Migrating a Large Scale Legacy IT System to a System with Current Technology
|
|
- Aldous Bryant
- 7 years ago
- Views:
Transcription
1 Migrating a Large Scale Legacy IT System to a System with Current Technology Bill Wood, Mike Gagliardi, Phil Bianco 4/18/2014 Migration Planning 1
2 Copyright 2014 Carnegie Mellon University and IEEE This material is based upon work funded and supported by the Department of Defense under Contract No. FA C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN AS-IS BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. This material has been approved for public release and unlimited distribution. This material may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at permission@sei.cmu.edu. DM /18/2014 Migration Planning 2
3 Background Agency wanted to Migrate two paired and tightly coupled systems Both are 24/7/365 and have disaster recovery at multiple sites Both have many classes of users 1. Service Based System - 15% functionality (going to 40%) Java, Relational DB, COTS tools, Service-based, J2EE, SAP, Informatica 2. Legacy System - 85% of functionality (going to 60%) COBOL, Hierarchical DB, mainframe Migrate to a well defined target reference architecture (TRA) as a basis for a common platform infrastructure (CPI) developmental, operational, test Briefing is focused on the Legacy Migration 4/18/2014 Migration Planning 3
4 Its Complicated Understanding the Legacy System Architecture Infrastructure Tools Application Component Relationships (Data and Code) Business Process Threads Understanding the Target System Target Reference Architecture (TRA) SOA; Layered Infrastructure Designing Services on top of TRA Business Process threads Mapping between Legacy and Target in Phases Architecture mismatches (development, operational, certification, sustainment, COTS) Operating with dual authoritative data systems, cutover, synchronization Relationships between Application Components (Legacy versus TRA, COTS) 4/18/2014 Migration Planning 4
5 Is there too much code/ data coupling and spaghetti code to partition for migration? Are the current business processes and screens appropriate? Is the CPI (and TRA ) stable? Are COBOL to Java transformation tools up to the job? Can we operate with 2 systems overlapping authoritative data? Do we have sufficient technology expertize in: legacy system, target reference architecture, discovery and analysis tools, transformation tools? Is the business logic only understandable in the legacy code? How can we overcome the lack of architectural documentation? Will the entire testing and certification process change? Will I be creating a maintenance nightmare? It s a 24/7/365 operation- no downtime! It s Worrisome 4/18/2014 Migration Planning 5
6 Keep the Right Vision The TRA is a good start, but an application architecture with data modeling is needed Synchronize with phased TRA and CPI infrastructure deployment Operating with multiple sources of authoritative data Using new technology (e.g. customized security to infrastructure security) Capability of transformative toolsets 4/18/2014 Migration Planning 6
7 Don t Live in a Dreamworld Big-Bang changes usually fail Conducting transactions across networks and keeping response times satisfied! Transforming spaghetti code automatically Separating presentation from business processing from data access! Moving from green screens to windows Making multiple types of changes simultaneously! Edict no changes to the legacy system! Paul Delvaux 4/18/2014 Migration Planning 7
8 Target Reference Architecture This is a good start But it is not enough Application Presentation Layer Business Layer Data Access Layer Data Layer Need a system and application software architecture End-state Each Release Data Infrastructure Metadata Data Warehousing Transactional Data Failover Load Balancing Integration Layer Linux Software Commodity Hardware Security 4/18/2014 Migration Planning 8
9 Migration Approaches An RFI was conducted and multiple approaches suggested Lift and Shift (L&S) Reduce Operations and Maintenance (O&M) Costs ASAP Fast retirement of legacy infrastructure Move to the CPI Don t come close to satisfying the TRA Make minimal changes- keep COBOL, Hierarchy etc. etc. Modernize Phased transformation to TRA Keep legacy architecture Change technology- Java, SOA Use Conversion tools? Re-engineer Re-Develop the system in Java on CPI Developed system and application architecture Satisfy TRA Options Considered 1. Do nothing (baseline) 2. L&S (baseline) 3. L&S and modernize 4. L&S and re-engineer 5. Re-engineer 6. Hybrid- L&S, modernize, re-engineer 4/18/2014 Migration Planning 9
10 Migration Process Determine and Score Options Explore implementation alternatives for options Build an End State Architecture Build a Roadmap List the Options Develop evaluation criteria Score the options Its not reasonable to explore Make every a selection possible option (combination Goals for of sequencing approaches), and then to explore every Constraints possible implementation Phasing List the Alternatives alternative Leads Approach to Conduct analysis to Migration Discovery paralysisand Analysis of Legacy Have Build to Data, a make high code, level some Understand user, Target recommendations business Architecture TRA and processes CPI ordering incrementally Map legacy Quality elements Review and attribute choose Migration to considerations TA alternative elements Toolsets approaches Code, Migration Develop data, tooling test, Issues configuration for Resolution Define Keep phases vs Throwaway Develop Design Factors Perform Groups an Architectural Evaluation (and fix) Legacy: functionality, code, data BP, users Tiers/layers Transient code in Legacy and TA Throwaway Align with Infrastructure Roadmap 4/18/2014 Migration Planning 10
11 Determine and Score Options Understand Migration Determine and Score Goals Options Explore implementation alternatives for options Build an End State Architecture Build a Roadmap Create and Evaluate Options Recommend an Option Reduce operation and maintenance (O&M) costs Platform Legacy Licensing, Relationships obsolescence, electric, space, people Vendor locklanguage Architecture Documentation Database Create technical uniformity across organizational boundaries Subject Matter User Interface Experts (UI) Options Take advantage of new technology System usage Transactions 6 mentioned previously measurements by element Performance, Business Process Interfaces, users Initial crude Scoping evaluation Architecture parameters against TRA Doc Detailed Static evaluation relationships Standards against using tools Cost, Code, risk, performance data, Quality Attributes configurations, factors (23) interfaces Choose an Option Important Operational Developmental Quality Attributes (QA) Best Overall Measure Operational - cost, risk, performance Recovery- failures, Sustainment disasters Determine Security ordering: Infrastructuresequential, concurrently Important Developmental and Sustainment QAs Do Nothing Lift &Shift (L&S) Element L&S and Modernize Goal- Examples Re-Engineer L&S and Re-Engineer Business Process Threads Users, code, data, interfaces 4/18/2014 Migration Planning 11 L&S and Hybrid Performance Cost Risk
12 Evaluation Factors Cost Performance Risk W Factor How much will be the migration labor cost? How much recovery of investment cost after cancellation How early will cost savings happen- license and support during migration? How much will be the on-going legacy license and/or support costs post migration? How is data organized wrt TA : relational, normalized, distributed, partitioned How readily can new functionality be put into production during the migration process- e.g. adaptive maintenance, changing user workflows How well does the end-state system satisfy the TRA architectural structures (application layers, understanding, tiers, SOA) for Partitioning of software and data for L&S causes cumbersome migration Are there tool factors that make the schedule unpredictable: learning curve, tool underperforms requiring extended manual intervention What is the risk of technical obsolescence of the end state? Extent of external interfaces (OGA, There was developmental a separate and sustainment ROM cost attributes team (extensibility, maintainability, reuse across We started Developed with the team s a ROM architectural for each option applications, standards) knowledge Commercial) 40 or so We factors provided How well does them system with meet data the as a basis for estimation How solid is the architectural operational attributes: satisfy end-user foundation, supported by We discovered Their the ROM response OMB sizing under factors maximum was -19 about workload, factors the same as our cost factor sizing scalability, manageability, load balancing, Merged them reliability, into the availability) initial factors- 50 or so How is data organized wrt TRA : relational, We started to weight the factors normalized, distributed, partitioned Too many factors How many had internal an equivalent interfaces changes distribution will be of weights needed 5.00 procurements We combined factors with like distributions- 23 factors How much will be the level of effort for testing to 0.00 make it production ready How well are the TRA security conditions satisfied: easily changed, no unauthorized access, no data corruption What will be the impact for data synchronization, parallel run and cutover? How modernized are the user screens wrt the TRA documentation, at the end state? How much will be the Impact on Users Interface functionality? How well can the two migrations be coordinated? Risk of creating a monopoly for future How complex will the program management effort be? How much business functionality will be negatively affected? Budget/ Cost/Schedule profile goes out of alignment 4/18/2014 Migration Planning 12
13 Selected Hybrid Option- Example Legacy Phase 1 Phase 2 Phase 3 Legacy L&S Re-engineered Modernize Two Systems with Shared Authoritative Data Modernize Lift and Shift Re-engineer How to partition: L&S and modernize; and Re-engineer Significant Business Process Changes re-engineer Layered stable legacy code- L&S and modernize Experiment with modernization tools 4/18/2014 Migration Planning 13
14 Explore Implementation Alternatives- Alternatives Determine and # Description Score Options 1Finds Move the relationships the Data then between move the Code The subsystems and their programs Assumptions alternatives for options 2 Move The the Data Code Stores then and move their the files Data The hybrid 3 Analysis Move by showed groupings the business of Code processes, and Data and screens, Build Discovery an End State and The subsystems and the data stores Users and software and End-to-End data elements Business to be Lifted Threads and Shifted. Architecture Analysis End-to-end business threads/user classes/subsystems/data stores It is preferred that Identify the L&S Dead be done code in and stages dead data Build a Roadmap 4 Clean up legacy in situ first (or not) Legacy API s usage # Legacy transactions Issues usage for Resolution Issues for # 1 Functionality/Data Batch usage may be too entangled to group effectively Factors Resolution What commercial Such that authorized toolsets data are split best can to take do this? place 1 2 What Cutover toolset is best for converting data structure, 2 copying Rollback data, modifying APIs & JCL, writing adaptors? Design 3 Replacing Synchronize transactional support Factors 4 Should Data Copy we do some cleanup before L&S Explore implementation Lift and Shift 5 Performance 4/18/2014 Migration Planning 14
15 Build an End State Architecture Determine and Score Options Develop a Basis Explore alternatives for options Build an End State Architecture Build a Target Build a Roadmap Architecture Evaluate Target Architecture TRA and CPI constraints on End State Architecture Legacy System Architecture Findings Identify Relationships the Target Application between Legacy Elements and Target COTS Services, products data models References Identify totechnical Legacy elements challenges and risks Interfaces to external actors TRA elements used Build an Application Target Architecture Connections between Application elements Business process Conduct flows an through Architecture the elements Evaluation User screen contents Identify (appropriately risks and risk mirror themes legacy) Map to TRA elements used Update the architecture to mitigate the risks Keep a risk register 4/18/2014 Migration Planning 15
16 Build an Architectural Roadmap Develop a Basis Determine and Score Options Explore alternatives for options Define a Pilot Build an End State Architecture Build a Roadmap Define Next Phase Evaluate Consistency Phase selection can be done in a number of ways Select Goals a Business Pilot Migration processes, for users, First services, Phase authorized data Lightweight, Define Low hanging the tools low fruit, risk, being budgeting, few used challenges for scheduling, migration early success Data, code, screens Gain Reduce target legacy and transformation sustainment costs tool experience Define the TA contents of the phase Externally Include data induced extraction, schedules analysis, and reporting Business processes, screens Perhaps aligning Tables, no phased data cutover capabilities with external milestones sources, services and end-points, screens Organizational Happy User path impacts functionality boundaries Architectural Infrastructure Workarounds But views include for some and every Technical quality major Debt release, attribute that drivers correlate to the End State Aligned Define data Architecture model, with the TRA applications, Issues and infrastructure the not Legacy UI Addressed development Architecture. schedule Shows Identify certification Infrastructure, COTS tools, platforms, networks Tasks involving how target the legacy architectural testing- per release? Constraints transformation elements elements of are legacy replaced needed artifacts at each to TA stage Shows Define the on Legacy Phasing system (Releases) artifacts being migrated Tools used what Business in end-state Process the transformation elements Threads, are Screens introduced each stage Define User Migration Subsystems, impact, security, Scenarios tables, site datarollout, authoritative data Describes Services, the correlation data models, between COTS the tools legacy and the end-state Developmental, Define Platform the and quality networks operational, attribute and COTS sustainment considerations products Describes Identify how legacy the architectural users interact items being migrated Evaluate Target Screens, Cross System the roadmap coupling Infrastructure Reports against between the systems scenarios in-place, Data transfer, build epics cutover, during synchronization, migration Capture Subsystems risks, gaps, (partial), sensitivities, tables (partial), tradeoffsdata sources Approach Recovery to migration from failure- routine and disastrous Update the roadmap Confirm Data first, that code all first, events code/data synchronize grouping, BP first Identify Establish technical Risk repository challenges and risks Tools to assist migration 4/18/2014 Migration Planning 16
17 Summary Technical Criteria for selecting between options OMB guidelines were good Plan, but don t overdo it Architect Understand Legacy Include quality attributes High Level End State Roadmap Detailed architecture at each phase Management Changing political environment Drift and Re-direction can become a way of life After The Party 4/18/2014 Migration Planning 17
Experiences in Migrations of Legacy Systems
Experiences in Migrations of Legacy Systems Bill Wood, Mike Gagliardi, and Phil Bianco Software Solutions Conference 2015 November 16 18, 2015 Copyright 2015 Carnegie Mellon University This material is
More informationResolving Chaos Arising from Agile Software Development
Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 523 Author Date High Level Alternatives Approach. Blame the Agile development process, fire the folks who are controlling it and
More informationMerging Network Configuration and Network Traffic Data in ISP-Level Analyses
Merging Network Configuration and Network Traffic Data in ISP-Level Analyses Timothy J. Shimeall, Ph.D. Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Presentation Title
More informationEvaluating the Quality of Software Engineering Performance Data
Evaluating the Quality of Software Engineering Performance Data James Over Software Engineering Institute Carnegie Mellon University July 2014 Copyright 2014 Carnegie Mellon University This material is
More informationemontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge
emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge Soumya Simanta Gene Cahill Ed Morris Motivation Situational Awareness First responders and others operating in
More informationElectricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division James Stevens is a senior member of the technical staff
More informationContracting Officer s Representative (COR) Interactive SharePoint Wiki
Contracting Officer s Representative (COR) Interactive SharePoint Wiki James Smith Andy Boyd Software Solutions Conference 2015 November 16 18, 2015 Copyright 2015 Carnegie Mellon University This material
More informationAssurance in Service-Oriented Environments
Assurance in Service-Oriented Environments Soumya Simanta Research, Technology, and System Solutions (RTSS) Program Software Engineering Institute Carnegie Mellon University Pittsburgh 15232 28 th October,
More informationOracle Role Manager. An Oracle White Paper Updated June 2009
Oracle Role Manager An Oracle White Paper Updated June 2009 Oracle Role Manager Introduction... 3 Key Benefits... 3 Features... 5 Enterprise Role Lifecycle Management... 5 Organization and Relationship
More informationAgile Development and Software Architecture: Understanding Scale and Risk
Agile Development and Software Architecture: Understanding Scale and Risk Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Robert L. Nord SSTC, April 2012 In collaboration
More informationA Systematic Method for Big Data Technology Selection
A Systematic Method for Big Data Technology Selection John Klein Software Solutions Conference 2015 November 16 18, 2015 Copyright 2015 Carnegie Mellon University This material is based upon work funded
More informationMoving Target Reference Implementation
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Moving Target Reference Implementation Software Engineering Institute, Carnegie Mellon University Andrew O. Mellinger December 17, 2014
More informationSOA for Healthcare: Promises and Pitfalls
SOA for Healthcare: Promises and Pitfalls Dennis B. Smith dbs@sei.cmu.edu SOA in Health Care Conference: Value in a Time of Change Chicago, IL USA June 3, 2009 Agenda Healthcare IT Challenges SOA: The
More informationArchitectural Implications of Cloud Computing
Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,
More informationFTA Technology 2009 IT Modernization and Business Rules Extraction
FTA Technology 2009 IT Modernization and Business Rules Extraction August 5th, 2009 _experience the commitment TM Agenda IT Modernization Business Rules Extraction Automation Tools for BRE BRE Cost and
More informationHow To Use Elasticsearch
Elasticsearch, Logstash, and Kibana (ELK) Dwight Beaver dsbeaver@cert.org Sean Hutchison shutchison@cert.org January 2015 2014 Carnegie Mellon University This material is based upon work funded and supported
More informationApplying Software Quality Models to Software Security
Applying Software Quality Models to Software Security Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Carol Woody, Ph.D. April 21, 2015 Copyright 2015 Carnegie Mellon University
More informationVoIP in Flow A Beginning
VoIP in Flow A Beginning Nathan Dell CERT/NetSA 2013 Carnegie Mellon University Legal Copyright 2013 Carnegie Mellon University This material is based upon work funded and supported by the Department of
More informationData Management Maturity (DMM) Model Update
Data Management Maturity (DMM) Model Update Rawdon Young November 2012 Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Contents / Agenda The DMM SEI Observations on Core
More informationSupply-Chain Risk Management Framework
Supply-Chain Risk Management Framework Carol Woody March 2010 Scope of SEI Work Context Significantly reduce the risk (any where in the supply chain) that an unauthorized party can change the behavior
More informationLegacy Modernization. ADM/Healthcare Concepts, Methodologies, Case Studies. Michael Oara CTO
Legacy Modernization ADM/Healthcare Concepts, Methodologies, Case Studies Michael Oara CTO RELATIVITY TECHNOLOGIES 2005 Legacy Modernization Any modification performed on a Legacy application that would
More informationRequest for Proposal for Application Development and Maintenance Services for XML Store platforms
Request for Proposal for Application Development and Maintenance s for ML Store platforms Annex 4: Application Development & Maintenance Requirements Description TABLE OF CONTENTS Page 1 1.0 s Overview...
More informationCapacity Plan. Template. Version X.x October 11, 2012
Template Version X.x October 11, 2012 This is an integral part of infrastructure and deployment planning. It supports the goal of optimum provisioning of resources and services by aligning them to business
More informationAutomated Provisioning of Cloud and Cloudlet Applications
Automated Provisioning of Cloud and Cloudlet Applications Secure and Assured Mobile Computing Components Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Jeff Boleng, PhD
More informationThe Definitive Guide. Cloud Computing. Dan Sullivan
The Definitive Guide tm To Cloud Computing Ch apter 10: Key Steps in Establishing Enterprise Cloud Computing Services... 185 Ali gning Business Drivers with Cloud Services... 187 Un derstanding Business
More informationCA Workload Automation Agents for Mainframe-Hosted Implementations
PRODUCT SHEET CA Workload Automation Agents CA Workload Automation Agents for Mainframe-Hosted Operating Systems, ERP, Database, Application Services and Web Services CA Workload Automation Agents are
More informationExploring the Interactions Between Network Data Analysis and Security Information/Event Management
Exploring the Interactions Between Network Data Analysis and Security Information/Event Management Timothy J. Shimeall CERT Network Situational Awareness (NetSA) Group January 2011 2011 Carnegie Mellon
More informationCopyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT-RMM), both developed at Carnegie
More informationDoD Software Migration Planning
DoD Software Migration Planning John Bergey Liam O Brien Dennis Smith August 2001 Product Line Practice Initiative Technical Note CMU/SEI-2001-TN-012 Unlimited distribution subject to the copyright. The
More information16 TB of Disk Savings and 3 Oracle Applications Modules Retired in 3 Days: EMC IT s Informatica Data Retirement Proof of Concept
16 TB of Disk Savings and 3 Oracle Applications Modules Retired in 3 Days: EMC IT s Informatica Data Retirement Proof of Concept Applied Technology Abstract This white paper illustrates the ability to
More informationOracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide. An Oracle White Paper October 2010
Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide An Oracle White Paper October 2010 Disclaimer The following is intended to outline our general product direction.
More informationHow To Understand And Understand The Risks Of Configuration Drift
How to: Eliminate Configuration Drift Risk Gil Hecht, CEO Continuity Software SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members
More informationCyber Intelligence Workforce
Cyber Intelligence Workforce Troy Townsend Melissa Kasan Ludwick September 17, 2013 Agenda Project Background Research Methodology Findings Training and Education Project Findings Workshop Results Objectives
More informationAn Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide
Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide An Oracle White Paper July 2011 1 Disclaimer The following is intended to outline our general product direction.
More informationTips and Best Practices for Managing a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies
More informationOracle Data Centre Rationalisation
Ian Gardner - Oracle Applications Architect 2012-06-13 Oracle Data Centre Rationalisation A Practical View Ian.Gardner@uk.ibm.com Tel. 07740 923060 2012 IBM Corporation Why perform Oracle Data Centre Rationalisations...
More informationEDI Modernization Case Studies and Best Practices
Simplify and Accelerate e-business Integration EDI Modernization Case Studies and Best Practices EDI Modernization Drivers External Locations, s, and Services Customers Suppliers / Service Providers Cloud/SaaS
More informationFUNCTIONAL PRODUCT OVERVIEW: BOND ENTERPRISE RELEASE AND DEPLOYMENT MANAGEMENT
FUNCTIONAL PRODUCT OVERVIEW: BOND ENTERPRISE RELEASE AND DEPLOYMENT MANAGEMENT BOND IS A READY-MADE SOLUTION FOR THE RELEASE MANAGEMENT AND DEPLOYMENT OF ENTERPRISE IT SYSTEMS. IT COMBINES PROCESS CONTROL
More informationApplying CMMI SM In Information Technology Organizations SEPG 2003
Applying CMMI SM In Information Technology Organizations Mark Servello, Vice President Jim Gibson, Senior Consultant ChangeBridge, Incorporated Page 1 Portions Copyright 2002 Carnegie Mellon University
More informationMigration and Upgrade Paths to SAP Process Orchestration. Udo Paltzer Product Owner SAP Process Integration, SAP HANA Cloud Integration
Migration and Upgrade Paths to SAP Process Orchestration Udo Paltzer Product Owner SAP Process Integration, SAP HANA Cloud Integration Disclaimer This presentation outlines our general product direction
More informationIntroduction. Architecture Re-engineering. Systems Consolidation. Data Acquisition. Data Integration. Database Technology
Introduction Data migration is necessary when an organization decides to use a new computing system or database management system that is incompatible with the current system. Architecture Re-engineering
More informationExtending AADL for Security Design Assurance of the Internet of Things
Extending AADL for Security Design Assurance of the Internet of Things Presented by Rick Kazman, PhD Team: Carol Woody (PI), Rick Kazman, Robert Ellison, John Hudak, Allen Householder Software Engineering
More informationDatacenter Management Optimization with Microsoft System Center
Datacenter Management Optimization with Microsoft System Center Disclaimer and Copyright Notice The information contained in this document represents the current view of Microsoft Corporation on the issues
More informationBuilding Your EDI Modernization Roadmap
Simplify and Accelerate e-business Integration Building Your EDI Modernization Roadmap Background EDI Modernization Drivers Lost revenue due to missing capabilities or poor scorecard ratings High error
More informationEnsuring Web Service Quality for Service-Oriented Architectures. An Oracle White Paper June 2008
Ensuring Web Service Quality for Service-Oriented Architectures An Oracle White Paper June 2008 Ensuring Web Service Quality for Service-Oriented Architectures WEB SERVICES OFFER NEW OPPORTUNITIES AND
More informationRepository-Centric Enterprise Architecture
Repository-Centric Enterprise Architecture Copyright 2005, Enterprise Elements, Inc. Abstract - Enterprise Architecture modeling tools are used to capture complex knowledge about organizations and technology.
More informationSoftware Architecture for Big Data Systems. Ian Gorton Senior Member of the Technical Staff - Architecture Practices
Software Architecture for Big Data Systems Ian Gorton Senior Member of the Technical Staff - Architecture Practices Ian Gorton is investigating issues related to software architecture at scale. This includes
More informationHow Technology Supports Project, Program and Portfolio Management
WHITE PAPER: HOW TECHNOLOGY SUPPORTS PROJECT, PROGRAM AND PORTFOLIO MANAGEMENT SERIES 4 OF 4 How Technology Supports Project, Program and Portfolio Management SEPTEMBER 2007 Enrico Boverino CA CLARITY
More informationGetting Started with Service- Oriented Architecture (SOA) Terminology
Getting Started with - Oriented Architecture (SOA) Terminology Grace Lewis September 2010 -Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing systems it is neither a
More informationExtend the value of your core business systems.
Legacy systems renovation to SOA September 2006 Extend the value of your core business systems. Transforming legacy applications into an SOA framework Page 2 Contents 2 Unshackling your core business systems
More informationEAI vs. ETL: Drawing Boundaries for Data Integration
A P P L I C A T I O N S A W h i t e P a p e r S e r i e s EAI and ETL technology have strengths and weaknesses alike. There are clear boundaries around the types of application integration projects most
More informationReduce your data storage footprint and tame the information explosion
IBM Software White paper December 2010 Reduce your data storage footprint and tame the information explosion 2 Reduce your data storage footprint and tame the information explosion Contents 2 Executive
More informationBusiness Rule Management. Effective IT Modernization
Business Rule Management Effective IT Modernization Business Rule Management Lynne Harbin, Associate Director Health Eligibility Center, Veterans Health Administration I. Philip Matkovsky, Principal Macro
More informationBuyer Beware: How To Be a Better Consumer of Security Maturity Models
Buyer Beware: How To Be a Better Consumer of Security Maturity Models SESSION ID: GRC-R01 Julia Allen Software Engineering Institute Carnegie Mellon University jha@sei.cmu.edu Nader Mehravari Software
More information2012 CyberSecurity Watch Survey
2012 CyberSecurity Watch Survey Unknown How 24 % Bad is the Insider Threat? 51% 2007-2013 Carnegie Mellon University 2012 Carnegie Mellon University NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY
More informationMigrating to the Cloud. Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services
Migrating to the Cloud Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services Organisations are looking for new ways to deliver IT services and demanding that ICT
More informationRealizing the Benefits of Data Modernization
February 2015 Perspective Realizing the Benefits of How to overcome legacy data challenges with innovative technologies and a seamless data modernization roadmap. Companies born into the digital world
More informationCisco and VMware Virtualization Planning and Design Service
Cisco and VMware Virtualization Planning and Design Service Create an End-to-End Virtualization Strategy with Combined Services from Cisco and VMware Service Overview A Collaborative Approach to Virtualization
More informationBuilding Resilient Systems: The Secure Software Development Lifecycle
Building Resilient Systems: The Secure Software Development Lifecycle Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213, PhD Technical Director, CERT mssherman@sei.cmu.edu
More informationIBM Rational Asset Manager
Providing business intelligence for your software assets IBM Rational Asset Manager Highlights A collaborative software development asset management solution, IBM Enabling effective asset management Rational
More informationModernized and Maintainable Code. Frank Weil, Ph.D. UniqueSoft, LLC
Modernized and Maintainable Code Frank Weil, Ph.D. UniqueSoft, LLC UniqueSoft is a provider of next-generation software development tools and services specializing in modernizing legacy software using
More informationAPPLICATION MANAGEMENT SUITE FOR ORACLE E-BUSINESS SUITE APPLICATIONS
APPLICATION MANAGEMENT SUITE FOR ORACLE E-BUSINESS SUITE APPLICATIONS Oracle Application Management Suite for Oracle E-Business Suite delivers capabilities that helps to achieve high levels of application
More informationDatacenter Management and Virtualization. Microsoft Corporation
Datacenter Management and Virtualization Microsoft Corporation June 2010 The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the
More informationAn Oracle White Paper February 2014. Oracle Data Integrator 12c Architecture Overview
An Oracle White Paper February 2014 Oracle Data Integrator 12c Introduction Oracle Data Integrator (ODI) 12c is built on several components all working together around a centralized metadata repository.
More informationSQL Server Master Data Services A Point of View
SQL Server Master Data Services A Point of View SUBRAHMANYA V SENIOR CONSULTANT SUBRAHMANYA.VENKATAGIRI@WIPRO.COM Abstract Is Microsoft s Master Data Services an answer for low cost MDM solution? Will
More informationcan you effectively plan for the migration and management of systems and applications on Vblock Platforms?
SOLUTION BRIEF CA Capacity Management and Reporting Suite for Vblock Platforms can you effectively plan for the migration and management of systems and applications on Vblock Platforms? agility made possible
More informationORACLE FINANCIAL SERVICES ANALYTICAL APPLICATIONS INFRASTRUCTURE
ORACLE FINANCIAL SERVICES ANALYTICAL APPLICATIONS INFRASTRUCTURE KEY FEATURES Rich and comprehensive business metadata allows business users to interact with financial services data model to configure
More informationWindows Server 2008 R2 Hyper-V Live Migration
Windows Server 2008 R2 Hyper-V Live Migration White Paper Published: August 09 This is a preliminary document and may be changed substantially prior to final commercial release of the software described
More informationManaging Variation in Services in a Software Product Line Context
Managing Variation in Services in a Software Product Line Context Sholom Cohen Robert Krut May 2010 TECHNICAL NOTE CMU/SEI-2010-TN-007 Research, Technology, and System Solutions (RTSS) Program Unlimited
More informationSolution Overview VMWARE PROTECTION WITH EMC NETWORKER 8.2. White Paper
White Paper VMWARE PROTECTION WITH EMC NETWORKER 8.2 Solution Overview Abstract This white paper describes the integration of EMC NetWorker with VMware vcenter. It also includes details on the NetWorker
More informationContents. Introduction... 1
Managed SQL Server 2005 Deployments with CA ERwin Data Modeler and Microsoft Visual Studio Team Edition for Database Professionals Helping to Develop, Model, and Maintain Complex Database Architectures
More informationCreating Applications in Bluemix using the Microservices Approach IBM Redbooks Solution Guide
Creating Applications in Bluemix using the Microservices Approach IBM Redbooks Solution Guide Across 2014 and into 2015, microservices became the new buzzword for application development style. So what
More informationCustom Software Development Approach
Custom Software Development Approach Our approach to custom software development combines benefits from several standard development process models. We tend to have a well-defined, predictable and highly
More informationCA Scheduler Job Management r11
PRODUCT SHEET CA Scheduler Job Management CA Scheduler Job Management r11 CA Scheduler Job Management r11 (CA Scheduler JM), part of the Job Management solution from CA Technologies, is a premier z/oscentric
More informationActive Archive - Data Protection for the Modern Data Center. Molly Rector, Spectra Logic Dr. Rainer Pollak, DataGlobal
Active Archive - Data Protection for the Modern Data Center Molly Rector, Spectra Logic Dr. Rainer Pollak, DataGlobal SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA.
More informationVMware Site Recovery Manager with EMC RecoverPoint
VMware Site Recovery Manager with EMC RecoverPoint Implementation Guide EMC Global Solutions Centers EMC Corporation Corporate Headquarters Hopkinton MA 01748-9103 1.508.435.1000 www.emc.com Copyright
More informationMove beyond monitoring to holistic management of application performance
Move beyond monitoring to holistic management of application performance IBM SmartCloud Application Performance Management: Actionable insights to minimize issues Highlights Manage critical applications
More informationCA Workload Automation Agents Operating System, ERP, Database, Application Services and Web Services
PRODUCT SHEET CA Workload Automation Agents CA Workload Automation Agents Operating System, ERP, Database, Application Services and Web Services CA Workload Automation Agents extend the automation capabilities
More informationDepartment of Homeland Security Cyber Resilience Review (Case Study) Matthew Butkovic Technical Manager - Cybersecurity Assurance, CERT Division
Department of Homeland Security Cyber Resilience Review (Case Study) Matthew Butkovic Technical Manager - Cybersecurity Assurance, CERT Division Matthew Butkovic is a Technical Manager Cybersecurity Assurance
More informationSimplify and Automate IT
Simplify and Automate IT Expectations have never been higher Reduce IT Costs 30% increase in staff efficiency Reduce support costs by 25% Improve Quality of Service Reduce downtime by 75% 70% faster MTTR
More informationIntroduction to Service-Oriented Architecture for Business Analysts
Introduction to Service-Oriented Architecture for Business Analysts This course will provide each participant with a high-level comprehensive overview of the Service- Oriented Architecture (SOA), emphasizing
More informationSMART Solutions for Active Directory Migrations
SMART Solutions for Active Directory Migrations Challenges of Active Directory Migrations Types of Active Directory Migrations Intra- Forest Migration between Domains in the Same Forest Separate a Forest
More informationAn Oracle White Paper in Enterprise Architecture August 2009. Architectural Strategies for Cloud Computing
An Oracle White Paper in Enterprise Architecture August 2009 Architectural Strategies for Cloud Computing Disclaimer The following is intended to outline our general product direction. It is intended for
More informationITM204 Post-Copy Automation for SAP NetWeaver Business Warehouse System Landscapes. October 2013
ITM204 Post-Copy Automation for SAP NetWeaver Business Warehouse System Landscapes October 2013 Disclaimer This presentation outlines our general product direction and should not be relied on in making
More informationOpen Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY IN A HYBRID CLOUD ENVIRONMENT REV. 1.1
sm Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY IN A HYBRID CLOUD ENVIRONMENT REV. 1.1 Open Data Center Alliance Usage: Virtual Machine (VM) Interoperability in a Hybrid Cloud
More informationIBM InfoSphere Information Server Ready to Launch for SAP Applications
IBM Information Server Ready to Launch for SAP Applications Drive greater business value and help reduce risk for SAP consolidations Highlights Provides a complete solution that couples data migration
More informationFive best practices for deploying a successful service-oriented architecture
IBM Global Services April 2008 Five best practices for deploying a successful service-oriented architecture Leveraging lessons learned from the IBM Academy of Technology Executive Summary Today s innovative
More informationCloud Computing for Architects
Cloud Computing for Architects This four day, hands-on boot camp begins with an examination of the Cloud Computing concept, the structure and key characteristics of Clouds, and takes a look under the hood
More informationWhitepaper. Legacy System Consolidation Strategy for the Insurance Sector. Published on: October 2011 Sanjay Rao
Legacy System Consolidation Strategy for the Insurance Sector Published on: October 2011 Sanjay Rao Hexaware Technologies. All rights reserved. Table of Contents 1 Introduction 2 Evolution of disparate
More informationW H I T E P A P E R E n a b l i n g D a t a c e n t e r A u t o mation with Virtualized Infrastructure
W H I T E P A P E R E n a b l i n g D a t a c e n t e r A u t o mation with Virtualized Infrastructure Sponsored by: VMware Tim Grieser August 2008 IDC OPINION Global Headquarters: 5 Speen Street Framingham,
More informationImplement a unified approach to service quality management.
Service quality management solutions To support your business objectives Implement a unified approach to service quality management. Highlights Deliver high-quality software applications that meet functional
More informationwww.novell.com/documentation Installation Guide Identity Manager 3.6.1 August 31, 2012
www.novell.com/documentation Installation Guide Identity Manager 3.6.1 August 31, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
More informationSharePoint 2013 Migration Readiness
SharePoint 2013 Migration Readiness Decision Points around Migrating to SharePoint 2013 MARK ECKERT Contents Purpose... 1 SharePoint 2013 Implementation Options... 1 On-premise installation... 1 Cloud...
More informationIBM InfoSphere Optim Test Data Management
IBM InfoSphere Optim Test Data Management Highlights Create referentially intact, right-sized test databases or data warehouses Automate test result comparisons to identify hidden errors and correct defects
More informationOMG SOA Workshop - Burlingame Oct 16-19, 2006 Integrating BPM and SOA Using MDA A Case Study
OMG SOA Workshop - Burlingame Oct 16-19, 2006 Integrating BPM and SOA Using MDA A Case Study Michael Guttman CTO, The Voyant Group mguttman@thevoyantgroup.com Overview of Voyant H.Q. West Chester, PA Business
More informationCertified Information Professional 2016 Update Outline
Certified Information Professional 2016 Update Outline Introduction The 2016 revision to the Certified Information Professional certification helps IT and information professionals demonstrate their ability
More informationCLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service
CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service Open Data Center Alliance, Inc. 3855 SW 153 rd Dr. Beaverton, OR 97003 USA Phone +1 503-619-2368 Fax: +1 503-644-6708 Email:
More informationDynamic Service Desk. Unified IT Management. Solution Overview
I T S E R V I C E + I T A S S E T M A N A G E M E N T INFRASTRUCTURE MANAGEMENT Dynamic Service Desk Unified IT Management Achieving business and IT alignment requires having insight into hardware and
More informationHow To Ensure Security In A System
Software Assurance vs. Security Compliance: Why is Compliance Not Enough? Carol Woody, Ph.D. Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 2012 Carnegie Mellon University
More informationCreating a Catalog for ILM Services. Bob Mister Rogers, Application Matrix Paul Field, Independent Consultant Terry Yoshii, Intel
Creating a Catalog for ILM Services Bob Mister Rogers, Application Matrix Paul Field, Independent Consultant Terry Yoshii, Intel SNIA Legal Notice The material contained in this tutorial is copyrighted
More information