Welcome!

You will be redirected in 30 seconds or close now.

ColdFusion Authors: Yakov Fain, Jeremy Geelan, Maureen O'Gara, Nancy Y. Nee, Tad Anderson

Related Topics: ColdFusion, Microsoft Cloud

ColdFusion: Article

ColdFusion MX and .NET 101

COM Interop to a .NET assembly can be successfully implemented with CFMX

Some of you may be thinking, ColdFusion (CF) and .NET? Why do it? We hear you. It is understandable that CF, running on top of J2EE, adds a layer of complexity when integrating with interfaces written with Microsoft-centric technologies. The mission of this article is to decipher the complexities and shed some light on how CF can be coupled with .NET solutions to allow for interoperability throughout your IT universe.

.NET is breaking in big in the IT arena and many organizations are adopting it as a standard for developing the business modules associated with their applications. A benefit that .NET brings with it is a true object-oriented methodology to developing software. I liken the C# language as the fraternal twin to Java; though with these benefits, it also brings an increased level of complexity for doing routine tasks that ColdFusion programmers have grown to take for granted.

You can't knock Joe programmer for wanting to learn a new technology. This outlook is preached continually from both Macromedia and Microsoft. With constant new releases and their advantages, the standouts must increase their understanding in all facets of the industry to stay a millimeter ahead of the curve. "What's that you say?" "You're not certified in CFMX...?" "Wait, what?" "You're not working on your MCAD/MCSD?" "Well, what are you waiting for?" Enough with our attempts at lighting a fire under you to expand your horizons, you're reading this article and we commend you for it.

With the J2EE release of ColdFusion MX (CFMX) and the new version 6.1, code-named "Red Sky," Macromedia has continued to support COM (Component Object Model)-based solutions via a COM bridge. CFMX uses a Java-to-COM wrapper that was developed by Intrinsyc. The package is known as J-Integra and details on this component can be found at http://ja.net.intrinsyc.com/. Their product info area has some excellent examples on how to implement J-Integra with various combinations of Java/COM components. J-Integra is instantiated through the cfobject tag or with cfscript utilizing the function CreateObject.

In our example in Figure 1, the cfobject tag was used. Notice the class that is called and the name we assign to the object. Once the object is successfully created, the CreateBarCodeImage method is accessed and the appropriate required parameters are passed to the component. The resulting page output is seen in Figure 2. The application structure is dumped, displaying the contents of the applicationname key and bcg (barcodgen) key. Notice how the object information and available related methods are displayed. CreateBarCodeImage is the method used to generate the barcode image seen in the output.

The ColdFusion code used for the example is an enhanced methodology for instantiating a COM component with ColdFusion. This enhanced methodology outlined in the following Macromedia TechNote, www.macromedia.com/support/coldfusion/ts/documents/tn18210.htm, allows the initial creation of the object to be stored in memory via application or session variables. This also enables the object to be shared across requests and easily accessed with a custom tag or cfmodule. This solution came about due to the observation that there was an increase in creation time in CFMX compared to CF 5. For the sake of argument, this technique is being demonstrated only to provide information in case you come across this issue. No performance issues were witnessed with the .NET/COM component utilized in this article.

So you can create an instance of a COM object in CFMX; ColdFusion has always made this an easy task. This gets interesting when you look at how this is actually achieved. Let's peek under the hood, shall we? Figure 3 shows how CFMX and J-Integra hook into various automation components. There is a similar diagram at http://ja.net.intrinsyc.com/j-integra/info/.

Now for a little light on what might be happening behind the scenes when you call into a .NET object through COM. Just to get the high-level talk out of the way, all .NET languages are compiled into an intermediate language called Microsoft Intermediate Language, also known as MSIL. Like Java, MSIL runs in a virtual machine, called the Common Language Runtime (CLR).

For those who have not dealt with COM before, it provides a binary specification allowing interaction between languages. COM also provides facilities for dynamic discovery of interfaces that an object has exposed.

COM was designed to provide a standard means of marshalling between languages; both platforms must perform some degree of marshalling between types in the respective runtimes and the facilities for accessing them specified by COM. The CLR provides a transparent proxy allowing .NET assemblies to be called from COM clients, called the COM Callable Wrapper (CCW). It is through the CCW that ColdFusion is able to indirectly interface with a .NET assembly (see Figure 4).

For this example we have chosen to implement a very simple component in C#, which when given a series of parameters, will generate an image of a barcode for use within a Web page. The component happily creates images of barcodes on request; it is not the job of this component to manage the lifespan of the files it creates. That task is better left to the consuming application (CFMX).

There are only a few steps needed to have a .NET component ready to be consumed directly from CFMX. First, the code must be written. Second, the assembly must be signed with a strong name and compiled. We generate a strong name key and associate it with the assembly by using the command-line utility sn.exe. Third, as with any .NET component, in order to be visible to COM clients, the assembly must be registered as a COM component. In our example we use regasm.exe to fulfill this task. Finally, we add our assembly to the Global Assembly Cache (GAC) where it is cached and ready to be called by a COM client.

Let's start by taking a look at the C# source file. We will break down each section with a brief explanation and detail any portions of the code that have particular significance to COM interop.

In the code block shown in Figure 5, we are specifying the namespaces that we will be utilizing, such as System.Drawing. We then specify that our class will be placed in the "BarCodeInterop" namespace. The namespace we use has significance in determining the common name we will use to refer to the component. In keeping with the binary interface concepts of COM, it is required that we define a public interface for the method that we will be implementing for our functionality.

COM components implement the IDispatch interface. The IDispatch interface exposes the contents of an object to all programs that support Microsoft Automation. The COM callable wrapper that is responsible for implementing IDispatch for our component will use the interface we have specified to return a COM signature for our method "CreateBarCodeImage". When we use OLEView to inspect the interface our COM object exposes, we get the method signature detailed in Figure 6.

In Figure 7 the first notable item is an "attribute" that provides direction to the compiler for the type of COM interface we want to implement. Using a class interface type of none, our class can provide access only through a late bound interface exposed by IDispatch. Note that our class implements the interface "IBarCodeGenerator" that we defined earlier.

Figure 8 contains the implementation of the required interface method "CreateBarCodeImage". The method creates an image file through the file path specified, with a width, height, and font size specified.

The steps that follow the writing of our code include signing the assembly, adding the assembly to the global assembly cache, and registering the assembly for COM interop. In order to sign our assembly we must first generate a strong name key. We use Microsoft's sn.exe to generate the key (see Figure 9).

Once we have a strong name key, we place the file in the root of our project and associate it with the assembly by editing the "AssemblyInfo.cs" source file. AssemblyInfo.cs contains attributes that allow you to specify component information such as company, version, etc. There are also three attributes that are involved in signing an assembly. We specify our strong name key file by editing the AssemblyKeyFile attribute as:

[assembly: AssemblyKeyFile("..\\..\\BarCodeInterop.snk")]

After signing the assembly and compiling it, the assembly is ready to be added to the global assembly cache. The .NET framework installs the .NET Configuration wizard located under Control Panel -> Administrative Tools, which allows the addition and configuration of assemblies to the global assembly cache, among other things (see Figure 10).

Simply click "Add an Assembly to the Assembly Cache" task link to browse to the assembly location and complete the step of adding the assembly to the global assembly cache.

The final step needed to expose our component to COM is registering the component as a COM component in the system registry. This task is accomplished using the command line utility regasm.exe (see Figure 11).

A typical registration would look like this: "regasm C:\BarCodeInterop.dll".

With the .NET component wrapped and registered, CFMX is able to see the objects' methods and their input parameters.

There you have it! An example that proves COM interop to a .NET assembly can be successfully implemented with CFMX. Why do it? This question has been answered.... It works, and it works well. Organizational leadership must assess costs respective to redesign with the ever-tightening budgets associated with IT. An environment that has been structured around COM and ColdFusion can now easily be converted to .NET and ColdFusion.

With all that goes into the base concepts of integrating CFMX and .NET solutions, we look forward to the next article on the subject of using a native .NET interface for CFMX known as Black Knight. We will also be discussing Web services solutions and their performance parameters. Until then...

More Stories By Jeffrey Bouley

Jeffrey Bouley is the founder of Strikefish, Inc., in Orlando, Florida. He is a certified ColdFusion developer and a former Macromedia Consultant. He currently provides software architecture and development solutions for ColdFusion, Java, .NET, XML, SQL Server, and Oracle Integration (www.strikefish.com).

More Stories By John Parrish

John Parrish has spent his career developing component-oriented systems for the Web. He also serves as director for Jikapa Interactive Inc, an interactive solutions firm providing software and corporate design solutions (www.jikapa.com).

Comments (1) View Comments

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Most Recent Comments
Shane Sauer 07/12/05 01:25:13 PM EDT

Intrinsyc Software has just released a new J-Integra product for J2EE/.NET interop... J-Integra Espresso! J-Integra Espresso is a true CORBA solution for the Microsoft .NET framework. This Object Request Broker (ORB) has been written in C# and connects Java and CORBA with the .NET world. J-Integra Espresso has been developed entirely as managed code and can therefore be accessed by all .NET languages (C#, ASP.NET, etc...).

J-Integra Espresso features:
* Pure .NET implementation, 100% managed code
* Bi-directional: .NET to Java/CORBA and Java/CORBA to .NET
* Enables interoperability with any J2EE or CORBA infrastructure that is IIOP-compliant such as VisiBroker, Orbix, JacORB, JBoss, WebLogic, and WebSphere
* Support for IIOP transport protocols including SSL and TLS over IIOP (SSLIOP)
* Marshalling objects by reference or by value
* One-sided deployment (no touch on J2EE AppServer)

A free evaluation version can be downloaded at http://j-integra.intrinsyc.com/

Regards,

Shane Sauer
Intrinsyc Software International, Inc.
J-Integra Interoperability Solutions
http://j-integra.intrinsyc.com/
When Web Services are not enough

@ThingsExpo Stories
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, whic...
BnkToTheFuture.com is the largest online investment platform for investing in FinTech, Bitcoin and Blockchain companies. We believe the future of finance looks very different from the past and we aim to invest and provide trading opportunities for qualifying investors that want to build a portfolio in the sector in compliance with international financial regulations.
Imagine if you will, a retail floor so densely packed with sensors that they can pick up the movements of insects scurrying across a store aisle. Or a component of a piece of factory equipment so well-instrumented that its digital twin provides resolution down to the micrometer.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settle...
Product connectivity goes hand and hand these days with increased use of personal data. New IoT devices are becoming more personalized than ever before. In his session at 22nd Cloud Expo | DXWorld Expo, Nicolas Fierro, CEO of MIMIR Blockchain Solutions, will discuss how in order to protect your data and privacy, IoT applications need to embrace Blockchain technology for a new level of product security never before seen - or needed.
Leading companies, from the Global Fortune 500 to the smallest companies, are adopting hybrid cloud as the path to business advantage. Hybrid cloud depends on cloud services and on-premises infrastructure working in unison. Successful implementations require new levels of data mobility, enabled by an automated and seamless flow across on-premises and cloud resources. In his general session at 21st Cloud Expo, Greg Tevis, an IBM Storage Software Technical Strategist and Customer Solution Architec...
Nordstrom is transforming the way that they do business and the cloud is the key to enabling speed and hyper personalized customer experiences. In his session at 21st Cloud Expo, Ken Schow, VP of Engineering at Nordstrom, discussed some of the key learnings and common pitfalls of large enterprises moving to the cloud. This includes strategies around choosing a cloud provider(s), architecture, and lessons learned. In addition, he covered some of the best practices for structured team migration an...
No hype cycles or predictions of a gazillion things here. IoT is here. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, an Associate Partner of Analytics, IoT & Cybersecurity at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He also discussed the evaluation of communication standards and IoT messaging protocols, data...
Coca-Cola’s Google powered digital signage system lays the groundwork for a more valuable connection between Coke and its customers. Digital signs pair software with high-resolution displays so that a message can be changed instantly based on what the operator wants to communicate or sell. In their Day 3 Keynote at 21st Cloud Expo, Greg Chambers, Global Group Director, Digital Innovation, Coca-Cola, and Vidya Nagarajan, a Senior Product Manager at Google, discussed how from store operations and ...
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and B...
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were looking for permissioned blockchain," stated René Bostic, Technical VP of the IBM Cloud Unit in North America, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventi...
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...
Smart cities have the potential to change our lives at so many levels for citizens: less pollution, reduced parking obstacles, better health, education and more energy savings. Real-time data streaming and the Internet of Things (IoT) possess the power to turn this vision into a reality. However, most organizations today are building their data infrastructure to focus solely on addressing immediate business needs vs. a platform capable of quickly adapting emerging technologies to address future ...
We are given a desktop platform with Java 8 or Java 9 installed and seek to find a way to deploy high-performance Java applications that use Java 3D and/or Jogl without having to run an installer. We are subject to the constraint that the applications be signed and deployed so that they can be run in a trusted environment (i.e., outside of the sandbox). Further, we seek to do this in a way that does not depend on bundling a JRE with our applications, as this makes downloads and installations rat...
Widespread fragmentation is stalling the growth of the IIoT and making it difficult for partners to work together. The number of software platforms, apps, hardware and connectivity standards is creating paralysis among businesses that are afraid of being locked into a solution. EdgeX Foundry is unifying the community around a common IoT edge framework and an ecosystem of interoperable components.
DX World EXPO, LLC, a Lighthouse Point, Florida-based startup trade show producer and the creator of "DXWorldEXPO® - Digital Transformation Conference & Expo" has announced its executive management team. The team is headed by Levent Selamoglu, who has been named CEO. "Now is the time for a truly global DX event, to bring together the leading minds from the technology world in a conversation about Digital Transformation," he said in making the announcement.
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lead...
Digital Transformation (DX) is not a "one-size-fits all" strategy. Each organization needs to develop its own unique, long-term DX plan. It must do so by realizing that we now live in a data-driven age, and that technologies such as Cloud Computing, Big Data, the IoT, Cognitive Computing, and Blockchain are only tools. In her general session at 21st Cloud Expo, Rebecca Wanta explained how the strategy must focus on DX and include a commitment from top management to create great IT jobs, monitor ...
"Cloud Academy is an enterprise training platform for the cloud, specifically public clouds. We offer guided learning experiences on AWS, Azure, Google Cloud and all the surrounding methodologies and technologies that you need to know and your teams need to know in order to leverage the full benefits of the cloud," explained Alex Brower, VP of Marketing at Cloud Academy, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clar...
The IoT Will Grow: In what might be the most obvious prediction of the decade, the IoT will continue to expand next year, with more and more devices coming online every single day. What isn’t so obvious about this prediction: where that growth will occur. The retail, healthcare, and industrial/supply chain industries will likely see the greatest growth. Forrester Research has predicted the IoT will become “the backbone” of customer value as it continues to grow. It is no surprise that retail is ...