public marks

PUBLIC MARKS with tag "design patterns"



Learning JavaScript Design Patterns / O'Reilly

by dzc
"Learning JavaScript Design Patterns" is released under a Creative Commons license. It is available for purchase via O'Reilly




by dzc
This is a collection of known design patterns and some sample code how to implement them in PHP. Every pattern has a small list of examples (most of them from Zend Framework, Symfony2 or Doctrine2)


JavaScript Patterns Collection

by dzc & 3 others
A JavaScript pattern and antipattern collection that covers function patterns, jQuery patterns, jQuery plugin patterns, design patterns, general patterns, literals and constructor patterns, object creation patterns, code reuse patterns, DOM and browser patterns (upcoming). - See more at:


Most Popular Featured Desktops of 2009 - Best of 2009 - Lifehacker

by ghis
Our readers have submitted thousands of screenshots of their best desktop configurations, and over the year we've featured some truly impressive and unique desktops with you. Here's a look back at some of the best this year had to offer.


Intercepting Filter [Web Application Component Toolkit]

by ghis (via)
Intercepting filters are used to preprocess requests and post process responses. They wrap and modify or transform the inputs and outputs to core application logic.

Session de la Conférence PHP Québec 2007

by damdec
des tas de ressources php. 12-14 mars 2008 / Montréal, Canada, conférence PHP quebec

Spring Framework

by roulian & 5 others
Welcome to the home of the Spring Framework, the leading full-stack Java/JEE application framework. Led and sustained by SpringSource, Spring delivers significant benefits for many projects, increasing development productivity and runtime performance while improving test coverage and application quality.

Inversion of Control Containers and the Dependency Injection pattern

by roulian (via)
In the Java community there's been a rush of lightweight containers that help to assemble components from different projects into a cohesive application. Underlying these containers is a common pattern to how they perform the wiring, a concept they refer under the very generic name of "Inversion of Control". In this article I dig into how this pattern works, under the more specific name of "Dependency Injection", and contrast it with the Service Locator alternative. The choice between them is less important than the principle of separating configuration from use.

Active users

last mark : 22/05/2019 10:29

last mark : 28/08/2018 21:17

last mark : 25/05/2018 09:53

last mark : 07/08/2008 08:24

last mark : 31/07/2008 16:34

last mark : 15/04/2008 07:10

last mark : 17/03/2008 20:34