Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Let's use the n-tier architecture

Name: Anonymous 2007-06-11 20:45 ID:0FJSEOHl

N-tier application architecture provides a model for developers to create a flexible and reusable application. By breaking up an application into tiers, developers only have to modify or add a specific layer, rather than have to rewrite the enitire application over, if they decide to change technologies or scale up. In the term "N-tier," "N" implies any number -- like 2-tier, or 4-tier; basically, any number of distinct tiers used in your architecture. Application architectures are part of Layer 7 of the OSI model.

Name: Anonymous 2007-06-11 20:52 ID:Heaven

lol

Name: Anonymous 2007-06-12 6:39 ID:Heaven

Needs more Web 2.0.

Name: Anonymous 2007-06-12 11:56 ID:Heaven

Are you sure this is ENTERPRISE QUALITY?

Name: Anonymous 2007-06-13 18:23 ID:MbbwiQqg

>>1
another name for it is dynamic link libraries or module files.

Name: Anonymous 2007-06-14 4:16 ID:JTeYzXo/

My tiers are recursive

Name: Anonymous 2007-06-14 5:59 ID:cyYhx7nz

this made me cry tiers of joy

Name: Anonymous 2007-06-14 6:04 ID:cyYhx7nz

"N" implies any number -- like 2-tier, or 4-tier; basically, any number like 1, or 3, or 2574, or -142.4, or pi.

Name: Anonymous 2007-06-14 10:48 ID:JTeYzXo/

I develop professional PI-Tier solutions for my enterprise.

Name: Anonymous 2007-06-14 15:16 ID:1xnnszjR

>>9
This makes it easy to write ISO-9000 compliant design documentation.  If the corporate software development process says write 20 pages, you can fill them up with an approximation of how many tiers you will have.

Name: Anonymous 2007-06-15 4:30 ID:q1ZJF7r1

By acquiring BPMS, your company may gain unprecedented control over the management of your business processes.

The BPMS is a new category of management software that opens a new era for IT-powered business infrastructure. It "enables companies to model, deploy and manage mission-critical business processes, that span multiple enterprise applications, corporate departments, and  business partners– behinds the firewall and over the Internet."

Name: Anonymous 2009-01-14 15:20

C considered harmful

Name: Anonymous 2009-01-14 15:25

>>12
FrozenBaaawww!

Name: Anonymous 2011-02-04 19:06

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List