Information Systems Transformation

Information Systems Transformation

4.11 - 1251 ratings - Source

Every major enterprise has a significant installed base of existing software systems that reflect the tangled IT architectures that result from decades of patches and failed replacements. Most of these systems were designed to support business architectures that have changed dramatically. At best, these systems hinder agility and competitiveness and, at worst, can bring critical business functions to a halt. Architecture-Driven Modernization (ADM) restores the value of entrenched systems by capturing and retooling various aspects of existing application environments, allowing old infrastructures to deliver renewed value and align effectively with enterprise strategies and business architectures. This book provides a practical guide to organizations seeking ways to understand and leverage existing systems as part of their information management strategies. It includes an introduction to ADM disciplines, tools, and standards as well as a series of scenarios outlining how ADM is applied to various initiatives. Drawing upon lessons learned from real modernization projects, it distills the theory and explains principles, processes, and best practices for every industry. * Acts as a one-stop shopping reference and complete guide for implementing various modernization models in myriad industries and departments. * Every concept is illustrated with real-life examples from various modernization projects, allowing you to immediately apply tested solutions and see results. * Authored by the Co-chair of the Object Management Group (OMG) Architecture-Driven Modernization (ADM) Task Force, which sets definitive systems modernization standards for the entire IT industry. * A web site supports the book with up to date coverage of evolving ADM Specifications, Tutorials, and Whitepapers, allowing you to remain up to date on modernization topics as they develop.CICS Online Apps WAS a€“ Existing App New Rich Web Application Clients ( running in browsers) WAS-Rich Web App Secure ... WAS - Converted 4GL to Java Services Custom JMS Acegi Dispatcher Apache CXF (Xfire) WS-Security ( SAML Token) ... For security purposes, the Spring code uses the Acegi framework, which isolates the code from how the authentication and authorization actually occurs.

Title:Information Systems Transformation
Author:William M. Ulrich, Philip Newcomb
Publisher:Morgan Kaufmann - 2010-02-04


You Must CONTINUE and create a free account to access unlimited downloads & streaming