Flylib.com
Modernizing Legacy Systems: Software Technologies, Engineering Processes, and Business Practices
Modernizing Legacy Systems: Software Technologies, Engineering Processes, and Business Practices
ISBN: 0321118847
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
Robert C. Seacord
,
Daniel Plakosh
,
Grace A. Lewis
BUY ON AMAZON
Main Page
Table of content
Copyright
Preface
Audience
Organization and Content
Acknowledgments
Chapter 1. The Legacy Crisis
1.1 Modernization Challenges
1.2 How Did We Get Here?
1.3 The Legacy Crisis
1.4 Evolving Legacy Systems
1.5 Software Reengineering
1.6 Incremental Development and Deployment
1.7 Summary
1.8 For Further Reading
Chapter 2. The Beast
2.1 The Retail Supply System
2.2 Recent History
2.3 Summary
Chapter 3. Risk-Managed Modernization
3.1 Risk Management
3.2 Summary
Chapter 4. Developing the Business Case
4.1 Where Are We?
4.2 Identify Stakeholders
4.3 Understand Requirements
4.4 RSS Requirements
4.5 Create a Business Case
4.6 The RSS Business Case
4.7 Summary
4.8 For Further Reading
Chapter 5. Understanding the Legacy System
5.1 Where Are We?
5.2 The Context for Program Understanding: The Horseshoe Model
5.3 Reconstruction
5.4 Architecture Reconstruction
5.5 Issues
5.6 Summary
5.7 For Further Reading
Chapter 6. Architecture Representation
6.1 Where Are We?
6.2 Purpose of Architecture Representation
6.3 Architecture Representation Requirements
6.4 Architectural Views
6.5 Additional Considerations
6.6 Summary
6.7 For Further Reading
Chapter 7. Languages and Data Management
7.1 Where Are We?
7.2 COBOL
7.3 Java
7.4 Data Repositories
7.5 Data Representations for Information Exchange
7.6 Summary
Chapter 8. Transaction Technology
8.1 Where Are We?
8.2 Distributed Communication
8.3 Transactions
8.4 Distributed Transactional Operations
8.5 Comparison of Transactional Models
8.6 Standards
8.7 Products
8.8 Summary
Chapter 9. Software Infrfastructure
9.1 Where Are We?
9.2 Enterprise JavaBeans
9.3 Message-Oriented Middleware
9.4 Java 2 Enterprise Edition
9.5 XML Messaging
9.6 Summary
Chapter 10. Maintaining Transactional Context
10.1 Where Are We?
10.2 Model Problem: Retail Supply System
10.3 Contingency Planning
10.4 Definition of the Model Problem
10.5 Solution of the Model Problem
10.6 Evaluation
10.7 Summary
Chapter 11. Business Object Integration
11.1 Where Are We?
11.2 A Tale of Two Architectures
11.3 Quality Attributes
11.4 Summary
Chapter 12. Target Architecture
12.1 Where Are We?
12.2 Forces Affecting the Architecture
12.3 Overview of the Architecture
12.4 Architectural Patterns
12.5 Summary
Chapter 13. Architecture Transformation
13.1 Where Are We?
13.2 Data Adapters
13.3 Logic Adapters
13.4 Architecture Transformation Strategy
13.5 Componentization Trail Maps
13.6 Use of Adapters in RSS
13.7 Summary
Chapter 14. System Preparation
14.1 Where Are We?
14.2 Analysis of Alternatives
14.3 Summary
Chapter 15. Code and Data Migration
15.1 Where Are We?
15.2 Structural Analysis
15.3 Code Migration Plan
15.4 Data Migration Plan
15.5 Summary
Chapter 16. Integrated Plan
16.1 Where Are We?
16.2 Reconciliation Objectives
16.3 Reconciliation Plan
16.4 Stakeholder Priorities
16.5 Stakeholder Ideal Profiles
16.6 Stakeholder Consensus Meetings
16.7 Code-Migration Prioritization Results
16.8 Summary
Chapter 17. Resource Estimation
17.1 Where Are We?
17.2 Cost Estimation Overview
17.3 Costing an Increment
17.4 Estimation of Cost and Duration
17.5 Costing the Preparation Work
17.6 Costing the Final Database Migration
17.7 Data Collection
17.8 Summary
17.9 For Further Reading
Chapter 18. Recommendations
18.1 Find a Better Way
18.2 Use Commercial Components
18.3 Manage Complexity
18.4 Develop and Deploy Incrementally
18.5 Software Engineering Skills
18.6 Component-Centric Approach
18.7 Architecture-Centric Approach
18.8 High Levels of Concurrent Development
18.9 Continuous Integration
18.10 Risk-Managed Development
18.11 Final Word
References
Acronyms
Modernizing Legacy Systems: Software Technologies, Engineering Processes, and Business Practices
ISBN: 0321118847
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
Robert C. Seacord
,
Daniel Plakosh
,
Grace A. Lewis
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Welcome to DarkBASIC
Characters, Strings, and Text Output
Fundamentals of 3D Graphics Programming
Epilogue
Appendix A Answers to the Chapter Quizzes
Software Configuration Management
A Practical Approach to Documentation and Configuration Status Accounting
Appendix C Sample Data Dictionary
Appendix V Functional Configuration Audit (FCA) Checklist
Appendix W Physical Configuration Audit (PCA) Checklist
Appendix X SCM Guidance for Achieving the Repeatable Level on the Software
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Local Area Network (LAN) Technologies
Internet Control Message Protocol (ICMP)
File and Printer Sharing
RADIUS and Internet Authentication Service
Internet Protocol Security (IPSec)
Java How to Program (6th Edition) (How to Program (Deitel))
Summary
Towers of Hanoi
Sorting Algorithms
Dynamic Memory Allocation
Self-Review Exercises
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hacks 6382: Introduction
Hack 67. Upgrade Your Wireless Router
Hack 71. Wall Off Your Wireless
Section B.1. Microwave Cabling
Section B.5. 802.11 Hardware Suppliers
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
Creating a Struts-based MVC Application
Form Presentation and Validation with Struts
Building a Data Access Tier with ObjectRelationalBridge
Templates and Velocity
Creating a Search Engine with Lucene
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies