SlideShare ist ein Scribd-Unternehmen logo
1 von 11
REGAINING
CONTROL OF
UNCONTROLLABLE
APPLICATIONS

UN

SUS

TAI
INTRODUCTION
The ever-growing cost to maintain systems continues to crush IT organizations
robbing their ability to fund innovation while increasing risks across the
organization. Legacy systems are difficult to modify due to the accumulation
of changes that erode the original design, lack of documentation or
obsolescence. While new systems are difficult to maintain as the organization
lose qualified staff, complex architectures are poorly documented, system
complexity grows out of control, and organization fail to adhere to best
92% of the cost of

practices.

an average application
occurs after the
project has finished
as "maintenance".

Regardless of how systems evolved getting them under control is critical
because reducing maintenance cost offers the largest and most immediate
opportunity to cut ADM spending.

- Gartner Research

Software Sustainability is the processes, procedures, people, materiel, and
information required to support, maintain, and operate the software aspects of a
system.
- Software Engineering Institute
IMPROVE SUSTAINABILITY
More sustainable
systems:
• Reduces enterprise
support costs
• Frees internal
resources from support
roles to capital projects
• Increases efficiency
of IT operations

Visibility into the structural quality and composition of these complex systems
provides a baseline understanding of its health, size, complexity and risks.
Performing a system audit or application assessment is easy but what do you
do once you have this insight?

Sometimes the best thing to do is simply monitor the key indicators of a system
as it may be the cheapest and most effective way to ensure that your team is

• Lowers rework rates

not eroding the health of the system further.

• Eases transition
between development
resources and vendors

Likewise, there may be quick wins that can immediately impact the cost and

• Makes systems easier
and faster to fix

effort to maintain these systems. The cost of maintaining a software system is
directly proportional to the size and complexity of the system. Therefore any
effort to reduce the size and complexity translates into direct improvement of
software maintenance cost. The following provides guidance on the actions
you may take to immediately improve the maintainability of systems.
ELIMINATE DEAD CODE
Knight Capital
Killed by Dead Code

Between 5-10% of legacy application source code is dead code. Dead code is
code that can never be executed in a running program. The surrounding code

"Most IT applications

makes it impossible for a section of code to ever be executed.

have dead code, it's in
there just hanging out in
the code base but none
of the live modules are

The impact of Dead Code:


Wastes computation time as its results are never used



Complicates deployment processes (e.g., Knight Capital had process to

calling it. If you don't

ensure dead code wasn‘t triggered… and they didn‘t follow the complete

have structural oversight

procedure)

then you don't know if



maintain

your new live code could
be calling the dead
code." In Knight's

Complicates maintenance as developers have more code to read and



Distorts program measurements as it artificially inflates the size of a system
– when measured by LOCs .

case, it was. The live
code called the dead

To improve readability and ensure that logic errors are resolved, dead code

code back to life and the

should be identified, understood, and eliminated. Removing such code shrinks

program started trading

program size, an important consideration in some contexts, especially where

on that.‖

DLLs or multiple excess executables have to be transported in memory
constrained devices.
http://www.sec.gov/litigation/admin/2013/34-70694.pdf
/** DOCUMENT CODE /*
Application maintenance accounts for +80% of the lifetime costs of an
application, so wasting half of this effort on just trying to understand
excessively complex code is an enormous part of the applications total cost of
Programmers who work on
applications with no documentation
spent 21.5% longer trying to
understanding the code base.

ownership.

The Impact of No or Poor Documentation


Counter acts developer skill. Good developers are less productive and

more likely to make mistakes in poor or undocumented systems.


Prevents transferability between development teams or vendors.



Increases the time for new hires to be able to understand the code base and
achieve productive levels of performance.



Increases the time to market of bug fixes or minor enhancements. This
delay in time to market has significant impact depending on the type of
application and industry.

47% of software maintenance
effort is spent understanding
existing codebase.

(*) Report from an experiment : impact of documentation on maintenance in Journal of empirical software engineering
Tryggeseth, Eirik, Kluwer Academic 2: 2, 201-207 1997 ISSN 1382-3256
(**) A Case Study on the Long-Term Effects of Software Redocumentation , ICSM, Proceedings of the 20th IEEE International Conference
on Software Maintenance, Alexander J. Rostkowycz , Vaclav Rajlich, Andrian Marcus, Wayne State University, Pages: 92 – 101, Year of
Publication: 2004
•Professor Mordecai Ben-Menachem, Tel Aviv University, 1999
IDENTIFY DUPLICATED CODECODE
Duplicated code is code that has been produced by copying and then adapting
existing code. Also known as ―copy-and-paste development‖, this strategy of
producing code is frequently employed as a way of reusing software.

The Impact of Duplicated Code


5-20% of typical business
systems source code
is duplicated.

Increases the time it takes for developers to get up to speed.



Impacts enhancements since similar changes must be made to all the

clones or the clones must consolidated into a single block before introducing
any changes.


Impacts your company‘s reputation due to update anomalies (e.g., a bug is
fixed in an update only to be rediscovered later by customers).



Increase the amount of test cases needed.

*A Survey on Software Clone Detection Research. Chanchal Kumar Roy and James R. Cordy. September, 2007.
CODECOMPLEXITYREDUCECODECOMPLEXITYREDU
CECODECOM
Empirical study suggests that high levels of software complexity account for
approximately 25% maintenance costs or more than 17% of total life-cycle
costs. The comprehensibility of most applications degrades exponentially as
new features are continually grafted on top of the existing code. This growing
complexity makes it difficult to transfer an application to a new outsourced
service provider without creating a huge learning curve that dilutes the
expected cost benefits. When these structural problems can be identified in

the code, the most severe ones can be remediated, reducing the wasteful time
required to understand the code and allowing new features to be delivered
more quickly.

Is your code base more
complex than 2 years
ago?

Much more
complex
14%

3%

About
the same

Much
complex

48%

35%

Source: Improving Software Quality to Drive Business Agility Melinda-Carol Ballou, IDC
PROACTIVE MONITORING
―The better quality
we can build into our
product, the less
maintenance we

The proactive monitoring of ADM output is the only way to a system is
becoming more maintainable, less complex and higher level structural quality.

Active monitoring helps:


have to do, and of
course, the more

Identify and remove dead code - Use analysis and measurement to remove
code and to monitor enhancements that may introduce new dead code.



Identify duplicated code - Specific segments of code with 3 or more clones

efficiency we can

should be considered for conversion into a reusable component (a

build into our

function, a service, an object, etc.).

software, the more
features and



Identify concentration of code complexity and distribute the complexity
across components



Generates complexity measures beyond Cyclomatic Complexity include

functionality can

algorithmic complexity, SQL complexity, 4GL complexity, OO

be built in.‖

complexity, Coupling (Fan in / fan out), and component size.


implementation of the source code.

Gene Baker,

Chief Architect Wells Fargo

Generates up-to-the-minute system blue prints from the actual



Teams improve code readability and transferability every time they touch the
code.



Prevents new defects being injected into code base.



Identify new code that fails to adhere to coding best practices
CASE STUDY
A clear

Although the notion that higher quality systems are easier to work with is rather
intuitive, it is often difficult to prove. Recently a CAST client analyzed more

correlation as the

than 350 applications in several industries and geographies and captured the

Technical Quality

relationship between the structural quality of the applications, as determined by

improves an

CAST‘s Technical Quality Index (TQI), and the volume of maintenance fix

organization‘s

ticket requests. The study tracked the overall health of the systems over a year

break/fix activity

against ticket volume per application and effort to fix defects. The results show

a clear and direct correlation— as the client improved the TQI one quarter of a
point, the organization‘s break/fix activity reduced by 50%. As a result, the
client was able to shift effort from reactive break/fix to higher value added
enhancement work.
3.6
Technical Quality Index (TQI)

reduces by 50%.

3.4
3.2
3

2.8
2.6
2.4

2.2
0

50

100

150

200

Ticket Volume

The CAST TQI is a composition index generated by structural quality analysis it is determined by the
number and type of critical violations and architectural vulnerabilities detected across technologies
and tiers. The index ranges from 1.0 to 4.0, where 4.0 is the best score.
SUMMARY
Whether you built

The application maintenance ‗death spiral‘ continues to consume more and

it, bought

more resources; critical resources that are needed in high value areas or

it, inherited it, or
found it you need to

missions.

Traditional application maintenance approaches focus on process drivers;

understand it and

however, ADM leaders must now consider the product itself and how it drives

control it.

sustainability. The path to regaining control of this maintenance challenge is

first through visibility then through governance that focuses on the end result
that is delivered to the business or customer—the product.

Effective governance requires that you perform the due diligence that a
software deliverable from internal or external sources is sufficient to meet the
needs of customers without exposing them to unacceptable risks and that it is
affordable – that it is on a financial path that is sustainable over its life cycle.

IT leaders need measures that track trends in the health of critical applications
their robustness, security, changeability, performance efficiency, and
transferability in order to know where they need to invest their resources to
sustain the level of service they provide to the business. These measures will
alert them to problem applications where they need to take management action
to reverse costly or risky trends in quality.
We make the
Invisible, Visible.

Weitere ähnliche Inhalte

Was ist angesagt?

Cast Application Intelligence Platform
Cast Application Intelligence PlatformCast Application Intelligence Platform
Cast Application Intelligence PlatformJohn Fotiadis ✔️
 
Whitepaper Omnext
Whitepaper OmnextWhitepaper Omnext
Whitepaper Omnextmeijerandre
 
Defect Prevention Based on 5 Dimensions of Defect Origin
Defect Prevention Based on 5 Dimensions of Defect OriginDefect Prevention Based on 5 Dimensions of Defect Origin
Defect Prevention Based on 5 Dimensions of Defect Originijseajournal
 
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTSSECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTSijseajournal
 
Rapid Portfolio Analysis powered by CAST Highlight
Rapid Portfolio Analysis powered by CAST HighlightRapid Portfolio Analysis powered by CAST Highlight
Rapid Portfolio Analysis powered by CAST HighlightCAST
 
Windows XP to Windows 7 Migration Whitepaper
Windows XP to Windows 7 Migration WhitepaperWindows XP to Windows 7 Migration Whitepaper
Windows XP to Windows 7 Migration WhitepaperLori Witzel
 
HIS 2017 Peter Ladkin- Rigorous-Assurance Points in Software Development
HIS 2017 Peter Ladkin-  Rigorous-Assurance Points in Software DevelopmentHIS 2017 Peter Ladkin-  Rigorous-Assurance Points in Software Development
HIS 2017 Peter Ladkin- Rigorous-Assurance Points in Software Developmentjamieayre
 
Software Architecture Erosion: Impacts, Causes, and Management
Software Architecture Erosion: Impacts, Causes, and ManagementSoftware Architecture Erosion: Impacts, Causes, and Management
Software Architecture Erosion: Impacts, Causes, and ManagementCSCJournals
 
Wait for it: identifying “On-Hold” self-admitted technical debt
Wait for it: identifying “On-Hold” self-admitted technical debtWait for it: identifying “On-Hold” self-admitted technical debt
Wait for it: identifying “On-Hold” self-admitted technical debtRungrojMaipradit1
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineeringJennifer Polack
 
Ian Sommerville, Software Engineering, 9th Edition Ch 4
Ian Sommerville,  Software Engineering, 9th Edition Ch 4Ian Sommerville,  Software Engineering, 9th Edition Ch 4
Ian Sommerville, Software Engineering, 9th Edition Ch 4Mohammed Romi
 
Software engineering lecture notes
Software engineering   lecture notesSoftware engineering   lecture notes
Software engineering lecture notesAmmar Shafiq
 
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORKPROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORKIJCSEA Journal
 

Was ist angesagt? (20)

Cast Application Intelligence Platform
Cast Application Intelligence PlatformCast Application Intelligence Platform
Cast Application Intelligence Platform
 
Whitepaper Omnext
Whitepaper OmnextWhitepaper Omnext
Whitepaper Omnext
 
PERIL LIBRARY
PERIL LIBRARYPERIL LIBRARY
PERIL LIBRARY
 
Defect Prevention Based on 5 Dimensions of Defect Origin
Defect Prevention Based on 5 Dimensions of Defect OriginDefect Prevention Based on 5 Dimensions of Defect Origin
Defect Prevention Based on 5 Dimensions of Defect Origin
 
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTSSECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
 
CAST HIGHLIGHT - Overview & Demos
CAST HIGHLIGHT - Overview & DemosCAST HIGHLIGHT - Overview & Demos
CAST HIGHLIGHT - Overview & Demos
 
Rapid Portfolio Analysis powered by CAST Highlight
Rapid Portfolio Analysis powered by CAST HighlightRapid Portfolio Analysis powered by CAST Highlight
Rapid Portfolio Analysis powered by CAST Highlight
 
Windows XP to Windows 7 Migration Whitepaper
Windows XP to Windows 7 Migration WhitepaperWindows XP to Windows 7 Migration Whitepaper
Windows XP to Windows 7 Migration Whitepaper
 
05 extended report
05 extended report05 extended report
05 extended report
 
factors
 factors factors
factors
 
HIS 2017 Peter Ladkin- Rigorous-Assurance Points in Software Development
HIS 2017 Peter Ladkin-  Rigorous-Assurance Points in Software DevelopmentHIS 2017 Peter Ladkin-  Rigorous-Assurance Points in Software Development
HIS 2017 Peter Ladkin- Rigorous-Assurance Points in Software Development
 
Software Architecture Erosion: Impacts, Causes, and Management
Software Architecture Erosion: Impacts, Causes, and ManagementSoftware Architecture Erosion: Impacts, Causes, and Management
Software Architecture Erosion: Impacts, Causes, and Management
 
Wait for it: identifying “On-Hold” self-admitted technical debt
Wait for it: identifying “On-Hold” self-admitted technical debtWait for it: identifying “On-Hold” self-admitted technical debt
Wait for it: identifying “On-Hold” self-admitted technical debt
 
Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineering
 
Lecture1422914635
Lecture1422914635Lecture1422914635
Lecture1422914635
 
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGESCLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
 
Ian Sommerville, Software Engineering, 9th Edition Ch 4
Ian Sommerville,  Software Engineering, 9th Edition Ch 4Ian Sommerville,  Software Engineering, 9th Edition Ch 4
Ian Sommerville, Software Engineering, 9th Edition Ch 4
 
Software engineering lecture notes
Software engineering   lecture notesSoftware engineering   lecture notes
Software engineering lecture notes
 
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORKPROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
 
Agile software process
Agile software processAgile software process
Agile software process
 

Ähnlich wie Unsustainable Regaining Control of Uncontrollable Apps

How to save on software maintenance costs
How to save on software maintenance costsHow to save on software maintenance costs
How to save on software maintenance costsFrancisJansen
 
Managing Software Risk with CAST
Managing Software Risk with CASTManaging Software Risk with CAST
Managing Software Risk with CASTCAST
 
Intro softwareeng
Intro softwareengIntro softwareeng
Intro softwareengPINKU29
 
Model driven process for real time embedded
Model driven process for real time embeddedModel driven process for real time embedded
Model driven process for real time embeddedcaijjournal
 
CAST for Vendor Monitoring and Control
CAST for Vendor Monitoring and ControlCAST for Vendor Monitoring and Control
CAST for Vendor Monitoring and ControlCAST
 
IRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software DesignIRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software DesignIRJET Journal
 
Elements of legacy program complexity
Elements of legacy program complexityElements of legacy program complexity
Elements of legacy program complexityeSAT Journals
 
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)CISQ - Consortium for IT Software Quality
 
Embedded software static analysis_Polyspace-WhitePaper_final
Embedded software static analysis_Polyspace-WhitePaper_finalEmbedded software static analysis_Polyspace-WhitePaper_final
Embedded software static analysis_Polyspace-WhitePaper_finalTAMILMARAN C
 
Leveraging Cloud for Non-Production Environments
Leveraging Cloud for Non-Production EnvironmentsLeveraging Cloud for Non-Production Environments
Leveraging Cloud for Non-Production EnvironmentsCognizant
 
IRJET- Development Operations for Continuous Delivery
IRJET- Development Operations for Continuous DeliveryIRJET- Development Operations for Continuous Delivery
IRJET- Development Operations for Continuous DeliveryIRJET Journal
 
3784_Streamlining_the_development_process_with_feature_flighting_and_Azure_cl...
3784_Streamlining_the_development_process_with_feature_flighting_and_Azure_cl...3784_Streamlining_the_development_process_with_feature_flighting_and_Azure_cl...
3784_Streamlining_the_development_process_with_feature_flighting_and_Azure_cl...Crystal Thomas
 
CAST Imaging: Map & Master Your Software
CAST Imaging: Map & Master Your SoftwareCAST Imaging: Map & Master Your Software
CAST Imaging: Map & Master Your SoftwareNeo4j
 
Clone of an organization
Clone of an organizationClone of an organization
Clone of an organizationIRJET Journal
 
Software process methodologies and a comparative study of various models
Software process methodologies and a comparative study of various modelsSoftware process methodologies and a comparative study of various models
Software process methodologies and a comparative study of various modelsiaemedu
 
software engineering
software engineeringsoftware engineering
software engineeringsubhakirthi
 
STRATEGIES TO REDUCE REWORK IN SOFTWARE DEVELOPMENT ON AN ORGANISATION IN MAU...
STRATEGIES TO REDUCE REWORK IN SOFTWARE DEVELOPMENT ON AN ORGANISATION IN MAU...STRATEGIES TO REDUCE REWORK IN SOFTWARE DEVELOPMENT ON AN ORGANISATION IN MAU...
STRATEGIES TO REDUCE REWORK IN SOFTWARE DEVELOPMENT ON AN ORGANISATION IN MAU...ijseajournal
 

Ähnlich wie Unsustainable Regaining Control of Uncontrollable Apps (20)

G213538
G213538G213538
G213538
 
How to save on software maintenance costs
How to save on software maintenance costsHow to save on software maintenance costs
How to save on software maintenance costs
 
Managing Software Risk with CAST
Managing Software Risk with CASTManaging Software Risk with CAST
Managing Software Risk with CAST
 
Intro softwareeng
Intro softwareengIntro softwareeng
Intro softwareeng
 
Model driven process for real time embedded
Model driven process for real time embeddedModel driven process for real time embedded
Model driven process for real time embedded
 
Intro
IntroIntro
Intro
 
CAST for Vendor Monitoring and Control
CAST for Vendor Monitoring and ControlCAST for Vendor Monitoring and Control
CAST for Vendor Monitoring and Control
 
IRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software DesignIRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software Design
 
Elements of legacy program complexity
Elements of legacy program complexityElements of legacy program complexity
Elements of legacy program complexity
 
69 AGARAM Venkatesh
69 AGARAM Venkatesh69 AGARAM Venkatesh
69 AGARAM Venkatesh
 
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
 
Embedded software static analysis_Polyspace-WhitePaper_final
Embedded software static analysis_Polyspace-WhitePaper_finalEmbedded software static analysis_Polyspace-WhitePaper_final
Embedded software static analysis_Polyspace-WhitePaper_final
 
Leveraging Cloud for Non-Production Environments
Leveraging Cloud for Non-Production EnvironmentsLeveraging Cloud for Non-Production Environments
Leveraging Cloud for Non-Production Environments
 
IRJET- Development Operations for Continuous Delivery
IRJET- Development Operations for Continuous DeliveryIRJET- Development Operations for Continuous Delivery
IRJET- Development Operations for Continuous Delivery
 
3784_Streamlining_the_development_process_with_feature_flighting_and_Azure_cl...
3784_Streamlining_the_development_process_with_feature_flighting_and_Azure_cl...3784_Streamlining_the_development_process_with_feature_flighting_and_Azure_cl...
3784_Streamlining_the_development_process_with_feature_flighting_and_Azure_cl...
 
CAST Imaging: Map & Master Your Software
CAST Imaging: Map & Master Your SoftwareCAST Imaging: Map & Master Your Software
CAST Imaging: Map & Master Your Software
 
Clone of an organization
Clone of an organizationClone of an organization
Clone of an organization
 
Software process methodologies and a comparative study of various models
Software process methodologies and a comparative study of various modelsSoftware process methodologies and a comparative study of various models
Software process methodologies and a comparative study of various models
 
software engineering
software engineeringsoftware engineering
software engineering
 
STRATEGIES TO REDUCE REWORK IN SOFTWARE DEVELOPMENT ON AN ORGANISATION IN MAU...
STRATEGIES TO REDUCE REWORK IN SOFTWARE DEVELOPMENT ON AN ORGANISATION IN MAU...STRATEGIES TO REDUCE REWORK IN SOFTWARE DEVELOPMENT ON AN ORGANISATION IN MAU...
STRATEGIES TO REDUCE REWORK IN SOFTWARE DEVELOPMENT ON AN ORGANISATION IN MAU...
 

Mehr von CAST

Six steps-to-enhance-performance-of-critical-systems
Six steps-to-enhance-performance-of-critical-systemsSix steps-to-enhance-performance-of-critical-systems
Six steps-to-enhance-performance-of-critical-systemsCAST
 
Application Performance: 6 Steps to Enhance Performance of Critical Systems
Application Performance: 6 Steps to Enhance Performance of Critical SystemsApplication Performance: 6 Steps to Enhance Performance of Critical Systems
Application Performance: 6 Steps to Enhance Performance of Critical SystemsCAST
 
Application Assessment - Executive Summary Report
Application Assessment - Executive Summary ReportApplication Assessment - Executive Summary Report
Application Assessment - Executive Summary ReportCAST
 
Cloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST HighlightCloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST HighlightCAST
 
Cloud Readiness : CAST & Microsoft Azure Partnership Overview
Cloud Readiness : CAST & Microsoft Azure Partnership OverviewCloud Readiness : CAST & Microsoft Azure Partnership Overview
Cloud Readiness : CAST & Microsoft Azure Partnership OverviewCAST
 
Cloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCAST
 
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...CAST
 
Why computers will never be safe
Why computers will never be safeWhy computers will never be safe
Why computers will never be safeCAST
 
Green indexes used in CAST to measure the energy consumption in code
Green indexes used in CAST to measure the energy consumption in codeGreen indexes used in CAST to measure the energy consumption in code
Green indexes used in CAST to measure the energy consumption in codeCAST
 
9 Steps to Creating ADM Budgets
9 Steps to Creating ADM Budgets9 Steps to Creating ADM Budgets
9 Steps to Creating ADM BudgetsCAST
 
Improving ADM Vendor Relationship through Outcome Based Contracts
Improving ADM Vendor Relationship through Outcome Based ContractsImproving ADM Vendor Relationship through Outcome Based Contracts
Improving ADM Vendor Relationship through Outcome Based ContractsCAST
 
Drive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
Drive Business Excellence with Outcomes-Based Contracting: The OBC ToolkitDrive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
Drive Business Excellence with Outcomes-Based Contracting: The OBC ToolkitCAST
 
CAST Highlight: Code-level portfolio analysis. FAST.
CAST Highlight: Code-level portfolio analysis. FAST.CAST Highlight: Code-level portfolio analysis. FAST.
CAST Highlight: Code-level portfolio analysis. FAST.CAST
 
Shifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business OutcomesShifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business OutcomesCAST
 
Applying Software Quality Models to Software Security
Applying Software Quality Models to Software SecurityApplying Software Quality Models to Software Security
Applying Software Quality Models to Software SecurityCAST
 
The business case for software analysis & measurement
The business case for software analysis & measurementThe business case for software analysis & measurement
The business case for software analysis & measurementCAST
 
Cast Highlight Software Maintenance Infographic
Cast Highlight Software Maintenance InfographicCast Highlight Software Maintenance Infographic
Cast Highlight Software Maintenance InfographicCAST
 
What is system level analysis
What is system level analysisWhat is system level analysis
What is system level analysisCAST
 
Deloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical DebtDeloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical DebtCAST
 
What you should know about software measurement platforms
What you should know about software measurement platformsWhat you should know about software measurement platforms
What you should know about software measurement platformsCAST
 

Mehr von CAST (20)

Six steps-to-enhance-performance-of-critical-systems
Six steps-to-enhance-performance-of-critical-systemsSix steps-to-enhance-performance-of-critical-systems
Six steps-to-enhance-performance-of-critical-systems
 
Application Performance: 6 Steps to Enhance Performance of Critical Systems
Application Performance: 6 Steps to Enhance Performance of Critical SystemsApplication Performance: 6 Steps to Enhance Performance of Critical Systems
Application Performance: 6 Steps to Enhance Performance of Critical Systems
 
Application Assessment - Executive Summary Report
Application Assessment - Executive Summary ReportApplication Assessment - Executive Summary Report
Application Assessment - Executive Summary Report
 
Cloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST HighlightCloud Migration: Azure acceleration with CAST Highlight
Cloud Migration: Azure acceleration with CAST Highlight
 
Cloud Readiness : CAST & Microsoft Azure Partnership Overview
Cloud Readiness : CAST & Microsoft Azure Partnership OverviewCloud Readiness : CAST & Microsoft Azure Partnership Overview
Cloud Readiness : CAST & Microsoft Azure Partnership Overview
 
Cloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case Study
 
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
Digital Transformation e-book: Taking the 20X20n approach to accelerating Dig...
 
Why computers will never be safe
Why computers will never be safeWhy computers will never be safe
Why computers will never be safe
 
Green indexes used in CAST to measure the energy consumption in code
Green indexes used in CAST to measure the energy consumption in codeGreen indexes used in CAST to measure the energy consumption in code
Green indexes used in CAST to measure the energy consumption in code
 
9 Steps to Creating ADM Budgets
9 Steps to Creating ADM Budgets9 Steps to Creating ADM Budgets
9 Steps to Creating ADM Budgets
 
Improving ADM Vendor Relationship through Outcome Based Contracts
Improving ADM Vendor Relationship through Outcome Based ContractsImproving ADM Vendor Relationship through Outcome Based Contracts
Improving ADM Vendor Relationship through Outcome Based Contracts
 
Drive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
Drive Business Excellence with Outcomes-Based Contracting: The OBC ToolkitDrive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
Drive Business Excellence with Outcomes-Based Contracting: The OBC Toolkit
 
CAST Highlight: Code-level portfolio analysis. FAST.
CAST Highlight: Code-level portfolio analysis. FAST.CAST Highlight: Code-level portfolio analysis. FAST.
CAST Highlight: Code-level portfolio analysis. FAST.
 
Shifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business OutcomesShifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business Outcomes
 
Applying Software Quality Models to Software Security
Applying Software Quality Models to Software SecurityApplying Software Quality Models to Software Security
Applying Software Quality Models to Software Security
 
The business case for software analysis & measurement
The business case for software analysis & measurementThe business case for software analysis & measurement
The business case for software analysis & measurement
 
Cast Highlight Software Maintenance Infographic
Cast Highlight Software Maintenance InfographicCast Highlight Software Maintenance Infographic
Cast Highlight Software Maintenance Infographic
 
What is system level analysis
What is system level analysisWhat is system level analysis
What is system level analysis
 
Deloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical DebtDeloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical Debt
 
What you should know about software measurement platforms
What you should know about software measurement platformsWhat you should know about software measurement platforms
What you should know about software measurement platforms
 

Kürzlich hochgeladen

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Kürzlich hochgeladen (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Unsustainable Regaining Control of Uncontrollable Apps

  • 2. INTRODUCTION The ever-growing cost to maintain systems continues to crush IT organizations robbing their ability to fund innovation while increasing risks across the organization. Legacy systems are difficult to modify due to the accumulation of changes that erode the original design, lack of documentation or obsolescence. While new systems are difficult to maintain as the organization lose qualified staff, complex architectures are poorly documented, system complexity grows out of control, and organization fail to adhere to best 92% of the cost of practices. an average application occurs after the project has finished as "maintenance". Regardless of how systems evolved getting them under control is critical because reducing maintenance cost offers the largest and most immediate opportunity to cut ADM spending. - Gartner Research Software Sustainability is the processes, procedures, people, materiel, and information required to support, maintain, and operate the software aspects of a system. - Software Engineering Institute
  • 3. IMPROVE SUSTAINABILITY More sustainable systems: • Reduces enterprise support costs • Frees internal resources from support roles to capital projects • Increases efficiency of IT operations Visibility into the structural quality and composition of these complex systems provides a baseline understanding of its health, size, complexity and risks. Performing a system audit or application assessment is easy but what do you do once you have this insight? Sometimes the best thing to do is simply monitor the key indicators of a system as it may be the cheapest and most effective way to ensure that your team is • Lowers rework rates not eroding the health of the system further. • Eases transition between development resources and vendors Likewise, there may be quick wins that can immediately impact the cost and • Makes systems easier and faster to fix effort to maintain these systems. The cost of maintaining a software system is directly proportional to the size and complexity of the system. Therefore any effort to reduce the size and complexity translates into direct improvement of software maintenance cost. The following provides guidance on the actions you may take to immediately improve the maintainability of systems.
  • 4. ELIMINATE DEAD CODE Knight Capital Killed by Dead Code Between 5-10% of legacy application source code is dead code. Dead code is code that can never be executed in a running program. The surrounding code "Most IT applications makes it impossible for a section of code to ever be executed. have dead code, it's in there just hanging out in the code base but none of the live modules are The impact of Dead Code:  Wastes computation time as its results are never used  Complicates deployment processes (e.g., Knight Capital had process to calling it. If you don't ensure dead code wasn‘t triggered… and they didn‘t follow the complete have structural oversight procedure) then you don't know if  maintain your new live code could be calling the dead code." In Knight's Complicates maintenance as developers have more code to read and  Distorts program measurements as it artificially inflates the size of a system – when measured by LOCs . case, it was. The live code called the dead To improve readability and ensure that logic errors are resolved, dead code code back to life and the should be identified, understood, and eliminated. Removing such code shrinks program started trading program size, an important consideration in some contexts, especially where on that.‖ DLLs or multiple excess executables have to be transported in memory constrained devices. http://www.sec.gov/litigation/admin/2013/34-70694.pdf
  • 5. /** DOCUMENT CODE /* Application maintenance accounts for +80% of the lifetime costs of an application, so wasting half of this effort on just trying to understand excessively complex code is an enormous part of the applications total cost of Programmers who work on applications with no documentation spent 21.5% longer trying to understanding the code base. ownership. The Impact of No or Poor Documentation  Counter acts developer skill. Good developers are less productive and more likely to make mistakes in poor or undocumented systems.  Prevents transferability between development teams or vendors.  Increases the time for new hires to be able to understand the code base and achieve productive levels of performance.  Increases the time to market of bug fixes or minor enhancements. This delay in time to market has significant impact depending on the type of application and industry. 47% of software maintenance effort is spent understanding existing codebase. (*) Report from an experiment : impact of documentation on maintenance in Journal of empirical software engineering Tryggeseth, Eirik, Kluwer Academic 2: 2, 201-207 1997 ISSN 1382-3256 (**) A Case Study on the Long-Term Effects of Software Redocumentation , ICSM, Proceedings of the 20th IEEE International Conference on Software Maintenance, Alexander J. Rostkowycz , Vaclav Rajlich, Andrian Marcus, Wayne State University, Pages: 92 – 101, Year of Publication: 2004 •Professor Mordecai Ben-Menachem, Tel Aviv University, 1999
  • 6. IDENTIFY DUPLICATED CODECODE Duplicated code is code that has been produced by copying and then adapting existing code. Also known as ―copy-and-paste development‖, this strategy of producing code is frequently employed as a way of reusing software. The Impact of Duplicated Code  5-20% of typical business systems source code is duplicated. Increases the time it takes for developers to get up to speed.  Impacts enhancements since similar changes must be made to all the clones or the clones must consolidated into a single block before introducing any changes.  Impacts your company‘s reputation due to update anomalies (e.g., a bug is fixed in an update only to be rediscovered later by customers).  Increase the amount of test cases needed. *A Survey on Software Clone Detection Research. Chanchal Kumar Roy and James R. Cordy. September, 2007.
  • 7. CODECOMPLEXITYREDUCECODECOMPLEXITYREDU CECODECOM Empirical study suggests that high levels of software complexity account for approximately 25% maintenance costs or more than 17% of total life-cycle costs. The comprehensibility of most applications degrades exponentially as new features are continually grafted on top of the existing code. This growing complexity makes it difficult to transfer an application to a new outsourced service provider without creating a huge learning curve that dilutes the expected cost benefits. When these structural problems can be identified in the code, the most severe ones can be remediated, reducing the wasteful time required to understand the code and allowing new features to be delivered more quickly. Is your code base more complex than 2 years ago? Much more complex 14% 3% About the same Much complex 48% 35% Source: Improving Software Quality to Drive Business Agility Melinda-Carol Ballou, IDC
  • 8. PROACTIVE MONITORING ―The better quality we can build into our product, the less maintenance we The proactive monitoring of ADM output is the only way to a system is becoming more maintainable, less complex and higher level structural quality. Active monitoring helps:  have to do, and of course, the more Identify and remove dead code - Use analysis and measurement to remove code and to monitor enhancements that may introduce new dead code.  Identify duplicated code - Specific segments of code with 3 or more clones efficiency we can should be considered for conversion into a reusable component (a build into our function, a service, an object, etc.). software, the more features and  Identify concentration of code complexity and distribute the complexity across components  Generates complexity measures beyond Cyclomatic Complexity include functionality can algorithmic complexity, SQL complexity, 4GL complexity, OO be built in.‖ complexity, Coupling (Fan in / fan out), and component size.  implementation of the source code. Gene Baker, Chief Architect Wells Fargo Generates up-to-the-minute system blue prints from the actual  Teams improve code readability and transferability every time they touch the code.  Prevents new defects being injected into code base.  Identify new code that fails to adhere to coding best practices
  • 9. CASE STUDY A clear Although the notion that higher quality systems are easier to work with is rather intuitive, it is often difficult to prove. Recently a CAST client analyzed more correlation as the than 350 applications in several industries and geographies and captured the Technical Quality relationship between the structural quality of the applications, as determined by improves an CAST‘s Technical Quality Index (TQI), and the volume of maintenance fix organization‘s ticket requests. The study tracked the overall health of the systems over a year break/fix activity against ticket volume per application and effort to fix defects. The results show a clear and direct correlation— as the client improved the TQI one quarter of a point, the organization‘s break/fix activity reduced by 50%. As a result, the client was able to shift effort from reactive break/fix to higher value added enhancement work. 3.6 Technical Quality Index (TQI) reduces by 50%. 3.4 3.2 3 2.8 2.6 2.4 2.2 0 50 100 150 200 Ticket Volume The CAST TQI is a composition index generated by structural quality analysis it is determined by the number and type of critical violations and architectural vulnerabilities detected across technologies and tiers. The index ranges from 1.0 to 4.0, where 4.0 is the best score.
  • 10. SUMMARY Whether you built The application maintenance ‗death spiral‘ continues to consume more and it, bought more resources; critical resources that are needed in high value areas or it, inherited it, or found it you need to missions. Traditional application maintenance approaches focus on process drivers; understand it and however, ADM leaders must now consider the product itself and how it drives control it. sustainability. The path to regaining control of this maintenance challenge is first through visibility then through governance that focuses on the end result that is delivered to the business or customer—the product. Effective governance requires that you perform the due diligence that a software deliverable from internal or external sources is sufficient to meet the needs of customers without exposing them to unacceptable risks and that it is affordable – that it is on a financial path that is sustainable over its life cycle. IT leaders need measures that track trends in the health of critical applications their robustness, security, changeability, performance efficiency, and transferability in order to know where they need to invest their resources to sustain the level of service they provide to the business. These measures will alert them to problem applications where they need to take management action to reverse costly or risky trends in quality.