Computable.nl
  • Thema’s
    • Carrière
    • Innovatie & Transformatie
    • Cloud & Infrastructuur
    • Data & AI
    • Governance & Privacy
    • Security & Awareness
    • Software & Development
    • Werkplek & Beheer
  • Sectoren
    • Channel
    • Financiële dienstverlening
    • Logistiek
    • Onderwijs
    • Overheid
    • Zorg
  • Awards
    • Overzicht
    • Nieuws
    • Winnaars
    • Partner worden
  • Vacatures
    • Vacatures bekijken
    • Vacatures plaatsen
  • Bedrijven
    • Profielen
    • Producten & Diensten
  • Kennisbank
  • Magazine
  • Nieuwsbrief

Extracting re-useable components from legacy

26 oktober 2000 - 22:004 minuten leestijdOpinieSoftware & Development
Martin Healey
Martin Healey

The problem with integrating legacy systems into new applications is identifying what is worth integrating with. This is both a problem from the business perspective and the technical one. Indeed the problem may well be one of over expectation since business analysts may well find it difficult to understand that there are significant technical problems to be overcome.

In order to integrate a legacy application it is necessary to identify the functions to be "re-used". It is then required to isolate the code which implements these functions and finally some method must be found to expose this code so that the new application at the front end can call its execution. There is also a technical problem of interconnecting the new systems with the old, which requires significant skills in communication networks and the associated software. The "legacy" problems may well involve different operating systems and network hardware and protocols. Many organisations already have this level of skills, derived from experience with interconnecting PC networks with older systems, but it is going to be a problem for some organisations.
The re-useable functions in the legacy code are different from the business functions, although they are strongly related. An application will perform a set of specific business functions, but these are made up inside the software of combinations of smaller units of code. These modules of code are not so easily identified with business functions. In an ideal world all the code modules would be well documented and hence it should in theory be relatively easy to work out how to use them in the new applications. Unfortunately this is not often the case. It is not sufficient to know vaguely what is available, it is essential to know exactly what all code modules do!
The ease with which code modules can be identified, documented and extracted is influenced by how the code has been created initially and maintained since. If design tools had been used it would be a huge advantage, but this is not common. In any case a large percentage of applications are packages, old ones at that, and there is little chance of modularising them. It would be a good opportunity for vendors of application packages to provide upgrades which include modularisation but most have the same problems with their code as do in-house developers!
The objective must be to identify the elemental modules in the legacy code and then to modify the code to create a set of documented, re-useable components. Systems built with a TP monitor (CICS applications in particular) will be much easier to modularise than code written for a time-shared environment such as Unix. Conversely the Unix applications will be newer and should be in a better state. In any case it is common that transaction modules such as CICS routines are (because of historic performance problems) very large. Thus while the code is being modularised, it is essential to try to break large modules into a number of smaller ones. It is probably worth investing in maintenance tools which will help to break code up into smaller modules while checking for logical consistency. Such tools are always better for Cobol source code than other languages in practice. These tools are expensive but nevertheless should be good value for money.
Finally a method must be implemented to enable the new re-useable code modules to be executed by calls from the Application Server. Again if a TP monitor has been used on the legacy side it will provide a remote call facility, but otherwise proprietary solutions will be invoked such as ODBC and variants. There are a number of specialised middleware products available to provide various flavours of remote procedure calls. In many cases it is worth investigating transaction messaging based solutions as well as interactive interfaces.
While the interfaces to the internal code modules of most legacy applications are not exposed, most will have a terminal interface. This is relatively easy to interface to and does not need any modification to the legacy code. Because it accesses the legacy system at a high level, rather than at the component level, it is not as powerful but it is well worth keeping in mind, even if only as a transient solution. Modern "screen-scrapping" products will support Windows GUI interfaces (Windows Terminal Server) as well as ASCII, 3270 and 5250 terminals.

Meer over

Legacy

Deel

    Inschrijven nieuwsbrief Computable

    Door te klikken op inschrijven geef je toestemming aan Jaarbeurs B.V. om je naam en e-mailadres te verwerken voor het verzenden van een of meer mailings namens Computable. Je kunt je toestemming te allen tijde intrekken via de af­meld­func­tie in de nieuwsbrief.
    Wil je weten hoe Jaarbeurs B.V. omgaat met jouw per­soons­ge­ge­vens? Klik dan hier voor ons privacy statement.

    Whitepapers

    Computable.nl

    Agentic AI in actie

    De stappen van automatiseren naar écht autonoom werken. Welke toepassingen zijn succesvol?

    Computable.nl

    Staat Digitale Connectiviteit Bouw- en Installatiebranche

    Connectiviteit is de kern van veel processen en van strategisch belang voor de toekomst. Waar sta jij?

    Computable.nl

    Design Sprints: 4 dagen van idee naar prototype

    Hoe zet je in vier dagen tijd een gevalideerd prototype neer met Design Sprints?

    Geef een reactie Reactie annuleren

    Je moet ingelogd zijn op om een reactie te plaatsen.

    Populaire berichten

    Meer artikelen

    Uitgelicht

    Partnerartikel
    AdvertorialSecurity & Awareness

    Cybersec Netherlands 2025 – Programma...

    Keynotes over cloud, AI en geopolitiek: het programma van Cybersec Netherlands raakt de kern van digitale weerbaarheid

    Meer persberichten

    Meer lezen

    lek muur dam
    ActueelSecurity & Awareness

    Kort: Claude onthoudt langer, lekken groter, de omgekeerde ai-generatiekloof  (en meer)

    ai ontslag banen
    ActueelData & AI

    Kort: China hackt ook Nederland, Moskou beheert Node.js-hulpprogramma, Nvidia groeit hard (en meer)

    AchtergrondCarrière

    Willem van der Poel – Een avonturier in de techniek

    ActueelData & AI

    Ai maakt populaire programmeertalen nog populairder

    OpinieData & AI

    Van opensource naar ‘open washing’: waarom bedrijven nu misbruik maken van vertrouwen in licenties

    ActueelCloud & Infrastructuur

    Kingston University organiseert expositie gaming-geschiedenis

    ...

    Footer

    Direct naar

    • Carrièretests
    • Kennisbank
    • Planning
    • Computable Awards
    • Magazine
    • Abonneren Magazine
    • Cybersec e-Magazine
    • Topics
    • – Phishing
    • – Ransomware

    Producten

    • Adverteren en meer…
    • Jouw Producten en Bedrijfsprofiel
    • Whitepapers & Leads
    • Vacatures & Employer Branding
    • Persberichten

    Contact

    • Colofon
    • Computable en de AVG
    • Service & contact
    • Inschrijven nieuwsbrief
    • Inlog

    Social

    • Facebook
    • X
    • LinkedIn
    • YouTube
    • Instagram
    © 2025 Jaarbeurs
    • Disclaimer
    • Gebruikersvoorwaarden
    • Privacy statement
    Computable.nl is een product van Jaarbeurs