Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Inside COM+ Base Services (Microsoft Programming Series)

Buy
COM+ is not a radical departure from COM-it is the next stage of evolution of the COM programming model. COM was originally designed as a minimalist's component architecture. With the advent of the three-tier programming model, applications have become more complex. To help developers who work in this new world, COM+ offers a richer set of services than was available in COM. These services evolved from the technology previously known as Microsoft Transaction Server (MTS) and include features such as automatic transactions, role-based security, load balancing, object pooling, queued components, the in-memory database, and an external publish-and-subscribe event model.

COM+ offers many powerful and useful run-time services that save you the effort of building similar services yourself. While working on this book, we came to realize that it is impossible to explain these services without first explaining the fundamental component model at the heart of COM+. Whether or not you use these services in your components-for some developers, COM+ services offer little advantage1-you must understand the fundamental COM+ programming architecture before you can use COM+ effectively.

Inside COM+ Base Services describes the fundamental component model at the core of COM+. Once you understand the issues involved in building software components, you'll be able to decide where and how to use the COM+ component services effectively. Inside COM+ Component Services (forthcoming from Microsoft Press) covers these services in detail, along with issues involved in building multitier enterprise applications.

In this book, we make two assumptions-that you're interested in learning about COM+ and that you're familiar with a modern programming language such as C++, Microsoft Visual Basic, or Java. One of the central tenets of COM+ is the concept of language neutrality, so we've structured Inside COM+ Base Services around that idea. Although you can build COM+ components in a wide variety of development environments, we focus on the most popular trio: C++, Visual Basic, and Java. Visual Basic and Java developers will learn a lot from this book even though these languages hide a large part of the COM+ infrastructure. In many cases, we present examples in C++ and then show how components written in higher-level languages can tie into the same functionality. However, you must understand the fundamentals of C++ in order to use many of the sample programs.

Remember the Sojourner rover that roamed the surface of Mars during the summer of 1997? It ran on an 8-bit Intel 80C85 processor containing only 6500 transistors (compared with 5.5 million transistors in a Pentium). It had a radio modem capable of 9600 bps and was powered by solar energy and nonrechargeable lithium D-cell batteries. It was a feat of modern engineering achieved with the most basic components. In a less dramatic way, COM+ is like that-it consists of a fundamental set of ideas that can give rise to some amazingly powerful systems.
(HTML tags aren't allowed.)

Spreadsheet Modeling & Decision Analysis (Book Only)
Spreadsheet Modeling & Decision Analysis (Book Only)

SPREADSHEET MODELING AND DECISION ANALYSIS, Sixth Edition, provides instruction in the most commonly used management science techniques and shows how these tools can be implemented using Microsoft Office Excel 2010.

...
Data Mining with Rattle and R: The Art of Excavating Data for Knowledge Discovery (Use R!)
Data Mining with Rattle and R: The Art of Excavating Data for Knowledge Discovery (Use R!)
Data Mining and Anlaytics are the foundation technologies for the new knowledge based world where we build models from data and databases to understand and explore our world. Data mining can improve our business, improve our government, and improve our life and with the right tools, any one can begin to explore this new technology, on the path...
Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard
Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard

Investigative Case Management is a "first look" excerpted from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Investigative case management is more than just organizing your case files. It includes the analysis of all evidence collected through digital examinations, interviews,...


The SIAM 100-Digit Challenge: A Study in High-Accuracy Numerical Computing
The SIAM 100-Digit Challenge: A Study in High-Accuracy Numerical Computing
"Destined to be a classic of modern computational science... a gourmet feast in ten courses." from the foreword by David H. Bailey, Lawrence Berkeley National Laboratory."

The authors, members of teams that solved all 10 problems, show in detail multiple approaches for solving each problem,
...
Boundary Layer Theory
Boundary Layer Theory
"We find here a book where the theory is developed with rigours in parallel with a strong physical intuition. Comparison with experiments and simulations are always proposed and carefully analysed. The book contains at the end a very rich and complete bibliography … I warmly encourage everyone interested in boundary-layer theory to have...
PCI Express System Architecture
PCI Express System Architecture

PCI Express is the third-generation Peripheral Component Inter-connect technology for a wide range of systems and peripheral devices. Incorporating recent advances in high-speed, point-to-point interconnects, PCI Express provides significantly higher performance, reliability, and enhanced capabilities—at a lower...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy