Presentation is loading. Please wait.

Presentation is loading. Please wait.

Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture.

Similar presentations


Presentation on theme: "Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture."— Presentation transcript:

1 Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture April-10 Click to edit Master text styles Second level Third level Fourth level Fifth level 1 Application Standard Development hamed.shayannasr@seb.dk hamed.shayannasr@seb.dk

2 Confidential Proprietary Table of Contents Pattern Tiered Approach Concept Traceability Software Automation Development Pattern Architecture Approach

3 Confidential Proprietary What’s Pattern in Computer Science? Each pattern is a three-part rule, which expresses a relation between a certain context, a problem, and a solution. —Christopher Alexander Each pattern is a three-part rule, which expresses a relation between a certain context, a certain system of forces which occurs repeatedly in that context, and a certain software configuration which allows these forces to resolve themselves. —Richard Gabriel A pattern is an idea that has been useful in one practical context and will probably be useful in others. —Martin Fowler

4 Confidential Proprietary Pattern in nutshell

5 Confidential Proprietary Categorizing Patterns

6 Confidential Proprietary Table of Contents Pattern Tiered Approach Concept Traceability Software Automation Development Pattern Architecture Approach

7 Confidential Proprietary Tiered Approach Client Tier Application clients, applets, applications and other GUIs Presentation Tier JSP, Servlets and other UI elements Business Tier EJBs and other business objects Integration Tier JMS, JDBC, Connectors, and Legacy Resource Tier Databases, external systems, and legacy resources User interactions, UI presentation, devices SSO, session management, content creation, format and delivery Business logic, transactions, data, and services Resource adapters, legacy, External systems, rules Engines, workflow Resources, data and external services

8 Confidential Proprietary Table of Contents Pattern Tiered Approach Concept Traceability Software Automation Development Pattern Architecture Approach

9 Concept Traceability Confidential Proprietary Continuous Integration logging Business Management Message Queue Concepts Architectural Goals and Constraints reliability performanc e extensibility scalability Security Web DevelopmentData ManagementEnterprise Service Bus Degree of Support LowHigh Search reusability 12345 Portability/ distribution Controlvisibility Source Control Management Repository Management Build System

10 Confidential Proprietary Table of Contents Pattern Tiered Approach Concept Traceability Software Automation Development Pattern Architecture Approach

11 Confidential Proprietary Software Development Automation

12 Confidential Proprietary Table of Contents Pattern Tiered Approach Concept Traceability Software Automation Development Pattern Architecture Approach

13 Confidential Proprietary Development Pattern Primary Tier Framework Tier Services Tier Application Tier database users

14 Confidential Proprietary Primary Tier Source Control Repository Manager Build System and Dependency ManagerTest Driven DevelopmentContinuous IntegrationWeb Content Management System Control ProjectIssue tracking Software Team Enterprise Web Portal

15 Confidential Proprietary Primary Tier Roadmap 234510steps priority Best usage of source control Test Driven Development Build System / Dependancy Mgmnt. Control Project / Software Methodology Repository Management Web Content Management Software Portal Continuous Integration Keys To Success  Clear and Agreed Vision  Developers Integrity  Change Management

16 Confidential Proprietary Primary Tier Source Control Management

17 Confidential Proprietary Primary Tier Repository Management

18 Confidential Proprietary Development Style

19 Confidential Proprietary Framework Tier

20 Confidential Proprietary Table of Contents Pattern Tiered Approach Concept Traceability Software Automation Development Pattern Architecture Approach

21 Confidential Proprietary Enterprise Web Portal database users Business Services People and organization SSOAll Web ApplicationsReports Product Models Bill of Material InventoryOrders Firma Mass Enrollment InvoicingAccountingBudgeting Human Resource Business Manager Facade Service Command Presentation Tier Business Tier Generic Data Access Object OLTP ObjectsOLAP Objects Enterprise Service Bus Plug ability Data Tier Integration Tier Architecture Approach Logging Authentication and Authorization Exception Handling SOI (BPEL/ESB) Lifecycle Management Metadata Managmnt Event Managmnt Data Quality Managmnt Framework Tier search

22 Software Architecture April-10Confidential Proprietary Life creates questions. Together our world can write the answers. -- Josh January 2011


Download ppt "Software Architecture April-10Confidential Proprietary Click to edit Master text styles Second level Third level Fourth level Fifth level Software Architecture."

Similar presentations


Ads by Google