Java Reference
In-Depth Information
Table A.2
Cross-reference of antipatterns by scale, name
Name
Scale
Location
2. Cacheless Cow
Application
Chapter 5
4. Coarse or Fine Commands
Application
Section 4.4
5. Compound JSPs
Application
Section 4.3
6. Connection Thrashing
Application
Section 7.2
7. Everything Is an EJB
Application
Section 8.5
8. Excessive Layering
Application
Section 2.3.4
9. Fat Commands
Application
Section 4.5
11. Incomplete Process Transitions
Application
Section 2.5.2
12. Lapsed Listeners Leak
Application
Section 6.3
13. Leak Collection
Application
Section 6.4
14. Magic Servlet
Application
Chapter 3
15. Monolithic JSPs
Application
Section 4.2
16. Performance Afterthoughts
Application
Section 10.2
17. Rigid XML
Application
Section 7.6
18. Round Bean in a Square Hole
Application
Section 8.4
19. Round-tripping
Application
Section 8.3
Section 10.3
20. Split Cleaners
Application
Section 7.3
22. Thrash-tuning
Application
Section 10.6
24. XML Golden Hammer
Application
Section 7.5.1
3. Chaotic Session Management
Enterprise
Section 10.5
10. Hardwired Connections
Enterprise
Section 7.4
23. Too Many Webpage Items
Enterprise
Section 2.2.7
21. Synchronized Read/Write Bottleneck
Micro-architecture
Section 5.5
1. Bad Workload Management
System
Section 10.4
Search WWH ::




Custom Search