This document discusses applying an anti-corruption layer to link multiple bounded contexts and connect a system to third party systems. It defines what the current system is, the desired future state, and how it will transition by using patterns like repository, adapter and dependency injection to restrict refactoring when third parties change and program to interfaces. A sample application is mentioned and there will be discussion.