Extent:
1 online resource (384 pages)
Series:
Type of publication: Book / Working Paper
Language: English
Notes:
Description based on publisher supplied metadata and other sources.
Contents; Acknowledgements; An All-Too-Common Story; In the beginning ...; In the middle ...; In the end ...; Chapter 1 Introduction; What this Book is About; What this Book is Not About; Why Write this Book?; Who Should Read this Book?; Architects; Developers; Project Managers; Students and Trainees; The Structure of the Book; Part 1; Part 2; Part 3; Reading the Book; PART 1 Architecture, Patterns and Internet Technology; Chapter 2 System Architecture; Architecture, Design and 'Goodness of Fit'; How does this Relate to System Architecture?
What are the Non-functional Characteristics we Care About?Balancing the Non-functional Characteristics; Defining System Architectures; Why do we Care About System Architecture?; Summary; Chapter 3 Internet Technology Systems; Types of Internet Technology System; Why do we Build Systems Using Internet Technology?; Building Blocks of Internet Technology Systems; Why is it Difficult?; Summary; Chapter 4 Architectural Patterns for Internet Technology Systems; Patterns, Languages and Internet Technology; Why do we use Patterns?; Patterns vs Principles; Organization of the Patterns
Presentation of the PatternsNavigating the Language; Summary; Chapter 5 The GlobalTech System; The Business Case; The System Overview; Summary; PART 2 The Patterns; Chapter 6 Fundamental Patterns; Getting the Shape Right; APPLICATION SERVER ARCHITECTURE; PERIPHERAL SPECIALIST ELEMENTS; What makes these Patterns Fundamental?; Summary; Chapter 7 System Performance Patterns; I Feel the Need, the Need for Speed; Principles; ACTIVE-REDUNDANT ELEMENTS; LOAD-BALANCED ELEMENTS; SESSION FAILOVER; DEDICATED WEB AND APPLICATION SERVERS; COMMON PERSISTENT STORE; Why Tiers are not a Catastrophe
DATA REPLICATIONCONNECTION LIMITATION; RESOURCE POOLING; LOCAL CACHE; OFFLINE REPORTING; Other Patterns; Chapter 8 System Control Patterns; Dangerous (adj.): Speed Without Control; Terminology; CONTINUAL STATUS REPORTING; OPERATIONAL MONITORING AND ALERTING; 3-CATEGORY LOGGING; SYSTEM OVERVIEW; DYNAMICALLY-ADJUSTABLE CONFIGURATION; DEMILITARIZED ZONE; INFORMATION OBSCURITY; SECURE CHANNELS; Secure Sockets Layer and SSL Acceleration; KNOWN PARTNERS; Other Patterns; Chapter 9 System Evolution Patterns; Plus Ça Change; Principles; DYNAMICALLY-DISCOVERABLE ELEMENTS; EXPANDABLE HARDWARE
VIRTUAL PLATFORMSWAPPABLE STAGING ENVIRONMENT; SEPARATE SYSTEM-MANAGED DATA; Other Patterns; PART 3 Application of the Patterns; Chapter 10 GlobalTech Revisited; Reviewing the Architecture; Architecting for System Performance; Architecting for System Control; Architecting for System Evolution; Summary; Chapter 11 Applying the Patterns; Not Quite the Simplest System that Could Work; Which Patterns to Apply; A Process for Applying the Patterns?; Examples of Applying the Patterns; Summary; Chapter 12 Moving on from Here; Technology; Tool Support; Development Process
An Evolutionary Approach to Architecture
ISBN: 978-0-470-85587-4 ; 0-470-85612-2 ; 978-0-470-85612-3
Classification: Betriebliche Information und Kommunikation ; Software engineering ; Rechnerkommunikation
Source:
ECONIS - Online Catalogue of the ZBW
Persistent link: https://www.econbiz.de/10012685465