Solved

OO Analysis to Struts?

Posted on 2004-04-06
6
216 Views
Last Modified: 2013-11-24
Hi, I was wondering if anyone had any info on how you get from good-old OO analysis to specific implementation frameworks like Struts.

I tend to do OO analysis by the book, creating my basic boundary, entity and controller objects from my use cases.  How do you then fit these conceptual objects into something like Struts (which our project will be using)?  I guess there's some kind of mapping done in the design phase, but I have no idea of the process.  Are there any good tutorials out there of how you get from pure analysis objects to Struts?

Cheers,

Kryz.

0
Comment
Question by:kryzb
  • 2
  • 2
  • 2
6 Comments
 
LVL 86

Accepted Solution

by:
CEHJ earned 200 total points
ID: 10769183
Struts is essentially the application of a design pattern, namely the Model View Controller, so you could say you get to it by

a. first identifying MVC per se
b. identifying its applicability to flow control in web apps
c. introducing it as an implementation of MVC for web apps
0
 
LVL 14

Assisted Solution

by:Tommy Braas
Tommy Braas earned 200 total points
ID: 10769207
So, like CEHJ alluded to, you would make sure that the MVC design pattern has been applied to your project's OO analysis. The mapping from your classes to the Struts framework should fall straight out of that design pattern application.
0
 
LVL 92

Assisted Solution

by:objects
objects earned 100 total points
ID: 10770583
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 
LVL 14

Expert Comment

by:Tommy Braas
ID: 10815888
=-)
0
 
LVL 86

Expert Comment

by:CEHJ
ID: 10817064
8-)
0
 
LVL 92

Expert Comment

by:objects
ID: 10817576
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

After being asked a question last year, I went into one of my moods where I did some research and code just for the fun and learning of it all.  Subsequently, from this journey, I put together this article on "Range Searching Using Visual Basic.NET …
International Data Corporation (IDC) prognosticates that before the current the year gets over disbursing on IT framework products to be sent in cloud environs will be $37.1B.
Viewers learn about the “while” loop and how to utilize it correctly in Java. Additionally, viewers begin exploring how to include conditional statements within a while loop and avoid an endless loop. Define While Loop: Basic Example: Explanatio…
Viewers will learn about the different types of variables in Java and how to declare them. Decide the type of variable desired: Put the keyword corresponding to the type of variable in front of the variable name: Use the equal sign to assign a v…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now