SlideShare una empresa de Scribd logo
1 de 48
Enterprise Library 3.0:  Overview
Context ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Library Ecosystem Partner blocks Customer blocks Community blocks p&p blocks Application Block  Software Factory and Specifications p&p  Enterprise Library Partner X library Customer Y library Customer Z library
Enterprise Library ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Library 3.0 – Application Blocks Core Caching Security Data  Access Logging Exception Handling Plug-in Config Helpers  & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
Goals of Enterprise Library 3.0 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Library 3.0 – New Features At a Glance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Library 3.0 – Application Blocks Core Caching Security Data  Access Logging Exception Handling Plug-in Config Helpers  & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
The Core ,[object Object],[object Object],[object Object],[object Object]
Configuration ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Configuration Design & Tooling ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Instrumentation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Object Builder ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Library 3.0 – Application Blocks Core Caching Security Data  Access Logging Exception Handling Plug-in Config Helpers  & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
Exception Handling Scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object]
Exception Handling Application Block ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Exception Handling - Example ,[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Library 3.0 – Application Blocks Core Caching Security Data  Access Logging Exception Handling Plug-in Config Helpers  & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
Logging Scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object]
Logging Application Block ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Logging - Examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],// Or if you prefer one line... Customer cust = GetCustomer(123); // Log the customer – will call cust.ToString() for the log entry Logger.Write(cust, category, priority);
Enterprise Library 3.0 – Application Blocks Core Caching Security Data  Access Logging Exception Handling Plug-in Config Helpers  & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
Data Access Scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data Access Application Block ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Access - Examples Public Function GetProductsInCategory(ByVal Category As Integer) As DataSet ' Create the Database object, using the database instance with the ' specified logical name. This is mapped to a connection string in  ' the configuration file Dim db As Database = DatabaseFactory.CreateDatabase("Sales") ' Invoke the stored procedure with one line of code! return db.ExecuteDataSet("GetProductsByCategory", Category) ' Note: connection was closed by ExecuteDataSet method call  End Function public Dataset GetProductsInCategory(string connectionString, int category)  { // Create the Database object, using the specified connection string SqlDatabase db = new SqlDatabase(connectionString);  // Invoke the stored procedure with one line of code! return db.ExecuteDataSet("GetProductsByCategory", category); // Note: connection was closed by ExecuteDataSet method call  }
Enterprise Library 3.0 – Application Blocks Core Caching Security Data  Access Logging Exception Handling Plug-in Config Helpers  & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
Caching Scenarios ,[object Object],[object Object],[object Object]
Caching Application Block ,[object Object],[object Object],[object Object],[object Object]
Enterprise Library 3.0 – Application Blocks Core Caching Security Data  Access Logging Exception Handling Plug-in Config Helpers  & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
Cryptography Scenarios ,[object Object],[object Object],[object Object]
Cryptography Application Block ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Library 3.0 – Application Blocks Core Caching Security Data  Access Logging Exception Handling Plug-in Config Helpers  & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
Security Scenarios ,[object Object],[object Object],[object Object],[object Object]
Security Application Block + ASP.NET ,[object Object],[object Object],[object Object],[object Object],ASP.NET Client Code Security Application Block Membership Profile Membership Provider Profile Provider Authorization Factory Security Cache Factory IAuthorization Provider ISecurity Cache Provider Authorization Rule Provider Caching Store Provider AzMan Authorization Provider ActiveDirectory Membership Provider Sql Membership Provider Sql Profile Provider Caching Application Block
Enterprise Library 3.0 – Application Blocks Core Caching Security Data  Access Logging Exception Handling Plug-in Config Helpers  & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
Validation Scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Validation Application Block ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Validation Example [StringLengthValidator(1, 50, Ruleset=&quot; RuleSetA &quot;, MessageTemplate=&quot; Last Name must be 1-50 characters &quot;)] public string  LastName { get  {  return  lastName; } set  { lastName =  value ; } } [RegexValidator( @&quot;+([-+.']+)*@+([-.]+)*+([-.]+)*&quot; , MessageTemplate=&quot; Invalid e-mail address &quot;,  Ruleset=&quot; RuleSetA &quot;)] public string  Email { get  { return email; } set  { email =  value ; } } Validator<Customer> validator = ValidationFactory.CreateValidator<Customer>(&quot;Ruleset&quot;); ValidationResults results = validator.Validate(customer); if (!results.IsValid) { foreach (ValidationResult result in results) { Console.WriteLine(&quot;Message={0}, Key={1}, &quot;Tag={2}&quot;, result.Message,  result.Key.ToString(),  result.Tag == null ? &quot;null&quot; : &quot;amp;quot;&quot; + result.Tag.ToString() + &quot;amp;quot;&quot;); } } Specify validation rules in attributes… … or in configuration Validate objects and process results
Enterprise Library 3.0 – Application Blocks Core Caching Security Data  Access Logging Exception Handling Plug-in Config Helpers  & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
Policy Injection Scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Policy Injection Application Block ,[object Object],[object Object],[object Object],[object Object]
Policy Injection Example public class BankAccount : MarshalByRefObject { // Constructors and fields omitted [ValidationCallHandler] public void Deposit([RangeValidator(typeof(Decimal), &quot;0.0&quot;,  RangeBoundaryType.Exclusive, &quot;0.0&quot;, RangeBoundaryType.Ignore)] decimal depositAmount) { balance += depositAmount; } } BankAccount account = PolicyInjection.Create<BankAccount>(customerId); account.Deposit(1234.56M); Write classes that extend MBRO or implement an interface Apply Handlers using attributes if desired Apply Policies using configuration if desired Create objects using PolicyInjection class Call your methods the usual way
Automation
Application Block Software Factory ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Application Block Software Factory
Strong Naming Guidance Package  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Resources  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 

Más contenido relacionado

La actualidad más candente

Informix Data Streaming Overview
Informix Data Streaming OverviewInformix Data Streaming Overview
Informix Data Streaming OverviewBrian Hughes
 
.NET Core, ASP.NET Core Course, Session 8
.NET Core, ASP.NET Core Course, Session 8.NET Core, ASP.NET Core Course, Session 8
.NET Core, ASP.NET Core Course, Session 8aminmesbahi
 
.NET Attributes and Reflection - What a Developer Needs to Know...
.NET Attributes and Reflection - What a Developer Needs to Know....NET Attributes and Reflection - What a Developer Needs to Know...
.NET Attributes and Reflection - What a Developer Needs to Know...Dan Douglas
 
Repository Pattern in MVC3 Application with Entity Framework
Repository Pattern in MVC3 Application with Entity FrameworkRepository Pattern in MVC3 Application with Entity Framework
Repository Pattern in MVC3 Application with Entity FrameworkAkhil Mittal
 
Continuous Test Automation, by Richard Langlois P. Eng. and Yuri Pechenko.
Continuous Test Automation, by Richard Langlois P. Eng. and Yuri Pechenko.Continuous Test Automation, by Richard Langlois P. Eng. and Yuri Pechenko.
Continuous Test Automation, by Richard Langlois P. Eng. and Yuri Pechenko.Richard Langlois P. Eng.
 

La actualidad más candente (9)

Day7
Day7Day7
Day7
 
Informix Data Streaming Overview
Informix Data Streaming OverviewInformix Data Streaming Overview
Informix Data Streaming Overview
 
.NET Core, ASP.NET Core Course, Session 8
.NET Core, ASP.NET Core Course, Session 8.NET Core, ASP.NET Core Course, Session 8
.NET Core, ASP.NET Core Course, Session 8
 
Day6
Day6Day6
Day6
 
Day1
Day1Day1
Day1
 
.NET Attributes and Reflection - What a Developer Needs to Know...
.NET Attributes and Reflection - What a Developer Needs to Know....NET Attributes and Reflection - What a Developer Needs to Know...
.NET Attributes and Reflection - What a Developer Needs to Know...
 
Repository Pattern in MVC3 Application with Entity Framework
Repository Pattern in MVC3 Application with Entity FrameworkRepository Pattern in MVC3 Application with Entity Framework
Repository Pattern in MVC3 Application with Entity Framework
 
Day5
Day5Day5
Day5
 
Continuous Test Automation, by Richard Langlois P. Eng. and Yuri Pechenko.
Continuous Test Automation, by Richard Langlois P. Eng. and Yuri Pechenko.Continuous Test Automation, by Richard Langlois P. Eng. and Yuri Pechenko.
Continuous Test Automation, by Richard Langlois P. Eng. and Yuri Pechenko.
 

Destacado

Sustaining Innovation: Library 3.0
Sustaining Innovation: Library 3.0Sustaining Innovation: Library 3.0
Sustaining Innovation: Library 3.0Ridwan Sanjaya
 
Web 2.0 / Library 2.0 Part Two
Web 2.0 / Library 2.0 Part TwoWeb 2.0 / Library 2.0 Part Two
Web 2.0 / Library 2.0 Part TwoEddie Byrne
 
From Web 2.0 to Web 3.0: Yesterday, Today, Tomorrow. Where the Technology is ...
From Web 2.0 to Web 3.0: Yesterday, Today, Tomorrow. Where the Technology is ...From Web 2.0 to Web 3.0: Yesterday, Today, Tomorrow. Where the Technology is ...
From Web 2.0 to Web 3.0: Yesterday, Today, Tomorrow. Where the Technology is ...Pavlinka Kovatcheva
 
Library 2.0 technologies in academic libraries, a case study of student use a...
Library 2.0 technologies in academic libraries, a case study of student use a...Library 2.0 technologies in academic libraries, a case study of student use a...
Library 2.0 technologies in academic libraries, a case study of student use a...Anne Morris
 
library 3.0
library 3.0library 3.0
library 3.0maller
 
Enterprise Library 2.0 Core Architecture
Enterprise Library 2.0 Core ArchitectureEnterprise Library 2.0 Core Architecture
Enterprise Library 2.0 Core Architecturemcgurk
 
Developer’s guide to microsoft enterprise library preview
Developer’s guide to microsoft enterprise library previewDeveloper’s guide to microsoft enterprise library preview
Developer’s guide to microsoft enterprise library previewSteve Xu
 
Library Policies: The Good, The Bad, and The Ugly
Library Policies: The Good, The Bad, and The UglyLibrary Policies: The Good, The Bad, and The Ugly
Library Policies: The Good, The Bad, and The UglyMichael Sauers
 
Reaching the Users Where They Are: Web 2.0 Tools for Libraries (Library 2.0)
Reaching the Users Where They Are: Web 2.0 Tools for Libraries (Library 2.0)Reaching the Users Where They Are: Web 2.0 Tools for Libraries (Library 2.0)
Reaching the Users Where They Are: Web 2.0 Tools for Libraries (Library 2.0)S. L. Faisal
 
School Fire Safety Inspections
School Fire Safety InspectionsSchool Fire Safety Inspections
School Fire Safety InspectionsMeg Thompson
 
Writers ua0312
Writers ua0312Writers ua0312
Writers ua0312bethgerber
 
Library policy
Library policyLibrary policy
Library policynwls
 
السلامة الكيميائية
السلامة الكيميائيةالسلامة الكيميائية
السلامة الكيميائيةmanar410
 
Usage des réseaux sociaux en bibliothèque
Usage des réseaux sociaux en bibliothèqueUsage des réseaux sociaux en bibliothèque
Usage des réseaux sociaux en bibliothèquePauline Moirez
 
Web 3.0 UX Patterns - Presented at Sencha New York Meetup September 2010
Web 3.0 UX Patterns - Presented at Sencha New York Meetup September 2010Web 3.0 UX Patterns - Presented at Sencha New York Meetup September 2010
Web 3.0 UX Patterns - Presented at Sencha New York Meetup September 2010Patrick Sheridan
 
Présence des bibliothèques sur Facebook RELOADED
Présence des bibliothèques sur Facebook RELOADEDPrésence des bibliothèques sur Facebook RELOADED
Présence des bibliothèques sur Facebook RELOADEDAlain Marois
 
Facebook et bibliothèques : une introduction et des exemples
Facebook et bibliothèques : une introduction et des exemplesFacebook et bibliothèques : une introduction et des exemples
Facebook et bibliothèques : une introduction et des exemplesAlain Marois
 

Destacado (20)

Sustaining Innovation: Library 3.0
Sustaining Innovation: Library 3.0Sustaining Innovation: Library 3.0
Sustaining Innovation: Library 3.0
 
Web 2.0 / Library 2.0 Part Two
Web 2.0 / Library 2.0 Part TwoWeb 2.0 / Library 2.0 Part Two
Web 2.0 / Library 2.0 Part Two
 
From Web 2.0 to Web 3.0: Yesterday, Today, Tomorrow. Where the Technology is ...
From Web 2.0 to Web 3.0: Yesterday, Today, Tomorrow. Where the Technology is ...From Web 2.0 to Web 3.0: Yesterday, Today, Tomorrow. Where the Technology is ...
From Web 2.0 to Web 3.0: Yesterday, Today, Tomorrow. Where the Technology is ...
 
Library 2.0 technologies in academic libraries, a case study of student use a...
Library 2.0 technologies in academic libraries, a case study of student use a...Library 2.0 technologies in academic libraries, a case study of student use a...
Library 2.0 technologies in academic libraries, a case study of student use a...
 
library 3.0
library 3.0library 3.0
library 3.0
 
Enterprise Library 2.0 Core Architecture
Enterprise Library 2.0 Core ArchitectureEnterprise Library 2.0 Core Architecture
Enterprise Library 2.0 Core Architecture
 
Enterprise Library 5
Enterprise Library 5Enterprise Library 5
Enterprise Library 5
 
Developer’s guide to microsoft enterprise library preview
Developer’s guide to microsoft enterprise library previewDeveloper’s guide to microsoft enterprise library preview
Developer’s guide to microsoft enterprise library preview
 
Policywriting
PolicywritingPolicywriting
Policywriting
 
Library Policies: The Good, The Bad, and The Ugly
Library Policies: The Good, The Bad, and The UglyLibrary Policies: The Good, The Bad, and The Ugly
Library Policies: The Good, The Bad, and The Ugly
 
Reaching the Users Where They Are: Web 2.0 Tools for Libraries (Library 2.0)
Reaching the Users Where They Are: Web 2.0 Tools for Libraries (Library 2.0)Reaching the Users Where They Are: Web 2.0 Tools for Libraries (Library 2.0)
Reaching the Users Where They Are: Web 2.0 Tools for Libraries (Library 2.0)
 
School Fire Safety Inspections
School Fire Safety InspectionsSchool Fire Safety Inspections
School Fire Safety Inspections
 
Writers ua0312
Writers ua0312Writers ua0312
Writers ua0312
 
Library policy
Library policyLibrary policy
Library policy
 
السلامة الكيميائية
السلامة الكيميائيةالسلامة الكيميائية
السلامة الكيميائية
 
Librarian 2.0
Librarian 2.0Librarian 2.0
Librarian 2.0
 
Usage des réseaux sociaux en bibliothèque
Usage des réseaux sociaux en bibliothèqueUsage des réseaux sociaux en bibliothèque
Usage des réseaux sociaux en bibliothèque
 
Web 3.0 UX Patterns - Presented at Sencha New York Meetup September 2010
Web 3.0 UX Patterns - Presented at Sencha New York Meetup September 2010Web 3.0 UX Patterns - Presented at Sencha New York Meetup September 2010
Web 3.0 UX Patterns - Presented at Sencha New York Meetup September 2010
 
Présence des bibliothèques sur Facebook RELOADED
Présence des bibliothèques sur Facebook RELOADEDPrésence des bibliothèques sur Facebook RELOADED
Présence des bibliothèques sur Facebook RELOADED
 
Facebook et bibliothèques : une introduction et des exemples
Facebook et bibliothèques : une introduction et des exemplesFacebook et bibliothèques : une introduction et des exemples
Facebook et bibliothèques : une introduction et des exemples
 

Similar a Enterprise Library 3.0 Overview

Net framework session03
Net framework session03Net framework session03
Net framework session03Vivek chan
 
Oracle UCM Implementation Patterns
Oracle UCM Implementation PatternsOracle UCM Implementation Patterns
Oracle UCM Implementation PatternsBrian Huff
 
Getting Started with Enterprise Library 3.0 in ASP.NET
Getting Started with Enterprise Library 3.0 in ASP.NETGetting Started with Enterprise Library 3.0 in ASP.NET
Getting Started with Enterprise Library 3.0 in ASP.NETPhilWinstanley
 
Introduction to Azure Cloud Storage
Introduction to Azure Cloud StorageIntroduction to Azure Cloud Storage
Introduction to Azure Cloud StorageGanga R Jaiswal
 
System verilog important
System verilog importantSystem verilog important
System verilog importantelumalai7
 
Flex 4.5 jeyasekar
Flex 4.5  jeyasekarFlex 4.5  jeyasekar
Flex 4.5 jeyasekarjeya soft
 
Automate Best Practices
Automate Best PracticesAutomate Best Practices
Automate Best PracticesHelpSystems
 
Play framework : A Walkthrough
Play framework : A WalkthroughPlay framework : A Walkthrough
Play framework : A Walkthroughmitesh_sharma
 
Silverlight Development & The Model-View-ViewModel Pattern
Silverlight Development & The Model-View-ViewModel PatternSilverlight Development & The Model-View-ViewModel Pattern
Silverlight Development & The Model-View-ViewModel PatternDerek Novavi
 
IntelliJ IDEA Architecture and Performance
IntelliJ IDEA Architecture and PerformanceIntelliJ IDEA Architecture and Performance
IntelliJ IDEA Architecture and Performanceintelliyole
 
Unit Testing Documentum Foundation Classes Code
Unit Testing Documentum Foundation Classes CodeUnit Testing Documentum Foundation Classes Code
Unit Testing Documentum Foundation Classes CodeBlueFish
 
Whats New In 2010 (Msdn & Visual Studio)
Whats New In 2010 (Msdn & Visual Studio)Whats New In 2010 (Msdn & Visual Studio)
Whats New In 2010 (Msdn & Visual Studio)Steve Lange
 
Deep Dive on Amazon EC2 Systems Manager
Deep Dive on Amazon EC2 Systems ManagerDeep Dive on Amazon EC2 Systems Manager
Deep Dive on Amazon EC2 Systems ManagerAmazon Web Services
 
Patterns (contd)Software Development ProcessDesign patte.docx
Patterns (contd)Software Development ProcessDesign patte.docxPatterns (contd)Software Development ProcessDesign patte.docx
Patterns (contd)Software Development ProcessDesign patte.docxdanhaley45372
 

Similar a Enterprise Library 3.0 Overview (20)

Net framework session03
Net framework session03Net framework session03
Net framework session03
 
Oracle UCM Implementation Patterns
Oracle UCM Implementation PatternsOracle UCM Implementation Patterns
Oracle UCM Implementation Patterns
 
Unit i
Unit iUnit i
Unit i
 
Getting Started with Enterprise Library 3.0 in ASP.NET
Getting Started with Enterprise Library 3.0 in ASP.NETGetting Started with Enterprise Library 3.0 in ASP.NET
Getting Started with Enterprise Library 3.0 in ASP.NET
 
Introduction to Azure Cloud Storage
Introduction to Azure Cloud StorageIntroduction to Azure Cloud Storage
Introduction to Azure Cloud Storage
 
Tdd,Ioc
Tdd,IocTdd,Ioc
Tdd,Ioc
 
System verilog important
System verilog importantSystem verilog important
System verilog important
 
Vb essentials
Vb essentialsVb essentials
Vb essentials
 
Flex 4.5 jeyasekar
Flex 4.5  jeyasekarFlex 4.5  jeyasekar
Flex 4.5 jeyasekar
 
Automate Best Practices
Automate Best PracticesAutomate Best Practices
Automate Best Practices
 
Play framework : A Walkthrough
Play framework : A WalkthroughPlay framework : A Walkthrough
Play framework : A Walkthrough
 
Silverlight Development & The Model-View-ViewModel Pattern
Silverlight Development & The Model-View-ViewModel PatternSilverlight Development & The Model-View-ViewModel Pattern
Silverlight Development & The Model-View-ViewModel Pattern
 
Sky High With Azure
Sky High With AzureSky High With Azure
Sky High With Azure
 
IntelliJ IDEA Architecture and Performance
IntelliJ IDEA Architecture and PerformanceIntelliJ IDEA Architecture and Performance
IntelliJ IDEA Architecture and Performance
 
Unit Testing Documentum Foundation Classes Code
Unit Testing Documentum Foundation Classes CodeUnit Testing Documentum Foundation Classes Code
Unit Testing Documentum Foundation Classes Code
 
Whats New In 2010 (Msdn & Visual Studio)
Whats New In 2010 (Msdn & Visual Studio)Whats New In 2010 (Msdn & Visual Studio)
Whats New In 2010 (Msdn & Visual Studio)
 
Deep Dive on Amazon EC2 Systems Manager
Deep Dive on Amazon EC2 Systems ManagerDeep Dive on Amazon EC2 Systems Manager
Deep Dive on Amazon EC2 Systems Manager
 
Patterns (contd)Software Development ProcessDesign patte.docx
Patterns (contd)Software Development ProcessDesign patte.docxPatterns (contd)Software Development ProcessDesign patte.docx
Patterns (contd)Software Development ProcessDesign patte.docx
 
Struts
StrutsStruts
Struts
 
Struts Ppt 1
Struts Ppt 1Struts Ppt 1
Struts Ppt 1
 

Último

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Último (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Enterprise Library 3.0 Overview

  • 2.
  • 3. Enterprise Library Ecosystem Partner blocks Customer blocks Community blocks p&p blocks Application Block Software Factory and Specifications p&p Enterprise Library Partner X library Customer Y library Customer Z library
  • 4.
  • 5. Enterprise Library 3.0 – Application Blocks Core Caching Security Data Access Logging Exception Handling Plug-in Config Helpers & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
  • 6.
  • 7.
  • 8. Enterprise Library 3.0 – Application Blocks Core Caching Security Data Access Logging Exception Handling Plug-in Config Helpers & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Enterprise Library 3.0 – Application Blocks Core Caching Security Data Access Logging Exception Handling Plug-in Config Helpers & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
  • 15.
  • 16.
  • 17.
  • 18. Enterprise Library 3.0 – Application Blocks Core Caching Security Data Access Logging Exception Handling Plug-in Config Helpers & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
  • 19.
  • 20.
  • 21.
  • 22. Enterprise Library 3.0 – Application Blocks Core Caching Security Data Access Logging Exception Handling Plug-in Config Helpers & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
  • 23.
  • 24.
  • 25. Data Access - Examples Public Function GetProductsInCategory(ByVal Category As Integer) As DataSet ' Create the Database object, using the database instance with the ' specified logical name. This is mapped to a connection string in ' the configuration file Dim db As Database = DatabaseFactory.CreateDatabase(&quot;Sales&quot;) ' Invoke the stored procedure with one line of code! return db.ExecuteDataSet(&quot;GetProductsByCategory&quot;, Category) ' Note: connection was closed by ExecuteDataSet method call End Function public Dataset GetProductsInCategory(string connectionString, int category) { // Create the Database object, using the specified connection string SqlDatabase db = new SqlDatabase(connectionString); // Invoke the stored procedure with one line of code! return db.ExecuteDataSet(&quot;GetProductsByCategory&quot;, category); // Note: connection was closed by ExecuteDataSet method call }
  • 26. Enterprise Library 3.0 – Application Blocks Core Caching Security Data Access Logging Exception Handling Plug-in Config Helpers & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
  • 27.
  • 28.
  • 29. Enterprise Library 3.0 – Application Blocks Core Caching Security Data Access Logging Exception Handling Plug-in Config Helpers & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
  • 30.
  • 31.
  • 32. Enterprise Library 3.0 – Application Blocks Core Caching Security Data Access Logging Exception Handling Plug-in Config Helpers & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
  • 33.
  • 34.
  • 35. Enterprise Library 3.0 – Application Blocks Core Caching Security Data Access Logging Exception Handling Plug-in Config Helpers & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
  • 36.
  • 37.
  • 38. Validation Example [StringLengthValidator(1, 50, Ruleset=&quot; RuleSetA &quot;, MessageTemplate=&quot; Last Name must be 1-50 characters &quot;)] public string LastName { get { return lastName; } set { lastName = value ; } } [RegexValidator( @&quot;+([-+.']+)*@+([-.]+)*+([-.]+)*&quot; , MessageTemplate=&quot; Invalid e-mail address &quot;, Ruleset=&quot; RuleSetA &quot;)] public string Email { get { return email; } set { email = value ; } } Validator<Customer> validator = ValidationFactory.CreateValidator<Customer>(&quot;Ruleset&quot;); ValidationResults results = validator.Validate(customer); if (!results.IsValid) { foreach (ValidationResult result in results) { Console.WriteLine(&quot;Message={0}, Key={1}, &quot;Tag={2}&quot;, result.Message, result.Key.ToString(), result.Tag == null ? &quot;null&quot; : &quot;amp;quot;&quot; + result.Tag.ToString() + &quot;amp;quot;&quot;); } } Specify validation rules in attributes… … or in configuration Validate objects and process results
  • 39. Enterprise Library 3.0 – Application Blocks Core Caching Security Data Access Logging Exception Handling Plug-in Config Helpers & Design Instrumen- tation Object Builder Cryptography Policy Injection Validation
  • 40.
  • 41.
  • 42. Policy Injection Example public class BankAccount : MarshalByRefObject { // Constructors and fields omitted [ValidationCallHandler] public void Deposit([RangeValidator(typeof(Decimal), &quot;0.0&quot;, RangeBoundaryType.Exclusive, &quot;0.0&quot;, RangeBoundaryType.Ignore)] decimal depositAmount) { balance += depositAmount; } } BankAccount account = PolicyInjection.Create<BankAccount>(customerId); account.Deposit(1234.56M); Write classes that extend MBRO or implement an interface Apply Handlers using attributes if desired Apply Policies using configuration if desired Create objects using PolicyInjection class Call your methods the usual way
  • 44.
  • 46.
  • 47.
  • 48.