You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -447,7 +447,7 @@ Presentation Tier patterns are the top-most level of the application, this is co
447
447
* a system uses pre-processing or post-processing requests
448
448
* a system should do the authentication/ authorization/ logging or tracking of request and then pass the requests to corresponding handlers
449
449
* you want a modular approach to configuring pre-processing and post-processing schemes
450
-
=======
450
+
451
451
**Real world examples:**
452
452
*[CyclicBarrier] (http://docs.oracle.com/javase/7/docs/api/java/util/concurrent/CyclicBarrier.html#CyclicBarrier%28int,%20java.lang.Runnable%29) constructor can accept callback that will be triggered every time when barrier is tripped.
453
453
@@ -515,10 +515,8 @@ The difference is the intent of the patterns. While Proxy controls access to the
515
515
*[Let’s Modify the Objects-First Approach into Design-Patterns-First](http://edu.pecinovsky.cz/papers/2006_ITiCSE_Design_Patterns_First.pdf)
516
516
*[Pattern Languages of Program Design](http://www.amazon.com/Pattern-Languages-Program-Design-Coplien/dp/0201607344/ref=sr_1_1)
*[Functional Programming in Java: Harnessing the Power of Java 8 Lambda Expressions](http://www.amazon.com/Functional-Programming-Java-Harnessing-Expressions/dp/1937785467/ref=sr_1_1)
0 commit comments