Revolutive IT™
 
Legacy Migration

T he best way to leverage past IT investment is to reuse the legacy application or pieces of legacy application in order to build future applications. As such, we will use a phased approach in order to minimize risks related to code migration.

Strategies for migration

   Cold Turkey

  Involves rewriting a legacy IS from scratch to produce the target IS using modern software techniques and hardware of the target environment.

   Chicken Little

  Involves migrating the legacy IS in place, by small incremental steps until the desired long term objective is reached.

Cold Turkey vs. Chicken Little

   Cold Turkey risks and disadvantages:

 A better system must be promised (if the only payoff is to lower future maintenance costs)
  Business condition never stand still
  Specifications rarely exist
  Undocumented dependencies frequentely exist
  Legacy ISs can be too big to cut-over
  Management of large projects is hard (Brooks effect)
  Lateness is seldom tolerated
  Large project tend to bloat

   Chicken Little advantages:

  Alternative, low-risk and novel strategy

  Each step requires a relatively small resource allocation, a short time, and produces a specific, small result towards the desired goal

  If a Chicken Little step fails, only the failed step must be repeated, rather than the entire project

  Each problem cited previousely can be addressed in an incremental fashion

  Chicken Little is in sharp contrast to the vast resource requirements of a complete rewrite (e.g. hundreds of persons years), a multi-tier development, and one massive result

  Since steps are designed to be relatively inexpensive, such incremental steps do not need to promise dramatic new function to be funded

  Chicken Little is much safer and more feasible than Cold Turkey

Critical Success Factors of Chicken Little

 The selection of independent increments (components) to migrate i.e. portions of legacy interfaces, applications and databases that can be migrated independently of each other.

  The sequencing of the increments to achieve the desired goal.

  Dealing with unavoidable problems i.e. dependencies between migration steps.

The method

The method presented here is tailorable and includes the following requirements:

 Migrate in place.

  Ensure continuous, safe, reliable, robust access to mission critical functions and information at performance levels adequate to support business's workload.

  Make as many fixes, improvements, and enhancements as reasonable, to address current and anticipated requirements.

  Make as few change as possible to minimize risk.

  Alter the legacy code as little as possible to facilitate future evolution.

  Establish as much flexibility as possible to facilitate future evolution.

  Minimize the potential negative impacts of change, including those on users, applications, databases, and, particularly, on the on-going operation of the mission critical IS.

  Maximize the benefits of modern technology and methods.

The five basic steps

 Iteratively migrate the computing environment.

  Iteratively migrate the legacy application.

  Iteratively migrate the legacy data.

  Iteratively migrate the legacy user and system interface.

  Iteratively cut-over from the legacy to the target components.

General Migration Method

 Iteratively install the target environment.

  Iteratively analyze the legacy IS.

  Iteratively decompose the legacy IS.

  Iteratively design the target applications and interfaces.

  Iteratively design the target database.

  Iteratively migrate the legacy applications.

  Iteratively migrate the legacy interfaces.

  Iteratively cut-over the target IS.

From the book: "Migrating Legacy Systems: Gateways, Interfaces & the Incremental Approach" (Morgan Kaufmann Series in Data Management Systems; ASIN: 1558603301 - April 1995) by Michael L. Brodie, Michael Stonebraker (Contributor), Michael Stonebraker


The six phases for complete system transformation

 1. Source Code Inventory and Assessment

 2. Project Planning and Estimation

 3. Legacy Analysis

 4. User Interface Transformation

 5. Business Logic Transformation

 6. Data Transformation


Our solutions are the most efficient, flexible, quality-based and cheaper of the market, due to our fully innovative and customer-driven approach. Discover them and compare them to the solutions provided you by our competitors.


 
Copyright © 2002 Atlantis Technologies. All rights reserved.