I share with all of you this interesting design pattern, which is mostly used when you want to query your DB as quick as possible in Web apps 3-Tier, at least, of course…
OPSS provides enterprise product development teams, systems integrators, and independent software vendors with a standards-based, portable, integrated, enterprise-grade security framework for Java SE and Java EE applications.
OPSS is the underlying security platform that provides security to Oracle Fusion Middleware including WebLogic Server, Server Oriented Architecture (SOA) applications, Oracle WebCenter, Oracle Application Development Framework (ADF) applications, and Oracle Entitlement Server. OPSS is designed to be portable to third-party application servers, so developers can use OPSS as the single security framework for both Oracle and third-party environments, thus decreasing application development, administration, and maintenance costs.
OPSS provides an abstraction layer in the form of application programming interfaces (APIs) that insulate developers from security and identity management implementation details. With OPSS, developers do not need to know the details of, for example, cryptographic key management, repository interfaces, or other identity management infrastructures. Using OPSS, in-house developed applications, third-party applications, and integrated applications benefit from the same, uniform security, identity management, and audit services across the enterprise.
In terms of Oracle Identity Manager = Identity certification is the process of reviewing user entitlements and access-privileges within an enterprise to ensure that users have not acquired entitlements that they are not authorized to have. It also involves either approving (certifying) or rejecting (revoking) each access-privilege.
Certifications can be scheduled to run on a regular basis to meet compliance requirements. Managers use the identity certification feature to review their employees’ entitlements to access applications and data. Based on changes reported by the identity certification module, managers can authorize or revoke employee access as needed.
You can create four types of certifications. Each type of certification addresses a particular use-case—a specific type of review that enterprises commonly perform. Each type of reviewer reviews a different subset of access-related data from a specific point of view
This entry provides information on typical command-line options and environment variables that can affect the performance characteristics of the Java HotSpot Virtual Machine:
The link is here
In this article, Joshua Fox describes those phenomenas and how to avoid them. After discussing how to implement the Singleton, Joshua goes over the sometimes surprising causes for the phenomena one by one, showing you how they occur and how you can avoid making those mistakes.
I hope that in the process you will learn about classloading, multithreading, distributed systems, Design Patterns, and other interesting topics, as I did.