Program |
 |
|
|
Find in Program |
 |
|
|
Page |
 |
|
|
Basket |
 |
|
view, help
"GoF 10th Anniversary Commemorative"
|
|
|
|
GoF 10th Anniversary Commemorative
Ballroom A-B Tuesday, 20:00, 1 hour 30 minutes 7 | · | 8 | · | 9 | · | 10 | · | 11 | · | 12 | · | 13 | · | 14 | · | 15 | · | 16 | · | 17 | · | 18 | · | 19 | · | 20 | · | 21 |
Solveig Haugland: Solveig Haugland is an independent technical trainer, course developer, and book author (see www.getopenoffice.org and her "OpenOffice.org Resource Kit" on Amazon.com). She's also the editor and desktop publisher for Applied Java Patterns and the second edition of Core J2EE Patterns. She also did some reviewing of Head First EJB which is how she got the idea for container-managed relationships. Sometimes her ideas get up in the middle of the night and sneak into each other's rooms, partying all night, and waking up tired but with a smile on their faces and with new little ideas lying beside them wrapped in swaddling Post-Its. That's the most likely explanation for Dating Design Patterns. She has also implemented Encapsulated Big Fat Opening very successfully and is an expert dating architect. When Solveig isn't publishing silly books, she's watching Buffy the Vampire Slayer and implementing Fifth Position Break. She believes very strongly in the effectiveness of all patterns in "Dating Design Patterns" and it was in fact a friend's airplane mechanic who swears blind that Disinterested Requester works really, really well.
Sooner or later, we all ask ourselves the same big questions. We ask
"What is the meaning of life?" and "Why am I here?" and "How can our
country be run by people who don't know how to use a browser?" And, of
course, sooner or later we all ask, "Where do patterns come from?"
While it is impossible to answer the first questions, the answer to the
last has recently come to light. Software design patterns did not come
from years of systematic analysis of recurring software problems. Nor
did architectural design patterns spawn the design patterns we know and
love. Both were derived from the true original patterns. Trojan Proxy.
Disinterested Requester. Half Bad Boy Plus Protocol. And many others.
Come to the Tuesday night after-hours event to learn how the GOF
developed and implemented their dating design patterns, and why those
patterns were too dangerous to be divulgeduntil now.
Hosted by Addison-Wesley and IBM, with appearances by the GoF. Refreshments will be served.
|