ABSTRACT
Existing research in legacy system modernization has traditionally focused on technical challenges, and takes the standpoint that legacy systems are obsolete, yet crucial for an organization's operation. Nonetheless, it remains unclear whether practitioners in the industry also share this perception. This paper describes the outcome of an exploratory study in which 26 industrial practitioners were interviewed on what makes a software system a legacy system, what the main drivers are that lead to the modernization of such systems, and what challenges are faced during the modernization process. The findings of the interviews have been validated by means of a survey with 198 respondents. The results show that practitioners value their legacy systems highly, the challenges they face are not just technical, but also include business and organizational aspects.
- S. Adolph, W. Hall, and P. Kruchten. Using grounded theory to study the experience of software development. Empirical Software Engineering, 16(4):487–513, 2011. Google ScholarDigital Library
- W. S. Adolph. Cash cow in the tar pit: Reengineering a legacy system. IEEE Software, 13(3):41–47, 1996. Google ScholarDigital Library
- A. Alderson and H. Shah. Viewpoints on legacy systems. Communications of the ACM, 42(3):115–116, 1999. Google ScholarDigital Library
- A. A. Almonaies, J. R. Cordy, and T. R. Dean. Legacy system evolution towards service-oriented architecture. In International Workshop on SOA Migration and Evolution, pages 53–62, 2010.Google Scholar
- E. C. Arranga and F. P. Coyle. Cobol: Perception and reality. IEEE Computer, 30(3):126–128, 1997. Google ScholarDigital Library
- B. V. Batlajery, R. Khadka, A. M. Saeidi, S. Jansen, and J. Hage. Industrial perception of legacy software system and their modernization. TR UU-CS-2014-004, Utrecht University, 2014.Google Scholar
- L. A. Belady and M. M. Lehman. A model of large program development. IBM Systems Journal, 15(3):225–252, 1976. Google ScholarDigital Library
- K. Bennett. Legacy systems: Coping with success. IEEE Software, 12(1):19–23, 1995. Google ScholarDigital Library
- K. H. Bennett and V. T. Rajlich. Software maintenance and evolution: A roadmap. In 22nd International Conference on Software Engineering, pages 73–87. ACM, 2000. Google ScholarDigital Library
- A. Bianchi, D. Caivano, V. Marengo, and G. Visaggio. Iterative reengineering of legacy systems. Transactions on Software Engineering, 29(3):225–241, 2003. Google ScholarDigital Library
- J. Bisbal, D. Lawless, B. Wu, and J. Grimson. Legacy information systems: Issues and directions. IEEE Software, 16(5):103–111, 1999. Google ScholarDigital Library
- J. Bisbal, D. Lawless, B. Wu, J. Grimson, R. Wade, V.and Richardson, and D. OSullivan. A survey of research into legacy system migration. TR TCD-CS-1997-01, Trinity College Dublin, 1997.Google Scholar
- M. L. Brodie. The promise of distributed computing and the challenges of legacy systems. In Advanced Database Systems, pages 1–28. Springer, 1992. Google ScholarDigital Library
- M. L. Brodie and M. Stonebraker. DARWIN: On the incremental migration of legacy information systems. TR TR-022-10-92-165, GTE Labs Inc, 1993.Google Scholar
- M. L. Brodie and M. Stonebraker. Migrating legacy systems: Gateways, interfaces & the incremental approach. Morgan Kaufmann Publishers Inc., 1995. Google ScholarDigital Library
- G. Canfora, A. Cimitile, A. De Lucia, and G. A. Di Lucca. Decomposing legacy programs: A first step towards migrating to client–server platforms. Journal of Systems and Software, 54(2):99–110, 2000. Google ScholarDigital Library
- M. Colosimo, A. D. Lucia, G. Scanniello, and G. Tortora. Evaluating legacy system migration technologies through empirical studies. Information and Software Technology, 51(2):433–447, 2009. Google ScholarDigital Library
- B. Cornelissen, A. Zaidman, A. van Deursen, L. Moonen, and R. Koschke. A systematic survey of program comprehension through dynamic analysis. Transactions on Software Engineering, 35(5):684–702, 2009. Google ScholarDigital Library
- A. De Lucia, R. Francese, G. Scanniello, and G. Tortora. Developing legacy system migration methods and tools for technology transfer. Software: Practice and Experience, 38(13):1333–1364, 2008. Google ScholarDigital Library
- S. Easterbrook, J. Singer, M.-A. Storey, and D. Damian. Selecting empirical methods for software engineering research. In Guide to Advanced Empirical Software Engineering, pages 285–311. Springer, 2008.Google Scholar
- B. G. Glaser and A. L. Strauss. The discovery of grounded theory: Strategies for qualitative research. Aldine Transaction, Chicago, Illionios, 1967.Google Scholar
- M. Goedicke and U. Zdun. Piecemeal legacy migrating with an architectural pattern language: A case study. Journal of Software Maintenance and Evolution: Research and Practice, 14(1):1–30, 2002. Google ScholarCross Ref
- N. Golafshani. Understanding reliability and validity in qualitative research. The Qualitative Report, 8(4):597–607, 2003.Google Scholar
- W. Hasselbring, R. Reussner, H. Jaekel, J. Schlegelmilch, T. Teschke, and S. Krieghoff. The dublo architecture pattern for smooth migration of business information systems: An experience report. In 26th International Conference on Software Engineering, pages 117–126. IEEE, 2004. Google ScholarDigital Library
- R. Khadka, A. Saeidi, A. Idu, J. Hage, and S. Jansen. Legacy to SOA evolution: A systematic literature review. In In AD Ionita, M. Litoiu, & G. Lewis (Eds.) Migrating Legacy Applications: Challenges in Service Oriented Architecture and Cloud Computing Environments, pages 40–70. IGI Global, 2013.Google Scholar
- R. Khadka, A. Saeidi, S. Jansen, J. Hage, and G. Haas. Migrating a large scale legacy application to SOA: Challenges and lessons learned. In 20th Working Conference on Reverse Engineering, pages 425–432. IEEE, 2013.Google Scholar
- B. Kitchenham and S. L. Pfleeger. Principles of survey research: Part 5: Populations and samples. Software Engineering Notes, 27(5):17–20, 2002. Google ScholarDigital Library
- J. Lavery, C. Boldyreff, B. Ling, and C. Allison. Modelling the evolution of legacy systems to web-based systems. Journal of Software Maintenance and Evolution: Research and Practice, 16(1-2):5–30, 2004. Google ScholarDigital Library
- B. P. Lientz, E. B. Swanson, and G. E. Tompkins. Characteristics of application software maintenance. Communications of the ACM, 21(6):466–471, 1978. Google ScholarDigital Library
- J. Liu, D. Batory, and C. Lengauer. Feature-oriented refactoring of legacy applications. In 28th International Conference on Software Engineering, pages 112–121. ACM, 2006. Google ScholarDigital Library
- A. Mehta and G. T. Heineman. Evolving legacy system features into fine-grained components. In 24th International Conference on Software Engineering, pages 417–427. ACM, 2002. Google ScholarDigital Library
- M. Mortensen, S. Ghosh, and J. M. Bieman. Aspect-oriented refactoring of legacy applications: An evaluation. Transactions on Software Engineering, 38(1):118–140, 2012. Google ScholarDigital Library
- S. Murer, B. Bonati, and F. J. Furrer. Managed evolution: A strategy for very large information systems. Springer, 2011. Google ScholarDigital Library
- NASCIO. Digital states at risk modernizing legacy systems. Technical report, NASCIO, 2008.Google Scholar
- K. A. Nasr, H.-G. Gross, and A. van Deursen. Realizing service migration in industry–lessons learned. Journal of Software: Evolution and Process, 25(6):639–661, 2013.Google ScholarCross Ref
- A. Quilici. Reverse engineering of legacy systems: A path toward success. In 17th International Conference on Software Engineering, pages 333–336. ACM, 1995. Google ScholarDigital Library
- M. Razavian and P. Lago. A frame of reference for SOA migration. In Towards a Service-Based Internet, pages 150–162. Springer, 2010.Google Scholar
- M. Razavian and P. Lago. A survey of SOA migration in industry. In G. Kappel, Z. Maamar, and H. R. Motahari-Nezhad, editors, Service-Oriented Computing, volume 7084 of LNCS, pages 618–626. Springer, 2011. Google ScholarDigital Library
- P. Runeson and M. Höst. Guidelines for conducting and reporting case study research in software engineering. Empirical Software Engineering, 14(2):131–164, 2009. Google ScholarDigital Library
- R. C. Seacord, D. Plakosh, and L. A. Grace. Modernizing legacy systems: Software technologies, engineering processes, and business practices. Addison-Wesley Professional, 2003. Google ScholarDigital Library
- H. M. Sneed. Software renewal: A case study. IEEE Software, 1(3):56–63, 1984. Google ScholarDigital Library
- H. M. Sneed. Risks involved in reengineering projects. In 6th Working Conference on Reverse Engineering, pages 204–211. IEEE, 1999. Google ScholarDigital Library
- SQuaRE. Systems and software quality requirements and evaluation (SQuaRE)– system and software quality models. Standard ISO/IEC 25010, ISO, 2011.Google Scholar
- E. Stroulia, M. El-Ramly, and P. Sorenson. From legacy to web through interaction modeling. In 18th International Conference on Software Maintenance, pages 320–329. IEEE, 2002. Google ScholarDigital Library
- T. Sucharov and P. Rice. The burden of legacy. Online: http://www.ncc.co.uk/article/?articleid=15665, 2008.Google Scholar
- P. Thiran, J.-L. Hainaut, G.-J. Houben, and D. Benslimane. Wrapper-based evolution of legacy information systems. Transactions on Software Engineering and Methodology, 15(4):329–359, 2006. Google ScholarDigital Library
- M. Torchiano, M. Di Penta, F. Ricca, A. De Lucia, and F. Lanubile. Migration of information systems in the Italian industry: A state of the practice survey. Information and Software Technology, 53(1):71–86, 2011. Google ScholarDigital Library
- A. van Deursen, P. Klint, and C. Verhoef. Research issues in the renovation of legacy systems. In 2nd International Conference on Fundamental Approaches to Software Engineering, pages 1–21. Springer, 1999. Google ScholarDigital Library
- M. van Sinderen. Challenges and solutions in enterprise computing. Enterprise Information Systems, 2(4):341–346, 2008. Google ScholarDigital Library
- N. Veerman. Revitalizing modifiability of legacy assets. Journal of Software Maintenance and Evolution: Research and Practice, 16(4-5):219–254, 2004. Google ScholarDigital Library
- I. Warren and D. Avallone. The renaissance of legacy systems. Springer, 1999. Google ScholarDigital Library
- B. W. Weide, W. D. Heym, and J. E. Hollingsworth. Reverse engineering of legacy code exposed. In 17th International Conference on Software Engineering, pages 327–331. ACM, 1995. Google ScholarDigital Library
- N. H. Weiderman, J. K. Bergey, D. B. Smith, and S. R. Tilley. Approaches to legacy system evolution. TR CMU/SEI-97-TR-O14, DTIC Document, 1997.Google Scholar
- B. Wu, D. Lawless, J. Bisbal, R. Richardson, J. Grimson, V. Wade, and D. OSullivan. The butterfly methodology: A gateway-free approach for migrating legacy information systems. In 3rd IEEE International Conference on Engineering of Complex Computer Systems, pages 200–205. IEEE, 1997. Google ScholarDigital Library
Index Terms
- How do professionals perceive legacy systems and software modernization?
Recommendations
Modernization of Legacy Systems: A Generalised Roadmap
ICCCT '15: Proceedings of the Sixth International Conference on Computer and Communication Technology 2015A number of key organizations are sustaining the decades old complex legacy systems despite their types of services and operating environment. Cloud computing provides numerous processes, tools and methods to emphasize upon the pay-as-per-use utility ...
A component-based process for modelling and evolving legacy systems
Special Issue on Systems InteroperabilityThe potential benefits of evolving legacy systems to component-based system architectures are well documented. These include rapid, non-intrusive modernization through the use of commercial off-the-shelf (COTS) components and significantly reduced post-...
Iterative Reengineering of Legacy Functions
ICSM '01: Proceedings of the IEEE International Conference on Software Maintenance (ICSM'01)This paper describes a process of gradual reengineering of the procedural components of a legacy system. The process is integrated and completed by the data reengineering process analyzed in a previous paper by the same authors. The proposed method ...
Comments