Complete Dissertation
Total Page:16
File Type:pdf, Size:1020Kb
VU Research Portal Bit-to-board analysis for IT decision making Kwiatkowski, L.M. 2012 document version Publisher's PDF, also known as Version of record Link to publication in VU Research Portal citation for published version (APA) Kwiatkowski, L. M. (2012). Bit-to-board analysis for IT decision making. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal ? Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. E-mail address: [email protected] Download date: 23. Sep. 2021 Bit-to-board analysis for IT decision making Łukasz Kwiatkowski This research was supported by the Netherlands Organisation for Scientific Research (NWO) under the Jacquard project number: 638.004.405 EQUITY: Exploring Quantifiable Information Technology Yields ISBN: 978-90-8659-624-9 © Łukasz Kwiatkowski 2012 VRIJE UNIVERSITEIT Bit-to-board analysis for IT decision making ACADEMISCH PROEFSCHRIFT ter verkrijging van de graad Doctor aan de Vrije Universiteit Amsterdam, op gezag van de rector magnificus prof.dr. L.M. Bouter, in het openbaar te verdedigen ten overstaan van de promotiecommissie van de Faculteit der Exacte Wetenschappen op maandag 19 november 2012 om 15.45 uur in de aula van de universiteit, De Boelelaan 1105 door Łukasz Marcin Kwiatkowski geboren te Krakow,´ Polen promotor: prof.dr. C. Verhoef copromotor: dr. R.J. Peters Preface Only my name appears on the cover of this book. However, there are many others whose support was invaluable in the process of carrying out the research described here. I would like to mention my promoter Chris Verhoef and co-promoter Rob Peters as they were key to delivering this book. My interaction with Chris was very rich in discussions that shaped this thesis. Frequent coffee and chocolate meetings with Rob passed in a nice atmosphere and were filled with plenty of insightful debates. I am very thankful to Rob for helping me come up with the Dutch summary of the thesis. I would also like to mention Steven Klusener here. Had Steven never introduced me into the EQUITY project my PhD journey probably would have never commenced. I very much appreciate the efforts of the thesis committee members: Prof. Dr. Mark van den Brand, Prof. Dr. Willem Jan Fokkink, Prof. Dr. Bert Kersten, Prof. Dr. Paul Klint, and Harry Sneed. Primarily for their useful feedback at the last stage of my work. And, also for their exceptionally efficient collaboration in preparation of the defense. My work on the PhD was set among great people who created lots of opportunities to enjoy the time. I want to mention: Bartek, Asia and Wojtek, Paweł and Kasia, Ela, Radek, Banan, Michał, Wojtek, Ania and Marcin, Ania and Jarek, Agnieszka and Przemek, Iwona and Janek, Sławek, Rafał and Kasia, Przemek, Tasos, Neuromancer, Laurenz, Erald, Peter, Vadim, Niels. My gratitude also goes to those whom I forgot to list here. Thank you for your company and support. Moreover, I would like to express my gratitude to my family members. They provided constant support and cheered me up along the way despite the distance that separated us. My rare trips back home always allowed me to recharge my batteries. And, that was often indispensable. Last but not least I would like to thank Agnieszka. It is hard to express how grateful I am for accompanying me in this journey and supporting in all sorts of ways. I certainly owe you an apology for the fact that even though most of the time I was physically present I often had my mind elsewhere. We will have to make it up. i ii Contents Prefacei Contents iii 1 Introduction1 1.1 Excavating facts...............................1 1.1.1 Locating the site..........................2 1.2 IT in business................................2 1.2.1 IT management...........................3 1.2.2 Decision making..........................3 1.3 Popping the hood..............................5 1.3.1 Bit level bits ..............................6 1.3.2 ... and the board-level impact....................8 1.4 Management data source..........................8 1.4.1 Tackling big data ..........................9 1.5 EQUITY research..............................9 1.5.1 Context for this thesis....................... 10 1.6 Thesis outline and contributions...................... 11 1.6.1 Recovering management information from source code...... 11 1.6.2 Reducing operational costs through MIPS management...... 12 1.6.3 Samenvatting............................ 13 2 Recovering management information from source code 15 2.1 Introduction................................. 15 2.2 Management treasury: codebase...................... 21 2.2.1 Management quandaries...................... 21 2.2.2 Information basis.......................... 22 2.2.3 Case study............................. 23 2.2.4 Source code facts.......................... 24 iii CONTENTS 2.3 Codebase construction........................... 28 2.3.1 Technology............................. 28 2.3.2 Analysis facility.......................... 30 2.3.3 Separator.............................. 31 2.3.4 Metrics computation........................ 34 2.3.5 Historical data........................... 36 2.3.6 Code generators.......................... 38 2.4 Screening the data.............................. 43 2.4.1 Data normalization......................... 44 2.4.2 Portfolio coverage......................... 45 2.4.3 Plausibility checks......................... 46 2.5 Information recovery............................ 50 2.5.1 Function Points........................... 51 2.5.2 IT benchmarks........................... 52 2.5.3 Portfolio dynamics......................... 55 2.6 Managerial insights............................. 58 2.6.1 Size structure............................ 58 2.6.2 Essential information........................ 61 2.6.3 Vendor-locks............................ 66 2.6.4 Nuts and bolts........................... 71 2.7 Discussion.................................. 76 2.8 Conclusions................................. 77 3 Reducing operational costs through MIPS management 79 3.1 Introduction................................. 79 3.1.1 Targeting source code....................... 81 3.1.2 Business reality........................... 81 3.1.3 A light-weight approach...................... 83 3.1.4 Related work............................ 84 3.1.5 Organization of this chapter.................... 85 3.2 MIPS: cost component........................... 85 3.2.1 MIPS and MSU........................... 86 3.2.2 Transactions............................ 87 3.2.3 Database impact.......................... 87 3.2.4 CPU usage sources......................... 91 3.3 DB2 bottlenecks............................... 91 3.3.1 Performance............................ 91 3.3.2 Playground............................. 92 3.3.3 Potentially inefficient constructs.................. 94 3.3.4 Getting the data........................... 99 3.4 Reaching for code.............................. 105 3.4.1 Implementation of transactions................... 106 3.4.2 Portfolio exploration........................ 107 3.4.3 Code properties........................... 110 3.5 MIPS-reduction project........................... 113 iv Bit-to-board analysis for IT decision making 3.5.1 Project scope............................ 113 3.5.2 Selected modules.......................... 114 3.5.3 Changes............................... 115 3.5.4 Impact analysis........................... 119 3.5.5 MSU reduction........................... 120 3.5.6 Summary.............................. 123 3.6 Portfolio-wide control............................ 124 3.6.1 DB2 code.............................. 125 3.6.2 Major MIPS consumers...................... 127 3.6.3 Low-hanging fruit......................... 130 3.6.4 Improvement scenarios....................... 134 3.7 Practical issues............................... 137 3.7.1 Phase I............................... 137 3.7.2 Phase II............................... 138 3.8 Discussion.................................. 139 3.8.1 Vendor management........................ 139 3.8.2 CPU resource leaks......................... 141 3.9 Conclusions................................. 142 4 Samenvatting 145 4.1 Broncode: een goudmijn van management informatie........... 145 4.2 Case studie 1: strategisch IT management................. 148 4.3 Case studie 2: verlaging operationele kosten door MIPS management.. 150 Bibliography 153 v CONTENTS vi CHAPTER 1 Introduction 1.1 Excavating facts We live in the present and make decisions which affect our future. Most of us crave for making decisions that lead to achieving the previously assumed goals. It is possible to make decisions ad hoc and in this way attain the desired results. Such an approach, how- ever, is characterized by a great uncertainty and requires clairvoyance. Sadly, experts with such sense are rarely encountered in nature and therefore we need to be able to resort to some decision making process which