Book Image

Mastering Hibernate

Book Image

Mastering Hibernate

Overview of this book

Hibernate has been so successful since its inception that it even influenced the Java Enterprise Edition specification in that the Java Persistence API was dramatically changed to do it the Hibernate way. Hibernate is the tool that solves the complex problem of Object Relational Mapping. It can be used in both Java Enterprise applications as well as .Net applications. Additionally, it can be used for both SQL and NoSQL data stores. Some developers learn the basics of Hibernate and hit the ground quickly. But when demands go beyond the basics, they take a reactive approach instead of learning the fundamentals and core concepts. However, the secret to success for any good developer is knowing and understanding the tools at your disposal. It’s time to learn about your tool to use it better This book first explores the internals of Hibernate by discussing what occurs inside a Hibernate session and how Entities are managed. Then, we cover core topics such as mapping, querying, caching, and we demonstrate how to use a wide range of very useful annotations. Additionally, you will learn how to create event listeners or interceptors utilizing the improved architecture in the latest version of Hibernate.
Table of Contents (16 chapters)

Summary


In this chapter, we discussed several different topics that address architectural concerns, all of which are important topics. Using transactions, you can ensure that the data in your unit of work is persisted correctly, and you can tighten the concurrency boundaries by setting the appropriate parameters, such as isolation levels and database locks. We also discussed compensating transactions to implement the undo functionality, and we covered using custom user locks to offer application users more control over the data.

We showed what to watch for when your application is deployed in a clustered environment and also how to implement an application using multiple database shards. Even though, throughout this book, we have discussed performance concerns, we further addressed other concerns related to performance in this chapter.

We also discussed how to reverse engineer a legacy application and the approaches to modernization efforts. And finally, we discussed licensing concerns, multi...