Solved

Sequence to learn.....

Posted on 2006-06-19
7
297 Views
Last Modified: 2013-11-24
Java Beans
EJB
Struts
Spring Framework
Hibernate
0
Comment
Question by:jagadeesh_motamarri
  • 3
  • 3
7 Comments
 
LVL 7

Assisted Solution

by:dttri
dttri earned 200 total points
ID: 16939686
Greetings,
I think the order is OK (in my opinion).
0
 
LVL 10

Author Comment

by:jagadeesh_motamarri
ID: 16939739
>>>I think the order is OK

y not perfect.

____Jags.
0
 
LVL 7

Expert Comment

by:dttri
ID: 16939760
So I'm here for other suggestions :-)
0
DevOps Toolchain Recommendations

Read this Gartner Research Note and discover how your IT organization can automate and optimize DevOps processes using a toolchain architecture.

 
LVL 10

Author Comment

by:jagadeesh_motamarri
ID: 16939786
...but still u should have some reason (personally or techinically) on your opinion to defend yourself.

____Jags.
0
 
LVL 7

Expert Comment

by:dttri
ID: 16939796
Because I see it's natural to follow this path.
Actually, I think Java Beans should come before EJB, and the others can come from any order after EJB.
0
 
LVL 10

Author Comment

by:jagadeesh_motamarri
ID: 16939821
oh...ok

Thank You,
___Jags.
0
 
LVL 16

Accepted Solution

by:
suprapto45 earned 300 total points
ID: 16940433
If I were you,

I will go for Struts first as Struts is used everywhere and it is a good start to understand the general concept of J2EE. Spring should work the same as Struts so I should put it on below :). Then Hibernate and EJB are playing the same part as DB relational mapping. Both are equally important so I suggest you to learn Hibernate first than EJB because EJB are much complex and may be overkill (some people said).

Javabeans? I think that if you already touch up with Struts and Spring, you should be familiar with JavaBean as well.

So my version.

1. Struts + JavaBean
2. Hibernate
3. EJB
4. Spring

David
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Entering a date in Microsoft Access can be tricky. A typo can cause month and day to be shuffled, entering the day only causes an error, as does entering, say, day 31 in June. This article shows how an inputmask supported by code can help the user a…
A short article about problems I had with the new location API and permissions in Marshmallow
An introduction to basic programming syntax in Java by creating a simple program. Viewers can follow the tutorial as they create their first class in Java. Definitions and explanations about each element are given to help prepare viewers for future …
In this fourth video of the Xpdf series, we discuss and demonstrate the PDFinfo utility, which retrieves the contents of a PDF's Info Dictionary, as well as some other information, including the page count. We show how to isolate the page count in a…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now