5,219 research outputs found

    Developing Legacy System Migration Methods and Tools for Technology Transfer

    Get PDF
    This paper presents the research results of an ongoing technology transfer project carried out in coopera- tion between the University of Salerno and a small software company. The project is aimed at developing and transferring migration technology to the industrial partner. The partner should be enabled to migrate monolithic multi-user COBOL legacy systems to a multi-tier Web-based architecture. The assessment of the legacy systems of the partner company revealed that these systems had a very low level of decompos- ability with spaghetti-like code and embedded control flow and database accesses within the user interface descriptions. For this reason, it was decided to adopt an incremental migration strategy based on the reengineering of the user interface using Web technology, on the transformation of interactive legacy programs into batch programs, and the wrapping of the legacy programs. A middleware framework links the new Web-based user interface with the Wrapped Legacy System. An Eclipse plug-in, named MELIS (migration environment for legacy information systems), was also developed to support the migration process. Both the migration strategy and the tool have been applied to two essential subsystems of the most business critical legacy system of the partner company

    Privacy-Preserving Reengineering of Model-View-Controller Application Architectures Using Linked Data

    Get PDF
    When a legacy system’s software architecture cannot be redesigned, implementing additional privacy requirements is often complex, unreliable and costly to maintain. This paper presents a privacy-by-design approach to reengineer web applications as linked data-enabled and implement access control and privacy preservation properties. The method is based on the knowledge of the application architecture, which for the Web of data is commonly designed on the basis of a model-view-controller pattern. Whereas wrapping techniques commonly used to link data of web applications duplicate the security source code, the new approach allows for the controlled disclosure of an application’s data, while preserving non-functional properties such as privacy preservation. The solution has been implemented and compared with existing linked data frameworks in terms of reliability, maintainability and complexity

    A Model-Driven Architecture Approach to the Efficient Identification of Services on Service-oriented Enterprise Architecture

    No full text
    Service-Oriented Enterprise Architecture requires the efficient development of loosely-coupled and interoperable sets of services. Existing design approaches do not always take full advantage of the value and importance of the engineering invested in existing legacy systems. This paper proposes an approach to define the key services from such legacy systems effectively. The approach focuses on identifying these services based on a Model-Driven Architecture approach supported by guidelines over a wide range of possible service types

    Human Resource and Employment Practices in Telecommunications Services, 1980-1998

    Get PDF
    [Excerpt] In the academic literature on manufacturing, much research and debate have focused on whether firms are adopting some form of “high-performance” or “high-involvement” work organization based on such practices as employee participation, teams, and increased discretion, skills, and training for frontline workers (Ichniowski et al., 1996; Kochan and Osterman, 1994; MacDuffie, 1995). Whereas many firms in the telecommunications industry flirted with these ideas in the 1980s, they did not prove to be a lasting source of inspiration for the redesign of work and employment practices. Rather, work restructuring in telecommunications services has been driven by the ability of firms to leverage network and information technologies to reduce labor costs and create customer segmentation strategies. “Good jobs” versus “bad jobs,” or higher versus lower wage jobs, do not vary according to whether firms adopt a high- involvement model. They vary along two other dimensions: (1) within firms and occupations, by the value-added of the customer segment that an employee group serves; and (2) across firms, by union and nonunion status. We believe that this customer segmentation strategy is becoming a more general model for employment practices in large-scale service | operations; telecommunications services firms may be somewhat more | advanced than other service firms in adopting this strategy because of certain unique industry characteristics. The scale economies of network technology are such that once a company builds the network infrastructure to a customer’s specifications, the cost of additional services is essentially zero. As a result, and notwithstanding technological uncertainty, all of the industry’s major players are attempting to take advantage of system economies inherent in the nature of the product market and technology to provide customized packages of multimedia products to identified market segments. They have organized into market-driven business units providing differentiated services to large businesses and institutions, small businesses, and residential customers. They have used information technologies and process reengineering to customize specific services to different segments according to customer needs and ability to pay. Variation in work and employment practices, or labor market segmentation, follows product market segmentation. As a result, much of the variation in employment practices in this industry is within firms and within occupations according to market segment rather than across firms. In addition, despite market deregulation beginning in 1984 and opportunities for new entrants, a tightly led oligopoly structure is replacing the regulated Bell System monopoly. Former Bell System companies, the giants of the regulated period, continue to dominate market share in the post-1984 period. Older players and new entrants alike are merging and consolidating in order to have access to multimedia markets. What is striking in this industry, therefore, is the relative lack of variation in management and employment practices across firms after more than a decade of experience with deregulation. We attribute this lack of variation to three major sources. (1) Technological advances and network economics provide incentives for mergers, organizational consolidation, and, as indicated above, similar business strategies. (2) The former Bell System companies have deep institutional ties, and they continue to benchmark against and imitate each other so that ideas about restructuring have diffused quickly among them. (3) Despite overall deunionization in the industry, they continue to have high unionization rates; de facto pattern bargaining within the Bell system has remained quite strong. Therefore, similar employment practices based on inherited collective bargaining agreements continue to exist across former Bell System firms

    C to O-O Translation: Beyond the Easy Stuff

    Full text link
    Can we reuse some of the huge code-base developed in C to take advantage of modern programming language features such as type safety, object-orientation, and contracts? This paper presents a source-to-source translation of C code into Eiffel, a modern object-oriented programming language, and the supporting tool C2Eif. The translation is completely automatic and supports the entire C language (ANSI, as well as many GNU C Compiler extensions, through CIL) as used in practice, including its usage of native system libraries and inlined assembly code. Our experiments show that C2Eif can handle C applications and libraries of significant size (such as vim and libgsl), as well as challenging benchmarks such as the GCC torture tests. The produced Eiffel code is functionally equivalent to the original C code, and takes advantage of some of Eiffel's object-oriented features to produce safe and easy-to-debug translations

    Re-reengineering the dream: agility as competitive adaptability

    Get PDF
    Organizational adaptation and transformative change management in technology-based organizations is explored in the context of collaborative alliances. A Re-reengineering approach is outlined in which a new Competitive Adaptability Five-Influences Analysis approach under conditions of collaborative alliance, is described as an alternative to Porter’s Five-Forces Competitive Rivalry Analysis model. Whilst continuous change in technology and the associated effects of technology shock (Dedola & Neri, 2006; Christiano, Eichenbaum & Vigfusson, 2003) are not new constructs, the reality of the industrial age was and is a continuing reduction in timeline for relevance and lifetime for a specific technology and the related skills and expertise base required for its effective implementation. This, combined with increasing pressures for innovation (Tidd & Bessant, 2013) and at times severe impacts from both local and global economic environments (Hitt, Ireland & Hoskisson, 2011) raises serious challenges for contemporary management teams seeking to strategically position a company and its technology base advantageously, relative to its suppliers, competitors and customers, as well as in predictive readiness for future technological change and opportunistic adaptation. In effect, the life-cycle of a technology has become typically one of disruptive change and rapid adjustment, followed by a plateau as a particular technology or process captures and holds its position against minor challenges, eventually to be displaced by yet another alternative (Bower & Christensen, 1995)

    Beyond enterprise resource planning projects: innovative strategies for competitive advantage

    Get PDF
    ABSTRACT A rapidly changing business environment and legacy IT problems has resulted in many organisations implementing standard package solutions. This 'common systems' approach establishes a common IT and business process infrastructure within organisations and its increasing dominance raises several important strategic issues. These are to what extent do common systems impose common business processes and management systems on competing firms, and what is the source of competitive advantage if the majority of firms employ almost identical information systems and business processes? A theoretical framework based on research into legacy systems and earlier IT strategy literature is used to analyse three case studies in the manufacturing, chemical and IT industries. It is shown that the organisations are treating common systems as the core of their organisations' abilities to manage business transactions. To achieve competitive advantage they are clothing these common systems with information systems designed to capture information about competitors, customers and suppliers, and to provide a basis for sharing knowledge within the organisation and ultimately with economic partners. The importance of these approaches to other organisations and industries is analysed and an attempt is made at outlining the strategic options open to firms beyond the implementation of common business systems

    T-government for benefit realisation

    Get PDF
    This paper proposes a model for t-Government and highlights the research agenda needed to increase understanding of transformational government and the processes involved in furthering the agenda of the t-Government. In particular, both an operational and a conceptual model for the effective involvement of citizens and businesses in government functioning have been proposed. This will help to define an agenda for t-Government research that emerges from national UK strategy and policy for e-Government. The main threads of t- Government encompass: (1) A citizen-centric delivery of public services or e-inclusion, (2) A shared services culture to maximize value added to clients, (3) The effective delivery and management of resources and skills within government or professionalism. All three threads should be addressed principally from the perspectives of delivery, evaluation and participation in view of benefit realisation as envisioned by Government strategic planning and policy directives (CabinetOffice, 2005). The management of change dimension of these phenomena have been included in the research agenda. In particular, research is needed to reshape the discourse towards emphasising a citizen centric approach that defines, develops, and benefits from public service. Decision makers in Government will need models of Governance that fulfil transformational objectives. They will also need models of benefits realisation within a strategic Governance framework. It has been argued that t-Government research should be addressing these relative voids

    Understanding SOA Migration Using a Conceptual Framework

    Get PDF
    Migration of legacy assets to SOA embodies a key software engineering challenge. Over a decade there has been an increasing interest in the approaches addressing SOA migration. These approaches mainly differ in `what is migrated' and `how the migration is performed'. Such differences aggravate achieving a general understanding of `what SOA migration entails'. We describe what such migration process entails and what distinct conceptual elements systematically define the process. Based on the comprising conceptual elements the framework which is considered as a basis for understanding and assessment of different approaches is proposed. Further, the role of the migration framework in positioning and assessing the existing methods, is discussed. Finally, the procedure for positioning and mapping of migration approaches on the framework is explained using two example migration processes
    • 

    corecore