Flylib.com
Software Fortresses: Modeling Enterprise Architectures
Software Fortresses: Modeling Enterprise Architectures
ISBN: 0321166086
EAN: 2147483647
Year: 2003
Pages: 114
Authors:
Roger Sessions
BUY ON AMAZON
Main Page
Table of content
Copyright
Preface
The Software Fortress Model
Who Cares about Software Fortresses?
The Goals of This Book
Who Should Read This Book
The History of the Software Fortress Model
The Organization of This Book
Acknowledgments
About the Author
About the Art Coordinator
About the ObjectWatch Newsletter
Chapter 1. Introduction
1.1 Definitions
1.2 Software Fortress Organization
1.3 Typical Technologies
1.4 The Fortress as a Trust Boundary
1.5 The Main Fortress Types
1.6 Treaty Relationships
1.7 The Fortress as a Unit of Interoperability
1.8 Objects, Components, and Fortresses
Summary
Chapter 2. Diagramming Software Fortresses
2.1 Basic Software Fortress Diagram
2.2 FortressAlly Diagram
2.3 TreatyAlly Diagram
2.4 SequenceAlly Diagram
2.5 FortressAllyResponsibility Cards
2.6 TreatyAllyResponsibility Cards
2.7 Fortress Overview Document
2.8 Treaty Overview Document
Summary
Chapter 3. Transactions
3.1 Transactionally Aware Resources
3.2 Tightly Coupled Single-Resource Transactions
3.3 Multiple-Resource Transactions
3.4 The Distributed Transaction Coordinator
Summary
Chapter 4. Drawbridges
4.1 Drawbridge Overview
Summary
Chapter 5. Synchronous Drawbridges
5.1 Components
5.2 Homogeneous Synchronous Drawbridges
5.3 Heterogeneous Synchronous Drawbridges
Summary
Chapter 6. Asynchronous Drawbridges
6.1 Message Queues
6.2 Implementation of Asynchronous Drawbridges
6.3 Persistence and Transactions in Queues
6.4 Heterogeneous Asynchronous Drawbridges
6.5 Homogeneous Asynchronous Drawbridges
6.6 Advantages of Asynchronous Drawbridges
6.7 Performance Problems of Asynchronous Drawbridges
Summary
Chapter 7. Guards and Walls
7.1 Fortification
7.2 Validation
7.3 Auditing
7.4 Authentication
7.5 Privacy
7.6 Integrity
7.7 Nonrepudiation
7.8 Authorization
Summary
Chapter 8. Treaties
8.1 A Treaty between Two Fortresses
8.2 Treaty Considerations
Summary
Chapter 9. General Fortress Issues
9.1 Scalability
9.2 Reliability
9.3 Integrity
Summary
Chapter 10. Internet Fortresses
10.1 Presentation Fortresses
10.2 Web Service Fortresses
Summary
Chapter 11. Business Application Fortresses
11.1 Foundation: Components and COMWare
11.2 Leveraging Clusters
11.3 .NET versus the J2EE Approach
Summary
Chapter 12. Legacy, Service, and Treaty Management Fortresses
12.1 Legacy Fortresses
12.2 Service Fortresses
12.3 Treaty Management Fortresses
Summary
Chapter 13. Software Fortress Design Review
13.1 Group One: Enterprise Overview Questions
13.2 Group Two: Enterprise Architecture Questions
13.3 Group Three: Fortress Architecture Questions
Summary
Chapter 14. Case Study
14.1 The Problem
14.2 First-Pass Design
14.3 Second-Pass Design
14.4 The ProcessOrder Drawbridges
14.5 The CheckInventory Drawbridges
14.6 Guards
Summary
Chapter 15. Postlude
15.1 Ten Important Points about Software Fortresses
15.2 Ten Reasons to Adopt the Software Fortress Model
15.3 Ten Rules for Software Fortress Design
15.4 Ten Controversial Ideas within the Software Fortress Model
15.5 Ten Considerations for Evaluating J2EE versus .NET
15.6 Ten Observations on the State of the Software Industry
15.7 Where to Go Next
15.8 Final Words
Glossary
Software Fortresses: Modeling Enterprise Architectures
ISBN: 0321166086
EAN: 2147483647
Year: 2003
Pages: 114
Authors:
Roger Sessions
BUY ON AMAZON
Qshell for iSeries
The EDTF Text Editor
Scripting
Using Parameters and Variables
Scripts - Debugging, Signals, and Traps
Archives and Compression
Strategies for Information Technology Governance
A View on Knowledge Management: Utilizing a Balanced Scorecard Methodology for Analyzing Knowledge Metrics
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Managing IT Functions
Governance in IT Outsourcing Partnerships
The Evolution of IT Governance at NB Power
SQL Hacks
Joins, Unions, and Views
Hack 25. Keep a Running Total
Hack 65. Use Pessimistic Locking
Hack 69. Execute Functions in the Database
Hack 80. Play Six Degrees of Kevin Bacon
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Individual change
Organizational change
Mergers and acquisitions
IT-based process change
Twisted Network Programming Essentials
Starting the Twisted Event Loop
Uploading a File
Downloading Mail from a POP3 Server
Downloading Messages from an IMAP Mailbox
Accepting Mail with SMTP
Java All-In-One Desk Reference For Dummies
Creating Generic Collection Classes
Book VI - Swing
Creating Servlets
Database for $100, Please
Using JDBC to Connect to a Database
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies