IMHO, from a user perspective, to let more users accept Tapestry, Tapestry
should consider more for the users. Compatibility and the ease of upgrade
should be a high priority. Tapestry should build a kernel that lasts over
time. Drastic changes from release to release will drive users away. A large
user base and community is very important for an enterprise user. I like
Tapestry but as a architect in a big company, I may have to reconsider my
choice if Tapestry can not reach a stable stage within six months. Every
upgrade is a non-trivial cost for an SEI CMM level 3 organization that is
targeting CMMI level 5 certification.
For me, it's more important to have a stable, well optimized and well
documented Tapestry.

Best Regards,
Cliff Zhao


On 11/28/05, Davor Hrg <[EMAIL PROTECTED]> wrote:
>
> I'm no expert in .NET bu have seen aplications killed with VIEWSTATE,
> one page had a viewstate of 75 kB, which means 150 kB of traffic per
> request.
>
> I'm affraid this could break the "easiest way should be the right way".
>
> I hope someone with more .NET expirience could elaborate more on the
> VIEWSTATE issue.
>
> On 11/28/05, Danny Angus <[EMAIL PROTECTED]> wrote:
> >
> > Massimo Lusetti wrote:
> >
> > >I've to admit, as a global note, I'm not very comfortable with storing
> > > states (and consequently what relates to states) on the client
> >
> > I agree with Massimo, not only does bandwidth become an issue, but
> > security
> > becomes more of an issue as well.
> >
> > I'm not saying that it would necessarily expose a weakness, but it might
> > make it easier for less-experienced developers to inadvertently expose a
> > weakness.
> >
> > For example if it is possible to manipulate the client-side state, and
> we
> > have to assume that if we can do it then it is possible (if difficult),
> so
> > we have to ensure that every precaution is taken to ensure that we
> > validate
> > the state against allowable states for that user. In practice this is
> not
> > trivial, we have to identify the appropriate validation to use for each
> > application and set of data. The real danger of this is that we really
> > would be seeing a move to a less secure model.
> >
> > Lets look at an example; If the state recorded is an account number for
> an
> > account you are allowed to administer we can let you see your account
> > details, but how can be be sure that you are still the person who is
> > entitled to see that data? Obvious we make you log in (and http_auth
> > ensures that the browser sends your password with every logged-in
> request)
> > and compare the user we retrieve from the server with the one associated
> > with the client-side state, in our example we also have to verify that
> the
> > account is associated with a user you are allowed to administer. We will
> > pretty quickly end up wishing that we had a server-side state we could
> use
> > to validate requests against. Doesn't this defeat the purpose? I though
> > that the whole principle behind sessions and session-id's was about
> moving
> > state from the client into the server where it is secure and can't be
> > tampered with.
> > Is it not possible to split the state intellignently between client and
> > server?
> >
> > As far as bandwidth is concerned I'm quite sure that my employer would
> be
> > somewhat less than pleased if my new application consumed more bandwidth
> > than an equivalent older one, someone has to pay for bandwidth and its
> > often both parties, naievely put for a 100% marginal rise in traffic
> > between two parties you get a 200% rise in marginal cost.
> >
> > d.
> >
> >
> >
> >
> ***************************************************************************
> > The information in this e-mail is confidential and for use by the
> > addressee(s) only. If you are not the intended recipient (or responsible
> for
> > delivery of the message to the intended recipient) please notify us
> > immediately on 0141 306 2050 and delete the message from your computer.
> You
> > may not copy or forward it or use or disclose its contents to any other
> > person. As Internet communications are capable of data corruption
> Student
> > Loans Company Limited does not accept any  responsibility for changes
> made
> > to this message after it was sent. For this reason it may be
> inappropriate
> > to rely on advice or opinions contained in an e-mail without obtaining
> > written confirmation of it. Neither Student Loans Company Limited or the
> > sender accepts any liability or responsibility for viruses as it is your
> > responsibility to scan attachments (if any). Opinions and views
> expressed in
> > this e-mail are those of the sender and may not reflect the opinions and
> > views of The Student Loans Company Limit
> > ed.
> >
> > This footnote also confirms that this email message has been swept for
> the
> > presence of computer viruses.
> >
> >
> **************************************************************************
> >
> > ---------------------------------------------------------------------
> > To unsubscribe, e-mail: [EMAIL PROTECTED]
> > For additional commands, e-mail: [EMAIL PROTECTED]
> >
> >
>
>

Reply via email to