From the course: Software Architecture Foundations

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Identifying bounded contexts and entities

Identifying bounded contexts and entities

From the course: Software Architecture Foundations

Start my 1-month free trial

Identifying bounded contexts and entities

- The next step in my process is to start identifying the agents in the system. Depending on the architectural pattern you'll decide on, I'll talk about several of those in chapter five, these agents become classes or subsystems, or maybe microservices. At the same time, you'll start figuring out how the agents talk to each other and what the dependency relationships are. I do all of that using a process that's commonplace in the DDD world called event storming. The best way to explain it is to demonstrate it. The first step is to decide on the events. These are all domain-level events that are meaningful to the business. The activity diagram from the last movie can help us with that. The first event I can think of is, the comment has been submitted. I'll write that out on a sticky note and put it on the wall. The next one is, the comment has been added to the dashboard. That one goes up on the wall, too. Other events are, the email has been sent, the reply was received, the moderator…

Contents