Software

Command Pattern

The pattern encapsulates the request as an object of its own. Usually, when one object makes a request for a second object to do an action, the first object will call a method of the second object and the second object would complete the task.

Common way:

No Command Pattern Visualization Diagram.png

Visualization of the Command design pattern:

Command Pattern Visualization Diagram.png

In this way, the Sender doesn’t need to know about the receiver and the methods to call.

The Command pattern has another object that invokes the command object to complete whatever task it is supposed to do, called the invoker.

Continue reading “Command Pattern”
Software

Disable bots detection in Sitecore

There are may be needs for you to test some visits in Sitecore to determine each visit precisely but some of them are not handled because Sitecore may think this is not real interactions, especially if make interactions via JMeter, Locust or K6. To disable bots detection you should follow the next steps:

  1. Open the C:\inetpub\wwwroot\<instance name>\App_Config\Sitecore\Marketing.Tracking\Sitecore.Analytics.Tracking.config
  2. Find two settings:
    • Analytics.AutoDetectBots
    • Analytics.Robots.IgnoreRobots

Set the both values of the settings from true to to false.

<!--  ANALYTICS AUTO DETECT BOTS
            Enable auto detection of bots.
            Default: true
-->
<setting name="Analytics.AutoDetectBots" value="false" />

<!--  ANALYTICS ROBOTS IGNORE ROBOTS
            Ignore requests and do not write information to the Analytics database when the visitor 
            classification identifies the visitor as a robot.
            Default: true
-->
<setting name="Analytics.Robots.IgnoreRobots" value="false" />

Now each visits will be considered as a valid visit and each visit will be tracked.

Software

Chain of Responsibility Pattern

A chain of objects that are responsible for handling requests. Its a series of objects that are linked together.

Chain of Responsibility Visualization Diagram.png

When a client object sends a request, the first handler in the chain will try to process it. If a handler can process the request, the request ends at this handler. If a handler cannot deal with the request, the handler will send a request to the next handler nd so on. If any handler can process it, then the request if not satisfied.

Continue reading “Chain of Responsibility Pattern”
Software

Template Method Pattern

This is behavioral design pattern, which means it focus on ways that individual objects collaborate to achieve a common goal.

The Template Method can be helpful if you have 2 classes with similar functionality, which apply generalization principle.

This UML diagram has the essential components: a public template method and abstract methods in the superclass. These abstract methods are implemented in the subclasses. There is also one step common to all: reachDestination. It is private because only the method in the superclass needs to access it.

Template Method Class Diagram.png
Continue reading “Template Method Pattern”
Software

Decorator Pattern

Using the decorator pattern you can build functionality by stacking objects, which allows objects to dynamically add behaviors to others.

The next diagram is helpful to understand the Decorator pattern:

Decorator Aggregation Diagram Visualization.png

This is how aggregation stack looks like. The Object A is a base object because it doesn’t contain another object. It will have its own set of behaviors. Object B aggregates Object A allowing Object B augment the behaviors of Object A. We can continue add objects to stack where Object C aggregates Object B and augment behaviors of Object B. The relation is always 1 to 1 in decorator design pattern in order to build up the stack so that one object is on top of another.

To achieve an overall combination of behavior for the stacked objects, you would call upon the top element which is object C, then C -> B -> A. Object A responds with its behavior, then object B adds its incremental behavior and object C adds its incremented behavior.

Continue reading “Decorator Pattern”
Software

Proxy Pattern

Proxy acts as a simplified or lightweight version of the original object where the proxy object is still able to accomplish the same tasks, but may delegate requests to the original object to achieve them. The proxy object itself can hide sensitive information of the original object when interacting with another objects.

3 main reasons to use proxy design pattern:

  1. To act as a virtual proxy – where the proxy class is used in place of a real subject class that is resource intensive to instantiate (this is commonly used on images and web pages, because a single high definition image can be extremely large).
  2. To act as a protection proxy – in order to control access to the real subject class (role management system).
  3. To act as a remote proxy – where the proxy class is local and the real subject class exists remotely (like a Google documents where web browser has all the objects it needs locally, which also exists on Google servers).
Proxy Class Diagram.png
Continue reading “Proxy Pattern”
Software

Adapter pattern

Problem: the output of one system my not conform to the expected input of another system.

The Adapter design pattern will help to facilitate communication between two existing systems by providing a compatible interface.

Adapter Diagram.png

The Adapter essentially encapsulates the adaptee and presents a new interface, or appearance, to the client class. It does this by wrapping the adaptee’s interface and exposing a new target interface that makes sense to the client.

Continue reading “Adapter pattern”
Software

Facade Pattern

Larger system => more complex system, which potentially confusing for the client classes in your system to use. System complexity is not always a sign for poor design, though.

The Facade design pattern provides a single simplified interface for client classes to interact with the subsystem. It doesn’t add any functionality, it simply acts as a point of entry into your subsystem. It’s wrapper class that encapsulates a subsystem in order to hide the complexity.

A Facade class can be used to wrap all the interfaces and classes for a subsystem.

Continue reading “Facade Pattern”