Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Identifying services from legacy batch applications
Komondoor R., Nandivada V., Sinha S., Field J.  ISEC 2012 (Proceedings of the 5th India Software Engineering Conference, Kanpur, India, Feb 22-25, 2012)13-22.2012.Type:Proceedings
Date Reviewed: Dec 17 2012

Modernization is the current buzzword in the information technology (IT) industry. Legacy IT applications are transformed, reengineered, and modernized to meet the needs of today’s world. Mobile devices are the hot products preferred by youth, as well as the working class. Providing IT applications compatible with mobile and other modern devices has become a necessity for many companies. Current IT requirements have produced considerable changes in the way services are offered by such companies.

Traditionally, IT systems were developed to run on mainframe and mid-range computers. Even today, much of the data resides in these legacy systems. Much of the data processing is done in batch mode, and thus information is not available in real time to end customers. Organizations are striving to provide up-to-date information in real time to customers. This will require converting batch processing to service-based transaction processing, which will process business transactions when and as they come. The challenge for companies, then, is to come up with suitable IT services to accommodate these legacy applications.

The authors of this paper have proposed a new static analysis-based solution for identifying services within a batch program. They applied their solution to real-time order processing COBOL code to demonstrate how it identifies services. The paper also presents a three-step generic algorithm that takes a program and associated global variables as inputs and provides a set of services as output. The proposed approach is evaluated through the analysis of three COBOL programs from the enterprise business world.

The authors have taken an innovative approach to a valid problem faced by companies today. This paper is a great initiative by the authors to kickstart further research to make the proposed technique more robust and useful.

Reviewer:  Ponmurugarajan Thiyagarajan Review #: CR140754 (1303-0238)
Bookmark and Share
  Featured Reviewer  
 
Restructuring, Reverse Engineering, And Reengineering (D.2.7 ... )
 
 
Miscellaneous (D.2.m )
 
Would you recommend this review?
yes
no
Other reviews under "Restructuring, Reverse Engineering, And Reengineering": Date
Software evolution: the software maintenance challenge
Arthur L., Wiley-Interscience, New York, NY, 1988. Type: Book (9789780471628712)
Mar 1 1989
The year 2000 computing crisis
Murray J., Murray M., McGraw-Hill, Inc., New York, NY, 1996. Type: Book (9780079129451)
Oct 1 1996
Constraint-based design recovery for software reengineering
Woods S., Quilici A., Yang Q., Kluwer Academic Publishers, Norwell, MA, 1998. Type: Book (9780792380672)
Dec 1 1998
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy