SlideShare ist ein Scribd-Unternehmen logo
1 von 12
www.redpilldevelopment.comlearn. do. dream.
Underneath the hood of
Asymmetric Modernization
www.redpilldevelopment.comlearn. do. dream.
Goal
The goal of asymmetric modernization is to establish a
process for modernizing applications that scales for large
portfolios of applications.
To do this we must recognize that modernization is a
journey and not a destination. It is therefore essential that
new “modern” capabilities can be continually added to an
application portfolio in a way that does not require changes
being made on an application-by-applications basis.
Note: This process is not specific to Notes applications but is particularly well
suited to the Notes platform because of the large number of Notes applications
found in many organizations (200 on average).
www.redpilldevelopment.comlearn. do. dream.
Approaches
Migration
The focus is on achieving a platform
change. This is an internal IT focus as users
typically do not care about the underlying
platform, but rather what it delivers.
Modernization
Focuses on delivering modern capabilities
to existing applications. The ability to
deliver this functionality is more important
than the platform used. This is usually a
customer-focused initiative.
Traditional Modernization
Analysts/developers build an understanding of
an existing application and use that
understanding to develop a new application
on the target platform.
Skilled analysts/developers and development
frameworks are important.
Automated Modernization
Automated tooling scans the code of the
existing application and uses that
understanding to generate new code.
Developers are usually needed to complete
the work which requires them to still build an
understanding of the application.
Skilled developers (but less of them) are
required along with a good set of automated
tools.
Asymmetric Modernization
Code and data forensics builds an
understanding of each application and from
this understanding a new, modern, interface
is provided.
Good forensics is needed along with a
sophisticated meta-driven UI. There is a higher
fixed cost to develop/acquire the technology
but a much lower variable cost for each
application
www.redpilldevelopment.comlearn. do. dream.
www.redpilldevelopment.comlearn. do. dream.
ExtendvReplace
Leaving the existing application (and associated)
data intact is a key requirement for Asymmetric
Modernization. Replacing an application
requires a cutover from the “old” to the “new”.
Extending an application allows the “old” to
continue operation while the “new” evolves.
With the original application still available for
use new capabilities can be delivered in a staged
approach until there is no longer a need for the
old. In many cases a lot of the functionality in
the original application is never requested
reducing the cost, time, and risk.
It is usually possible to meet the business needs
of 80% of the existing platform for 20% of the
cost. Having a strategy that provides an
alternative to spending the remaining 80% can
be the difference in the success or failure of the
project.
www.redpilldevelopment.comlearn. do. dream.
Code&DataForensics Analysis of code helps to provide an
understanding of what the developer thought
an application should do. Analysis of data helps
provide an understanding of how the
application is actually being used. Combining
both code and data forensics provides a more
complete picture about the true nature of an
application.
Automating the forensics process allows 100s
or 1,000s of applications to be quickly analyzed.
While not a requirement, it is often a good idea
to take advantage of the unique capabilities of
graph databases to store the large volume of
data associated with representing the forensics
results a large application portfolio.
During the course of a large modernization
project is is common for the existing
applications to change. The forensics process
must therefore be designed to run on a regular
basis to reflect the changes that occur until the
project is completed.
www.redpilldevelopment.comlearn. do. dream.
Meta-DataDrivenUI The asymmetric approach not only has the ability to dramatically reduce
the cost of modernizing an application portfolio it also can result in large
numbers of modernized applications being delivered within a few days or
weeks of the project starting. This is achieved by developing a user
interface that is driven by the the meta-data collected during the forensics
phase.
The goal of this modernization layer is to remove many design decisions
from individual applications applications and consolidate them into a
single “application”. As UI standards evolve over time this modernization
layer also evolves ensuring applications are always being presented with a
fresh “modern” interpretation of the underlying data. E.g. It is now
expected that addresses are integrated with a mapping application, names
are integrated with contact details and (on a smartphone) telephone
numbers are linked to the phone application.
It is unlikely that the computer-based guessing of UI needs will be perfect
for every application but it can result in the rapid delivery of mobile
interfaces or responsive web interfaces for thick client applications that
meet many of the needs of existing application users. The extend over
replace approach ensures the original application remains available to fill
any initial gap in functionality provided via the meta-data.
An administration tool to over-ride the meta-data generated by the
forensics allows comprehensive fine-tuning of the resulting applications in
a matter of minutes. Because much of the application functionality is now
represented as meta-data it is possible to implement changes to the
application without the need for changes to the original code.
www.redpilldevelopment.comlearn. do. dream.
CoreCapabilities A lot of the functionality required for an application
is not unique to a single application. Examples
include comments, keywords, export, print to PDF,
like, share, author profiling, contact integration,
integrated messaging. We refer to these as core
capabilities.
Rather than build those capabilities into each
application, an application framework is established
that allows the core capabilities to be made
available to all applications. Where needed the
ability can be added to customize which core
capabilities are made available (e.g. an application
containing confidential data may not benefit from
having an export feature).
The modernization process involves meeting user
expectations for quickly adding new core
capabilities to each application. In the past this may
require each application to be redeveloped, tested,
and deployed. This is an expensive and time-
consuming process. With asymmetric modernization
the core capability is developed once and then
automatically added to all applications in a manner
very similar to that found in cloud-base platforms.
www.redpilldevelopment.comlearn. do. dream.
CodedCustomization
While meta-data can go a long way to delivering a modern interpretation of the UI for aging applications there is always
going to be applications whose complexity goes beyond that which can be easily understood by forensics scans and/or
replicated in a meta-data (only) driven UI. The ability to integrated code with the meta-data UI becomes a must for
many mission critical applications.
Another important characteristic of asymmetric modernization is the ability to integrate code with meta-data. This can
often be the most time-consuming part of the process as there is rarely a fast way to reproduce complex business logic
written in languages such as @formula or LotusScript that will run from within a web browser or mobile client.
www.redpilldevelopment.comlearn. do. dream.
IntegratedFeedback
When modernizing an application one of the greatest
areas of savings comes from not assuming all the
existing functionality is required. A lot of the
functionality found in existing applications is no longer
used, needed, or does not have a compelling ROI to
justify its continued existence. As an example,
compare the functionality delivered on most mobile
mail clients with that found in desktop clients such as
Notes or Outlook.
Core capabilities are delivered to all applications first
and an integrated feedback mechanism is provided to
quickly identify features needed the most. These are
then implemented in a priority order across the
application portfolio.
Eventually the number of requests falls away or the
ROI of the requests remaining does not warrant them
being acted upon. At this stage you usually find the
existing application is no longer being used at all, or
only by a handful of people with very specific needs.
www.redpilldevelopment.comlearn. do. dream.
ApplicationStore
Business user will typically make use of
multiple applications in order to do their job.
We therefore need to provide a central place in
which people can both find and access these
applications. This will typically be provided in
the form of a portal/application store.
The application store should allow users to
identify their applications, the ones containing
the data with which they work. Customization
should be available to control the way in which
each person chooses to work with each data
store.
A modern user experience will deliver
information consolidated across applications
(e.g. notifications, to-dos, activity streams and
calendars). It will also provide a mechanism to
search for content that is contained in the
underlying data silos. The application store
should also be the place in which all core
functionality is delivered that is not specific to
an application (e.g. export, share, feedback).
www.redpilldevelopment.comlearn. do. dream.
Asymmetric Modernization is…
Extend v Replace
Code & Data Forensics
Meta-Data Driven UI
Core Capabilities
Coded Customization
Integrated Feedback
Application Store

Weitere ähnliche Inhalte

Was ist angesagt?

Nexaweb_Services_Whitepaper
Nexaweb_Services_WhitepaperNexaweb_Services_Whitepaper
Nexaweb_Services_Whitepaper
Francisco Anes
 
Ireland Apo University Fy 10 Tibbs Slideshare
Ireland Apo University Fy 10 Tibbs SlideshareIreland Apo University Fy 10 Tibbs Slideshare
Ireland Apo University Fy 10 Tibbs Slideshare
Tibbs Pereira
 
How to-choose-the-right-technology-architecture-for-your-mobile-application
How to-choose-the-right-technology-architecture-for-your-mobile-applicationHow to-choose-the-right-technology-architecture-for-your-mobile-application
How to-choose-the-right-technology-architecture-for-your-mobile-application
lverb
 
Webinar app testing and distribution
Webinar app testing and distribution Webinar app testing and distribution
Webinar app testing and distribution
Service2Media
 

Was ist angesagt? (20)

Assessing the Value of Rich Internet-White Paper
Assessing the Value of Rich Internet-White PaperAssessing the Value of Rich Internet-White Paper
Assessing the Value of Rich Internet-White Paper
 
The Significant role of event driven apps in software development
The Significant role of event driven apps in software development					The Significant role of event driven apps in software development
The Significant role of event driven apps in software development
 
Innovative mobile apps – migrate MBO apps to SAP Mobile Platform 3.0
Innovative mobile apps – migrate MBO apps to SAP Mobile Platform 3.0Innovative mobile apps – migrate MBO apps to SAP Mobile Platform 3.0
Innovative mobile apps – migrate MBO apps to SAP Mobile Platform 3.0
 
Find the right mobile app architecture for your business [detailed guide]
Find the right mobile app architecture for your business [detailed guide]Find the right mobile app architecture for your business [detailed guide]
Find the right mobile app architecture for your business [detailed guide]
 
Nexaweb_Services_Whitepaper
Nexaweb_Services_WhitepaperNexaweb_Services_Whitepaper
Nexaweb_Services_Whitepaper
 
React js vs react native a comparative analysis
React js vs react native a comparative analysisReact js vs react native a comparative analysis
React js vs react native a comparative analysis
 
Smartphone Enterprise Applications
Smartphone Enterprise ApplicationsSmartphone Enterprise Applications
Smartphone Enterprise Applications
 
Ireland Apo University Fy 10 Tibbs Slideshare
Ireland Apo University Fy 10 Tibbs SlideshareIreland Apo University Fy 10 Tibbs Slideshare
Ireland Apo University Fy 10 Tibbs Slideshare
 
Advaanz Company Profile
Advaanz Company ProfileAdvaanz Company Profile
Advaanz Company Profile
 
HokuApps | Why Your Organisation Should Leverage a Rapid Application Developm...
HokuApps | Why Your Organisation Should Leverage a Rapid Application Developm...HokuApps | Why Your Organisation Should Leverage a Rapid Application Developm...
HokuApps | Why Your Organisation Should Leverage a Rapid Application Developm...
 
How to-choose-the-right-technology-architecture-for-your-mobile-application
How to-choose-the-right-technology-architecture-for-your-mobile-applicationHow to-choose-the-right-technology-architecture-for-your-mobile-application
How to-choose-the-right-technology-architecture-for-your-mobile-application
 
Salesforce Mobile architecture introduction
Salesforce Mobile architecture introductionSalesforce Mobile architecture introduction
Salesforce Mobile architecture introduction
 
Agile IT: Modern Architecture for Rapid Mobile App Development
Agile IT: Modern Architecture for Rapid Mobile App DevelopmentAgile IT: Modern Architecture for Rapid Mobile App Development
Agile IT: Modern Architecture for Rapid Mobile App Development
 
SAP Mobile Platform: Virtual Bootcamp – How to build your Enterprise Mobile A...
SAP Mobile Platform: Virtual Bootcamp – How to build your Enterprise Mobile A...SAP Mobile Platform: Virtual Bootcamp – How to build your Enterprise Mobile A...
SAP Mobile Platform: Virtual Bootcamp – How to build your Enterprise Mobile A...
 
Web Site and Rich Internet Applications
Web Site and Rich Internet ApplicationsWeb Site and Rich Internet Applications
Web Site and Rich Internet Applications
 
Hybrid Smart phone application development analysis
Hybrid Smart phone application development analysisHybrid Smart phone application development analysis
Hybrid Smart phone application development analysis
 
Introduction to CAAD Codeless Applications Development Methodology
Introduction to CAAD Codeless Applications Development MethodologyIntroduction to CAAD Codeless Applications Development Methodology
Introduction to CAAD Codeless Applications Development Methodology
 
Faster In The Cloud
Faster In The CloudFaster In The Cloud
Faster In The Cloud
 
SAP Mobile Platform: Virtual Bootcamp – How to build your Enterprise Mobile A...
SAP Mobile Platform: Virtual Bootcamp – How to build your Enterprise Mobile A...SAP Mobile Platform: Virtual Bootcamp – How to build your Enterprise Mobile A...
SAP Mobile Platform: Virtual Bootcamp – How to build your Enterprise Mobile A...
 
Webinar app testing and distribution
Webinar app testing and distribution Webinar app testing and distribution
Webinar app testing and distribution
 

Ähnlich wie Asymetric Modernization

whitepaper_workday_technology_platform_devt_process
whitepaper_workday_technology_platform_devt_processwhitepaper_workday_technology_platform_devt_process
whitepaper_workday_technology_platform_devt_process
Eric Saraceno
 
Executive Overview of OutSystems (1)
Executive Overview of OutSystems (1)Executive Overview of OutSystems (1)
Executive Overview of OutSystems (1)
Steven Levine
 

Ähnlich wie Asymetric Modernization (20)

whitepaper_workday_technology_platform_devt_process
whitepaper_workday_technology_platform_devt_processwhitepaper_workday_technology_platform_devt_process
whitepaper_workday_technology_platform_devt_process
 
Executive Overview of OutSystems (1)
Executive Overview of OutSystems (1)Executive Overview of OutSystems (1)
Executive Overview of OutSystems (1)
 
Creating a mobile enterprise application business case.
Creating a mobile enterprise application business case.Creating a mobile enterprise application business case.
Creating a mobile enterprise application business case.
 
The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)
 
App Architecture for Efficient Mobile App Development.pdf
App Architecture for Efficient Mobile App Development.pdfApp Architecture for Efficient Mobile App Development.pdf
App Architecture for Efficient Mobile App Development.pdf
 
A research on- Sales force Project- documentation
A research on- Sales force Project- documentationA research on- Sales force Project- documentation
A research on- Sales force Project- documentation
 
Essential Guide to Becoming A Mobile App Rock Star - part II - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part II - Enterprise AppsEssential Guide to Becoming A Mobile App Rock Star - part II - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part II - Enterprise Apps
 
The best of the strategies for enterprise mobile app development
The best of the strategies for enterprise mobile app developmentThe best of the strategies for enterprise mobile app development
The best of the strategies for enterprise mobile app development
 
Checklist For Modernizing Your Legacy Application.pdf
Checklist For Modernizing Your Legacy Application.pdfChecklist For Modernizing Your Legacy Application.pdf
Checklist For Modernizing Your Legacy Application.pdf
 
S cube's mobile application development
S cube's mobile application developmentS cube's mobile application development
S cube's mobile application development
 
Scube's mobile application development
Scube's mobile application developmentScube's mobile application development
Scube's mobile application development
 
Essential Guide to Becoming A Mobile App Rock Star - part III - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part III - Enterprise AppsEssential Guide to Becoming A Mobile App Rock Star - part III - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part III - Enterprise Apps
 
Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...
Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...
Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...
 
Choose The Right Application Modernization Strategy For Your Business
Choose The Right Application Modernization Strategy For Your BusinessChoose The Right Application Modernization Strategy For Your Business
Choose The Right Application Modernization Strategy For Your Business
 
Fundamentals of Mobile App Development Technology
Fundamentals of Mobile App Development TechnologyFundamentals of Mobile App Development Technology
Fundamentals of Mobile App Development Technology
 
Application Modernization With Cloud Native Approach_ An in-depth Guide.pdf
Application Modernization With Cloud Native Approach_ An in-depth Guide.pdfApplication Modernization With Cloud Native Approach_ An in-depth Guide.pdf
Application Modernization With Cloud Native Approach_ An in-depth Guide.pdf
 
Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...
Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...
Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...
 
How Can Your Organization Benefit From Application Modernization_.pdf
How Can Your Organization Benefit From Application Modernization_.pdfHow Can Your Organization Benefit From Application Modernization_.pdf
How Can Your Organization Benefit From Application Modernization_.pdf
 
Top 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringTop 8 Trends in Performance Engineering
Top 8 Trends in Performance Engineering
 
Wecreate3
Wecreate3Wecreate3
Wecreate3
 

Mehr von Peter Presnell

Mehr von Peter Presnell (20)

Lotus Notes: Simplicity
Lotus Notes: SimplicityLotus Notes: Simplicity
Lotus Notes: Simplicity
 
Big Data With Graphs
Big Data With GraphsBig Data With Graphs
Big Data With Graphs
 
Beyond XPages
Beyond XPagesBeyond XPages
Beyond XPages
 
The Graph Revolution
The Graph RevolutionThe Graph Revolution
The Graph Revolution
 
Modernization Math
Modernization MathModernization Math
Modernization Math
 
MWLUG 2014: Red Pill Development Speed Sponsoring
MWLUG 2014: Red Pill Development Speed SponsoringMWLUG 2014: Red Pill Development Speed Sponsoring
MWLUG 2014: Red Pill Development Speed Sponsoring
 
MWLUG 2014: Modern Domino (workshop)
MWLUG 2014: Modern Domino (workshop)MWLUG 2014: Modern Domino (workshop)
MWLUG 2014: Modern Domino (workshop)
 
MWLUG 2014: ATLUG Comes To You
MWLUG 2014: ATLUG Comes To YouMWLUG 2014: ATLUG Comes To You
MWLUG 2014: ATLUG Comes To You
 
Modern Notes: Databases
Modern Notes: DatabasesModern Notes: Databases
Modern Notes: Databases
 
Future Proofing Notes Client Applications
Future Proofing Notes Client ApplicationsFuture Proofing Notes Client Applications
Future Proofing Notes Client Applications
 
Lotus Notes: Live Long and Prosper
Lotus Notes: Live Long and ProsperLotus Notes: Live Long and Prosper
Lotus Notes: Live Long and Prosper
 
ATLUG Tack-It-On Modern Notes:Modern Domino
ATLUG Tack-It-On Modern Notes:Modern DominoATLUG Tack-It-On Modern Notes:Modern Domino
ATLUG Tack-It-On Modern Notes:Modern Domino
 
ATLUG Day of Champions
ATLUG Day of ChampionsATLUG Day of Champions
ATLUG Day of Champions
 
Where's Domino?
Where's Domino?Where's Domino?
Where's Domino?
 
The History of Lotus Notes
The History of Lotus NotesThe History of Lotus Notes
The History of Lotus Notes
 
Lotusphere
LotusphereLotusphere
Lotusphere
 
The Mobile World
The Mobile WorldThe Mobile World
The Mobile World
 
Modern Domino: IBM Connect 2014 Summary
Modern Domino: IBM Connect 2014 SummaryModern Domino: IBM Connect 2014 Summary
Modern Domino: IBM Connect 2014 Summary
 
Modern Domino: IBM Connect 2014 Preview
Modern Domino:  IBM Connect 2014 PreviewModern Domino:  IBM Connect 2014 Preview
Modern Domino: IBM Connect 2014 Preview
 
redpill Now
redpill Nowredpill Now
redpill Now
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

Asymetric Modernization

  • 1. www.redpilldevelopment.comlearn. do. dream. Underneath the hood of Asymmetric Modernization
  • 2. www.redpilldevelopment.comlearn. do. dream. Goal The goal of asymmetric modernization is to establish a process for modernizing applications that scales for large portfolios of applications. To do this we must recognize that modernization is a journey and not a destination. It is therefore essential that new “modern” capabilities can be continually added to an application portfolio in a way that does not require changes being made on an application-by-applications basis. Note: This process is not specific to Notes applications but is particularly well suited to the Notes platform because of the large number of Notes applications found in many organizations (200 on average).
  • 3. www.redpilldevelopment.comlearn. do. dream. Approaches Migration The focus is on achieving a platform change. This is an internal IT focus as users typically do not care about the underlying platform, but rather what it delivers. Modernization Focuses on delivering modern capabilities to existing applications. The ability to deliver this functionality is more important than the platform used. This is usually a customer-focused initiative. Traditional Modernization Analysts/developers build an understanding of an existing application and use that understanding to develop a new application on the target platform. Skilled analysts/developers and development frameworks are important. Automated Modernization Automated tooling scans the code of the existing application and uses that understanding to generate new code. Developers are usually needed to complete the work which requires them to still build an understanding of the application. Skilled developers (but less of them) are required along with a good set of automated tools. Asymmetric Modernization Code and data forensics builds an understanding of each application and from this understanding a new, modern, interface is provided. Good forensics is needed along with a sophisticated meta-driven UI. There is a higher fixed cost to develop/acquire the technology but a much lower variable cost for each application
  • 5. www.redpilldevelopment.comlearn. do. dream. ExtendvReplace Leaving the existing application (and associated) data intact is a key requirement for Asymmetric Modernization. Replacing an application requires a cutover from the “old” to the “new”. Extending an application allows the “old” to continue operation while the “new” evolves. With the original application still available for use new capabilities can be delivered in a staged approach until there is no longer a need for the old. In many cases a lot of the functionality in the original application is never requested reducing the cost, time, and risk. It is usually possible to meet the business needs of 80% of the existing platform for 20% of the cost. Having a strategy that provides an alternative to spending the remaining 80% can be the difference in the success or failure of the project.
  • 6. www.redpilldevelopment.comlearn. do. dream. Code&DataForensics Analysis of code helps to provide an understanding of what the developer thought an application should do. Analysis of data helps provide an understanding of how the application is actually being used. Combining both code and data forensics provides a more complete picture about the true nature of an application. Automating the forensics process allows 100s or 1,000s of applications to be quickly analyzed. While not a requirement, it is often a good idea to take advantage of the unique capabilities of graph databases to store the large volume of data associated with representing the forensics results a large application portfolio. During the course of a large modernization project is is common for the existing applications to change. The forensics process must therefore be designed to run on a regular basis to reflect the changes that occur until the project is completed.
  • 7. www.redpilldevelopment.comlearn. do. dream. Meta-DataDrivenUI The asymmetric approach not only has the ability to dramatically reduce the cost of modernizing an application portfolio it also can result in large numbers of modernized applications being delivered within a few days or weeks of the project starting. This is achieved by developing a user interface that is driven by the the meta-data collected during the forensics phase. The goal of this modernization layer is to remove many design decisions from individual applications applications and consolidate them into a single “application”. As UI standards evolve over time this modernization layer also evolves ensuring applications are always being presented with a fresh “modern” interpretation of the underlying data. E.g. It is now expected that addresses are integrated with a mapping application, names are integrated with contact details and (on a smartphone) telephone numbers are linked to the phone application. It is unlikely that the computer-based guessing of UI needs will be perfect for every application but it can result in the rapid delivery of mobile interfaces or responsive web interfaces for thick client applications that meet many of the needs of existing application users. The extend over replace approach ensures the original application remains available to fill any initial gap in functionality provided via the meta-data. An administration tool to over-ride the meta-data generated by the forensics allows comprehensive fine-tuning of the resulting applications in a matter of minutes. Because much of the application functionality is now represented as meta-data it is possible to implement changes to the application without the need for changes to the original code.
  • 8. www.redpilldevelopment.comlearn. do. dream. CoreCapabilities A lot of the functionality required for an application is not unique to a single application. Examples include comments, keywords, export, print to PDF, like, share, author profiling, contact integration, integrated messaging. We refer to these as core capabilities. Rather than build those capabilities into each application, an application framework is established that allows the core capabilities to be made available to all applications. Where needed the ability can be added to customize which core capabilities are made available (e.g. an application containing confidential data may not benefit from having an export feature). The modernization process involves meeting user expectations for quickly adding new core capabilities to each application. In the past this may require each application to be redeveloped, tested, and deployed. This is an expensive and time- consuming process. With asymmetric modernization the core capability is developed once and then automatically added to all applications in a manner very similar to that found in cloud-base platforms.
  • 9. www.redpilldevelopment.comlearn. do. dream. CodedCustomization While meta-data can go a long way to delivering a modern interpretation of the UI for aging applications there is always going to be applications whose complexity goes beyond that which can be easily understood by forensics scans and/or replicated in a meta-data (only) driven UI. The ability to integrated code with the meta-data UI becomes a must for many mission critical applications. Another important characteristic of asymmetric modernization is the ability to integrate code with meta-data. This can often be the most time-consuming part of the process as there is rarely a fast way to reproduce complex business logic written in languages such as @formula or LotusScript that will run from within a web browser or mobile client.
  • 10. www.redpilldevelopment.comlearn. do. dream. IntegratedFeedback When modernizing an application one of the greatest areas of savings comes from not assuming all the existing functionality is required. A lot of the functionality found in existing applications is no longer used, needed, or does not have a compelling ROI to justify its continued existence. As an example, compare the functionality delivered on most mobile mail clients with that found in desktop clients such as Notes or Outlook. Core capabilities are delivered to all applications first and an integrated feedback mechanism is provided to quickly identify features needed the most. These are then implemented in a priority order across the application portfolio. Eventually the number of requests falls away or the ROI of the requests remaining does not warrant them being acted upon. At this stage you usually find the existing application is no longer being used at all, or only by a handful of people with very specific needs.
  • 11. www.redpilldevelopment.comlearn. do. dream. ApplicationStore Business user will typically make use of multiple applications in order to do their job. We therefore need to provide a central place in which people can both find and access these applications. This will typically be provided in the form of a portal/application store. The application store should allow users to identify their applications, the ones containing the data with which they work. Customization should be available to control the way in which each person chooses to work with each data store. A modern user experience will deliver information consolidated across applications (e.g. notifications, to-dos, activity streams and calendars). It will also provide a mechanism to search for content that is contained in the underlying data silos. The application store should also be the place in which all core functionality is delivered that is not specific to an application (e.g. export, share, feedback).
  • 12. www.redpilldevelopment.comlearn. do. dream. Asymmetric Modernization is… Extend v Replace Code & Data Forensics Meta-Data Driven UI Core Capabilities Coded Customization Integrated Feedback Application Store

Hinweis der Redaktion

  1. Notes recently turned 25.