Download presentation
Presentation is loading. Please wait.
Published byNeil Burke Modified over 9 years ago
1
unisys Imagine it. Done. Systems Integration. Outsourcing. Infrastructure. Consulting. Server Technology. The Destination May Be Clear – But is the Journey Safe? Alan Hood Senior Marketing Program Manager Productivity Software Unisys Corp. Roseville, Minnesota USA
2
Imagine it. Done. unisys 2 ©Unisys, Corp., 2003 Where are your applications going? What is your route? Perhaps Component Architectures are where you want to be, but… Are you certain a wholesale migration is the best or only way to get there? Have you carefully considered the alternate routes?
3
Imagine it. Done. unisys 3 ©Unisys, Corp., 2003 What is a Legacy? We call it “legacy” because it consists of data and logic that have value to your business. It may be “buried”, because the ones who put it there have moved on, But it is still too important to simply let it go away.
4
Imagine it. Done. unisys 4 ©Unisys, Corp., 2003 Quite often, the perception is UNIX NT/2000 SQL/Oracle SAPSiebel People Soft Custom Browser Fat Client Green Screen migrated Hidden value must be migrated to ‘open’ platform
5
Imagine it. Done. unisys 5 ©Unisys, Corp., 2003 Quite often, the perception is UNIX NT/2000 SQL/Oracle SAPSiebel People Soft Custom Browser Fat Client Green Screen Hidden value must be migrated to ‘open’ platform But is that really the BEST WAY? Is that the ONLY WAY? To Modernize your applications and take advantage of the treasure in your legacy?
6
Imagine it. Done. unisys 6 ©Unisys, Corp., 2003 Risks Inherent in Wholesale Migration May be hidden costs in migration Consider more than just initial purchase price of hardware and software Application Value vs. Cost Logic may be difficult to capture and codify in new environment Data migration is often harder and more costly than moving code Do not forget to test… and Test… and TEST… and TEST
7
Imagine it. Done. unisys 7 ©Unisys, Corp., 2003 Costs in legacy migration Data migration Performance Training Developers System Administrators Users Security infrastructure Network, access control On-going maintenance costs
8
Imagine it. Done. unisys 8 ©Unisys, Corp., 2003 Consider Upgrade In Place UNIX NT/2000 SQL/Oracle SAPSiebel People Soft Custom Browser GUI Client X
9
Imagine it. Done. unisys 9 ©Unisys, Corp., 2003 Consider Upgrade In Place UNIX NT/2000 SQL/Oracle SAPSiebel People Soft Custom Browser GUI Client Modernize and Surround the Legacy
10
Imagine it. Done. unisys 10 ©Unisys, Corp., 2003 Information Technology’s Main Concerns Skill Availability 45% of respondents say it is one of their main concerns 15% say it is their main concern Application Integration with legacy systems 50% or respondents say it is one of their main concerns 13% say it is their main concern Training staff in new technologies 45% of respondents say it is one of their main concerns 11% say it is their main concern Gartner Symposium Survey 20 th March 2002
11
Imagine it. Done. unisys 11 ©Unisys, Corp., 2003 Models for Leveraging Legacy Applications Simple Web Access Open Data Access Application Integration Message Queuing A given business solution may require a number of different models Passive, non-intrusive methods for 3GL Active methods, requiring some change
12
Imagine it. Done. unisys 12 ©Unisys, Corp., 2003 Browser access to existing 2-tiered transaction system with MINIMAL or NO application changes. Simple Web Access
13
Imagine it. Done. unisys 13 ©Unisys, Corp., 2003 Simple Web Access – Issues Some applications not suited for the Internet Security Transaction State Business logic suited to internal users, but not general public May require some additional logic, security, enhanced user interfaces Advantages: Fast Inexpensive Meets most immediate needs Instant gratification / Instant success
14
Imagine it. Done. unisys 14 ©Unisys, Corp., 2003 JAVA Windows Wireless Industry standard data access interfaces, such as ODBC, OLE DB, JDBC and XML, directly to a database Open Data Access
15
Imagine it. Done. unisys 15 ©Unisys, Corp., 2003 Open Data Access - Issues Security – Who has access to vital data? Integrity – Must ensure business rules are replicated in data access clients Performance – Without proper control, it may be easy for less experienced users to write “runaway” database queries Advantages: Non-Intrusive Little or no new code to write in legacy system Usually fast to implement Skills readily available
16
Imagine it. Done. unisys 16 ©Unisys, Corp., 2003 Application Integration Microsoft Applications Packaged Applications: Siebel, SAP, etc. Sockets DCOM BEA WLE, WLS, etc. Integration Brokers Tuxedo CORBA Client Java Scripting EJB, JSP Sockets Integration Brokers Windows UNIX Other system’s applications, Integration Brokers
17
Imagine it. Done. unisys 17 ©Unisys, Corp., 2003 Application Integration By the year 2003, 80% of application development organizations will leverage some form of legacy extension technology to accelerate the benefits of composite applications without the associated expense of application replacement - Gartner
18
Imagine it. Done. unisys 18 ©Unisys, Corp., 2003 Application Integration - Risks Potentially most intrusive – Can require rework Transaction Flow – Applications designed for terminal user input may be cumbersome for GUI or program to program integration Advantages Most complete integration Takes full advantage of strengths of legacy system “Wrapping” legacy transactions preserves intent of original system
19
unisys Imagine it. Done. Systems Integration. Outsourcing. Infrastructure. Consulting. Server Technology. Enterprise Application Environment Allows you to Upgrade in place, Safely migrate to another platform, Or transform to component technology As and when it is appropriate for your business needs
20
Imagine it. Done. unisys 20 ©Unisys, Corp., 2003 Enterprise Application Environment “A rapid application development and deployment environment that provides the solution framework to reduce risk in the creating, organizing, and managing of processes for building and delivering transaction-based, enterprise-class, scale-up applications, enabling an organization to remain focused on growing and/or saving money.”
21
Imagine it. Done. unisys 21 ©Unisys, Corp., 2003 An Enterprise Application Environment “object” incorporates the PRESENTATION, LOGIC and DATA in one. They do not need to be separated early in the design. Real World EAE Object Model Database Programs Development Environment Enterprise Application Environment Systems Approach
22
Imagine it. Done. unisys 22 ©Unisys, Corp., 2003 Enterprise Application Developer Workstation Development Tool Repository Based Supports many developers, working on many applications Model driven Design, Code, Function Test, Debug, Maintain All using the same tool Security in-built A Highly Productive Development Environment
23
Imagine it. Done. unisys 23 ©Unisys, Corp., 2003 “Client” Interfaces Include “Dumb” terminals Graphical Interface Workbench Graphical client, VB application Web Enabler – WYSIWYG Web Browsers Enterprise Application Component Enabler COM/ JavaBeans workstation apps Web Browsers, ASPs, Custom clients XML/SOAP and Web Services Open DTP clients Web Tx, BEA Connect, BEA Jolt … SQL Including ODBC, JDBC, Internet Commerce Enabler… And others...
24
Imagine it. Done. unisys 24 ©Unisys, Corp., 2003 Enterprise Application Environment Clients User- written clients COM Objects or Java Beans Developer ASP’s Generate Visual Basic forms Customized Generated ASPs Customized Generated Forms Presentation Client for Desktops Presentation Client for Browsers ClearPathWindowsUNIX Core Enterprise Application System “One click” generates application and all of these access methods
25
Imagine it. Done. unisys 25 ©Unisys, Corp., 2003 Enterprise Application Environment Business-oriented philosophy and object-based methodology Highly productive development and maintenance environment High-volume, mission-critical information systems supporting the international market Accommodate new technologies easily, often transparently Target ClearPath, Windows or UNIX environments Proven productivity and performance
26
Imagine it. Done. unisys 26 ©Unisys, Corp., 2003 Clients Want Development Environments That: Make development faster and easier Can deliver more robust systems Mix RAD design capabilities with UML modeling techniques Can accommodate the existing skill sets of their corporate developers Support J2EE,.NET, and Web Services Incorporate sophisticated pattern-based development support (self defined patterns) Implement a centralized repository for artifact management and reuse Are capable of Full impact analysis From John Meyer Giga Analyst Analysts say:
27
Imagine it. Done. unisys 27 ©Unisys, Corp., 2003 Enterprise Application Environment A product that Allows rapid adaptation to changes in business strategies Change is constant, your applications should be easy to modify Investment protection Easily adopt new technology Proven environment for development of enterprise class transaction applications Meets your business needs today…
28
Imagine it. Done. unisys 28 ©Unisys, Corp., 2003 Industry Trends Reusability Application Assembly
29
Imagine it. Done. unisys 29 ©Unisys, Corp., 2003 Strategic Goals for Enterprise Application Environment Combine the best of Enterprise Application Environment and component/object concepts Build industry-accepted components that interoperate with other components Development environment built upon Microsoft Visual Studio Reliably generate very large, business-critical systems for .NET J2EE COBOL (ClearPath) Applications can become a system of components “Safe passage” for existing applications
30
Imagine it. Done. unisys 30 ©Unisys, Corp., 2003 What is “Safe Passage?” Even if you never use a component … You don’t need to change your application Migration the same as moving from one release to another Developer changes will provide Better productivity and usability Improved modularity Greater performance and scalability
31
Imagine it. Done. unisys 31 ©Unisys, Corp., 2003 Enterprise Application Environment Provides Added Value Better productivity, reliability and scalability than generic component or Object-Oriented tools Focus on “what” rather than “how” View of all parts of application Migrating data as well as code over life of application One tool to generate complete application including database, clients, etc. One tool to generate either.NET, J2EE, or COBOL (ClearPath) Proven tool for building, generating, and running mission-critical, scale-up applications
32
Imagine it. Done. unisys 32 ©Unisys, Corp., 2003 Summary Unisys understands the emerging technologies and its value to business Unisys is continuing to invest in Enterprise Application Environment to provide maximum value to its customers Opportunity to leap ahead into new technology, using your existing skills Investment protection and “safe passage”
33
Imagine it. Done. unisys 33 ©Unisys, Corp., 2003 Enterprise Application Environment Proven product Long-term vision Determined team
34
Imagine it. Done. unisys 34 ©Unisys, Corp., 2003 Department of Mental Retardation Responding to Market Demands with ClearPath Solutions
35
Imagine it. Done. unisys 35 ©Unisys, Corp., 2003 ClearPath Plus for e-business B2C B2B Web Services Application Integration B2G G2C G2G Browser Access Data Access Message Queuing “One Click” Migration J2EE &.NET
36
Imagine it. Done. unisys 36 ©Unisys, Corp., 2003 Unisys Imagine it. Done. Mail: eae@unisys.com
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.