Computable.nl
  • Thema’s
    • Carrière
    • Innovatie & Transformatie
    • Cloud & Infrastructuur
    • Data & AI
    • Governance & Privacy
    • Security & Awareness
    • Software & Development
    • Werkplek & Beheer
  • Sectoren
    • Channel
    • Financiële dienstverlening
    • Logistiek
    • Onderwijs
    • Overheid
    • Zorg
  • Computable Awards
    • Overzicht
    • Nieuws
    • Winnaars
    • Partner worden
  • Vacatures
    • Vacatures bekijken
    • Vacatures plaatsen
  • Bedrijven
    • Profielen
    • Producten & Diensten
  • Kennisbank
  • Nieuwsbrief

The latest legacies

04 juli 2002 - 22:004 minuten leestijdOpinieCloud & Infrastructuur
Martin Healey
Martin Healey

There will always be legacy applications and systems. Legacies are usually a sign of past success, so it is perfectly reasonable that we should treat them with respect. That unfortunately is not always true and some of the associated problems appear to be getting worse.

It is normal to associate "legacy" with old batch applications running on mainframe computers. But in the twenty first century, there are a lot of applications running on Unix systems which are now many years old and are in need of modernisation too. Some of these systems need replacing totally, but others have intrinsic value, particularly those which are inherently batch orientated such as print runs, invoicing, etc. In practice those applications running on mainframes are in better shape than those on Unix, because batch processing was always well supported by efficient schedulers. On Unix systems there was an over reliance on time-sharing and Unix "shell" scripts. Indeed it is very welcoming to note the introduction of third party products such as Cybermation which provide operational management overseeing multiple platforms which will help enormously in the job of bringing older systems and new ones together.
The legacy batch systems can be easily exploited when mixed with newly developed applications, simply by using transaction messaging software to feed the existing batch input streams. The legacy interactive applications can also be exploited, but it not so straight forward. But since many of these systems are of enormous value to the business, particularly the mainframe based ones which exploit transaction processing monitors (CICS in most cases), there has been a lot of development of tools to help with the integration of the new with the old. E-commerce has been a big influence and the best products today are Application Servers using Java and J2EE in particular, such as WebLogic and WebSphere. Nevertheless the legacy systems are still of mixed value. The ones developed in a modular architecture are the most valuable, a lesson which developers of new applications should note.
However, while some valuable progress can be made in extracting further value from the mainframe type applications, there is a much bigger stumbling block to overcome. Unfortunately in more recent years a lot of business critical applications have been developed using the thick client architecture. The bulk of the application logic is executed in a desktop PC, with the database, enhanced by some stored procedures, on the server. This architecture was doomed from the start and only came about because developers had too little experience with building implementable, maintainable systems. The Visual Basic, Power Builder generation knew nothing of robust system design, had never heard of a TP Monitor, and basically didn’t know the difference between multiple single-user systems, e.g. e-mail, and multi-user systems, e.g. order processing. Older professionals, who should have known better, caved in and allowed the lure of the GUI interface (which they didn’t know anything about) to dominate. We completely missed the opportunity of building applications which exploited the best of both worlds, thin GUI clients and robust transaction processing servers. It took IBM for ever to provide a means for a Windows client to call the execution of a CICS transaction for instance, which simply excused the proliferation of bad design.
But there is now a worse problem. The thick client applications have been developed and implemented in pilot situations. It is always a surprise that it takes so long, but while everyone today is talking about Web enabled applications, the bulk of thick client applications are only now coming into play. And there is a whole host of problems piling up because these systems are failing to scale up. They are very difficult to install and even more difficult to maintain. As a result there is widespread user dissatisfaction, which leads to attempts to modify the code, which inevitably, because the architecture is unsuitable, merely introduces further problems.
Many organisations are turning to Citrix to solve this growing legacy problem. But while this is a good idea, it only makes maintenance easier. It does not solve the problem, it is still the same nightmare of the thick client application. Citrix confuse the issue by calling their product a "thin client", which it isn’t., it merely maps the Windows GUI interface across a network and no more. There is only one solution. Citrix can be used as a tool to buy time to redesign the application, throwing away the Visual Basic code as soon as possible. The same hardware can then be used to run the new thin client code when it has been developed.

 
Martin Healey, pioneer development Intel-based computers en c/s-architecture. Director of a number of IT specialist companies and an Emeritus Professor of the University of Wales.

Meer over

Legacy

Deel

    Inschrijven nieuwsbrief Computable

    Door te klikken op inschrijven geef je toestemming aan Jaarbeurs B.V. om je naam en e-mailadres te verwerken voor het verzenden van een of meer mailings namens Computable. Je kunt je toestemming te allen tijde intrekken via de af­meld­func­tie in de nieuwsbrief.
    Wil je weten hoe Jaarbeurs B.V. omgaat met jouw per­soons­ge­ge­vens? Klik dan hier voor ons privacy statement.

    Whitepapers

    Computable.nl

    Beveiliging begint bij de Server

    Waarom lifecycle-denken cruciaal is voor IT-security

    Computable.nl

    Bouw de AI-organisatie niet op los zand

    Wat is de afweging tussen zelf bouwen of het benutten van cloud?

    Computable.nl

    Slimme connectiviteit: de toekomst van bouwen

    Hoe stoom jij jouw organisatie in de bouw en installatie sector klaar voor de digitale toekomst?

    Meer lezen

    OpinieSecurity & Awareness

    Inzicht in kwetsbaarheden aanvalsoppervlak gaat voor budget

    AchtergrondCloud & Infrastructuur

    Eigen datacenter, colocatie of cloud?

    ActueelCloud & Infrastructuur

    Vier doden bij brand Egyptisch datacenter

    Start
    ActueelCloud & Infrastructuur

    Kort: Vergunning voor datacenter EvoSwitch, piepjonge Perry haalt 1,6 miljoen op (en meer)

    Filter
    OpinieCloud & Infrastructuur

    Ddos-aanvallen (en waarom L3-filtering niet optioneel is)

    Handen, samenwerken, fusie
    ActueelOverheid

    Meer regie en samenwerking bij digitalisering overheid

    Geef een reactie Reactie annuleren

    Je moet ingelogd zijn op om een reactie te plaatsen.

    Populaire berichten

    Meer artikelen

    Uitgelicht

    Partnerartikel
    AdvertorialInnovatie & Transformatie

    Ontdek de toekomst van IT-support en m...

    Op 16 september 2025 vindt in de Jaarbeurs in Utrecht een gloednieuw event plaats dat volledig is gericht op IT-professionals:...

    Meer persberichten

    Footer

    Direct naar

    • Carrièretests
    • Kennisbank
    • Planning
    • Computable Awards
    • Magazine
    • Abonneren Magazine
    • Cybersec e-Magazine
    • Topics

    Producten

    • Adverteren en meer…
    • Jouw Producten en Bedrijfsprofiel
    • Whitepapers & Leads
    • Vacatures & Employer Branding
    • Persberichten

    Contact

    • Colofon
    • Computable en de AVG
    • Service & contact
    • Inschrijven nieuwsbrief
    • Inlog

    Social

    • Facebook
    • X
    • LinkedIn
    • YouTube
    • Instagram
    © 2025 Jaarbeurs
    • Disclaimer
    • Gebruikersvoorwaarden
    • Privacy statement
    Computable.nl is een product van Jaarbeurs