Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Definitive Guide to Spring Web Flow

Buy
The Definitive Guide to Spring Web Flow, 9781430216247 (1430216247), Apress, 2008
When I started working on Spring Web Flow at the end of 2004, web applications already accounted for a large part of the Java enterprise development space. I had used Struts on several projects at that point but always felt something was missing. Working with a proprietary framework on a few projects in the financial industry sparked my interest. The framework I was using included a work flow engine, a fairly typical feature for frameworks targeted at high-end enterprise applications. What was novel about it, however, was that the work flow engine could also be used to define page flows in web applications. This brought a refreshingly intuitive approach to Java web application development.

Using a state diagram as the basis for page flows in web applications seemed much more natural than the request-centric solutions offered by the mainstream frameworks of the time. This was especially true for the more complex use cases that required the user to pass through a number of different steps in the completion of a business process. Over the course of 2004, I had been learning about the Spring Framework, which was gaining momentum at the time, and had been impressed by its design and implementation quality. I set out to add a page flow controller to the Spring Web MVC framework and created what would later become Spring Web Flow.
(HTML tags aren't allowed.)

Coastal Pollution: Effects on Living Resources and Humans (Marine Science)
Coastal Pollution: Effects on Living Resources and Humans (Marine Science)

In 1996, after more than a decade of researching the effects of over-population and the consequent pollution of the greater metropolitan New York City area, Carl Sindermann published his observations and conclusions in Ocean Pollution: Effects on Living Resources and Humans, a mostly technical document that emphasized the pathological effects...

Learning Apache Mahout Classification
Learning Apache Mahout Classification

Build and personalize your own classifiers using Apache Mahout

About This Book

  • Explore the different types of classification algorithms available in Apache Mahout
  • Create and evaluate your own ready-to-use classification models using real world datasets
  • A practical guide to...
Manual of Clinical Oncology (Lippincott Manual Series (Formerly known as the Spiral Manual Series))
Manual of Clinical Oncology (Lippincott Manual Series (Formerly known as the Spiral Manual Series))

The thoroughly updated Fifth Edition of this Spiral® Manual is a practical, accessible guide to the management of patients with cancer. In an outline format designed for rapid reference, the book provides the essential information needed for fast, effective clinical decision-making at the bedside.

Coverage begins...


Programming Pig
Programming Pig

This guide is an ideal learning tool and reference for Apache Pig, the open source engine for executing parallel data flows on Hadoop. With Pig, you can batch-process data without having to create a full-fledged application—making it easy for you to experiment with new datasets.

Programming Pig introduces...

Energy Efficient Servers: Blueprints for Data Center Optimization
Energy Efficient Servers: Blueprints for Data Center Optimization

Energy Efficient Servers: Blueprints for Data Center Optimization introduces engineers and IT professionals to the power management technologies and techniques used in energy efficient servers. The book includes a deep examination of different features used in processors, memory, interconnects, I/O devices, and other...

Hack Attacks Testing: How to Conduct Your Own Security Audit
Hack Attacks Testing: How to Conduct Your Own Security Audit
Learn how to conduct thorough security examinations via illustrations and virtual simulations

A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy