Five Steps to Rapid Development with TierDeveloper 4.0

Follow the steps below to quickly design, generate, and deploy a great portion of your real-life N-Tier application.

STEP 1: HAVE YOUR DATABASE READY

1. Create your database in Microsoft SQL Server, Oracle, or DB2. You can design and create your own database. Or, you can use the sample database provided with TierDeveloper. Or, you can use one of the databases/schemas already provided with your database. They are:

a.Microsoft SQL Server: Northwind database. Just create a new TierDeveloper project against this database.

b.Oracle: DEMO schema with EMP, DEPT, BONUS, SALGRADE, and other tables. Just create a new TierDeveloper project against this schema.

c.DB2: SAMPLE schema provided with DB2. Just create a new TierDeveloper project against this schema.

2. Populate database with data. This would ensure that you have a fully working database ready to be used by a web application.

STEP 2: KNOW YOUR APPLICATION'S DATABASE INTERACTION

1. Identify table-columns your app will access: Before you do anything, you must know which tables and which columns in these tables is your application going to access.

2. Identify transactional operations: Identify where in your application you need to do insert, update, delete, or single-row select operations.

3. Identify queries: Most applications need to retrieve collection of rows from one or more tables in the database. Identify all places where you need to issue queries. These could be single-table queries or could involve complex joins or nested queries.

4. Identify stored procedures to call: If there are any stored procedures that already exist in the database which you need to call, identify them here. These stored procedures should be those that contains complex business rules or other data manipulation logic. Do not manually create stored procedures in the database for transactional operations or for queries that are otherwise handled by TierDeveloper. TierDeveloper can generate stored procedure DDL for you in that situation.

5. Identify bulk updates or deletes: Most applications do not require bulk updates or deletes but some do. If you have any, identify them.

The best way to understand your applications database interaction needs is to understand its behavior from the user's perspective and focus on all the data that needs to be displayed to the user or changed by the user.

STEP 3: CREATE TIERDEVELOPER PROJECT

1. Connect TierDeveloper to your database: TierDeveloper uses OLEDB to connect to your database and reads its schema so it can let you define the mappings of middle-tier objects with tables in the database (based on what you have determined about your application's interaction with your database). Please note that even if you're going to generate Java/J2EE application that will use JDBC to connect to the database, TierDeveloper (the product) will use OLEDB to connect to your database.

2. Define data object mappings to your tables: Wherever you had identified table-columns that your application needs, define data objects mapped to these tables with the appropriate columns selected as data object attributes. You can map a data object to single table or multiple tables. You'll need multi-table data objects for situations where you're trying to issue a multi-table join query that returns data from multiple tables.

3. Specify transactional methods in data objects: Based on what you identified as your application's transactional needs earlier, you should now define those insert, update, delete, and single-row select as methods of your data objects. TierDeveloper lets you do that with point-and-click.

4. Define queries as data object methods: For each query that you identified earlier, define a query method in the appropriate data objects. Remember, a query returns a resultset which get translated into a collection of data objects by TierDeveloper generated code.

5. Define stored procedure calls as data object methods: Wherever you needed to call stored procedures, you need to define data object methods for them. Remember, these stored procedures contain sophisticated business rules. Any stored procedures for transactional operations or queries can be generated by TierDeveloper so you do not have to manually write them in the database.

6. Define bulk update/delete operations as data object methods: Wherever you need to do a bulk update or bulk delete, you'll need to define data object methods for them.

STEP 4: GENERATE AND RUN 50% OF YOUR APPLICATION INSTANTLY

1. Generate data objects: After you have defined all your data objects, you are ready to generate code for them. You can generate data object code in the following format:

a. .NET components

2. Build and deploy data objects generated code: If you machine has the appropriate build environment for your platform, TierDeveloper asks you whether you want to build the generated data objects code. If you say "yes", it creates the following. It also then deploys them to your appropriate environment.

a. .NET assemblies for .NET components. They are deployed through component services.

3. Generate web application: After you have generated and build the data objects, you can generate a fully working web application. The purpose of this web application is to let you test all the functions of data objects. This also serves as a good sample/example code for you to copy into your own web application development. TierDeveloper generates the following types of web applications:

a. ASP.NET pages in C# or VB.NET and with or without XML/XSLT.

4. Build and deploy web application: TierDeveloper can also build the web pages for you. It does the following for each platform:

a. Build a .NET assembly for ASP.NET pages. They are deployed to IIS

5. Run deployed web app with data objects: Now that you have successfully deployed the data objects and the web app, you can run the web app. The really nice thing is that all this generated code is now working against your own database and in your own environment. You can see all the behavior of the data objects through this web app and also use it as a guide in your own web development. Try this and you'll be convinced about TierDeveloper being a true Rapid Development tool.

STEP 5: DEVELOP REMAINING 50% OF YOUR APPLICATION

After running and verifying that all the generated code contains your desired functionality and runs correctly against your database, you are now ready to develop the rest of the application. The areas you are likely to need to develop in your application are:

1. Presentation Layer (Web Pages): Use TierDeveloper generated web app as a sample/example for quickly developing your own. You can even copy/paste a lot of the code from the generated web app into yours, thereby speeding up your development work even further.

2. Business Objects: Although TierDeveloper generated code contains all your data manipulation logic and some of your business rules as well (in the form of data validation or stored procedure calls), you will most likely have to develop additional business objects. If you're not an expert in your target platform (.NET, J2EE, or J2SE), you can learn from the generated data objects as your business objects are likely going to be in the same environment and would follow similar design approach.

For free evaluation download please visit
http://www.alachisoft.com/download.htm

Chicago charter limousine service Streamwood .. Lockport Chicago limo O’Hare
In The News:

Tips to prevent your holiday decorations from being stolen
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Kurt "CyberGuy" Knutsson lays out the immediate steps you should take if your phone has been hacked and your personal information becomes vulnerable.
Fraudsters are sending people bogus invoices through PayPal as part of a sneaky scam that is going around; here's how to protect yourself from being fooled.
A former Colgate-Palmolive employee was shocked to discover $750,000 had been drained from her 401(k) account. "CyberGuy" offers tips on how to prevent identity theft.
Electric vehicle maker Harbinger recently showed its electric delivery truck can handle icy roads with agility and stability in winter.
To make the busiest time of year more manageable, here are some tricks for tracking your packages, taking quality family photos and curating the perfect Christmas playlist.
Kurt "CyberGuy" Knutsson explains how to keep your online Amazon gift purchases a secret from loved ones or friends this holiday season.
Factory resetting an iPhone is a crucial step to protect your privacy and prevent theft when you are selling, trading or donating your device.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Kurt "CyberGuy" Knutsson presents seven options this holiday season to help shoppers save time and money, from cash-back apps to discount tools.
Kurt "CyberGuy" Knutsson tackles blockchain scams, which are often disguised as legitimate offers that promise easy investment returns.
Tech expert Kurt “CyberGuy" Knutsson discusses how Chinese cyber espionage targets U.S. telecoms to steal Americans' information.
Tech expert Kurt “CyberGuy" Knutsson shows iPhone users how to easily delete multiple emails and manage their inboxes to reduce digital clutter.
Tech expert Kurt “CyberGuy" Knutsson says scammers exploit fears, falsely claim computer issues to access your personal data.
Router with built-in VPN or software VPN? Tech expert Kurt “CyberGuy" Knutsson says explore the differences to choose yours.
Updates to apps are essential for maintaining the performance and security of your devices, including bug fixes, new features and security patches.
If your Windows PC or laptop is constantly crashing, Kurt the CyberGuy has some easy fixes you can do at home to keep your computer running properly.
If it sounds like actors on your TV are speaking in whispers, there's a way to fix it to make your TV audio sound better. The CyberGuy has several tips.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents
Daisy is an artificial intelligence-powered grandmother created to interact with scammers to waste their time and gather information about their tactics.
Cybercriminals are tricking people into compromising their own technology by mimicking trusted sources; here's how to keep yourself safe from these "scam-yourself" attacks.
Brick My World is an innovative app that allows you to turn any object into a Lego creation with your phone using advanced artificial intelligence and mobile scanning technology.
Be on alert this holiday season for phishing emails. Kurt "CyberGuy" Knutsson shares several examples of fake phishing emails he's received in his inbox.
If unwanted text messages are piling up in your Android inbox, there are some easy steps you can take to clean things up and keep them organized.

Microsoft Great Plains Jewelry ? Implementation & Customization Overview

Each Industry and market niche has business specific and unique... Read More

Navision Attain Database access via C/ODBC in ASP.NET Application

Navision Software was purchased by Microsoft and now it is... Read More

Great Plains Bill of Materials Setup & Customization for Process Manufacturing ? Overview

Microsoft Great Plains has full-featured Manufacturing suite of modules: Capacity... Read More

Microsoft Business Solutions VAR/Partner Selection ? Overview for IT Director/Manager/Controller

Microsoft Great Plains and Microsoft CRM become more and more... Read More

Spyware Statistics -- Whats New in May 2005?

Although statistics often is blamed for various deadly sins --... Read More

Microsoft Great Plains Integration with Microsoft Access ? Overview for Developer

... Read More

Microsoft Great Plains: Customization Upgrade & Recovery ? Visual Studio VB 6.0

Microsoft Great Plains, former Great Plains Software Dynamics, eEnterprise has... Read More

Monitoring Software Can be Used for Spying as Well

We all already got used to computer monitoring both at... Read More

An Introduction to .NET Framework

.Net Framework is a platform or development environment to seamlessly... Read More

S is for Spying, Surveillance -- and for Software as Well

Words we choose to describe things and phenomena often show... Read More

How to Make Own CMS

Every day millions of new web documents emerge on the... Read More

.NET :Solving the Multiple Inheritance Issue Under .NET Platform

.NET platform does not support multiple inheritance. Do not confuse... Read More

Vlans

In order to implement VLANs in a network environment, you'll... Read More

Is Your Family Protected?

When you think... Read More

Cisco Certification: Introduction To ISDN, Part III

Configuring PPP PAP AuthenticationNow we know how the ISDN link... Read More

Four Easy Ways To Prevent Spyware

How would you like to prevent spyware and adware from... Read More

MCP Market News: Microsoft SQL Server & SQL Reporting Services

Are you ready? SQL Server 2005, the next-generation data management... Read More

Dreamweaver vs FrontPage

There are two major WYSIWYG(What You See Is What You... Read More

Does Microsoft have any real competition?

Does Microsoft Have any Real Competition? Copyright (c) 2003 Gregory... Read More

Quick Summary of Basic and Common Linux Commands

There are many commands that are used in linux on... Read More

Microsoft Great Plains IV: Inventory Management

Great Plains Inventory Management (IV) module gives your business a... Read More

What You Must Know About Spyware Right Now

Spyware is like the new technological nuclear weapon on the... Read More

Cisco Certification: Introduction To ISDN, Part IV

In part III of this ISDN primer, we learned that... Read More

An Easy Way to Deal with Email Viruses and Worms

If you feel intimidated when someone tries to teach you... Read More

Microsoft Business Solutions Partner ? How to Launch New IT Consulting Practice

In the new era of internet marketing the problem of... Read More

limo O'Hare Elk Grove (west OF 53) ..