepts of XML to work with ZK. If you are familiar with XML, you could skip this section. If you want to learn more, there are a lot of resources on Internet, such as http://www.w3schools.com/xml/xml_whatis.asp and http://www.xml.com/pub/a/98/10/guide0.html. XML is a markup language much like HTML but with stricter and cleaner syntax. It has several characteristics worth to notice. Elements Must Be Well-formed First, each element must be closed. They are two ways to close an element as depicted below. They are equivalent. Close by an end tag: <window></window> Close without an end tag: <window/> Second, elements must be properly nested. Correct: <window> <groupbox> Hello World! </groupbox> </window> Wrong: <window> <groupbox> Hello World! </window> </groupbox> Special Character Must Be Replaced XML uses <element-name> to denote an element, so you have to replace special characters. For example, you have to use &lt; to represent the < character. ZK: Developer's Guide Page 1 of 92 Potix Corporation Special Character Replaced With < &lt; > &gt; & &amp; " &quot; ' &apos; It is interesting to notice that backslash (\) is not a special character, so you don't need to escape it at all. Attribute Values Must Be Specified and Quoted Correct: width="100%" checked="true" Wrong: width=100% checked Comments A comment is used to leave a note or to temporarily edit out a portion of XML code.
    [Show full text]
  • Bridging the Realism Gap for CAD-Based Visual Recognition
    University of Passau Faculty of Computer Science and Mathematics (FIM) Chair of Distributed Information Systems Computer Science Bridging the Realism Gap for CAD-Based Visual Recognition Benjamin Planche A Dissertation Presented to the Faculty of Computer Science and Mathematics of the University of Passau in Partial Fulfillment of the Requirements for the Degree of Doctor of Natural Sciences 1. Reviewer Prof. Dr. Harald Kosch Chair of Distributed Information Systems University of Passau 2. Reviewer Prof. Dr. Serge Miguet LIRIS Laboratory Université Lumière Lyon 2 Passau – September 17, 2019 Benjamin Planche Bridging the Realism Gap for CAD-Based Visual Recognition Computer Science, September 17, 2019 Reviewers: Prof. Dr. Harald Kosch and Prof. Dr. Serge Miguet University of Passau Chair of Distributed Information Systems Faculty of Computer Science and Mathematics (FIM) Innstr. 33 94032 Passau Abstract Computer vision aims at developing algorithms to extract high-level information from images and videos. In the industry, for instance, such algorithms are applied to guide manufacturing robots, to visually monitor plants, or to assist human operators in recognizing specific components. Recent progress in computer vision has been dominated by deep artificial neural network, i.e., machine learning methods simulating the way that information flows in our biological brains, and the way that our neural networks adapt and learn from experience. For these methods to learn how to accurately perform complex visual tasks, large amounts of annotated images are needed. Collecting and labeling such domain-relevant training datasets is, however, a tedious—sometimes impossible—task. Therefore, it has become common practice to leverage pre-available three-dimensional (3D) models instead, to generate synthetic images for the recognition algorithms to be trained on.
    [Show full text]
  • A Framework for Compiling C++ Programs with Encrypted Operands
    1 E3: A Framework for Compiling C++ Programs with Encrypted Operands Eduardo Chielle, Oleg Mazonka, Homer Gamil, Nektarios Georgios Tsoutsos and Michail Maniatakos Abstract In this technical report we describe E3 (Encrypt-Everything-Everywhere), a framework which enables execution of standard C++ code with homomorphically encrypted variables. The framework automatically generates protected types so the programmer can remain oblivious to the underlying encryption scheme. C++ protected classes redefine operators according to the encryption scheme effectively making the introduction of a new API unnecessary. At its current version, E3 supports a variety of homomorphic encryption libraries, batching, mixing different encryption schemes in the same program, as well as the ability to combine modular computation and bit-level computation. I. INTRODUCTION In this document, we describe the E3 (Encrypt-Everything-Everywhere) framework for deploying private computation in C++ programs. Our framework combines the properties of both bit-level arithmetic and modular arithmetic within the same algorithm. The framework provides novel protected types using standard C++ without introducing a new library API. E3 is developed in C++, is open source [2], and works in Windows and Linux OSes. Unique features of E3: 1) Enables secure general-purpose computation using protected types equivalent to standard C++ integral types. The protected types, and consequently the code using them, do not depend on the underlying encryption scheme, which makes the data encryption independent of the program. 2) Allows using different FHE schemes in the same program as well as the same FHE scheme with different keys. E. Chielle, O. Mazonka, H. Gamil, and M. Maniatakos are with the Center for Cyber Security, New York University Abu Dhabi, UAE.
    [Show full text]
  • Impacts of Object Oriented Programming on Web Application Development
    International Journal of Computer Applications Technology and Research Volume 4– Issue 9, 706 - 710, 2015, ISSN: 2319–8656 Impacts of Object Oriented Programming on Web Application Development Onu F. U. Osisikankwu P. U. Madubuike C. E. James G. Computer Science Department of Computer Science Computer Science Department, Computing and Department, Department, Ebonyi State Engineering, Akanu Ibiam Federal Obong University University, University of Polytechnic, Akwa-Ibom, Nigeria Sunderland, Uwanna, Nigeria UK Nigeria Abstract: Development of web application nowadays can hardly survive without object oriented approach except for the purpose of just information display. The complexity of application development and the need for content organization has raised the need for web application developers to embrace object oriented programming approach. This paper exposes the impact of object oriented programming on web application development. The exposition was done through a detailed study and analysis of information from secondary sources. The internet was usefully employed to access journal articles for both national and international sources. Our study enables web developers and designers to understand web application features, tools and methodologies for developing web application. It also keeps researchers and scholars abreast of the boost which OOP has brought into Web Applications development. Keywords: Object-Oriented Paradigm; Web; Web 2.0; RIAs; URL. 1. INTRODUCTION According to [17], Web Applications are web sites which are designers to understand web application features and popular dynamic in nature and uses server side programming to allow languages, tools, and methodologies for developing web a good interaction between the user form at the front end, and application. the database at the back-end.
    [Show full text]
  • Using the Java Bridge
    Using the Java Bridge In the worlds of Mac OS X, Yellow Box for Windows, and WebObjects programming, there are two languages in common use: Java and Objective-C. This document describes the Java bridge, a technology from Apple that makes communication between these two languages possible. The first section, ÒIntroduction,Ó gives a brief overview of the bridgeÕs capabilities. For a technical overview of the bridge, see ÒHow the Bridge WorksÓ (page 2). To learn how to expose your Objective-C code to Java, see ÒWrapping Objective-C FrameworksÓ (page 9). If you want to write Java code that references Objective-C classes, see ÒUsing Java-Wrapped Objective-C ClassesÓ (page 6). If you are writing Objective-C code that references Java classes, read ÒUsing Java from Objective-CÓ (page 5). Introduction The original OpenStep system developed by NeXT Software contained a number of object-oriented frameworks written in the Objective-C language. Most developers who used these frameworks wrote their code in Objective-C. In recent years, the number of developers writing Java code has increased dramatically. For the benefit of these programmers, Apple Computer has provided Java APIs for these frameworks: Foundation Kit, AppKit, WebObjects, and Enterprise Objects. They were made possible by using techniques described later in Introduction 1 Using the Java Bridge this document. You can use these same techniques to expose your own Objective-C frameworks to Java code. Java and Objective-C are both object-oriented languages, and they have enough similarities that communication between the two is possible. However, there are some differences between the two languages that you need to be aware of in order to use the bridge effectively.
    [Show full text]
  • Continuous Transition from Model-Driven Prototype to Full-Size Real-World Enterprise Information Systems
    [GNM+20] A. Gerasimov, J. Michael, L. Netz, B. Rumpe, S. Varga: Continuous Transition from Model-Driven Prototype to Full-Size Real-World Enterprise Information Systems. In: 25th Americas Conference on Information Systems (AMCIS 2020), pp. 1-10, Association for Information Systems (AIS), Aug. 2020. Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2020 Proceedings Systems Analysis and Design (SIGSAND) Aug 10th, 12:00 AM Continuous Transition from Model-Driven Prototype to Full-Size Real-World Enterprise Information Systems Arkadii Gerasimov RWTH Aachen University, [email protected] Judith Michael RWTH Aachen University, [email protected] Lukas Netz Chair of Software Engineering, [email protected] Bernhard Rumpe RWTH Aachen University, [email protected] Simon Varga RWTH Aachen University, [email protected] Follow this and additional works at: https://aisel.aisnet.org/amcis2020 Recommended Citation Gerasimov, Arkadii; Michael, Judith; Netz, Lukas; Rumpe, Bernhard; and Varga, Simon, "Continuous Transition from Model-Driven Prototype to Full-Size Real-World Enterprise Information Systems" (2020). AMCIS 2020 Proceedings. 2. https://aisel.aisnet.org/amcis2020/systems_analysis_design/systems_analysis_design/2 This material is brought to you by the Americas Conference on Information Systems (AMCIS) at AIS Electronic Library (AISeL). It has been accepted for inclusion in AMCIS 2020 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact [email protected]. Continuous
    [Show full text]
  • A Framework for Toxic Tort Litigation
    A FRAMEWORK FOR TOXIC TORT LITIGATION Joe G. Hollingsworth Katharine R. Latimer Hollingsworth LLP Foreword Dorothy P. Watson Vice President and General Counsel Novartis Pharmaceuticals Corporation WASHINGTON LEGAL FOUNDATION Washington, D.C. This Monograph is one of a series of original papers published by the Legal Studies Division of the Washington Legal Foundation. Through this and other publications, WLF seeks to provide the national legal community with legal studies on a variety of timely public policy issues. Additional copies of this Monograph may be obtained by writing to the Publications Department, Washington Legal Foundation, 2009 Massachusetts Avenue, N.W., Washington, D.C. 20036. Other recent studies in the WLF Monograph series include: Science Through the Looking-Glass: The Manipulation of “Addiction” & Its Influence over Obesity Policy by Dr. John C. Luik. Foreword by Daniel J. Popeo, Washington Legal Foundation. 2007. Library of Congress No. 2007931992. Ideology Masked As Scientific Truth: The Debate About Advertising And Children by Dr. John C. Luik. Foreword by Professor Todd J. Zywicki, George Mason University Law School. 2006. Library of Congress No. 2006927394 Waiver Of The Attorney-Client Privilege: A Balanced Approach by The Honorable Dick Thornburgh, Kirkpatrck & Lockhart Nicholson Graham LLP. Foreword by The Honorable John Engler, President and CEO, National Association of Manufacturers. Introduction by Laura Stein, Senior Vice President – General Counsel and Corporate Secretary, The Clorox Company. 2006. Library of Congress No. 2006927395. Exporting Precaution: How Europe’s Risk-Free Regulatory Agenda Threatens American Free Enterprise by Lawrence A. Kogan, Institute for Trade, Standards and Sustainable Development, Inc. Commentary by The Honorable James C.
    [Show full text]
  • ZKTM Mobile for Android the Quick Start Guide
    ppoottiixx SIMPLY REACH ZKTM Mobile for Android The Quick Start Guide Version 0.8.1 Feburary 2008 Potix Corporation ZK Mobile for Android for Android: Quick Start Guide Page 1 of 14 Potix Corporation Copyright © Potix Corporation. All rights reserved. The material in this document is for information only and is subject to change without notice. While reasonable efforts have been made to assure its accuracy, Potix Corporation assumes no liability resulting from errors or omissions in this document, or from the use of the information contained herein. Potix Corporation may have patents, patent applications, copyright or other intellectual property rights covering the subject matter of this document. The furnishing of this document does not give you any license to these patents, copyrights or other intellectual property. Potix Corporation reserves the right to make changes in the product design without reservation and without notification to its users. The Potix logo and ZK are trademarks of Potix Corporation. All other product names are trademarks, registered trademarks, or trade names of their respective owners. ZK Mobile for Android for Android: Quick Start Guide Page 2 of 14 Potix Corporation Table of Contents Before You Start.............................................................................................................. 4 New to ZK Framework.....................................................................................................4 New to Google Android....................................................................................................4
    [Show full text]