The next generation of software applications must address the new architectural requirements to operate with the Internet of Things (IOT), cyber security, blockchain networks, cloud, and quantum computer technologies. As 5G wireless establishes itself over the next few years, moving legacy applications into these new architectures will be critical for companies to compete in a consumer driven and social media-based economy. Few, organizations; however, understand the challenges and complexities of moving from a central-database legacy architecture to a ledger and networked environment.
The challenge is not limited to just designing new software applications. Indeed, the next generation needs to function more independently on various devices under more diverse and wireless-centric networks. Furthermore, databases must be broken down into linked-list based blockchain architecture, with analytic decisions of what portions of data and meta-data that will process within the chain and what others will be dependent on cloud systems. Finally—the collection of all data throughout the vast networks will need to be aggregated and used for predictive analysis across a variety of competitive business applications in a secured environment. Certainly not an easy task for any analyst/designer.
Many organizations will continue to use packaged products and open source applications. These third-party products will need to integrate with the new architecture paradigms and have seamless data aggregation capabilities while maintaining the necessary cyber compliances.
This book provides a detailed “how to” from analysis to design to implementation of applications that need to be integrated within legacy applications and data bases. The book also clearly defines the roles and responsibilities among the stakeholders, including the IT departments, users, executive sponsors, and third party vendors. The organization of the book also creates a step-by-step method to help ensure a higher rate of success in how to re-engineer existing applications and databases , how to select third party products, conversion methods and cyber controls.
Next Generation Analysis & Design is written to be used by a vast audience: IT developers, software engineers, application vendors, business-line managers, and executives.