How to Optimize and Encrypt Your Exchange Infrastructure Java Mappings
This article describes the process of optimizing and encrypting SAP XI Java mappings. The process is based on a technique called "obfuscation." This consists of removing unused code and replacing Java classes, methods, and attributes with encrypted names. The code becomes harder to reverse-engineer, but the functionalities are unaffected by the changes.