22
Sun, Dec
3 New Articles

Planning for Legacy Transformation

General
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

Businesses today must continually innovate or face shrinking market share by competitors who are ahead of the curve.

 

Innovation can take many forms, depending on your business, but agility in Information Technology is often critical to delivering new services and products and to connecting via new channels or markets. At the same time, many businesses are reliant on legacy systems that cannot easily meet these emerging needs.

 

And yet the legacy systems that many organizations depend on are not easily replaced, not without risk to the business. They may have grown with the organization and have information structures and embedded processing logic that is crucial to the unique products, services, and delivery mechanisms employed by the business. Highly skilled, long-time technical staff may be needed to maintain the system and keep the business operational.

 

So, how do you move forward? How do you maintain smooth operations and innovate to meet your business' demands? There are many options, but identifying the best approach involves an assessment of your current enterprise applications portfolio, agreement within your organization on where you want to go, and many other factors. One size does not fit all when it comes to legacy asset management and transformation, but you can craft a plan that will take your systems and business forward on a safe and continuous path.

So What Is a Legacy System?

Traditionally, we've used the term ERP (Enterprise Resource Planning) to identify enterprise software packages with integrated modules in key areas such as financials, distribution, and manufacturing that perform operational and transactional functions of the business. In most cases, ERP systems have originated from a software vendor and may be on maintenance with upgrades and support. Some organizations have enterprise applications designed and developed in-house that handle some or all of the functionality of an ERP package. Still other organizations may have started with an old ERP package from a software vendor but have completely taken over maintenance themselves to the point that their business application suite has become "home grown." In this situation, even if the vendor is still offering newer versions of software, your application may have diverged so far from the base package that an upgrade is not feasible.

 

Any of these scenarios might describe the origins of your legacy systems. An application suite that is uniquely designed and customized for your business, possibly built using older languages and tools, and that has evolved and morphed over many years can be very difficult to replace with commercial off-the-shelf (COTS) software.

 

Consider the lighthearted "might just be a legacy system if" list in the spirit of Foxworthy's redneck jokes. Does any of this sound familiar?

 

You might just have a legacy system if some of the following are true:

  • The original application was implemented before Al Gore invented the Internet.
  • Your users can have any user interface they want as long as it's text-based, 24X80, green on black, and navigation is handled via menus and function keys.
  • Special program code has been written to handle unique customer requests over the years.
  • Occasional operational issues must be addressed by using DFU to fix the data.
  • Simple maintenance tasks require a long-tenured programmer with deep knowledge of the system.
  • You have to study a full area of the application for three weeks before changing a field value and still use a subroutine to do it.
  • The maintenance backlog is growing, but programmers are too busy troubleshooting operational issues to ever get the business requirements handled, 
  • Your team is fairly sure that some subroutines or programs or files are no longer used, but not certain enough to delete them

(Continue the banter on Twitter with #mightbelegacyif.)

 

On a more serious note, MC Press ran a survey of RPG development shops a couple of years ago. Some of the findings of Thomas Stockwell's report are telling in terms of the challenges of legacy asset management in the IBM i world. For example:

  • "Sixty-five percent of those surveyed said that maintenance deadlines were missed on a yearly basis, with 19 percent saying they missed deadlines two or three times a month."
  • "Thirty-eight percent said that upper management considered the cost of maintaining code to be too high."
  • "The results of the survey indicate that—as frustrated as management may feel—the maintenance programming staff is even more acutely frustrated."
  • "22.4 percent of programmers said the modules they were maintaining were unstable."
  • "Managing the code of our information systems currently appears to be consuming the majority of our time as programmers and managers."

 

So, for many IT shops consumed with managing their legacy systems and day-to-day operations, there's very little time for innovation and improvements, which may lead to the business falling behind.

Technology and Business Drivers for Transformation

Why do you need to transform your legacy application? It's important to identify the driving force for taking these important steps forward from both an IT and a business standpoint.

 

From the perspective of IT, the primary drivers or considerations for transforming legacy systems typically involve…

  • The ability to deliver applications to users via current interfaces, such as Web, Windows, mobile with social media integration, and whatever comes next.
  • A modern application architecture—ensuring componentization, reuse of logic and centralized business rules, and service-oriented access to key business functions.

 

Commercial drivers for application portfolio transformation can vary, depending on the nature of your specific business, but they generally include product and service strategy improvements and some assessment of future markets/opportunities. For example, business priorities may require some variation of the following:

  • Online interfaces for customers and partners to transact business directly with in-house systems
  • Mobility access to some subset of functionality for the roaming workforce
  • Productivity increases via improved processing, workflow, and access to information
  • Electronic interchange solutions, often conforming to industry standards or mandates
  • Improved quality of customer and supply chain interactions through advanced technology
  • Executive information and analysis

 

The challenge for IT in formulating the plan is that the business may provide budget or requests only when specific needs arise, whereas a CIO must anticipate what those needs might be and proactively navigate the system's landscape in order to have the architecture and tools in place to deliver.

Approach

Your unique technology and business drivers for transformation will be important to identify so that you can ensure commitment and alignment within your organization for the challenging, and sometimes costly, road ahead. As a leader in technology within your company, you will be better able to both assess and sell your plan for transformation if you develop a cost/benefit analysis for your options.

 

Consider the following approaches for transformation. In some cases, your best plan may actually incorporate elements from more than one of the options below.

 

 

Legacy Application Transformation Approach

Considerations, Risk Assessment

 

Replace

Software package or Software as a Service (SaaS) implementation to replace full or partial legacy application

Higher risk for full-scale replacement but can be a viable approach for partial functionality in conjunction with other options.

 

Redesign and redevelop using modern tools and capabilities

 

 

 

 

Convert

Migrate/Convert/Refactor involves converting a legacy application over to a newer technology, platform, or language while preserving the information structures and the basic logic, UI, and navigation of the original application. May use automated tools and/or low cost labor for repetitive work. Assumes no significant changes to design; transfer of old design to new tools/interface is first priority.

High risk—Taking an older paradigm for application development and replicating it in a new technology can be technically challenging and the end result limiting. In some cases, a partial conversion (for example, just the database and business rules) may be safer in combination with a transformation approach that involves gradual redesign and implementation of "extend" solutions to provide the business with the leading-edge capabilities they are demanding.

 
 
 

 

 

 

 

 

 

 

 

 

Modernize

Reface with a Graphical User Interface (GUI)—A variety of tools and techniques exist for targeting the modernization of the user interface so that green-screens will be displayed as Windows or in a Web browser with the back-end legacy system still in place.

Low risk—In some cases, this may be a good first step to keep users happy and provide a new navigation framework while you continue on your transformation mission.

 

Business process improvements using solutions like workflow, executive dashboards, collaboration, etc.—This approach is most effective in conjunction with a refacing exercise. For example, both a graphical interface and a workflow for managing document and transaction flows and approvals through an organization can be automated with integration to the back-end system.

 

Medium risk with high reward potential. Beyond just improving the user interface, this involves changes to, or automation of, business processes.

 

 

Extend

 

 

 

Modern extensions or "bolt-on" solutions—Business demands often require projects that extend enterprise systems and offer new services, such as e-commerce or initiatives like GDSN or EDI or mobile apps for field staff or customers. These can be developed separately from the legacy system with integration or synchronization between information structures.

Low risk in terms of impact on enterprise applications, but security and roll-out will typically require special considerations that may increase overall risk.

 

Outsource

Host your entire legacy application to an external server at a third-party location or to the cloud. Or you may just want to consider outsourcing the mundane maintenance activity of your legacy system to an organization with lower cost, offshore resources so that your core IT team can focus on transformation and higher business priority tasks.

Medium risk with potential cost-savings and rewards. This division of labor could both save costs and enable you to more effectively move forward with your plans to transform using any or a combination of the above options.

 

 

If you have both the mandate and the budget to replace your legacy systems, then you may be evaluating some large-scale, higher-risk options such as the "rip and replace" or "Big Bang" approach to transformation. Alternatively, if you have limited budget or are more risk-averse and prefer "evolution" over "revolution," you should consider approaches to transform or modernize your legacy system in stages toward a brave new world, using some combination of the above options.

Coexistence

Regardless of your specific transformation plan, there is typically a need to manage your legacy system (in full or in part) for a period of time while you are implementing new functionality. To ensure that your mission-critical legacy applications continue to operate in a stable fashion and that appropriate integration points are established while you implement the new system functionality, you must ensure that you have planned for coexistence.

 

Some considerations for planning your coexistence strategy:

  • Logic Reuse—"Wrap" business functions to create a callable service layer. We used to call these APIs; now, if you can wrap them as a Web service, we can call it the beginning of a service-oriented architecture (SOA). Regardless of what terms you use, the idea is to isolate areas of logic that can be reused in multiple areas and interfaces (such as Create Order, Calculate Price, Create Policy, etc.) Ideally, the callable routines will be separated from the legacy interface so that the old programs also use the centralized service and they are maintained in one place. (This is not going to be necessary for full-scale replacement obviously.) Of course, if this functionality undergoes changes, you will have more regression testing to do when a shared component is used in many areas of your system.  
  • Maintenance—Can maintenance be frozen in the affected modules? If you are embarking on a project that will convert or integrate heavily with an existing module, the project will be a moving target if the dependant legacy application is changing at the same time.
  • Database—Analysis of the existing database (whether it can be reused or will need an overhaul or a new design) will need to be assessed and planned up front. Changing an underlying database that a stable legacy system relies upon can increase the risk of the project, especially if it is done in a haphazard manner. In some cases, a new database will be implemented, but a synchronization engine will be built to keep the business in sync during the coexistence phase.
  • Navigation—If partial areas of a system are being replaced or refaced, some planning for how users will navigate between different areas will be required. Ideally, they should be able to move seamlessly between their working areas, if possible. Otherwise, prepare for your users' training (and frustration).
  • Testing, Pilots, and Running in Parallel—Testing and Implementation are critical components for any project plan, but when coexistence between an existing legacy application and new module are interwoven, more care must be taken beyond just the base functionality of your new area. Plus, regression testing may be required at every stage if shared modules are established between existing and new modules.

Building Your Plan

Your enterprise applications should be under constant evolution beyond the ongoing maintenance activity to consider the strategic direction of both business and IT. If you have fallen behind but now have a clear mandate to transform your legacy environment so that you are in a position to better meet business needs, then you must build your plan and take action.

 

Assessing your current enterprise application portfolio is an important first step in formulating your plan for transformation. Many legacy applications do not have good documentation, and the knowledge of how the systems have evolved is primarily in the heads of the IT experts who manage the systems.

 

Building your transformation plan should involve the following analysis:

  • Assess and inventory your current enterprise application portfolio. There are good analysis and documentation tools on the market today that can help with this effort if required.
  • Analyze your Information Technology (current tools, platforms, and skills). Do you have the infrastructure and tools needed to deliver the required solutions today and in the future?
  • Consider your business and IT drivers. Where do you need to go? Establish your goals for the next year, two years, five years.
  • Categorize modules by priority, complexity, suggested approach(es).
  • Assess resources. Do you have sufficient resources to both manage your legacy application and work on transformation activities? How will IT staff keep up with the skills and tools—old and new—required to deliver the level of application innovation and agility required today? Will training or outsourcing be part of your plan?
  • Determine risks and inefficiencies with the existing system. Is manual intervention required by skilled IT staff to keep the system operational? Are you losing customers to competitors due to anything lacking in the system? Can you save money, or make money, by effective use of technology?
  • Analyze your Return on Investment (ROI). Perform some analysis based on your desired transformational improvements to identify how the company will benefit financially over time.

 

With a clear understanding of where you are and where you want to go, you will be in a better position to make decisions on your best approach for moving forward. Talking to the business' users and management to understand their priorities will be critical to crafting your plan and determining what must be tackled first.

 

The level of organizational commitment, the state of your current systems, the available resources and budget will be key factors in determining how you move forward.

 

Risk assessment should be undertaken, both in terms of the risks you face today by doing nothing and the level of risk that your organization is comfortable facing with regards to your legacy transformation initiatives. Of course, a well-honed plan with an exceptional project leader, capable team members, and a supportive corporate culture will go a long way to mitigate risks.

Recap

The challenge faced by IT organizations to keep up with the maintenance demand can become a risk to business. At the same time, executives expect IT not only to maintain a stable business environment while reacting to frequent changes, but also to ensure the company stays competitive in the industry with e-commerce, Web Services/EDI, and operational/business process improvements such as workflow, mobile solutions, social media integration, and whatever comes next.

 

To move forward, a plan for legacy management and transformation should be established based on an understanding of both your business and technology drivers. Determining your strategy will require an assessment and inventory of current applications and to some extent, a re-discovery of your business requirements for your application portfolio. In this way, you will be armed with a solid base to build your plans and the system you need for the future.

 

Transforming a legacy application into a modern, services-oriented, flexible application architecture takes commitment, focus, budget, and effort. It doesn't happen overnight. There are no silver bullets. But gains can be made during the transformation to meet tactical business needs, which will get easier as you move forward. In some cases, a well-designed legacy system may live on for a very long time in the back-end with appropriate transformation and modernization plans. In other situations, full-scale replacement might be the ultimate goal. Regardless, you can get started today. The result will be well worth it and can position your organization as a leader within your industry.

 

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: