Discussion Overview
The discussion revolves around the methodologies and tools for reverse-engineering legacy databases that lack proper documentation. Participants explore various approaches to reconstructing database schemas and the suitability of different project management methodologies for this task.
Discussion Character
- Exploratory
- Technical explanation
- Debate/contested
Main Points Raised
- One participant suggests using ERwin to create a conceptual and logical model from a legacy database, proposing that this process could be straightforward and well-documented.
- Another participant argues that reconstructing a logical schema from a physical database is challenging and recommends analyzing the queries used to extract data as a potentially more effective method.
- A participant shares an idea for extracting star schemas from a database using metadata and naming conventions, highlighting the complexity of physical schemas in distributed databases.
- There is a mention that external source code related to the database can be valuable for understanding non-core schema objects.
- One participant recommends Sparx Enterprise Architect as an alternative tool to ERwin, noting that preferences for tools can vary among users.
- Another participant indicates that the choice between Waterfall and Agile/Scrum methodologies may depend on factors such as project size, scope, and expected changes in user interfaces.
- A participant references a company called Auctor that specializes in reverse engineering legacy systems and mentions their use of a tool called "evolveware."
Areas of Agreement / Disagreement
Participants express differing opinions on the best tools and methodologies for reverse-engineering legacy databases, indicating that there is no consensus on a single effective approach.
Contextual Notes
Participants note that the complexity of physical schemas and the presence of non-core schema objects can complicate the reverse-engineering process. There are also references to specific tools and methodologies that may have varying effectiveness depending on the context.
Who May Find This Useful
Individuals involved in database management, software development, or data analysis, particularly those dealing with legacy systems and seeking methodologies for reverse-engineering databases.