Tryvs Unlocking Latent value through Business Application Modernization –


Corporations have more than the years, deployed a diverse mix of software program and also hardware applications to gain affordable benefit. Fast innovations in IT, integrated with progressing company requirements, have actually led to contrasting IT atmospheres across business.

At one end of the range are open architecture applications that take advantage of on the possibility of the of Internet, while the other end makes up standard, close-ended, heritage software. company information still stays on legacy Some market study estimates suggest that greater than 70% of systems. The effective management and also re-deployment of legacy systems to satisfy tomorrow’s company needs is the significant challenge today.

This white paper will aid companies recognize the issues entailed in effective management of existing heritage systems.



A heritage system commonly contains huge applications that access voluminous data kept in legacy database administration systems working on mainframes or mid-range platforms.
These systems made economic sense when they were developed. The capability of these systems was indisputable at the time of installation. Nonetheless, as technology as well as organisation needs advanced they have come to be intricate and also expensive to maintain.
As the venture has actually invested a substantial quantity of time and loan in these systems, these investments can not simply be crossed out.


In their existing state, many tradition applications have actually several difficulties linked with their operating and maintenance. A few of the normal obstacles are enumerated below:
Legacy systems are constructed for interior, enterprise-wide usage, while today’s organisation demands that they be subjected to brand-new, external entities. The emphasis was generally on internal company logic
. These applications are inflexible. They are not modular therefore partition of service, presentation and database logic eats important resources
. The lack of paperwork and experienced workforce make any kind of modification an ad-hoc procedure as well as not a holistic one. This can cause collisions and failures in unforeseeable parts of the system.

Efforts to resolve these difficulties have been piecemeal, and also have had minimal influence. The mix of brand-new systems and retrofitted older ones have actually ompounded the problem. Adoption of new innovation as well as languages has actually usually been just for technology’s purpose. The need to supply application functionality via new channels like mobile tools, with varying purchase strategies include to the problems of effective legacy modernization.


Organizations remain to utilize heritage applications on account of numerous factors. Several of the benefits viewed by organizations are:

. Legacy systems were developed for, and still run, mission-critical applications
. A large number of users use the system. They are extremely knowledgeable about the capabilities of the applications, including look. They have actually likewise gotten a full understanding of the toughness as well as limitations of the system
. The underlying equipment as well as software program of such tradition systems is time-tested and also really reputable. The applications themselves have progressed over a couple of decades as well as act extremely predictably.

These variables contribute to the continued usage of tradition systems. With globalization and deregulation, the requirement for flexible systems that can integrate with rapid service changes has actually ended up being critical
. Organizations are mapping price controls to suitable service assumptions.

Such dynamic factors to consider have made it imperative for companies to analyze the monetary stability of their IT profile, to make sure that they can leverage the benefits of new-age languages and also enhance returns on financial investment on existing applications too.
Business leaders should take into consideration following critical problems when advancing past heritage systems:

. Complete Cost of Ownership –

Normally, the Total Cost of Ownership (TCO) of keeping a heritage system running can be really high as compared to the expense of running a much more updated system.
The TCO of a system includes parts like procedures (equipment, system software application), production support, as well as application maintenance. The lines of code, high quality of paperwork, and the method the application is structured straight affects expenses of the system.
Sector experience suggests that maintenance prices come by as long as an aspect of 3 after a legacy system is transformed. This is undoubtedly possible if the more recent system is better structured, far better documented and also has actually maximized code.

Productivity –

A heritage system generally owes its stability, reliability as well as scalability to the underlying data processor platforms on which it is deployed. Any kind of strategy to modernizing the tradition system must identify this and also establish a service appropriately.
Updating legacy does not suggest moving far from the data processor system in its existing manifestation, yet maximizing the existing system for boosted performance.

Adaptability –

The modern technologies used in a heritage application usually do not incorporate well with more recent technology application elements that have actually been subsequently developed. The main adaptability loss develops from the fact that the applications are monolithic– unlike the a lot more current multi-tiered styles where the presentation and also service logic are divided. Multi-tiered designs allow for higher versatility as well as modifications can be effected swiftly.
Architectural strength is one of the main factors that several organizations choose to re-architect the legacy application, even while keeping the underlying system as well as language.
A changed application produces a multi-tiered, versatile system, enabling easy integration of more recent modern technology.

Expertise Availability –

Programmers adept at COBOL, PL/1, Assembler and numerous other heritage languages are a vanishing people. These programs languages are no longer instructed in computer technology courses at institutions and also training institutes– thus, without substantial re-training, it is challenging to create these abilities internal.
The very same problem applies for data source modern technologies made use of. In the past, ordered and also network data sources were extremely typically utilized, whereas current applications collaborate with relational databases.
Last but not least, paperwork in respect of the application’s performances is generally insufficient, as well as just a few individuals possess total understanding of what the application does.

Vanished Vendors –

In numerous reported situations, the firm that originally developed the application is no more in organisation. Since most usually the language made use of to create the system is currently obsolete and no much longer sustained, that leaves their clients in a very precarious position. In addition, the system has typically been greatly personalized, as well as there is no correct documentation maintained. This is additionally the primary bottleneck to executing improvement and also adjustments to the application.
Whenever such a system has actually to be taken over for upkeep, it needs a high knowing curve. This period can differ from 2 months to 6 months depending upon the intricacy of the system. Only after getting knowledgeable about the system can a third-party have the ability to execute a reliable maintenance job.

Placement with Business Goals –

Some CIOs absolutely do wonder whether it is beneficial to invest on upgrading a tradition as well as preserving system. In fact, such outlay can create a healthy and balanced return on financial investment need to not be considered as simple running expenses.
There are three unique sorts of maintenance costs: precautionary (e.g. Y2K, Euro), flexible as well as break down. Preventative and failure maintenance expenditures are essential to maintain the system running, so the costs assigned to these can be claimed to be running prices.
Flexible upkeep typically refers to improvements or updating. This maintenance, though bit-by-bit, does enhance the capability, accessibility, and also provides excellent company value. Sadly, most improvement demands take a rear as most budget plan allotments being eaten by preventive and breakdown upkeep.
Improved returns on investment can be gotten only by embarking on a sizable upgrade, and that also when business needs it the many.
Appropriate preparation as well as Return On Investment (ROI) analysis ought to be done for heritage upgrade to know whether worth builds up from enhanced returns or decreased TCO (upkeep, facilities as well as functional prices).


Organizations moving far from heritage systems need to take on a financial viable option that satisfies calculated business demands. There are numerous choices offered to the CIO when metamorphosing from heritage systems to extra modern systems.

Useful Extension –

Useful Extension serves when the heritage application has appropriate organisation logic, however needs added performance.
Functional Extension describes shutting the practical voids in the heritage application by reengineering the existing application or by integrating it with various other application.

Technical Extension –

Technical extension serves when existing tradition applications have high functional expenses and also there is a strong requirement to share the organisation abilities with partners/suppliers. One of the crucial vehicle drivers for technological expansion is a demand to web enable the heritage application.
Technical expansion covers activities like:
. Legacy Integration

In both the technological as well as useful expansion, the procedures and also service regulations are preserved while critical parts of the application are converted and also adapted.

Movement –

Movement ends up being an essential modernization alternative when the legacy application has appropriate business regulations, yet requires greater scalability as well as interoperability.
This choice is likewise useful, when it is difficult to separate reasoning from relentless data and also presentation layers
. Option of targeted programming language/platform/database
. Code migration
Database migration
. Deployment movement


Replacement- Replacing the existing legacy application with a generic off-the-shelf product or rewriting it under a new shows environment is another choice.
Substitute would certainly accrue benefits similar to re-engineering as well as is vulnerable to comparable drawbacks. There is additionally the risk of overlooking important company guidelines that comprise the heart of the heritage application.


The option of any one of these 4 alternatives would be based on an extensive analysis of the application profile around numerous application specifications, several of that include:.
Useful viability.
Availability of various attributes.
Schedule of basic remedies (OTS Products)
. Relieve of use
. Level of documents readily available
. Access
. Assistance readily available from platform/technology supplier
. Applicability of Enterprise Architecture requirements and also plans.

Profile analysis around these specifications will help analyze the applications based upon functional voids and also technological gaps within the applications. When the profile evaluation has identified the functional and also technological spaces, each application can be placed in one of the 9 blocks, received the following evaluation grid. This will assist in identifying an appropriate innovation strategy for the application.
Portfolio analysis is the most critical facet of the overall business application innovation workout and also therefore there ought to be a tool-based technique that would certainly eliminate, to an excellent level, subjectivity presented by a pure manual strategy.



Heritage Extension connects the space between legacy and tactical designs. It augments noninvasive combination and also other task alternatives. Legacy extension is affordable, time-efficient and also risk adverse. The expansion process is composed of understanding and also documenting the existing system; decaying the application right into information, discussion and also processing logic; producing as well as drawing out multiple-use components; and also if desired, transforming the heritage code into Web compatible languages.


Extending a tradition system provides organizations a number of unique advantages consisting of:.
1. As much as 40% decrease in upkeep expenses, with enhanced understanding of the functionality of your applications. Optimized expense of possession of transformed system as well as reduced general costs (comprehensive of new resources, training as well as upkeep).
2. Leveraging current organisation procedures and also modern technology.
3. Improved access to the system through re-deployment and also re-orientation of existing hardware as well as software application resources. Anytime, anywhere, safe access to individuals and also clients. Easy access to individuals over the Internet considering that no added equipment or software application is called for to accessthe application. Easy to use interface that calls for marginal training/ re-training.
4. Shifts dependence of maintenance tasks from couple of people to transparent processes and devices. Ease of upkeep from a Programming/ Maintenance group perspective.
5. Comprehensive paperwork of system with complete expertise of processes.
6. Ease in implementation as well as improvement of performance.


Legacy systems generally include billions of lines of code in myriad conventional languages. The expansion process includes scanning code, extracting service logic, getting rid of dead code and setting up modules into sensible components. Proficient designers can carry out these tasks manually. Due to numerous time, cost and threat implications of hand-operated intervention, tool-based expansion is a much faster, simpler and a lot more cost-effective alternative.


The need for fast application development, in addition to substantial advances in software application advancement automation, has actually led to the development of devices that automate and also aid in the process of heritage extension. In tradition systems, a single program performs numerous features, or several programs may do an offered feature. Understanding all procedures carried out by a feature is a tough task in terms of intricacy, size and effort. A number of programs might have to be evaluated to entirely comprehend a single function. This method is time consuming and also susceptible to error.


Tool-based expansions can prove to be advantageous in:.

1. Extraction of organisation logic – A tool can remove the company logic pertaining to the functionality, from all the programs and make the whole performance available in the kind of a company rule repository. With the automation of useful analysis, the designer can invest even more time in optimization as well as componentization ofthe code.
2. Removal at system and also useful degrees – A device can draw out organisation reasoning at a system degree along with practical level. Deploying a device makes certain that the full service expertise is drawn out from the system, while offering an accurate image of the application( s) functionality.
3. Photographic representation of system flow – A device can also offer a pictorial depiction of the system flow, and emphasize various components in the program. This uses the programmer a much better understanding of the system. Devices can likewise be utilized for information migration efforts, wherein it is feasible to design data for the target system. This is very helpful in cases like VSAM to RDBMS conversion.

Usually, a tool-based method to heritage expansion includes the following actions:.

Baselining the Inventory –
. 1. Tool records a module-wise stock.
Program A conjures up another program B, as well as program B does not figure in the program inventory. Program B can then be imported right into the tool inventory.
3. The cycle goes on till the supply is total.
4. Redundant programs, i.e. the programs that are not referenced by any various other programs are identified as well as neglected.

Preparation and also Scheduling -.
1. Imported programs are assessed for their intricacy. Different tools utilize different formulas for identifying the complexity.
2. The complexity analysis assists in initiative estimation for extension of the programs and additional preparation & scheduling of required tasks.

Getting the Process Flow -.
1. The device creates a process flow for a transaction.
2. It highlights the cross-reference as well as connection in between programs, batch work, components, and so on
3. The visual representation supplies a much better understanding of the system at macro as well as micro degrees.

Information Modeling -.
1. The tool creates an “as is” data model of the present system.
2. This model can be additional enhanced and also stabilized to match the customer’s needs.
3. This information model can be exported for straight use by standard devices such as Rational Rose, ERWIN, etc, to produce the target database.
4. The model can also be utilized to produce a DDL for the target data source. When changing from VSAM datasets to RDBMS, this attribute adds a lot more worth.
5. Dependencies as well as relationships between the different entities can be modeled making use of graphical interfaces.
6. For the most part, the back-end can remain unchanged.

Understanding Mining and also Extension -.
1. Complex regulations are split right into independent atomic policies. The extracted guidelines are evaluated as well as confirmed versus the code and the current performance. Redundant code is weeded out.
2. “Use Cases” are created as well as proper service regulations are connected with them, thus building up the parts that get converted right into software in the target language. A part can contain more than one feature. The design of the components is reliant on the target style and also framework.

Release -.
1. The re-architected application is exposed to inner users for testing its capability.
2. The software generated is carried out on the target platform.



Patni believes that the best way to service a customer’s requirement is to drink the procedures common at the customer’s site and mix them with Patni’ s growth methodologies, processes and devices.
This strategy enables Patni to give the “best-fit solution procedures” that include value to the customer’s IT procedures.
Patni has a ‘Center of Excellence’ for Legacy Modernization. Supply internal consulting and also established criteria for an array of Legacy innovations.
2. Identify ‘value-add’ devices, processes and methods, and also facilitate their usage at client websites.
3. Provide “proof of concept” and create options in e-Business, Legacy modernization and Application Management.
4. Supply cost-effective solution transfer services to Delivery Units, utilizing a wise mix of onsite-and offshore-based very skilled IT professionals.

Patni believes that any extension of legacy systems tradition be ought to “non-invasive” as possible. As defined earlier, Re-engineering, substitute and also re-facing are the three methods of migrating from tradition to newer platforms.

Based upon our considerable working as a consultant experience, Patni scopes out a cost-benefit classification. On the basis of their research study, our analysts categorize applications into among the 4 classifications:.

Update/ Replaced -.
Application that do deliver purposefully considerable capability, but have a high expense of retention, need to be kept. They are prospects for expense decrease via innovation upgrades or via exploitation of other systems. These applications will efficiently move right into Quadrant 1 (Retire) if exploitation of Quadrant 4 (Export) systems makes it feasible to replace these systems.

Retired -.
Applications that do not provide any type of tactically substantial capability, yet have a high price of retention, are poor worth for cash. system that have actually been semiretired, or are made use of for historical data referral only, would certainly be consisted of in this group.

Preserve -.
Applications that do not supply any strategically substantial functionality, yet have an alike affordable of retention, are best preserved on an “as is” basis. There’s not much to be acquired from retiring them, as they have a low cost of retention– nor is there much to be gained from any kind of more investment of time or initiative. These applications will effectively move into Quadrant 1 (retire) if exploitation of Quadrant 4 (Exploit) system makes it feasible to replace these systems.

Optimize Utilization -.
Applications thet do supply purposefully substantial performance, as well as likewise have a reduced price retention, appearto deal great “Valu for loan” as well as should be used as extensively as possible. Exploitation can result in making various other (Quadrant 2 upgrade/ replace) and Quadrant 3 (Retain) systems repetitive, hence efficiently moving them to Quadrant 1 (Retire).

1. Legacy Understanding: Documenting existing system.
2. System Decomposition: Application is burglarized data, discussion as well as processing logic.
3. Componentization: Create and also extract multiple-use parts.
4. Expansion: Convert tradition code into Web suitable languages.
Any kind of tradition extension will certainly need the right tools and also the ideal method. Patni has critical alliances with several of the leading “legacy modernization” and also “Web-enabling” device suppliers in the market. Rich experience, customer-orientation, state-of-the-art development devices, techniques and processes allow Patni to provide the “best-fit solution procedures” that add worth to the customer’s IT operations.


1. Greater than 70% of company data still lives on heritage systems.
2. Big corporations have actually invested substantial sources on these systems. This investment can not be crossed out.
3. Heritage systems were created for, as well as still run mission-critical applications.
4. In their present state, most legacy applications have a number of obstacles related to their working as well as maintenance.
5. When advancing beyond heritage systems, company leaders must take into consideration tactical problems such as:
. Total Cost of Ownership
. Performance
. Adaptability
. Expertise Availability
. Vanished Vendors
. Placement with Business Goals.

Different options are readily available to the CIO when moving from Legacy systems to more modern systems:
. Useful Extension
. Technical Extension

7. Any type of extension of heritage systems ought to be “non-invasive.”.
8. The expansion process is composed of understanding and also documenting the existing system; decaying the application into data, presentation and also handling logic; producing and drawing out multiple-use parts; and if wanted, transforming the legacy code right into Web suitable languages.