Search results for "Legacy system"
showing 10 items of 11 documents
Evaluation Framework of Hypertext Access for Program Comprehension Support
2008
Hypertext consists of text fragments connected by links enabling fast nonlinear browsing of the fragments. In case of program text there are many alternative ways to form the fragmentation and linkage. Transient hypertext is a general and well-grounded approach for offering capabilities to form versatile information access support for many kinds of central software maintenance activities. Transient hypertextual access structures (THASs) are data structures formed automatically based on situation dependent information needs of the users of program comprehension support tools. The approach has been implemented in HyperSoft system. It is aimed at supporting legacy software maintenance and comp…
Using Blockchain in Digitalizing Enterprise Legacy Systems: An Experience Report
2021
Blockchain technology and distributed ledger technology (DLT) offer a secure, distributed, and tamper-proof way to store and exchange information. However, apart from standard cryptocurrency-based networks, innovations and process improvements based on the blockchain technology have mostly remained on the conceptualizing stage and have not yet reached mass adoption. There is a high demand for practical experiences from developing blockchain and DLT based systems in various domains outside FinTech. This work seeks to contribute to this gap by presenting real-world experiences from developing a proof of concept for automatizing conditional payments in social benefits and healthcare domains. W…
The Rise of Distributed Artificial Intelligence Through Shared Data and Cloud Solutions
2021
Decision-makers of present times encounter influence by an ever-increasing emotional condition created by social media, market trends, experience, and historical facts. The concept of mixed human and artificial intelligence is one of the most underrated business drivers today, and conspiracy theories, fixed mindset, and legacy systems are slowing down collective evolution. This paper intends to contribute to the everyday awareness of data sharing through cloud solutions and services. It opens a wide range of possibilities for new solutions and insights that endorse a collaborative culture where a growth mindset paired with transparency and ethics reduces time-to-value in businesses, governm…
Semantics for Managing Systems in Heterogeneous and Distributed Environment
2002
The problem of legacy systems collaboration is being solved. Particularly we look at the collaboration as workflow in a distributed and heterogeneous environment. Attention is paid to the description of semantics for workflow process definition languages. There are many solutions how semantics can be decomposed into logical fragments, but the problem of obtaining reusable components that are easy to compile into desired specific semantics still remains. We evolve the division of semantics by semantic aspects whose description is based on abstract data types (pre-built components) and connectors (meta-programs to produce the glue code) between them. This paper offers a way in which semantic …
Assessing Software Replacement Success: An Industrial Case Study Applying Four Approaches
2006
This paper describes an industrial case study assessing software replacement success and other effects. The target of assessments has been a large commercial legacy system for customer register management. The success of its replacement by its performed rewrite has been assessed via four approaches concerning: user satisfaction, strengths and problems of the system, problem surveillance and expert judgments. The approaches and metrics have been selected in cooperation with industrial experts in order that they would meet the needs of their organization. The assessments have been conducted by comparing the situations before and after the rewrite. They have included quality aspects. The appli…
Analysis of Ten Reverse Engineering Tools
2009
Reverse engineering tools can be used in satisfying the information needs of software maintainers. Especially in case of maintaining large-scale legacy systems tool support is essential. Reverse engineering tools provide various kinds of capabilities to provide the needed information to the tool user. In this paper we analyze the provided capabilities in terms of four aspects: provided data structures, visualization mechanisms, information request specification mechanisms, and navigation features. We provide a compact analysis of ten representative reverse engineering tools for supporting C, C++ or Java: Eclipse Java Development Tools, Wind River Workbench (for C and C++), Understand (for C…
Industrial Application and Evaluation of a Software Evolution Decision Model
2007
ENFORCEMENT OF INTER-TASK DEPENDENCIES IN WORKFLOWS, CHARACTERIZATION AND PARADIGM
1998
Workflow techniques have gained a lot of attention as a means to support advanced business applications such as cooperative information systems and process re-engineering but also as a means to integrate legacy systems. Inter-task dependencies, described separately from the other parts of the workflow, have been recognized as a valuable method in describing certain restrictions on the executions of workflows. In this paper, we study the issue of pre-analysing and enforcing inter-task dependencies. The protocol and the theory behind it are presented, along with examples and discussions on ways to improve the performance. The idea is to present the meaning of a dependency through an automato…
Automatic Reengineering in MDA Using Rewriting Logic as Transformation Engine
2005
Legacy systems are information systems that have been developed by means of methods, tools and database management systems that have become obsolete, but they are still being used due to their reliability. As time goes on, the maintenance of this software becomes more complex, expensive and painful. The MOMENT framework supports automatic formal model transformations in MDA. This model transformation approach is based on the algebraic specification of models and benefits from mature term rewriting system technology to perform model transformation using rewriting logic. In this paper, we present how we apply this formal transformation mechanism to recover a legacy relational database, obtain…
IS evolution benefit assessment: Challenges with economic investment criteria
2007
Maintenance and system evolution activities have a significant role in the information system (IS) life cycle. It has been estimated that approximately 80% of the total IT expenses are allocated for maintenance activities [20]. According to Lehman’s first law, maintenance is necessary, because software needs to be continuously improved or it will get out of date and cannot respond to the requirements of its environment [19]. Despite the importance of IS evolution investments, there is a gap between the IT related costs and company profitability [27]. Brynjolfssen [10] described this as a productivity paradox: information technology utilization has increased since the 70’s but simultaneously…