SlideShare una empresa de Scribd logo
1 de 45
J2EE Project Dangers  Pitfalls to avoid for ensuring success of your project Siddhesh Bhobe (based on articles in JavaWorld)
Project Phases ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Danger 1: Not understanding Java, EJB, J2EE ,[object Object],[object Object],[object Object]
Danger 1: Symptoms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Danger 1: Symptoms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Danger 2: Over-Engineering ,[object Object],[object Object],[object Object]
Danger 2: Symptoms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Avoiding Over-Engineering ,[object Object],[object Object],[object Object],[object Object],[object Object]
Danger 3: Not separating Presentation from Business logic ,[object Object],[object Object],[object Object]
Danger 3: Symptoms ,[object Object],[object Object],[object Object]
Separating presentation from business logic ,[object Object],[object Object]
Danger 4: Not deploying where you develop ,[object Object],[object Object],[object Object]
Danger 4: Symptoms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Danger 5: Choosing the wrong vendors ,[object Object],[object Object],[object Object]
Danger 5: Symptoms ,[object Object],[object Object],[object Object],[object Object]
Choosing vendors correctly… ,[object Object],[object Object],[object Object]
Danger 6: Not knowing your vendor ,[object Object],[object Object],[object Object]
Danger 6: Symptoms ,[object Object],[object Object]
How to understand your vendor better! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Danger 7: Not designing for scalability or performance ,[object Object],[object Object],[object Object]
Danger 7: Symptoms ,[object Object],[object Object],[object Object],[object Object]
Danger 8: Antiquated development processes   ,[object Object],[object Object],[object Object]
Danger 8: Symptoms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Danger 9: Failure to employ frameworks  ,[object Object],[object Object],[object Object]
Danger 9: Symptoms ,[object Object],[object Object],[object Object],[object Object],[object Object]
Frameworks should address the following: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Danger 10: Basing project plans and designs on marketing blurb ,[object Object],[object Object],[object Object]
Danger 10: Symptoms ,[object Object],[object Object],[object Object]
Suggestions ,[object Object],[object Object],[object Object]
MTV Top Ten ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
To EJB, or not to EJB? ,[object Object]
EJB Advantages ,[object Object],[object Object],[object Object],[object Object],[object Object]
EJB Disadvantages ,[object Object],[object Object],[object Object],[object Object],[object Object]
Alternative Approaches ,[object Object],[object Object],[object Object]
Alternative Approaches ,[object Object],[object Object],[object Object],[object Object],[object Object]
Alternative Approaches ,[object Object],[object Object],[object Object],[object Object]
Rules for choosing EJB ,[object Object],[object Object],[object Object],[object Object],[object Object]
Rules for not choosing EJB ,[object Object],[object Object],[object Object],[object Object],[object Object]
EJB Folklore ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EJB Folklore ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EJB Folklore ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
From a Gartner Report… ,[object Object],[object Object],[object Object],[object Object]
How to make the right decision? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Conclusion
References ,[object Object],[object Object],[object Object]

Más contenido relacionado

Más de Siddhesh Bhobe

Más de Siddhesh Bhobe (17)

eMee at HR Tech Europe, 26 March, London
eMee at HR Tech Europe, 26 March, LondoneMee at HR Tech Europe, 26 March, London
eMee at HR Tech Europe, 26 March, London
 
Industry expectations from new recruits
Industry expectations from new recruitsIndustry expectations from new recruits
Industry expectations from new recruits
 
The eMee Value Proposition
The eMee Value PropositionThe eMee Value Proposition
The eMee Value Proposition
 
Redefining Employee Engagement
Redefining Employee EngagementRedefining Employee Engagement
Redefining Employee Engagement
 
Introduction to eMee
Introduction to eMeeIntroduction to eMee
Introduction to eMee
 
Tour Of Europe
Tour Of EuropeTour Of Europe
Tour Of Europe
 
Software As Solutions
Software As SolutionsSoftware As Solutions
Software As Solutions
 
Effective ALM
Effective ALMEffective ALM
Effective ALM
 
Bit Vectors Siddhesh
Bit Vectors SiddheshBit Vectors Siddhesh
Bit Vectors Siddhesh
 
Anti Patterns Siddhesh Lecture1 Of3
Anti Patterns Siddhesh Lecture1 Of3Anti Patterns Siddhesh Lecture1 Of3
Anti Patterns Siddhesh Lecture1 Of3
 
Introduction To Dot Net Siddhesh
Introduction To Dot Net SiddheshIntroduction To Dot Net Siddhesh
Introduction To Dot Net Siddhesh
 
Ruby On Rails Siddhesh
Ruby On Rails SiddheshRuby On Rails Siddhesh
Ruby On Rails Siddhesh
 
Six Thinking Hats Siddhesh
Six Thinking Hats SiddheshSix Thinking Hats Siddhesh
Six Thinking Hats Siddhesh
 
Anti Patterns Siddhesh Lecture2 Of3
Anti Patterns Siddhesh Lecture2 Of3Anti Patterns Siddhesh Lecture2 Of3
Anti Patterns Siddhesh Lecture2 Of3
 
Sql Injection Attacks Siddhesh
Sql Injection Attacks SiddheshSql Injection Attacks Siddhesh
Sql Injection Attacks Siddhesh
 
Software Accessibility Siddhesh
Software Accessibility SiddheshSoftware Accessibility Siddhesh
Software Accessibility Siddhesh
 
Anti Patterns Siddhesh Lecture3 Of3
Anti Patterns Siddhesh Lecture3 Of3Anti Patterns Siddhesh Lecture3 Of3
Anti Patterns Siddhesh Lecture3 Of3
 

Último

Último (20)

Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 

J2EE Project Dangers Siddhesh

  • 1. J2EE Project Dangers Pitfalls to avoid for ensuring success of your project Siddhesh Bhobe (based on articles in JavaWorld)
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.