SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
WHITEPAPER
BUSINESSRULESEXTRACTIONFOR
MAINFRAMEAPPLICATIONS
Abstract
At the heart of every business is the ability to deliver quality
products, services and customer experience through differentiated
business processes. These business processes are supported by
systems and orchestrated by applications, many of which reside
on mainframes. Thus, mainframes continue to host mission-critical
applications in large businesses across industries. This white
paper examines why extracting business rules embedded within
mainframes is important. It also discusses the challenges involved in
implementation. The paper further provides an agile plan with the
right tools, and a structured approach for business rules extraction.
External Document © 2020 Infosys Limited
Mainframes are revenue generating
platforms for many enterprises. Such
businesses have built tremendous value
in mainframe applications, many of which
are monolithic. Therefore, neither is the
business logic isolated in its own tier nor
are the business rules externalized in a
rules engine. Legacy monolithic programs
run into thousands of lines, and the code
for handling the presentation, business
logic and data access are interwoven in the
same program. Mainframe applications
are re-engineered or replaced to enhance
technical maturity, functional capability
and overall business value. Business rules
extraction (called BRE henceforth) is
needed to extract complex business rules
from mainframe applications and the
rules are then used to develop business
requirements documentation. Some
examples of business processes involving
complex business rules include invoice
processing, credit checks, calculation of
bonus and incentives, claim adjudication,
inventory allocation and order allocation.
This white paper discusses the need,
methodology and agile implementation
for BRE. While the BRE methodology and
implementation discussed is applicable
across all platforms and languages, the
overall scope of this paper is limited to
mainframe applications.
Introduction
External Document © 2020 Infosys Limited
Need for business rules extraction
Business rules extraction methodology
Business
Rules
Extraction
Mainframe
Application
Business rules
Business rules
Business rules
Business rules
SaaS and COTS
Implementation
Cloud-native
Re-engineering
System
Documentation
Rules
Externalization
Business
requirements
Business
requirements
Business
requirements
The need for business rules extraction
arises for several reasons. Migrating
applications out of mainframes is complex.
These applications have been enhanced
continuously in order to implement
evolving business process changes and
new requirements. The mainframe is one
of the leading application development
platforms. The architecture, design
patterns, programming languages,
databases, and tools are not standardized
as they vary across companies. The
complexity in mainframe applications
arises from the learning curve involved in
understanding the nuances of architecture,
design and code complexity. It can also
be attributed to the rare skills, and the
sheer size of the code base. With the rapid
growth of mobile, distributed and cloud
computing, open source technologies, and
customizable industry-specific COTS/SaaS
products, many mainframe applications
are being re-engineered as cloud-native
web and mobile apps. Alternatively, they
are being replaced with COTS and SaaS
products. This has given rise to the need
to retrofit legacy business logic into these
new applications. Some legacy applications
need to be re-architected to enable faster
time to market. Thus, externalizing the
rules helps change business rules and
logic without code changes and extensive
testing. Another benefit of extracting
business rules is creating system or
knowledge artefacts that can be used as
training and reference material. While rules
can be simply extracted from programs,
implementing BRE for large applications
or complex use cases requires a structured
approach. There are implementation
complexities like identifying the right use
cases, identifying impacted programs,
analyzing complex control flows in
applications, understanding the domain
and functionality of the application,
translating programming logic to business
language, and finally documenting the
rules in the right format. This white paper
discusses such implementation challenges
and provides a structured approach for
BRE.
Fig 1: The need for business rules extraction
Fig 2: What is a business rule?
External Document © 2020 Infosys Limited
Business Logic
Conditions
Looping
Assignment
Transforms
Compute
Validation
Calls
Data access
Programming Logic
Data
Data
Data
Data
Variables
Business
Rule
Assertion
Action
Fact
Business
Logic
External Document © 2020 Infosys Limited
An application can have more than one
functionality and each functionality can
have many use cases as shown in Fig 3.
A use case defines how a user interacts
with an application to achieve a goal.
Some mainframe applications can have
batch jobs and programs without any
user interaction. For the sake of simplicity,
these batch jobs and programs can be
grouped under a specific use case. A list
of use cases should be identified before
beginning BRE. Once all the relevant
use cases are listed out, the associated
programs of each use case should also be
identified. Sometimes, a single online or
batch program may contain the business
logic for the entire use case. In other cases,
the impacted programs of a particular use
case can be many and may span different
tiers and applications. Some use cases can
be executed across multiple programs
which are linked by files, databases and
asynchronous message queues (MQ).
The impacted programs or call chain
from the main program can be identified
through static code analysis. For programs
that are linked dynamically through
files and databases, dependency graphs
and data flow diagrams can be used for
impact analysis. A manual impact analysis
is needed for associated programs using
complex flows like asynchronous MQ or
calls to external applications. It is important
to identify all impacted programs along
with their called programs including the
entire chain of calls, copybooks and other
libraries for analysis. Application discovery
tools like IBM ADDI, Micro Focus Enterprise
Analyzer and Infosys Ki can help with
impact analysis and identifying program
call chains. These tools also provide
various application discovery features like
generating program/data flows and CURD
matrix.
After the impact analysis is completed
and documented, a business and system
process flow analysis is done to understand
the business process in detail and how it is
executed through the impacted programs.
The business process flow breaks down
the business processes into input, output
and sub-processes along with the order,
interactions and decision flows between
them. System process identifies the data
flows between system components, key
decision logic, input and output data,
inbound and outbound interfaces.
Once the process flows are documented,
a data dictionary should be developed
encompassing all data elements in
the application and their business and
functional descriptions. If data dictionaries
are already available, it is important to
confirm whether all program variables
and database attributes are covered. Data
dictionaries are critical to understand,
contextualize and translate programming
logic into business rules.
The next step is the extraction of business
rules. The application discovery tools
mentioned above provide in-built or add-
on features for rule extraction and storage.
A business logic is programming logic applied on data. A business rule is an assertion of a fact and a consequent action. Any business process
flow is comprised of a bunch of business rules. These rules can be linked together in a certain order.
Fig 3: Application, functionality and use cases of BRE
Applica�on
Func�onality Func�onality
Use case
Use case
Use case
Use case
Use case
Use case
External Document © 2020 Infosys Limited
External Document © 2020 Infosys Limited
Rule extraction involves stepping through
the impacted programs, analyzing the
programming logic and extracting the
business rules (see section below:“Four
steps in rule extraction”). A business rule
is programming logic that asserts a fact
(program data) based on some conditions
and takes an action (like decision logic,
database update, external calls, etc.).
Fig 4: BRE approach
Four steps in rule extraction
Extracting business rules from a program
is a complex process. The scope of the
programming logic that is associated with
a business rule should be analyzed based
on the fact-assert-action model. Business
rule extraction is made up of four steps:
Step 1: Variable to data dictionary
mapping
This is done to understand the functional
meaning of key variables defined in the
program.
Step 2: Rule extraction
A BRE tool will be used to parse through
the source code and extract rules. The
applications discovery/BRE tools provide
rich features for rule extraction, like
statically navigating the program, different
views to look at program structure, expand
and browse dependent programs, etc.
These tools help identify programming
logic and write the associated rule
descriptions.
Step 3: Annotation/
categorization with metadata
Metadata can be any additional
information to classify and version the rule
and includes rule types like computations,
transformations and validations, program-
related information like name, line
numbers, paragraph names, pseudo code,
etc.
Step 4: Business language
translation
Rules extracted from the program should
be translated into a business language
that is suitable for artefacts like a business
requirement document. This requires
review and updates by domain and
functional consultants. Business rules can
be stored in a rule repository and classified
according to applications, functionality and
use cases.
Use case 1
Use case analysis
overview & details
System process
flow diagrams
Business
glossary/data
dictionary
Impacted
applications and
programs
Business rule
document
1 Use case analysis
Business and
system process
analysis
3
Component
impact analysis
Business rules
extraction
4
Application
engineer and
domain consultant
Use case 3
Use case 2
2
External Document © 2020 Infosys Limited
External Document © 2020 Infosys Limited
Executing BRE in an agile manner
A BRE project may involve extracting rules for large applications or a portfolio of applications involving several use cases. An agile project
execution is needed to deliver incremental value continuously and mitigate risks. Agile execution involves breaking down the requirements
into user stories, prioritizing user stories, planning for releases and iterations, and setting up agile processes like scrum meetings, demos
and retrospection. Agile execution ensures continuous improvement based on customer feedback and enables the re-prioritization of
deliverables based on client preferences.
The first step in agile planning is to
break down the BRE requirements. Fig 5
illustrates each BRE deliverable as a user
story for simplicity. However, user stories
can be scoped at a more granular level.
A user story or a BRE deliverable will be
further broken down into multiple tasks.
An indicative list of BRE deliverables is also
defined in Fig 5, and short codes have been
assigned to them.
The BRE deliverables for multiple use cases
or for an entire functionality shall make
up a release. The release is then broken
down into iterations/sprints for the BRE
deliverables/use cases. User stories are
assigned to iterations based on their story
points, which in turn depends on the
complexity of the use case. The use case
complexity is determined based on T-shirt
sizing, but this is beyond the scope of this
white paper.
Fig 5: Breaking down the BRE requirements
Epic
Feature
User
story
Tasks
BRE deliverables for an application
BRE deliverables for functionality of
one or more use cases
Analysis, extraction, documentation
review, rework, and sign-off
BRE deliverables for one use case
(UC):
Impact analysis, process flow
diagram, data dictionary, and
business rule extraction
Requirementbreakdown
High
Medium
Small
Detailed
Use case – UC
Use case x – UCx
Impact analysis – IA
Process flow diagram – PFD
Data dictionary – DD
Business rule extraction – BRE
Review and rework – RR
BRE Agile Planning - Legend
Use case - Impact analysis
document
Data dictionary
Business rule extract
Process flow diagram
1
BREdeliverables
atausecaselevel
UCx-IA
UCx-
PFD
UCx-DD
UCx-
BRE
Review and rework UCx-RR
2
3
4
5
External Document © 2020 Infosys Limited
Infosys Business Rules
Extractor
Core features
Success drivers
Infosys Business Rule Extractor is
developed to provide an intuitive user
interface to statically analyze legacy
COBOL application and annotate rules
for them. This tool also provides program
management features like Dashboards,
Task Assignment and Work Flow
Notifications.
• Program rule extraction: The user
interface provides a program control
flow menu for rule extraction
• Use case rule chaining: The annotated
program rules are chained as per the
static execution flow at a use case level
and includes the rules of the called
programs
• Dashboard: This provides interactive
reports on the progress of rule extraction
and the inventory statistics across
inventory, use case and program levels
• Administration: This includes various
administrative features like user
management, task allocation and use
case declaration
Infosys recommends the following steps
to ensure the success of business rules
extraction projects:
•	 Identify and prioritize business rule
intensive use cases for faster results
and value. Identifying the right use
case depends on the project needs
and requires inputs and guidance from
business SMEs
•	 BRE programs require a mix of domain,
functional and technical skills like
understanding business processes,
application functionality and technical
knowledge for code analysis. Since it is
often difficult to find SMEs with all the
required skills, strong team collaboration
is critical to develop the BRE deliverables
•	 Accurately estimating the use case
complexities, user stories and tasks can
help avoid effort and schedule overruns
•	 Use cases with high code complexity
need the right code analysis technique
(static versus dynamic). Thus, code
complexity should be considered when
estimating the use case complexity
•	 Using the right tools for application
discovery, business rule extraction,
debugging and testing will improve
efficiency. The approach and processes
explained above is codified in Infosys
Business Rule Extractor. The section on
Infosys Business Rule Extractor explains
its various capabilities and features.
•	 Detailed documentation of the
deliverables and representing the
process flows and business rules in
the right levels of abstraction can help
different stakeholders understand and
use the BRE deliverables
•	 Keeping the business rules up to date
with the latest application state will
require integrating the application
change management process with the
BRE program
© 2020 Infosys Limited, Bengaluru, India. All Rights Reserved. Infosys believes the information in this document is accurate as of its publication date; such information is subject to change without notice. Infosys
acknowledges the proprietary rights of other companies to the trademarks, product names and such other intellectual property rights mentioned in this document. Except as expressly permitted, neither this
documentation nor any part of it may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, printing, photocopying, recording or otherwise, without the
prior permission of Infosys Limited and/ or any named intellectual property rights holders under this document.
For more information, contact askus@infosys.com
Infosys.com | NYSE: INFY Stay Connected
Conclusion
BRE plays a vital role in mainframe
modernization projects. Given the ubiquity
of mainframe platforms and the sprawl of
mainframe applications, modernization is
a steady trend. Mining business logic and
rules out of complex legacy applications is
necessary for modernization projects like
re-engineering, COTS implementation and
refactoring. While there is an ecosystem of
vendors, tools and processes for business
rules extraction, each BRE program should
be carefully planned and developed
considering the range of mainframe
applications in terms of technology stack
and code complexity.
About the author
Maran Gothandaraman is a Principal Consultant with the Infosys Mainframe Modernization Practice. He has over
18 years of experience delivering complex IT engagements across industry verticals with a focus on mainframe
modernization, application development, and project/program management.

Weitere ähnliche Inhalte

Was ist angesagt?

Concerto Whitepaper
Concerto WhitepaperConcerto Whitepaper
Concerto Whitepapersanjayraina
 
Agent-Based Workflow
Agent-Based WorkflowAgent-Based Workflow
Agent-Based WorkflowLarry Suarez
 
Accelerating Machine Learning as a Service with Automated Feature Engineering
Accelerating Machine Learning as a Service with Automated Feature EngineeringAccelerating Machine Learning as a Service with Automated Feature Engineering
Accelerating Machine Learning as a Service with Automated Feature EngineeringCognizant
 
Radhika abde 8 yrs exp-telecom domain
Radhika abde 8 yrs exp-telecom domainRadhika abde 8 yrs exp-telecom domain
Radhika abde 8 yrs exp-telecom domainRadhika Abde
 
Assessing Component based ERP Architecture for Developing Organizations
Assessing Component based ERP Architecture for Developing OrganizationsAssessing Component based ERP Architecture for Developing Organizations
Assessing Component based ERP Architecture for Developing OrganizationsIJCSIS Research Publications
 
Enterprise application
Enterprise applicationEnterprise application
Enterprise applicationancientsoul90
 
Configuration inerpsaas multi tenancy
Configuration inerpsaas multi tenancyConfiguration inerpsaas multi tenancy
Configuration inerpsaas multi tenancyijcseit
 
Architecture Standardization Using the IBM Information Framework
Architecture Standardization Using the IBM Information FrameworkArchitecture Standardization Using the IBM Information Framework
Architecture Standardization Using the IBM Information FrameworkCognizant
 
Introducing BizTalk Server 2009
Introducing BizTalk Server 2009Introducing BizTalk Server 2009
Introducing BizTalk Server 2009diTii
 
Mba ii u v enterprise application integration
Mba ii u v enterprise application integrationMba ii u v enterprise application integration
Mba ii u v enterprise application integrationRai University
 
Designing and implementing the
Designing and implementing theDesigning and implementing the
Designing and implementing theijait
 
Chap04 Computer Software
Chap04 Computer SoftwareChap04 Computer Software
Chap04 Computer SoftwareAqib Syed
 
Should ETL Become Obsolete
Should ETL Become ObsoleteShould ETL Become Obsolete
Should ETL Become ObsoleteJerald Burget
 
Materi 1 Why ERP.pptx
Materi 1 Why ERP.pptxMateri 1 Why ERP.pptx
Materi 1 Why ERP.pptxAisyahRahmatika
 
Components of CORBA
Components of CORBAComponents of CORBA
Components of CORBAGlen Alleman
 
The software Visibility Problem
The software Visibility Problem The software Visibility Problem
The software Visibility Problem Jade Global
 
Overview of different types of erp systems, architecture, and modules
Overview of different types of erp systems, architecture, and modulesOverview of different types of erp systems, architecture, and modules
Overview of different types of erp systems, architecture, and modulesDeepa Manoj
 
BPM - The Promise And Challenges
BPM  - The Promise And ChallengesBPM  - The Promise And Challenges
BPM - The Promise And ChallengesJerald Burget
 

Was ist angesagt? (19)

Concerto Whitepaper
Concerto WhitepaperConcerto Whitepaper
Concerto Whitepaper
 
Agent-Based Workflow
Agent-Based WorkflowAgent-Based Workflow
Agent-Based Workflow
 
Accelerating Machine Learning as a Service with Automated Feature Engineering
Accelerating Machine Learning as a Service with Automated Feature EngineeringAccelerating Machine Learning as a Service with Automated Feature Engineering
Accelerating Machine Learning as a Service with Automated Feature Engineering
 
Radhika abde 8 yrs exp-telecom domain
Radhika abde 8 yrs exp-telecom domainRadhika abde 8 yrs exp-telecom domain
Radhika abde 8 yrs exp-telecom domain
 
Assessing Component based ERP Architecture for Developing Organizations
Assessing Component based ERP Architecture for Developing OrganizationsAssessing Component based ERP Architecture for Developing Organizations
Assessing Component based ERP Architecture for Developing Organizations
 
Enterprise application
Enterprise applicationEnterprise application
Enterprise application
 
Configuration inerpsaas multi tenancy
Configuration inerpsaas multi tenancyConfiguration inerpsaas multi tenancy
Configuration inerpsaas multi tenancy
 
Architecture Standardization Using the IBM Information Framework
Architecture Standardization Using the IBM Information FrameworkArchitecture Standardization Using the IBM Information Framework
Architecture Standardization Using the IBM Information Framework
 
Introducing BizTalk Server 2009
Introducing BizTalk Server 2009Introducing BizTalk Server 2009
Introducing BizTalk Server 2009
 
Mba ii u v enterprise application integration
Mba ii u v enterprise application integrationMba ii u v enterprise application integration
Mba ii u v enterprise application integration
 
Blue book
Blue bookBlue book
Blue book
 
Designing and implementing the
Designing and implementing theDesigning and implementing the
Designing and implementing the
 
Chap04 Computer Software
Chap04 Computer SoftwareChap04 Computer Software
Chap04 Computer Software
 
Should ETL Become Obsolete
Should ETL Become ObsoleteShould ETL Become Obsolete
Should ETL Become Obsolete
 
Materi 1 Why ERP.pptx
Materi 1 Why ERP.pptxMateri 1 Why ERP.pptx
Materi 1 Why ERP.pptx
 
Components of CORBA
Components of CORBAComponents of CORBA
Components of CORBA
 
The software Visibility Problem
The software Visibility Problem The software Visibility Problem
The software Visibility Problem
 
Overview of different types of erp systems, architecture, and modules
Overview of different types of erp systems, architecture, and modulesOverview of different types of erp systems, architecture, and modules
Overview of different types of erp systems, architecture, and modules
 
BPM - The Promise And Challenges
BPM  - The Promise And ChallengesBPM  - The Promise And Challenges
BPM - The Promise And Challenges
 

Ă„hnlich wie Business rules-extraction

whitepaper_workday_technology_platform_devt_process
whitepaper_workday_technology_platform_devt_processwhitepaper_workday_technology_platform_devt_process
whitepaper_workday_technology_platform_devt_processEric Saraceno
 
Splice Machine Digital Transformation 2.0 white paper
Splice Machine Digital Transformation 2.0 white paperSplice Machine Digital Transformation 2.0 white paper
Splice Machine Digital Transformation 2.0 white paperSyed Mahmood
 
Top Requirements for Workday Integration Jobs
Top Requirements for Workday Integration JobsTop Requirements for Workday Integration Jobs
Top Requirements for Workday Integration JobsERP Cloud Training
 
X-Analysis Application Process Mapping
X-Analysis Application Process MappingX-Analysis Application Process Mapping
X-Analysis Application Process MappingFresche Solutions
 
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...Cognizant
 
AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06Jay van Zyl
 
Cis 519 Week 3 Individual Assignment
Cis 519 Week 3 Individual AssignmentCis 519 Week 3 Individual Assignment
Cis 519 Week 3 Individual AssignmentApril Dillard
 
Whitepaper: 4 Approaches to Systems Integration
Whitepaper: 4 Approaches to Systems IntegrationWhitepaper: 4 Approaches to Systems Integration
Whitepaper: 4 Approaches to Systems IntegrationAudacia
 
A Comparison of Cloud based ERP Systems
A Comparison of Cloud based ERP SystemsA Comparison of Cloud based ERP Systems
A Comparison of Cloud based ERP SystemsNakul Patel
 
Processes Driving the Networked Economy: Process Portals, Process Vortex and ...
Processes Driving the Networked Economy: Process Portals, Process Vortex and ...Processes Driving the Networked Economy: Process Portals, Process Vortex and ...
Processes Driving the Networked Economy: Process Portals, Process Vortex and ...Amit Sheth
 
Processes in the Networked Economies: Portal, Vortex, and Dynamic Trading Pro...
Processes in the Networked Economies: Portal, Vortex, and Dynamic Trading Pro...Processes in the Networked Economies: Portal, Vortex, and Dynamic Trading Pro...
Processes in the Networked Economies: Portal, Vortex, and Dynamic Trading Pro...Amit Sheth
 
Case study of rules as relational data
Case study of rules as relational dataCase study of rules as relational data
Case study of rules as relational dataJeff Long
 
Case study of rules as relational data
Case study of rules as relational dataCase study of rules as relational data
Case study of rules as relational dataJeff Long
 
Accounting Information Systems Controls Processes 3rd Edition Turner Solution...
Accounting Information Systems Controls Processes 3rd Edition Turner Solution...Accounting Information Systems Controls Processes 3rd Edition Turner Solution...
Accounting Information Systems Controls Processes 3rd Edition Turner Solution...KeeganDunns
 
IT Software Category
IT Software CategoryIT Software Category
IT Software CategoryMehul Vora
 
Enterprise architecture
Enterprise architecture Enterprise architecture
Enterprise architecture Hamzazafeer
 
Software Infrastructure Design, Integration, & Migration Roadmap
Software Infrastructure Design, Integration, & Migration RoadmapSoftware Infrastructure Design, Integration, & Migration Roadmap
Software Infrastructure Design, Integration, & Migration RoadmapInnovate Vancouver
 
Websphere Business Integration
Websphere Business IntegrationWebsphere Business Integration
Websphere Business IntegrationSchubert Gomes
 

Ă„hnlich wie Business rules-extraction (20)

whitepaper_workday_technology_platform_devt_process
whitepaper_workday_technology_platform_devt_processwhitepaper_workday_technology_platform_devt_process
whitepaper_workday_technology_platform_devt_process
 
Splice Machine Digital Transformation 2.0 white paper
Splice Machine Digital Transformation 2.0 white paperSplice Machine Digital Transformation 2.0 white paper
Splice Machine Digital Transformation 2.0 white paper
 
Api enablement-mainframe
Api enablement-mainframeApi enablement-mainframe
Api enablement-mainframe
 
Top Requirements for Workday Integration Jobs
Top Requirements for Workday Integration JobsTop Requirements for Workday Integration Jobs
Top Requirements for Workday Integration Jobs
 
X-Analysis Application Process Mapping
X-Analysis Application Process MappingX-Analysis Application Process Mapping
X-Analysis Application Process Mapping
 
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
 
AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06
 
Cis 519 Week 3 Individual Assignment
Cis 519 Week 3 Individual AssignmentCis 519 Week 3 Individual Assignment
Cis 519 Week 3 Individual Assignment
 
Whitepaper: 4 Approaches to Systems Integration
Whitepaper: 4 Approaches to Systems IntegrationWhitepaper: 4 Approaches to Systems Integration
Whitepaper: 4 Approaches to Systems Integration
 
A Comparison of Cloud based ERP Systems
A Comparison of Cloud based ERP SystemsA Comparison of Cloud based ERP Systems
A Comparison of Cloud based ERP Systems
 
Processes Driving the Networked Economy: Process Portals, Process Vortex and ...
Processes Driving the Networked Economy: Process Portals, Process Vortex and ...Processes Driving the Networked Economy: Process Portals, Process Vortex and ...
Processes Driving the Networked Economy: Process Portals, Process Vortex and ...
 
Processes in the Networked Economies: Portal, Vortex, and Dynamic Trading Pro...
Processes in the Networked Economies: Portal, Vortex, and Dynamic Trading Pro...Processes in the Networked Economies: Portal, Vortex, and Dynamic Trading Pro...
Processes in the Networked Economies: Portal, Vortex, and Dynamic Trading Pro...
 
Case study of rules as relational data
Case study of rules as relational dataCase study of rules as relational data
Case study of rules as relational data
 
Case study of rules as relational data
Case study of rules as relational dataCase study of rules as relational data
Case study of rules as relational data
 
Zen Of Oracle Erp
Zen Of Oracle ErpZen Of Oracle Erp
Zen Of Oracle Erp
 
Accounting Information Systems Controls Processes 3rd Edition Turner Solution...
Accounting Information Systems Controls Processes 3rd Edition Turner Solution...Accounting Information Systems Controls Processes 3rd Edition Turner Solution...
Accounting Information Systems Controls Processes 3rd Edition Turner Solution...
 
IT Software Category
IT Software CategoryIT Software Category
IT Software Category
 
Enterprise architecture
Enterprise architecture Enterprise architecture
Enterprise architecture
 
Software Infrastructure Design, Integration, & Migration Roadmap
Software Infrastructure Design, Integration, & Migration RoadmapSoftware Infrastructure Design, Integration, & Migration Roadmap
Software Infrastructure Design, Integration, & Migration Roadmap
 
Websphere Business Integration
Websphere Business IntegrationWebsphere Business Integration
Websphere Business Integration
 

KĂĽrzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

KĂĽrzlich hochgeladen (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Business rules-extraction

  • 1. WHITEPAPER BUSINESSRULESEXTRACTIONFOR MAINFRAMEAPPLICATIONS Abstract At the heart of every business is the ability to deliver quality products, services and customer experience through differentiated business processes. These business processes are supported by systems and orchestrated by applications, many of which reside on mainframes. Thus, mainframes continue to host mission-critical applications in large businesses across industries. This white paper examines why extracting business rules embedded within mainframes is important. It also discusses the challenges involved in implementation. The paper further provides an agile plan with the right tools, and a structured approach for business rules extraction.
  • 2. External Document © 2020 Infosys Limited Mainframes are revenue generating platforms for many enterprises. Such businesses have built tremendous value in mainframe applications, many of which are monolithic. Therefore, neither is the business logic isolated in its own tier nor are the business rules externalized in a rules engine. Legacy monolithic programs run into thousands of lines, and the code for handling the presentation, business logic and data access are interwoven in the same program. Mainframe applications are re-engineered or replaced to enhance technical maturity, functional capability and overall business value. Business rules extraction (called BRE henceforth) is needed to extract complex business rules from mainframe applications and the rules are then used to develop business requirements documentation. Some examples of business processes involving complex business rules include invoice processing, credit checks, calculation of bonus and incentives, claim adjudication, inventory allocation and order allocation. This white paper discusses the need, methodology and agile implementation for BRE. While the BRE methodology and implementation discussed is applicable across all platforms and languages, the overall scope of this paper is limited to mainframe applications. Introduction
  • 3. External Document © 2020 Infosys Limited Need for business rules extraction Business rules extraction methodology Business Rules Extraction Mainframe Application Business rules Business rules Business rules Business rules SaaS and COTS Implementation Cloud-native Re-engineering System Documentation Rules Externalization Business requirements Business requirements Business requirements The need for business rules extraction arises for several reasons. Migrating applications out of mainframes is complex. These applications have been enhanced continuously in order to implement evolving business process changes and new requirements. The mainframe is one of the leading application development platforms. The architecture, design patterns, programming languages, databases, and tools are not standardized as they vary across companies. The complexity in mainframe applications arises from the learning curve involved in understanding the nuances of architecture, design and code complexity. It can also be attributed to the rare skills, and the sheer size of the code base. With the rapid growth of mobile, distributed and cloud computing, open source technologies, and customizable industry-specific COTS/SaaS products, many mainframe applications are being re-engineered as cloud-native web and mobile apps. Alternatively, they are being replaced with COTS and SaaS products. This has given rise to the need to retrofit legacy business logic into these new applications. Some legacy applications need to be re-architected to enable faster time to market. Thus, externalizing the rules helps change business rules and logic without code changes and extensive testing. Another benefit of extracting business rules is creating system or knowledge artefacts that can be used as training and reference material. While rules can be simply extracted from programs, implementing BRE for large applications or complex use cases requires a structured approach. There are implementation complexities like identifying the right use cases, identifying impacted programs, analyzing complex control flows in applications, understanding the domain and functionality of the application, translating programming logic to business language, and finally documenting the rules in the right format. This white paper discusses such implementation challenges and provides a structured approach for BRE. Fig 1: The need for business rules extraction Fig 2: What is a business rule? External Document © 2020 Infosys Limited Business Logic Conditions Looping Assignment Transforms Compute Validation Calls Data access Programming Logic Data Data Data Data Variables Business Rule Assertion Action Fact Business Logic
  • 4. External Document © 2020 Infosys Limited An application can have more than one functionality and each functionality can have many use cases as shown in Fig 3. A use case defines how a user interacts with an application to achieve a goal. Some mainframe applications can have batch jobs and programs without any user interaction. For the sake of simplicity, these batch jobs and programs can be grouped under a specific use case. A list of use cases should be identified before beginning BRE. Once all the relevant use cases are listed out, the associated programs of each use case should also be identified. Sometimes, a single online or batch program may contain the business logic for the entire use case. In other cases, the impacted programs of a particular use case can be many and may span different tiers and applications. Some use cases can be executed across multiple programs which are linked by files, databases and asynchronous message queues (MQ). The impacted programs or call chain from the main program can be identified through static code analysis. For programs that are linked dynamically through files and databases, dependency graphs and data flow diagrams can be used for impact analysis. A manual impact analysis is needed for associated programs using complex flows like asynchronous MQ or calls to external applications. It is important to identify all impacted programs along with their called programs including the entire chain of calls, copybooks and other libraries for analysis. Application discovery tools like IBM ADDI, Micro Focus Enterprise Analyzer and Infosys Ki can help with impact analysis and identifying program call chains. These tools also provide various application discovery features like generating program/data flows and CURD matrix. After the impact analysis is completed and documented, a business and system process flow analysis is done to understand the business process in detail and how it is executed through the impacted programs. The business process flow breaks down the business processes into input, output and sub-processes along with the order, interactions and decision flows between them. System process identifies the data flows between system components, key decision logic, input and output data, inbound and outbound interfaces. Once the process flows are documented, a data dictionary should be developed encompassing all data elements in the application and their business and functional descriptions. If data dictionaries are already available, it is important to confirm whether all program variables and database attributes are covered. Data dictionaries are critical to understand, contextualize and translate programming logic into business rules. The next step is the extraction of business rules. The application discovery tools mentioned above provide in-built or add- on features for rule extraction and storage. A business logic is programming logic applied on data. A business rule is an assertion of a fact and a consequent action. Any business process flow is comprised of a bunch of business rules. These rules can be linked together in a certain order. Fig 3: Application, functionality and use cases of BRE Applicaďż˝on Funcďż˝onality Funcďż˝onality Use case Use case Use case Use case Use case Use case External Document © 2020 Infosys Limited
  • 5. External Document © 2020 Infosys Limited Rule extraction involves stepping through the impacted programs, analyzing the programming logic and extracting the business rules (see section below:“Four steps in rule extraction”). A business rule is programming logic that asserts a fact (program data) based on some conditions and takes an action (like decision logic, database update, external calls, etc.). Fig 4: BRE approach Four steps in rule extraction Extracting business rules from a program is a complex process. The scope of the programming logic that is associated with a business rule should be analyzed based on the fact-assert-action model. Business rule extraction is made up of four steps: Step 1: Variable to data dictionary mapping This is done to understand the functional meaning of key variables defined in the program. Step 2: Rule extraction A BRE tool will be used to parse through the source code and extract rules. The applications discovery/BRE tools provide rich features for rule extraction, like statically navigating the program, different views to look at program structure, expand and browse dependent programs, etc. These tools help identify programming logic and write the associated rule descriptions. Step 3: Annotation/ categorization with metadata Metadata can be any additional information to classify and version the rule and includes rule types like computations, transformations and validations, program- related information like name, line numbers, paragraph names, pseudo code, etc. Step 4: Business language translation Rules extracted from the program should be translated into a business language that is suitable for artefacts like a business requirement document. This requires review and updates by domain and functional consultants. Business rules can be stored in a rule repository and classified according to applications, functionality and use cases. Use case 1 Use case analysis overview & details System process flow diagrams Business glossary/data dictionary Impacted applications and programs Business rule document 1 Use case analysis Business and system process analysis 3 Component impact analysis Business rules extraction 4 Application engineer and domain consultant Use case 3 Use case 2 2 External Document © 2020 Infosys Limited
  • 6. External Document © 2020 Infosys Limited Executing BRE in an agile manner A BRE project may involve extracting rules for large applications or a portfolio of applications involving several use cases. An agile project execution is needed to deliver incremental value continuously and mitigate risks. Agile execution involves breaking down the requirements into user stories, prioritizing user stories, planning for releases and iterations, and setting up agile processes like scrum meetings, demos and retrospection. Agile execution ensures continuous improvement based on customer feedback and enables the re-prioritization of deliverables based on client preferences. The first step in agile planning is to break down the BRE requirements. Fig 5 illustrates each BRE deliverable as a user story for simplicity. However, user stories can be scoped at a more granular level. A user story or a BRE deliverable will be further broken down into multiple tasks. An indicative list of BRE deliverables is also defined in Fig 5, and short codes have been assigned to them. The BRE deliverables for multiple use cases or for an entire functionality shall make up a release. The release is then broken down into iterations/sprints for the BRE deliverables/use cases. User stories are assigned to iterations based on their story points, which in turn depends on the complexity of the use case. The use case complexity is determined based on T-shirt sizing, but this is beyond the scope of this white paper. Fig 5: Breaking down the BRE requirements Epic Feature User story Tasks BRE deliverables for an application BRE deliverables for functionality of one or more use cases Analysis, extraction, documentation review, rework, and sign-off BRE deliverables for one use case (UC): Impact analysis, process flow diagram, data dictionary, and business rule extraction Requirementbreakdown High Medium Small Detailed Use case – UC Use case x – UCx Impact analysis – IA Process flow diagram – PFD Data dictionary – DD Business rule extraction – BRE Review and rework – RR BRE Agile Planning - Legend Use case - Impact analysis document Data dictionary Business rule extract Process flow diagram 1 BREdeliverables atausecaselevel UCx-IA UCx- PFD UCx-DD UCx- BRE Review and rework UCx-RR 2 3 4 5
  • 7. External Document © 2020 Infosys Limited Infosys Business Rules Extractor Core features Success drivers Infosys Business Rule Extractor is developed to provide an intuitive user interface to statically analyze legacy COBOL application and annotate rules for them. This tool also provides program management features like Dashboards, Task Assignment and Work Flow Notifications. • Program rule extraction: The user interface provides a program control flow menu for rule extraction • Use case rule chaining: The annotated program rules are chained as per the static execution flow at a use case level and includes the rules of the called programs • Dashboard: This provides interactive reports on the progress of rule extraction and the inventory statistics across inventory, use case and program levels • Administration: This includes various administrative features like user management, task allocation and use case declaration Infosys recommends the following steps to ensure the success of business rules extraction projects: • Identify and prioritize business rule intensive use cases for faster results and value. Identifying the right use case depends on the project needs and requires inputs and guidance from business SMEs • BRE programs require a mix of domain, functional and technical skills like understanding business processes, application functionality and technical knowledge for code analysis. Since it is often difficult to find SMEs with all the required skills, strong team collaboration is critical to develop the BRE deliverables • Accurately estimating the use case complexities, user stories and tasks can help avoid effort and schedule overruns • Use cases with high code complexity need the right code analysis technique (static versus dynamic). Thus, code complexity should be considered when estimating the use case complexity • Using the right tools for application discovery, business rule extraction, debugging and testing will improve efficiency. The approach and processes explained above is codified in Infosys Business Rule Extractor. The section on Infosys Business Rule Extractor explains its various capabilities and features. • Detailed documentation of the deliverables and representing the process flows and business rules in the right levels of abstraction can help different stakeholders understand and use the BRE deliverables • Keeping the business rules up to date with the latest application state will require integrating the application change management process with the BRE program
  • 8. © 2020 Infosys Limited, Bengaluru, India. All Rights Reserved. Infosys believes the information in this document is accurate as of its publication date; such information is subject to change without notice. Infosys acknowledges the proprietary rights of other companies to the trademarks, product names and such other intellectual property rights mentioned in this document. Except as expressly permitted, neither this documentation nor any part of it may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, printing, photocopying, recording or otherwise, without the prior permission of Infosys Limited and/ or any named intellectual property rights holders under this document. For more information, contact askus@infosys.com Infosys.com | NYSE: INFY Stay Connected Conclusion BRE plays a vital role in mainframe modernization projects. Given the ubiquity of mainframe platforms and the sprawl of mainframe applications, modernization is a steady trend. Mining business logic and rules out of complex legacy applications is necessary for modernization projects like re-engineering, COTS implementation and refactoring. While there is an ecosystem of vendors, tools and processes for business rules extraction, each BRE program should be carefully planned and developed considering the range of mainframe applications in terms of technology stack and code complexity. About the author Maran Gothandaraman is a Principal Consultant with the Infosys Mainframe Modernization Practice. He has over 18 years of experience delivering complex IT engagements across industry verticals with a focus on mainframe modernization, application development, and project/program management.