Migrating a Large Scale Legacy IT System to a System with Current Technology

Size: px
Start display at page:

Download "Migrating a Large Scale Legacy IT System to a System with Current Technology"

Transcription

1 Migrating a Large Scale Legacy IT System to a System with Current Technology Bill Wood, Mike Gagliardi, Phil Bianco 4/18/2014 Migration Planning 1

2 Copyright 2014 Carnegie Mellon University and IEEE This material is based upon work funded and supported by the Department of Defense under Contract No. FA C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN AS-IS BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. This material has been approved for public release and unlimited distribution. This material may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at permission@sei.cmu.edu. DM /18/2014 Migration Planning 2

3 Background Agency wanted to Migrate two paired and tightly coupled systems Both are 24/7/365 and have disaster recovery at multiple sites Both have many classes of users 1. Service Based System - 15% functionality (going to 40%) Java, Relational DB, COTS tools, Service-based, J2EE, SAP, Informatica 2. Legacy System - 85% of functionality (going to 60%) COBOL, Hierarchical DB, mainframe Migrate to a well defined target reference architecture (TRA) as a basis for a common platform infrastructure (CPI) developmental, operational, test Briefing is focused on the Legacy Migration 4/18/2014 Migration Planning 3

4 Its Complicated Understanding the Legacy System Architecture Infrastructure Tools Application Component Relationships (Data and Code) Business Process Threads Understanding the Target System Target Reference Architecture (TRA) SOA; Layered Infrastructure Designing Services on top of TRA Business Process threads Mapping between Legacy and Target in Phases Architecture mismatches (development, operational, certification, sustainment, COTS) Operating with dual authoritative data systems, cutover, synchronization Relationships between Application Components (Legacy versus TRA, COTS) 4/18/2014 Migration Planning 4

5 Is there too much code/ data coupling and spaghetti code to partition for migration? Are the current business processes and screens appropriate? Is the CPI (and TRA ) stable? Are COBOL to Java transformation tools up to the job? Can we operate with 2 systems overlapping authoritative data? Do we have sufficient technology expertize in: legacy system, target reference architecture, discovery and analysis tools, transformation tools? Is the business logic only understandable in the legacy code? How can we overcome the lack of architectural documentation? Will the entire testing and certification process change? Will I be creating a maintenance nightmare? It s a 24/7/365 operation- no downtime! It s Worrisome 4/18/2014 Migration Planning 5

6 Keep the Right Vision The TRA is a good start, but an application architecture with data modeling is needed Synchronize with phased TRA and CPI infrastructure deployment Operating with multiple sources of authoritative data Using new technology (e.g. customized security to infrastructure security) Capability of transformative toolsets 4/18/2014 Migration Planning 6

7 Don t Live in a Dreamworld Big-Bang changes usually fail Conducting transactions across networks and keeping response times satisfied! Transforming spaghetti code automatically Separating presentation from business processing from data access! Moving from green screens to windows Making multiple types of changes simultaneously! Edict no changes to the legacy system! Paul Delvaux 4/18/2014 Migration Planning 7

8 Target Reference Architecture This is a good start But it is not enough Application Presentation Layer Business Layer Data Access Layer Data Layer Need a system and application software architecture End-state Each Release Data Infrastructure Metadata Data Warehousing Transactional Data Failover Load Balancing Integration Layer Linux Software Commodity Hardware Security 4/18/2014 Migration Planning 8

9 Migration Approaches An RFI was conducted and multiple approaches suggested Lift and Shift (L&S) Reduce Operations and Maintenance (O&M) Costs ASAP Fast retirement of legacy infrastructure Move to the CPI Don t come close to satisfying the TRA Make minimal changes- keep COBOL, Hierarchy etc. etc. Modernize Phased transformation to TRA Keep legacy architecture Change technology- Java, SOA Use Conversion tools? Re-engineer Re-Develop the system in Java on CPI Developed system and application architecture Satisfy TRA Options Considered 1. Do nothing (baseline) 2. L&S (baseline) 3. L&S and modernize 4. L&S and re-engineer 5. Re-engineer 6. Hybrid- L&S, modernize, re-engineer 4/18/2014 Migration Planning 9

10 Migration Process Determine and Score Options Explore implementation alternatives for options Build an End State Architecture Build a Roadmap List the Options Develop evaluation criteria Score the options Its not reasonable to explore Make every a selection possible option (combination Goals for of sequencing approaches), and then to explore every Constraints possible implementation Phasing List the Alternatives alternative Leads Approach to Conduct analysis to Migration Discovery paralysisand Analysis of Legacy Have Build to Data, a make high code, level some Understand user, Target recommendations business Architecture TRA and processes CPI ordering incrementally Map legacy Quality elements Review and attribute choose Migration to considerations TA alternative elements Toolsets approaches Code, Migration Develop data, tooling test, Issues configuration for Resolution Define Keep phases vs Throwaway Develop Design Factors Perform Groups an Architectural Evaluation (and fix) Legacy: functionality, code, data BP, users Tiers/layers Transient code in Legacy and TA Throwaway Align with Infrastructure Roadmap 4/18/2014 Migration Planning 10

11 Determine and Score Options Understand Migration Determine and Score Goals Options Explore implementation alternatives for options Build an End State Architecture Build a Roadmap Create and Evaluate Options Recommend an Option Reduce operation and maintenance (O&M) costs Platform Legacy Licensing, Relationships obsolescence, electric, space, people Vendor locklanguage Architecture Documentation Database Create technical uniformity across organizational boundaries Subject Matter User Interface Experts (UI) Options Take advantage of new technology System usage Transactions 6 mentioned previously measurements by element Performance, Business Process Interfaces, users Initial crude Scoping evaluation Architecture parameters against TRA Doc Detailed Static evaluation relationships Standards against using tools Cost, Code, risk, performance data, Quality Attributes configurations, factors (23) interfaces Choose an Option Important Operational Developmental Quality Attributes (QA) Best Overall Measure Operational - cost, risk, performance Recovery- failures, Sustainment disasters Determine Security ordering: Infrastructuresequential, concurrently Important Developmental and Sustainment QAs Do Nothing Lift &Shift (L&S) Element L&S and Modernize Goal- Examples Re-Engineer L&S and Re-Engineer Business Process Threads Users, code, data, interfaces 4/18/2014 Migration Planning 11 L&S and Hybrid Performance Cost Risk

12 Evaluation Factors Cost Performance Risk W Factor How much will be the migration labor cost? How much recovery of investment cost after cancellation How early will cost savings happen- license and support during migration? How much will be the on-going legacy license and/or support costs post migration? How is data organized wrt TA : relational, normalized, distributed, partitioned How readily can new functionality be put into production during the migration process- e.g. adaptive maintenance, changing user workflows How well does the end-state system satisfy the TRA architectural structures (application layers, understanding, tiers, SOA) for Partitioning of software and data for L&S causes cumbersome migration Are there tool factors that make the schedule unpredictable: learning curve, tool underperforms requiring extended manual intervention What is the risk of technical obsolescence of the end state? Extent of external interfaces (OGA, There was developmental a separate and sustainment ROM cost attributes team (extensibility, maintainability, reuse across We started Developed with the team s a ROM architectural for each option applications, standards) knowledge Commercial) 40 or so We factors provided How well does them system with meet data the as a basis for estimation How solid is the architectural operational attributes: satisfy end-user foundation, supported by We discovered Their the ROM response OMB sizing under factors maximum was -19 about workload, factors the same as our cost factor sizing scalability, manageability, load balancing, Merged them reliability, into the availability) initial factors- 50 or so How is data organized wrt TRA : relational, We started to weight the factors normalized, distributed, partitioned Too many factors How many had internal an equivalent interfaces changes distribution will be of weights needed 5.00 procurements We combined factors with like distributions- 23 factors How much will be the level of effort for testing to 0.00 make it production ready How well are the TRA security conditions satisfied: easily changed, no unauthorized access, no data corruption What will be the impact for data synchronization, parallel run and cutover? How modernized are the user screens wrt the TRA documentation, at the end state? How much will be the Impact on Users Interface functionality? How well can the two migrations be coordinated? Risk of creating a monopoly for future How complex will the program management effort be? How much business functionality will be negatively affected? Budget/ Cost/Schedule profile goes out of alignment 4/18/2014 Migration Planning 12

13 Selected Hybrid Option- Example Legacy Phase 1 Phase 2 Phase 3 Legacy L&S Re-engineered Modernize Two Systems with Shared Authoritative Data Modernize Lift and Shift Re-engineer How to partition: L&S and modernize; and Re-engineer Significant Business Process Changes re-engineer Layered stable legacy code- L&S and modernize Experiment with modernization tools 4/18/2014 Migration Planning 13

14 Explore Implementation Alternatives- Alternatives Determine and # Description Score Options 1Finds Move the relationships the Data then between move the Code The subsystems and their programs Assumptions alternatives for options 2 Move The the Data Code Stores then and move their the files Data The hybrid 3 Analysis Move by showed groupings the business of Code processes, and Data and screens, Build Discovery an End State and The subsystems and the data stores Users and software and End-to-End data elements Business to be Lifted Threads and Shifted. Architecture Analysis End-to-end business threads/user classes/subsystems/data stores It is preferred that Identify the L&S Dead be done code in and stages dead data Build a Roadmap 4 Clean up legacy in situ first (or not) Legacy API s usage # Legacy transactions Issues usage for Resolution Issues for # 1 Functionality/Data Batch usage may be too entangled to group effectively Factors Resolution What commercial Such that authorized toolsets data are split best can to take do this? place 1 2 What Cutover toolset is best for converting data structure, 2 copying Rollback data, modifying APIs & JCL, writing adaptors? Design 3 Replacing Synchronize transactional support Factors 4 Should Data Copy we do some cleanup before L&S Explore implementation Lift and Shift 5 Performance 4/18/2014 Migration Planning 14

15 Build an End State Architecture Determine and Score Options Develop a Basis Explore alternatives for options Build an End State Architecture Build a Target Build a Roadmap Architecture Evaluate Target Architecture TRA and CPI constraints on End State Architecture Legacy System Architecture Findings Identify Relationships the Target Application between Legacy Elements and Target COTS Services, products data models References Identify totechnical Legacy elements challenges and risks Interfaces to external actors TRA elements used Build an Application Target Architecture Connections between Application elements Business process Conduct flows an through Architecture the elements Evaluation User screen contents Identify (appropriately risks and risk mirror themes legacy) Map to TRA elements used Update the architecture to mitigate the risks Keep a risk register 4/18/2014 Migration Planning 15

16 Build an Architectural Roadmap Develop a Basis Determine and Score Options Explore alternatives for options Define a Pilot Build an End State Architecture Build a Roadmap Define Next Phase Evaluate Consistency Phase selection can be done in a number of ways Select Goals a Business Pilot Migration processes, for users, First services, Phase authorized data Lightweight, Define Low hanging the tools low fruit, risk, being budgeting, few used challenges for scheduling, migration early success Data, code, screens Gain Reduce target legacy and transformation sustainment costs tool experience Define the TA contents of the phase Externally Include data induced extraction, schedules analysis, and reporting Business processes, screens Perhaps aligning Tables, no phased data cutover capabilities with external milestones sources, services and end-points, screens Organizational Happy User path impacts functionality boundaries Architectural Infrastructure Workarounds But views include for some and every Technical quality major Debt release, attribute that drivers correlate to the End State Aligned Define data Architecture model, with the TRA applications, Issues and infrastructure the not Legacy UI Addressed development Architecture. schedule Shows Identify certification Infrastructure, COTS tools, platforms, networks Tasks involving how target the legacy architectural testing- per release? Constraints transformation elements elements of are legacy replaced needed artifacts at each to TA stage Shows Define the on Legacy Phasing system (Releases) artifacts being migrated Tools used what Business in end-state Process the transformation elements Threads, are Screens introduced each stage Define User Migration Subsystems, impact, security, Scenarios tables, site datarollout, authoritative data Describes Services, the correlation data models, between COTS the tools legacy and the end-state Developmental, Define Platform the and quality networks operational, attribute and COTS sustainment considerations products Describes Identify how legacy the architectural users interact items being migrated Evaluate Target Screens, Cross System the roadmap coupling Infrastructure Reports against between the systems scenarios in-place, Data transfer, build epics cutover, during synchronization, migration Capture Subsystems risks, gaps, (partial), sensitivities, tables (partial), tradeoffsdata sources Approach Recovery to migration from failure- routine and disastrous Update the roadmap Confirm Data first, that code all first, events code/data synchronize grouping, BP first Identify Establish technical Risk repository challenges and risks Tools to assist migration 4/18/2014 Migration Planning 16

17 Summary Technical Criteria for selecting between options OMB guidelines were good Plan, but don t overdo it Architect Understand Legacy Include quality attributes High Level End State Roadmap Detailed architecture at each phase Management Changing political environment Drift and Re-direction can become a way of life After The Party 4/18/2014 Migration Planning 17

Experiences in Migrations of Legacy Systems

Experiences in Migrations of Legacy Systems Experiences in Migrations of Legacy Systems Bill Wood, Mike Gagliardi, and Phil Bianco Software Solutions Conference 2015 November 16 18, 2015 Copyright 2015 Carnegie Mellon University This material is

More information

Resolving Chaos Arising from Agile Software Development

Resolving Chaos Arising from Agile Software Development Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 523 Author Date High Level Alternatives Approach. Blame the Agile development process, fire the folks who are controlling it and

More information

Merging Network Configuration and Network Traffic Data in ISP-Level Analyses

Merging Network Configuration and Network Traffic Data in ISP-Level Analyses Merging Network Configuration and Network Traffic Data in ISP-Level Analyses Timothy J. Shimeall, Ph.D. Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Presentation Title

More information

Evaluating the Quality of Software Engineering Performance Data

Evaluating the Quality of Software Engineering Performance Data Evaluating the Quality of Software Engineering Performance Data James Over Software Engineering Institute Carnegie Mellon University July 2014 Copyright 2014 Carnegie Mellon University This material is

More information

emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge

emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge Soumya Simanta Gene Cahill Ed Morris Motivation Situational Awareness First responders and others operating in

More information

Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division

Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division James Stevens is a senior member of the technical staff

More information

Contracting Officer s Representative (COR) Interactive SharePoint Wiki

Contracting Officer s Representative (COR) Interactive SharePoint Wiki Contracting Officer s Representative (COR) Interactive SharePoint Wiki James Smith Andy Boyd Software Solutions Conference 2015 November 16 18, 2015 Copyright 2015 Carnegie Mellon University This material

More information

Assurance in Service-Oriented Environments

Assurance in Service-Oriented Environments Assurance in Service-Oriented Environments Soumya Simanta Research, Technology, and System Solutions (RTSS) Program Software Engineering Institute Carnegie Mellon University Pittsburgh 15232 28 th October,

More information

Oracle Role Manager. An Oracle White Paper Updated June 2009

Oracle Role Manager. An Oracle White Paper Updated June 2009 Oracle Role Manager An Oracle White Paper Updated June 2009 Oracle Role Manager Introduction... 3 Key Benefits... 3 Features... 5 Enterprise Role Lifecycle Management... 5 Organization and Relationship

More information

Agile Development and Software Architecture: Understanding Scale and Risk

Agile Development and Software Architecture: Understanding Scale and Risk Agile Development and Software Architecture: Understanding Scale and Risk Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Robert L. Nord SSTC, April 2012 In collaboration

More information

A Systematic Method for Big Data Technology Selection

A Systematic Method for Big Data Technology Selection A Systematic Method for Big Data Technology Selection John Klein Software Solutions Conference 2015 November 16 18, 2015 Copyright 2015 Carnegie Mellon University This material is based upon work funded

More information

Moving Target Reference Implementation

Moving Target Reference Implementation CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Moving Target Reference Implementation Software Engineering Institute, Carnegie Mellon University Andrew O. Mellinger December 17, 2014

More information

SOA for Healthcare: Promises and Pitfalls

SOA for Healthcare: Promises and Pitfalls SOA for Healthcare: Promises and Pitfalls Dennis B. Smith dbs@sei.cmu.edu SOA in Health Care Conference: Value in a Time of Change Chicago, IL USA June 3, 2009 Agenda Healthcare IT Challenges SOA: The

More information

Architectural Implications of Cloud Computing

Architectural Implications of Cloud Computing Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,

More information

FTA Technology 2009 IT Modernization and Business Rules Extraction

FTA Technology 2009 IT Modernization and Business Rules Extraction FTA Technology 2009 IT Modernization and Business Rules Extraction August 5th, 2009 _experience the commitment TM Agenda IT Modernization Business Rules Extraction Automation Tools for BRE BRE Cost and

More information

How To Use Elasticsearch

How To Use Elasticsearch Elasticsearch, Logstash, and Kibana (ELK) Dwight Beaver dsbeaver@cert.org Sean Hutchison shutchison@cert.org January 2015 2014 Carnegie Mellon University This material is based upon work funded and supported

More information

Applying Software Quality Models to Software Security

Applying Software Quality Models to Software Security Applying Software Quality Models to Software Security Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Carol Woody, Ph.D. April 21, 2015 Copyright 2015 Carnegie Mellon University

More information

VoIP in Flow A Beginning

VoIP in Flow A Beginning VoIP in Flow A Beginning Nathan Dell CERT/NetSA 2013 Carnegie Mellon University Legal Copyright 2013 Carnegie Mellon University This material is based upon work funded and supported by the Department of

More information

Data Management Maturity (DMM) Model Update

Data Management Maturity (DMM) Model Update Data Management Maturity (DMM) Model Update Rawdon Young November 2012 Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Contents / Agenda The DMM SEI Observations on Core

More information

Supply-Chain Risk Management Framework

Supply-Chain Risk Management Framework Supply-Chain Risk Management Framework Carol Woody March 2010 Scope of SEI Work Context Significantly reduce the risk (any where in the supply chain) that an unauthorized party can change the behavior

More information

Legacy Modernization. ADM/Healthcare Concepts, Methodologies, Case Studies. Michael Oara CTO

Legacy Modernization. ADM/Healthcare Concepts, Methodologies, Case Studies. Michael Oara CTO Legacy Modernization ADM/Healthcare Concepts, Methodologies, Case Studies Michael Oara CTO RELATIVITY TECHNOLOGIES 2005 Legacy Modernization Any modification performed on a Legacy application that would

More information

Request for Proposal for Application Development and Maintenance Services for XML Store platforms

Request for Proposal for Application Development and Maintenance Services for XML Store platforms Request for Proposal for Application Development and Maintenance s for ML Store platforms Annex 4: Application Development & Maintenance Requirements Description TABLE OF CONTENTS Page 1 1.0 s Overview...

More information

Capacity Plan. Template. Version X.x October 11, 2012

Capacity Plan. Template. Version X.x October 11, 2012 Template Version X.x October 11, 2012 This is an integral part of infrastructure and deployment planning. It supports the goal of optimum provisioning of resources and services by aligning them to business

More information

Automated Provisioning of Cloud and Cloudlet Applications

Automated Provisioning of Cloud and Cloudlet Applications Automated Provisioning of Cloud and Cloudlet Applications Secure and Assured Mobile Computing Components Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Jeff Boleng, PhD

More information

The Definitive Guide. Cloud Computing. Dan Sullivan

The Definitive Guide. Cloud Computing. Dan Sullivan The Definitive Guide tm To Cloud Computing Ch apter 10: Key Steps in Establishing Enterprise Cloud Computing Services... 185 Ali gning Business Drivers with Cloud Services... 187 Un derstanding Business

More information

CA Workload Automation Agents for Mainframe-Hosted Implementations

CA Workload Automation Agents for Mainframe-Hosted Implementations PRODUCT SHEET CA Workload Automation Agents CA Workload Automation Agents for Mainframe-Hosted Operating Systems, ERP, Database, Application Services and Web Services CA Workload Automation Agents are

More information

Exploring the Interactions Between Network Data Analysis and Security Information/Event Management

Exploring the Interactions Between Network Data Analysis and Security Information/Event Management Exploring the Interactions Between Network Data Analysis and Security Information/Event Management Timothy J. Shimeall CERT Network Situational Awareness (NetSA) Group January 2011 2011 Carnegie Mellon

More information

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT-RMM), both developed at Carnegie

More information

DoD Software Migration Planning

DoD Software Migration Planning DoD Software Migration Planning John Bergey Liam O Brien Dennis Smith August 2001 Product Line Practice Initiative Technical Note CMU/SEI-2001-TN-012 Unlimited distribution subject to the copyright. The

More information

16 TB of Disk Savings and 3 Oracle Applications Modules Retired in 3 Days: EMC IT s Informatica Data Retirement Proof of Concept

16 TB of Disk Savings and 3 Oracle Applications Modules Retired in 3 Days: EMC IT s Informatica Data Retirement Proof of Concept 16 TB of Disk Savings and 3 Oracle Applications Modules Retired in 3 Days: EMC IT s Informatica Data Retirement Proof of Concept Applied Technology Abstract This white paper illustrates the ability to

More information

Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide. An Oracle White Paper October 2010

Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide. An Oracle White Paper October 2010 Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide An Oracle White Paper October 2010 Disclaimer The following is intended to outline our general product direction.

More information

How To Understand And Understand The Risks Of Configuration Drift

How To Understand And Understand The Risks Of Configuration Drift How to: Eliminate Configuration Drift Risk Gil Hecht, CEO Continuity Software SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members

More information

Cyber Intelligence Workforce

Cyber Intelligence Workforce Cyber Intelligence Workforce Troy Townsend Melissa Kasan Ludwick September 17, 2013 Agenda Project Background Research Methodology Findings Training and Education Project Findings Workshop Results Objectives

More information

An Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide

An Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide An Oracle White Paper July 2011 1 Disclaimer The following is intended to outline our general product direction.

More information

Tips and Best Practices for Managing a Private Cloud

Tips and Best Practices for Managing a Private Cloud Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies

More information

Oracle Data Centre Rationalisation

Oracle Data Centre Rationalisation Ian Gardner - Oracle Applications Architect 2012-06-13 Oracle Data Centre Rationalisation A Practical View Ian.Gardner@uk.ibm.com Tel. 07740 923060 2012 IBM Corporation Why perform Oracle Data Centre Rationalisations...

More information

EDI Modernization Case Studies and Best Practices

EDI Modernization Case Studies and Best Practices Simplify and Accelerate e-business Integration EDI Modernization Case Studies and Best Practices EDI Modernization Drivers External Locations, s, and Services Customers Suppliers / Service Providers Cloud/SaaS

More information

FUNCTIONAL PRODUCT OVERVIEW: BOND ENTERPRISE RELEASE AND DEPLOYMENT MANAGEMENT

FUNCTIONAL PRODUCT OVERVIEW: BOND ENTERPRISE RELEASE AND DEPLOYMENT MANAGEMENT FUNCTIONAL PRODUCT OVERVIEW: BOND ENTERPRISE RELEASE AND DEPLOYMENT MANAGEMENT BOND IS A READY-MADE SOLUTION FOR THE RELEASE MANAGEMENT AND DEPLOYMENT OF ENTERPRISE IT SYSTEMS. IT COMBINES PROCESS CONTROL

More information

Applying CMMI SM In Information Technology Organizations SEPG 2003

Applying CMMI SM In Information Technology Organizations SEPG 2003 Applying CMMI SM In Information Technology Organizations Mark Servello, Vice President Jim Gibson, Senior Consultant ChangeBridge, Incorporated Page 1 Portions Copyright 2002 Carnegie Mellon University

More information

Migration and Upgrade Paths to SAP Process Orchestration. Udo Paltzer Product Owner SAP Process Integration, SAP HANA Cloud Integration

Migration and Upgrade Paths to SAP Process Orchestration. Udo Paltzer Product Owner SAP Process Integration, SAP HANA Cloud Integration Migration and Upgrade Paths to SAP Process Orchestration Udo Paltzer Product Owner SAP Process Integration, SAP HANA Cloud Integration Disclaimer This presentation outlines our general product direction

More information

Introduction. Architecture Re-engineering. Systems Consolidation. Data Acquisition. Data Integration. Database Technology

Introduction. Architecture Re-engineering. Systems Consolidation. Data Acquisition. Data Integration. Database Technology Introduction Data migration is necessary when an organization decides to use a new computing system or database management system that is incompatible with the current system. Architecture Re-engineering

More information

Extending AADL for Security Design Assurance of the Internet of Things

Extending AADL for Security Design Assurance of the Internet of Things Extending AADL for Security Design Assurance of the Internet of Things Presented by Rick Kazman, PhD Team: Carol Woody (PI), Rick Kazman, Robert Ellison, John Hudak, Allen Householder Software Engineering

More information

Datacenter Management Optimization with Microsoft System Center

Datacenter Management Optimization with Microsoft System Center Datacenter Management Optimization with Microsoft System Center Disclaimer and Copyright Notice The information contained in this document represents the current view of Microsoft Corporation on the issues

More information

Building Your EDI Modernization Roadmap

Building Your EDI Modernization Roadmap Simplify and Accelerate e-business Integration Building Your EDI Modernization Roadmap Background EDI Modernization Drivers Lost revenue due to missing capabilities or poor scorecard ratings High error

More information

Ensuring Web Service Quality for Service-Oriented Architectures. An Oracle White Paper June 2008

Ensuring Web Service Quality for Service-Oriented Architectures. An Oracle White Paper June 2008 Ensuring Web Service Quality for Service-Oriented Architectures An Oracle White Paper June 2008 Ensuring Web Service Quality for Service-Oriented Architectures WEB SERVICES OFFER NEW OPPORTUNITIES AND

More information

Repository-Centric Enterprise Architecture

Repository-Centric Enterprise Architecture Repository-Centric Enterprise Architecture Copyright 2005, Enterprise Elements, Inc. Abstract - Enterprise Architecture modeling tools are used to capture complex knowledge about organizations and technology.

More information

Software Architecture for Big Data Systems. Ian Gorton Senior Member of the Technical Staff - Architecture Practices

Software Architecture for Big Data Systems. Ian Gorton Senior Member of the Technical Staff - Architecture Practices Software Architecture for Big Data Systems Ian Gorton Senior Member of the Technical Staff - Architecture Practices Ian Gorton is investigating issues related to software architecture at scale. This includes

More information

How Technology Supports Project, Program and Portfolio Management

How Technology Supports Project, Program and Portfolio Management WHITE PAPER: HOW TECHNOLOGY SUPPORTS PROJECT, PROGRAM AND PORTFOLIO MANAGEMENT SERIES 4 OF 4 How Technology Supports Project, Program and Portfolio Management SEPTEMBER 2007 Enrico Boverino CA CLARITY

More information

Getting Started with Service- Oriented Architecture (SOA) Terminology

Getting Started with Service- Oriented Architecture (SOA) Terminology Getting Started with - Oriented Architecture (SOA) Terminology Grace Lewis September 2010 -Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing systems it is neither a

More information

Extend the value of your core business systems.

Extend the value of your core business systems. Legacy systems renovation to SOA September 2006 Extend the value of your core business systems. Transforming legacy applications into an SOA framework Page 2 Contents 2 Unshackling your core business systems

More information

EAI vs. ETL: Drawing Boundaries for Data Integration

EAI vs. ETL: Drawing Boundaries for Data Integration A P P L I C A T I O N S A W h i t e P a p e r S e r i e s EAI and ETL technology have strengths and weaknesses alike. There are clear boundaries around the types of application integration projects most

More information

Reduce your data storage footprint and tame the information explosion

Reduce your data storage footprint and tame the information explosion IBM Software White paper December 2010 Reduce your data storage footprint and tame the information explosion 2 Reduce your data storage footprint and tame the information explosion Contents 2 Executive

More information

Business Rule Management. Effective IT Modernization

Business Rule Management. Effective IT Modernization Business Rule Management Effective IT Modernization Business Rule Management Lynne Harbin, Associate Director Health Eligibility Center, Veterans Health Administration I. Philip Matkovsky, Principal Macro

More information

Buyer Beware: How To Be a Better Consumer of Security Maturity Models

Buyer Beware: How To Be a Better Consumer of Security Maturity Models Buyer Beware: How To Be a Better Consumer of Security Maturity Models SESSION ID: GRC-R01 Julia Allen Software Engineering Institute Carnegie Mellon University jha@sei.cmu.edu Nader Mehravari Software

More information

2012 CyberSecurity Watch Survey

2012 CyberSecurity Watch Survey 2012 CyberSecurity Watch Survey Unknown How 24 % Bad is the Insider Threat? 51% 2007-2013 Carnegie Mellon University 2012 Carnegie Mellon University NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY

More information

Migrating to the Cloud. Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services

Migrating to the Cloud. Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services Migrating to the Cloud Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services Organisations are looking for new ways to deliver IT services and demanding that ICT

More information

Realizing the Benefits of Data Modernization

Realizing the Benefits of Data Modernization February 2015 Perspective Realizing the Benefits of How to overcome legacy data challenges with innovative technologies and a seamless data modernization roadmap. Companies born into the digital world

More information

Cisco and VMware Virtualization Planning and Design Service

Cisco and VMware Virtualization Planning and Design Service Cisco and VMware Virtualization Planning and Design Service Create an End-to-End Virtualization Strategy with Combined Services from Cisco and VMware Service Overview A Collaborative Approach to Virtualization

More information

Building Resilient Systems: The Secure Software Development Lifecycle

Building Resilient Systems: The Secure Software Development Lifecycle Building Resilient Systems: The Secure Software Development Lifecycle Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213, PhD Technical Director, CERT mssherman@sei.cmu.edu

More information

IBM Rational Asset Manager

IBM Rational Asset Manager Providing business intelligence for your software assets IBM Rational Asset Manager Highlights A collaborative software development asset management solution, IBM Enabling effective asset management Rational

More information

Modernized and Maintainable Code. Frank Weil, Ph.D. UniqueSoft, LLC

Modernized and Maintainable Code. Frank Weil, Ph.D. UniqueSoft, LLC Modernized and Maintainable Code Frank Weil, Ph.D. UniqueSoft, LLC UniqueSoft is a provider of next-generation software development tools and services specializing in modernizing legacy software using

More information

APPLICATION MANAGEMENT SUITE FOR ORACLE E-BUSINESS SUITE APPLICATIONS

APPLICATION MANAGEMENT SUITE FOR ORACLE E-BUSINESS SUITE APPLICATIONS APPLICATION MANAGEMENT SUITE FOR ORACLE E-BUSINESS SUITE APPLICATIONS Oracle Application Management Suite for Oracle E-Business Suite delivers capabilities that helps to achieve high levels of application

More information

Datacenter Management and Virtualization. Microsoft Corporation

Datacenter Management and Virtualization. Microsoft Corporation Datacenter Management and Virtualization Microsoft Corporation June 2010 The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the

More information

An Oracle White Paper February 2014. Oracle Data Integrator 12c Architecture Overview

An Oracle White Paper February 2014. Oracle Data Integrator 12c Architecture Overview An Oracle White Paper February 2014 Oracle Data Integrator 12c Introduction Oracle Data Integrator (ODI) 12c is built on several components all working together around a centralized metadata repository.

More information

SQL Server Master Data Services A Point of View

SQL Server Master Data Services A Point of View SQL Server Master Data Services A Point of View SUBRAHMANYA V SENIOR CONSULTANT SUBRAHMANYA.VENKATAGIRI@WIPRO.COM Abstract Is Microsoft s Master Data Services an answer for low cost MDM solution? Will

More information

can you effectively plan for the migration and management of systems and applications on Vblock Platforms?

can you effectively plan for the migration and management of systems and applications on Vblock Platforms? SOLUTION BRIEF CA Capacity Management and Reporting Suite for Vblock Platforms can you effectively plan for the migration and management of systems and applications on Vblock Platforms? agility made possible

More information

ORACLE FINANCIAL SERVICES ANALYTICAL APPLICATIONS INFRASTRUCTURE

ORACLE FINANCIAL SERVICES ANALYTICAL APPLICATIONS INFRASTRUCTURE ORACLE FINANCIAL SERVICES ANALYTICAL APPLICATIONS INFRASTRUCTURE KEY FEATURES Rich and comprehensive business metadata allows business users to interact with financial services data model to configure

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration White Paper Published: August 09 This is a preliminary document and may be changed substantially prior to final commercial release of the software described

More information

Managing Variation in Services in a Software Product Line Context

Managing Variation in Services in a Software Product Line Context Managing Variation in Services in a Software Product Line Context Sholom Cohen Robert Krut May 2010 TECHNICAL NOTE CMU/SEI-2010-TN-007 Research, Technology, and System Solutions (RTSS) Program Unlimited

More information

Solution Overview VMWARE PROTECTION WITH EMC NETWORKER 8.2. White Paper

Solution Overview VMWARE PROTECTION WITH EMC NETWORKER 8.2. White Paper White Paper VMWARE PROTECTION WITH EMC NETWORKER 8.2 Solution Overview Abstract This white paper describes the integration of EMC NetWorker with VMware vcenter. It also includes details on the NetWorker

More information

Contents. Introduction... 1

Contents. Introduction... 1 Managed SQL Server 2005 Deployments with CA ERwin Data Modeler and Microsoft Visual Studio Team Edition for Database Professionals Helping to Develop, Model, and Maintain Complex Database Architectures

More information

Creating Applications in Bluemix using the Microservices Approach IBM Redbooks Solution Guide

Creating Applications in Bluemix using the Microservices Approach IBM Redbooks Solution Guide Creating Applications in Bluemix using the Microservices Approach IBM Redbooks Solution Guide Across 2014 and into 2015, microservices became the new buzzword for application development style. So what

More information

Custom Software Development Approach

Custom Software Development Approach Custom Software Development Approach Our approach to custom software development combines benefits from several standard development process models. We tend to have a well-defined, predictable and highly

More information

CA Scheduler Job Management r11

CA Scheduler Job Management r11 PRODUCT SHEET CA Scheduler Job Management CA Scheduler Job Management r11 CA Scheduler Job Management r11 (CA Scheduler JM), part of the Job Management solution from CA Technologies, is a premier z/oscentric

More information

Active Archive - Data Protection for the Modern Data Center. Molly Rector, Spectra Logic Dr. Rainer Pollak, DataGlobal

Active Archive - Data Protection for the Modern Data Center. Molly Rector, Spectra Logic Dr. Rainer Pollak, DataGlobal Active Archive - Data Protection for the Modern Data Center Molly Rector, Spectra Logic Dr. Rainer Pollak, DataGlobal SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA.

More information

VMware Site Recovery Manager with EMC RecoverPoint

VMware Site Recovery Manager with EMC RecoverPoint VMware Site Recovery Manager with EMC RecoverPoint Implementation Guide EMC Global Solutions Centers EMC Corporation Corporate Headquarters Hopkinton MA 01748-9103 1.508.435.1000 www.emc.com Copyright

More information

Move beyond monitoring to holistic management of application performance

Move beyond monitoring to holistic management of application performance Move beyond monitoring to holistic management of application performance IBM SmartCloud Application Performance Management: Actionable insights to minimize issues Highlights Manage critical applications

More information

CA Workload Automation Agents Operating System, ERP, Database, Application Services and Web Services

CA Workload Automation Agents Operating System, ERP, Database, Application Services and Web Services PRODUCT SHEET CA Workload Automation Agents CA Workload Automation Agents Operating System, ERP, Database, Application Services and Web Services CA Workload Automation Agents extend the automation capabilities

More information

Department of Homeland Security Cyber Resilience Review (Case Study) Matthew Butkovic Technical Manager - Cybersecurity Assurance, CERT Division

Department of Homeland Security Cyber Resilience Review (Case Study) Matthew Butkovic Technical Manager - Cybersecurity Assurance, CERT Division Department of Homeland Security Cyber Resilience Review (Case Study) Matthew Butkovic Technical Manager - Cybersecurity Assurance, CERT Division Matthew Butkovic is a Technical Manager Cybersecurity Assurance

More information

Simplify and Automate IT

Simplify and Automate IT Simplify and Automate IT Expectations have never been higher Reduce IT Costs 30% increase in staff efficiency Reduce support costs by 25% Improve Quality of Service Reduce downtime by 75% 70% faster MTTR

More information

Introduction to Service-Oriented Architecture for Business Analysts

Introduction to Service-Oriented Architecture for Business Analysts Introduction to Service-Oriented Architecture for Business Analysts This course will provide each participant with a high-level comprehensive overview of the Service- Oriented Architecture (SOA), emphasizing

More information

SMART Solutions for Active Directory Migrations

SMART Solutions for Active Directory Migrations SMART Solutions for Active Directory Migrations Challenges of Active Directory Migrations Types of Active Directory Migrations Intra- Forest Migration between Domains in the Same Forest Separate a Forest

More information

An Oracle White Paper in Enterprise Architecture August 2009. Architectural Strategies for Cloud Computing

An Oracle White Paper in Enterprise Architecture August 2009. Architectural Strategies for Cloud Computing An Oracle White Paper in Enterprise Architecture August 2009 Architectural Strategies for Cloud Computing Disclaimer The following is intended to outline our general product direction. It is intended for

More information

ITM204 Post-Copy Automation for SAP NetWeaver Business Warehouse System Landscapes. October 2013

ITM204 Post-Copy Automation for SAP NetWeaver Business Warehouse System Landscapes. October 2013 ITM204 Post-Copy Automation for SAP NetWeaver Business Warehouse System Landscapes October 2013 Disclaimer This presentation outlines our general product direction and should not be relied on in making

More information

Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY IN A HYBRID CLOUD ENVIRONMENT REV. 1.1

Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY IN A HYBRID CLOUD ENVIRONMENT REV. 1.1 sm Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY IN A HYBRID CLOUD ENVIRONMENT REV. 1.1 Open Data Center Alliance Usage: Virtual Machine (VM) Interoperability in a Hybrid Cloud

More information

IBM InfoSphere Information Server Ready to Launch for SAP Applications

IBM InfoSphere Information Server Ready to Launch for SAP Applications IBM Information Server Ready to Launch for SAP Applications Drive greater business value and help reduce risk for SAP consolidations Highlights Provides a complete solution that couples data migration

More information

Five best practices for deploying a successful service-oriented architecture

Five best practices for deploying a successful service-oriented architecture IBM Global Services April 2008 Five best practices for deploying a successful service-oriented architecture Leveraging lessons learned from the IBM Academy of Technology Executive Summary Today s innovative

More information

Cloud Computing for Architects

Cloud Computing for Architects Cloud Computing for Architects This four day, hands-on boot camp begins with an examination of the Cloud Computing concept, the structure and key characteristics of Clouds, and takes a look under the hood

More information

Whitepaper. Legacy System Consolidation Strategy for the Insurance Sector. Published on: October 2011 Sanjay Rao

Whitepaper. Legacy System Consolidation Strategy for the Insurance Sector. Published on: October 2011 Sanjay Rao Legacy System Consolidation Strategy for the Insurance Sector Published on: October 2011 Sanjay Rao Hexaware Technologies. All rights reserved. Table of Contents 1 Introduction 2 Evolution of disparate

More information

W H I T E P A P E R E n a b l i n g D a t a c e n t e r A u t o mation with Virtualized Infrastructure

W H I T E P A P E R E n a b l i n g D a t a c e n t e r A u t o mation with Virtualized Infrastructure W H I T E P A P E R E n a b l i n g D a t a c e n t e r A u t o mation with Virtualized Infrastructure Sponsored by: VMware Tim Grieser August 2008 IDC OPINION Global Headquarters: 5 Speen Street Framingham,

More information

Implement a unified approach to service quality management.

Implement a unified approach to service quality management. Service quality management solutions To support your business objectives Implement a unified approach to service quality management. Highlights Deliver high-quality software applications that meet functional

More information

www.novell.com/documentation Installation Guide Identity Manager 3.6.1 August 31, 2012

www.novell.com/documentation Installation Guide Identity Manager 3.6.1 August 31, 2012 www.novell.com/documentation Installation Guide Identity Manager 3.6.1 August 31, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

SharePoint 2013 Migration Readiness

SharePoint 2013 Migration Readiness SharePoint 2013 Migration Readiness Decision Points around Migrating to SharePoint 2013 MARK ECKERT Contents Purpose... 1 SharePoint 2013 Implementation Options... 1 On-premise installation... 1 Cloud...

More information

IBM InfoSphere Optim Test Data Management

IBM InfoSphere Optim Test Data Management IBM InfoSphere Optim Test Data Management Highlights Create referentially intact, right-sized test databases or data warehouses Automate test result comparisons to identify hidden errors and correct defects

More information

OMG SOA Workshop - Burlingame Oct 16-19, 2006 Integrating BPM and SOA Using MDA A Case Study

OMG SOA Workshop - Burlingame Oct 16-19, 2006 Integrating BPM and SOA Using MDA A Case Study OMG SOA Workshop - Burlingame Oct 16-19, 2006 Integrating BPM and SOA Using MDA A Case Study Michael Guttman CTO, The Voyant Group mguttman@thevoyantgroup.com Overview of Voyant H.Q. West Chester, PA Business

More information

Certified Information Professional 2016 Update Outline

Certified Information Professional 2016 Update Outline Certified Information Professional 2016 Update Outline Introduction The 2016 revision to the Certified Information Professional certification helps IT and information professionals demonstrate their ability

More information

CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service

CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service Open Data Center Alliance, Inc. 3855 SW 153 rd Dr. Beaverton, OR 97003 USA Phone +1 503-619-2368 Fax: +1 503-644-6708 Email:

More information

Dynamic Service Desk. Unified IT Management. Solution Overview

Dynamic Service Desk. Unified IT Management. Solution Overview I T S E R V I C E + I T A S S E T M A N A G E M E N T INFRASTRUCTURE MANAGEMENT Dynamic Service Desk Unified IT Management Achieving business and IT alignment requires having insight into hardware and

More information

How To Ensure Security In A System

How To Ensure Security In A System Software Assurance vs. Security Compliance: Why is Compliance Not Enough? Carol Woody, Ph.D. Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 2012 Carnegie Mellon University

More information

Creating a Catalog for ILM Services. Bob Mister Rogers, Application Matrix Paul Field, Independent Consultant Terry Yoshii, Intel

Creating a Catalog for ILM Services. Bob Mister Rogers, Application Matrix Paul Field, Independent Consultant Terry Yoshii, Intel Creating a Catalog for ILM Services Bob Mister Rogers, Application Matrix Paul Field, Independent Consultant Terry Yoshii, Intel SNIA Legal Notice The material contained in this tutorial is copyrighted

More information