Flylib.com
Modernizing Legacy Systems: Software Technologies, Engineering Processes, and Business Practices
Modernizing Legacy Systems: Software Technologies, Engineering Processes, and Business Practices
ISBN: 0321118847
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
Robert C. Seacord
,
Daniel Plakosh
,
Grace A. Lewis
BUY ON AMAZON
Main Page
Table of content
Copyright
Preface
Audience
Organization and Content
Acknowledgments
Chapter 1. The Legacy Crisis
1.1 Modernization Challenges
1.2 How Did We Get Here?
1.3 The Legacy Crisis
1.4 Evolving Legacy Systems
1.5 Software Reengineering
1.6 Incremental Development and Deployment
1.7 Summary
1.8 For Further Reading
Chapter 2. The Beast
2.1 The Retail Supply System
2.2 Recent History
2.3 Summary
Chapter 3. Risk-Managed Modernization
3.1 Risk Management
3.2 Summary
Chapter 4. Developing the Business Case
4.1 Where Are We?
4.2 Identify Stakeholders
4.3 Understand Requirements
4.4 RSS Requirements
4.5 Create a Business Case
4.6 The RSS Business Case
4.7 Summary
4.8 For Further Reading
Chapter 5. Understanding the Legacy System
5.1 Where Are We?
5.2 The Context for Program Understanding: The Horseshoe Model
5.3 Reconstruction
5.4 Architecture Reconstruction
5.5 Issues
5.6 Summary
5.7 For Further Reading
Chapter 6. Architecture Representation
6.1 Where Are We?
6.2 Purpose of Architecture Representation
6.3 Architecture Representation Requirements
6.4 Architectural Views
6.5 Additional Considerations
6.6 Summary
6.7 For Further Reading
Chapter 7. Languages and Data Management
7.1 Where Are We?
7.2 COBOL
7.3 Java
7.4 Data Repositories
7.5 Data Representations for Information Exchange
7.6 Summary
Chapter 8. Transaction Technology
8.1 Where Are We?
8.2 Distributed Communication
8.3 Transactions
8.4 Distributed Transactional Operations
8.5 Comparison of Transactional Models
8.6 Standards
8.7 Products
8.8 Summary
Chapter 9. Software Infrfastructure
9.1 Where Are We?
9.2 Enterprise JavaBeans
9.3 Message-Oriented Middleware
9.4 Java 2 Enterprise Edition
9.5 XML Messaging
9.6 Summary
Chapter 10. Maintaining Transactional Context
10.1 Where Are We?
10.2 Model Problem: Retail Supply System
10.3 Contingency Planning
10.4 Definition of the Model Problem
10.5 Solution of the Model Problem
10.6 Evaluation
10.7 Summary
Chapter 11. Business Object Integration
11.1 Where Are We?
11.2 A Tale of Two Architectures
11.3 Quality Attributes
11.4 Summary
Chapter 12. Target Architecture
12.1 Where Are We?
12.2 Forces Affecting the Architecture
12.3 Overview of the Architecture
12.4 Architectural Patterns
12.5 Summary
Chapter 13. Architecture Transformation
13.1 Where Are We?
13.2 Data Adapters
13.3 Logic Adapters
13.4 Architecture Transformation Strategy
13.5 Componentization Trail Maps
13.6 Use of Adapters in RSS
13.7 Summary
Chapter 14. System Preparation
14.1 Where Are We?
14.2 Analysis of Alternatives
14.3 Summary
Chapter 15. Code and Data Migration
15.1 Where Are We?
15.2 Structural Analysis
15.3 Code Migration Plan
15.4 Data Migration Plan
15.5 Summary
Chapter 16. Integrated Plan
16.1 Where Are We?
16.2 Reconciliation Objectives
16.3 Reconciliation Plan
16.4 Stakeholder Priorities
16.5 Stakeholder Ideal Profiles
16.6 Stakeholder Consensus Meetings
16.7 Code-Migration Prioritization Results
16.8 Summary
Chapter 17. Resource Estimation
17.1 Where Are We?
17.2 Cost Estimation Overview
17.3 Costing an Increment
17.4 Estimation of Cost and Duration
17.5 Costing the Preparation Work
17.6 Costing the Final Database Migration
17.7 Data Collection
17.8 Summary
17.9 For Further Reading
Chapter 18. Recommendations
18.1 Find a Better Way
18.2 Use Commercial Components
18.3 Manage Complexity
18.4 Develop and Deploy Incrementally
18.5 Software Engineering Skills
18.6 Component-Centric Approach
18.7 Architecture-Centric Approach
18.8 High Levels of Concurrent Development
18.9 Continuous Integration
18.10 Risk-Managed Development
18.11 Final Word
References
Acronyms
Modernizing Legacy Systems: Software Technologies, Engineering Processes, and Business Practices
ISBN: 0321118847
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
Robert C. Seacord
,
Daniel Plakosh
,
Grace A. Lewis
BUY ON AMAZON
Beginning Cryptography with Java
Symmetric Key Cryptography
Asymmetric Key Cryptography
CMS and S/MIME
Appendix A Solutions to Exercises
Appendix B Algorithms Provided by the Bouncy Castle Provider
Software Configuration Management
Configuration Control
Configuration Status Accounting
A Practical Approach to Documentation and Configuration Status Accounting
Appendix E Test Plan
Appendix P Project Statement of Work
SQL Tips & Techniques (Miscellaneous)
Creating Indexes for Fast Data Retrieval
Performing Multiple-table Queries and Creating SQL Data Views
Understanding SQL Subqueries
Repairing and Maintaining MS-SQL Server Database Files
Working with SQL Database Data Across the Internet
The CISSP and CAP Prep Guide: Platinum Edition
Legal, Regulations, Compliance, and Investigations
Continuous Monitoring Process
Appendix A Answers to Assessment Questions
Appendix E The Information System Security Management Professional (ISSMP) Certification
Appendix G Control Baselines
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
Computers as Persuasive Social Actors
Increasing Persuasion through Mobility and Connectivity
The Ethics of Persuasive Technology
Captology Looking Forward
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Telecommunications Technology Fundamentals
Satellite
The Broadband Infrastructure
The Optical Core: Overlay Versus Peer-to-Peer Networking Models
Mobile Gaming
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies