|
|
Revolutive IT |
Legacy Migration T
he best way to leverage past IT investment is to reuse the legacy
application or pieces of legacy application in order to build future applications.
As such, we will use a phased approach in order to minimize risks related to code
migration. Strategies for migration
Involves rewriting a legacy IS from scratch to produce the target IS using modern software techniques and hardware of the target environment. Chicken LittleInvolves migrating the legacy IS in place, by small incremental steps until the desired long term objective is reached. Cold Turkey vs. Chicken Little Cold Turkey risks and disadvantages: A better system must be promised (if the only payoff is to lower future maintenance costs)Business condition never stand still Specifications rarely exist Undocumented dependencies frequentely exist Legacy ISs can be too big to cut-over Management of large projects is hard (Brooks effect) Lateness is seldom tolerated Large project tend to bloat Chicken Little advantages: Alternative, low-risk and novel strategyEach step requires a relatively small resource allocation, a short time, and produces a specific, small result towards the desired goal If a Chicken Little step fails, only the failed step must be repeated, rather than the entire project Each problem cited previousely can be addressed in an incremental fashion Chicken Little is in sharp contrast to the vast resource requirements of a complete rewrite (e.g. hundreds of persons years), a multi-tier development, and one massive result Since steps are designed to be relatively inexpensive, such incremental steps do not need to promise dramatic new function to be funded Chicken Little is much safer and more feasible than Cold Turkey Critical Success Factors of Chicken Little The selection of independent increments (components) to migrate i.e. portions of legacy interfaces, applications and databases that can be migrated independently of each other. The sequencing of the increments to achieve the desired goal. Dealing with unavoidable problems i.e. dependencies between migration steps. The method The method presented here is tailorable and includes the following requirements:Migrate in place. Ensure continuous, safe, reliable, robust access to mission critical functions and information at performance levels adequate to support business's workload. Make as many fixes, improvements, and enhancements as reasonable, to address current and anticipated requirements. Make as few change as possible to minimize risk. Alter the legacy code as little as possible to facilitate future evolution. Establish as much flexibility as possible to facilitate future evolution. Minimize the potential negative impacts of change, including those on users, applications, databases, and, particularly, on the on-going operation of the mission critical IS. Maximize the benefits of modern technology and methods. The five basic steps Iteratively migrate the computing environment. Iteratively migrate the legacy application. Iteratively migrate the legacy data. Iteratively migrate the legacy user and system interface. Iteratively cut-over from the legacy to the target components. General Migration Method Iteratively install the target environment. Iteratively analyze the legacy IS. Iteratively decompose the legacy IS. Iteratively design the target applications and interfaces. Iteratively design the target database. Iteratively migrate the legacy applications. Iteratively migrate the legacy interfaces. Iteratively cut-over the target IS. From the book: "Migrating Legacy Systems: Gateways, Interfaces & the Incremental Approach" (Morgan Kaufmann Series in Data Management Systems; ASIN: 1558603301 - April 1995) by Michael L. Brodie, Michael Stonebraker (Contributor), Michael Stonebraker The six phases for complete system transformation 1. Source Code Inventory and Assessment 2. Project Planning and Estimation 3. Legacy Analysis 4. User Interface Transformation 5. Business Logic Transformation 6. Data Transformation Our solutions are the most efficient, flexible, quality-based and cheaper of the market, due to our fully innovative and customer-driven approach. Discover them and compare them to the solutions provided you by our competitors. |
Copyright © 2002 Atlantis Technologies. All rights reserved. |