What exactly are business objects and how do they work?

Posted on 2006-05-05
Last Modified: 2010-04-16

    I've gathered from my reading that business objects allow some parts of the code to run on the client and some parts on the server, evening the load on both platforms. I have a few questions regarding this scenerio:

1.) Is the client-aspect of the program automatically downloaded when accesses the server page? or does the user have to manually request it to use it.

2.) Can the server-side code send instructions to the client's windows UI thereby providing a richer graphical experience?

3.) Are there any other aspects of this technology that I am overlooking?

Thank you as always
Question by:cmcquade
    LVL 35

    Accepted Solution

    Depends what you mean.

    Here when we talk about business objects we are referring to a class that is built in the business tier of a multi-tier application.  The tier system allows you to encapsulate business logic separate from presentation logic and data logic.

    Therefore you could exchange a data layer that connects to SQL with one that connects to a text file and the business objects would not know the difference.  Similarly you could have a layer that presents on the web and one that presents on windows forms and again the business objects would be the same and not know the difference.
    LVL 10

    Assisted Solution

    In regards to the development of web application

    1. The "client-aspect" of the program is always downloaded when you visit any webpage. The "client-aspect" is the user interface presented to the user. This is a must do otherwise you will have a blank webpage!! :)
    2. Yes, by utilising javascripting the server is able to use a Call back to invoke javascript functions to display dynamic information on the webpage. Read up on AJAX or Asynchronous Javascript and XML.
    3. Most probably yes. You will not understand the techniques or technologies to utilise until you start writing your own web applications. When you do get stuck just ask us experts and again and we will be glad to assist.


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    This article describes a simple method to resize a control at runtime.  It includes ready-to-use source code and a complete sample demonstration application.  We'll also talk about C# Extension Methods. Introduction In one of my applications…
    We all know that functional code is the leg that any good program stands on when it comes right down to it, however, if your program lacks a good user interface your product may not have the appeal needed to keep your customers happy. This issue can…
    Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now