Anti-Corruption Pattern

The Anti-Corruption Pattern and Legacy Migration Strategies

Wrapping up the posts on Legacy Migration Strategies, this article will focus on the Anti-Corruption Pattern. The anti-corruption pattern describes some custom code to interface between a legacy application and a new target application. The reason why the pattern is called anti-corruption, is due to the corruptive nature of new development being forced to conform to a pre-defined legacy interface. …

Strangler Fig

The Strangler Pattern and Legacy Migration Strategies

Following up on my previous post on Legacy Migration Strategies, I will be talking about the strangler pattern. At its core, the approach is to take your original application, and replace it piece-by-piece by “strangling” it to death with each new component. The biggest reason for architecting with this approach in mind is to minimize the impact of the transition …

Legacy Migration Strategies

What do you think of when you hear about a legacy system? A machine in a corner with a broom handle holding the power switch on because the switch slips to off when nobody’s looking, and they don’t want to be the person to remove it.  Perhaps it is a user account management system that sits on a Sun Ultra …

Legacy Systems

I stumbled upon an article in the IEEE Spectrum this month that highlights the massive elephant that exists in the room of most organizations that have been around for a while. In fact, Spectrum dedicated their September 2020 print issue to this concern. And concern it is. From a business perspective, they were sold a complete turnkey system that they …