7 - Summary
The goal of this guide was to introduce you to dependency injection, interception, and the Unity application block from Enterprise Library. Dependency injection and interception are widely used techniques that help developers write maintainable, testable, flexible, and extensible code, especially for large, enterprise applications.
Unity is not the only tool you can use to add dependency injection and interception to your applications, but if you have read this guide it should be clear that Unity is easy to use and easy to extend. You can use Unity in a wide range of application types such as desktop, web, WCF, and cloud.
Chapters 2 and 3 of this guide focused on the topic of dependency injection, while Chapters 4 and 5 focused on interception. Chapter 6 described a number of ways that you can extend Unity itself if you find that out-of-the-box it doesn’t support a specific scenario.
The remaining parts of this guide, “Tales from the Trenches,” offer a different perspective: these chapters offer brief case studies that describe real-world use of Unity. They make clear the range of scenarios in which you can use Unity, and also highlight its ease of use and flexibility.
We hope you find Unity adds significant benefits to your applications and helps you to achieve those goals of maintainability, testability, flexibility, and extensibility in your own projects.