Figure 2: Using the Proxy pattern to separate logging concerns.

Back to Article