Legacy Systems: Transformation Strategies, 1st edition

  • William M. Ulrich

Unfortunately, this item is not available in your country.


  • Moving legacy systems into the Web-centered future: an intelligent, step-by-step guide
  • Creates a framework to assess, upgrade, and migrate legacy applications and data structures

Leverage your legacy systems for competitive business advantage!

Your legacy systems embody core business knowledge that is difficult to enhance-but impossible to replicate. You've made enormous investments in these systems. They work. But they were never designed for today's high-speed, Web-centered business environments.

In Legacy Systems: Transformation Strategies, you'll discover exactly how to maximize the business value of legacy systems as you build the flexible, high-value, component-based architectures you need to stay competitive. Leading IT and business architecture consultant William M. Ulrich explores:

  • Creating an environment that supports legacy transformation: strategies, organizing disciplines, techniques, and tools
  • Moving incrementally to component architectures: minimizing the risks of deploying J2EE, .NET, and/or Web Services
  • Legacy data and application mining, integration, and transformation
  • 7 myths that surround legacy systems: how they can damage or enrich your business-and what to do about it
  • Transition strategies for the new era: how to move forward without abandoning systems that work

The wrong decisions about legacy systems can damage your business-or even destroy it. The right decisions will liberate you to meet tomorrow's business challenges without needless disruption or expense. Make the right decisions: read Legacy Systems: Transformation Strategies.

Table of contents



1. The Modern Enterprise and Legacy Architectures.

The Computer of the Future Meets Reality. Information Technology Is Your Business. Public Sector Recognizes Critical Value of IT. IT Can Disable an Organization. Rapidly Shifting Business and Technological Requirements. E-Business Meets Aging Hierarchies and Infrastructures. No Easy Answers to Difficult Legacy Challenge. Business Agility and Legacy Systems. Redesigning Business Processes-Enabling the Agile Enterprise. The Evolution of Legacy Computing Architectures. The Business Case for Legacy Architecture Transformation. Crafting a Strategy to Address the Legacy Architecture Challenge. Taking on the Legacy Challenge.

2. Defining the Legacy Architecture Challenge.

Legacy Architectures and the Seven Common Myths. Evolving Hardware Architectures. A Brief History of Software Architectures. Embedded and Non-IT Systems. Legacy Application Architectures-An Archaeological Dig. Packaged Applications-Falling Short of Expectations. Application Architectures-A Myriad of Challenges. Data Architecture Challenges. Systems Management, Maintenance, and Outsourcing. Application Architecture's Impact on Business Initiatives. Historical Attempts to Address Legacy Architecture Issues. Addressing the Legacy Architecture Challenge.

3. The Changing Face of Information Technology.

The E-Business Movement-Driving New Technology Deployment. The Information Architecture Framework. Data Architecture-Defining the Essence of the Enterprise. Functional Architecture-Delivering Information Requirements. Business Processes Modeling. UML-The Unified Modeling Language. Modern Technical Architectures. Object-Oriented Analysis, Design, and Development Paradigms. Component-Based Development. Modern Computing Languages. Open Systems-Collaborative Software Development in Action. Integrated Development Environments (IDEs). Agile Methodologies-Balancing Rigor and Flexibility. Collaborative Development. Web Services and Standards. Information Portals-Business-Driven Information Gateways. Distributed Transactional Architecture Platforms. Integration Technology and Interim Architectures. Beyond the Immediate Future. Emerging Disciplines and Legacy Transformation.

4. Legacy Architecture Management and Transformation.

Strategies. The Legacy Triangle-Management, Integration, and Transformation. Legacy Architecture Terminology. E-Business Initiatives Drive Transformation Requirements. Past IT Project Failures Shape Strategy. Holistic Thinking Is Essential. Risk Management Requires Phased Deployment. Transformation Strategy-Putting a Framework in Place. Transformation Scenarios-Project Planning Templates. Application Management Requirements and Scenario Overview. Architecture and Application Documentation Scenarios. Application Improvement Scenarios. Data Integrity Analysis and Improvement Scenarios. EAI: Front-end/Back-End Integration Scenario. Language and Platform Migration Scenarios. User Presentation Migration Scenario. Data Migration and Consolidation Scenarios. Application Consolidation-Reengineering in Place. Package Assessment and Implementation. Component-Based Architecture Migration. Transformation Strategy. Summary.


5. Creating a Legacy Transformation Infrastructure.

Business-IT Alignment Requirements. Looking Past the IT Centralization/Decentralization Argument. IT Realignment-Forming Virtual IT Communities. The Architecture Team-Synchronizing Enterprise IT Initiatives. Creating a Culture of Reuse. The Sponsor, the Champion, and the Evangelist. Role of Third Parties in a Transformation Strategy. Agile Methodologies and Collaborative Project Management. Transformation Methodology. The Transformation Repository. Metrics and Measurement-A Transformation Yardstick. Software Tools and Technology Center of Excellence. Legacy Transformation Skill Center-Training, Education, and Support. Launching a Transformation Awareness Initiative. Transformation Infrastructure-An Essential Foundation.

6. Planning and Justifying a Legacy Transformation Project.

The Transformation ROI Dilemma. Transformation Introduces New Options and Opportunities. ROI Challenges: Cost of Ownership and Shifting Business Priorities. Determining ROI-A Multiphased Process. Motivating Factors in Transformation Projects-Defining Value? Collaborative Project Planning-Team Formation. Collaborative Project Planning-Project Formation. Transformation Project Augmentation and Dual Positioning. Learning from Project Failures. Justifying Transformation Infrastructure Funding. Determining Legacy Application Asset Value. Preliminary Project Planning-Transformation Option Selection. Building the Project Plan. Selling Legacy Transformation-Leveraging Legacy Assets.

7. Legacy Transformation Technology.

Transformation Technology Concepts. Business Modeling Technology. Analysis and Design Modeling Tools. The Environmental Analyzer. The Open Repository. Source Program Analyzers. Application Improvement Tools. Data Definition Analysis and Improvement. Presentation-Layer Extraction and Migration. Reverse Engineering and Reengineering Technology. Validation, Verification, and Testing Technology. Maintenance and Transformation Workbenches. Physical Data Analysis and Migration Technology. EAI Technology. Project Management and Administration Technology. Creating a Software Tool Strategy. Software Tool Justification, Procurement, and Integration.

8. Enterprise and Project-Level Assessments.

Enterprise versus Project-Level Assessments. The Role of Metrics in Assessment Initiatives. Enterprise Assessments-Examining the Big Picture. Strategic Business Planning and Target Architecture Definition. Current Systems Inventory and Legacy Architecture Analysis. Current-to-Target Architecture Mapping. Transformation Strategy Definition. Transformation Projects-The Assessment Phase. The Technical Assessment. The Architectural Assessment. The Functional Assessment Overview. Functional Assessment-Entity Type Analysis. Functional Assessment-Function Hierarchy Analysis. Finalizing the Project Implementation Plan.


9. Incorporating EAI, B2Bi, and BPI into a Comprehensive Integration Strategy.

Integration-Past, Present, and Future. Middleware Technology Overview. ERP Middleware Technology. B2Bi Technology. BPI and BPA Technology. Integration Solution Architecture. Noninvasive Integration Deployment Options. The Role of Legacy Assessments in Noninvasive Integration Initiatives. A Multidimensional Integration and Transformation Strategy. Documenting, Managing, and Uncoupling Integration Implementations.

10. Structuring, Rationalizing, and Upgrading Legacy Applications and Data Structures.

Incorporating Upgrade Options into Business-Driven Projects. Application Staging, Quality Reviews, and Validation Testing. Language-Level Upgrade or Conversion and Application Rehosting. Program Structuring and Design Improvement. Data Definition Challenges and Options. Modularization. User Presentation Migration Scenario. Physical Data Mining, Cleanup, and Integration. Performance Improvement.

11. Logical Data and Business Rule Capture, Redesign, and Reuse.

Architecture Transformation Objectives. Leveraging Assessment and Stabilization Deliverables. Data Architecture Transformation. Legacy Data Definition Capture and Abstraction. Current-to-Target Mapping and Reconciliation. Data Architecture Refinement and Redeployment. Quick and Dirty Data Migration Projects. Object Derivation: Issues and Options. Data Warehouse Considerations. Data Architecture Redesign: A Strategic Opportunity. Business Rule Transformation. Business Rule Definition. Business Rule Categorization. Business Rule Extraction-Setup Requirements. Reverse Requirements Tracing and Process Flow Analysis. Business Rule Identification and Logging. Business Rule Capture and Redundancy Identification. Business Rule: Current-to-Target Mapping, Reuse, and Reconciliation. Architecture Transformation and Reconstruction.

12. Transformation Project Strategies and Case Studies.

Application Consolidation Project. Multi-Application Integration: Rebuilding an HR Application. Package Assessment and Implementation. Application Rehosting Project. EAI Case Study. Logical Data Redesign Project. Component-Based Migration. Ending a Pattern of Failure Requires Changing Behavior.

Appendix: Sample Tool Vendor List.

Section 1: Software Tools by Tool Category. Section 2: Software Tools by Vendor.


Published by Pearson (May 31st 2002) - Copyright © 2002