william m. ulrich – tactical strategy group, inc. m. ulrich – tactical strategy group, inc....
TRANSCRIPT
ArchitectureArchitecture--Driven Modernization 101: Driven Modernization 101: Concepts, Strategies & JustificationConcepts, Strategies & Justification
William M. Ulrich William M. Ulrich ––Tactical Strategy Group, Inc.Tactical Strategy Group, Inc.
www.systemtransformation.comwww.systemtransformation.com
Seminar ObjectivesSeminar Objectives! Define existing data & application architecture challenges
! Introduce modernization concepts
! Discuss business-driven modernization
! Outline techniques for performing application assessments, integration and transformation
! Describe practical application of these concepts through project-based scenarios
! Introduce enabling tools and technologies
! Help attendees get started
Seminar OutlineSeminar OutlineI. What is Architecture Driven Modernization?I. What is Architecture Driven Modernization?II. Existing Data & Application Architecture ChallengesII. Existing Data & Application Architecture ChallengesIII. Attempts to meet BPM ChallengeIII. Attempts to meet BPM ChallengeIV. Modernization OverviewIV. Modernization OverviewV. Modernization Processes, Techniques & ApproachesV. Modernization Processes, Techniques & ApproachesVI. Modernization ToolsVI. Modernization ToolsVII. Modernization ScenariosVII. Modernization ScenariosVIII. Getting StartedVIII. Getting StartedIX. Selling Management & RDIIX. Selling Management & RDIX. CloseX. Close
Process of understanding and evolving existing software assets Process of understanding and evolving existing software assets for the purpose offor the purpose of!! Software improvementSoftware improvement!! ModificationsModifications!! Interoperability Interoperability !! RefactoringRefactoring!! RestructuringRestructuring!! ReuseReuse!! Porting Porting !! MigrationMigration!! Translation into another languageTranslation into another language!! Enterprise application integrationEnterprise application integration!! ServiceService--oriented architectureoriented architecture
Modernization starts where existing practices fail to deliver Modernization starts where existing practices fail to deliver against business objectivesagainst business objectives
I. What is ArchitectureI. What is Architecture--Driven Driven Modernization (ADM)?Modernization (ADM)?
*Source: ADM.OMG.ORG
II. Existing Data & Application II. Existing Data & Application Architecture ChallengesArchitecture Challenges
!! Existing data & application Existing data & application architectures run in sharp contrast to architectures run in sharp contrast to modern IT disciplines.modern IT disciplines.
!! The challenge is how to leverage The challenge is how to leverage emerging architectures while adjusting emerging architectures while adjusting to critical business requirements & to critical business requirements & changing processes.changing processes.
CIO Legacy Survey*CIO Legacy Survey*
What are the major reasons for keeping the legacy systems your company is currently planning to retain?
!! Still able to support business processesStill able to support business processes 54.4%54.4%!! Still reliableStill reliable 49.749.7!! Staff available to support themStaff available to support them 44.344.3!! Still more cost effective than alternativesStill more cost effective than alternatives 41.641.6!! We do not have the budget to make any changes 36.9We do not have the budget to make any changes 36.9!! Still able to support strategic goalsStill able to support strategic goals 36.936.9
Still relevant and reliable* CIO Insight – December 2002
CIO Legacy SurveyCIO Legacy SurveyIf you are currently migrating or planning to migrate off any of your current legacy systems in the next year, what are the main reasons?
!! Meet new strategic goalsMeet new strategic goals 65.2%65.2%!! Legacy systems can’t support business processesLegacy systems can’t support business processes 59.959.9!! Legacy systems can’t support current strategic goals 56.1Legacy systems can’t support current strategic goals 56.1!! New systems would be more cost effective 48.5New systems would be more cost effective 48.5!! Legacy systems provide poor interoperability 41.7Legacy systems provide poor interoperability 41.7
Migration / transformation plans
* CIO Insight – December 2002
Existing Data & Application Existing Data & Application ArchitecturesArchitectures
!! Numerous languages and platformsNumerous languages and platforms!! 200 billion lines of Cobol (60% of total)200 billion lines of Cobol (60% of total)!! Haphazard design and stovepipe Haphazard design and stovepipe
architecturesarchitectures!! Segregated functionality and data structuresSegregated functionality and data structures!! Layers of middleware and data warehousesLayers of middleware and data warehouses!! WebWeb--based interfacesbased interfaces
Poorly Integrated Information ArchitecturesPoorly Integrated Information Architectures
Business processes, applications and data mirror stovepipe information governance structures.
Existing Business Processes
Existing Data & System Architectures
Existing Organizational Governance Structures
! Major telecommunications company cancels package implementation effort - 360 person years / no deliverable
! Insurance company cancels 12 year project having spent $199 million - no results / no deliverables
! $10 million banking application development project is canceled - no deliverables
! 3 year old, C-based client/server system must undergo major re-engineering effort - no cohesive design
! Countless other stories
Real World SymptomsReal World Symptomsof the Legacy Challengeof the Legacy Challenge
Bottom Line: Aging Architectures Bottom Line: Aging Architectures Impede Ability to Deliver Business ValueImpede Ability to Deliver Business Value
!! 85% of IT projects: late or never delivered*85% of IT projects: late or never delivered*!! Only 9% of IS projects come in on time or within budget*Only 9% of IS projects come in on time or within budget*!! ERP projects: years to implement, canceled 35% of the time ERP projects: years to implement, canceled 35% of the time
& rarely fully deployed*& rarely fully deployed*!! $16.5 billion is spent annually on systems that users never $16.5 billion is spent annually on systems that users never
see (Information Week)see (Information Week)!! Management believes “quick & easy” solutions can solve Management believes “quick & easy” solutions can solve
complex IT challengescomplex IT challenges
* Standish Group International
IT & Business Challenges Drive IT & Business Challenges Drive Modernization RequirementsModernization Requirements
EmergingInformation
Technologies
New ITArchitectures
ChangingBusinessModels
ChangingIndustryModels
•The Internet•Collaborative tools•Java, XML, HTML•New platforms•Integration tools•Open systems
•Time-to-market•Mergers•New products & services•CRM•Business intelligence•Process redesign •Model Driven
Architecture•J2EE and .Net•Component reuse•Web Services•Integration architecture•Agile methods
•E-Business•Deregulation •Globalization•Loss of intermediaries•Supply chain integration•Economic weakness
In a Nutshell…In a Nutshell…Current Business RequirementsCurrent Business Requirements
!! Reducing timeReducing time--toto--market for new products and market for new products and services services
!! Shifting to a customerShifting to a customer--driven philosophydriven philosophy!! Streamlining transaction flow across supply and Streamlining transaction flow across supply and
distribution chainsdistribution chains!! Creating flexible information systems to achieve Creating flexible information systems to achieve
business agilitybusiness agility!! Adapting systems to changing business processesAdapting systems to changing business processes
III. Attempts to MeetIII. Attempts to MeetBPM ChallengeBPM Challenge
!! New tools & technologies New tools & technologies !! New development techniquesNew development techniques!! But, have these advancements helped?But, have these advancements helped?
IT Attempting to Meet Challenges Using IT Attempting to Meet Challenges Using Traditional ApproachesTraditional Approaches
ExistingExistingDataData
&&ApplicationsApplications
WholesaleWholesaleApplicationApplicationReplacementReplacement
NonNon--InvasiveInvasiveDataData && ApplicationApplication
IntegrationIntegration
Application PackagesApplication Packages
A conceptual framework for non-invasive integration allows project teams to incorporate integration with modernization options.
•Database synchronization•Web access to legacy data•Data warehouse access
DataIntegration
•EDI & XML data interchange•Trading partner collaboration•External portals•Web Services
B2B Integration
Business Process
Integration
•Internal business process integration•External process integration•Workflow automation
•Web access to legacy transactions•Front-end / back-end application integration•ERP integration
EnterpriseApplication Integration
We have a Host of NonWe have a Host of Non--Invasive Invasive Integration OptionsIntegration Options
But Integration Technology is One But Integration Technology is One More Layer of Legacy ArchitectureMore Layer of Legacy Architecture
!! MessageMessage––Oriented Middleware:Oriented Middleware: Basic middleware that Basic middleware that allows an application to send / receive messages to / allows an application to send / receive messages to / from other applications.from other applications.
!! Data Management Middleware:Data Management Middleware: Facilitates access to Facilitates access to data not natively defined to an application.data not natively defined to an application.
!! Application ServerApplication Server: Multipurpose, Web: Multipurpose, Web--enabled enabled software that facilitates applicationsoftware that facilitates application--toto--application application communication across platforms.communication across platforms.
!! Adapters:Adapters: Custom pieces of code that enable Custom pieces of code that enable middlewaremiddleware--based communication.based communication.
Vendor-driven integration solutions create layers of legacy chaos across information architectures.
Source: Gartner Forecast Newsletter Issue 3, 2001
EAI Architectures can get MessyEAI Architectures can get Messy
But, These ApproachesBut, These ApproachesHave Fallen ShortHave Fallen Short
!! Wholesale application replacement:Wholesale application replacement:!! Too costly, too time consuming and too riskyToo costly, too time consuming and too risky
!! NonNon--invasive integration:invasive integration:!! Cannot address underlying architecture limitationsCannot address underlying architecture limitations
!! Package applications* Package applications* –– no panacea:no panacea:!! 35% of projects canceled outright35% of projects canceled outright!! Typically deploy only 40% of promised functionalityTypically deploy only 40% of promised functionality!! Only 10% of projects are on time and on budgetOnly 10% of projects are on time and on budget
!! Outsourcing: Only moves problem aroundOutsourcing: Only moves problem around*Who Is to Blame for ERP Failure?, Barry Calogero, serverworldmagazine.com, June 2001
Because Today’s Business ProcessesBecause Today’s Business ProcessesCut Across Stovepipe ArchitecturesCut Across Stovepipe Architectures
IT must deal with this!
`
Order Entry& Sales
InventoryControl
AccountsReceivableBilling
Shipping &Tracking
Customer Order Functions
Bottom Line is That…Bottom Line is That…
!! Replacement or packages often failReplacement or packages often fail!! No one understands the old systemsNo one understands the old systems!! IT is afraid to shut them offIT is afraid to shut them off!! Time to look at modernizationTime to look at modernization
IV. Modernization OverviewIV. Modernization Overview
!! Bridging the gapBridging the gap!! Standards basedStandards based!! Modernization infrastructureModernization infrastructure
IT Architecture EvolutionIT Architecture Evolution
These four stages of Architecture Evolution.
BuildWebSites
IntegrateWeb withBack-endSystems
ModernizeExisting
Architectures
Webify Legacy
Front-Ends
Modernization: Bridges Gap Between Modernization: Bridges Gap Between Existing & Emerging ArchitecturesExisting & Emerging Architectures
ExistingExistingArchitecturesArchitectures
StrategicStrategicArchitecturesArchitectures
Architecture ModernizationArchitecture Modernization
BusinessBusiness--Driven RequirementsDriven Requirements
Modernization AlternativeModernization Alternative –– Takes Over Takes Over Where Existing IT Strategies Fall ShortWhere Existing IT Strategies Fall Short
!! Augments or displaces existing IT optionsAugments or displaces existing IT options
!! Enables upgrade, conversion, consolidation, migration and Enables upgrade, conversion, consolidation, migration and related projectsrelated projects
!! Applies a measured, phased approach to meeting IT Applies a measured, phased approach to meeting IT challengeschallenges
!! Utilizes scenarios to ensure a businessUtilizes scenarios to ensure a business--driven approachdriven approach
!! Builds upon solid foundation of production systemsBuilds upon solid foundation of production systems
Modernization Comprised of Three Sets Modernization Comprised of Three Sets of Toolof Tool--Enabled DisciplinesEnabled Disciplines
!! AssessmentAssessment!! Analyzes / exposes application artifacts, data and Analyzes / exposes application artifacts, data and
process flows, architecture and behaviorprocess flows, architecture and behavior!! Stabilization & RefactoringStabilization & Refactoring
!! Structure, rationalize, realign, modularize and Structure, rationalize, realign, modularize and otherwise refactor existing systems otherwise refactor existing systems
!! TransformationTransformation!! Extracts logical data definitions and business rulesExtracts logical data definitions and business rules!! Facilitates reuse of existing extracted artifacts in Facilitates reuse of existing extracted artifacts in
redesign of target architecturesredesign of target architectures
Modernization is Based on a Set of Modernization is Based on a Set of Emerging OMG StandardsEmerging OMG Standards
!! Object Management Group Task Force* on ArchitectureObject Management Group Task Force* on Architecture--Driven Modernization formed in 2003Driven Modernization formed in 2003
!! Efforts focused on creating a standard Knowledge Efforts focused on creating a standard Knowledge Discovery MetaDiscovery Meta--model (KDM) to facilitate metamodel (KDM) to facilitate meta--data data exchange among vendorsexchange among vendors
!! Secondary goal is to bring vendors into compliance Secondary goal is to bring vendors into compliance through common processes & definitionsthrough common processes & definitions
!! Roadmap outlines seven stages of standards development*Roadmap outlines seven stages of standards development*!! Major industry players are participatingMajor industry players are participating
*ADM.OMG.ORG
Business ProcessRetooling Requirements
KnowledgeDiscovery
Meta-Model
Governance StructureConsolidation
Integration Projects
Strategic InformationArchitecture
RequirementsIntegration
Requirements
Multi-dimensional integration requires managing business unit, IT and external integration within the transformation repository.
Aligning Interim & Strategic OptionsAligning Interim & Strategic Options
TransformationProjects
Modernization Infrastructure Modernization Infrastructure RequirementsRequirements
!! Recognition of legacy valueRecognition of legacy value!! Process for assessing existing architectures Process for assessing existing architectures
and capturing, reusing and migrating and capturing, reusing and migrating existing software artifactsexisting software artifacts
!! Process for analyzing, designing, building Process for analyzing, designing, building and deploying target architecturesand deploying target architectures
!! Software that facilitates and integrates Software that facilitates and integrates modernization and development processesmodernization and development processes
First, Recognize that Old Systems First, Recognize that Old Systems Contain Business ValueContain Business Value
!! Old systems do many of the right things Old systems do many of the right things (i.e. rules), but not how users want them (i.e. rules), but not how users want them done or in the timedone or in the time--frames required (i.e. frames required (i.e. architecture)architecture)
!! Newly deployed systems and packages omit Newly deployed systems and packages omit valuable business rulesvaluable business rules
!! ERP and EAI have not fully addressed these ERP and EAI have not fully addressed these issuesissues
What Organizations Require to What Organizations Require to Enable Modernization Enable Modernization
!! Philosophical shift that recognizes:Philosophical shift that recognizes:!! Value of existing systems to a businessValue of existing systems to a business
!! How phased transformation is more prudent than an allHow phased transformation is more prudent than an all--oror--nothing replacement approachnothing replacement approach
!! ROIROI--driven commitment to incorporate driven commitment to incorporate transformation into all system projectstransformation into all system projects
!! Modernization support infrastructure that can be Modernization support infrastructure that can be deployed across an enterprisedeployed across an enterprise
Shift from “From Scratch” Development Shift from “From Scratch” Development Philosophy to Phased ReusePhilosophy to Phased Reuse
!! Replace “throwaway” philosophy with Replace “throwaway” philosophy with “reuse” philosophy“reuse” philosophy
!! Shift from an “all or nothing / go for broke” Shift from an “all or nothing / go for broke” approach to a phased deployment approachapproach to a phased deployment approach
!! Seek lower risks, higher returns and faster Seek lower risks, higher returns and faster delivery through phased delivery strategydelivery through phased delivery strategy
Existing Systems Reuse Should be BuiltExisting Systems Reuse Should be Builtinto Application Reinto Application Re--Design ProcessDesign Process
InformationArchitecture
Business ProcessModel
Business models represent as-is &reengineered business processes
Design models depict businessprocesses to be automated
Existing systems: input to redesignprocess & source of reusable data& business rules
Design Models
Mapping existing architecture to requirements and reusingexisting software artifacts and behaviors in new development projects.
Change Control &Configuration Mgmt
Repository Technology
System
Sub-system
JobstepJob
On-lineTable
Load Source
Library
RecordElement
DataFile
DBMS
Location
FormDefinition
UpgradeUnit
Field
Copy /Include
Analysis & Upgrade Tools
Perform Upgrade UnitDate Change
Build Enterprise CenturyDate Analysis Plan
Perform EnterpriseCentury Date Analysis
Establish Century DateChange Upgrade Units
Assess Upgrade UnitDate Change
Finalize Upgrade UnitAssessment Plan
Perform System LevelUpgrade Assessment
Develop CenturyDate Change Plan
Perform EnterpriseWide Analysis
Execute Upgrade UnitComponent Expansion
Upgrade ApplicationData Files / Data Bases
Validate CenturyDate Upgrade
Validation Tools
Order Entry& Sales
InventoryControl
AccountsReceivableBilling
Shipping &Tracking
System
Sub-system
JobstepJob
On-lineTable
Load Source
Library
RecordElement
DataFile
DBMS
Location
FormDefinition
UpgradeUnit
Field
Copy /Include
ProcessModel / Blueprint
Transformation
Software Re-engineering Technology
PositioningAnalysisInventory /Redevelopment
Enterprise
Planning
Business Driven Scenarios
Modernization ProcessModernization Process& Tool Infrastructure& Tool Infrastructure
ProcessManagement
Business Driven Scenarios
Systems Transformation Tools
Sample Modernization Sample Modernization MethodologyMethodology
Inventory/Analysis Positioning Transformation
EnterpriseRedevelopment
Planning
Source: COMSYS / USRM
" Based on results oriented case studies and success stories" Each stage contains multiple tasks and each task contains
multiple steps" Supports phased implementation strategy
• Architecture migration
• Design &component reuse
Transformation
• Enterprise wideassessment
• Architecturetransition planning
EnterpriseRedevelopment
Planning
• Assessment• Discovery• Business area
planning
Inventory/Analysis
•Stabilization•Refactoring•Transformation Preparation
Positioning
The Value of a Modernization The Value of a Modernization FrameworkFramework
Source: COMSYS / USRM
Measurement & MetricsMeasurement & Metrics
!! Metrics support analysis and planning of modernization Metrics support analysis and planning of modernization projectsprojects
!! Range from simple counts to more complex scoresRange from simple counts to more complex scores
!! EXAMPLES: EXAMPLES:
!! Total # batch jobs in systemTotal # batch jobs in system
!! # Data Elements in current system in common with # Data Elements in current system in common with data elements in ERP systemdata elements in ERP system
!! Function points, McCabe, Halstead, etc.Function points, McCabe, Halstead, etc.
!! Total integration pointsTotal integration points
ADM Assessment Approach: Decomposition ADM Assessment Approach: Decomposition Scheme Can be Represented in RepositoryScheme Can be Represented in Repository
InterfaceInterfaceInterface
BusinessRule
BusinessBusinessRuleRule
Module containsModule containsProgramProgram
Program uses InterfaceProgram uses InterfaceInterface is used by ProgramInterface is used by Program
ApplicationApplicationContains ModuleContains Module
Application
FunctionFunctionFunction
ModuleModuleModuleSystem
Business Unit
Business Business UnitUnit Business
ProcessBusiness Business ProcessProcess
ProgramProgramProgram
System containsSystem containsApplicationApplication
Interface is used by Interface is used by Business ProcessBusiness Process
Business ProcessBusiness Processuses Interfaceuses Interface
Program containsProgram containsBusiness RuleBusiness Rule
Business Unit performs FunctionBusiness Unit performs FunctionFunction is performed by Business UnitFunction is performed by Business Unit
Business Rule is defined Business Rule is defined in Programin Program
Bus. RuleQuery
Bus. RuleBus. RuleQueryQuery
ProjectProject--Level MappingLevel Mapping
ProjectProject--level repository facilitates tracking of business data andlevel repository facilitates tracking of business data andrules back to physical system artifacts and target requirements.rules back to physical system artifacts and target requirements.
System
Sub -system
Jobstep
On - linetransition
Load Source
RecordElement
Attribute
File
Database
FunctionBusinessrule
Procedure
Field
Event
Entity
Menu /Screen
Third Party
BusinessUnit
Business processBatch
job
Object /component
System
Sub -system
Jobstep
On - linetransition
Load Source
RecordElement
Attribute
File
Database
FunctionBusinessrule
Procedure
Field
Event
Entity
Menu /Screen
Third Party
BusinessUnit
Business processBatch
job
Object /component
Example of Repository’s Role in Example of Repository’s Role in Modernization ScenarioModernization Scenario
AnalystInterface
Modernization tools
Existing Systems
12
43
1
21 3
Pension
22 13
Insurance
Payroll
Distributedinterface
Integrateddatabase
Integrated application
Target Systems
Used for analysis, planning, redundancy identification, consolidation mapping & post-project documentation
Integration solutions must assess fragmentation impacts between business units and IT while considering the impact of interim integration layers.
Fragmentedbusiness
governancestructures
Fragmentedbusiness processes& workflow
Fragmented data& applicationarchitecture
Interimintegration
middlewarelayers
Modernization must Address Complex Modernization must Address Complex Dimensions of Architecture ChallengeDimensions of Architecture Challenge
Transformation Task
Business– Driven Project
Enterprise Inventory
Application Documenta-
tion
Application Cleanup
Data Mining / Cleanup
Data Redesign / Migration
Language Upgrade /
Conversion
EAI & User Interface Upgrade
Application Modulari-
zation
Architecture Migration
Strategic IT Planning
X
Outsourcing Initiative
X X X
Maintenance Upgrades
X X
BPI / BPA
X X X X
Rehosting
X X X
Package Assessment
X X
Package Implementation
X X X X
HIPAA (data upgrade)
X X X X
Web-to-Host
X X
CRM Initiative
X X X X
Data Warehouse
X X X X
Application Consolidation
X X X X X X
Component Development
X X X X X
Web Services Migration
X X X X X
Business Scenario / Modernization Task MappingBusiness Scenario / Modernization Task Mapping
ModernizationModernizationGeneral Planning Guidelines General Planning Guidelines
!! Define business strategy and IT requirementsDefine business strategy and IT requirements!! Create and / or identify target architectureCreate and / or identify target architecture!! Define project(s) parameters and ROIDefine project(s) parameters and ROI!! Map existing environment against target Map existing environment against target
requirements and related architecturerequirements and related architecture!! Build plan to assess, capture or migrate, upgrade, Build plan to assess, capture or migrate, upgrade,
reuse and / or deactivate legacy componentsreuse and / or deactivate legacy components
V. Modernization Processes, V. Modernization Processes, Techniques & ApproachesTechniques & Approaches
V. I Application AssessmentsV. I Application AssessmentsV. I I Application Stabilization & Refactoring V. I I Application Stabilization & Refactoring V. I I I Application TransformationV. I I I Application Transformation
V.I Application AssessmentsV.I Application Assessments
!! Enterprise AssessmentsEnterprise Assessments!! ProjectProject--Level AssessmentsLevel Assessments
Enterprise AssessmentEnterprise Assessment
Objectives! Identify strategic information architecture
requirements! Inventory existing application portfolio! Establish architecture transition strategy! Link priority application projects with
suggested modernization scenarios
Enterprise Assessment BreakdownEnterprise Assessment Breakdown
Data Architecture
BusinessArchitecture
TransformationStrategy
TechnicalArchitecture
"Provides baseline for developing modernization options"Establish scope and boundaries for cross-application projects"Key to establishing clear requirements and strategy
• Current systems summary
• Current physicalsystems to currentfunctions matrix*
• Current physicalsystems to targetfunctions matrix
• Current systems inter-relationship DFD*
• Functional mappingsummary
• Current data storesdescription*
• Current data storesto current systemsmatrix*
• Current data stores to target entity typesmatrix
• Data mapping summary
• Current to target enterprise architecture summary• Architecture transitioning & impact summary
• Suggested modernization project options
• Current physical systems inventory
• Current physical systems attributes / metrics
• Current to target technical architecture variances
Technical ArchitectureAssessment
Business ArchitectureAssessment
Data ArchitectureAssessment
Modernization Planning Deliverable SummaryModernization Planning Deliverable Summary
ModernizationPlanning
Repository View of Systems Repository View of Systems Decomposition SchemeDecomposition Scheme
InterfaceInterfaceInterface
BusinessRule
BusinessBusinessRuleRule
Module containsModule containsProgramProgram
Program uses InterfaceProgram uses InterfaceInterface is used by ProgramInterface is used by Program
ApplicationApplicationContains ModuleContains Module
Application
FunctionFunctionFunction
JobJobJobSystem
Business Unit
Business Business UnitUnit Business
ProcessBusiness Business ProcessProcess
ProgramProgramProgram
System containsSystem containsApplicationApplication
Interface is used by Interface is used by Business ProcessBusiness Process
Business ProcessBusiness Processuses Interfaceuses Interface
Program containsProgram containsBusiness RuleBusiness Rule
Business Unit performs FunctionBusiness Unit performs FunctionFunction is performed by Business UnitFunction is performed by Business Unit
Business Rule is defined Business Rule is defined in Programin Program
Bus. RuleQuery
Bus. RuleBus. RuleQueryQuery
Tool captures RedRed information / / Analysts add Blue informationAnalysts add Blue information
This information can be stored in open tool vendor repository
• What mix of existing, new and package components will define an organization'sapplication systems under the target architecture?
• How will organizations partition and transition existing systems to achievestrategic targets?
ExistingSystems
PackageSoftware
Strategic ApplicationArchitecture
New Data /Functions
Application Modernization PlanningApplication Modernization Planning
Integration Technology
Architecture Definition &Architecture Definition &Transition PlanningTransition Planning
Existing Systems
Strategic Information Plan
Modernization Plan
• Strategic Information Plan defines strategic architectures• Modernization Plan defines how to achieve it
Strategic InformationSystems Architecture
ArchitectureTransition Strategy
Modernization Plan identifies path forward
Information Systems Architecture• Business Architecture• Data Architecture• Technical Architecture• Define model driven, implementationindependent design
Architecture Modernization Strategy• Assess existing systems• Map existing to target architecture• Establish enterprise transition strategy• Establish maintenance strategy• Manage shifting target specifications
Key Tasks Regarding Modernization & Key Tasks Regarding Modernization & Integration PlanningIntegration Planning
MajorEnhancement
ERP / TotalReplacement
InfrastructureStabilization
Language /Platform Conversion
GUIFront-end
DBMSMigration
Multi-systemConsolidation
DEGREEOF CHANGE TECHNICAL
Evaluating Project OpportunitiesEvaluating Project OpportunitiesFU
NC
TIO
NA
L
EAI
Data WarehouseComponentization
Sample Modernization StrategySample Modernization StrategyPayroll
Pension
Insurance
Accounts Payable
Accounts Receivable
Cash Disbursements
Invoicing
Customer Tracking
Order Processing
Existing Applications
Integrated Human Resources System• Finalize top-down designs• Collapse redundant functions / data • Transition functions/data to client/server• Phase deactivation of legacy systems
Review / Acquire Accounting Package• Assess underlying package functionality• Migrate / collapse redundant legacy data• Effect shut-down of legacy systems
Phased Transition to New Billing System• Stabilize existing applications• Develop integrated client/server design• Assess current systems• Employ phased migration to target
architecture
Modernization Options
Tasks include consolidation, migration, redesign and redeployment activities.
The ProjectThe Project--Level AssessmentLevel Assessment
" Assess long-term business and information plans" Identify the best modernization strategy to meet short
and long-term information requirements" Eliminate "guess work" typically involved in IT
planning efforts" Establish phased, cost effective modernization plan
based on current position and future needs
ObjectivesObjectives
Note: Assessments leverage Enterprise Assessment
ProjectProject--Level Assessment OptionsLevel Assessment Options
Existing ArchitectureAssessment
Disciplines & Tools
Three sets of tasks are basis for integration and modernization projects. Relies on enterprise assessment.
ArchitecturalAssessment
FunctionalAssessment
TechnicalAssessment
Meta-Data, Metrics, Documentation & Plan
Technical assessment inventories and documents existing systems environments, data usage and program flow.
Technical Assessment
EnvironmentalAnalysis
ProcessAnalysis Data Definition
Analysis
Documentation
DatabaseDefinitions Source Code
Reviews
Subject Matter Expert Discussions
Technical AssessmentTechnical Assessment
Metrics Documentation
" Current system flows, user views and data utilization summary" Architecture summary metrics" How systems are constructed and interrelate
General SystemArchitectureAssessment
Data AccessLayer
Assessment
PresentationLayer
Assessment
ApplicationArchitecture
Summarization
Architectural AssessmentArchitectural Assessment
Functional AnalysisFunctional Analysis
• Current system, bottom up planning level models• Multiple current system, integrated models• Integrated top down / bottom up models• Functional conformance metrics
User BacklogRequirements
Analysis
Data ArchitectureAnalysis
FunctionHierarchy Analysis
BusinessFunction / Entity
Analysis
Functional Assessment: Gap Analysis
• Assess the potential for data & behavioral reuse• Determine % of target existing in current systems• Determine % of target to be developed from scratch
CurrentSystem
TargetSystem
GAP Analysis GAP Analysis
CURRENT SYSTEM TARGET SYSTEM
Interviews
Mapping
Interviews
Current-to-target data mapping extracts bottom-up data usage to create or validate target data models.
EntitiesRetained by
Target
EntitiesNot Mapped
Top-DownAnalysis
Entitiesby System
Existing Documentation
IdentifyUnique
& RedundantEntities
Legacy Data
Records &Elements
Current System Models
CurrentCurrent--toto--Target Data MappingTarget Data Mapping
Program-to-function mapping helps determine level of legacy application conformance to target architecture.
CurrentPrograms
CurrentFunctions
TargetFunctions
PROGRAM 1
PROGRAM 2
PROGRAM 3
FUNCTION 1
FUNCTION 2
FUNCTION 3
FUNCTION 4
FUNCTION 5
FUNCTION A
FUNCTION B
FUNCTION C
FUNCTION D
FUNCTION EMANUAL
NoNoMapMap
Program / Function GAP AnalysisProgram / Function GAP Analysis
Determining Functionality: Determining Functionality: Reverse Requirements TracingReverse Requirements Tracing
Determines where certain functions are performed across a system
SystemComponent
TracingUser I/O Review
& Analysis& AnalysisSystem Function
Breakdown
Input /OutputReview
Documentation Reports
PROGRAM SOURCE CURRENT PROCESS CURRENT FUNCTION TARGET FUNCTION
FORM 004 - Create current function / process hierarchy - establish current functions
Purchasing
Sending/Receiving
Financial Services
Inventory
Manufacturing
Etc...
Purchasing DepartmentVendor / Product Report Date
Vendors/Products Added xxxxxxxx 999999 xxxxxxxx 99/99/99
Vendors/Products Changed xxxxxxxx 999999 xxxxxxxx 99/99/99
Vendors/Products Discontinued xxxxxxxx 999999
Reverse requirements tracing determines application functionality by tracking user views back into the source code.
Source: USRM / Comsys
Reverse Requirements Tracing of FunctionsReverse Requirements Tracing of Functions
PROGRAM SOURCE CURRENT PROCESS CURRENT FUNCTION TARGET FUNCTION
FORM 004 - Creating current function / process hierarchy - establishing current processes
Purchasing
Purchasing
Purchasing
Purchasing
Purchasing
Sending/Receiving
Sending/Receiving
Inventory
Inventory
Manufacturing
Manufacturing
Manufacturing
Sending/Receiving
Select vendor / product
Change vendor / product
Roll off vendor / product
Order supplies
Pay vendors
Track vendor shipments
Disperse supplies
Maintain supply stock
Request supplies
Ship corporate products
Manage materials
Request supplies
Create products
Purchasing DepartmentVendor / Product Report Date
Vendors/Products Added xxxxxxxx 999999 xxxxxxxx 99/99/99
Vendors/Products Changed xxxxxxxx 999999 xxxxxxxx 99/99/99
Vendors/Products Discontinued xxxxxxxx 999999
Reverse requirements tracing abstracts application functionalityReverse requirements tracing abstracts application functionality by by tracking user views back into the source code. tracking user views back into the source code.
Source: USRM / Comsys
Reverse Requirements Tracing of Logical ProcessesReverse Requirements Tracing of Logical Processes
Current-to-target functional analysis maps legacy programs, processes and functions to target architecture functional definitions.
PROGRAM SOURCE CURRENT PROCESS CURRENT FUNCTION TARGET FUNCTION
Mapping functions to program source modules
Purchasing
Purchasing
Purchasing
Purchasing
Purchasing
Sending/Receiving
Sending/Receiving
Inventory
Inventory
Inventory
Manufacturing
Manufacturing
Manufacturing
Sending/Receiving
Sending/Receiving
Manufacturing
Manufacturing
Select vendor / product
Change vendor / product
Roll off vendor / product
Order supplies
Pay vendors
Track vendor shipments
Disperse supplies
Maintain supply stock
Maintain supply stock
Request supplies
Ship corporate products
Ship corporate products
Manage materials
Manage materials
Request supplies
Create products
Create products
PU300200
PU300200
PU300200
PU300520
PU500000
SR774200
SR600350
INV08040
Manual
INV00100
SR400100
SR400200
MA906600
Manual
MA665000
MA240030
MA240050
Program / Process / Function MapProgram / Process / Function Map
ThreeThree--way vs. Twoway vs. Two--way Mappingway Mapping
CurrentCurrent––toto––targettarget––toto––proposed mapping supports proposed mapping supports package assessments.package assessments.
Legacy
Requirements
Package
Implementation Project PlanningImplementation Project Planning
!! ProjectProject--level analysis establishes detailed level analysis establishes detailed documentation and implementation plandocumentation and implementation plan
!! Essentially becomes first step in a Essentially becomes first step in a modernization projectmodernization project
FUNCTIONALCONDITION
TECHNICAL QUALITY
ORGANIZATIONAL IMPACT
GOOD
POOR
POOR GOOD
LOW HIGH
MAINTAIN /MIGRATE /
INTEGRATE
UPGRADE /CONSOLIDATE
MAINTAIN MAINTAIN
PHASE OUT REPLACEINTEGRATE
ORENHANCE
ENHANCE /CONSOLIDATE
LOWHIGH
High impact systems should be enhanced, consolidated, maintainedor otherwise modernized or otherwise modernized based on business requirements.
Software Option Strategy MatrixSoftware Option Strategy Matrix
Maintenance Replacement EnhancementTechnologyMigrations
Document & assessexisting baseline
Implement stds,methods, procs
Position - formaintainability
Re-document
Personnelreallocation
Port to workstation
Refine testingprocedures
Evaluate options- High level architecture- Package vs. Rewrite
Rewrite / Redevelop- Assess existing base- Build strategy- Position current system- Refine new architecture- Transformation support
Package- Assess/select- Integrate with reverse
engineering support
Positioning as "survival"strategy
Document & assessexisting baseline
- Apply analyzers- Build plan
Implement stds,methods, procs
Position systemsas appropriate
Refine test procedures
Add enhancements
Validate & implement
Document & assessexisting baseline
Determine needs / buildmigration plan
Implement stds,methods, procs
Positioning techniques- Translate- Restructure- Rationalize data defs- Re-aggregation
Transformation support
Validate & implement
Software Change Strategy SummarySoftware Change Strategy Summary
V.IIV.II Application Stabilization & Application Stabilization & RefactoringRefactoring
! Improve source code quality so that it is easier to analyze, modify, debug and test
! Prepare systems for design level and physical component level reuse within targetarchitectures
LegacyApplications
&Data
Documentation, improvement and data integrity scenarios streamline management and upgrade tasks.
Data Integrity•Mining•Cleanup•Consolidation
Application Improvement•Structuring •Rationalization•Modularization
Application Documentation
Application Management & Application Management & Maintenance Facilitation ScenariosMaintenance Facilitation Scenarios
Application StagingApplication Staging
! Establish working versions of production source code
! Establish Positioning configuration management procedures
! Facilitate change control procedures to manage and assimilate production upgrades
! Verifies logical equivalence of retooled source code
! Involves executing comparisons to verify that no functional changes were inadvertently introduced
! It is NOT testing - testing looks for differing results, validation looks for equivalency
! Requires 60 - 70% execution coverage and good test suites
ValidationValidation
Validation testing attempts to automate as much of the process as possible.
OriginalUpgrade
Unit
CapturedReports
ConvertedUpgrade
UnitOriginal Input Data Original or ExpandedInput Data
CapturedScreens
CapturedReports
CapturedScreens
CapturedOutput Data
CapturedOutput Data
AutomatedComparison
Utility
Audit TrailReports
Validation ProcessValidation Process
Conversions & Language Level Conversions & Language Level UpgradesUpgrades
! Focus is on 2nd to 3rd, 3rd to 3rd or 4th to 3rd generation language conversion
! Does not address paradigm shift to objects
Assess Effort & FinalizeWork plan
Prepare Source Code for
Conversion
ConvertSource
Modules
MigrateEnvironmentalComponents
RedocumentApplication
Migrate Data &Data Definition
Language
Validate &Gain UserSign-off
Code StabilizationCode Stabilization
! Delivers stable code with defective constructs removed
! Provides standardized, structured source program logic
! Resolves program level design aberrations
Program DesignReview &
Improvement
CodeRestructuring
Code FlawAnalysis &Removal
Code RestructuringCode RestructuringUNSTRUCTURED STRUCTURED
Restructuring of COBOL is highly automated.
Data Definition RationalizationData Definition Rationalization
• Simplifies system-wide data tracing and analysis• Externalizes data usage and representations• Eliminates definitional redundancy and inconsistency• Facilitates many strategic migration efforts
LiteralExternalization
Field & RecordSize Expansion
Physical DataUpgrade
Data NameRationalization
Data DefinitionMigration
Field & Record Size ExpansionField & Record Size Expansion
!! Expands business data and related definitionsExpands business data and related definitions!! Includes physical data and all definitions of Includes physical data and all definitions of
that datathat data!! Examples: area codes, bar codes, dollar Examples: area codes, bar codes, dollar
amounts, datesamounts, dates!! This is a businessThis is a business––driven initiativedriven initiative
Field ExpansionOption
Combined Rationalization / Field Combined Rationalization / Field Expansion ViewExpansion View
ExistingSource
CompositeRecord
NewSource
FieldExpansion
Trace
ApplyDescriptive
Names
DataDefinitionAnalysis
PropagateComposite
CompositeField
Expansion
SecondaryTrace &
Propagation
ExpandFields
ReviewAnalysis
BuildComposite
Literal ExternalizationLiteral Externalization
!! Finds embedded business dataFinds embedded business data!! Places it into user Places it into user –– modifiable tables or modifiable tables or
databasesdatabases!! Examples: dates, plantExamples: dates, plant--codes, areacodes, area--codes, codes,
interest rates, etc.interest rates, etc.
Code Slicing & ModularizationCode Slicing & Modularization
!! Slicing allows analysts to eliminate or Slicing allows analysts to eliminate or segregate portions of a programsegregate portions of a program
!! Modularization realigns application source Modularization realigns application source code / functionality physicallycode / functionality physically
!! First step towards Services Oriented First step towards Services Oriented Architecture (SOA)Architecture (SOA)
!! Techniques maintenance, redesign, migration Techniques maintenance, redesign, migration and package deploymentand package deployment
Code Slicing TechniquesCode Slicing Techniques
• Isolates logic into new modules• Supports functional modularity• Simplifies maintainability for large programs• Supports redundancy reconciliation and re-aggregation
Obtain / AccessSlicing
Analysis
SelectSlicingCriteria
PerformSlice
Review Results& Repeat
as Required
Perform QualityReview &Validate
Slice byProcedure
Range
Slice byReportCriteria
Slice byComputation
Variable
Slice byTransaction
Criteria
Slice byStatementSelection
Current System Re-aggregated System
FunctionA
FunctionA
FunctionC
FunctionD
FunctionB
Function A
Function C
Function B
Function D
FunctionB
Functions can be split out and recombined to modularize application functionality.
Systems ModularizationSystems Modularization
V.III Architecture TransformationV.III Architecture Transformation
! Leverage existing applications to facilitate multiple redevelopment scenarios
! Reuse, where applicable, system and program level artifacts
! Improve the integrity and completeness of new systems
! Shorten / streamline application development process
! Facilitate application integration efforts
Architecture Modernization Architecture Modernization OptionsOptions
Modernization options include data and business rule capture, Modernization options include data and business rule capture, consolidation, redesign, validation and redeployment.consolidation, redesign, validation and redeployment.
Legacy Architecture
Data Consolidation
&Abstraction
DeployNew &
DeactivateLegacy
Architecture
BusinessRule Capture &Consolidation
Target Architecture
Design
StrategicRequirements
TargetArchitecture
Validate TargetRequirements
Rule / DataSynchronization
Redesign & ReRedesign & Re--Specification Specification
Adopted from Al Travis / CSC Index
Current Systems Target System
Planning
Construction
Analysis
Design
Planning
Construction
Analysis
Design
BusinessStrategies
Top-down, target data model
Bottom-up, legacydata model
Deliverables• Integrated top-down, bottom-up
data model• Gap analysis determining missing
data entities & attributes• Reconciliation of inconsistent data
usage• An understanding of legacy to target
data migration requirements
Consolidating topConsolidating top--down and bottomdown and bottom--up data models produces a higher up data models produces a higher quality data architecture and increases likelihood of project suquality data architecture and increases likelihood of project success.ccess.
Building a High Integrity Data ArchitectureBuilding a High Integrity Data Architecture
Functional Mapping Process• Expand I/A functional decomposition• Expand I/A current to target mapping• Complete current to target gap analysis• Develop integrated functional
decomposition & CRUD matrix
Top Down Inputs• I/A Functional Decomposition• Logical Data Model• I/A Functional Mapping
Bottom Up Inputs• Source code, screen layouts & JCL • Screen & report layouts• I/A assessment results
Deliverables• Detailed mapping of reusable
source code components• Identification of reusable I/O• Integrated functional structures
& data / functional matrix
Logical Functional Mapping ProcessLogical Functional Mapping Process
Functional DerivationFunctional Derivation
!! Functional analysis now extends to the Functional analysis now extends to the business logic / business rule levelbusiness logic / business rule level
!! Requires extraction, filtering, packaging and Requires extraction, filtering, packaging and analysis of business logicanalysis of business logic
!! Services as basis for validation of target Services as basis for validation of target functional models and other scenariosfunctional models and other scenarios
Business Rule Derivation: Extending Business Rule Derivation: Extending Functional DecompositionFunctional Decomposition
!! Business Logic: Bounded set of conditional and Business Logic: Bounded set of conditional and imperative statements that relies on and directly imperative statements that relies on and directly or indirectly impacts business dataor indirectly impacts business data
!! Business Rule (Systems View): Description of Business Rule (Systems View): Description of how a business workshow a business works
!! The Challenge: Capturing and filtering business The Challenge: Capturing and filtering business logic to achieve business rule candidates logic to achieve business rule candidates
Business Rule Derivation: Logic Capture, Business Rule Derivation: Logic Capture, Filtering, Packaging and AnalysisFiltering, Packaging and Analysis
!! Capture: Process of capturing logic blocks that Capture: Process of capturing logic blocks that serves as business rule candidatesserves as business rule candidates
!! Filtering: Eliminating nonFiltering: Eliminating non--business logicbusiness logic!! Packaging: Putting logic into a context that Packaging: Putting logic into a context that
makes sense to business and design analystsmakes sense to business and design analysts!! Analysis: Categorizing, leveraging and reusing Analysis: Categorizing, leveraging and reusing
captured business rulescaptured business rules
Cobol Business Rule CandidateCobol Business Rule CandidateB9000B9000--POSTPOST--8000.8000.
* CALCULATE CURR AND OUTPUT ACCOUNT BALANCE TO POSTING SUSPENSE * CALCULATE CURR AND OUTPUT ACCOUNT BALANCE TO POSTING SUSPENSE VSAMVSAMPERFORM B9050PERFORM B9050--CALCCALC--MONTHLYMONTHLY--CHARGES THRU B9050CHARGES THRU B9050--EXIT.EXIT.
IF DDACCTIF DDACCT--ACCTACCT--SRVCSRVC--CHGCHG--FL NOT = “W” AND “G” AND “X”FL NOT = “W” AND “G” AND “X”
IF HEA1010AIF HEA1010A--ACCTACCT--BAL = ZEROBAL = ZERO
COMPUTE HEA1010ACOMPUTE HEA1010A--ACCTACCT--BAL = DDACCTBAL = DDACCT--ACCTACCT--BAL BAL –– (WS(WS--TOTTOT--MONTHLYMONTHLY--CHARGES * 2)CHARGES * 2)
IF HEA1010AIF HEA1010A--ACCTACCT--BAL < ZEROBAL < ZERO
PERFORM U8010PERFORM U8010--CALCCALC--PENALTYPENALTY THRU U8010THRU U8010--EXITEXIT
MOVE “Y” TO HEA1010AMOVE “Y” TO HEA1010A--PENALTYPENALTY--FLFL
COMPUTE HEA1010ACOMPUTE HEA1010A--ACCTACCT--BAL = HEA1010ABAL = HEA1010A--ACCTACCT--BAL BAL –– WSWS--TOTTOT--PENLTYPENLTY--CHGCHG
ELSE NEXT SENTENCEELSE NEXT SENTENCE
ELSEELSE
COMPUTE HEA1010ACOMPUTE HEA1010A--ACCTACCT--BAL = DDACCTBAL = DDACCT--ACCTACCT--BAL BAL –– WSWS--TOTTOT--MONTHLYMONTHLY--CHARGESCHARGES
IF HEA1010AIF HEA1010A--ACCTACCT--BAL < ZEROBAL < ZERO
PERFORM U8010PERFORM U8010--CALCCALC--PENALTYPENALTY THRU U8010THRU U8010--EXITEXIT
MOVE “Y” TO HEA1010AMOVE “Y” TO HEA1010A--PENALTYPENALTY--FLFL
COMPUTE HEA1010ACOMPUTE HEA1010A--ACCTACCT--BAL = HEA1010ABAL = HEA1010A--ACCTACCT--BAL BAL –– WSWS--TOTTOT--PENLTYPENLTY--CHGCHG
ELSE NEXT SENTENCEELSE NEXT SENTENCE
ELSE IF DDACCTELSE IF DDACCT--ACCTACCT--SRVCSRVC--CHGCHG--FL = “W”FL = “W”
MOVE WSMOVE WS--TOTTOT--MONTHLYMONTHLY--CHARGES TO HEA1010ACHARGES TO HEA1010A--SRVCSRVC--CHCH--DFRDFR--HLD.HLD.
**** DISABLED 05/03/89 BY BGG **** DISABLED 05/03/89 BY BGG –– HANDLED DIFFERNTLY NOWHANDLED DIFFERNTLY NOW
****** ELSE IF DDACCTELSE IF DDACCT--ACCTACCT--SRVCSRVC--CHGCHG--FL = “G”FL = “G”
****** MOVE WSMOVE WS--TOTTOT--MONTHLYMONTHLY--CHARGES TO HEA1010ACHARGES TO HEA1010A--SRVCSRVC--CHCH--GICGIC--HLD.HLD.
PERFORM B9100PERFORM B9100--FILLFILL--SGMENTSGMENT THRU B9100THRU B9100--EXIT.EXIT.
PERFORM B9200PERFORM B9200--OUTPTOUTPT--POSTPOST THRU B9200THRU B9200--EXIT.EXIT.
B9000B9000--EXIT. EXIT.EXIT. EXIT.
Sco
pe o
f bus
ines
s ru
le c
andi
date
Rules can be reused as-is or as basis for legacy redesign.Source: Netron, Inc. 2002
Non-Business Logic Non-Business Logic IdentificationSyntactically dead code Logic never executed regardless of data values.
Semantically dead code Logic not executed based on setting of data values.
Program initialization Logic that initializes element or record area values.
Input / output logic Code accessing physical data. Includes call, read, write and other I/Ostatements.
Output area build Logic that moves data to screen and report work areas.Status checking Tests directly after I/O commands checking communication or other
status codes.Error handling Imperative logic that invokes exception reporting or module
termination based on status code results.Data manipulation Database or file manipulation logic.
Environmental logic Manages security, homegrown technology, date handling or similarroutines.
Extraneous logic Redundant conditionals, mutually exclusive tests or similar routines.
Business Logic Must be Filtered From NonBusiness Logic Must be Filtered From Non--Business LogicBusiness Logic
Filtering guidelines help analysts separate business from non-business logic – a key step in rule derivation.
Extracted & Packaged Business LogicExtracted & Packaged Business Logic
System / Application Name: Accounting / Accounts Receivable
Program Name: PGREG117
Paragraph Name: REGION-VALIDATION
Data Element Search Argument: Element = REGION-CODE
Logic:IF REGION-CODE NOT = ZEROAND ACCOUNTING-CLEARANCE NOT = ZERO
ADD WS-VALIDATION-AMT (WRK-SUB) TO RGN-TOTAL (IE-REGION).
Logic Analysis Leads to Reusable Logic Analysis Leads to Reusable Business Rule CandidatesBusiness Rule Candidates
System / Application Name: Accounting / Accounts Receivable
Program Name: PGREG117
Paragraph Name: REGION-VALIDATION
Business Rule: REGION VALIDATIONPrecondition: REGION CODE is not a Zero (i.e,. a valid REGION)Trigger: ACCOUNTING CLEARANCE is not a Zero
(i.e, a valid CLEARANCE)Postcondition: REGIONAL ACCOUNTING TOTAL
is increased by VALIDATION AMOUNT
IF DDACCT-ACCT-SRVC-CHG-FL NOT = “W” AND “G” AND “X”
IF HEA1010A-ACCT-BAL = ZERO
COMPUTE HEA1010A-ACCT-BAL = DDACCT-ACCT-BAL – (WS-TOT-MONTHLY-CHARGES * 2)
IF HEA1010A-ACCT-BAL < ZERO
PERFORM U8010-CALC-PENALTY THRU U8010-EXIT
MOVE “Y” TO HEA1010A-PENALTY-FL
COMPUTE HEA1010A-ACCT-BAL = HEA1010A-ACCT-BAL – WS-TOT-PENLTY-CHG
ELSE NEXT SENTENCE
ELSE
COMPUTE HEA1010A-ACCT-BAL = DDACCT-ACCT-BAL – WS-TOT-MONTHLY-CHARGES
IF HEA1010A-ACCT-BAL < ZERO
PERFORM U8010-CALC-PENALTY THRU U8010-EXIT
MOVE “Y” TO HEA1010A-PENALTY-FL
COMPUTE HEA1010A-ACCT-BAL = HEA1010A-ACCT-BAL – WS-TOT-PENLTY-CHG
ELSE NEXT SENTENCE
ELSE IF DDACCT-ACCT-SRVC-CHG-FL = “W”
MOVE WS-TOT-MONTHLY-CHARGES TO HEA1010A-SRVC-CH-DFR-HLD.
Business Rule Mapping to Target Business Rule Mapping to Target ArchitectureArchitecture
In this example, Account Balance is the query item with rules as follows:- Find all ACCT-BALANCE & related variables- Capture rule back to first “IF” & down to end of test.
Business rules will be based on queries from top-down architecture team.
ADM Analysis Tool•Business Rule description is mapped
to Business Rule Query•Rule can then map to Process
ANALYSISREPOSITORY
Redundancy Tracking & Redundancy Tracking & ConsolidationConsolidation
!! Should address unnecessary data and Should address unnecessary data and functional redundanciesfunctional redundancies
!! Streamlining / consolidating redundancy Streamlining / consolidating redundancy requires ROI analysisrequires ROI analysis
!! Process is tool supported but must be businessProcess is tool supported but must be business--drivendriven
VI. VI. Modernization Tool Mapping to TasksModernization Tool Mapping to TasksAssetMgmt
ReTool/Redeploy
Develop-ment
Mainte-nance
ProcessRedesign
ToolFeature
Method
System Wide AnalysisMaintenance environmentRedevelopment environmentSystem wide summary analysisGeneral purpose repositoryProgram Level AnalysisProcess flow metricsProgram flow diagramsIn-line cross referenceInteractive analysis toolsCode ImprovementCode restructuringData definition rationalizationRemodularization toolsPhysical data migrationModel Based ToolsBusiness planning toolsAnalysis toolsDevelopment toolsDesign toolsReverse engineering toolsIntegration Tools
X
XX
X
X
XX
X
XX
X
XX
X
XX
XX
X
X
X
X
X X X
X XX
X
X
X
X
X
XX
XX
X
VII. Modernization ScenariosVII. Modernization Scenarios
!! Scenarios depict practical application of Scenarios depict practical application of transformation discipline, tools and strategiestransformation discipline, tools and strategies
!! Scenarios have a businessScenarios have a business--driven project focus driven project focus and are typically delivered in phasesand are typically delivered in phases
!! Case studies reflect actual project resultsCase studies reflect actual project results
12 Modernization Scenarios*12 Modernization Scenarios*I.I. Application Portfolio ManagementApplication Portfolio ManagementII.II. Application ImprovementApplication ImprovementIII.III. LanguageLanguage--toto--Language Conversion Language Conversion IV.IV. Platform Migration Platform Migration V.V. NonNon--Invasive Application Integration Invasive Application Integration VI.VI. Services Oriented Architecture Transformation Services Oriented Architecture Transformation VII.VII. Data Architecture MigrationData Architecture MigrationVIII.VIII. Application & Data Architecture ConsolidationApplication & Data Architecture ConsolidationIX.IX. Data Warehouse DeploymentData Warehouse DeploymentX.X. Application Package Selection & Deployment Application Package Selection & Deployment XI.XI. Reusable Software Assets / Component Reuse Reusable Software Assets / Component Reuse XII.XII. ModelModel--Driven Architecture Transformation Driven Architecture Transformation
* Modernization Scenario White Paper -- http://adm.omg.org/adm_info.htm#white%20papers
System
Sub -system
Jobstep
On - linetransition
Load Source
RecordElement
Attribute
File
Database
FunctionBusinessrule
Procedure
Field
Event
Entity
Menu /Screen
Third Party
BusinessUnit
Business processBatch
job
Object /component
System
Sub -system
Jobstep
On - linetransition
Load Source
RecordElement
Attribute
File
Database
FunctionBusinessrule
Procedure
Field
Event
Entity
Menu /Screen
Third Party
BusinessUnit
Business processBatch
job
Object /component
Scenario I. ApplicationScenario I. ApplicationPortfolio ManagementPortfolio Management
Application & businessenvironment
Existing SystemsMeta-Model
Queries, metrics& reports
Analysis, refactoring &transformation Tools
Objective: Establish multi-dimensional knowledge base for managing & transforming applications.
Repository
Application PortfolioApplication PortfolioManagement ScenarioManagement Scenario
!! Large IT portfolio, difficult to navigateLarge IT portfolio, difficult to navigate!! Legacy systems poorly documentedLegacy systems poorly documented!! CrossCross--functional / crossfunctional / cross--application project application project
being proposedbeing proposed!! Outsourcing plan proposedOutsourcing plan proposed
Issues:Issues:
Strategy:Strategy:!! Document crossDocument cross--functional applications and functional applications and
relation to business functions in relevant relation to business functions in relevant business units using repositorybusiness units using repository
Application Portfolio ManagementApplication Portfolio Management
Enterprise wide analysis scenario inventories systems portfolio, defines functional /physical boundaries and supports enterprise level transition planning.
HumanResources
Accounting& Revenues
InventoryControls
Back OfficeProcessing
Sales &Marketing
Application Application Portfolio Management: Portfolio Management: Information Capture & ManagementInformation Capture & Management
Parse & LoadFacility
LegacyApplications Access to on-line
Documentation
Repository
Physical / LogicalMapping &
Impact analysis
A/R
CLAIMS
H/R
ModernizationTools
Structure, rationalize,streamline, stabilize
& otherwise refactor
Scenario II. Scenario II. Application ImprovementApplication Improvement
Objective: Create a stabile foundation for managing, enhancing or modernizing systems. Reduce application fragility, increase quality.
Redundant / poorly defineddata & process definitions
Rationalized, structuredstreamlined source code
Application Improvement ScenarioApplication Improvement Scenario
!! Systems and programs hard to change and Systems and programs hard to change and understandunderstand
!! Poorly structured, designed source programsPoorly structured, designed source programs!! Data definitions redundant, and hard to Data definitions redundant, and hard to
understandunderstand
Issues:Issues:
Strategy:Strategy:!! Analyze and cleanup volatile programs and Analyze and cleanup volatile programs and
systemssystems
Application Improvement ScenarioApplication Improvement ScenarioConvert, stabilize, structure, and/or slice selected modules in highly modified systems
Rationalize data definitions across systems of interest – determined during assessment
Data Definition Rationalization
Process
Interim GUI data design effort
Strategic data modeling effort
Rationalized source code
Converts source code to new language or language level with run time environment
Scenario III. LanguageScenario III. Language--toto--Language Language Conversion Conversion
Scenario IV. Platform Migration Scenario IV. Platform Migration Objective: Convert applications to new language and / or run time platform. Scenarios can be performed separately or together.
Scenario III:
Migrates application to new hardware and / or operating system
Scenario IV:
Rehosting ScenarioRehosting Scenario
! Current platform obsolete or inaccessible! Shared / relational databases require redesign! Preference is to not rebuild - but to stay in code
based environment
Issues:
Strategy:! Develop and implement phased migration plan
Rehosting Scenario ProcessRehosting Scenario Process
Finalize Code BasedClient/Server System
Develop AssessmentProposal
Assess MigrationRequirements
Finalize Code BasedMigration Plan
Prepare Systems forCode Based Migration
Stabilize ApplicationCode
Standardize SystemWide Data Definitions
Remodularize SelectedSource Code
Finalize Client/ServerDesign
Redesign & ImplementSource Programs
Build Client/ServerMigration Plan
SOURCE: TSRM / JAMES MARTIN & CO.
Host based system is redesigned to the extent required to move it to Web-basedenvironment - includes relational redesign of data structures.
Host BasedEnvironment
Client / ServerEnvironment
Character BasedFront-end
RedesignedDBMS
Legacy FileStructures
GUI Front-end
File Redesign& Migration
Character Interface to Web
SourceMigration
SourceStabilization
EnvironmentalFinalization
Rehosting Scenario Rehosting Scenario -- Target Target ArchitectureArchitecture
Re-aggregation slices input/edit/validation logic and creates standaloneroutines to be ported to workstation environment
Remodularization
• Isolates I/O functions• Isolates edit / validation logic• Eliminates host related logic
Host to N-Tier remodularization
Monolithic Legacy System
Isolated / Consolidated I/O& Routines
Rehosting Modularization ApproachRehosting Modularization Approach
Scenario V. NonScenario V. Non--Invasive Application Invasive Application Integration Integration
Objective: Create the option of accessing host applications & data via Web-based interfaces*.
Host BasedApplication
InputEdits
OutputBuild
Web Front-end Host / Server Web Front-end
LegacyDBMS
Legacy FileStructures
Network Network
Mid
dlew
are
Mid
dlew
are
*Non-invasive approach only impacts front-ends. Underlying architecture remains intact.
EAI ScenarioEAI Scenario
!! Users cannot access backUsers cannot access back--end application end application functionalityfunctionality
!! Existing systems are not conducive to WebExisting systems are not conducive to Web--based access and ebased access and e--business requirementsbusiness requirements
Issues:Issues:
Strategy:Strategy:!! Build frontBuild front--end with backend with back--end connectivity to end connectivity to
address user requirementsaddress user requirements
Integration via XML Case StudyIntegration via XML Case Study
!! Situation: Manual reporting from frontSituation: Manual reporting from front--end to legacy backend to legacy back--endend!! 2525--year old MVS/CICS/390 systemyear old MVS/CICS/390 system!! WebWeb--based Java Applet interface through Oracle Databasebased Java Applet interface through Oracle Database!! Reports generated by frontReports generated by front--end Webend Web--based systembased system!! Data manually reData manually re--keyed into MVS Backkeyed into MVS Back--end end
!! Relativity Solution:Relativity Solution:!! Knowledge Mining of business logic establishing connectivity betKnowledge Mining of business logic establishing connectivity between ween
mainframe and Websphere frontmainframe and Websphere front--end end !! Developed “Mediator” to determine 3270 or Web callsDeveloped “Mediator” to determine 3270 or Web calls!! “Mediator” enabled XML data stream flow from Web, translated int“Mediator” enabled XML data stream flow from Web, translated into o
BMSBMS!! Transaction message sent back in XMLTransaction message sent back in XML
Source: Relativity
Batch to Online ClaimsBatch to Online ClaimsProcessing Case StudyProcessing Case Study
!! Situation: Largest health insurance contract in nation Situation: Largest health insurance contract in nation serving 50% of government employeesserving 50% of government employees!! 2020--year old IBM S/390 mainframes, VSAM, DB2, year old IBM S/390 mainframes, VSAM, DB2,
3 million lines of code3 million lines of code!! Claim processing nightly Claim processing nightly –– batch systembatch system
!! RelativityRelativity Solution:Solution:!! Links mainframe to thinLinks mainframe to thin--client w/ web front endclient w/ web front end!! IBM MQ messaging, WebSphere, Java Server PagesIBM MQ messaging, WebSphere, Java Server Pages!! Online, realOnline, real--time accesstime access!! Restructured COBOL, new JavaRestructured COBOL, new Java--based programsbased programs
Source: Relativity
Re-aggregation slices input/edit/validation logic and creates standaloneroutines to be ported to workstation environment
Modularization
• Isolates I/O functions• Isolates edit / validation logic• Creates portable I/O validation
routines
Host Application Processing
Monolithic Legacy System
Web Front-end Input & Validation
Distributed FrontDistributed Front--End ModularizationEnd Modularization
Host environment remains basically intact while new front-end routineshandle all client interfaces.
Workstation handles Web - based I/O,edits, validation & host interfaces
Host Application Processing
Web Front-end Input &Validation
Host system retains core processinglogic, original TP monitor logic & data access facilities
Note: Uses I/O macro to GUI conversion tool,on-line (CICS) monitor emulation & standardcommunication software (i.e. Micro Focus)
Note: Transaction I/O handling is emulatedby new client environment
Linking Web FrontLinking Web Front--End via HostEnd via Host
Scenario VI. Services Oriented Scenario VI. Services Oriented Architecture (SOA) TransformationArchitecture (SOA) Transformation
Objective: Create a framework for constructing and interlinking back-end systems with the goal of making applications more agile.
Identify, extract,document & publishservices within SOA
framework
Existing applicationsRepository identifying
reusable services
SOAFramework
SOA Transformation RoadmapSOA Transformation Roadmap!! Excavate data meaning & business functionality Excavate data meaning & business functionality
from systems of interestfrom systems of interest!! Stabilize, standardize & structure code as Stabilize, standardize & structure code as
requiredrequired!! Rationalize and (optionally) redesign Rationalize and (optionally) redesign
application dataapplication data!! ReRe--aggregate systems to isolate data access, aggregate systems to isolate data access,
users interface, business logicusers interface, business logic!! Incorporate results into SOA frameworkIncorporate results into SOA framework
Redesigned Data & Modularized Systems Redesigned Data & Modularized Systems Serve as SOA Building BlocksServe as SOA Building Blocks
Order Customer Data InventoryData Data
Data & application architecture designed around functional components
• Applications decompose into single function modules (i.e. services)• Business logic is isolated from I/O and user interface functionality
Common OrderModules Common Customer
Mgmt. Modules
Sub-modules
Sub-modules
Common InventoryMgmt. Modules
Sub-modules
Sub-modules
Sub-modules
Sub-modules
Common DistributionModules
Sub-modules
Sub-modules
Scenario VII. Scenario VII. Data Architecture MigrationData Architecture Migration
Objective: Consolidate, cleanse, redesign & migrate existing data structures to relational database. Refactor applications as required.
Existing data file/ database formats
Rationalizeddata structures
Refactoredapplications
Relationaldata model
Physicaldata design
Physicaldatabase
Data cleansingprocess
Data Architecture Data Architecture Migration ScenarioMigration Scenario
!! Data is scattered, redundantData is scattered, redundant!! Data does not conform to business needsData does not conform to business needs!! Data inaccessible to Web applicationsData inaccessible to Web applications
Issues:
!! Identify relevant data and approachIdentify relevant data and approach!! Design new data architectureDesign new data architecture!! Capture, refine, consolidate and migrate dataCapture, refine, consolidate and migrate data!! Perform phased migration and adjust applicationsPerform phased migration and adjust applications
Strategy:
• Rationalized views used to create integrated, relational database• New database may reside on host or in client/server environment
Target Data Model
Rationalized DataStructures
Relational ModelingRefinements
Data ArchitectureData Architecture Migration ConceptMigration Concept
Re-aggregation slices input/edit/validation logic and creates standaloneroutines
Remodularization
• Isolate I/O functions• Isolate data access / presentation logic•Modularize functions based on
functional assessment
Modularized System
Monolithic System
Isolated / Consolidated I/O& Functions
Data Architecture Migration:Data Architecture Migration:Functional ModularizationFunctional Modularization
Scenario VIII. Application Scenario VIII. Application & Data Architecture Consolidation& Data Architecture Consolidation
OEDist
ProInv
•Integrate, automate common processes •Consolidate & redesign cross-functional data•Migrate baseline systems to new architecture•Identify & consolidate redundant logic•Create & phase in reusable modules
Consolidated data &application architecture
OE Inv DistPro-cure
IntegratedRelationalDatabase
Consolidation tasks
OEDist
ProInv
OEDist
ProInv
OEDist
ProInv
Existing Applications
Objective: Consolidate multiple redundant or related systems into a common data & application architecture.
Consolidation Scenario OverviewConsolidation Scenario Overview
!! Redundant or stovepipe applications cannot share Redundant or stovepipe applications cannot share datadata
!! Segregated functions hindering business agilitySegregated functions hindering business agility!! Redundant applications, data, functions inflating Redundant applications, data, functions inflating
operating costsoperating costs
Issues:
Strategy:
!! Design integrated target architectureDesign integrated target architecture!! Develop and perform phased migration of relevant Develop and perform phased migration of relevant
applicationsapplications
Consolidation ApproachConsolidation Approach
POSITIONING STEPSStep 1 Code stabilization / restructuring
Step 2 Data name rationalization
Step 3 Redundancy reconciliation & re-aggregation
Step 4 Client/server architecture finalization
TRANSFORMATION STEPSStep 5 Redevelop person management sub-system
Step 6 Transform base payroll functions
Step 7 Transform base pension functions
Step 8 Transform base insurance functions
Step 9 Finalize target functionality / deploy integrated system
TargetArchitecture
Architecture
"Personnel System Example"
Phased Consolidation: Phased Consolidation: One Application From ManyOne Application From Many
Existing Applications
Business Unit 1
Business Unit 2
OEDist
ProInv
•Integrate & automate common processes across business units•Consolidate & redesign cross-functional data•Migrate baseline systems to new architecture•Migrate & consolidate subsequent business unit applications under new architecture•Web-enable selected user interfaces as required
TargetArchitecture
OE Inv DistPro-cure
IntegratedRelationalDatabase
Integration &Transformation Tasks
OEDist
ProInv
OEDist
ProInv
Business Unit 3
OEDist
ProInv
Baseline Applications
Extract, analyze, transform validate & load
End user access tocross-functional data
Scenario IX.Scenario IX.Data Warehouse DeploymentData Warehouse Deployment
Objective: Create non-operational, consolidated view of data & make this data available to business users in ad hoc formats.
Integrated, rationalized,relational view of
abstracted data
Data Integration / Data Warehouse Data Integration / Data Warehouse ScenarioScenario
!! Users find data inaccessible, hard to decipherUsers find data inaccessible, hard to decipher!! Save data stored across multiple systems, Save data stored across multiple systems,
databasesdatabases
Issues:Issues:
Strategy:Strategy:!! Extract and consolidate relevant data and make Extract and consolidate relevant data and make
it accessible to endit accessible to end--users, customersusers, customers
Data Integration / Data Warehouse ScenarioData Integration / Data Warehouse Scenario
Develop IntegratedGraphical Front-End
Develop AssessmentProposal
Assess Current SystemMeta-Data
Build User DataQuery Plan
Rationalize Cross SystemData Representations
Rationalize DataRepresentations
Finalize IntegratedData Architecture
Complete Front-end& Server Design
Deploy User DataQuery Capability
Build Graphical UserInterface Plan
SOURCE: TSRM / JAMES MARTIN & CO.
Selective migration / integrationof cross-functional data
End user access to cross-functional data
Data Warehouse ConceptData Warehouse Concept
• Data definitions are rationalized across systems of interest• Composite views are used as basis for integrated extract database design
Cross ApplicationData Name
RationalizationProcess
Cross system extract databasedata design effort
Sys C
Warehouse Scenario Composite Warehouse Scenario Composite Record Capture RationalizationRecord Capture Rationalization
• Rationalized data views used to create integrated, relational extract database• Extract database may reside on host or be downloaded to client environment• Extract programs are developed to load & refresh extract data
Integrated Data Modelto Support Host Resident
Queries
Rationalized LegacyComposite Records
Relational ModelingRefinements
Developing WarehouseDeveloping Warehouse
Data Warehouse: Data Warehouse: Data Extraction ProcessData Extraction Process
1995 TSG, Inc. All Rights Reserved
Extraction & consolidation routines (in-houseor commercial tools) must also purify extractdata as defined during target attribute model
Warehouse Environment
Operational Data:Extract, Transform & Load
GUI Front-end Routines
Scenario X. Application Package Scenario X. Application Package Replacement ScenarioReplacement Scenario
!! Current systems not meeting business needsCurrent systems not meeting business needs!! Packages under reviewPackages under review
Issues:
Strategy:!! Assess package candidate inabilityAssess package candidate inability!! Map selected package to legacy environmentMap selected package to legacy environment!! Perform phased package deployment and Perform phased package deployment and
legacy deactivationlegacy deactivation
Package selection and replacement options can leverage or ignore legacy architectures. Option 5 uses the legacy architecture as the baseline for the new application as an alternative to licensing and implementing a package.
Replacement Option Utilizes LegacyAnalysis Techniques
Reuses LegacyApplication in Target
Architecture1. Standard Package Selection No No
2. Package Selection with GapAnalysis
Yes No
3. Standard PackageImplementation
No No
4. Package Implementation withGap Analysis & Legacy Reuse
Yes Yes
5. Legacy Consolidation &Migration to Target Architecture
Yes Yes
Basic Package Replacement OptionsBasic Package Replacement Options
Application Package Selection & Application Package Selection & Deployment Deployment –– phase onephase one
Legacy Application Functionality
PackageAssessment
Functionality of Proposed Packages
StrategicRequirements
Package Selection Results & Plan
Func d
Func g..............
Func eFunc f
Func aFunc bFunc c
BusFunction
Source REQ
PK1
PK2
PK3
LEG
XXX
XXX
XX--XXX
XX
X
X
XXX
X
X
X
X
XXX
XXX
XX--
X
X
XXX
Objective: Provide objective analysis of how well various packages meet strategic information requirements.
Application Package Selection & Application Package Selection & Deployment Deployment –– phase twophase two
Retain / Integrate with package
Discard / Deactivate
CurrentSystemFunctionality
Verify integrity ofstrategic requirements
Strategic Requirements
Add new functionsto package
Implement/ Integrate
Package SolutionFunctionality
Do not implement
Objective: Provide a concrete package deployment roadmap.
Scenario XI.Scenario XI. Reusable Software Assets / Reusable Software Assets / Component ReuseComponent Reuse
ExistingApplications
ReuseRepository
DevelopmentProjects &
Web Services
Business Rule& Data
Extraction
ComponentRepository
LanguageMigration Option
Objective: Create a repository of reusable components.
Data / RuleConsolidation
Component Reuse ScenarioComponent Reuse Scenario
!! Desire to move legacy functions to Web servicesDesire to move legacy functions to Web services!! Need to consolidate and reuse legacy functionalityNeed to consolidate and reuse legacy functionality
Issues:
Strategy:!! Define target architectureDefine target architecture!! Perform phased legacy consolidationPerform phased legacy consolidation!! Migrates to componentMigrates to component--based environmentbased environment!! Deploy Web servicesDeploy Web services
Component Reuse TasksComponent Reuse Tasks
!! Address redundancy and reuse issuesAddress redundancy and reuse issues!! Perform consolidation as neededPerform consolidation as needed!! Select, extract and componentize rulesSelect, extract and componentize rules!! Deploy under servicesDeploy under services--based architecturebased architecture
Component Reuse Scenario Case StudyComponent Reuse Scenario Case Study
!! Situation: 30Situation: 30--year old inventory management system year old inventory management system supporting 91 bases worldwidesupporting 91 bases worldwide!! 6000 people accessing Unisys 2200 mainframe daily6000 people accessing Unisys 2200 mainframe daily!! 1.6 million lines of code, maintenance became unfeasible1.6 million lines of code, maintenance became unfeasible!! After 3 years’ efforts, offAfter 3 years’ efforts, off--thethe--shelf software delivered only shelf software delivered only
27% functionality27% functionality
!! RelativityRelativity Solution:Solution:!! Analysis and Knowledge Mining used to remove unused Analysis and Knowledge Mining used to remove unused
code and extract COBOL business rulescode and extract COBOL business rules!! Java components generated from extracted COBOL Java components generated from extracted COBOL
business rulesbusiness rules
Source: Relativity
Scenario XII.Scenario XII. ModelModel--Driven Architecture Driven Architecture TransformationTransformation
Objective: Migrate existing applications to an environment in which systems are maintained in models.
•Extract business rules & data definitions•Purge implementation dependent logic•Rationalize/consolidate data & logic as needed•Migrate/merge extracted logic & data definitions into applicable modelsExisting applications
& data definitionsSample models
RegisterClaim
ApproveClaim
Trigger
ObjectFrom objectdata model
PreconditionEmployee makes
a claim Register claim
TriggerDaily claimreview process
Source: Martin/Odell
InsuredEmployee
Producepacking list
DecrementFGI
Ship orderShip order
Shipping ClerkDrop ship
from remotewarehouse
VIII.VIII. GettingGetting StartedStarted: AssessmentsAssessments
!! Snapshot the enterprise / develop an architecture Snapshot the enterprise / develop an architecture transition strategytransition strategy
!! Objectively gather facts and requirementsObjectively gather facts and requirements
!! Identify hypotheses for various systemsIdentify hypotheses for various systems
!! Build an interim and strategic planBuild an interim and strategic plan
!! Develop a phased migration strategyDevelop a phased migration strategy
GettingGetting StartedStarted: PilotsPilots
! Test drive and refine a selected strategyIntegrate redevelopment task set
! Get the application team on boardVerify tool requirements
! Fine tune validation approach
! Adjust application proposal, contract, workplan and cost justification analysis
Develop and implement a pilot project to:Develop and implement a pilot project to:
! Maintenance is drawing too many resources
" System reliability is an issue
" Integration requirements exist
" Migration to model driven approach is planned
" Any funded project where existing systems could play a minor or major role
A portfolio list identifying systems, platforms, size, & strategic requirements should be kept as a baseline from which to identify redevelopment candidates
Identifying BusinessIdentifying Business--Driven Driven OpportunitiesOpportunities
Business Requirements Drive Business Requirements Drive ValueValue--Based ROIBased ROI
!! Reducing timeReducing time--toto--market for new products market for new products and services and services
!! Shifting to a customerShifting to a customer--driven philosophydriven philosophy!! Streamlining transaction flow across supply Streamlining transaction flow across supply
and distribution chainsand distribution chains!! Creating flexible information systems to Creating flexible information systems to
achieve business agilityachieve business agility
Current State of ROI on IT Current State of ROI on IT ProjectsProjects
!! 83% of companies do not track or measure 83% of companies do not track or measure (ROI) on technology projects.*(ROI) on technology projects.*
!! Companies that measure ROI track time Companies that measure ROI track time lines and costs but not value.*lines and costs but not value.*
!! Value must be determined to assess ROIValue must be determined to assess ROI
* Building and Measuring ROI for Application Integration Projects, Julia King, Computerworld ROI, Brainstorm Business Integration Conference, October 29, 2001
ValueValue--Driven ROI PrinciplesDriven ROI Principles
!! Existing data structures and applications are Existing data structures and applications are highly valued information assetshighly valued information assets
!! Application management and maintenance must Application management and maintenance must consider business value consider business value -- not just IT cost reductionnot just IT cost reduction
!! Rewrite, package replacement and integration Rewrite, package replacement and integration projects must consider legacy information assets projects must consider legacy information assets as key ROI factorsas key ROI factors
!! Projects impacting legacy environments should be Projects impacting legacy environments should be cost justified in phasescost justified in phases
ValueValue--Driven ROI Versus TotalDriven ROI Versus Total--CostCost--ofof--Ownership (TCO)Ownership (TCO)
!! TCO breaks down IT spending by application areaTCO breaks down IT spending by application area!! One study showed TCO increasing $2,300 per One study showed TCO increasing $2,300 per
employee after an ERP implementation*employee after an ERP implementation*!! But if revenue increased $10 million as a result...But if revenue increased $10 million as a result...!! ...the resulting annual cost increase of $1.1 million ...the resulting annual cost increase of $1.1 million
(based on 500 IT personnel) would still return an (based on 500 IT personnel) would still return an ROI of $9 million**ROI of $9 million**
*IT Spending Budget Practices Beyond Service Level Agreements, Gartner Inc., www.gartner.com, 2001**Legacy Systems: Transformation Strategies, William M. Ulrich, Prentice Hall, 2002
The Wrong Project Approach The Wrong Project Approach Results in Negative Project ROIResults in Negative Project ROI
!! At Hershey, a $112 million ERP implementation At Hershey, a $112 million ERP implementation resulted in shipping delays and deliveries of resulted in shipping delays and deliveries of incomplete orders*incomplete orders*
!! This, in turn, caused Hershey’s profits to drop This, in turn, caused Hershey’s profits to drop 19% in one quarter*19% in one quarter*
!! Which increases criticality of selecting the right Which increases criticality of selecting the right approach and delivering it in phases approach and delivering it in phases
*Failed ERP Gamble Haunts Hershey, by Craig Stedman, Computerworld, November 1, 1999
BusinessBusiness--Driven Value Assessment Driven Value Assessment Shifts with Economic ConditionsShifts with Economic Conditions
!! In 2000, top spending priorities at financial service In 2000, top spending priorities at financial service firms: customer relations (37%), competition firms: customer relations (37%), competition (18%), cost savings (14%) and efficiency (10%)*(18%), cost savings (14%) and efficiency (10%)*
!! By 2001, priorities shifted to cost savings (32%), By 2001, priorities shifted to cost savings (32%), efficiency (29%), market share (23%) and efficiency (29%), market share (23%) and customer demands / requirements (15%)*customer demands / requirements (15%)*
!! Customers fell in priority while cost saving Customers fell in priority while cost saving priorities increasedpriorities increased*Budget Season is Here: Financial Services IT Spending is in for Big Changes, by John Hagerty, AMR Research, May 2001
Phased ROI: Reduces Project Risk & Phased ROI: Reduces Project Risk & Helps Manage Shifting PrioritiesHelps Manage Shifting Priorities
!! “Assessing the business value, related costs and “Assessing the business value, related costs and annual projected TCO for a project should be annual projected TCO for a project should be incorporated into a cost model that quantifies ROI by incorporated into a cost model that quantifies ROI by project phase.”*project phase.”*
!! “If a project is put on hold or cancelled due to a shift “If a project is put on hold or cancelled due to a shift in business priorities, that project will have delivered in business priorities, that project will have delivered some value prior to being cancelled.”*some value prior to being cancelled.”*
*Legacy Systems: Transformation Strategies, William M. Ulrich, Prentice Hall, 2002
ValueValue--Based ROI for IT Projects*Based ROI for IT Projects*
*Legacy Systems: Transformation Strategies, William M. Ulrich, Prentice Hall, 2002
! Identify various options to meet a given set of business requirements
! Estimate revenue growth and / or cost savings to be gained from each approach
! Calculate cost of delivering each approach as the implementation cost plus annual operating costs
! Determine “net value” for each option: Subtract project costs from projected annual revenue growth and / or cost savings
Information Asset Management Information Asset Management & Maintenance ROI& Maintenance ROI
!! Application assets must be documented Application assets must be documented whether maintained inwhether maintained in--house or offsitehouse or offsite
!! Proactive upgrade activities can streamline Proactive upgrade activities can streamline delivery of business value or prepare delivery of business value or prepare applications for strategic transformationapplications for strategic transformation
!! Outsourcing / insourcing agreements should Outsourcing / insourcing agreements should incorporate valueincorporate value--added activities added activities -- not just not just cost reductioncost reduction
Transformation Support for Transformation Support for Outsourcing ROIOutsourcing ROI
!! IT cost cutting is currently the driving force IT cost cutting is currently the driving force behind outsourcing initiativesbehind outsourcing initiatives
!! ValueValue--added outsourcing ROI goes beyond added outsourcing ROI goes beyond cost cutting and includes:cost cutting and includes:!! Documenting applications in an open repositoryDocumenting applications in an open repository!! Integrating applications using EAI technologyIntegrating applications using EAI technology!! Upgrading, migrating and / or consolidating Upgrading, migrating and / or consolidating
enterprise data and applicationsenterprise data and applications
Phased ERP Deployment Leverages Phased ERP Deployment Leverages Modernization DisciplinesModernization Disciplines
*ERP: Time for a Rethink, Richard Todd, a white paper from www.max-international.com, June 1998
Phased alternative to standard ERP deployment approach*Phased alternative to standard ERP deployment approach*
! Migrate existing applications to an industry-standard database
! Migrate application front-ends to a client/server environment
! Add core ERP functionality to this environment! Integrate additional ERP features with best-of-breed
solutions