How Event Storming Helps You Map Out a Successful App Modernization Plan

App modernization is a risky endeavor. Event Storming ensures greater success when embarking on an ambitious app modernization program.

Now more than ever, digital transformation is critical to the survival of businesses today and the most crucial element of this revolution is the modernizing of legacy applications. Because these applications often act as catalysts towards a company’s strategic goal, the need to modernize these has never been higher on the road to achieving greater competitive advantage, business resilience, and investments that grow the business further.

Owing to the fact that app modernization requires a great deal of financial commitment and is a risky endeavor, companies need to focus on what they stand to gain from modernizing their applications apart from the thought of incurring the great cost or the risk that these efforts will not yield the desired business value.

Fortunately, there are methods to ensure greater success when embarking on an ambitious application modernization program: Event Storming and Domain Driven Design.

 

What is Event Storming?

Event Storming is a workshop-based method created by Alberto Brandolini in the context of Domain-Driven Design. Compared to other methods, it is extremely lightweight, intentionally requires no support of a computer, and is intended to quickly identify what is happening within the domain of a software program.

The result is expressed in the form of sticky notes on a wide wall. The business process is ‘stormed out’ as a series of domain events which are denoted as orange stickies. The basic idea was to bring together software developers and domain experts so they can learn from each other. This exercise is meant to be fun in order to make the learning process easier. The name was chosen to underscore the domain events and the method works similar to brainstorming or agile modeling’s model storming.

 

What is Domain-Driven Design?

Domain-driven design (DDD) is the concept that the structure and language of software code should match the business domain. Domain is the subject area to which the user applies a program is the domain of the software. A software’s domain governs its context, the setting in which a word or statement appears that determines its meaning. To illustrate this concretely, if a financial software processes loan applications, it might have classes such as LoanApplication and Customer, and methods such as AcceptOffer and Withdraw.

 

How to lead a productive event storming session

The need for modernizing an application is a primary use case in software development. To bring that application to a modern state, event storming will deal with breaking down legacy software applications and creating smaller micro services (or a series of smaller applications). Event storming will enable development teams to build comprehensive business flows in hours instead of weeks. The session will normally give participants an understanding of processes, mutual domain understanding, and a foundation to begin domain-driven design approaches.

 

1. Make the environment conducive for the event storming session.

Apart from clearing the space of tables and chairs so that participants can move freely, the vacant wall will hold up the butcher’s paper where the team can draw context bounds.

You will need the following materials to conduct this session effectively:

  • A wall

  • Sticky notes. At least three colors are needed and you’ll want one color each to represent domain events, external factors, and hotspots (areas of ambiguity or conflict)

  • Sharpies or felt-tipped markers

  • Masking tape

  • A roll of butcher paper

  • A poster board with quick reference instructions

  • Stickers or small bookmark sticky tabs

 

2. Establish basic rules. Determining a basic set of foundational rules and guidance will give teams the flexibility they need to model their business flows.

It helps to establish that the event storming session will be open and collaborative, with all participants engaged or that the session will be interested in modeling business flows by using the most basic business elements call “domain events” which simply pertain to something meaningful that happens in the domain like “sent invoice” or “updated contact details”.

 

3. Start domain event modeling. 

Starting with modeling domain events is ideal because it is more constant than other possible variables and only change significantly when the business itself changes. If your team is after more reliable solutions, event storming with business domains is the way to go. The end-result should be a wall filled with sticky notes.

 

4. Possible benefits and results of the exercise. 

After the exercise, your team will arrive at one of three possible outcomes: 1. a solution; 2. discover that the problem is other than what was initially expected; and 3. discover that the problem is inherently unsolvable. But regardless of the outcome, the benefits of event storming include an acceleration of processes. A domain-focused approach is usually one of the benefits of event-storming, replacing the weeks of effort and resources dedicated to an approach that turns out to be not viable. Additionally, the domain-focused approach teaches participants to learn more about the domain in terms of its industry, language, and problems – all of which lead to more relevant solutions.

Simply put, event storming yields a visual map that achieves transparency in business flows, alignment of goals, mutual understanding, and a domain-driven approach.

Accomplish More With UDT

Get your custom solution in cybersecurity, lifecycle management, digital transformation and managed IT services. Connect with our team today.

More to explore

2024 Will Test Cybersecurity Leaders: Is Your Company Ready?

Experts say new AI-driven threats and an election year will spell trouble for companies.

K12 Budgeting: Planning Your 1:1 Device Refresh Program Cost

As K12 education evolves, managing 1:1 device programs effectively is crucial. These programs, providing each student with a personal computing device, play a pivotal role in modern education. Success demands strategic planning, communication, foresight, and a holistic approach to device management. With digital learning on the rise, these devices are more than just tools for accessing information; they are platforms for interactive, core learning experiences. However, funding remains a significant hurdle, making effective budgeting for your device refresh program essential for optimizing ROI and device longevity.

Crafting a Futureproof 1:1 Device Strategy for School Districts

In the evolving landscape of Education Technology, crafting a futureproof 1:1 device strategy is crucial. This strategy should link every student, teacher, and administrator experience with specific device specifications. The integration of educational apps into the curriculum can significantly enhance the learning environment. These apps, tailored to the needs of students, can provide interactive content, fostering a dynamic learning experience.

Optimizing Your K12 Tech Investments: Funding 1:1 Device Programs

This blog will guide school districts grappling with the financial and resource demands of implementing a successful 1:1 device program amid ongoing challenges of budget constraints and competing priorities. Our guided workbook, created in partnership with Intel, provides further support with personalized roadmap on “Pathways to Innovation: Building a Sustainable Digital Learning Environment”.​

K12 Cybersecurity: How to Secure 1:1 Devices in Your School District

This blog post delves into the importance of security, cybersecurity, and data privacy in school districts implementing 1:1 device initiatives. It offers basic steps for evaluating, planning, and executing a security strategy. Our guided workbook, created in partnership with Intel, provides a personalized roadmap on “Pathways to Innovation: Building a Sustainable Digital Learning Environment”.

Lost & Stolen Devices are a Serious Data Security Threat—Here’s Why

Since the pandemic, remote and hybrid work has become the norm. While mobile devices and remote workstations have empowered great flexibility, it has also led to an increase in data security problems due to lost, misplaced, or stolen devices. Find out how remote and hybrid setups are contributing to this problem and how to protect yourself and your organization.​

Experiencing a security breach?

Get immediate assistance from our security operations center! Take the following recommended actions NOW while we get on the case:

RECOMMENDED IMMEDIATE NEXT ACTIONS

  1. Determine which systems were impacted and immediately isolate them. Take the network offline at the switch level or physically unplug the systems from the wired or wireless network.
  2. Immediately take backups offline to preserve them. Scan backups with anti-virus and malware tools to ensure they’re not infected
  3. Initiate an immediate password reset on affected user accounts with new passwords that are no less than 14 characters in length. Do this for Senior Management accounts as well.

Just one more step

Please fill out the following form,