SlideShare uma empresa Scribd logo
1 de 48
Enterprise Library 3.0:  Overview
Context ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Library Ecosystem Partner blocks Customer blocks Community blocks p&p blocks Application Block  Software Factory and Specifications p&p  Enterprise Library Partner X library Customer Y library Customer Z library
Enterprise Library ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Library 3.0 – Application Blocks Core Caching Security Data  Access Logging Exception Handling Plug-in Config Helpers  & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
Goals of Enterprise Library 3.0 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Library 3.0 – New Features At a Glance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Library 3.0 – Application Blocks Core Caching Security Data  Access Logging Exception Handling Plug-in Config Helpers  & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
The Core ,[object Object],[object Object],[object Object],[object Object]
Configuration ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Configuration Design & Tooling ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Instrumentation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Object Builder ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Library 3.0 – Application Blocks Core Caching Security Data  Access Logging Exception Handling Plug-in Config Helpers  & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
Exception Handling Scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object]
Exception Handling Application Block ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Exception Handling - Example ,[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Library 3.0 – Application Blocks Core Caching Security Data  Access Logging Exception Handling Plug-in Config Helpers  & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
Logging Scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object]
Logging Application Block ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Logging - Examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],// Or if you prefer one line... Customer cust = GetCustomer(123); // Log the customer – will call cust.ToString() for the log entry Logger.Write(cust, category, priority);
Enterprise Library 3.0 – Application Blocks Core Caching Security Data  Access Logging Exception Handling Plug-in Config Helpers  & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
Data Access Scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data Access Application Block ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Access - Examples Public Function GetProductsInCategory(ByVal Category As Integer) As DataSet ' Create the Database object, using the database instance with the ' specified logical name. This is mapped to a connection string in  ' the configuration file Dim db As Database = DatabaseFactory.CreateDatabase("Sales") ' Invoke the stored procedure with one line of code! return db.ExecuteDataSet("GetProductsByCategory", Category) ' Note: connection was closed by ExecuteDataSet method call  End Function public Dataset GetProductsInCategory(string connectionString, int category)  { // Create the Database object, using the specified connection string SqlDatabase db = new SqlDatabase(connectionString);  // Invoke the stored procedure with one line of code! return db.ExecuteDataSet("GetProductsByCategory", category); // Note: connection was closed by ExecuteDataSet method call  }
Enterprise Library 3.0 – Application Blocks Core Caching Security Data  Access Logging Exception Handling Plug-in Config Helpers  & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
Caching Scenarios ,[object Object],[object Object],[object Object]
Caching Application Block ,[object Object],[object Object],[object Object],[object Object]
Enterprise Library 3.0 – Application Blocks Core Caching Security Data  Access Logging Exception Handling Plug-in Config Helpers  & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
Cryptography Scenarios ,[object Object],[object Object],[object Object]
Cryptography Application Block ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Library 3.0 – Application Blocks Core Caching Security Data  Access Logging Exception Handling Plug-in Config Helpers  & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
Security Scenarios ,[object Object],[object Object],[object Object],[object Object]
Security Application Block + ASP.NET ,[object Object],[object Object],[object Object],[object Object],ASP.NET Client Code Security Application Block Membership Profile Membership Provider Profile Provider Authorization Factory Security Cache Factory IAuthorization Provider ISecurity Cache Provider Authorization Rule Provider Caching Store Provider AzMan Authorization Provider ActiveDirectory Membership Provider Sql Membership Provider Sql Profile Provider Caching Application Block
Enterprise Library 3.0 – Application Blocks Core Caching Security Data  Access Logging Exception Handling Plug-in Config Helpers  & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
Validation Scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Validation Application Block ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Validation Example [StringLengthValidator(1, 50, Ruleset=&quot; RuleSetA &quot;, MessageTemplate=&quot; Last Name must be 1-50 characters &quot;)] public string  LastName { get  {  return  lastName; } set  { lastName =  value ; } } [RegexValidator( @&quot;+([-+.']+)*@+([-.]+)*+([-.]+)*&quot; , MessageTemplate=&quot; Invalid e-mail address &quot;,  Ruleset=&quot; RuleSetA &quot;)] public string  Email { get  { return email; } set  { email =  value ; } } Validator<Customer> validator = ValidationFactory.CreateValidator<Customer>(&quot;Ruleset&quot;); ValidationResults results = validator.Validate(customer); if (!results.IsValid) { foreach (ValidationResult result in results) { Console.WriteLine(&quot;Message={0}, Key={1}, &quot;Tag={2}&quot;, result.Message,  result.Key.ToString(),  result.Tag == null ? &quot;null&quot; : &quot;amp;quot;&quot; + result.Tag.ToString() + &quot;amp;quot;&quot;); } } Specify validation rules in attributes… … or in configuration Validate objects and process results
Enterprise Library 3.0 – Application Blocks Core Caching Security Data  Access Logging Exception Handling Plug-in Config Helpers  & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
Policy Injection Scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Policy Injection Application Block ,[object Object],[object Object],[object Object],[object Object]
Policy Injection Example public class BankAccount : MarshalByRefObject { // Constructors and fields omitted [ValidationCallHandler] public void Deposit([RangeValidator(typeof(Decimal), &quot;0.0&quot;,  RangeBoundaryType.Exclusive, &quot;0.0&quot;, RangeBoundaryType.Ignore)] decimal depositAmount) { balance += depositAmount; } } BankAccount account = PolicyInjection.Create<BankAccount>(customerId); account.Deposit(1234.56M); Write classes that extend MBRO or implement an interface Apply Handlers using attributes if desired Apply Policies using configuration if desired Create objects using PolicyInjection class Call your methods the usual way
Automation
Application Block Software Factory ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Application Block Software Factory
Strong Naming Guidance Package  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Resources  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 

Mais conteúdo relacionado

Mais procurados

Informix Data Streaming Overview
Informix Data Streaming OverviewInformix Data Streaming Overview
Informix Data Streaming OverviewBrian Hughes
 
.NET Core, ASP.NET Core Course, Session 8
.NET Core, ASP.NET Core Course, Session 8.NET Core, ASP.NET Core Course, Session 8
.NET Core, ASP.NET Core Course, Session 8aminmesbahi
 
.NET Attributes and Reflection - What a Developer Needs to Know...
.NET Attributes and Reflection - What a Developer Needs to Know....NET Attributes and Reflection - What a Developer Needs to Know...
.NET Attributes and Reflection - What a Developer Needs to Know...Dan Douglas
 
Repository Pattern in MVC3 Application with Entity Framework
Repository Pattern in MVC3 Application with Entity FrameworkRepository Pattern in MVC3 Application with Entity Framework
Repository Pattern in MVC3 Application with Entity FrameworkAkhil Mittal
 
Continuous Test Automation, by Richard Langlois P. Eng. and Yuri Pechenko.
Continuous Test Automation, by Richard Langlois P. Eng. and Yuri Pechenko.Continuous Test Automation, by Richard Langlois P. Eng. and Yuri Pechenko.
Continuous Test Automation, by Richard Langlois P. Eng. and Yuri Pechenko.Richard Langlois P. Eng.
 

Mais procurados (9)

Day7
Day7Day7
Day7
 
Informix Data Streaming Overview
Informix Data Streaming OverviewInformix Data Streaming Overview
Informix Data Streaming Overview
 
.NET Core, ASP.NET Core Course, Session 8
.NET Core, ASP.NET Core Course, Session 8.NET Core, ASP.NET Core Course, Session 8
.NET Core, ASP.NET Core Course, Session 8
 
Day6
Day6Day6
Day6
 
Day1
Day1Day1
Day1
 
.NET Attributes and Reflection - What a Developer Needs to Know...
.NET Attributes and Reflection - What a Developer Needs to Know....NET Attributes and Reflection - What a Developer Needs to Know...
.NET Attributes and Reflection - What a Developer Needs to Know...
 
Repository Pattern in MVC3 Application with Entity Framework
Repository Pattern in MVC3 Application with Entity FrameworkRepository Pattern in MVC3 Application with Entity Framework
Repository Pattern in MVC3 Application with Entity Framework
 
Day5
Day5Day5
Day5
 
Continuous Test Automation, by Richard Langlois P. Eng. and Yuri Pechenko.
Continuous Test Automation, by Richard Langlois P. Eng. and Yuri Pechenko.Continuous Test Automation, by Richard Langlois P. Eng. and Yuri Pechenko.
Continuous Test Automation, by Richard Langlois P. Eng. and Yuri Pechenko.
 

Destaque

Sustaining Innovation: Library 3.0
Sustaining Innovation: Library 3.0Sustaining Innovation: Library 3.0
Sustaining Innovation: Library 3.0Ridwan Sanjaya
 
Web 2.0 / Library 2.0 Part Two
Web 2.0 / Library 2.0 Part TwoWeb 2.0 / Library 2.0 Part Two
Web 2.0 / Library 2.0 Part TwoEddie Byrne
 
From Web 2.0 to Web 3.0: Yesterday, Today, Tomorrow. Where the Technology is ...
From Web 2.0 to Web 3.0: Yesterday, Today, Tomorrow. Where the Technology is ...From Web 2.0 to Web 3.0: Yesterday, Today, Tomorrow. Where the Technology is ...
From Web 2.0 to Web 3.0: Yesterday, Today, Tomorrow. Where the Technology is ...Pavlinka Kovatcheva
 
Library 2.0 technologies in academic libraries, a case study of student use a...
Library 2.0 technologies in academic libraries, a case study of student use a...Library 2.0 technologies in academic libraries, a case study of student use a...
Library 2.0 technologies in academic libraries, a case study of student use a...Anne Morris
 
library 3.0
library 3.0library 3.0
library 3.0maller
 
Enterprise Library 2.0 Core Architecture
Enterprise Library 2.0 Core ArchitectureEnterprise Library 2.0 Core Architecture
Enterprise Library 2.0 Core Architecturemcgurk
 
Developer’s guide to microsoft enterprise library preview
Developer’s guide to microsoft enterprise library previewDeveloper’s guide to microsoft enterprise library preview
Developer’s guide to microsoft enterprise library previewSteve Xu
 
Library Policies: The Good, The Bad, and The Ugly
Library Policies: The Good, The Bad, and The UglyLibrary Policies: The Good, The Bad, and The Ugly
Library Policies: The Good, The Bad, and The UglyMichael Sauers
 
Reaching the Users Where They Are: Web 2.0 Tools for Libraries (Library 2.0)
Reaching the Users Where They Are: Web 2.0 Tools for Libraries (Library 2.0)Reaching the Users Where They Are: Web 2.0 Tools for Libraries (Library 2.0)
Reaching the Users Where They Are: Web 2.0 Tools for Libraries (Library 2.0)S. L. Faisal
 
School Fire Safety Inspections
School Fire Safety InspectionsSchool Fire Safety Inspections
School Fire Safety InspectionsMeg Thompson
 
Writers ua0312
Writers ua0312Writers ua0312
Writers ua0312bethgerber
 
Library policy
Library policyLibrary policy
Library policynwls
 
السلامة الكيميائية
السلامة الكيميائيةالسلامة الكيميائية
السلامة الكيميائيةmanar410
 
Usage des réseaux sociaux en bibliothèque
Usage des réseaux sociaux en bibliothèqueUsage des réseaux sociaux en bibliothèque
Usage des réseaux sociaux en bibliothèquePauline Moirez
 
Web 3.0 UX Patterns - Presented at Sencha New York Meetup September 2010
Web 3.0 UX Patterns - Presented at Sencha New York Meetup September 2010Web 3.0 UX Patterns - Presented at Sencha New York Meetup September 2010
Web 3.0 UX Patterns - Presented at Sencha New York Meetup September 2010Patrick Sheridan
 
Présence des bibliothèques sur Facebook RELOADED
Présence des bibliothèques sur Facebook RELOADEDPrésence des bibliothèques sur Facebook RELOADED
Présence des bibliothèques sur Facebook RELOADEDAlain Marois
 
Facebook et bibliothèques : une introduction et des exemples
Facebook et bibliothèques : une introduction et des exemplesFacebook et bibliothèques : une introduction et des exemples
Facebook et bibliothèques : une introduction et des exemplesAlain Marois
 

Destaque (20)

Sustaining Innovation: Library 3.0
Sustaining Innovation: Library 3.0Sustaining Innovation: Library 3.0
Sustaining Innovation: Library 3.0
 
Web 2.0 / Library 2.0 Part Two
Web 2.0 / Library 2.0 Part TwoWeb 2.0 / Library 2.0 Part Two
Web 2.0 / Library 2.0 Part Two
 
From Web 2.0 to Web 3.0: Yesterday, Today, Tomorrow. Where the Technology is ...
From Web 2.0 to Web 3.0: Yesterday, Today, Tomorrow. Where the Technology is ...From Web 2.0 to Web 3.0: Yesterday, Today, Tomorrow. Where the Technology is ...
From Web 2.0 to Web 3.0: Yesterday, Today, Tomorrow. Where the Technology is ...
 
Library 2.0 technologies in academic libraries, a case study of student use a...
Library 2.0 technologies in academic libraries, a case study of student use a...Library 2.0 technologies in academic libraries, a case study of student use a...
Library 2.0 technologies in academic libraries, a case study of student use a...
 
library 3.0
library 3.0library 3.0
library 3.0
 
Enterprise Library 2.0 Core Architecture
Enterprise Library 2.0 Core ArchitectureEnterprise Library 2.0 Core Architecture
Enterprise Library 2.0 Core Architecture
 
Enterprise Library 5
Enterprise Library 5Enterprise Library 5
Enterprise Library 5
 
Developer’s guide to microsoft enterprise library preview
Developer’s guide to microsoft enterprise library previewDeveloper’s guide to microsoft enterprise library preview
Developer’s guide to microsoft enterprise library preview
 
Policywriting
PolicywritingPolicywriting
Policywriting
 
Library Policies: The Good, The Bad, and The Ugly
Library Policies: The Good, The Bad, and The UglyLibrary Policies: The Good, The Bad, and The Ugly
Library Policies: The Good, The Bad, and The Ugly
 
Reaching the Users Where They Are: Web 2.0 Tools for Libraries (Library 2.0)
Reaching the Users Where They Are: Web 2.0 Tools for Libraries (Library 2.0)Reaching the Users Where They Are: Web 2.0 Tools for Libraries (Library 2.0)
Reaching the Users Where They Are: Web 2.0 Tools for Libraries (Library 2.0)
 
School Fire Safety Inspections
School Fire Safety InspectionsSchool Fire Safety Inspections
School Fire Safety Inspections
 
Writers ua0312
Writers ua0312Writers ua0312
Writers ua0312
 
Library policy
Library policyLibrary policy
Library policy
 
السلامة الكيميائية
السلامة الكيميائيةالسلامة الكيميائية
السلامة الكيميائية
 
Librarian 2.0
Librarian 2.0Librarian 2.0
Librarian 2.0
 
Usage des réseaux sociaux en bibliothèque
Usage des réseaux sociaux en bibliothèqueUsage des réseaux sociaux en bibliothèque
Usage des réseaux sociaux en bibliothèque
 
Web 3.0 UX Patterns - Presented at Sencha New York Meetup September 2010
Web 3.0 UX Patterns - Presented at Sencha New York Meetup September 2010Web 3.0 UX Patterns - Presented at Sencha New York Meetup September 2010
Web 3.0 UX Patterns - Presented at Sencha New York Meetup September 2010
 
Présence des bibliothèques sur Facebook RELOADED
Présence des bibliothèques sur Facebook RELOADEDPrésence des bibliothèques sur Facebook RELOADED
Présence des bibliothèques sur Facebook RELOADED
 
Facebook et bibliothèques : une introduction et des exemples
Facebook et bibliothèques : une introduction et des exemplesFacebook et bibliothèques : une introduction et des exemples
Facebook et bibliothèques : une introduction et des exemples
 

Semelhante a Enterprise Library 3.0 Overview

Net framework session03
Net framework session03Net framework session03
Net framework session03Vivek chan
 
Oracle UCM Implementation Patterns
Oracle UCM Implementation PatternsOracle UCM Implementation Patterns
Oracle UCM Implementation PatternsBrian Huff
 
Getting Started with Enterprise Library 3.0 in ASP.NET
Getting Started with Enterprise Library 3.0 in ASP.NETGetting Started with Enterprise Library 3.0 in ASP.NET
Getting Started with Enterprise Library 3.0 in ASP.NETPhilWinstanley
 
Introduction to Azure Cloud Storage
Introduction to Azure Cloud StorageIntroduction to Azure Cloud Storage
Introduction to Azure Cloud StorageGanga R Jaiswal
 
System verilog important
System verilog importantSystem verilog important
System verilog importantelumalai7
 
Flex 4.5 jeyasekar
Flex 4.5  jeyasekarFlex 4.5  jeyasekar
Flex 4.5 jeyasekarjeya soft
 
Automate Best Practices
Automate Best PracticesAutomate Best Practices
Automate Best PracticesHelpSystems
 
Play framework : A Walkthrough
Play framework : A WalkthroughPlay framework : A Walkthrough
Play framework : A Walkthroughmitesh_sharma
 
Silverlight Development & The Model-View-ViewModel Pattern
Silverlight Development & The Model-View-ViewModel PatternSilverlight Development & The Model-View-ViewModel Pattern
Silverlight Development & The Model-View-ViewModel PatternDerek Novavi
 
IntelliJ IDEA Architecture and Performance
IntelliJ IDEA Architecture and PerformanceIntelliJ IDEA Architecture and Performance
IntelliJ IDEA Architecture and Performanceintelliyole
 
Unit Testing Documentum Foundation Classes Code
Unit Testing Documentum Foundation Classes CodeUnit Testing Documentum Foundation Classes Code
Unit Testing Documentum Foundation Classes CodeBlueFish
 
Whats New In 2010 (Msdn & Visual Studio)
Whats New In 2010 (Msdn & Visual Studio)Whats New In 2010 (Msdn & Visual Studio)
Whats New In 2010 (Msdn & Visual Studio)Steve Lange
 
Deep Dive on Amazon EC2 Systems Manager
Deep Dive on Amazon EC2 Systems ManagerDeep Dive on Amazon EC2 Systems Manager
Deep Dive on Amazon EC2 Systems ManagerAmazon Web Services
 
Patterns (contd)Software Development ProcessDesign patte.docx
Patterns (contd)Software Development ProcessDesign patte.docxPatterns (contd)Software Development ProcessDesign patte.docx
Patterns (contd)Software Development ProcessDesign patte.docxdanhaley45372
 

Semelhante a Enterprise Library 3.0 Overview (20)

Net framework session03
Net framework session03Net framework session03
Net framework session03
 
Oracle UCM Implementation Patterns
Oracle UCM Implementation PatternsOracle UCM Implementation Patterns
Oracle UCM Implementation Patterns
 
Unit i
Unit iUnit i
Unit i
 
Getting Started with Enterprise Library 3.0 in ASP.NET
Getting Started with Enterprise Library 3.0 in ASP.NETGetting Started with Enterprise Library 3.0 in ASP.NET
Getting Started with Enterprise Library 3.0 in ASP.NET
 
Introduction to Azure Cloud Storage
Introduction to Azure Cloud StorageIntroduction to Azure Cloud Storage
Introduction to Azure Cloud Storage
 
Tdd,Ioc
Tdd,IocTdd,Ioc
Tdd,Ioc
 
System verilog important
System verilog importantSystem verilog important
System verilog important
 
Vb essentials
Vb essentialsVb essentials
Vb essentials
 
Flex 4.5 jeyasekar
Flex 4.5  jeyasekarFlex 4.5  jeyasekar
Flex 4.5 jeyasekar
 
Automate Best Practices
Automate Best PracticesAutomate Best Practices
Automate Best Practices
 
Play framework : A Walkthrough
Play framework : A WalkthroughPlay framework : A Walkthrough
Play framework : A Walkthrough
 
Silverlight Development & The Model-View-ViewModel Pattern
Silverlight Development & The Model-View-ViewModel PatternSilverlight Development & The Model-View-ViewModel Pattern
Silverlight Development & The Model-View-ViewModel Pattern
 
Sky High With Azure
Sky High With AzureSky High With Azure
Sky High With Azure
 
IntelliJ IDEA Architecture and Performance
IntelliJ IDEA Architecture and PerformanceIntelliJ IDEA Architecture and Performance
IntelliJ IDEA Architecture and Performance
 
Unit Testing Documentum Foundation Classes Code
Unit Testing Documentum Foundation Classes CodeUnit Testing Documentum Foundation Classes Code
Unit Testing Documentum Foundation Classes Code
 
Whats New In 2010 (Msdn & Visual Studio)
Whats New In 2010 (Msdn & Visual Studio)Whats New In 2010 (Msdn & Visual Studio)
Whats New In 2010 (Msdn & Visual Studio)
 
Deep Dive on Amazon EC2 Systems Manager
Deep Dive on Amazon EC2 Systems ManagerDeep Dive on Amazon EC2 Systems Manager
Deep Dive on Amazon EC2 Systems Manager
 
Patterns (contd)Software Development ProcessDesign patte.docx
Patterns (contd)Software Development ProcessDesign patte.docxPatterns (contd)Software Development ProcessDesign patte.docx
Patterns (contd)Software Development ProcessDesign patte.docx
 
Struts
StrutsStruts
Struts
 
Struts Ppt 1
Struts Ppt 1Struts Ppt 1
Struts Ppt 1
 

Último

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Último (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Enterprise Library 3.0 Overview

  • 2.
  • 3. Enterprise Library Ecosystem Partner blocks Customer blocks Community blocks p&p blocks Application Block Software Factory and Specifications p&p Enterprise Library Partner X library Customer Y library Customer Z library
  • 4.
  • 5. Enterprise Library 3.0 – Application Blocks Core Caching Security Data Access Logging Exception Handling Plug-in Config Helpers & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
  • 6.
  • 7.
  • 8. Enterprise Library 3.0 – Application Blocks Core Caching Security Data Access Logging Exception Handling Plug-in Config Helpers & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Enterprise Library 3.0 – Application Blocks Core Caching Security Data Access Logging Exception Handling Plug-in Config Helpers & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
  • 15.
  • 16.
  • 17.
  • 18. Enterprise Library 3.0 – Application Blocks Core Caching Security Data Access Logging Exception Handling Plug-in Config Helpers & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
  • 19.
  • 20.
  • 21.
  • 22. Enterprise Library 3.0 – Application Blocks Core Caching Security Data Access Logging Exception Handling Plug-in Config Helpers & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
  • 23.
  • 24.
  • 25. Data Access - Examples Public Function GetProductsInCategory(ByVal Category As Integer) As DataSet ' Create the Database object, using the database instance with the ' specified logical name. This is mapped to a connection string in ' the configuration file Dim db As Database = DatabaseFactory.CreateDatabase(&quot;Sales&quot;) ' Invoke the stored procedure with one line of code! return db.ExecuteDataSet(&quot;GetProductsByCategory&quot;, Category) ' Note: connection was closed by ExecuteDataSet method call End Function public Dataset GetProductsInCategory(string connectionString, int category) { // Create the Database object, using the specified connection string SqlDatabase db = new SqlDatabase(connectionString); // Invoke the stored procedure with one line of code! return db.ExecuteDataSet(&quot;GetProductsByCategory&quot;, category); // Note: connection was closed by ExecuteDataSet method call }
  • 26. Enterprise Library 3.0 – Application Blocks Core Caching Security Data Access Logging Exception Handling Plug-in Config Helpers & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
  • 27.
  • 28.
  • 29. Enterprise Library 3.0 – Application Blocks Core Caching Security Data Access Logging Exception Handling Plug-in Config Helpers & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
  • 30.
  • 31.
  • 32. Enterprise Library 3.0 – Application Blocks Core Caching Security Data Access Logging Exception Handling Plug-in Config Helpers & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
  • 33.
  • 34.
  • 35. Enterprise Library 3.0 – Application Blocks Core Caching Security Data Access Logging Exception Handling Plug-in Config Helpers & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
  • 36.
  • 37.
  • 38. Validation Example [StringLengthValidator(1, 50, Ruleset=&quot; RuleSetA &quot;, MessageTemplate=&quot; Last Name must be 1-50 characters &quot;)] public string LastName { get { return lastName; } set { lastName = value ; } } [RegexValidator( @&quot;+([-+.']+)*@+([-.]+)*+([-.]+)*&quot; , MessageTemplate=&quot; Invalid e-mail address &quot;, Ruleset=&quot; RuleSetA &quot;)] public string Email { get { return email; } set { email = value ; } } Validator<Customer> validator = ValidationFactory.CreateValidator<Customer>(&quot;Ruleset&quot;); ValidationResults results = validator.Validate(customer); if (!results.IsValid) { foreach (ValidationResult result in results) { Console.WriteLine(&quot;Message={0}, Key={1}, &quot;Tag={2}&quot;, result.Message, result.Key.ToString(), result.Tag == null ? &quot;null&quot; : &quot;amp;quot;&quot; + result.Tag.ToString() + &quot;amp;quot;&quot;); } } Specify validation rules in attributes… … or in configuration Validate objects and process results
  • 39. Enterprise Library 3.0 – Application Blocks Core Caching Security Data Access Logging Exception Handling Plug-in Config Helpers & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
  • 40.
  • 41.
  • 42. Policy Injection Example public class BankAccount : MarshalByRefObject { // Constructors and fields omitted [ValidationCallHandler] public void Deposit([RangeValidator(typeof(Decimal), &quot;0.0&quot;, RangeBoundaryType.Exclusive, &quot;0.0&quot;, RangeBoundaryType.Ignore)] decimal depositAmount) { balance += depositAmount; } } BankAccount account = PolicyInjection.Create<BankAccount>(customerId); account.Deposit(1234.56M); Write classes that extend MBRO or implement an interface Apply Handlers using attributes if desired Apply Policies using configuration if desired Create objects using PolicyInjection class Call your methods the usual way
  • 44.
  • 46.
  • 47.
  • 48.