Exit Legacy: Atos Syntel's Solution Accelerator for Faster, Cheaper

Total Page:16

File Type:pdf, Size:1020Kb

Exit Legacy: Atos Syntel's Solution Accelerator for Faster, Cheaper Exit Legacy: Atos Syntel’s Solution Accelerator for Faster, Cheaper, and Derisked Legacy Transformation Legacy software is embedded in customer organizations with extreme complexity. The problems with legacy applications are lack of agility, skills shortage, and high costs of ownership. In the new digital era, having IT systems that are agile, proactive, and flexible is the key to business growth. Customers typically face the following challenges while transforming their legacy applications: • Migration of legacy applications/systems is a time consuming and costly affair • A number of errors arise due to the manual method of execution • Generally migration is done for legacy technologies and finding the right resources is a challenge Legacy modernization provides solutions to all these problems and helps customers get into a non-legacy distributed platform with cloud adoption, and digital and analytics capabilities. Atos Syntel’s Exit Legacy portal hosts various solution accelerators that help in legacy modernization. With Exit Legacy, transforming your legacy is faster, risk-free, and cheaper. Exit Legacy: Atos Syntel’s Solution Accelerator for Faster, Cheaper, and Derisked Legacy Transformation BUSINESS Atos Syntel’s Solution BENEFITS Atos Syntel’s Exit Legacy portal is aligned to the modernization of project life cycles to ensure the • ~50% faster assessment modernization of the entire eco-system, instead of just application components or data. • ~50% reduction in manual Exit Legacy Tool Set efforts Inventory Analysis Tool: • ~50% costs savings over manual conversion • ~50% savings in project • Converted code is cloud compatible migration cost • In-depth portfolio analysis • Supports mainframe and distributed legacy JCL to Spring Batch: • ~70% automation in • More than 25 dashboards and reports • Generates Eclipse project language and database Business Rules Extractor: • ~50% costs savings over manual conversion migration • Interactive rules extraction • ~25% improved performance • No vendor lock-in • Deduplication of rules PL/I to Java: • Derisked and accelerated • Program flowcharting • Supports batch file & DB2 operations as well as migration • SEED based impact analysis EBCDIC and ASCII encoding • Code Auto Remediation • Supports Agile • Complete code coverage • 35% improved testing Time due to transcoding modernization roadmap Application Component Editor (ACE): • Built-in syntax highlighter NATURAL to COBOL • Supports 50+ languages • Auto generation of structured COBOL program • No reskilling of people and COPYBOOKs • Maintenance of uploaded components • 70% of possible operands of NATURAL language DIFFERENTIATORS VSAM to RDBMS: covered • Selective file based migration • Automatic creation of cursors for Adabas MU, PE • ~60% automated conversion fields to maintain referential integrity • Migration lifecycle based • Converts data access syntaxes for DB2 portal • Target DB optimization IMS to RDBMS: NATURAL to Java: • Support for legacy and • Covers transcoding from NATURAL language to distributed legacy • Risk-free conversion • Target database Optimization Java classes • Inbuilt code quality checks • ~70% automation • 70% of possible operands of NATURAL language • SEED based impact covered ADABAS to RDBMS: • Converts data access syntaxes across data analysis and auto • Quick generation of RDBMS schema sources documentation • Optimization of target schema Code Optimization: • Optimized target database • ~65% automation in migration • Code Re-structuring by intervening during Assembler to COBOL: • Code standardization migration • Covers 65% assembler operands • Code formatting • Domain based • Structured COBOL and copybooks generation • Dead code removal categorization of inventory • Converts data access syntaxes across data Cloud On-boarding: Sources and business rules • Containerization • No run time dependency COBOL to Java: • Code analysis for cloud compatibility • Allows phased migration • Converts CICS/COBOL/DB2 to JAVA/ORACLE • Significant automation for the application cloud adoption • ACE for seamless and Exit Legacy Workflow transparent conversion Customer Setup Subscribe Services Gather Inventory • Exit Legacy admin sets up a • EM subscribes services for • Gather legacy inventory like jobs, KEY FEATURES customer and assigns an migration/ modernization programs, and copybooks engagement manager • Admin approves services/ • Categorize inventory • Engagement manager creates subscriptions components as per business • Subscription based project and assigns a project processes manager for the project service • Team is assigned by the project • Role based access manager control Language Migration Database Migration Analysis Workbench • Project based approach • ASSEMBLER to COBOL • IMS to RDBMS • Inventory Analysis tool • COBOL to JAVA • VSAM to RDBMS • Business Rules Extraction • One time inventory • JCL to Spring Batch • ADABAS to RDBMS upload of all subscriptions Validate Outputs • PL/I to Java • NATURAL to COBOL • Check validation reports and services • NATURAL to Java <>...</> for converted code • Robust dashboard and • Compile and test Cloud On-boarding Code Optimization reporting converted code • Containerization • Code Re-structuring • Provide feedback on • Code analysis for cloud • Code standardization • Installation in customer converted code portal compatibility • Code formatting environment • Dead code removal Application Component Editor (ACE) User Management Subscription Management Project Management For more information, visit us at www.atos-syntel.net © 2018, SYNTEL INC. .
Recommended publications
  • The Linux Kernel Module Programming Guide
    The Linux Kernel Module Programming Guide Peter Jay Salzman Michael Burian Ori Pomerantz Copyright © 2001 Peter Jay Salzman 2007−05−18 ver 2.6.4 The Linux Kernel Module Programming Guide is a free book; you may reproduce and/or modify it under the terms of the Open Software License, version 1.1. You can obtain a copy of this license at http://opensource.org/licenses/osl.php. This book is distributed in the hope it will be useful, but without any warranty, without even the implied warranty of merchantability or fitness for a particular purpose. The author encourages wide distribution of this book for personal or commercial use, provided the above copyright notice remains intact and the method adheres to the provisions of the Open Software License. In summary, you may copy and distribute this book free of charge or for a profit. No explicit permission is required from the author for reproduction of this book in any medium, physical or electronic. Derivative works and translations of this document must be placed under the Open Software License, and the original copyright notice must remain intact. If you have contributed new material to this book, you must make the material and source code available for your revisions. Please make revisions and updates available directly to the document maintainer, Peter Jay Salzman <[email protected]>. This will allow for the merging of updates and provide consistent revisions to the Linux community. If you publish or distribute this book commercially, donations, royalties, and/or printed copies are greatly appreciated by the author and the Linux Documentation Project (LDP).
    [Show full text]
  • Writing Your First Linux Kernel Module
    Writing your first Linux kernel module Praktikum Kernel Programming University of Hamburg Scientific Computing Winter semester 2014/2015 Outline ● Before you start ● Hello world module ● Compile, load and unload ● User space VS. kernel space programing ● Summary Before you start ● Define your module’s goal ● Define your module behaviour ● Know your hardware specifications ○ If you are building a device driver you should have the manual ● Documentation ○ /usr/src/linux/Documentation ○ make { htmldocs | psdocs | pdfdocks | rtfdocks } ○ /usr/src/linux/Documentation/DocBook Role of the device driver ● Software layer between application and device “black boxes” ○ Offer abstraction ■ Make hardware available to users ○ Hide complexity ■ User does not need to know their implementation ● Provide mechanism not policy ○ Mechanism ■ Providing the flexibility and the ability the device supports ○ Policy ■ Controlling how these capabilities are being used Role of the device driver ● Policy-free characteristics ○ Synchronous and asynchronous operations ○ Exploit the full capabilities of the hardware ○ Often a client library is provided as well ■ Provides capabilities that do not need to be implemented inside the module Outline ● Before you start ● Hello world module ● Compile, load and unload ● User space VS. kernel space programing ● Summary Hello world module /* header files */ #include <linux/module.h> #include <linux/init.h> /* the initialization function */ /* the shutdown function */ static int __init hello_init(void) { static void __exit hello_exit(void)
    [Show full text]
  • Name Synopsis Description
    Perl version 5.10.0 documentation - vmsish NAME vmsish - Perl pragma to control VMS-specific language features SYNOPSIS use vmsish; use vmsish 'status';# or '$?' use vmsish 'exit'; use vmsish 'time'; use vmsish 'hushed'; no vmsish 'hushed'; vmsish::hushed($hush); use vmsish; no vmsish 'time'; DESCRIPTION If no import list is supplied, all possible VMS-specific features areassumed. Currently, there are four VMS-specific features available:'status' (a.k.a '$?'), 'exit', 'time' and 'hushed'. If you're not running VMS, this module does nothing. vmsish status This makes $? and system return the native VMS exit statusinstead of emulating the POSIX exit status. vmsish exit This makes exit 1 produce a successful exit (with status SS$_NORMAL),instead of emulating UNIX exit(), which considers exit 1 to indicatean error. As with the CRTL's exit() function, exit 0 is also mappedto an exit status of SS$_NORMAL, and any other argument to exit() isused directly as Perl's exit status. vmsish time This makes all times relative to the local time zone, instead of thedefault of Universal Time (a.k.a Greenwich Mean Time, or GMT). vmsish hushed This suppresses printing of VMS status messages to SYS$OUTPUT andSYS$ERROR if Perl terminates with an error status. and allowsprograms that are expecting "unix-style" Perl to avoid having to parseVMS error messages. It does not suppress any messages from Perlitself, just the messages generated by DCL after Perl exits. The DCLsymbol $STATUS will still have the termination status, but with ahigh-order bit set: EXAMPLE:$ perl -e"exit 44;" Non-hushed error exit%SYSTEM-F-ABORT, abort DCL message$ show sym $STATUS$STATUS == "%X0000002C" $ perl -e"use vmsish qw(hushed); exit 44;" Hushed error exit $ show sym $STATUS $STATUS == "%X1000002C" The 'hushed' flag has a global scope during compilation: the exit() ordie() commands that are compiled after 'vmsish hushed' will be hushedwhen they are executed.
    [Show full text]
  • A Concurrent PASCAL Compiler for Minicomputers
    512 Appendix A DIFFERENCES BETWEEN UCSD'S PASCAL AND STANDARD PASCAL The PASCAL language used in this book contains most of the features described by K. Jensen and N. Wirth in PASCAL User Manual and Report, Springer Verlag, 1975. We refer to the PASCAL defined by Jensen and Wirth as "Standard" PASCAL, because of its widespread acceptance even though no international standard for the language has yet been established. The PASCAL used in this book has been implemented at University of California San Diego (UCSD) in a complete software system for use on a variety of small stand-alone microcomputers. This will be referred to as "UCSD PASCAL", which differs from the standard by a small number of omissions, a very small number of alterations, and several extensions. This appendix provides a very brief summary Of these differences. Only the PASCAL constructs used within this book will be mentioned herein. Documents are available from the author's group at UCSD describing UCSD PASCAL in detail. 1. CASE Statements Jensen & Wirth state that if there is no label equal to the value of the case statement selector, then the result of the case statement is undefined. UCSD PASCAL treats this situation by leaving the case statement normally with no action being taken. 2. Comments In UCSD PASCAL, a comment appears between the delimiting symbols "(*" and "*)". If the opening delimiter is followed immediately by a dollar sign, as in "(*$", then the remainder of the comment is treated as a directive to the compiler. The only compiler directive mentioned in this book is (*$G+*), which tells the compiler to allow the use of GOTO statements.
    [Show full text]
  • Shell Code for Beginners
    Shell Code For Beginners Beenu Arora Site: www.BeenuArora.com Email: [email protected] ################################################################ # .___ __ _______ .___ # # __| _/____ _______| | __ ____ \ _ \ __| _/____ # # / __ |\__ \\_ __ \ |/ // ___\/ /_\ \ / __ |/ __ \ # # / /_/ | / __ \| | \/ <\ \___\ \_/ \/ /_/ \ ___/ # # \____ |(______/__| |__|_ \\_____>\_____ /\_____|\____\ # # \/ \/ \/ # # ___________ ______ _ __ # # _/ ___\_ __ \_/ __ \ \/ \/ / # # \ \___| | \/\ ___/\ / # # \___ >__| \___ >\/\_/ # # est.2007 \/ \/ forum.darkc0de.com # ################################################################ What is a shell Code? Shellcode is defined as a set of instructions injected and then executed by an exploited program. Shellcode is used to directly manipulate registers and the functionality of a exploited program. We can of course write shell codes in the high level language but would let you know later why they might not work for some cases, so assembly language is preferred for this. I would take an clean example of the exit() syscall used for exiting from a program. Many of you might be wondered to see why this being used is, the reason is the newer kernel don’t allow anymore the code execution from the stack so we have to use some C library wrapper or libc (responsible for providing us the malloc function). Usage at darker site: We write shellcode because we want the target program to function in a manner other than what was intended by the designer. One way to manipulate the program is to force it to make a system call or syscall. System calls in Linux are accomplished via software interrupts and are called with the int 0x80 instruction.
    [Show full text]
  • An Introduction to Python
    An Introduction to Python Day 1 Simon Mitchell [email protected] Why Python? * Clear code * Great beginner language * Powerful text manipulation * Wrangle large data files * Great compliment to other languages * Large user group * Supports many advanced features Warning: Spacing is important! Wrong: Error: Correct: No Error: Open A Terminal * Open a terminal: * Mac: cmd + space then type terminal and press enter * Windows: Start -> Program Files -> Accessories -> Command Prompt. * Type “python” (no quotes). Exit() to exit python. This is python Hello World Launch python Call the built in function print, which displays whatever comes after the command. Put any message in quotes after the print command. The command has finished and python is ready for the next command. >>> means tell me what to do now! Getting help - interactive Getting help – single command But usually just Google! If you got stuck on something, someone else probably has. Let’s get programming - Variables Set a variable with equals Display a variable by typing its name Variables can be text, numbers, boolean (True/ False) and many more things. Capitalization is important for True/ False Numeric Operators Add + Subtract – Multiply * Divide / Power ** Modulo (remainder) % Reassigning Variables Reassign with equals. (Same as assigning) ????? Warning! In some version of python division might not do what you expect. Integer division gives an integer result. Types of number Integer: Plus and minus. No decimal points or commas Float: Decimal points or scientific notation okay. 2e-2 = 2 x 10-2 Working With Numbers What is the minimum of these numbers: What is the maximum of these numbers: What type of variable is this? Remember that str(anything) makes that variable into a string: Working With Text Single or double quotes.
    [Show full text]
  • Standardizing SAS Code for Quality Programs Clarence Wm
    Standardizing SAS Code for Quality Programs Clarence Wm. Jackson, CQA, Change Manager City of Dallas, Communication and Information Services, Change Management Group Abstract and Introduction SAS software is a powerful programming system that allows even casual users to write very complicated solutions for business problems. It is free form, meaning that it has no syntactical constraints for defining the program structure, as is found in such programming languages as COBOL and ALC. However, the free form of SAS code can be a mixed blessing, where code maintenance is concemed. Whenever changes in the SAS code are required, if someone other than the original programmer has to make the changes, this may result in errors, lost productivity and a reduction in the consistency and overall quality of the program. This situation may be avoided by the implementation of appropriate standards for the writing of SAS programs. This paper will review industry standards for other programming languages, and will discuss how SAS code could be standardized. The paper also will review the benefits and opportunities for quality improvement. Standards Provide Basis for Quality What is a "Standard"? The American Heritage dictionary defines "standard" as "an acknowledged measure 0/ comparison/or quantitative or qualitative value; criterion; nonn; a degree or level 0/ requirement, excellence or attainment. " There are two categories of standards related to Information Technology, 'industry' and 'installation'. The industry standards are those set by a recognized standards organization meant to facilitate the efficient interchange of information between organizations and companies. The installation standards serve the purpose of providing guidelines for the efficient operation of a single installation or shop.
    [Show full text]
  • System Calls & Signals
    CS345 OPERATING SYSTEMS System calls & Signals Panagiotis Papadopoulos [email protected] 1 SYSTEM CALL When a program invokes a system call, it is interrupted and the system switches to Kernel space. The Kernel then saves the process execution context (so that it can resume the program later) and determines what is being requested. The Kernel carefully checks that the request is valid and that the process invoking the system call has enough privilege. For instance some system calls can only be called by a user with superuser privilege (often referred to as root). If everything is good, the Kernel processes the request in Kernel Mode and can access the device drivers in charge of controlling the hardware (e.g. reading a character inputted from the keyboard). The Kernel can read and modify the data of the calling process as it has access to memory in User Space (e.g. it can copy the keyboard character into a buffer that the calling process has access to) When the Kernel is done processing the request, it restores the process execution context that was saved when the system call was invoked, and control returns to the calling program which continues executing. 2 SYSTEM CALLS FORK() 3 THE FORK() SYSTEM CALL (1/2) • A process calling fork()spawns a child process. • The child is almost an identical clone of the parent: • Program Text (segment .text) • Stack (ss) • PCB (eg. registers) • Data (segment .data) #include <sys/types.h> #include <unistd.h> pid_t fork(void); 4 THE FORK() SYSTEM CALL (2/2) • The fork()is one of the those system calls, which is called once, but returns twice! Consider a piece of program • After fork()both the parent and the child are ..
    [Show full text]
  • C Programming Tutorial
    C Programming Tutorial C PROGRAMMING TUTORIAL Simply Easy Learning by tutorialspoint.com tutorialspoint.com i COPYRIGHT & DISCLAIMER NOTICE All the content and graphics on this tutorial are the property of tutorialspoint.com. Any content from tutorialspoint.com or this tutorial may not be redistributed or reproduced in any way, shape, or form without the written permission of tutorialspoint.com. Failure to do so is a violation of copyright laws. This tutorial may contain inaccuracies or errors and tutorialspoint provides no guarantee regarding the accuracy of the site or its contents including this tutorial. If you discover that the tutorialspoint.com site or this tutorial content contains some errors, please contact us at [email protected] ii Table of Contents C Language Overview .............................................................. 1 Facts about C ............................................................................................... 1 Why to use C ? ............................................................................................. 2 C Programs .................................................................................................. 2 C Environment Setup ............................................................... 3 Text Editor ................................................................................................... 3 The C Compiler ............................................................................................ 3 Installation on Unix/Linux ............................................................................
    [Show full text]
  • Unix Login Profile
    Unix login Profile A general discussion of shell processes, shell scripts, shell functions and aliases is a natural lead in for examining the characteristics of the login profile. The term “shell” is used to describe the command interpreter that a user runs to interact with the Unix operating system. When you login, a shell process is initiated for you, called your login shell. There are a number of "standard" command interpreters available on most Unix systems. On the UNF system, the default command interpreter is the Korn shell which is determined by the user’s entry in the /etc/passwd file. From within the login environment, the user can run Unix commands, which are just predefined processes, most of which are within the system directory named /usr/bin. A shell script is just a file of commands, normally executed at startup for a shell process that was spawned to run the script. The contents of this file can just be ordinary commands as would be entered at the command prompt, but all standard command interpreters also support a scripting language to provide control flow and other capabilities analogous to those of high level languages. A shell function is like a shell script in its use of commands and the scripting language, but it is maintained in the active shell, rather than in a file. The typically used definition syntax is: <function-name> () { <commands> } It is important to remember that a shell function only applies within the shell in which it is defined (not its children). Functions are usually defined within a shell script, but may also be entered directly at the command prompt.
    [Show full text]
  • Iterating in Perl: Loops
    Iterating in Perl: Loops - Computers are great for doing repetitive tasks. - All programming languages come with some way of iterating over some interval. - These methods of iteration are called ‘loops’. - Perl comes with a variety of loops, we will cover 4 of them: 1. if statement and if-else statement 2. while loop and do-while loop 3. for loop 4. foreach loop if statement Syntax: - if the conditional is ‘true’ then the if(conditional) body of the statement (what’s in { between the curly braces) is …some code… executed. } #!/usr/bin/perl -w $var1 = 1333; Output? if($var1 > 10) 1333 is greater than 10 { print “$var1 is greater than 10\n”; } exit; if-else statement Syntax: -if the conditional is ‘true’ then execute if(conditional) the code within the first pair of curly { braces. …some code… } - otherwise (else) execute the code in else the next set of curly braces { …some different code… } Output? #!/usr/bin/perl -w 13 is less than 100 $var1 = 13; if($var1 > 100) { print “$var1 is greater than 100\n”; } else { print “$var1 is less than 100\n”; } exit; Comparisons that are Allowed - In perl you can compare numbers and strings within conditionals - The comparison operators are slightly different for each one - The most common comparison operators for strings: syntax meaning example lt Less than “dog” lt “cat” False! d > c gt Greater than “dog” gt “cat” True! d > c le Less than or equal to “dog” le “cat” False! d > c ge Greater than or equal to “dog” ge “cat” True! d > c eq Equal to “cat” eq “cat” True! c = c ne Not equal to “cat” eq “Cat”
    [Show full text]
  • Lecture 22 Systems Programming Process Control
    Lecture 22 Systems Programming Process Control A process is defined as an instance of a program that is currently running. A uni processor system can still execute multiple processes giving the appearance of a multi- processor machine. A call to a program spawns a process. If a mail program is called by n users then n processes or instances are created and executed by the unix system. Many operating systems including windows and unix executes many processes at the same time. When a program is called, a process is created and a process ID is issued. The process ID is given by the function getpid() defined in <unistd.h>. The prototype for pid( ) is given by #include < unistd.h > pid_t getpid(void); In a uni-processor machine, each process takes turns running and for a short duration, a process takes time interval called a timeslice. The unix command ps can be used to list all current process status. ps PID TTY TIME CMD 10150 pts/16 00:00:00 csh 31462 pts/16 00:00:00 ps The command ps lists the process ID (PID), the terminal name(TTY), the amount of time the process has used so far(TIME) and the command it is executing(CMD). Ps command only displays the current user processes. But we can get all the processes with the flag (- a) and in long format with flag (-l) ps –a ps -l ps -al Information provided by each process may include the following. PID The process ID in integer form PPID The parent process ID in integer form STAT The state of the process TIME CPU time used by the process (in seconds) TT Control terminal of the process COMMAND The user command that started the process Copyright @ 2008 Ananda Gunawardena Each process has a process ID that can be obtained using the getpid() a system call declared in unistd.h.
    [Show full text]