SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
Leave your legacy
Modernize your legacy environment to
enable an agile future-ready enterprise
Speakers
Cameron Jenkins
Global Practice Director, Application
Modernization Services
Dell Services
Greg Ogburn
Senior Solutions Architect,
Application Modernization Services
Dell Services
Jon Payne
Senior Vice President and Chief
Information Officer,
Associated Wholesale Grocers
Shift from cost-savings focus to business agility
Businesses’ ability to scale up 3rd
Platform adoption will require
changes to IT operation that
bring agility and overcome siloed
legacy systems. This will make
agile development the de-facto
norm. - IDC
By 2016, >50% of Application
Modernization efforts will address
business demand for Enhanced
functionality - Gartner
By 2018, agile and iterative
development will require 30%
of resources for application
testing engagements to be on-
site or onshore - Gartner
Research suggests that
business agility is the
new source of business
value - Forrester
Application modernization and increasing
agility will continue to be a solid driver
for Application Development spending, apart
from other emerging dynamics of cloud,
mobility and social computing - Gartner
By 2016, >50% of application
modernization efforts will
address business demand for
enhanced functionality to
legacy applications and not
cost reduction. - Gartner
The primary focus of IT will remain
on the care and operation of the
existing applications, which are the
lifeblood of the enterprise - Gartner
Bimodal will gain
traction for enterprise
strategies - Gartner
What
we’ve
heard…
Modernization drivers
• Streamline operations, reduce maintenance costs
• Manage demand for quality, cost, service, access
• Shift spend from maintenance to innovation
• Regulatory compliance & security
• Speed of response to market changes
• Lack of agility
• Brittle legacy systems hold back innovation
• High-cost legacy platforms
• Complex portfolios
• Performance and scalability
Journey to
simplified
environment via
Application
Modernization
to support
business goals
Outcomes
Future-ready
Digital
Scalable
Business agility
Reduced operating costs
Increased security
Faster response times
Cloud-enabled
Open infrastructure
IT challenges
Business challenges
Journey to a modern environment
x86
Lower cost
Platform
Virtualization
& cloud
Business
Agility
Mobility
Packaged
apps
Analytics
& big data
Security
Rationalization
Strategic
Modernization
Roadmap
Dell Application
Re-hosting
• Preserve existing investments
• Migrate from Mainframe to x86,
UNIX, or Linux on System Z
• Consolidate UNIX applications and
data to Linux or Windows
Dell Application
Re-architecture
• Leverage modern Java or .NET
architecture and packages
• Extract business logic from mainframe,
midrange, and client-server systems
• Retire legacy languages and
infrastructure
Replace
Refresh
Retain
Retire
Current legacy environment
Dell Application Modernization Services
Digital
Target environment
Dell Strategic Modernization Roadmap
Transformation
Programs
Project
Project
Project
Project 1
Project 2
Project 3
Project 5
Project 4
This Planning Cycle
Mnth 1 Mnth 2 Mnth 3 Mnth 4 Mnth 5 Mnth 6 Mnth 7 Mnth 8 Mnth 9 Mnth 10 Mnth 11 Mnth 12
Next Planning Cycle
Mnth 1 Mnth 2 Mnth 3 Mnth 4 Mnth 5 Mnth 6 Mnth 7 Mnth 8 Mnth 9 Mnth 10 Mnth 11 Mnth 12Mnth 1 Mnth 2 Mnth 3 Mnth 4 Mnth 5 Mnth 6 Mnth 7 Mnth 8 Mnth 9 Mnth 10 Mnth 11 Mnth 12
Third Planning Cycle
Mnth 1 Mnth 2 Mnth 3 Mnth 4 Mnth 5 Mnth 6 Mnth 7 Mnth 8
Key: Line Action Start Dependency Value Dependency
Program 5
Program 3
Program 2
Program 4
Program 1
Program 6
Project
Project
Project
Project
Project
Project
Project
Project
Project
Project
Project
Project
Project
Project
Project
Discovery phase
Capture and link strategic
drivers, business capabilities,
code and data in a unified,
transparent model
Analysis phase
Group assets by capabilities,
determine the right trajectories,
and evaluate the program
impacts of technical
dependency and complexity.
Planning phase
Collaboratively develop a
program plan to address
strategic drivers and resolve
technical challenges
Costco
Largest membership warehouse club chain in the US benefits from Dell
Strategic Modernization Roadmap
Business Challenge
The worlds largest AS/400 system is comprised of over 12 million lines of RPG
code and not able to handle Costco’s rapid expansion
Solution
Developed a Strategic Modernization Roadmap for incremental SAP
implementation
Results
• An actionable 7-year program plan to migrate to SAP and retire the AS/400,
with specific integration requirements at each step
• Minimized legacy integration requirements
• Dell Repository automatically monitors changes to the legacy environment
during the 7-year migration
Application re-hosting solutions move existing
business logic and data investments onto
modern platforms.
Dell application re-hosting overview
Mainframe re-hosting details
Open systems IBM z/OS
compatibility stack
IBM z/OS mainframe
environment stack
TN3270
ECI/EPI
JEE
Sockets
SOAP/XML
FTP Interfaces
3270 Access
MQ Interfaces
TN3270
ECI/EPI
JEE
Sockets
SOAP/XML
FTP Interfaces
3270 Access
MQ Interfaces
Migration
components
3rd party infrastructure
VSAM, sequential, GDGs
IBM DB2, IBM IMS-DB
COBOL, PL/I, Easytrieve Plus,
Assembler, other
JCL/JES
IBM CICS, IBM IMS TM
IBM z/OS, IBM z/VSE
3rd Party infrastructure
VSAM, Sequential, GDGs
RDBMS (Oracle, DB2 LUW, SQL
Server…)
COBOL, PL/I, Easytrieve Plus, other
Dell BPE
Batch JCL & JES
Dell TPE
Transaction monitor
Linux, UNIX, Windows
Review / replace
Application logic
Batch environment
Online
environment
Platform
Data migration
Re-host to modern platform
with no change in
functionality
Retain experienced staff
Platform positioned
for future growth at reduced
costs
Minimal
changes
HP StorageWorks XP24000 Disk Array
ALARM
READY
MESSAGE
PUSH
HP StorageWorks XP24000 Disk Array
Mainframe
application
compatibility
middleware
RACF, ACF2, Top Secret Dell TSF, Target OS securitySecurity profiles
Flexible, full-service solution approach
Proven project methodology & risk mitigation process
Dell follows a proven migration methodology consisting of many flexible service offerings that are tailored to meet the business objectives and
technical needs of an organization. The image below shows many of the services that Dell can offer, including many that will be proposed for the
mainframe re-hosting project.
Technical feasibility
and business impact
• Goals and corporate
directives
• Application and
environment
characteristics
gathering
• Preliminary proposal
leading to decision
to proceed
Project methodology
validation
• Asset cataloging
• Assessments
– Source
– Operational
– Infrastructure
• Asset grouping
• Optional custom
workshops
• Optional POCs
Detailed project plan
and implementation
• Infrastructure /
Operational
Implementation
• Application
migration
implementation
• Data migration
tools
• Bridging
Implementation
• Training
• Application retrofit
Final validation and
production cutover
• Baseline
Preparation
• Regression testing
• Performance
testing
• Application
discrepancy
correction
• Production
readiness and
cutover support
Managed services
solutions
• Dell enterprise
product support
and maintenance
• Support triage
• Short term
turnover services
• Managed services
– On-going
application
maintenance &
development
– Help desk
• Managed hosting
Discovery Design Implement Test/Deploy Post implement
Associated Wholesale Grocers (AWG)
Business Challenge
Associated Wholesale Grocers (AWG) was looking to modernize their core
business applications to reduce costs, and prepare to move to the cloud.
Solution
Dell undertook a comprehensive assessment and developed a migration plan
that included moving off a complex IBM infrastructure to an open system.
Results
• Modernized platform supports AWG’s migration to the cloud
• Reduced operating costs by 10%
• Improved disaster recovery capabilities; a recent disaster recovery test
validated that the system works and that the investment was worth it
Re-architecture builds a modern application
framework based on business functionality, then
migrates legacy logic and data into that
framework to deliver business agility and reduce
future costs.
Dell Re-architecture overview
Complete transformation to best practice Java or .NET architecture
Re-architected Java / .NET System
Data Entry &
Report
Transaction Screens
Exception
Screen
Cross-platform
Front end
Daily
Batch
Monthly
Batch
Key Code
Component
System
Interfaces
Stored
Procedure
Shared
Data
Store
Nested
Redefines
Legacy
Data Store
Visible Requirements
Hidden Requirements
Legacy System
Service/Application Layer
• Encapsulates business logic
• Horizontally scalable
• Integrates with packages
Service Bus
Presentation Layer
• Web, modern
• Mobile-ready
Analytics/Reporting Engine
• Self-service
• Business-facing
Data Layer
• Engineered for performance and extensibility
• Relational and/or big data
Job schedule
Infrastructure Layer
• Virtualized or cloud for scalability and flexibility
• Aligned with enterprise standards and investments
Re-architecture method
The Dell Re-architecture difference
Methodology & Tools
Phase 3: Develop & Test
Outcomes:
Modernized & tested application source
code with migrated legacy data. Uses best
practices for SOA and leverages commercial
software packages.
Phase 2: Design
Outcomes:
Validated design. Implement legacy and
enhancement functionality leveraging
modern application and data architecture
Phase 1: Discover & Plan
Outcomes:
Baseline holistic legacy model linking
business use to code and data,
enhancement requirements, detailed plan
with precise scope and accurate estimates
Holistic, integrated code, data
and business use case analysis
provide a complete, business-
validated requirements baseline
combining visible and hidden
requirements.
Re-architecting leverages
modern frameworks and
architecture practices, typically
resulting in 75% reduction in
lines of source code, and a truly
future-proof system
Automated code generation
and data modernization
capabilities mitigate risks and
drive down maintenance cost
for the modernized system.
Online collaboration and
transparency across the team
to simplifies business
engagement, and enables
distributed teams.
US Patents
7.996.413
8.150.896
US Patents
8.831.964
8.639.675
7.996.413
Dell Repository
Dell Analyzer
Dell Data Workbench
Dell Designer
Dell Code Generator
Government of Saskatchewan
Justice better served with modernized IT system
Business Challenge
Criminal justice employees were challenged with too many manual and paper
business processes and four 30-yr-old disjointed data systems
Outcome
• Consolidated the functions of four major systems into a single modern app
• Eliminated duplicate data and reduced total volume of data
• Streamlined procedures across the Ministry
• Low-cost Intel platform and commodity infrastructure
“In working with our Ministry to learn our business issues and find solutions,
Dell’s Application Modernization Services team plays a vital supporting role in
our project’s success, now and going forward.”
Rick Davis, Director, Operational Support, Saskatchewan Ministry of Justice,
Corrections and Policing
Dell Software products and Patented IP
Dell Analyzer
• Automated code analysis and logic extraction for
any source language
• Cross-language, cross-platform dependency
analysis
Dell Repository
• Integrated requirements management, reverse-
engineering and design
• Business capability mapping to legacy assets
• Customer and team collaboration
Dell Data Workbench
• Data modernization, refactoring, migration,
profiling and auditing
Dell Designer
• Integrated user interface and service design
Dell Code Generator
• Consistent model-driven generation of user
interface, service and data layer code
• Highly maintainable code with no runtime
requirements
• Compliant with a broad range of target
architectural frameworks
Dell Transaction Processing Environment
• Scalable, native, distributed transaction
processing platform for CICS, IMS TM, other
workloads
Dell Batch Processing Environment
• Scalable environment for developing, scheduling,
executing and managing batch based workloads
Dell TPE and BPE Manager
• Provide monitoring and management for the
online and batch application execution
environments
Dell Enterprise COBOL
• Powerful COBOL mainframe offloading and
modernization platform
Dell Transaction Security Facility
• External security manager providing Role Based
Access Control (RBAC) based transaction
processing security
Dell Hierarchical to Relational (H-RDB) console
• IMS DB conversion and runtime support
Dell Re-host Solution Suite Dell Re-architecture Solution Suite
Comprehensive, fit-to-method, toolkit for legacy
analysis and Re-architecture
Comprehensive distributed platform and tooling for
supporting re-hosted mainframe workloads
Dell Automated Migration Solution Suite
Dell Automated Assessment Workbench
• Automated portfolio assessment capabilities for
legacy based workloads
Dell Automated Conversion Workbench
• Collection of tools and utilities to support the
migration of legacy programs and data to a
distributed environment
– Mainframe languages (Assembler, ADSO, Mark IV,
etc.) to other (e.g. COBOL, C, Java, etc.)
– Mainframe data structures (IMS DB, IDMS DB, Adabas,
Datacom, etc.) to RDBMS
• C/C++ to Java
• ASP to ASP.NET
• Oracle Forms to Java
• Lotus Notes to Salesforce
• WebLogic to JBoss
• Struts to Spring
Dell Automated Upgrade Workbench
• Oracle Upgrade Assessment Tool
• PeopleSoft Upgrade Impact Analysis
• Various Java Framework Upgrades
Automated code assessment, conversion,
remediation, and upgrade impact analysis solutions
Why Dell Modernization Services?
End-to-end solutions
• Hardware, software and services
• Flexible engagement model
• Integrated with Dell Services IT outsourcing,
maintenance, testing and development teams
25+ years of
experience
• Proven track record of success
• Established methodologies
• Trusted partner network
• Single point of accountability
• Domain and package expertise
• Global and local resources
Unique and patented Dell IP
• Broad range of market-tested tools and software
Panel
Discussion
Quiz
Thanks!
Backup Material

Weitere ähnliche Inhalte

Was ist angesagt?

NOC to SOC: A Next-Gen Approach to Understanding and Proactively Assuring Cus...
NOC to SOC: A Next-Gen Approach to Understanding and Proactively Assuring Cus...NOC to SOC: A Next-Gen Approach to Understanding and Proactively Assuring Cus...
NOC to SOC: A Next-Gen Approach to Understanding and Proactively Assuring Cus...Alex Johnson
 
CI/CD 101
CI/CD 101CI/CD 101
CI/CD 101djdule
 
DevOps - Le Test dans le continuous testing - neolians
DevOps - Le Test dans le continuous testing - neoliansDevOps - Le Test dans le continuous testing - neolians
DevOps - Le Test dans le continuous testing - neolianspalbaret
 
oss bss_futures_overview
oss bss_futures_overviewoss bss_futures_overview
oss bss_futures_overviewjdrevuelta
 
Enterprise Business Architecture in Practice -- Leveraging EBA for Success on...
Enterprise Business Architecture in Practice -- Leveraging EBA for Success on...Enterprise Business Architecture in Practice -- Leveraging EBA for Success on...
Enterprise Business Architecture in Practice -- Leveraging EBA for Success on...SteveMelville
 
ITIL 4 - Make sense of what BA, UI/UX Designer, Coder, QA, PM and DevOps do
ITIL 4 - Make sense of what BA, UI/UX Designer, Coder, QA, PM and DevOps doITIL 4 - Make sense of what BA, UI/UX Designer, Coder, QA, PM and DevOps do
ITIL 4 - Make sense of what BA, UI/UX Designer, Coder, QA, PM and DevOps doCliffordEgbomeade
 
Understanding DevOps
Understanding DevOpsUnderstanding DevOps
Understanding DevOpsInnoTech
 
Keynote: The Phoenix Project: Lessons Learned - PuppetConf 2014
Keynote: The Phoenix Project: Lessons Learned - PuppetConf 2014Keynote: The Phoenix Project: Lessons Learned - PuppetConf 2014
Keynote: The Phoenix Project: Lessons Learned - PuppetConf 2014Puppet
 
DevOps - A Gentle Introduction
DevOps - A Gentle IntroductionDevOps - A Gentle Introduction
DevOps - A Gentle IntroductionGanesh Samarthyam
 
Intégration continue
Intégration continueIntégration continue
Intégration continueKlee Group
 
Comarch ICT Service Desk - infographic
Comarch ICT Service Desk - infographicComarch ICT Service Desk - infographic
Comarch ICT Service Desk - infographicComarch_Services
 
ITIL management practices.pdf
ITIL management practices.pdfITIL management practices.pdf
ITIL management practices.pdfSSGC
 
ServiceDesk Plus Overview Presentation
ServiceDesk Plus Overview PresentationServiceDesk Plus Overview Presentation
ServiceDesk Plus Overview PresentationServiceDesk Plus
 

Was ist angesagt? (20)

NOC to SOC: A Next-Gen Approach to Understanding and Proactively Assuring Cus...
NOC to SOC: A Next-Gen Approach to Understanding and Proactively Assuring Cus...NOC to SOC: A Next-Gen Approach to Understanding and Proactively Assuring Cus...
NOC to SOC: A Next-Gen Approach to Understanding and Proactively Assuring Cus...
 
ITIL Service Level Agreement Template
ITIL Service Level Agreement TemplateITIL Service Level Agreement Template
ITIL Service Level Agreement Template
 
CI/CD 101
CI/CD 101CI/CD 101
CI/CD 101
 
DevOps - Le Test dans le continuous testing - neolians
DevOps - Le Test dans le continuous testing - neoliansDevOps - Le Test dans le continuous testing - neolians
DevOps - Le Test dans le continuous testing - neolians
 
Agile Engineering Practices
Agile Engineering PracticesAgile Engineering Practices
Agile Engineering Practices
 
Sre summary
Sre summarySre summary
Sre summary
 
DevOps
DevOpsDevOps
DevOps
 
oss bss_futures_overview
oss bss_futures_overviewoss bss_futures_overview
oss bss_futures_overview
 
Enterprise Business Architecture in Practice -- Leveraging EBA for Success on...
Enterprise Business Architecture in Practice -- Leveraging EBA for Success on...Enterprise Business Architecture in Practice -- Leveraging EBA for Success on...
Enterprise Business Architecture in Practice -- Leveraging EBA for Success on...
 
ITIL 4 - Make sense of what BA, UI/UX Designer, Coder, QA, PM and DevOps do
ITIL 4 - Make sense of what BA, UI/UX Designer, Coder, QA, PM and DevOps doITIL 4 - Make sense of what BA, UI/UX Designer, Coder, QA, PM and DevOps do
ITIL 4 - Make sense of what BA, UI/UX Designer, Coder, QA, PM and DevOps do
 
Understanding DevOps
Understanding DevOpsUnderstanding DevOps
Understanding DevOps
 
Keynote: The Phoenix Project: Lessons Learned - PuppetConf 2014
Keynote: The Phoenix Project: Lessons Learned - PuppetConf 2014Keynote: The Phoenix Project: Lessons Learned - PuppetConf 2014
Keynote: The Phoenix Project: Lessons Learned - PuppetConf 2014
 
Itil Mind Maps
Itil Mind MapsItil Mind Maps
Itil Mind Maps
 
DevOps - A Gentle Introduction
DevOps - A Gentle IntroductionDevOps - A Gentle Introduction
DevOps - A Gentle Introduction
 
Devops
DevopsDevops
Devops
 
Intégration continue
Intégration continueIntégration continue
Intégration continue
 
Comarch ICT Service Desk - infographic
Comarch ICT Service Desk - infographicComarch ICT Service Desk - infographic
Comarch ICT Service Desk - infographic
 
ITIL management practices.pdf
ITIL management practices.pdfITIL management practices.pdf
ITIL management practices.pdf
 
DevOps and Cloud
DevOps and CloudDevOps and Cloud
DevOps and Cloud
 
ServiceDesk Plus Overview Presentation
ServiceDesk Plus Overview PresentationServiceDesk Plus Overview Presentation
ServiceDesk Plus Overview Presentation
 

Andere mochten auch

Evolving the enterprise - IT legacy to SOA
Evolving the enterprise - IT legacy to SOAEvolving the enterprise - IT legacy to SOA
Evolving the enterprise - IT legacy to SOACapgemini
 
Superior it governance with iso 38500.key
Superior it governance with iso 38500.keySuperior it governance with iso 38500.key
Superior it governance with iso 38500.keyBasta Group BV
 
Enterprise Transformation through Cognizant’s XaaS fabric on AWS (ENT222) | A...
Enterprise Transformation through Cognizant’s XaaS fabric on AWS (ENT222) | A...Enterprise Transformation through Cognizant’s XaaS fabric on AWS (ENT222) | A...
Enterprise Transformation through Cognizant’s XaaS fabric on AWS (ENT222) | A...Amazon Web Services
 
The agile enterprise - Digital Transformation as a practical application
The agile enterprise - Digital Transformation as a practical applicationThe agile enterprise - Digital Transformation as a practical application
The agile enterprise - Digital Transformation as a practical applicationdie.agilen GmbH
 
Ariba Coverage of Risk Management within the Supplier Lifecycle
Ariba Coverage of Risk Management within the Supplier LifecycleAriba Coverage of Risk Management within the Supplier Lifecycle
Ariba Coverage of Risk Management within the Supplier LifecycleSean Thomson
 
(ISM305) Framework: Create Cloud Strategy & Accelerate Results
(ISM305) Framework: Create Cloud Strategy & Accelerate Results(ISM305) Framework: Create Cloud Strategy & Accelerate Results
(ISM305) Framework: Create Cloud Strategy & Accelerate ResultsAmazon Web Services
 
Digital Transformation, Enterprise Architecture, Big Data by Danairat
Digital Transformation, Enterprise Architecture, Big Data by DanairatDigital Transformation, Enterprise Architecture, Big Data by Danairat
Digital Transformation, Enterprise Architecture, Big Data by DanairatDanairat Thanabodithammachari
 
Business Architecture the Key to Enterprise Transformation
Business Architecture the Key to Enterprise TransformationBusiness Architecture the Key to Enterprise Transformation
Business Architecture the Key to Enterprise TransformationMike Walker
 
Digital Transformation And Enterprise Architecture
Digital Transformation And Enterprise ArchitectureDigital Transformation And Enterprise Architecture
Digital Transformation And Enterprise ArchitectureAlan McSweeney
 
Domino app dev competitive advantage for blug
Domino app dev competitive advantage for blugDomino app dev competitive advantage for blug
Domino app dev competitive advantage for blugJohn Head
 
Secure Cloud Adoption - Checklist
Secure Cloud Adoption - ChecklistSecure Cloud Adoption - Checklist
Secure Cloud Adoption - ChecklistSecurestorm
 
Integrating Strategy and Risk Management
Integrating Strategy and Risk ManagementIntegrating Strategy and Risk Management
Integrating Strategy and Risk ManagementAndrew Smart
 
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...VMware Tanzu
 
Manigent Aligning Risk Appetite And Exposure
Manigent Aligning Risk Appetite And ExposureManigent Aligning Risk Appetite And Exposure
Manigent Aligning Risk Appetite And ExposureAndrew Smart
 
Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite Andrew Smart
 

Andere mochten auch (20)

Evolving the enterprise - IT legacy to SOA
Evolving the enterprise - IT legacy to SOAEvolving the enterprise - IT legacy to SOA
Evolving the enterprise - IT legacy to SOA
 
Christophe feltus introduction to iso 38500 v1 0
Christophe feltus introduction to iso 38500 v1 0Christophe feltus introduction to iso 38500 v1 0
Christophe feltus introduction to iso 38500 v1 0
 
Superior it governance with iso 38500.key
Superior it governance with iso 38500.keySuperior it governance with iso 38500.key
Superior it governance with iso 38500.key
 
IT Governance
IT GovernanceIT Governance
IT Governance
 
Enterprise Transformation through Cognizant’s XaaS fabric on AWS (ENT222) | A...
Enterprise Transformation through Cognizant’s XaaS fabric on AWS (ENT222) | A...Enterprise Transformation through Cognizant’s XaaS fabric on AWS (ENT222) | A...
Enterprise Transformation through Cognizant’s XaaS fabric on AWS (ENT222) | A...
 
The Path to Enterprise IT Transformation
The Path to Enterprise IT TransformationThe Path to Enterprise IT Transformation
The Path to Enterprise IT Transformation
 
The agile enterprise - Digital Transformation as a practical application
The agile enterprise - Digital Transformation as a practical applicationThe agile enterprise - Digital Transformation as a practical application
The agile enterprise - Digital Transformation as a practical application
 
Ariba Coverage of Risk Management within the Supplier Lifecycle
Ariba Coverage of Risk Management within the Supplier LifecycleAriba Coverage of Risk Management within the Supplier Lifecycle
Ariba Coverage of Risk Management within the Supplier Lifecycle
 
(ISM305) Framework: Create Cloud Strategy & Accelerate Results
(ISM305) Framework: Create Cloud Strategy & Accelerate Results(ISM305) Framework: Create Cloud Strategy & Accelerate Results
(ISM305) Framework: Create Cloud Strategy & Accelerate Results
 
Digital Transformation, Enterprise Architecture, Big Data by Danairat
Digital Transformation, Enterprise Architecture, Big Data by DanairatDigital Transformation, Enterprise Architecture, Big Data by Danairat
Digital Transformation, Enterprise Architecture, Big Data by Danairat
 
Business Architecture the Key to Enterprise Transformation
Business Architecture the Key to Enterprise TransformationBusiness Architecture the Key to Enterprise Transformation
Business Architecture the Key to Enterprise Transformation
 
Digital Transformation And Enterprise Architecture
Digital Transformation And Enterprise ArchitectureDigital Transformation And Enterprise Architecture
Digital Transformation And Enterprise Architecture
 
Domino app dev competitive advantage for blug
Domino app dev competitive advantage for blugDomino app dev competitive advantage for blug
Domino app dev competitive advantage for blug
 
Cloud for Media - A Complete Solution Stack for Faster Cloud Adoption
Cloud for Media - A Complete Solution Stack for Faster Cloud AdoptionCloud for Media - A Complete Solution Stack for Faster Cloud Adoption
Cloud for Media - A Complete Solution Stack for Faster Cloud Adoption
 
Secure Cloud Adoption - Checklist
Secure Cloud Adoption - ChecklistSecure Cloud Adoption - Checklist
Secure Cloud Adoption - Checklist
 
Integrating Strategy and Risk Management
Integrating Strategy and Risk ManagementIntegrating Strategy and Risk Management
Integrating Strategy and Risk Management
 
20080416 standard iso38500
20080416 standard iso3850020080416 standard iso38500
20080416 standard iso38500
 
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
Pivotal Digital Transformation Forum: Requirements to Become a Data-Driven En...
 
Manigent Aligning Risk Appetite And Exposure
Manigent Aligning Risk Appetite And ExposureManigent Aligning Risk Appetite And Exposure
Manigent Aligning Risk Appetite And Exposure
 
Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite Shaping Your Culture via Risk Appetite
Shaping Your Culture via Risk Appetite
 

Ähnlich wie Re-Architect Your Legacy Environment To Enable An Agile, Future-Ready Enterprise

Why Your Digital Transformation Strategy Demands Middleware Modernization
Why Your Digital Transformation Strategy Demands Middleware ModernizationWhy Your Digital Transformation Strategy Demands Middleware Modernization
Why Your Digital Transformation Strategy Demands Middleware ModernizationVMware Tanzu
 
Lift Your Legacy UNIX Applications & Databases into the Cloud
Lift Your Legacy UNIX Applications & Databases into the Cloud Lift Your Legacy UNIX Applications & Databases into the Cloud
Lift Your Legacy UNIX Applications & Databases into the Cloud Fadi Semaan
 
IMS01 IMS Keynote
IMS01   IMS KeynoteIMS01   IMS Keynote
IMS01 IMS KeynoteRobert Hain
 
Briefing Simplicité Software (English)
Briefing Simplicité Software (English)Briefing Simplicité Software (English)
Briefing Simplicité Software (English)Simplicité Software
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 Networks
 
Preston Peterson Resume January 2017
Preston Peterson Resume January 2017Preston Peterson Resume January 2017
Preston Peterson Resume January 2017Preston Peterson
 
GE Capital Legacy Modernization and Mainframe Conversion
GE Capital Legacy Modernization and Mainframe ConversionGE Capital Legacy Modernization and Mainframe Conversion
GE Capital Legacy Modernization and Mainframe Conversionguatham
 
Business Drivers For It Simplification PowerPoint Presentation Slides
Business Drivers For It Simplification PowerPoint Presentation SlidesBusiness Drivers For It Simplification PowerPoint Presentation Slides
Business Drivers For It Simplification PowerPoint Presentation SlidesSlideTeam
 
Application Modernisation with PKS
Application Modernisation with PKSApplication Modernisation with PKS
Application Modernisation with PKSPhil Reay
 
Application Modernisation with PKS
Application Modernisation with PKSApplication Modernisation with PKS
Application Modernisation with PKSPhil Reay
 
How to Revamp your Legacy Applications For More Agility and Better Service - ...
How to Revamp your Legacy Applications For More Agility and Better Service - ...How to Revamp your Legacy Applications For More Agility and Better Service - ...
How to Revamp your Legacy Applications For More Agility and Better Service - ...NRB
 
Idc analyst report a new breed of servers for digital transformation
Idc analyst report a new breed of servers for digital transformationIdc analyst report a new breed of servers for digital transformation
Idc analyst report a new breed of servers for digital transformationKaizenlogcom
 
Smarter z/OS Software Delivery using Rational Enterprise Cloud Solutions
Smarter z/OS Software Delivery using Rational Enterprise Cloud SolutionsSmarter z/OS Software Delivery using Rational Enterprise Cloud Solutions
Smarter z/OS Software Delivery using Rational Enterprise Cloud SolutionsJean-Yves Rigolet
 
Demantra Case Study Doug
Demantra Case Study DougDemantra Case Study Doug
Demantra Case Study Dougsichie
 
How to Migrate Applications Off a Mainframe
How to Migrate Applications Off a MainframeHow to Migrate Applications Off a Mainframe
How to Migrate Applications Off a MainframeVMware Tanzu
 
legacy application modernization in US | JK Tech
legacy application modernization in US | JK Techlegacy application modernization in US | JK Tech
legacy application modernization in US | JK TechBobRapier
 

Ähnlich wie Re-Architect Your Legacy Environment To Enable An Agile, Future-Ready Enterprise (20)

Why Your Digital Transformation Strategy Demands Middleware Modernization
Why Your Digital Transformation Strategy Demands Middleware ModernizationWhy Your Digital Transformation Strategy Demands Middleware Modernization
Why Your Digital Transformation Strategy Demands Middleware Modernization
 
Lift Your Legacy UNIX Applications & Databases into the Cloud
Lift Your Legacy UNIX Applications & Databases into the Cloud Lift Your Legacy UNIX Applications & Databases into the Cloud
Lift Your Legacy UNIX Applications & Databases into the Cloud
 
IMS01 IMS Keynote
IMS01   IMS KeynoteIMS01   IMS Keynote
IMS01 IMS Keynote
 
Briefing Simplicité Software (English)
Briefing Simplicité Software (English)Briefing Simplicité Software (English)
Briefing Simplicité Software (English)
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer Presentation
 
Preston Peterson Resume January 2017
Preston Peterson Resume January 2017Preston Peterson Resume January 2017
Preston Peterson Resume January 2017
 
M tierney res
M tierney resM tierney res
M tierney res
 
GE Capital Legacy Modernization and Mainframe Conversion
GE Capital Legacy Modernization and Mainframe ConversionGE Capital Legacy Modernization and Mainframe Conversion
GE Capital Legacy Modernization and Mainframe Conversion
 
Business Drivers For It Simplification PowerPoint Presentation Slides
Business Drivers For It Simplification PowerPoint Presentation SlidesBusiness Drivers For It Simplification PowerPoint Presentation Slides
Business Drivers For It Simplification PowerPoint Presentation Slides
 
Lakshmankumar_Resume
Lakshmankumar_ResumeLakshmankumar_Resume
Lakshmankumar_Resume
 
Manigandan_narasimhan_resume
Manigandan_narasimhan_resumeManigandan_narasimhan_resume
Manigandan_narasimhan_resume
 
Tyco IS Oracle Apps Support Project
Tyco IS Oracle Apps Support ProjectTyco IS Oracle Apps Support Project
Tyco IS Oracle Apps Support Project
 
Application Modernisation with PKS
Application Modernisation with PKSApplication Modernisation with PKS
Application Modernisation with PKS
 
Application Modernisation with PKS
Application Modernisation with PKSApplication Modernisation with PKS
Application Modernisation with PKS
 
How to Revamp your Legacy Applications For More Agility and Better Service - ...
How to Revamp your Legacy Applications For More Agility and Better Service - ...How to Revamp your Legacy Applications For More Agility and Better Service - ...
How to Revamp your Legacy Applications For More Agility and Better Service - ...
 
Idc analyst report a new breed of servers for digital transformation
Idc analyst report a new breed of servers for digital transformationIdc analyst report a new breed of servers for digital transformation
Idc analyst report a new breed of servers for digital transformation
 
Smarter z/OS Software Delivery using Rational Enterprise Cloud Solutions
Smarter z/OS Software Delivery using Rational Enterprise Cloud SolutionsSmarter z/OS Software Delivery using Rational Enterprise Cloud Solutions
Smarter z/OS Software Delivery using Rational Enterprise Cloud Solutions
 
Demantra Case Study Doug
Demantra Case Study DougDemantra Case Study Doug
Demantra Case Study Doug
 
How to Migrate Applications Off a Mainframe
How to Migrate Applications Off a MainframeHow to Migrate Applications Off a Mainframe
How to Migrate Applications Off a Mainframe
 
legacy application modernization in US | JK Tech
legacy application modernization in US | JK Techlegacy application modernization in US | JK Tech
legacy application modernization in US | JK Tech
 

Mehr von Dell World

Dell Data Center Networking Overview
Dell Data Center Networking OverviewDell Data Center Networking Overview
Dell Data Center Networking OverviewDell World
 
Dell Storage Management
Dell Storage ManagementDell Storage Management
Dell Storage ManagementDell World
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell World
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your NetworkDell World
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager OverviewDell World
 
Dell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell World
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems ManagementDell World
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsDell World
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelDell World
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Dell World
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backupsDell World
 
NVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeNVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeDell World
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Dell World
 
The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...Dell World
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsDell World
 
What a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notWhat a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notDell World
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Dell World
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Dell World
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDell World
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...Dell World
 

Mehr von Dell World (20)

Dell Data Center Networking Overview
Dell Data Center Networking OverviewDell Data Center Networking Overview
Dell Data Center Networking Overview
 
Dell Storage Management
Dell Storage ManagementDell Storage Management
Dell Storage Management
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions Lab
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your Network
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager Overview
 
Dell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch Provisioning
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems Management
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software Solutions
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access Model
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
NVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeNVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about Time
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
 
The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced Threats
 
What a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notWhat a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do not
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the network
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
 

Kürzlich hochgeladen

Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmDeepika Walanjkar
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosVictor Morales
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESkarthi keyan
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTSneha Padhiar
 
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...gerogepatton
 
AntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxAntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxLina Kadam
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
Forming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptForming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptNoman khan
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labsamber724300
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 

Kürzlich hochgeladen (20)

Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitos
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
ASME-B31.4-2019-estandar para diseño de ductos
ASME-B31.4-2019-estandar para diseño de ductosASME-B31.4-2019-estandar para diseño de ductos
ASME-B31.4-2019-estandar para diseño de ductos
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
 
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
 
AntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxAntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptx
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
Versatile Engineering Construction Firms
Versatile Engineering Construction FirmsVersatile Engineering Construction Firms
Versatile Engineering Construction Firms
 
Forming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptForming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).ppt
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 

Re-Architect Your Legacy Environment To Enable An Agile, Future-Ready Enterprise

  • 1. Leave your legacy Modernize your legacy environment to enable an agile future-ready enterprise
  • 2. Speakers Cameron Jenkins Global Practice Director, Application Modernization Services Dell Services Greg Ogburn Senior Solutions Architect, Application Modernization Services Dell Services Jon Payne Senior Vice President and Chief Information Officer, Associated Wholesale Grocers
  • 3. Shift from cost-savings focus to business agility Businesses’ ability to scale up 3rd Platform adoption will require changes to IT operation that bring agility and overcome siloed legacy systems. This will make agile development the de-facto norm. - IDC By 2016, >50% of Application Modernization efforts will address business demand for Enhanced functionality - Gartner By 2018, agile and iterative development will require 30% of resources for application testing engagements to be on- site or onshore - Gartner Research suggests that business agility is the new source of business value - Forrester Application modernization and increasing agility will continue to be a solid driver for Application Development spending, apart from other emerging dynamics of cloud, mobility and social computing - Gartner By 2016, >50% of application modernization efforts will address business demand for enhanced functionality to legacy applications and not cost reduction. - Gartner The primary focus of IT will remain on the care and operation of the existing applications, which are the lifeblood of the enterprise - Gartner Bimodal will gain traction for enterprise strategies - Gartner What we’ve heard…
  • 4. Modernization drivers • Streamline operations, reduce maintenance costs • Manage demand for quality, cost, service, access • Shift spend from maintenance to innovation • Regulatory compliance & security • Speed of response to market changes • Lack of agility • Brittle legacy systems hold back innovation • High-cost legacy platforms • Complex portfolios • Performance and scalability Journey to simplified environment via Application Modernization to support business goals Outcomes Future-ready Digital Scalable Business agility Reduced operating costs Increased security Faster response times Cloud-enabled Open infrastructure IT challenges Business challenges
  • 5. Journey to a modern environment x86 Lower cost Platform Virtualization & cloud Business Agility Mobility Packaged apps Analytics & big data Security Rationalization Strategic Modernization Roadmap Dell Application Re-hosting • Preserve existing investments • Migrate from Mainframe to x86, UNIX, or Linux on System Z • Consolidate UNIX applications and data to Linux or Windows Dell Application Re-architecture • Leverage modern Java or .NET architecture and packages • Extract business logic from mainframe, midrange, and client-server systems • Retire legacy languages and infrastructure Replace Refresh Retain Retire Current legacy environment Dell Application Modernization Services Digital Target environment
  • 6. Dell Strategic Modernization Roadmap Transformation Programs Project Project Project Project 1 Project 2 Project 3 Project 5 Project 4 This Planning Cycle Mnth 1 Mnth 2 Mnth 3 Mnth 4 Mnth 5 Mnth 6 Mnth 7 Mnth 8 Mnth 9 Mnth 10 Mnth 11 Mnth 12 Next Planning Cycle Mnth 1 Mnth 2 Mnth 3 Mnth 4 Mnth 5 Mnth 6 Mnth 7 Mnth 8 Mnth 9 Mnth 10 Mnth 11 Mnth 12Mnth 1 Mnth 2 Mnth 3 Mnth 4 Mnth 5 Mnth 6 Mnth 7 Mnth 8 Mnth 9 Mnth 10 Mnth 11 Mnth 12 Third Planning Cycle Mnth 1 Mnth 2 Mnth 3 Mnth 4 Mnth 5 Mnth 6 Mnth 7 Mnth 8 Key: Line Action Start Dependency Value Dependency Program 5 Program 3 Program 2 Program 4 Program 1 Program 6 Project Project Project Project Project Project Project Project Project Project Project Project Project Project Project Discovery phase Capture and link strategic drivers, business capabilities, code and data in a unified, transparent model Analysis phase Group assets by capabilities, determine the right trajectories, and evaluate the program impacts of technical dependency and complexity. Planning phase Collaboratively develop a program plan to address strategic drivers and resolve technical challenges
  • 7. Costco Largest membership warehouse club chain in the US benefits from Dell Strategic Modernization Roadmap Business Challenge The worlds largest AS/400 system is comprised of over 12 million lines of RPG code and not able to handle Costco’s rapid expansion Solution Developed a Strategic Modernization Roadmap for incremental SAP implementation Results • An actionable 7-year program plan to migrate to SAP and retire the AS/400, with specific integration requirements at each step • Minimized legacy integration requirements • Dell Repository automatically monitors changes to the legacy environment during the 7-year migration
  • 8. Application re-hosting solutions move existing business logic and data investments onto modern platforms.
  • 9. Dell application re-hosting overview Mainframe re-hosting details Open systems IBM z/OS compatibility stack IBM z/OS mainframe environment stack TN3270 ECI/EPI JEE Sockets SOAP/XML FTP Interfaces 3270 Access MQ Interfaces TN3270 ECI/EPI JEE Sockets SOAP/XML FTP Interfaces 3270 Access MQ Interfaces Migration components 3rd party infrastructure VSAM, sequential, GDGs IBM DB2, IBM IMS-DB COBOL, PL/I, Easytrieve Plus, Assembler, other JCL/JES IBM CICS, IBM IMS TM IBM z/OS, IBM z/VSE 3rd Party infrastructure VSAM, Sequential, GDGs RDBMS (Oracle, DB2 LUW, SQL Server…) COBOL, PL/I, Easytrieve Plus, other Dell BPE Batch JCL & JES Dell TPE Transaction monitor Linux, UNIX, Windows Review / replace Application logic Batch environment Online environment Platform Data migration Re-host to modern platform with no change in functionality Retain experienced staff Platform positioned for future growth at reduced costs Minimal changes HP StorageWorks XP24000 Disk Array ALARM READY MESSAGE PUSH HP StorageWorks XP24000 Disk Array Mainframe application compatibility middleware RACF, ACF2, Top Secret Dell TSF, Target OS securitySecurity profiles
  • 10. Flexible, full-service solution approach Proven project methodology & risk mitigation process Dell follows a proven migration methodology consisting of many flexible service offerings that are tailored to meet the business objectives and technical needs of an organization. The image below shows many of the services that Dell can offer, including many that will be proposed for the mainframe re-hosting project. Technical feasibility and business impact • Goals and corporate directives • Application and environment characteristics gathering • Preliminary proposal leading to decision to proceed Project methodology validation • Asset cataloging • Assessments – Source – Operational – Infrastructure • Asset grouping • Optional custom workshops • Optional POCs Detailed project plan and implementation • Infrastructure / Operational Implementation • Application migration implementation • Data migration tools • Bridging Implementation • Training • Application retrofit Final validation and production cutover • Baseline Preparation • Regression testing • Performance testing • Application discrepancy correction • Production readiness and cutover support Managed services solutions • Dell enterprise product support and maintenance • Support triage • Short term turnover services • Managed services – On-going application maintenance & development – Help desk • Managed hosting Discovery Design Implement Test/Deploy Post implement
  • 11. Associated Wholesale Grocers (AWG) Business Challenge Associated Wholesale Grocers (AWG) was looking to modernize their core business applications to reduce costs, and prepare to move to the cloud. Solution Dell undertook a comprehensive assessment and developed a migration plan that included moving off a complex IBM infrastructure to an open system. Results • Modernized platform supports AWG’s migration to the cloud • Reduced operating costs by 10% • Improved disaster recovery capabilities; a recent disaster recovery test validated that the system works and that the investment was worth it
  • 12. Re-architecture builds a modern application framework based on business functionality, then migrates legacy logic and data into that framework to deliver business agility and reduce future costs.
  • 13. Dell Re-architecture overview Complete transformation to best practice Java or .NET architecture Re-architected Java / .NET System Data Entry & Report Transaction Screens Exception Screen Cross-platform Front end Daily Batch Monthly Batch Key Code Component System Interfaces Stored Procedure Shared Data Store Nested Redefines Legacy Data Store Visible Requirements Hidden Requirements Legacy System Service/Application Layer • Encapsulates business logic • Horizontally scalable • Integrates with packages Service Bus Presentation Layer • Web, modern • Mobile-ready Analytics/Reporting Engine • Self-service • Business-facing Data Layer • Engineered for performance and extensibility • Relational and/or big data Job schedule Infrastructure Layer • Virtualized or cloud for scalability and flexibility • Aligned with enterprise standards and investments
  • 14. Re-architecture method The Dell Re-architecture difference Methodology & Tools Phase 3: Develop & Test Outcomes: Modernized & tested application source code with migrated legacy data. Uses best practices for SOA and leverages commercial software packages. Phase 2: Design Outcomes: Validated design. Implement legacy and enhancement functionality leveraging modern application and data architecture Phase 1: Discover & Plan Outcomes: Baseline holistic legacy model linking business use to code and data, enhancement requirements, detailed plan with precise scope and accurate estimates Holistic, integrated code, data and business use case analysis provide a complete, business- validated requirements baseline combining visible and hidden requirements. Re-architecting leverages modern frameworks and architecture practices, typically resulting in 75% reduction in lines of source code, and a truly future-proof system Automated code generation and data modernization capabilities mitigate risks and drive down maintenance cost for the modernized system. Online collaboration and transparency across the team to simplifies business engagement, and enables distributed teams. US Patents 7.996.413 8.150.896 US Patents 8.831.964 8.639.675 7.996.413 Dell Repository Dell Analyzer Dell Data Workbench Dell Designer Dell Code Generator
  • 15. Government of Saskatchewan Justice better served with modernized IT system Business Challenge Criminal justice employees were challenged with too many manual and paper business processes and four 30-yr-old disjointed data systems Outcome • Consolidated the functions of four major systems into a single modern app • Eliminated duplicate data and reduced total volume of data • Streamlined procedures across the Ministry • Low-cost Intel platform and commodity infrastructure “In working with our Ministry to learn our business issues and find solutions, Dell’s Application Modernization Services team plays a vital supporting role in our project’s success, now and going forward.” Rick Davis, Director, Operational Support, Saskatchewan Ministry of Justice, Corrections and Policing
  • 16. Dell Software products and Patented IP Dell Analyzer • Automated code analysis and logic extraction for any source language • Cross-language, cross-platform dependency analysis Dell Repository • Integrated requirements management, reverse- engineering and design • Business capability mapping to legacy assets • Customer and team collaboration Dell Data Workbench • Data modernization, refactoring, migration, profiling and auditing Dell Designer • Integrated user interface and service design Dell Code Generator • Consistent model-driven generation of user interface, service and data layer code • Highly maintainable code with no runtime requirements • Compliant with a broad range of target architectural frameworks Dell Transaction Processing Environment • Scalable, native, distributed transaction processing platform for CICS, IMS TM, other workloads Dell Batch Processing Environment • Scalable environment for developing, scheduling, executing and managing batch based workloads Dell TPE and BPE Manager • Provide monitoring and management for the online and batch application execution environments Dell Enterprise COBOL • Powerful COBOL mainframe offloading and modernization platform Dell Transaction Security Facility • External security manager providing Role Based Access Control (RBAC) based transaction processing security Dell Hierarchical to Relational (H-RDB) console • IMS DB conversion and runtime support Dell Re-host Solution Suite Dell Re-architecture Solution Suite Comprehensive, fit-to-method, toolkit for legacy analysis and Re-architecture Comprehensive distributed platform and tooling for supporting re-hosted mainframe workloads Dell Automated Migration Solution Suite Dell Automated Assessment Workbench • Automated portfolio assessment capabilities for legacy based workloads Dell Automated Conversion Workbench • Collection of tools and utilities to support the migration of legacy programs and data to a distributed environment – Mainframe languages (Assembler, ADSO, Mark IV, etc.) to other (e.g. COBOL, C, Java, etc.) – Mainframe data structures (IMS DB, IDMS DB, Adabas, Datacom, etc.) to RDBMS • C/C++ to Java • ASP to ASP.NET • Oracle Forms to Java • Lotus Notes to Salesforce • WebLogic to JBoss • Struts to Spring Dell Automated Upgrade Workbench • Oracle Upgrade Assessment Tool • PeopleSoft Upgrade Impact Analysis • Various Java Framework Upgrades Automated code assessment, conversion, remediation, and upgrade impact analysis solutions
  • 17. Why Dell Modernization Services? End-to-end solutions • Hardware, software and services • Flexible engagement model • Integrated with Dell Services IT outsourcing, maintenance, testing and development teams 25+ years of experience • Proven track record of success • Established methodologies • Trusted partner network • Single point of accountability • Domain and package expertise • Global and local resources Unique and patented Dell IP • Broad range of market-tested tools and software
  • 19. Quiz