Figure 2: Using the
Proxy
pattern to separate logging concerns.
Back to Article