SlideShare a Scribd company logo
1 of 21
Download to read offline
Leave your legacy
Modernize your legacy environment to
enable an agile future-ready enterprise
Speakers
Cameron Jenkins
Global Practice Director, Application
Modernization Services
Dell Services
Greg Ogburn
Senior Solutions Architect,
Application Modernization Services
Dell Services
Jon Payne
Senior Vice President and Chief
Information Officer,
Associated Wholesale Grocers
Shift from cost-savings focus to business agility
Businesses’ ability to scale up 3rd
Platform adoption will require
changes to IT operation that
bring agility and overcome siloed
legacy systems. This will make
agile development the de-facto
norm. - IDC
By 2016, >50% of Application
Modernization efforts will address
business demand for Enhanced
functionality - Gartner
By 2018, agile and iterative
development will require 30%
of resources for application
testing engagements to be on-
site or onshore - Gartner
Research suggests that
business agility is the
new source of business
value - Forrester
Application modernization and increasing
agility will continue to be a solid driver
for Application Development spending, apart
from other emerging dynamics of cloud,
mobility and social computing - Gartner
By 2016, >50% of application
modernization efforts will
address business demand for
enhanced functionality to
legacy applications and not
cost reduction. - Gartner
The primary focus of IT will remain
on the care and operation of the
existing applications, which are the
lifeblood of the enterprise - Gartner
Bimodal will gain
traction for enterprise
strategies - Gartner
What
we’ve
heard…
Modernization drivers
• Streamline operations, reduce maintenance costs
• Manage demand for quality, cost, service, access
• Shift spend from maintenance to innovation
• Regulatory compliance & security
• Speed of response to market changes
• Lack of agility
• Brittle legacy systems hold back innovation
• High-cost legacy platforms
• Complex portfolios
• Performance and scalability
Journey to
simplified
environment via
Application
Modernization
to support
business goals
Outcomes
Future-ready
Digital
Scalable
Business agility
Reduced operating costs
Increased security
Faster response times
Cloud-enabled
Open infrastructure
IT challenges
Business challenges
Journey to a modern environment
x86
Lower cost
Platform
Virtualization
& cloud
Business
Agility
Mobility
Packaged
apps
Analytics
& big data
Security
Rationalization
Strategic
Modernization
Roadmap
Dell Application
Re-hosting
• Preserve existing investments
• Migrate from Mainframe to x86,
UNIX, or Linux on System Z
• Consolidate UNIX applications and
data to Linux or Windows
Dell Application
Re-architecture
• Leverage modern Java or .NET
architecture and packages
• Extract business logic from mainframe,
midrange, and client-server systems
• Retire legacy languages and
infrastructure
Replace
Refresh
Retain
Retire
Current legacy environment
Dell Application Modernization Services
Digital
Target environment
Dell Strategic Modernization Roadmap
Transformation
Programs
Project
Project
Project
Project 1
Project 2
Project 3
Project 5
Project 4
This Planning Cycle
Mnth 1 Mnth 2 Mnth 3 Mnth 4 Mnth 5 Mnth 6 Mnth 7 Mnth 8 Mnth 9 Mnth 10 Mnth 11 Mnth 12
Next Planning Cycle
Mnth 1 Mnth 2 Mnth 3 Mnth 4 Mnth 5 Mnth 6 Mnth 7 Mnth 8 Mnth 9 Mnth 10 Mnth 11 Mnth 12Mnth 1 Mnth 2 Mnth 3 Mnth 4 Mnth 5 Mnth 6 Mnth 7 Mnth 8 Mnth 9 Mnth 10 Mnth 11 Mnth 12
Third Planning Cycle
Mnth 1 Mnth 2 Mnth 3 Mnth 4 Mnth 5 Mnth 6 Mnth 7 Mnth 8
Key: Line Action Start Dependency Value Dependency
Program 5
Program 3
Program 2
Program 4
Program 1
Program 6
Project
Project
Project
Project
Project
Project
Project
Project
Project
Project
Project
Project
Project
Project
Project
Discovery phase
Capture and link strategic
drivers, business capabilities,
code and data in a unified,
transparent model
Analysis phase
Group assets by capabilities,
determine the right trajectories,
and evaluate the program
impacts of technical
dependency and complexity.
Planning phase
Collaboratively develop a
program plan to address
strategic drivers and resolve
technical challenges
Costco
Largest membership warehouse club chain in the US benefits from Dell
Strategic Modernization Roadmap
Business Challenge
The worlds largest AS/400 system is comprised of over 12 million lines of RPG
code and not able to handle Costco’s rapid expansion
Solution
Developed a Strategic Modernization Roadmap for incremental SAP
implementation
Results
• An actionable 7-year program plan to migrate to SAP and retire the AS/400,
with specific integration requirements at each step
• Minimized legacy integration requirements
• Dell Repository automatically monitors changes to the legacy environment
during the 7-year migration
Application re-hosting solutions move existing
business logic and data investments onto
modern platforms.
Dell application re-hosting overview
Mainframe re-hosting details
Open systems IBM z/OS
compatibility stack
IBM z/OS mainframe
environment stack
TN3270
ECI/EPI
JEE
Sockets
SOAP/XML
FTP Interfaces
3270 Access
MQ Interfaces
TN3270
ECI/EPI
JEE
Sockets
SOAP/XML
FTP Interfaces
3270 Access
MQ Interfaces
Migration
components
3rd party infrastructure
VSAM, sequential, GDGs
IBM DB2, IBM IMS-DB
COBOL, PL/I, Easytrieve Plus,
Assembler, other
JCL/JES
IBM CICS, IBM IMS TM
IBM z/OS, IBM z/VSE
3rd Party infrastructure
VSAM, Sequential, GDGs
RDBMS (Oracle, DB2 LUW, SQL
Server…)
COBOL, PL/I, Easytrieve Plus, other
Dell BPE
Batch JCL & JES
Dell TPE
Transaction monitor
Linux, UNIX, Windows
Review / replace
Application logic
Batch environment
Online
environment
Platform
Data migration
Re-host to modern platform
with no change in
functionality
Retain experienced staff
Platform positioned
for future growth at reduced
costs
Minimal
changes
HP StorageWorks XP24000 Disk Array
ALARM
READY
MESSAGE
PUSH
HP StorageWorks XP24000 Disk Array
Mainframe
application
compatibility
middleware
RACF, ACF2, Top Secret Dell TSF, Target OS securitySecurity profiles
Flexible, full-service solution approach
Proven project methodology & risk mitigation process
Dell follows a proven migration methodology consisting of many flexible service offerings that are tailored to meet the business objectives and
technical needs of an organization. The image below shows many of the services that Dell can offer, including many that will be proposed for the
mainframe re-hosting project.
Technical feasibility
and business impact
• Goals and corporate
directives
• Application and
environment
characteristics
gathering
• Preliminary proposal
leading to decision
to proceed
Project methodology
validation
• Asset cataloging
• Assessments
– Source
– Operational
– Infrastructure
• Asset grouping
• Optional custom
workshops
• Optional POCs
Detailed project plan
and implementation
• Infrastructure /
Operational
Implementation
• Application
migration
implementation
• Data migration
tools
• Bridging
Implementation
• Training
• Application retrofit
Final validation and
production cutover
• Baseline
Preparation
• Regression testing
• Performance
testing
• Application
discrepancy
correction
• Production
readiness and
cutover support
Managed services
solutions
• Dell enterprise
product support
and maintenance
• Support triage
• Short term
turnover services
• Managed services
– On-going
application
maintenance &
development
– Help desk
• Managed hosting
Discovery Design Implement Test/Deploy Post implement
Associated Wholesale Grocers (AWG)
Business Challenge
Associated Wholesale Grocers (AWG) was looking to modernize their core
business applications to reduce costs, and prepare to move to the cloud.
Solution
Dell undertook a comprehensive assessment and developed a migration plan
that included moving off a complex IBM infrastructure to an open system.
Results
• Modernized platform supports AWG’s migration to the cloud
• Reduced operating costs by 10%
• Improved disaster recovery capabilities; a recent disaster recovery test
validated that the system works and that the investment was worth it
Re-architecture builds a modern application
framework based on business functionality, then
migrates legacy logic and data into that
framework to deliver business agility and reduce
future costs.
Dell Re-architecture overview
Complete transformation to best practice Java or .NET architecture
Re-architected Java / .NET System
Data Entry &
Report
Transaction Screens
Exception
Screen
Cross-platform
Front end
Daily
Batch
Monthly
Batch
Key Code
Component
System
Interfaces
Stored
Procedure
Shared
Data
Store
Nested
Redefines
Legacy
Data Store
Visible Requirements
Hidden Requirements
Legacy System
Service/Application Layer
• Encapsulates business logic
• Horizontally scalable
• Integrates with packages
Service Bus
Presentation Layer
• Web, modern
• Mobile-ready
Analytics/Reporting Engine
• Self-service
• Business-facing
Data Layer
• Engineered for performance and extensibility
• Relational and/or big data
Job schedule
Infrastructure Layer
• Virtualized or cloud for scalability and flexibility
• Aligned with enterprise standards and investments
Re-architecture method
The Dell Re-architecture difference
Methodology & Tools
Phase 3: Develop & Test
Outcomes:
Modernized & tested application source
code with migrated legacy data. Uses best
practices for SOA and leverages commercial
software packages.
Phase 2: Design
Outcomes:
Validated design. Implement legacy and
enhancement functionality leveraging
modern application and data architecture
Phase 1: Discover & Plan
Outcomes:
Baseline holistic legacy model linking
business use to code and data,
enhancement requirements, detailed plan
with precise scope and accurate estimates
Holistic, integrated code, data
and business use case analysis
provide a complete, business-
validated requirements baseline
combining visible and hidden
requirements.
Re-architecting leverages
modern frameworks and
architecture practices, typically
resulting in 75% reduction in
lines of source code, and a truly
future-proof system
Automated code generation
and data modernization
capabilities mitigate risks and
drive down maintenance cost
for the modernized system.
Online collaboration and
transparency across the team
to simplifies business
engagement, and enables
distributed teams.
US Patents
7.996.413
8.150.896
US Patents
8.831.964
8.639.675
7.996.413
Dell Repository
Dell Analyzer
Dell Data Workbench
Dell Designer
Dell Code Generator
Government of Saskatchewan
Justice better served with modernized IT system
Business Challenge
Criminal justice employees were challenged with too many manual and paper
business processes and four 30-yr-old disjointed data systems
Outcome
• Consolidated the functions of four major systems into a single modern app
• Eliminated duplicate data and reduced total volume of data
• Streamlined procedures across the Ministry
• Low-cost Intel platform and commodity infrastructure
“In working with our Ministry to learn our business issues and find solutions,
Dell’s Application Modernization Services team plays a vital supporting role in
our project’s success, now and going forward.”
Rick Davis, Director, Operational Support, Saskatchewan Ministry of Justice,
Corrections and Policing
Dell Software products and Patented IP
Dell Analyzer
• Automated code analysis and logic extraction for
any source language
• Cross-language, cross-platform dependency
analysis
Dell Repository
• Integrated requirements management, reverse-
engineering and design
• Business capability mapping to legacy assets
• Customer and team collaboration
Dell Data Workbench
• Data modernization, refactoring, migration,
profiling and auditing
Dell Designer
• Integrated user interface and service design
Dell Code Generator
• Consistent model-driven generation of user
interface, service and data layer code
• Highly maintainable code with no runtime
requirements
• Compliant with a broad range of target
architectural frameworks
Dell Transaction Processing Environment
• Scalable, native, distributed transaction
processing platform for CICS, IMS TM, other
workloads
Dell Batch Processing Environment
• Scalable environment for developing, scheduling,
executing and managing batch based workloads
Dell TPE and BPE Manager
• Provide monitoring and management for the
online and batch application execution
environments
Dell Enterprise COBOL
• Powerful COBOL mainframe offloading and
modernization platform
Dell Transaction Security Facility
• External security manager providing Role Based
Access Control (RBAC) based transaction
processing security
Dell Hierarchical to Relational (H-RDB) console
• IMS DB conversion and runtime support
Dell Re-host Solution Suite Dell Re-architecture Solution Suite
Comprehensive, fit-to-method, toolkit for legacy
analysis and Re-architecture
Comprehensive distributed platform and tooling for
supporting re-hosted mainframe workloads
Dell Automated Migration Solution Suite
Dell Automated Assessment Workbench
• Automated portfolio assessment capabilities for
legacy based workloads
Dell Automated Conversion Workbench
• Collection of tools and utilities to support the
migration of legacy programs and data to a
distributed environment
– Mainframe languages (Assembler, ADSO, Mark IV,
etc.) to other (e.g. COBOL, C, Java, etc.)
– Mainframe data structures (IMS DB, IDMS DB, Adabas,
Datacom, etc.) to RDBMS
• C/C++ to Java
• ASP to ASP.NET
• Oracle Forms to Java
• Lotus Notes to Salesforce
• WebLogic to JBoss
• Struts to Spring
Dell Automated Upgrade Workbench
• Oracle Upgrade Assessment Tool
• PeopleSoft Upgrade Impact Analysis
• Various Java Framework Upgrades
Automated code assessment, conversion,
remediation, and upgrade impact analysis solutions
Why Dell Modernization Services?
End-to-end solutions
• Hardware, software and services
• Flexible engagement model
• Integrated with Dell Services IT outsourcing,
maintenance, testing and development teams
25+ years of
experience
• Proven track record of success
• Established methodologies
• Trusted partner network
• Single point of accountability
• Domain and package expertise
• Global and local resources
Unique and patented Dell IP
• Broad range of market-tested tools and software
Panel
Discussion
Quiz
Thanks!
Backup Material

More Related Content

What's hot

Introduction to Apache Flink
Introduction to Apache FlinkIntroduction to Apache Flink
Introduction to Apache Flinkdatamantra
 
How Using Microsoft Office 365 Can Benefit Your Organisation
How Using Microsoft Office 365 Can Benefit Your OrganisationHow Using Microsoft Office 365 Can Benefit Your Organisation
How Using Microsoft Office 365 Can Benefit Your OrganisationBright Technology
 
ROI for IP Address Management (IPAM) Solutions
ROI for IP Address Management (IPAM) SolutionsROI for IP Address Management (IPAM) Solutions
ROI for IP Address Management (IPAM) SolutionsSolarWinds
 
Intro to Neo4j
Intro to Neo4jIntro to Neo4j
Intro to Neo4jNeo4j
 
DevOps for Databricks
DevOps for DatabricksDevOps for Databricks
DevOps for DatabricksDatabricks
 
Intro to Neo4j and Graph Databases
Intro to Neo4j and Graph DatabasesIntro to Neo4j and Graph Databases
Intro to Neo4j and Graph DatabasesNeo4j
 
How Dell Used Neo4j Graph Database to Redesign Their Pricing-as-a-Service Pla...
How Dell Used Neo4j Graph Database to Redesign Their Pricing-as-a-Service Pla...How Dell Used Neo4j Graph Database to Redesign Their Pricing-as-a-Service Pla...
How Dell Used Neo4j Graph Database to Redesign Their Pricing-as-a-Service Pla...Neo4j
 
The Persona-Based Value of Modern Data Governance
The Persona-Based Value of Modern Data Governance The Persona-Based Value of Modern Data Governance
The Persona-Based Value of Modern Data Governance Precisely
 
A Tale of Two Graph Frameworks on Spark: GraphFrames and Tinkerpop OLAP Artem...
A Tale of Two Graph Frameworks on Spark: GraphFrames and Tinkerpop OLAP Artem...A Tale of Two Graph Frameworks on Spark: GraphFrames and Tinkerpop OLAP Artem...
A Tale of Two Graph Frameworks on Spark: GraphFrames and Tinkerpop OLAP Artem...Spark Summit
 
DevOps and APIs: Great Alone, Better Together
DevOps and APIs: Great Alone, Better Together DevOps and APIs: Great Alone, Better Together
DevOps and APIs: Great Alone, Better Together MuleSoft
 
MLflow Model Serving
MLflow Model ServingMLflow Model Serving
MLflow Model ServingDatabricks
 
Three layer API Design Architecture
Three layer API Design ArchitectureThree layer API Design Architecture
Three layer API Design ArchitectureHarish Kumar
 
Unify Stream and Batch Processing using Dataflow, a Portable Programmable Mod...
Unify Stream and Batch Processing using Dataflow, a Portable Programmable Mod...Unify Stream and Batch Processing using Dataflow, a Portable Programmable Mod...
Unify Stream and Batch Processing using Dataflow, a Portable Programmable Mod...DataWorks Summit
 
Revolutionizing the Energy Industry with Graphs
Revolutionizing the Energy Industry with GraphsRevolutionizing the Energy Industry with Graphs
Revolutionizing the Energy Industry with GraphsNeo4j
 
Democratizing AI/ML with GCP - Abishay Rao (Google) at GoDataFest 2019
Democratizing AI/ML with GCP - Abishay Rao (Google) at GoDataFest 2019Democratizing AI/ML with GCP - Abishay Rao (Google) at GoDataFest 2019
Democratizing AI/ML with GCP - Abishay Rao (Google) at GoDataFest 2019GoDataDriven
 
现代数据集成解决方案及应用案例介绍(上)
现代数据集成解决方案及应用案例介绍(上)现代数据集成解决方案及应用案例介绍(上)
现代数据集成解决方案及应用案例介绍(上)Denodo
 
IP Address Management Best Practices
IP Address Management Best PracticesIP Address Management Best Practices
IP Address Management Best PracticesSolarWinds
 
Spark MLlib - Training Material
Spark MLlib - Training Material Spark MLlib - Training Material
Spark MLlib - Training Material Bryan Yang
 

What's hot (20)

Managing File Transfers (MFT)
Managing File Transfers (MFT)Managing File Transfers (MFT)
Managing File Transfers (MFT)
 
Introduction to Apache Flink
Introduction to Apache FlinkIntroduction to Apache Flink
Introduction to Apache Flink
 
How Using Microsoft Office 365 Can Benefit Your Organisation
How Using Microsoft Office 365 Can Benefit Your OrganisationHow Using Microsoft Office 365 Can Benefit Your Organisation
How Using Microsoft Office 365 Can Benefit Your Organisation
 
ROI for IP Address Management (IPAM) Solutions
ROI for IP Address Management (IPAM) SolutionsROI for IP Address Management (IPAM) Solutions
ROI for IP Address Management (IPAM) Solutions
 
Intro to Neo4j
Intro to Neo4jIntro to Neo4j
Intro to Neo4j
 
DevOps for Databricks
DevOps for DatabricksDevOps for Databricks
DevOps for Databricks
 
Hadoop
HadoopHadoop
Hadoop
 
Intro to Neo4j and Graph Databases
Intro to Neo4j and Graph DatabasesIntro to Neo4j and Graph Databases
Intro to Neo4j and Graph Databases
 
How Dell Used Neo4j Graph Database to Redesign Their Pricing-as-a-Service Pla...
How Dell Used Neo4j Graph Database to Redesign Their Pricing-as-a-Service Pla...How Dell Used Neo4j Graph Database to Redesign Their Pricing-as-a-Service Pla...
How Dell Used Neo4j Graph Database to Redesign Their Pricing-as-a-Service Pla...
 
The Persona-Based Value of Modern Data Governance
The Persona-Based Value of Modern Data Governance The Persona-Based Value of Modern Data Governance
The Persona-Based Value of Modern Data Governance
 
A Tale of Two Graph Frameworks on Spark: GraphFrames and Tinkerpop OLAP Artem...
A Tale of Two Graph Frameworks on Spark: GraphFrames and Tinkerpop OLAP Artem...A Tale of Two Graph Frameworks on Spark: GraphFrames and Tinkerpop OLAP Artem...
A Tale of Two Graph Frameworks on Spark: GraphFrames and Tinkerpop OLAP Artem...
 
DevOps and APIs: Great Alone, Better Together
DevOps and APIs: Great Alone, Better Together DevOps and APIs: Great Alone, Better Together
DevOps and APIs: Great Alone, Better Together
 
MLflow Model Serving
MLflow Model ServingMLflow Model Serving
MLflow Model Serving
 
Three layer API Design Architecture
Three layer API Design ArchitectureThree layer API Design Architecture
Three layer API Design Architecture
 
Unify Stream and Batch Processing using Dataflow, a Portable Programmable Mod...
Unify Stream and Batch Processing using Dataflow, a Portable Programmable Mod...Unify Stream and Batch Processing using Dataflow, a Portable Programmable Mod...
Unify Stream and Batch Processing using Dataflow, a Portable Programmable Mod...
 
Revolutionizing the Energy Industry with Graphs
Revolutionizing the Energy Industry with GraphsRevolutionizing the Energy Industry with Graphs
Revolutionizing the Energy Industry with Graphs
 
Democratizing AI/ML with GCP - Abishay Rao (Google) at GoDataFest 2019
Democratizing AI/ML with GCP - Abishay Rao (Google) at GoDataFest 2019Democratizing AI/ML with GCP - Abishay Rao (Google) at GoDataFest 2019
Democratizing AI/ML with GCP - Abishay Rao (Google) at GoDataFest 2019
 
现代数据集成解决方案及应用案例介绍(上)
现代数据集成解决方案及应用案例介绍(上)现代数据集成解决方案及应用案例介绍(上)
现代数据集成解决方案及应用案例介绍(上)
 
IP Address Management Best Practices
IP Address Management Best PracticesIP Address Management Best Practices
IP Address Management Best Practices
 
Spark MLlib - Training Material
Spark MLlib - Training Material Spark MLlib - Training Material
Spark MLlib - Training Material
 

Viewers also liked

Evolving the enterprise - IT legacy to SOA
Evolving the enterprise - IT legacy to SOAEvolving the enterprise - IT legacy to SOA
Evolving the enterprise - IT legacy to SOACapgemini
 
Superior it governance with iso 38500.key
Superior it governance with iso 38500.keySuperior it governance with iso 38500.key
Superior it governance with iso 38500.keyBasta Group BV
 
Enterprise Transformation through Cognizant’s XaaS fabric on AWS (ENT222) | A...
Enterprise Transformation through Cognizant’s XaaS fabric on AWS (ENT222) | A...Enterprise Transformation through Cognizant’s XaaS fabric on AWS (ENT222) | A...
Enterprise Transformation through Cognizant’s XaaS fabric on AWS (ENT222) | A...Amazon Web Services
 
The agile enterprise - Digital Transformation as a practical application
The agile enterprise - Digital Transformation as a practical applicationThe agile enterprise - Digital Transformation as a practical application
The agile enterprise - Digital Transformation as a practical applicationdie.agilen GmbH
 
Ariba Coverage of Risk Management within the Supplier Lifecycle
Ariba Coverage of Risk Management within the Supplier LifecycleAriba Coverage of Risk Management within the Supplier Lifecycle
Ariba Coverage of Risk Management within the Supplier LifecycleSean Thomson
 
(ISM305) Framework: Create Cloud Strategy & Accelerate Results
(ISM305) Framework: Create Cloud Strategy & Accelerate Results(ISM305) Framework: Create Cloud Strategy & Accelerate Results
(ISM305) Framework: Create Cloud Strategy & Accelerate ResultsAmazon Web Services
 
Digital Transformation, Enterprise Architecture, Big Data by Danairat
Digital Transformation, Enterprise Architecture, Big Data by DanairatDigital Transformation, Enterprise Architecture, Big Data by Danairat
Digital Transformation, Enterprise Architecture, Big Data by DanairatDanairat Thanabodithammachari
 
Business Architecture the Key to Enterprise Transformation
Business Architecture the Key to Enterprise TransformationBusiness Architecture the Key to Enterprise Transformation
Business Architecture the Key to Enterprise TransformationMike Walker
 
Digital Transformation And Enterprise Architecture
Digital Transformation And Enterprise ArchitectureDigital Transformation And Enterprise Architecture
Digital Transformation And Enterprise ArchitectureAlan McSweeney
 
Domino app dev competitive advantage for blug
Domino app dev competitive advantage for blugDomino app dev competitive advantage for blug
Domino app dev competitive advantage for blugJohn Head
 
Secure Cloud Adoption - Checklist
Secure Cloud Adoption - ChecklistSecure Cloud Adoption - Checklist
Secure Cloud Adoption - ChecklistSecurestorm
 
Integrating Strategy and Risk Management
Integrating Strategy and Risk ManagementIntegrating Strategy and Risk Management
Integrating Strategy and Risk ManagementAndrew Smart
 
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...VMware Tanzu
 
Manigent Aligning Risk Appetite And Exposure
Manigent Aligning Risk Appetite And ExposureManigent Aligning Risk Appetite And Exposure
Manigent Aligning Risk Appetite And ExposureAndrew Smart
 
Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite Andrew Smart
 

Viewers also liked (20)

Evolving the enterprise - IT legacy to SOA
Evolving the enterprise - IT legacy to SOAEvolving the enterprise - IT legacy to SOA
Evolving the enterprise - IT legacy to SOA
 
Christophe feltus introduction to iso 38500 v1 0
Christophe feltus introduction to iso 38500 v1 0Christophe feltus introduction to iso 38500 v1 0
Christophe feltus introduction to iso 38500 v1 0
 
Superior it governance with iso 38500.key
Superior it governance with iso 38500.keySuperior it governance with iso 38500.key
Superior it governance with iso 38500.key
 
IT Governance
IT GovernanceIT Governance
IT Governance
 
Enterprise Transformation through Cognizant’s XaaS fabric on AWS (ENT222) | A...
Enterprise Transformation through Cognizant’s XaaS fabric on AWS (ENT222) | A...Enterprise Transformation through Cognizant’s XaaS fabric on AWS (ENT222) | A...
Enterprise Transformation through Cognizant’s XaaS fabric on AWS (ENT222) | A...
 
The Path to Enterprise IT Transformation
The Path to Enterprise IT TransformationThe Path to Enterprise IT Transformation
The Path to Enterprise IT Transformation
 
The agile enterprise - Digital Transformation as a practical application
The agile enterprise - Digital Transformation as a practical applicationThe agile enterprise - Digital Transformation as a practical application
The agile enterprise - Digital Transformation as a practical application
 
Ariba Coverage of Risk Management within the Supplier Lifecycle
Ariba Coverage of Risk Management within the Supplier LifecycleAriba Coverage of Risk Management within the Supplier Lifecycle
Ariba Coverage of Risk Management within the Supplier Lifecycle
 
(ISM305) Framework: Create Cloud Strategy & Accelerate Results
(ISM305) Framework: Create Cloud Strategy & Accelerate Results(ISM305) Framework: Create Cloud Strategy & Accelerate Results
(ISM305) Framework: Create Cloud Strategy & Accelerate Results
 
Digital Transformation, Enterprise Architecture, Big Data by Danairat
Digital Transformation, Enterprise Architecture, Big Data by DanairatDigital Transformation, Enterprise Architecture, Big Data by Danairat
Digital Transformation, Enterprise Architecture, Big Data by Danairat
 
Business Architecture the Key to Enterprise Transformation
Business Architecture the Key to Enterprise TransformationBusiness Architecture the Key to Enterprise Transformation
Business Architecture the Key to Enterprise Transformation
 
Digital Transformation And Enterprise Architecture
Digital Transformation And Enterprise ArchitectureDigital Transformation And Enterprise Architecture
Digital Transformation And Enterprise Architecture
 
Domino app dev competitive advantage for blug
Domino app dev competitive advantage for blugDomino app dev competitive advantage for blug
Domino app dev competitive advantage for blug
 
Cloud for Media - A Complete Solution Stack for Faster Cloud Adoption
Cloud for Media - A Complete Solution Stack for Faster Cloud AdoptionCloud for Media - A Complete Solution Stack for Faster Cloud Adoption
Cloud for Media - A Complete Solution Stack for Faster Cloud Adoption
 
Secure Cloud Adoption - Checklist
Secure Cloud Adoption - ChecklistSecure Cloud Adoption - Checklist
Secure Cloud Adoption - Checklist
 
Integrating Strategy and Risk Management
Integrating Strategy and Risk ManagementIntegrating Strategy and Risk Management
Integrating Strategy and Risk Management
 
20080416 standard iso38500
20080416 standard iso3850020080416 standard iso38500
20080416 standard iso38500
 
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
 
Manigent Aligning Risk Appetite And Exposure
Manigent Aligning Risk Appetite And ExposureManigent Aligning Risk Appetite And Exposure
Manigent Aligning Risk Appetite And Exposure
 
Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite
 

Similar to Re-Architect Your Legacy Environment To Enable An Agile, Future-Ready Enterprise

Why Your Digital Transformation Strategy Demands Middleware Modernization
Why Your Digital Transformation Strategy Demands Middleware ModernizationWhy Your Digital Transformation Strategy Demands Middleware Modernization
Why Your Digital Transformation Strategy Demands Middleware ModernizationVMware Tanzu
 
Lift Your Legacy UNIX Applications & Databases into the Cloud
Lift Your Legacy UNIX Applications & Databases into the Cloud Lift Your Legacy UNIX Applications & Databases into the Cloud
Lift Your Legacy UNIX Applications & Databases into the Cloud Fadi Semaan
 
IMS01 IMS Keynote
IMS01   IMS KeynoteIMS01   IMS Keynote
IMS01 IMS KeynoteRobert Hain
 
Briefing Simplicité Software (English)
Briefing Simplicité Software (English)Briefing Simplicité Software (English)
Briefing Simplicité Software (English)Simplicité Software
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 Networks
 
Preston Peterson Resume January 2017
Preston Peterson Resume January 2017Preston Peterson Resume January 2017
Preston Peterson Resume January 2017Preston Peterson
 
GE Capital Legacy Modernization and Mainframe Conversion
GE Capital Legacy Modernization and Mainframe ConversionGE Capital Legacy Modernization and Mainframe Conversion
GE Capital Legacy Modernization and Mainframe Conversionguatham
 
Business Drivers For It Simplification PowerPoint Presentation Slides
Business Drivers For It Simplification PowerPoint Presentation SlidesBusiness Drivers For It Simplification PowerPoint Presentation Slides
Business Drivers For It Simplification PowerPoint Presentation SlidesSlideTeam
 
Application Modernisation with PKS
Application Modernisation with PKSApplication Modernisation with PKS
Application Modernisation with PKSPhil Reay
 
Application Modernisation with PKS
Application Modernisation with PKSApplication Modernisation with PKS
Application Modernisation with PKSPhil Reay
 
How to Revamp your Legacy Applications For More Agility and Better Service - ...
How to Revamp your Legacy Applications For More Agility and Better Service - ...How to Revamp your Legacy Applications For More Agility and Better Service - ...
How to Revamp your Legacy Applications For More Agility and Better Service - ...NRB
 
Idc analyst report a new breed of servers for digital transformation
Idc analyst report a new breed of servers for digital transformationIdc analyst report a new breed of servers for digital transformation
Idc analyst report a new breed of servers for digital transformationKaizenlogcom
 
Smarter z/OS Software Delivery using Rational Enterprise Cloud Solutions
Smarter z/OS Software Delivery using Rational Enterprise Cloud SolutionsSmarter z/OS Software Delivery using Rational Enterprise Cloud Solutions
Smarter z/OS Software Delivery using Rational Enterprise Cloud SolutionsJean-Yves Rigolet
 
Demantra Case Study Doug
Demantra Case Study DougDemantra Case Study Doug
Demantra Case Study Dougsichie
 
How to Migrate Applications Off a Mainframe
How to Migrate Applications Off a MainframeHow to Migrate Applications Off a Mainframe
How to Migrate Applications Off a MainframeVMware Tanzu
 
legacy application modernization in US | JK Tech
legacy application modernization in US | JK Techlegacy application modernization in US | JK Tech
legacy application modernization in US | JK TechBobRapier
 

Similar to Re-Architect Your Legacy Environment To Enable An Agile, Future-Ready Enterprise (20)

Why Your Digital Transformation Strategy Demands Middleware Modernization
Why Your Digital Transformation Strategy Demands Middleware ModernizationWhy Your Digital Transformation Strategy Demands Middleware Modernization
Why Your Digital Transformation Strategy Demands Middleware Modernization
 
Lift Your Legacy UNIX Applications & Databases into the Cloud
Lift Your Legacy UNIX Applications & Databases into the Cloud Lift Your Legacy UNIX Applications & Databases into the Cloud
Lift Your Legacy UNIX Applications & Databases into the Cloud
 
IMS01 IMS Keynote
IMS01   IMS KeynoteIMS01   IMS Keynote
IMS01 IMS Keynote
 
Briefing Simplicité Software (English)
Briefing Simplicité Software (English)Briefing Simplicité Software (English)
Briefing Simplicité Software (English)
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer Presentation
 
Preston Peterson Resume January 2017
Preston Peterson Resume January 2017Preston Peterson Resume January 2017
Preston Peterson Resume January 2017
 
M tierney res
M tierney resM tierney res
M tierney res
 
GE Capital Legacy Modernization and Mainframe Conversion
GE Capital Legacy Modernization and Mainframe ConversionGE Capital Legacy Modernization and Mainframe Conversion
GE Capital Legacy Modernization and Mainframe Conversion
 
Business Drivers For It Simplification PowerPoint Presentation Slides
Business Drivers For It Simplification PowerPoint Presentation SlidesBusiness Drivers For It Simplification PowerPoint Presentation Slides
Business Drivers For It Simplification PowerPoint Presentation Slides
 
Lakshmankumar_Resume
Lakshmankumar_ResumeLakshmankumar_Resume
Lakshmankumar_Resume
 
Manigandan_narasimhan_resume
Manigandan_narasimhan_resumeManigandan_narasimhan_resume
Manigandan_narasimhan_resume
 
Tyco IS Oracle Apps Support Project
Tyco IS Oracle Apps Support ProjectTyco IS Oracle Apps Support Project
Tyco IS Oracle Apps Support Project
 
Application Modernisation with PKS
Application Modernisation with PKSApplication Modernisation with PKS
Application Modernisation with PKS
 
Application Modernisation with PKS
Application Modernisation with PKSApplication Modernisation with PKS
Application Modernisation with PKS
 
How to Revamp your Legacy Applications For More Agility and Better Service - ...
How to Revamp your Legacy Applications For More Agility and Better Service - ...How to Revamp your Legacy Applications For More Agility and Better Service - ...
How to Revamp your Legacy Applications For More Agility and Better Service - ...
 
Idc analyst report a new breed of servers for digital transformation
Idc analyst report a new breed of servers for digital transformationIdc analyst report a new breed of servers for digital transformation
Idc analyst report a new breed of servers for digital transformation
 
Smarter z/OS Software Delivery using Rational Enterprise Cloud Solutions
Smarter z/OS Software Delivery using Rational Enterprise Cloud SolutionsSmarter z/OS Software Delivery using Rational Enterprise Cloud Solutions
Smarter z/OS Software Delivery using Rational Enterprise Cloud Solutions
 
Demantra Case Study Doug
Demantra Case Study DougDemantra Case Study Doug
Demantra Case Study Doug
 
How to Migrate Applications Off a Mainframe
How to Migrate Applications Off a MainframeHow to Migrate Applications Off a Mainframe
How to Migrate Applications Off a Mainframe
 
legacy application modernization in US | JK Tech
legacy application modernization in US | JK Techlegacy application modernization in US | JK Tech
legacy application modernization in US | JK Tech
 

More from Dell World

Dell Data Center Networking Overview
Dell Data Center Networking OverviewDell Data Center Networking Overview
Dell Data Center Networking OverviewDell World
 
Dell Storage Management
Dell Storage ManagementDell Storage Management
Dell Storage ManagementDell World
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell World
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your NetworkDell World
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager OverviewDell World
 
Dell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell World
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems ManagementDell World
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsDell World
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelDell World
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Dell World
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backupsDell World
 
NVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeNVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeDell World
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Dell World
 
The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...Dell World
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsDell World
 
What a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notWhat a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notDell World
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Dell World
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Dell World
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDell World
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...Dell World
 

More from Dell World (20)

Dell Data Center Networking Overview
Dell Data Center Networking OverviewDell Data Center Networking Overview
Dell Data Center Networking Overview
 
Dell Storage Management
Dell Storage ManagementDell Storage Management
Dell Storage Management
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions Lab
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your Network
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager Overview
 
Dell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch Provisioning
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems Management
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software Solutions
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access Model
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
NVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeNVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about Time
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
 
The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced Threats
 
What a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notWhat a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do not
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the network
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
 

Recently uploaded

Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksMagic Marks
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...jabtakhaidam7
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...vershagrag
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptxrouholahahmadi9876
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 

Recently uploaded (20)

Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 

Re-Architect Your Legacy Environment To Enable An Agile, Future-Ready Enterprise

  • 1. Leave your legacy Modernize your legacy environment to enable an agile future-ready enterprise
  • 2. Speakers Cameron Jenkins Global Practice Director, Application Modernization Services Dell Services Greg Ogburn Senior Solutions Architect, Application Modernization Services Dell Services Jon Payne Senior Vice President and Chief Information Officer, Associated Wholesale Grocers
  • 3. Shift from cost-savings focus to business agility Businesses’ ability to scale up 3rd Platform adoption will require changes to IT operation that bring agility and overcome siloed legacy systems. This will make agile development the de-facto norm. - IDC By 2016, >50% of Application Modernization efforts will address business demand for Enhanced functionality - Gartner By 2018, agile and iterative development will require 30% of resources for application testing engagements to be on- site or onshore - Gartner Research suggests that business agility is the new source of business value - Forrester Application modernization and increasing agility will continue to be a solid driver for Application Development spending, apart from other emerging dynamics of cloud, mobility and social computing - Gartner By 2016, >50% of application modernization efforts will address business demand for enhanced functionality to legacy applications and not cost reduction. - Gartner The primary focus of IT will remain on the care and operation of the existing applications, which are the lifeblood of the enterprise - Gartner Bimodal will gain traction for enterprise strategies - Gartner What we’ve heard…
  • 4. Modernization drivers • Streamline operations, reduce maintenance costs • Manage demand for quality, cost, service, access • Shift spend from maintenance to innovation • Regulatory compliance & security • Speed of response to market changes • Lack of agility • Brittle legacy systems hold back innovation • High-cost legacy platforms • Complex portfolios • Performance and scalability Journey to simplified environment via Application Modernization to support business goals Outcomes Future-ready Digital Scalable Business agility Reduced operating costs Increased security Faster response times Cloud-enabled Open infrastructure IT challenges Business challenges
  • 5. Journey to a modern environment x86 Lower cost Platform Virtualization & cloud Business Agility Mobility Packaged apps Analytics & big data Security Rationalization Strategic Modernization Roadmap Dell Application Re-hosting • Preserve existing investments • Migrate from Mainframe to x86, UNIX, or Linux on System Z • Consolidate UNIX applications and data to Linux or Windows Dell Application Re-architecture • Leverage modern Java or .NET architecture and packages • Extract business logic from mainframe, midrange, and client-server systems • Retire legacy languages and infrastructure Replace Refresh Retain Retire Current legacy environment Dell Application Modernization Services Digital Target environment
  • 6. Dell Strategic Modernization Roadmap Transformation Programs Project Project Project Project 1 Project 2 Project 3 Project 5 Project 4 This Planning Cycle Mnth 1 Mnth 2 Mnth 3 Mnth 4 Mnth 5 Mnth 6 Mnth 7 Mnth 8 Mnth 9 Mnth 10 Mnth 11 Mnth 12 Next Planning Cycle Mnth 1 Mnth 2 Mnth 3 Mnth 4 Mnth 5 Mnth 6 Mnth 7 Mnth 8 Mnth 9 Mnth 10 Mnth 11 Mnth 12Mnth 1 Mnth 2 Mnth 3 Mnth 4 Mnth 5 Mnth 6 Mnth 7 Mnth 8 Mnth 9 Mnth 10 Mnth 11 Mnth 12 Third Planning Cycle Mnth 1 Mnth 2 Mnth 3 Mnth 4 Mnth 5 Mnth 6 Mnth 7 Mnth 8 Key: Line Action Start Dependency Value Dependency Program 5 Program 3 Program 2 Program 4 Program 1 Program 6 Project Project Project Project Project Project Project Project Project Project Project Project Project Project Project Discovery phase Capture and link strategic drivers, business capabilities, code and data in a unified, transparent model Analysis phase Group assets by capabilities, determine the right trajectories, and evaluate the program impacts of technical dependency and complexity. Planning phase Collaboratively develop a program plan to address strategic drivers and resolve technical challenges
  • 7. Costco Largest membership warehouse club chain in the US benefits from Dell Strategic Modernization Roadmap Business Challenge The worlds largest AS/400 system is comprised of over 12 million lines of RPG code and not able to handle Costco’s rapid expansion Solution Developed a Strategic Modernization Roadmap for incremental SAP implementation Results • An actionable 7-year program plan to migrate to SAP and retire the AS/400, with specific integration requirements at each step • Minimized legacy integration requirements • Dell Repository automatically monitors changes to the legacy environment during the 7-year migration
  • 8. Application re-hosting solutions move existing business logic and data investments onto modern platforms.
  • 9. Dell application re-hosting overview Mainframe re-hosting details Open systems IBM z/OS compatibility stack IBM z/OS mainframe environment stack TN3270 ECI/EPI JEE Sockets SOAP/XML FTP Interfaces 3270 Access MQ Interfaces TN3270 ECI/EPI JEE Sockets SOAP/XML FTP Interfaces 3270 Access MQ Interfaces Migration components 3rd party infrastructure VSAM, sequential, GDGs IBM DB2, IBM IMS-DB COBOL, PL/I, Easytrieve Plus, Assembler, other JCL/JES IBM CICS, IBM IMS TM IBM z/OS, IBM z/VSE 3rd Party infrastructure VSAM, Sequential, GDGs RDBMS (Oracle, DB2 LUW, SQL Server…) COBOL, PL/I, Easytrieve Plus, other Dell BPE Batch JCL & JES Dell TPE Transaction monitor Linux, UNIX, Windows Review / replace Application logic Batch environment Online environment Platform Data migration Re-host to modern platform with no change in functionality Retain experienced staff Platform positioned for future growth at reduced costs Minimal changes HP StorageWorks XP24000 Disk Array ALARM READY MESSAGE PUSH HP StorageWorks XP24000 Disk Array Mainframe application compatibility middleware RACF, ACF2, Top Secret Dell TSF, Target OS securitySecurity profiles
  • 10. Flexible, full-service solution approach Proven project methodology & risk mitigation process Dell follows a proven migration methodology consisting of many flexible service offerings that are tailored to meet the business objectives and technical needs of an organization. The image below shows many of the services that Dell can offer, including many that will be proposed for the mainframe re-hosting project. Technical feasibility and business impact • Goals and corporate directives • Application and environment characteristics gathering • Preliminary proposal leading to decision to proceed Project methodology validation • Asset cataloging • Assessments – Source – Operational – Infrastructure • Asset grouping • Optional custom workshops • Optional POCs Detailed project plan and implementation • Infrastructure / Operational Implementation • Application migration implementation • Data migration tools • Bridging Implementation • Training • Application retrofit Final validation and production cutover • Baseline Preparation • Regression testing • Performance testing • Application discrepancy correction • Production readiness and cutover support Managed services solutions • Dell enterprise product support and maintenance • Support triage • Short term turnover services • Managed services – On-going application maintenance & development – Help desk • Managed hosting Discovery Design Implement Test/Deploy Post implement
  • 11. Associated Wholesale Grocers (AWG) Business Challenge Associated Wholesale Grocers (AWG) was looking to modernize their core business applications to reduce costs, and prepare to move to the cloud. Solution Dell undertook a comprehensive assessment and developed a migration plan that included moving off a complex IBM infrastructure to an open system. Results • Modernized platform supports AWG’s migration to the cloud • Reduced operating costs by 10% • Improved disaster recovery capabilities; a recent disaster recovery test validated that the system works and that the investment was worth it
  • 12. Re-architecture builds a modern application framework based on business functionality, then migrates legacy logic and data into that framework to deliver business agility and reduce future costs.
  • 13. Dell Re-architecture overview Complete transformation to best practice Java or .NET architecture Re-architected Java / .NET System Data Entry & Report Transaction Screens Exception Screen Cross-platform Front end Daily Batch Monthly Batch Key Code Component System Interfaces Stored Procedure Shared Data Store Nested Redefines Legacy Data Store Visible Requirements Hidden Requirements Legacy System Service/Application Layer • Encapsulates business logic • Horizontally scalable • Integrates with packages Service Bus Presentation Layer • Web, modern • Mobile-ready Analytics/Reporting Engine • Self-service • Business-facing Data Layer • Engineered for performance and extensibility • Relational and/or big data Job schedule Infrastructure Layer • Virtualized or cloud for scalability and flexibility • Aligned with enterprise standards and investments
  • 14. Re-architecture method The Dell Re-architecture difference Methodology & Tools Phase 3: Develop & Test Outcomes: Modernized & tested application source code with migrated legacy data. Uses best practices for SOA and leverages commercial software packages. Phase 2: Design Outcomes: Validated design. Implement legacy and enhancement functionality leveraging modern application and data architecture Phase 1: Discover & Plan Outcomes: Baseline holistic legacy model linking business use to code and data, enhancement requirements, detailed plan with precise scope and accurate estimates Holistic, integrated code, data and business use case analysis provide a complete, business- validated requirements baseline combining visible and hidden requirements. Re-architecting leverages modern frameworks and architecture practices, typically resulting in 75% reduction in lines of source code, and a truly future-proof system Automated code generation and data modernization capabilities mitigate risks and drive down maintenance cost for the modernized system. Online collaboration and transparency across the team to simplifies business engagement, and enables distributed teams. US Patents 7.996.413 8.150.896 US Patents 8.831.964 8.639.675 7.996.413 Dell Repository Dell Analyzer Dell Data Workbench Dell Designer Dell Code Generator
  • 15. Government of Saskatchewan Justice better served with modernized IT system Business Challenge Criminal justice employees were challenged with too many manual and paper business processes and four 30-yr-old disjointed data systems Outcome • Consolidated the functions of four major systems into a single modern app • Eliminated duplicate data and reduced total volume of data • Streamlined procedures across the Ministry • Low-cost Intel platform and commodity infrastructure “In working with our Ministry to learn our business issues and find solutions, Dell’s Application Modernization Services team plays a vital supporting role in our project’s success, now and going forward.” Rick Davis, Director, Operational Support, Saskatchewan Ministry of Justice, Corrections and Policing
  • 16. Dell Software products and Patented IP Dell Analyzer • Automated code analysis and logic extraction for any source language • Cross-language, cross-platform dependency analysis Dell Repository • Integrated requirements management, reverse- engineering and design • Business capability mapping to legacy assets • Customer and team collaboration Dell Data Workbench • Data modernization, refactoring, migration, profiling and auditing Dell Designer • Integrated user interface and service design Dell Code Generator • Consistent model-driven generation of user interface, service and data layer code • Highly maintainable code with no runtime requirements • Compliant with a broad range of target architectural frameworks Dell Transaction Processing Environment • Scalable, native, distributed transaction processing platform for CICS, IMS TM, other workloads Dell Batch Processing Environment • Scalable environment for developing, scheduling, executing and managing batch based workloads Dell TPE and BPE Manager • Provide monitoring and management for the online and batch application execution environments Dell Enterprise COBOL • Powerful COBOL mainframe offloading and modernization platform Dell Transaction Security Facility • External security manager providing Role Based Access Control (RBAC) based transaction processing security Dell Hierarchical to Relational (H-RDB) console • IMS DB conversion and runtime support Dell Re-host Solution Suite Dell Re-architecture Solution Suite Comprehensive, fit-to-method, toolkit for legacy analysis and Re-architecture Comprehensive distributed platform and tooling for supporting re-hosted mainframe workloads Dell Automated Migration Solution Suite Dell Automated Assessment Workbench • Automated portfolio assessment capabilities for legacy based workloads Dell Automated Conversion Workbench • Collection of tools and utilities to support the migration of legacy programs and data to a distributed environment – Mainframe languages (Assembler, ADSO, Mark IV, etc.) to other (e.g. COBOL, C, Java, etc.) – Mainframe data structures (IMS DB, IDMS DB, Adabas, Datacom, etc.) to RDBMS • C/C++ to Java • ASP to ASP.NET • Oracle Forms to Java • Lotus Notes to Salesforce • WebLogic to JBoss • Struts to Spring Dell Automated Upgrade Workbench • Oracle Upgrade Assessment Tool • PeopleSoft Upgrade Impact Analysis • Various Java Framework Upgrades Automated code assessment, conversion, remediation, and upgrade impact analysis solutions
  • 17. Why Dell Modernization Services? End-to-end solutions • Hardware, software and services • Flexible engagement model • Integrated with Dell Services IT outsourcing, maintenance, testing and development teams 25+ years of experience • Proven track record of success • Established methodologies • Trusted partner network • Single point of accountability • Domain and package expertise • Global and local resources Unique and patented Dell IP • Broad range of market-tested tools and software
  • 19. Quiz