SlideShare a Scribd company logo
1 of 8
Download to read offline
Architecture-Driven Modernization Workshop
“A Model-driven Approach to Modernizing IT Systems”
                                             March 22-24, 2004
                                             Chicago, IL, USA



                                 Workshop Program

Monday, March 22, 2004
                 Tutorial 1: Application Modernization Study:
0900 - 1230
                 Leveraging Existing Software Assets
                 William Ulrich, President, Tactical Strategy Group, Inc.
Existing application environments are plagued by years of patchwork changes piled upon aging architectures. Yet
many of these systems retain business value because they contain business logic that cannot be re-specified in cost
or time effective ways. Understanding, upgrading, migrating, deconstructing and / or redeploying these systems,
collectively called modernization, begins where from-scratch development and non-invasive integration fall short.

This half-day tutorial tackles difficult application challenges head on. Application knowledge reclamation and
transformation play a key role in business systems analysis, integration, systems development, package selection and
deployment, and a variety of other priority initiatives. Attendees will learn how to more effectively meet time-
critical business requirements by leveraging existing application assets. The tutorial will provide cost effective
options to business and IT project teams crafting integration, enhancement, replacement, package deployment and
Web-based solutions through the use of application modernization techniques and tools.

Topics include:
         • Overview & Taxonomy
         • Existing Application Challenges
         • Legacy Environments vs. Emerging Technologies
         • A Modernization Framework & Strategy
         • Application Meta-Data Management
         • Enterprise & Application Area Assessments
         • Application & Data Migration, Structuring & Rationalization,
         • Architecture Transformation & Redeployment
         • Enabling Tools & Technologies
         • Modernization Scenarios

1030 – 1100 Morning Refreshments

1230 – 1330 Lunch
Tutorial 2: quot;Managed Architecture of Existing Software as a
1330 – 1500
                  Practical Transition to MDAquot;
                  Nikolai Mansurov, Chief Scientist and Chief Architect, Klocwork
This tutorial is intended as a hand-on demonstration of the basic techniques for managing existing code at the model
level rather than at the code level. The tutorial provides the required background: the problem of adopting MDA for
projects with existing code; the challenges of maintenance and evolution of existing systems; architecture erosion. It
introduces the concept of managed architectures and how to make a transition from managing source code to
managing architecture. Then the tutorial focuses on how to excavate architecture models. A comprehensive case
study is used. Then the tutorial introduces the concept of an Architecture Rule and demonstrates, how architecture
rules can be enforcement. Different strategies for architecture rule enforcement are discussed (rule checking,
initiated by developer; integration into ClearCase for automatic checking at check-in time; integration into the
software build for automatic checking during the build of the complete product). The tutorial concludes by
discussing why managed architectures can be a good practical step of transition towards MDA. This tutorial is
targeted at the general audience of software development practitioners and software development managers.



1500 – 1530 Afternoon Refreshments


                  Tutorial 3: How to Harvest Reusable Components in Existing
1530 – 1700
                  Software
                  Nikolai Mansurov, Chief Scientist and Chief Architect, Klocwork
The objective of this tutorial is to introduce basic concepts of architecture re-factoring, with the emphasis on re-
factoring to isolate reusable components. The tutorial provides a general introduction into the process of harvesting
of reusable components and the corresponding challenges, such as architecture erosion and cyclic dependencies
between components. Then the tutorial focuses on how to use an architecture model of existing code to identify
components and re-factor to introduce proper component scope by tracking dependencies between subcomponents.
The presentation is accompanied by detailed demonstration of the methodology steps using a case study. Tutorial is
targeted at a broad audience of software development practitioners.




                  Special Session: OMG Architecture-Driven Modernization Platform
1700 – 1730
                  Task Force Report
                  Task Force Co-Chairs:
                  Djenana Campara, CTO, Klocwork
                  William Ulrich, President, Tactical Strategy Group, Inc.
Tuesday, March 23, 2004
                  Workshop Welcome and Opening Remarks
0830 - 0840
                  Program Committee Chair:
                  Fred Waskiewicz, Director of Standards, Object Management Group

                             ADM Technical Approaches
                         Moderator: James Rhyne, Distinguished Engineer, IBM
This track presents methodologies, techniques, processes and tools supporting system architecture analysis and
modernization activities.

                  Session 1
0840 - 1040
Model Driven Legacy Migration
Krupa Benhur, Patrick DJ Kulandaisamy, Venugopal Subbarao
Comfactory, SETLabs, Infosys Technologies Limited

This presentation will bring out the significance and value of models in legacy application migration. Core models
define the platform, application, and data layer concepts in unambiguous terms. Another important concept
elaborated here is migration map that encompasses all the aspects for a successful migration. Consistency and
broader perspective in migration projects are the direct benefits of using these models.

Domain Driven Modernization of Legacy Systems
Vladimir Bacvanski & Petter Graff, Vice Presidents, InferData Corporation

Modernization of legacy systems is a common problem in an enterprise. The modernization or replacement of the
legacy systems is often performed suboptimally, achieving replicated or just enhanced functionality. MDA is
viewed as a vehicle to increase the efficiency of the modernization process. However, the full benefit is achieved by
rooting the modernization approach in the domain models. This allows for aligning the modernized system with the
business, supporting families of systems in product lines and making the tacit knowledge explicit. The talk
describes the process and modeling techniques for domain driven, MDA based modernization of legacy systems.

Effects of Scale on Methodology and Tools for ADM
James Rhyne, Distinguished Engineer, IBM

Current fine grained analysis tools are based on quot;greedyquot; and quot;depth firstquot; analysis heuristics that do not scale. This
report will focus on other heuristics and methodologies for information collection and analysis that can address the
scaleability problem. Many of these heuristics will produce some important and relevant results quickly with other
results taking longer. Because of the quot;no free lunchquot; principle, the full analysis may take longer than in the greedy
and depth first cases. This creates a need for tooling that can run unattended and report its results as asynchronous
events. There are tactical engineering considerations to be deal with. Most of today's fine grained analysis tools are
based on greedy and depth first heuristics. These tools are not likely to be rewritten. To resolve this, we will need
to create a model of large scale, coarse grained analysis tools into which the fine grained analysis tools can be
plugged.

1010 – 1040 Session 1: Q & A and Discussion

                  Demonstration Area Open
1030 – 1730

1040 – 1110 Morning Refreshments
Session 2
1110 – 1230
Software Architecture Mining in Realized DBMSs
Bernd G. Wenzel, Vorarlberg Unversity

Many operational application systems today use relational database management systems (RDBMSs) to store their
persistent data. This is relevant in the context of ADM for several reasons including: Architecturally relevant
objects in a software system are more likely to be persistent than transient. As a consequence any ADM
methodology should analyze the databases of systems to be modernized. RDBMSs have an active data dictionary
containing information about the tables it stores, their columns, constraints, keys, relationships, views, etc.
This presentation will offer ideas, how the data dictionary information in an RDBMS can be used to compile a
reasonable approximation of the static model underlying the application to be modernized.

Klocwork Architecture Excavation Methodology
Djenana Campara, CTO, Klocwork

Existing software systems, over time evolve into conflicting or challenging designs that require laborious manual
coding methods and often resist evolution due to factors that are not exclusively related to functionality. Common
examples of such factors include a system's inability to be understood or maintained cost-effectively and its
dependence on undesired architectures, caused by architecture erosion. In this presentation we will show you how
you can use architecture excavation tool-assisted process to recover architecture model. The excavated model is
precise with respect to the existing code. Precise excavated model of the existing system allows managing existing
system at the model level, rather than at the code level, which is an important step in transition towards model-based
techniques.

1210 – 1230 Session 2: Q & A and Discussion

1230 – 1330 Lunch

                  Session 3
1330 – 1500
Extending the Life of Software Assets through Componentization
Charles Dickerson, VP of Marketing & Product Management, Relativity Technologies Inc.

Time pressures and technical compromises often cause the code quality of enterprise applications to degrade -
jeopardizing the functionality and stability of the system. This presentation will examine automated techniques and
algorithms that can reduce the complexity and improve the technical and business performance of an application
portfolio.

Stage of Legacy Application Modernization
Barbara Errickson-Connor, Vice President Applications Product Management

With the growing recognition that modernizing legacy applications may make more sense than completely rewriting
them, what are the consequences if we don't recognize the truth about the steps we should take?
Transitioning by Stages:
    o Understand code and clean coding anomalies, dead code, dead data
    o Restructure code – mine business logic as component methods and/or business rules
    o Transform code to new languages and/or to new technologies and platforms
    o Manage modernized & discovered reusable software
This presentation will cover expected steps within these 4 stages.
1500 – 1530 Afternoon Refreshments

               Panel: OMG's ADM Standardization Effort: Solution or Dilution?
1530 - 1700
               Moderator: Fred Waskiewicz, Director of Standards, Object Management Group
      OMG’s ADM activity seeks to revitalize existing applications, making them more agile and leading to
      successful modernization. Yet criticisms have been leveled against such work, claiming it strives to do too
      much; isn’t cost effective; produces minimal gains; some programming languages deserve to die; and that
      existing tools already do an admirable job. This panel of ADM experts tackles these criticisms point-by-
      point.

      Panelists: TBA


               WORKSHOP RECEPTION
1800 – 2000
Wednesday, March 24, 2004

                                   Practice & Experience
          Moderator: Fred Waskiewicz, Director of Standards, Object Management Group
This track explores ADM in action: experience reports and best practices summaries offering advice and guidance in
ADM technical approaches and project management.

                  Session 1
0830 – 1030
ADM in Air Traffic Control and Safety Critical Systems
Emmanuel Fuchs, Chief Architect, THALES ATM (Air Traffic Management)

This presentation will address current plans and requirements for ADM usage in THALES to modernize
aeronautical safety critical products. For the ATC domain, ADM leverages the reuse of well proven robust legacy
software enabling secure investment in today’s technologies with an open end to the future. The main issue in the
safety critical domain is the migration from Ada code base to C, C++ and Java language. This domain also faces the
migration to new middleware technologies such as RT CORBA and CORBA Component Model (CCM). The
ultimate usage of ADM is to build a domain model from the existing code and expert knowledge. This talk presents
the three steps proposed to apply ADM in safety critical system: short term: code base optimization, medium term:
application migration, long term: domain model extraction from existing code base. The THALES experience will
be used to provide requirements for industrial ADM tools for safety critical domain such as transportation, power,
and health.

Asset-based Software Engineering
Charles Stack, Founder and CEO, Flashline

In today's complex, interconnected world the business value of information is too easily lost in software and systems
that have become increasingly and unnecessarily complex. The solution lies in modernizing, managing and
reducing the complexity of the mission-critical software and systems by managing software as an enterprise-wide
portfolio of strategic assets. This presentation introduces Asset-based Software Engineering (ASE), a set of best
practices to help any IT organization reduce complexity, improve productivity, and create the agility required to
compete in today's ever-changing business climate. The presenter will discuss the business value of software assets,
and how to use this information as the foundation for architectural, critical business alignment, governance, and cost
reduction programs throughout IT. Strategies for exploiting asset value to improve the efficiency of IT efforts will
be explored.



How to Minimize the Risks of Launching Modernization Projects
Djenana Campara, CTO, Klocwork

Modernization of existing software has certain business aspects that to a large extent determine how modernization
projects are performed. We discuss the triggers and the cost factors of modernizations, such as the cost of deploying
modernization tools and the cost of understanding the existing system. One-time modernization, triggered by
external factors, can have high cost, and is usually considered having high risk. We show how the risk of
modernization can be significantly lowered if incremental architecture-driven modernization is integrated into the
day-to-day software development process. We show how incremental modernization increases the return on
investment in extending the useful life of existing software by reducing architecture erosion and leveraging the cost
of modernization tools.

1000 – 1030 Session 1 Q&A and Discussion
1030 – 1100 Morning Refreshments


                  Demonstration Area Open
1030 – 1530


                  Sponsor Presentations
1100 –1200


1200 – 1300 Lunch


                  Session 2
1300 – 1500
MDA Legacy Modernization Case Study
Christopher C. Armstrong, Chief Science Officer, ATC Enterprises, Inc. &
Bobbi Underbakke, President/CEO, Adaptive Team Collaboration, Inc.

The State of Wisconsin, Department of Workforce Development, Unemployment Insurance (UI) Division is
completely replacing its legacy platform for managing the disbursement of UI benefits. The Enhanced Automated
Benefits Legal Enterprise Services project issued a request for proposal (RFP) in four months based on UML models
and an MDA framework. The contract was awarded in 2003 to a vendor with an existing package based on a J2EE
platform. The package includes a UML-based reference model and leverages Rational Rose for capturing the
software design. From the UML model, considerable levels of functional software are automatically generated. The
speaker will provide an update on the status of this project and discuss how it is one of the first large-scale projects
based on MDA delivering real business value ($30 million business reengineering & legacy retirement project).

The Consequences of Legacy Application Modernization Choices
Barbara Errickson-Connor, Sr. Director - Product Management, Allen Systems Group, Inc.

There is a growing recognition that modernizing legacy applications may make more sense than completely
rewriting them. What are the consequences of the choices we make as we manage the transition from monolithic
legacy applications to a more agile environment where we can mix and match business logic into new applications
while maintaining business rule consistency and correctness? What can we do to remediate the impact of choices
we make and the results of choices made by others in the legacy code ?


Best Practices for Enterprise Architecture
Sharon Fay, Chief Productivity Strategist, Flashline, Inc.

Documenting and exposing enterprise architecture turns out to be one of the most difficult challenges faced by IT
architects. Join us as we discuss the efforts of Fortune 500 organizations to define and document their Enterprise
Architecture as a starting point for identifying redundancy, consolidating functionality, migrating to a service
oriented architecture, and modernizing their systems. We will focus on the management practices and infrastructure
requirements, and the value of these efforts in terms of charting and communicating strategic direction, and driving
architectural compliance.


1500 – 1530 Afternoon Refreshments
Panel: Towards the Next Generation of Modernization Tools
1530 – 1700
              Moderator: Nikolai Mansurov, Chief Scientist and Chief Architect, Klocwork

      This panel will discuss requirements for the next generation modernization tools. The panel is targeted at
      both the tool vendors and the users of modernization tools. The objective of the panel is to discuss the
      outlook of the software transformation industry and the ways in which the forthcoming OMG specifications
      of the Architecture-Driven Modernization Platform Task Force can change the landscape. Integrations of
      existing tools and cross-pollination between existing methodologies can be discussed. The users of
      modernization tools are encouraged to present their views on the desired direction for the next generation
      tools.

      Panelists: TBA

              Closing Remarks
1700 – 1715
              Fred Waskiewicz, Director of Standards, Object Management Group




              WORKSHOP PROGRAM COMMITTEE
                       Kevin Loughry, Object Management Group
                       Cyrus Montakab, SoftwareMining
                       James Rhyne, IBM
                       Roberto Sasso, ArtinSoft
                       William Ulrich, TSG, Inc.
                       Fred Waskiewicz, Object Management Group (Chair)

More Related Content

What's hot

Systems and Software Architecture: an introduction to architectural modelling
Systems and Software Architecture: an introduction to architectural modellingSystems and Software Architecture: an introduction to architectural modelling
Systems and Software Architecture: an introduction to architectural modellingCARLOS III UNIVERSITY OF MADRID
 
Can “Feature” be used to Model the Changing Access Control Policies?
Can “Feature” be used to Model the Changing Access Control Policies? Can “Feature” be used to Model the Changing Access Control Policies?
Can “Feature” be used to Model the Changing Access Control Policies? IJORCS
 
Software Architecture: Introduction to the Abstraction
Software Architecture: Introduction to the AbstractionSoftware Architecture: Introduction to the Abstraction
Software Architecture: Introduction to the AbstractionHenry Muccini
 
L06 Architecting Activities
L06 Architecting ActivitiesL06 Architecting Activities
L06 Architecting ActivitiesHenry Muccini
 
Software Architecture: Introduction to the abstraction (May 2014_Split)
Software Architecture: Introduction to the abstraction (May 2014_Split)Software Architecture: Introduction to the abstraction (May 2014_Split)
Software Architecture: Introduction to the abstraction (May 2014_Split)Henry Muccini
 
Software Architecture by Reuse, Composition and Customization
Software Architecture by Reuse, Composition and Customization  Software Architecture by Reuse, Composition and Customization
Software Architecture by Reuse, Composition and Customization Ivano Malavolta
 
The role of MDE in Software Architecture Descriptions
The role of MDE in Software Architecture DescriptionsThe role of MDE in Software Architecture Descriptions
The role of MDE in Software Architecture DescriptionsHenry Muccini
 
VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for...
VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for...VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for...
VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for...journalBEEI
 
Model driven process for real time embedded
Model driven process for real time embeddedModel driven process for real time embedded
Model driven process for real time embeddedcaijjournal
 
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...cscpconf
 
Architecture Design Decisions and Group Decision Making
Architecture Design Decisions and Group Decision MakingArchitecture Design Decisions and Group Decision Making
Architecture Design Decisions and Group Decision MakingHenry Muccini
 
Software architecture introduction to the abstraction gssi_nov2013
Software architecture introduction to the abstraction gssi_nov2013Software architecture introduction to the abstraction gssi_nov2013
Software architecture introduction to the abstraction gssi_nov2013Henry Muccini
 
TREA - transparent enterprise architecture
TREA - transparent enterprise architectureTREA - transparent enterprise architecture
TREA - transparent enterprise architectureJernej Vrčko
 
Software Project Managment
Software Project ManagmentSoftware Project Managment
Software Project ManagmentAhmed Alageed
 
Software Engineering: What is That?
Software Engineering: What is That?Software Engineering: What is That?
Software Engineering: What is That?Henry Muccini
 
Loyd Baker: MBSE - connecting the dots process with loyd baker
Loyd Baker: MBSE - connecting the dots process with loyd bakerLoyd Baker: MBSE - connecting the dots process with loyd baker
Loyd Baker: MBSE - connecting the dots process with loyd bakerEnergyTech2015
 
Fundamental design concepts
Fundamental design conceptsFundamental design concepts
Fundamental design conceptssrijavel
 

What's hot (20)

Sda 2
Sda   2Sda   2
Sda 2
 
Systems and Software Architecture: an introduction to architectural modelling
Systems and Software Architecture: an introduction to architectural modellingSystems and Software Architecture: an introduction to architectural modelling
Systems and Software Architecture: an introduction to architectural modelling
 
G213538
G213538G213538
G213538
 
Can “Feature” be used to Model the Changing Access Control Policies?
Can “Feature” be used to Model the Changing Access Control Policies? Can “Feature” be used to Model the Changing Access Control Policies?
Can “Feature” be used to Model the Changing Access Control Policies?
 
Software Architecture: Introduction to the Abstraction
Software Architecture: Introduction to the AbstractionSoftware Architecture: Introduction to the Abstraction
Software Architecture: Introduction to the Abstraction
 
L06 Architecting Activities
L06 Architecting ActivitiesL06 Architecting Activities
L06 Architecting Activities
 
Software Architecture: Introduction to the abstraction (May 2014_Split)
Software Architecture: Introduction to the abstraction (May 2014_Split)Software Architecture: Introduction to the abstraction (May 2014_Split)
Software Architecture: Introduction to the abstraction (May 2014_Split)
 
Software Architecture by Reuse, Composition and Customization
Software Architecture by Reuse, Composition and Customization  Software Architecture by Reuse, Composition and Customization
Software Architecture by Reuse, Composition and Customization
 
The role of MDE in Software Architecture Descriptions
The role of MDE in Software Architecture DescriptionsThe role of MDE in Software Architecture Descriptions
The role of MDE in Software Architecture Descriptions
 
VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for...
VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for...VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for...
VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for...
 
1131 2532-1-sm
1131 2532-1-sm1131 2532-1-sm
1131 2532-1-sm
 
Model driven process for real time embedded
Model driven process for real time embeddedModel driven process for real time embedded
Model driven process for real time embedded
 
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
 
Architecture Design Decisions and Group Decision Making
Architecture Design Decisions and Group Decision MakingArchitecture Design Decisions and Group Decision Making
Architecture Design Decisions and Group Decision Making
 
Software architecture introduction to the abstraction gssi_nov2013
Software architecture introduction to the abstraction gssi_nov2013Software architecture introduction to the abstraction gssi_nov2013
Software architecture introduction to the abstraction gssi_nov2013
 
TREA - transparent enterprise architecture
TREA - transparent enterprise architectureTREA - transparent enterprise architecture
TREA - transparent enterprise architecture
 
Software Project Managment
Software Project ManagmentSoftware Project Managment
Software Project Managment
 
Software Engineering: What is That?
Software Engineering: What is That?Software Engineering: What is That?
Software Engineering: What is That?
 
Loyd Baker: MBSE - connecting the dots process with loyd baker
Loyd Baker: MBSE - connecting the dots process with loyd bakerLoyd Baker: MBSE - connecting the dots process with loyd baker
Loyd Baker: MBSE - connecting the dots process with loyd baker
 
Fundamental design concepts
Fundamental design conceptsFundamental design concepts
Fundamental design concepts
 

Viewers also liked

Presentacin B2 C
Presentacin B2 CPresentacin B2 C
Presentacin B2 Cguest02194a
 
VPRO Kenniscentrum Preso over Ning Plus Notes
VPRO Kenniscentrum Preso over Ning Plus NotesVPRO Kenniscentrum Preso over Ning Plus Notes
VPRO Kenniscentrum Preso over Ning Plus NotesLeolovesSlideShare
 
Nuclear Power - A Cheap Option?
Nuclear Power - A Cheap Option?Nuclear Power - A Cheap Option?
Nuclear Power - A Cheap Option?greenpeacenordic
 
Nuclear Power - A Cheap Option?
Nuclear Power - A Cheap Option?Nuclear Power - A Cheap Option?
Nuclear Power - A Cheap Option?greenpeacenordic
 
Nuclear Power - A Cheap Option?
Nuclear Power - A Cheap Option?Nuclear Power - A Cheap Option?
Nuclear Power - A Cheap Option?greenpeacenordic
 

Viewers also liked (7)

Vuosi Kuvina 2007
Vuosi Kuvina 2007Vuosi Kuvina 2007
Vuosi Kuvina 2007
 
Presentacin B2 C
Presentacin B2 CPresentacin B2 C
Presentacin B2 C
 
VPRO Kenniscentrum Preso over Ning Plus Notes
VPRO Kenniscentrum Preso over Ning Plus NotesVPRO Kenniscentrum Preso over Ning Plus Notes
VPRO Kenniscentrum Preso over Ning Plus Notes
 
Nuclear Power - A Cheap Option?
Nuclear Power - A Cheap Option?Nuclear Power - A Cheap Option?
Nuclear Power - A Cheap Option?
 
Nuclear Power - A Cheap Option?
Nuclear Power - A Cheap Option?Nuclear Power - A Cheap Option?
Nuclear Power - A Cheap Option?
 
Nuclear Power - A Cheap Option?
Nuclear Power - A Cheap Option?Nuclear Power - A Cheap Option?
Nuclear Power - A Cheap Option?
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Similar to Adm Workshop Program

Assisting Migration and Evolution of Relational Legacy Databases
Assisting Migration and Evolution of Relational Legacy DatabasesAssisting Migration and Evolution of Relational Legacy Databases
Assisting Migration and Evolution of Relational Legacy DatabasesGihan Wikramanayake
 
The Essentials Of Project Management
The Essentials Of Project ManagementThe Essentials Of Project Management
The Essentials Of Project ManagementLaura Arrigo
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYShivananda Rai
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420Steve Goeringer
 
Next Generation Automation Final
Next Generation Automation FinalNext Generation Automation Final
Next Generation Automation Finalimpodgirl
 
Opportunities and Challenges for Running Scientific Workflows on the Cloud
Opportunities and Challenges for Running Scientific Workflows on the Cloud Opportunities and Challenges for Running Scientific Workflows on the Cloud
Opportunities and Challenges for Running Scientific Workflows on the Cloud lyingcom
 
Application Crisis avoidance six things you can do
Application Crisis avoidance  six things you can doApplication Crisis avoidance  six things you can do
Application Crisis avoidance six things you can doApalytics
 
PLA and the SC 2002-04-15
PLA and the SC 2002-04-15PLA and the SC 2002-04-15
PLA and the SC 2002-04-15Jay van Zyl
 
Fostering MBSE in Engineering Culture
Fostering MBSE in Engineering CultureFostering MBSE in Engineering Culture
Fostering MBSE in Engineering CultureObeo
 
Cloud Design Patterns - PRESCRIPTIVE ARCHITECTURE GUIDANCE FOR CLOUD APPLICAT...
Cloud Design Patterns - PRESCRIPTIVE ARCHITECTURE GUIDANCE FOR CLOUD APPLICAT...Cloud Design Patterns - PRESCRIPTIVE ARCHITECTURE GUIDANCE FOR CLOUD APPLICAT...
Cloud Design Patterns - PRESCRIPTIVE ARCHITECTURE GUIDANCE FOR CLOUD APPLICAT...David J Rosenthal
 
Clone of an organization
Clone of an organizationClone of an organization
Clone of an organizationIRJET Journal
 
Evaluvation of Applying Knowledge Management System Architecture in Software ...
Evaluvation of Applying Knowledge Management System Architecture in Software ...Evaluvation of Applying Knowledge Management System Architecture in Software ...
Evaluvation of Applying Knowledge Management System Architecture in Software ...IOSR Journals
 
Managing Complexity and Change with Scalable Software Design
Managing Complexity and Change with Scalable Software DesignManaging Complexity and Change with Scalable Software Design
Managing Complexity and Change with Scalable Software Designlbergmans
 
THE UNIFIED APPROACH FOR ORGANIZATIONAL NETWORK VULNERABILITY ASSESSMENT
THE UNIFIED APPROACH FOR ORGANIZATIONAL NETWORK VULNERABILITY ASSESSMENTTHE UNIFIED APPROACH FOR ORGANIZATIONAL NETWORK VULNERABILITY ASSESSMENT
THE UNIFIED APPROACH FOR ORGANIZATIONAL NETWORK VULNERABILITY ASSESSMENTijseajournal
 
Troux Presentation Austin Texas
Troux Presentation Austin TexasTroux Presentation Austin Texas
Troux Presentation Austin TexasJoeFaghani
 
Flexible and modular software framework as a solution for operational excelle...
Flexible and modular software framework as a solution for operational excelle...Flexible and modular software framework as a solution for operational excelle...
Flexible and modular software framework as a solution for operational excelle...Thomas Schulz
 
Microservice final final
Microservice final finalMicroservice final final
Microservice final finalgaurav shukla
 
Data Center Best Practice and Architecture
Data Center Best Practice and ArchitectureData Center Best Practice and Architecture
Data Center Best Practice and Architecturebutest
 
Lecture-2-Architectural_Concepts.pdf
Lecture-2-Architectural_Concepts.pdfLecture-2-Architectural_Concepts.pdf
Lecture-2-Architectural_Concepts.pdfAkilaGamage2
 

Similar to Adm Workshop Program (20)

Assisting Migration and Evolution of Relational Legacy Databases
Assisting Migration and Evolution of Relational Legacy DatabasesAssisting Migration and Evolution of Relational Legacy Databases
Assisting Migration and Evolution of Relational Legacy Databases
 
The Essentials Of Project Management
The Essentials Of Project ManagementThe Essentials Of Project Management
The Essentials Of Project Management
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420
 
Next Generation Automation Final
Next Generation Automation FinalNext Generation Automation Final
Next Generation Automation Final
 
Opportunities and Challenges for Running Scientific Workflows on the Cloud
Opportunities and Challenges for Running Scientific Workflows on the Cloud Opportunities and Challenges for Running Scientific Workflows on the Cloud
Opportunities and Challenges for Running Scientific Workflows on the Cloud
 
Application Crisis avoidance six things you can do
Application Crisis avoidance  six things you can doApplication Crisis avoidance  six things you can do
Application Crisis avoidance six things you can do
 
PLA and the SC 2002-04-15
PLA and the SC 2002-04-15PLA and the SC 2002-04-15
PLA and the SC 2002-04-15
 
Fostering MBSE in Engineering Culture
Fostering MBSE in Engineering CultureFostering MBSE in Engineering Culture
Fostering MBSE in Engineering Culture
 
Cloud Design Patterns - PRESCRIPTIVE ARCHITECTURE GUIDANCE FOR CLOUD APPLICAT...
Cloud Design Patterns - PRESCRIPTIVE ARCHITECTURE GUIDANCE FOR CLOUD APPLICAT...Cloud Design Patterns - PRESCRIPTIVE ARCHITECTURE GUIDANCE FOR CLOUD APPLICAT...
Cloud Design Patterns - PRESCRIPTIVE ARCHITECTURE GUIDANCE FOR CLOUD APPLICAT...
 
Clone of an organization
Clone of an organizationClone of an organization
Clone of an organization
 
Evaluvation of Applying Knowledge Management System Architecture in Software ...
Evaluvation of Applying Knowledge Management System Architecture in Software ...Evaluvation of Applying Knowledge Management System Architecture in Software ...
Evaluvation of Applying Knowledge Management System Architecture in Software ...
 
Managing Complexity and Change with Scalable Software Design
Managing Complexity and Change with Scalable Software DesignManaging Complexity and Change with Scalable Software Design
Managing Complexity and Change with Scalable Software Design
 
Agile It 20091020
Agile It 20091020Agile It 20091020
Agile It 20091020
 
THE UNIFIED APPROACH FOR ORGANIZATIONAL NETWORK VULNERABILITY ASSESSMENT
THE UNIFIED APPROACH FOR ORGANIZATIONAL NETWORK VULNERABILITY ASSESSMENTTHE UNIFIED APPROACH FOR ORGANIZATIONAL NETWORK VULNERABILITY ASSESSMENT
THE UNIFIED APPROACH FOR ORGANIZATIONAL NETWORK VULNERABILITY ASSESSMENT
 
Troux Presentation Austin Texas
Troux Presentation Austin TexasTroux Presentation Austin Texas
Troux Presentation Austin Texas
 
Flexible and modular software framework as a solution for operational excelle...
Flexible and modular software framework as a solution for operational excelle...Flexible and modular software framework as a solution for operational excelle...
Flexible and modular software framework as a solution for operational excelle...
 
Microservice final final
Microservice final finalMicroservice final final
Microservice final final
 
Data Center Best Practice and Architecture
Data Center Best Practice and ArchitectureData Center Best Practice and Architecture
Data Center Best Practice and Architecture
 
Lecture-2-Architectural_Concepts.pdf
Lecture-2-Architectural_Concepts.pdfLecture-2-Architectural_Concepts.pdf
Lecture-2-Architectural_Concepts.pdf
 

More from Emmanuel Fuchs

Distributed Object Systems
Distributed Object SystemsDistributed Object Systems
Distributed Object SystemsEmmanuel Fuchs
 
CARDAMOM_CCM_Tutorial_Draft 2004
CARDAMOM_CCM_Tutorial_Draft 2004CARDAMOM_CCM_Tutorial_Draft 2004
CARDAMOM_CCM_Tutorial_Draft 2004Emmanuel Fuchs
 
Anootations IEEE 42010 : A Conceptual Model of Architecture Description
Anootations IEEE 42010 : A Conceptual Model of Architecture DescriptionAnootations IEEE 42010 : A Conceptual Model of Architecture Description
Anootations IEEE 42010 : A Conceptual Model of Architecture DescriptionEmmanuel Fuchs
 
PLUG : Presentation Layer Universal Generator
 PLUG : Presentation Layer Universal Generator PLUG : Presentation Layer Universal Generator
PLUG : Presentation Layer Universal GeneratorEmmanuel Fuchs
 
PLUG : Presentation Layer Universal Generator
PLUG : Presentation Layer Universal GeneratorPLUG : Presentation Layer Universal Generator
PLUG : Presentation Layer Universal GeneratorEmmanuel Fuchs
 
PLUG : Presentation Layer Universal Generator
 PLUG : Presentation Layer Universal Generator PLUG : Presentation Layer Universal Generator
PLUG : Presentation Layer Universal GeneratorEmmanuel Fuchs
 
PLUG : Presentation Layer Universal Generator
PLUG : Presentation Layer Universal GeneratorPLUG : Presentation Layer Universal Generator
PLUG : Presentation Layer Universal GeneratorEmmanuel Fuchs
 
UBSS : Unix Based System Software
UBSS : Unix Based System SoftwareUBSS : Unix Based System Software
UBSS : Unix Based System SoftwareEmmanuel Fuchs
 
Object-Oriented Real-Time Distributed Computing, 1999. (ISORC '99)
Object-Oriented Real-Time Distributed Computing, 1999. (ISORC '99)Object-Oriented Real-Time Distributed Computing, 1999. (ISORC '99)
Object-Oriented Real-Time Distributed Computing, 1999. (ISORC '99)Emmanuel Fuchs
 
Distributed Object Computing
Distributed Object ComputingDistributed Object Computing
Distributed Object ComputingEmmanuel Fuchs
 
Executive Summary ITEA Roadmap 2
Executive Summary ITEA Roadmap 2Executive Summary ITEA Roadmap 2
Executive Summary ITEA Roadmap 2Emmanuel Fuchs
 

More from Emmanuel Fuchs (20)

Distributed Object Systems
Distributed Object SystemsDistributed Object Systems
Distributed Object Systems
 
CARDAMOM_CCM_Tutorial_Draft 2004
CARDAMOM_CCM_Tutorial_Draft 2004CARDAMOM_CCM_Tutorial_Draft 2004
CARDAMOM_CCM_Tutorial_Draft 2004
 
Anootations IEEE 42010 : A Conceptual Model of Architecture Description
Anootations IEEE 42010 : A Conceptual Model of Architecture DescriptionAnootations IEEE 42010 : A Conceptual Model of Architecture Description
Anootations IEEE 42010 : A Conceptual Model of Architecture Description
 
Book Recommendations
 Book Recommendations Book Recommendations
Book Recommendations
 
PLUG : Presentation Layer Universal Generator
 PLUG : Presentation Layer Universal Generator PLUG : Presentation Layer Universal Generator
PLUG : Presentation Layer Universal Generator
 
PLUG : Presentation Layer Universal Generator
PLUG : Presentation Layer Universal GeneratorPLUG : Presentation Layer Universal Generator
PLUG : Presentation Layer Universal Generator
 
PLUG : Presentation Layer Universal Generator
 PLUG : Presentation Layer Universal Generator PLUG : Presentation Layer Universal Generator
PLUG : Presentation Layer Universal Generator
 
PLUG : Presentation Layer Universal Generator
PLUG : Presentation Layer Universal GeneratorPLUG : Presentation Layer Universal Generator
PLUG : Presentation Layer Universal Generator
 
UBSS2
UBSS2UBSS2
UBSS2
 
UBSS : Unix Based System Software
UBSS : Unix Based System SoftwareUBSS : Unix Based System Software
UBSS : Unix Based System Software
 
ISORC 1999 Panel III
ISORC 1999 Panel IIIISORC 1999 Panel III
ISORC 1999 Panel III
 
ISORC’99
ISORC’99ISORC’99
ISORC’99
 
Object-Oriented Real-Time Distributed Computing, 1999. (ISORC '99)
Object-Oriented Real-Time Distributed Computing, 1999. (ISORC '99)Object-Oriented Real-Time Distributed Computing, 1999. (ISORC '99)
Object-Oriented Real-Time Distributed Computing, 1999. (ISORC '99)
 
Distributed Object Computing
Distributed Object ComputingDistributed Object Computing
Distributed Object Computing
 
Hash map
Hash mapHash map
Hash map
 
ATM system history
ATM system historyATM system history
ATM system history
 
Middleware
MiddlewareMiddleware
Middleware
 
photoISEN 1987
photoISEN 1987photoISEN 1987
photoISEN 1987
 
EUROCAT
EUROCATEUROCAT
EUROCAT
 
Executive Summary ITEA Roadmap 2
Executive Summary ITEA Roadmap 2Executive Summary ITEA Roadmap 2
Executive Summary ITEA Roadmap 2
 

Recently uploaded

8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 

Recently uploaded (20)

8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 

Adm Workshop Program

  • 1. Architecture-Driven Modernization Workshop “A Model-driven Approach to Modernizing IT Systems” March 22-24, 2004 Chicago, IL, USA Workshop Program Monday, March 22, 2004 Tutorial 1: Application Modernization Study: 0900 - 1230 Leveraging Existing Software Assets William Ulrich, President, Tactical Strategy Group, Inc. Existing application environments are plagued by years of patchwork changes piled upon aging architectures. Yet many of these systems retain business value because they contain business logic that cannot be re-specified in cost or time effective ways. Understanding, upgrading, migrating, deconstructing and / or redeploying these systems, collectively called modernization, begins where from-scratch development and non-invasive integration fall short. This half-day tutorial tackles difficult application challenges head on. Application knowledge reclamation and transformation play a key role in business systems analysis, integration, systems development, package selection and deployment, and a variety of other priority initiatives. Attendees will learn how to more effectively meet time- critical business requirements by leveraging existing application assets. The tutorial will provide cost effective options to business and IT project teams crafting integration, enhancement, replacement, package deployment and Web-based solutions through the use of application modernization techniques and tools. Topics include: • Overview & Taxonomy • Existing Application Challenges • Legacy Environments vs. Emerging Technologies • A Modernization Framework & Strategy • Application Meta-Data Management • Enterprise & Application Area Assessments • Application & Data Migration, Structuring & Rationalization, • Architecture Transformation & Redeployment • Enabling Tools & Technologies • Modernization Scenarios 1030 – 1100 Morning Refreshments 1230 – 1330 Lunch
  • 2. Tutorial 2: quot;Managed Architecture of Existing Software as a 1330 – 1500 Practical Transition to MDAquot; Nikolai Mansurov, Chief Scientist and Chief Architect, Klocwork This tutorial is intended as a hand-on demonstration of the basic techniques for managing existing code at the model level rather than at the code level. The tutorial provides the required background: the problem of adopting MDA for projects with existing code; the challenges of maintenance and evolution of existing systems; architecture erosion. It introduces the concept of managed architectures and how to make a transition from managing source code to managing architecture. Then the tutorial focuses on how to excavate architecture models. A comprehensive case study is used. Then the tutorial introduces the concept of an Architecture Rule and demonstrates, how architecture rules can be enforcement. Different strategies for architecture rule enforcement are discussed (rule checking, initiated by developer; integration into ClearCase for automatic checking at check-in time; integration into the software build for automatic checking during the build of the complete product). The tutorial concludes by discussing why managed architectures can be a good practical step of transition towards MDA. This tutorial is targeted at the general audience of software development practitioners and software development managers. 1500 – 1530 Afternoon Refreshments Tutorial 3: How to Harvest Reusable Components in Existing 1530 – 1700 Software Nikolai Mansurov, Chief Scientist and Chief Architect, Klocwork The objective of this tutorial is to introduce basic concepts of architecture re-factoring, with the emphasis on re- factoring to isolate reusable components. The tutorial provides a general introduction into the process of harvesting of reusable components and the corresponding challenges, such as architecture erosion and cyclic dependencies between components. Then the tutorial focuses on how to use an architecture model of existing code to identify components and re-factor to introduce proper component scope by tracking dependencies between subcomponents. The presentation is accompanied by detailed demonstration of the methodology steps using a case study. Tutorial is targeted at a broad audience of software development practitioners. Special Session: OMG Architecture-Driven Modernization Platform 1700 – 1730 Task Force Report Task Force Co-Chairs: Djenana Campara, CTO, Klocwork William Ulrich, President, Tactical Strategy Group, Inc.
  • 3. Tuesday, March 23, 2004 Workshop Welcome and Opening Remarks 0830 - 0840 Program Committee Chair: Fred Waskiewicz, Director of Standards, Object Management Group ADM Technical Approaches Moderator: James Rhyne, Distinguished Engineer, IBM This track presents methodologies, techniques, processes and tools supporting system architecture analysis and modernization activities. Session 1 0840 - 1040 Model Driven Legacy Migration Krupa Benhur, Patrick DJ Kulandaisamy, Venugopal Subbarao Comfactory, SETLabs, Infosys Technologies Limited This presentation will bring out the significance and value of models in legacy application migration. Core models define the platform, application, and data layer concepts in unambiguous terms. Another important concept elaborated here is migration map that encompasses all the aspects for a successful migration. Consistency and broader perspective in migration projects are the direct benefits of using these models. Domain Driven Modernization of Legacy Systems Vladimir Bacvanski & Petter Graff, Vice Presidents, InferData Corporation Modernization of legacy systems is a common problem in an enterprise. The modernization or replacement of the legacy systems is often performed suboptimally, achieving replicated or just enhanced functionality. MDA is viewed as a vehicle to increase the efficiency of the modernization process. However, the full benefit is achieved by rooting the modernization approach in the domain models. This allows for aligning the modernized system with the business, supporting families of systems in product lines and making the tacit knowledge explicit. The talk describes the process and modeling techniques for domain driven, MDA based modernization of legacy systems. Effects of Scale on Methodology and Tools for ADM James Rhyne, Distinguished Engineer, IBM Current fine grained analysis tools are based on quot;greedyquot; and quot;depth firstquot; analysis heuristics that do not scale. This report will focus on other heuristics and methodologies for information collection and analysis that can address the scaleability problem. Many of these heuristics will produce some important and relevant results quickly with other results taking longer. Because of the quot;no free lunchquot; principle, the full analysis may take longer than in the greedy and depth first cases. This creates a need for tooling that can run unattended and report its results as asynchronous events. There are tactical engineering considerations to be deal with. Most of today's fine grained analysis tools are based on greedy and depth first heuristics. These tools are not likely to be rewritten. To resolve this, we will need to create a model of large scale, coarse grained analysis tools into which the fine grained analysis tools can be plugged. 1010 – 1040 Session 1: Q & A and Discussion Demonstration Area Open 1030 – 1730 1040 – 1110 Morning Refreshments
  • 4. Session 2 1110 – 1230 Software Architecture Mining in Realized DBMSs Bernd G. Wenzel, Vorarlberg Unversity Many operational application systems today use relational database management systems (RDBMSs) to store their persistent data. This is relevant in the context of ADM for several reasons including: Architecturally relevant objects in a software system are more likely to be persistent than transient. As a consequence any ADM methodology should analyze the databases of systems to be modernized. RDBMSs have an active data dictionary containing information about the tables it stores, their columns, constraints, keys, relationships, views, etc. This presentation will offer ideas, how the data dictionary information in an RDBMS can be used to compile a reasonable approximation of the static model underlying the application to be modernized. Klocwork Architecture Excavation Methodology Djenana Campara, CTO, Klocwork Existing software systems, over time evolve into conflicting or challenging designs that require laborious manual coding methods and often resist evolution due to factors that are not exclusively related to functionality. Common examples of such factors include a system's inability to be understood or maintained cost-effectively and its dependence on undesired architectures, caused by architecture erosion. In this presentation we will show you how you can use architecture excavation tool-assisted process to recover architecture model. The excavated model is precise with respect to the existing code. Precise excavated model of the existing system allows managing existing system at the model level, rather than at the code level, which is an important step in transition towards model-based techniques. 1210 – 1230 Session 2: Q & A and Discussion 1230 – 1330 Lunch Session 3 1330 – 1500 Extending the Life of Software Assets through Componentization Charles Dickerson, VP of Marketing & Product Management, Relativity Technologies Inc. Time pressures and technical compromises often cause the code quality of enterprise applications to degrade - jeopardizing the functionality and stability of the system. This presentation will examine automated techniques and algorithms that can reduce the complexity and improve the technical and business performance of an application portfolio. Stage of Legacy Application Modernization Barbara Errickson-Connor, Vice President Applications Product Management With the growing recognition that modernizing legacy applications may make more sense than completely rewriting them, what are the consequences if we don't recognize the truth about the steps we should take? Transitioning by Stages: o Understand code and clean coding anomalies, dead code, dead data o Restructure code – mine business logic as component methods and/or business rules o Transform code to new languages and/or to new technologies and platforms o Manage modernized & discovered reusable software This presentation will cover expected steps within these 4 stages.
  • 5. 1500 – 1530 Afternoon Refreshments Panel: OMG's ADM Standardization Effort: Solution or Dilution? 1530 - 1700 Moderator: Fred Waskiewicz, Director of Standards, Object Management Group OMG’s ADM activity seeks to revitalize existing applications, making them more agile and leading to successful modernization. Yet criticisms have been leveled against such work, claiming it strives to do too much; isn’t cost effective; produces minimal gains; some programming languages deserve to die; and that existing tools already do an admirable job. This panel of ADM experts tackles these criticisms point-by- point. Panelists: TBA WORKSHOP RECEPTION 1800 – 2000
  • 6. Wednesday, March 24, 2004 Practice & Experience Moderator: Fred Waskiewicz, Director of Standards, Object Management Group This track explores ADM in action: experience reports and best practices summaries offering advice and guidance in ADM technical approaches and project management. Session 1 0830 – 1030 ADM in Air Traffic Control and Safety Critical Systems Emmanuel Fuchs, Chief Architect, THALES ATM (Air Traffic Management) This presentation will address current plans and requirements for ADM usage in THALES to modernize aeronautical safety critical products. For the ATC domain, ADM leverages the reuse of well proven robust legacy software enabling secure investment in today’s technologies with an open end to the future. The main issue in the safety critical domain is the migration from Ada code base to C, C++ and Java language. This domain also faces the migration to new middleware technologies such as RT CORBA and CORBA Component Model (CCM). The ultimate usage of ADM is to build a domain model from the existing code and expert knowledge. This talk presents the three steps proposed to apply ADM in safety critical system: short term: code base optimization, medium term: application migration, long term: domain model extraction from existing code base. The THALES experience will be used to provide requirements for industrial ADM tools for safety critical domain such as transportation, power, and health. Asset-based Software Engineering Charles Stack, Founder and CEO, Flashline In today's complex, interconnected world the business value of information is too easily lost in software and systems that have become increasingly and unnecessarily complex. The solution lies in modernizing, managing and reducing the complexity of the mission-critical software and systems by managing software as an enterprise-wide portfolio of strategic assets. This presentation introduces Asset-based Software Engineering (ASE), a set of best practices to help any IT organization reduce complexity, improve productivity, and create the agility required to compete in today's ever-changing business climate. The presenter will discuss the business value of software assets, and how to use this information as the foundation for architectural, critical business alignment, governance, and cost reduction programs throughout IT. Strategies for exploiting asset value to improve the efficiency of IT efforts will be explored. How to Minimize the Risks of Launching Modernization Projects Djenana Campara, CTO, Klocwork Modernization of existing software has certain business aspects that to a large extent determine how modernization projects are performed. We discuss the triggers and the cost factors of modernizations, such as the cost of deploying modernization tools and the cost of understanding the existing system. One-time modernization, triggered by external factors, can have high cost, and is usually considered having high risk. We show how the risk of modernization can be significantly lowered if incremental architecture-driven modernization is integrated into the day-to-day software development process. We show how incremental modernization increases the return on investment in extending the useful life of existing software by reducing architecture erosion and leveraging the cost of modernization tools. 1000 – 1030 Session 1 Q&A and Discussion
  • 7. 1030 – 1100 Morning Refreshments Demonstration Area Open 1030 – 1530 Sponsor Presentations 1100 –1200 1200 – 1300 Lunch Session 2 1300 – 1500 MDA Legacy Modernization Case Study Christopher C. Armstrong, Chief Science Officer, ATC Enterprises, Inc. & Bobbi Underbakke, President/CEO, Adaptive Team Collaboration, Inc. The State of Wisconsin, Department of Workforce Development, Unemployment Insurance (UI) Division is completely replacing its legacy platform for managing the disbursement of UI benefits. The Enhanced Automated Benefits Legal Enterprise Services project issued a request for proposal (RFP) in four months based on UML models and an MDA framework. The contract was awarded in 2003 to a vendor with an existing package based on a J2EE platform. The package includes a UML-based reference model and leverages Rational Rose for capturing the software design. From the UML model, considerable levels of functional software are automatically generated. The speaker will provide an update on the status of this project and discuss how it is one of the first large-scale projects based on MDA delivering real business value ($30 million business reengineering & legacy retirement project). The Consequences of Legacy Application Modernization Choices Barbara Errickson-Connor, Sr. Director - Product Management, Allen Systems Group, Inc. There is a growing recognition that modernizing legacy applications may make more sense than completely rewriting them. What are the consequences of the choices we make as we manage the transition from monolithic legacy applications to a more agile environment where we can mix and match business logic into new applications while maintaining business rule consistency and correctness? What can we do to remediate the impact of choices we make and the results of choices made by others in the legacy code ? Best Practices for Enterprise Architecture Sharon Fay, Chief Productivity Strategist, Flashline, Inc. Documenting and exposing enterprise architecture turns out to be one of the most difficult challenges faced by IT architects. Join us as we discuss the efforts of Fortune 500 organizations to define and document their Enterprise Architecture as a starting point for identifying redundancy, consolidating functionality, migrating to a service oriented architecture, and modernizing their systems. We will focus on the management practices and infrastructure requirements, and the value of these efforts in terms of charting and communicating strategic direction, and driving architectural compliance. 1500 – 1530 Afternoon Refreshments
  • 8. Panel: Towards the Next Generation of Modernization Tools 1530 – 1700 Moderator: Nikolai Mansurov, Chief Scientist and Chief Architect, Klocwork This panel will discuss requirements for the next generation modernization tools. The panel is targeted at both the tool vendors and the users of modernization tools. The objective of the panel is to discuss the outlook of the software transformation industry and the ways in which the forthcoming OMG specifications of the Architecture-Driven Modernization Platform Task Force can change the landscape. Integrations of existing tools and cross-pollination between existing methodologies can be discussed. The users of modernization tools are encouraged to present their views on the desired direction for the next generation tools. Panelists: TBA Closing Remarks 1700 – 1715 Fred Waskiewicz, Director of Standards, Object Management Group WORKSHOP PROGRAM COMMITTEE Kevin Loughry, Object Management Group Cyrus Montakab, SoftwareMining James Rhyne, IBM Roberto Sasso, ArtinSoft William Ulrich, TSG, Inc. Fred Waskiewicz, Object Management Group (Chair)