SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
Fakultät für Informatik
Technische Universität München




Testing & Quality Assurance in
Data Migration Projects
Williamsburg, 26th of September 2011




Klaus Haller2
Florian Matthes1
Christian Neubert1
Christopher Schulz1

1Lehrstuhl
         I19 (sebis), Fakultät für Informatik, TU München, Garching, Germany
2Swisscom IT Services Finance, Testing & Quality Assurance, Zurich, Switzerland


110816_CS_ICSM 2011                                                               1
The author team

Software Engineering for Business Information Systems (sebis)
   Prof. Dr. Florian Matthes is holder of the chair Software Engineering for
   Business Information Systems (sebis) at the TU München, Germany
   Research areas in Enterprise Architecture Management & Social Software

 Swisscom IT Services Finance
   Design, implementation, and operations of IT systems (customer-specific and
   standard software) and BPO services for ~190 banking & insurance institutions
   The Testing & QA group offers management and technical consulting, test
   automation, and testing as a services

    Christian Neubert                                Authors
                      PhD student at sebis,             Dr. Klaus Haller (Swisscom IT
                      primary research area: Web        Services Finance)
                      2.0 Tools, Hybrid Wikis,          Prof. Florian Matthes (TU München)
                      Model driven development
                                                        Christopher Schulz (TU München)
                      Professional working
                      experience as software
                      engineer in the area of
                      logistics
110816_CS_ICSM 2011                                                                      2
Mastering data migration projects is a
challenging task


                      „83% of data migrations fail outright or exceed their allotted budgets
                      and implementation schedules.“
                                                                        [Gartner Group, 2005]

                      ”..current success rate for the data migration portion of projects (that is
                      those that were delivered on time and on budget) is just 16%.”
                                                                         [Bloor research, 2007]

                      “Few companies have the necessary skills to manage, build and
                      implement a successful data migration.”
                                                                           [Endava, 2007]




110816_CS_ICSM 2011                                                                            3
Definition, drivers, and characteristics of data
migration projects
 Data migration
   Tool supported one-time process which aims at migrating
   formatted data from a source structure to a target data
   structure whereas both structures differ on a conceptual
   and/or technical level

 Drivers
   Corporate events like mergers and acquisitions or carve-outs
   Implementation of novel business-models and processes
   Technological progress and upgrades
   New statutory and regulatory requirements

 Characteristics
   Re-occurring replacement or consolidation of existing
   business applications
   Everlasting although infrequently performed discipline
   Constantly underestimated in size and complexity


110816_CS_ICSM 2011                                               4
Research focus



      How does a comprehensive process model for migrating data to
      relational databases looks like?



      What are risks frequently occurring in context of data migration
      projects and is there an appropriate classification scheme
      helping to structure them?



      Which dedicated testing and risk mitigation techniques cope
      with these issues from a technical and organizational point of
      view?




110816_CS_ICSM 2011                                                      5
Migration programs rest on an architecture
 Source staging database
   Copy of source database to
   uncouple both databases

 Transformation database
   Stores intermediate results of
   the data migration programs

 Target staging database
   Stores the result of the transfor-
   mation ready for the upload

 Data migration program
   Transforms and moves the data & its representation from source to target database
   Comprises the subprograms extract & pre-filter, transform, and upload

 Orchestration component
   Ensures the correct starting order of the programs using a timetable-like mechanism

110816_CS_ICSM 2011                                                                      6
Migrating data in a stepwise & iterative style
                                 Practice-proven process model
                                 consists of 4 main stages which are
                                 subdivided into 14 distinct phases

                                 1. Initialization, prepares the
                                    necessary infrastructure and
                                    organization

                                 2. Development, implements the
                                    actual data migration programs

                                 3. Testing, validates the
                                    correctness, stability, and
                                    execution time of both, data and
                                    migration programs

                                 4. Cut-Over, finally switches to the
                                    target application by executing the
                                    migration programs

110816_CS_ICSM 2011                                                    7
A risk model helps to turn vague migration
fears into concrete risks




      Shaped like a house, the model is subdivided into
        • business risks often articulated by the customer,
        • IT management risks with a technical focus, and
        • data migration risks covering issues associated with migration programs
      Business and IT management risks are abstract but map on data migration risks

110816_CS_ICSM 2011                                                               8
Different testing techniques mitigate the risk
often emerging in data migration projects




      Concrete testing techniques, their explicit mapping on risks, as well as
      dedicated testing phases assure the quality of data migration projects


110816_CS_ICSM 2011                                                              9
Systematize the testing-based quality
assurance techniques
 Data validation
   Combination of automated and manual comparisons to validate completeness,
   semantical correctness, and consistency on the structure & data level

 Completeness and type correspondence tests
   Automated comparison of all data to identify new or missing business objects

 Appearance tests
   Manual comparison of a selection of business objects on GUI level

 Integration tests
    Semi-automated tests dedicated to the proper functioning of the target application
    with the migrated data in context of its interlinked applications

 Processability test
   Test focusing on coordinated interplay of target business application and new data

 Partial/Full Migration run test
   Semi-automated validation of the data migration programs in part or entirety

110816_CS_ICSM 2011                                                                      10
Each data migration is risk is covered by a
different set of testing techniques


               Risk                           Testing technique
             Stability   Partial/full migration run test
          Corruption     Appearance test, processability test, integration test
          Semantics      Appearance test, processability test, integration test
       Completeness      completeness & type correspondence
       Execution risk    Full migration run test
    Orchestration risk   Partial/full migration run test
        Dimensioning     Partial/full migration run test
         Interference    Operational risk, no testing
     Parameterization    Appearance test, processability test, integration test,
                         completeness & type correspondence test




110816_CS_ICSM 2011                                                                11
Project management-based quality assurance
 Involve an external data migration team
   Experienced specialists bring in methodologies, tool support, and know-how
      Reduce IT management risks of extended delays and overspends

 Exercise due while perform project scoping
   Careful scoping in strategy phase applying source-push or target-pull principles
     Eliminate risk of data and transformation loss

 Apply a data migration platform
   Scalable and reusable platform ensures independence from source & target
   database while providing increased migration leeway for testing measures
      Mitigate risk of corruption and instability
      Prevent budget and time overruns
      Reduce risk of interference between the migration teams
      Reduce parameterization risk


110816_CS_ICSM 2011                                                               12
Project management-based quality assurance
 Thoroughly analyze and cleanse data
   In-depth analysis helps to understand the data’s semantics & structure and to
   seize migration project’s characteristics more accurately
      Prevent project delays and budget overruns
      Mitigate the risks of corruption
      Reduce performance and stability risk for target application
      Bring down the risk of unstable data migration programs

 Migrate in an incremental and iterative manner
   Early and regular generation of migration results ensures a high project
   traceability and the possibility for frequent adjustments
      Reduce risk of project failure




110816_CS_ICSM 2011                                                                13
Summary and outlook
      To deliver a data migration project in time and on budget, a stringent approach,
      proactive risk mitigation techniques, and distinct test activities are required

 This contribution…
   outlines a practice-proven process model describing how to proceeded when
   shifting data from a source to a target database
   introduces and classifies dedicated risk mitigation techniques and project
   management practices helping to assure the quality in data migration projects

 Future directions
   Empirically evaluate process model, risk mitigation, and project management
   techniques in practice
   Examine the case where several source databases have to be consolidated
   resulting in data migration series
   Enhance process model with additional data harmonization activities
   Identify alternative versions of the model and techniques for NoSQL databases


110816_CS_ICSM 2011                                                                      14
Thank you for your attention!




             Any
          Questions?

Contact
Christian.Neubert@in.tum.de
Christopher.Schulz@in.tum.de
Klaus.Haller@swisscom.com

Further information
http://wwwmatthes.in.tum.de/wikis/sebis/mergers-and-acquisitions
http://finance.swisscom.com/

110816_CS_ICSM 2011                                                15

Contenu connexe

Tendances

EVALUATION AND STUDY OF SOFTWARE DEGRADATION IN THE EVOLUTION OF SIX VERSIONS...
EVALUATION AND STUDY OF SOFTWARE DEGRADATION IN THE EVOLUTION OF SIX VERSIONS...EVALUATION AND STUDY OF SOFTWARE DEGRADATION IN THE EVOLUTION OF SIX VERSIONS...
EVALUATION AND STUDY OF SOFTWARE DEGRADATION IN THE EVOLUTION OF SIX VERSIONS...csandit
 
A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation IJECEIAES
 
Reengineering framework for open source software using decision tree approach
Reengineering framework for open source software using decision tree approachReengineering framework for open source software using decision tree approach
Reengineering framework for open source software using decision tree approachIJECEIAES
 
Lightweight Processes: A Definition
Lightweight Processes: A DefinitionLightweight Processes: A Definition
Lightweight Processes: A DefinitionGlen Alleman
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
RE of Scalable Systems
RE of Scalable SystemsRE of Scalable Systems
RE of Scalable SystemsAsjad K.
 
VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for...
VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for...VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for...
VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for...journalBEEI
 
IRJET - Model Driven Methodology for JAVA
IRJET - Model Driven Methodology for JAVAIRJET - Model Driven Methodology for JAVA
IRJET - Model Driven Methodology for JAVAIRJET Journal
 
Approaches To System Development
Approaches To System DevelopmentApproaches To System Development
Approaches To System DevelopmentHenhen Lukmana
 
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...ijmpict
 
An Investigation of Critical Failure Factors In Information Technology Projects
An Investigation of Critical Failure Factors In Information Technology ProjectsAn Investigation of Critical Failure Factors In Information Technology Projects
An Investigation of Critical Failure Factors In Information Technology ProjectsIOSR Journals
 
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...ijseajournal
 
Process driven software development methodology for enterprise information sy...
Process driven software development methodology for enterprise information sy...Process driven software development methodology for enterprise information sy...
Process driven software development methodology for enterprise information sy...csandit
 
INFO 6245 Final Presentation
INFO 6245 Final PresentationINFO 6245 Final Presentation
INFO 6245 Final PresentationRyan Higginson
 
Paper_19-Software_Architecture_Reconstruction_Method_a_Survey
Paper_19-Software_Architecture_Reconstruction_Method_a_SurveyPaper_19-Software_Architecture_Reconstruction_Method_a_Survey
Paper_19-Software_Architecture_Reconstruction_Method_a_SurveyZainab Nayyar
 

Tendances (20)

System Analysis and Design Program
System Analysis and Design ProgramSystem Analysis and Design Program
System Analysis and Design Program
 
EVALUATION AND STUDY OF SOFTWARE DEGRADATION IN THE EVOLUTION OF SIX VERSIONS...
EVALUATION AND STUDY OF SOFTWARE DEGRADATION IN THE EVOLUTION OF SIX VERSIONS...EVALUATION AND STUDY OF SOFTWARE DEGRADATION IN THE EVOLUTION OF SIX VERSIONS...
EVALUATION AND STUDY OF SOFTWARE DEGRADATION IN THE EVOLUTION OF SIX VERSIONS...
 
Sda 2
Sda   2Sda   2
Sda 2
 
A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation
 
Reengineering framework for open source software using decision tree approach
Reengineering framework for open source software using decision tree approachReengineering framework for open source software using decision tree approach
Reengineering framework for open source software using decision tree approach
 
Lightweight Processes: A Definition
Lightweight Processes: A DefinitionLightweight Processes: A Definition
Lightweight Processes: A Definition
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
RE of Scalable Systems
RE of Scalable SystemsRE of Scalable Systems
RE of Scalable Systems
 
VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for...
VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for...VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for...
VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for...
 
122 whitepaper
122 whitepaper122 whitepaper
122 whitepaper
 
IRJET - Model Driven Methodology for JAVA
IRJET - Model Driven Methodology for JAVAIRJET - Model Driven Methodology for JAVA
IRJET - Model Driven Methodology for JAVA
 
Approaches To System Development
Approaches To System DevelopmentApproaches To System Development
Approaches To System Development
 
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
 
Chapter01
Chapter01Chapter01
Chapter01
 
An Investigation of Critical Failure Factors In Information Technology Projects
An Investigation of Critical Failure Factors In Information Technology ProjectsAn Investigation of Critical Failure Factors In Information Technology Projects
An Investigation of Critical Failure Factors In Information Technology Projects
 
Internal Audit Solution
Internal Audit Solution Internal Audit Solution
Internal Audit Solution
 
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...
 
Process driven software development methodology for enterprise information sy...
Process driven software development methodology for enterprise information sy...Process driven software development methodology for enterprise information sy...
Process driven software development methodology for enterprise information sy...
 
INFO 6245 Final Presentation
INFO 6245 Final PresentationINFO 6245 Final Presentation
INFO 6245 Final Presentation
 
Paper_19-Software_Architecture_Reconstruction_Method_a_Survey
Paper_19-Software_Architecture_Reconstruction_Method_a_SurveyPaper_19-Software_Architecture_Reconstruction_Method_a_Survey
Paper_19-Software_Architecture_Reconstruction_Method_a_Survey
 

En vedette

Industry - Precise Detection of Un-Initialized Variables in Large, Real-life ...
Industry - Precise Detection of Un-Initialized Variables in Large, Real-life ...Industry - Precise Detection of Un-Initialized Variables in Large, Real-life ...
Industry - Precise Detection of Un-Initialized Variables in Large, Real-life ...ICSM 2011
 
ERA Poster - Measuring Disruption from Software Evolution Activities Using Gr...
ERA Poster - Measuring Disruption from Software Evolution Activities Using Gr...ERA Poster - Measuring Disruption from Software Evolution Activities Using Gr...
ERA Poster - Measuring Disruption from Software Evolution Activities Using Gr...ICSM 2011
 
ERA - Measuring Disruption from Software Evolution Activities Using Graph-Bas...
ERA - Measuring Disruption from Software Evolution Activities Using Graph-Bas...ERA - Measuring Disruption from Software Evolution Activities Using Graph-Bas...
ERA - Measuring Disruption from Software Evolution Activities Using Graph-Bas...ICSM 2011
 
Program Comprehension - An Evaluation of the Strategies of Sorting, Filtering...
Program Comprehension - An Evaluation of the Strategies of Sorting, Filtering...Program Comprehension - An Evaluation of the Strategies of Sorting, Filtering...
Program Comprehension - An Evaluation of the Strategies of Sorting, Filtering...ICSM 2011
 
Faults and Regression Testing - Fault interaction and its repercussions
Faults and Regression Testing - Fault interaction and its repercussionsFaults and Regression Testing - Fault interaction and its repercussions
Faults and Regression Testing - Fault interaction and its repercussionsICSM 2011
 
Natural Language Analysis - Mining Java Class Naming Conventions
Natural Language Analysis - Mining Java Class Naming ConventionsNatural Language Analysis - Mining Java Class Naming Conventions
Natural Language Analysis - Mining Java Class Naming ConventionsICSM 2011
 
ERA - Tracking Technical Debt
ERA - Tracking Technical DebtERA - Tracking Technical Debt
ERA - Tracking Technical DebtICSM 2011
 
Industry - The Evolution of Information Systems. A Case Study on Document Man...
Industry - The Evolution of Information Systems. A Case Study on Document Man...Industry - The Evolution of Information Systems. A Case Study on Document Man...
Industry - The Evolution of Information Systems. A Case Study on Document Man...ICSM 2011
 
Metrics - Using Source Code Metrics to Predict Change-Prone Java Interfaces
Metrics - Using Source Code Metrics to Predict Change-Prone Java InterfacesMetrics - Using Source Code Metrics to Predict Change-Prone Java Interfaces
Metrics - Using Source Code Metrics to Predict Change-Prone Java InterfacesICSM 2011
 
Traceability - Structural Conformance Checking with Design Tests: An Evaluati...
Traceability - Structural Conformance Checking with Design Tests: An Evaluati...Traceability - Structural Conformance Checking with Design Tests: An Evaluati...
Traceability - Structural Conformance Checking with Design Tests: An Evaluati...ICSM 2011
 
ERA - Clustering and Recommending Collections of Code Relevant to Task
ERA - Clustering and Recommending Collections of Code Relevant to TaskERA - Clustering and Recommending Collections of Code Relevant to Task
ERA - Clustering and Recommending Collections of Code Relevant to TaskICSM 2011
 
Impact analysis - A Seismology-inspired Approach to Study Change Propagation
Impact analysis - A Seismology-inspired Approach to Study Change PropagationImpact analysis - A Seismology-inspired Approach to Study Change Propagation
Impact analysis - A Seismology-inspired Approach to Study Change PropagationICSM 2011
 
Components - Graph Based Detection of Library API Limitations
Components - Graph Based Detection of Library API LimitationsComponents - Graph Based Detection of Library API Limitations
Components - Graph Based Detection of Library API LimitationsICSM 2011
 
Tutorial 2 - Practical Combinatorial (t-way) Methods for Detecting Complex Fa...
Tutorial 2 - Practical Combinatorial (t-way) Methods for Detecting Complex Fa...Tutorial 2 - Practical Combinatorial (t-way) Methods for Detecting Complex Fa...
Tutorial 2 - Practical Combinatorial (t-way) Methods for Detecting Complex Fa...ICSM 2011
 
Natural Language Analysis - Expanding Identifiers to Normalize Source Code Vo...
Natural Language Analysis - Expanding Identifiers to Normalize Source Code Vo...Natural Language Analysis - Expanding Identifiers to Normalize Source Code Vo...
Natural Language Analysis - Expanding Identifiers to Normalize Source Code Vo...ICSM 2011
 
Industry - Estimating software maintenance effort from use cases an indu...
Industry - Estimating software maintenance effort from use cases an      indu...Industry - Estimating software maintenance effort from use cases an      indu...
Industry - Estimating software maintenance effort from use cases an indu...ICSM 2011
 
Postdoc Symposium - Abram Hindle
Postdoc Symposium - Abram HindlePostdoc Symposium - Abram Hindle
Postdoc Symposium - Abram HindleICSM 2011
 
Faults and Regression testing - Localizing Failure-Inducing Program Edits Bas...
Faults and Regression testing - Localizing Failure-Inducing Program Edits Bas...Faults and Regression testing - Localizing Failure-Inducing Program Edits Bas...
Faults and Regression testing - Localizing Failure-Inducing Program Edits Bas...ICSM 2011
 
Industry - Evolution and migration - Incremental and Iterative Reengineering ...
Industry - Evolution and migration - Incremental and Iterative Reengineering ...Industry - Evolution and migration - Incremental and Iterative Reengineering ...
Industry - Evolution and migration - Incremental and Iterative Reengineering ...ICSM 2011
 
Metrics - You can't control the unfamiliar
Metrics - You can't control the unfamiliarMetrics - You can't control the unfamiliar
Metrics - You can't control the unfamiliarICSM 2011
 

En vedette (20)

Industry - Precise Detection of Un-Initialized Variables in Large, Real-life ...
Industry - Precise Detection of Un-Initialized Variables in Large, Real-life ...Industry - Precise Detection of Un-Initialized Variables in Large, Real-life ...
Industry - Precise Detection of Un-Initialized Variables in Large, Real-life ...
 
ERA Poster - Measuring Disruption from Software Evolution Activities Using Gr...
ERA Poster - Measuring Disruption from Software Evolution Activities Using Gr...ERA Poster - Measuring Disruption from Software Evolution Activities Using Gr...
ERA Poster - Measuring Disruption from Software Evolution Activities Using Gr...
 
ERA - Measuring Disruption from Software Evolution Activities Using Graph-Bas...
ERA - Measuring Disruption from Software Evolution Activities Using Graph-Bas...ERA - Measuring Disruption from Software Evolution Activities Using Graph-Bas...
ERA - Measuring Disruption from Software Evolution Activities Using Graph-Bas...
 
Program Comprehension - An Evaluation of the Strategies of Sorting, Filtering...
Program Comprehension - An Evaluation of the Strategies of Sorting, Filtering...Program Comprehension - An Evaluation of the Strategies of Sorting, Filtering...
Program Comprehension - An Evaluation of the Strategies of Sorting, Filtering...
 
Faults and Regression Testing - Fault interaction and its repercussions
Faults and Regression Testing - Fault interaction and its repercussionsFaults and Regression Testing - Fault interaction and its repercussions
Faults and Regression Testing - Fault interaction and its repercussions
 
Natural Language Analysis - Mining Java Class Naming Conventions
Natural Language Analysis - Mining Java Class Naming ConventionsNatural Language Analysis - Mining Java Class Naming Conventions
Natural Language Analysis - Mining Java Class Naming Conventions
 
ERA - Tracking Technical Debt
ERA - Tracking Technical DebtERA - Tracking Technical Debt
ERA - Tracking Technical Debt
 
Industry - The Evolution of Information Systems. A Case Study on Document Man...
Industry - The Evolution of Information Systems. A Case Study on Document Man...Industry - The Evolution of Information Systems. A Case Study on Document Man...
Industry - The Evolution of Information Systems. A Case Study on Document Man...
 
Metrics - Using Source Code Metrics to Predict Change-Prone Java Interfaces
Metrics - Using Source Code Metrics to Predict Change-Prone Java InterfacesMetrics - Using Source Code Metrics to Predict Change-Prone Java Interfaces
Metrics - Using Source Code Metrics to Predict Change-Prone Java Interfaces
 
Traceability - Structural Conformance Checking with Design Tests: An Evaluati...
Traceability - Structural Conformance Checking with Design Tests: An Evaluati...Traceability - Structural Conformance Checking with Design Tests: An Evaluati...
Traceability - Structural Conformance Checking with Design Tests: An Evaluati...
 
ERA - Clustering and Recommending Collections of Code Relevant to Task
ERA - Clustering and Recommending Collections of Code Relevant to TaskERA - Clustering and Recommending Collections of Code Relevant to Task
ERA - Clustering and Recommending Collections of Code Relevant to Task
 
Impact analysis - A Seismology-inspired Approach to Study Change Propagation
Impact analysis - A Seismology-inspired Approach to Study Change PropagationImpact analysis - A Seismology-inspired Approach to Study Change Propagation
Impact analysis - A Seismology-inspired Approach to Study Change Propagation
 
Components - Graph Based Detection of Library API Limitations
Components - Graph Based Detection of Library API LimitationsComponents - Graph Based Detection of Library API Limitations
Components - Graph Based Detection of Library API Limitations
 
Tutorial 2 - Practical Combinatorial (t-way) Methods for Detecting Complex Fa...
Tutorial 2 - Practical Combinatorial (t-way) Methods for Detecting Complex Fa...Tutorial 2 - Practical Combinatorial (t-way) Methods for Detecting Complex Fa...
Tutorial 2 - Practical Combinatorial (t-way) Methods for Detecting Complex Fa...
 
Natural Language Analysis - Expanding Identifiers to Normalize Source Code Vo...
Natural Language Analysis - Expanding Identifiers to Normalize Source Code Vo...Natural Language Analysis - Expanding Identifiers to Normalize Source Code Vo...
Natural Language Analysis - Expanding Identifiers to Normalize Source Code Vo...
 
Industry - Estimating software maintenance effort from use cases an indu...
Industry - Estimating software maintenance effort from use cases an      indu...Industry - Estimating software maintenance effort from use cases an      indu...
Industry - Estimating software maintenance effort from use cases an indu...
 
Postdoc Symposium - Abram Hindle
Postdoc Symposium - Abram HindlePostdoc Symposium - Abram Hindle
Postdoc Symposium - Abram Hindle
 
Faults and Regression testing - Localizing Failure-Inducing Program Edits Bas...
Faults and Regression testing - Localizing Failure-Inducing Program Edits Bas...Faults and Regression testing - Localizing Failure-Inducing Program Edits Bas...
Faults and Regression testing - Localizing Failure-Inducing Program Edits Bas...
 
Industry - Evolution and migration - Incremental and Iterative Reengineering ...
Industry - Evolution and migration - Incremental and Iterative Reengineering ...Industry - Evolution and migration - Incremental and Iterative Reengineering ...
Industry - Evolution and migration - Incremental and Iterative Reengineering ...
 
Metrics - You can't control the unfamiliar
Metrics - You can't control the unfamiliarMetrics - You can't control the unfamiliar
Metrics - You can't control the unfamiliar
 

Similaire à Industry - Testing & Quality Assurance in Data Migration Projects

A Guide to Successful Application Modernization through Data Migration Services
A Guide to Successful Application Modernization through Data Migration ServicesA Guide to Successful Application Modernization through Data Migration Services
A Guide to Successful Application Modernization through Data Migration ServicesAndrew Leo
 
Troux Presentation Austin Texas
Troux Presentation Austin TexasTroux Presentation Austin Texas
Troux Presentation Austin TexasJoeFaghani
 
Burge, Stephen Agile Ba Revised
Burge, Stephen Agile Ba RevisedBurge, Stephen Agile Ba Revised
Burge, Stephen Agile Ba RevisedStephen Burge
 
Burge, Stephen Agile Pm Revised
Burge, Stephen Agile Pm RevisedBurge, Stephen Agile Pm Revised
Burge, Stephen Agile Pm RevisedStephen Burge
 
Effective Software Effort Estimation Leveraging Machine Learning for Digital ...
Effective Software Effort Estimation Leveraging Machine Learning for Digital ...Effective Software Effort Estimation Leveraging Machine Learning for Digital ...
Effective Software Effort Estimation Leveraging Machine Learning for Digital ...Shakas Technologies
 
Phase II of the Core Transformation Journey - Getting There
Phase II of the Core Transformation Journey - Getting TherePhase II of the Core Transformation Journey - Getting There
Phase II of the Core Transformation Journey - Getting ThereInfosys Finacle
 
Running head APPLICATIONS RELATIVE TO COURSE OBJECTIVES .docx
Running head APPLICATIONS RELATIVE TO COURSE OBJECTIVES          .docxRunning head APPLICATIONS RELATIVE TO COURSE OBJECTIVES          .docx
Running head APPLICATIONS RELATIVE TO COURSE OBJECTIVES .docxtoddr4
 
Unlock the power of MLOps.pdf
Unlock the power of MLOps.pdfUnlock the power of MLOps.pdf
Unlock the power of MLOps.pdfStephenAmell4
 
Essential Components of a Successful Cloud Migration Strategy
Essential Components of a Successful Cloud Migration StrategyEssential Components of a Successful Cloud Migration Strategy
Essential Components of a Successful Cloud Migration StrategyChristine Shepherd
 
Software Infrastructure Design, Integration, & Migration Roadmap
Software Infrastructure Design, Integration, & Migration RoadmapSoftware Infrastructure Design, Integration, & Migration Roadmap
Software Infrastructure Design, Integration, & Migration RoadmapInnovate Vancouver
 
Will Rothwell CV2015
Will Rothwell CV2015Will Rothwell CV2015
Will Rothwell CV2015Will Rothwell
 
A Roadmap to Data Migration Success
A Roadmap to Data Migration SuccessA Roadmap to Data Migration Success
A Roadmap to Data Migration SuccessFindWhitePapers
 
Secured Cloud ERP
Secured Cloud ERPSecured Cloud ERP
Secured Cloud ERPijbuiiir1
 
Gross, Steven 2016
Gross, Steven 2016Gross, Steven 2016
Gross, Steven 2016Steven Gross
 
Windows XP to Windows 7 Migration Whitepaper
Windows XP to Windows 7 Migration WhitepaperWindows XP to Windows 7 Migration Whitepaper
Windows XP to Windows 7 Migration WhitepaperLori Witzel
 
Unlock the power of MLOps.pdf
Unlock the power of MLOps.pdfUnlock the power of MLOps.pdf
Unlock the power of MLOps.pdfAnastasiaSteele10
 
Unlock the power of MLOps.pdf
Unlock the power of MLOps.pdfUnlock the power of MLOps.pdf
Unlock the power of MLOps.pdfJamieDornan2
 
Unlock the power of MLOps.pdf
Unlock the power of MLOps.pdfUnlock the power of MLOps.pdf
Unlock the power of MLOps.pdfStephenAmell4
 

Similaire à Industry - Testing & Quality Assurance in Data Migration Projects (20)

A Guide to Successful Application Modernization through Data Migration Services
A Guide to Successful Application Modernization through Data Migration ServicesA Guide to Successful Application Modernization through Data Migration Services
A Guide to Successful Application Modernization through Data Migration Services
 
Troux Presentation Austin Texas
Troux Presentation Austin TexasTroux Presentation Austin Texas
Troux Presentation Austin Texas
 
Burge, Stephen Agile Ba Revised
Burge, Stephen Agile Ba RevisedBurge, Stephen Agile Ba Revised
Burge, Stephen Agile Ba Revised
 
Burge, Stephen Agile Pm Revised
Burge, Stephen Agile Pm RevisedBurge, Stephen Agile Pm Revised
Burge, Stephen Agile Pm Revised
 
Effective Software Effort Estimation Leveraging Machine Learning for Digital ...
Effective Software Effort Estimation Leveraging Machine Learning for Digital ...Effective Software Effort Estimation Leveraging Machine Learning for Digital ...
Effective Software Effort Estimation Leveraging Machine Learning for Digital ...
 
Phase II of the Core Transformation Journey - Getting There
Phase II of the Core Transformation Journey - Getting TherePhase II of the Core Transformation Journey - Getting There
Phase II of the Core Transformation Journey - Getting There
 
Running head APPLICATIONS RELATIVE TO COURSE OBJECTIVES .docx
Running head APPLICATIONS RELATIVE TO COURSE OBJECTIVES          .docxRunning head APPLICATIONS RELATIVE TO COURSE OBJECTIVES          .docx
Running head APPLICATIONS RELATIVE TO COURSE OBJECTIVES .docx
 
Unlock the power of MLOps.pdf
Unlock the power of MLOps.pdfUnlock the power of MLOps.pdf
Unlock the power of MLOps.pdf
 
Essential Components of a Successful Cloud Migration Strategy
Essential Components of a Successful Cloud Migration StrategyEssential Components of a Successful Cloud Migration Strategy
Essential Components of a Successful Cloud Migration Strategy
 
Software Infrastructure Design, Integration, & Migration Roadmap
Software Infrastructure Design, Integration, & Migration RoadmapSoftware Infrastructure Design, Integration, & Migration Roadmap
Software Infrastructure Design, Integration, & Migration Roadmap
 
Will Rothwell CV2015
Will Rothwell CV2015Will Rothwell CV2015
Will Rothwell CV2015
 
A Roadmap to Data Migration Success
A Roadmap to Data Migration SuccessA Roadmap to Data Migration Success
A Roadmap to Data Migration Success
 
Migration Services
Migration ServicesMigration Services
Migration Services
 
01_Program
01_Program01_Program
01_Program
 
Secured Cloud ERP
Secured Cloud ERPSecured Cloud ERP
Secured Cloud ERP
 
Gross, Steven 2016
Gross, Steven 2016Gross, Steven 2016
Gross, Steven 2016
 
Windows XP to Windows 7 Migration Whitepaper
Windows XP to Windows 7 Migration WhitepaperWindows XP to Windows 7 Migration Whitepaper
Windows XP to Windows 7 Migration Whitepaper
 
Unlock the power of MLOps.pdf
Unlock the power of MLOps.pdfUnlock the power of MLOps.pdf
Unlock the power of MLOps.pdf
 
Unlock the power of MLOps.pdf
Unlock the power of MLOps.pdfUnlock the power of MLOps.pdf
Unlock the power of MLOps.pdf
 
Unlock the power of MLOps.pdf
Unlock the power of MLOps.pdfUnlock the power of MLOps.pdf
Unlock the power of MLOps.pdf
 

Dernier

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Dernier (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Industry - Testing & Quality Assurance in Data Migration Projects

  • 1. Fakultät für Informatik Technische Universität München Testing & Quality Assurance in Data Migration Projects Williamsburg, 26th of September 2011 Klaus Haller2 Florian Matthes1 Christian Neubert1 Christopher Schulz1 1Lehrstuhl I19 (sebis), Fakultät für Informatik, TU München, Garching, Germany 2Swisscom IT Services Finance, Testing & Quality Assurance, Zurich, Switzerland 110816_CS_ICSM 2011 1
  • 2. The author team Software Engineering for Business Information Systems (sebis) Prof. Dr. Florian Matthes is holder of the chair Software Engineering for Business Information Systems (sebis) at the TU München, Germany Research areas in Enterprise Architecture Management & Social Software Swisscom IT Services Finance Design, implementation, and operations of IT systems (customer-specific and standard software) and BPO services for ~190 banking & insurance institutions The Testing & QA group offers management and technical consulting, test automation, and testing as a services Christian Neubert Authors PhD student at sebis, Dr. Klaus Haller (Swisscom IT primary research area: Web Services Finance) 2.0 Tools, Hybrid Wikis, Prof. Florian Matthes (TU München) Model driven development Christopher Schulz (TU München) Professional working experience as software engineer in the area of logistics 110816_CS_ICSM 2011 2
  • 3. Mastering data migration projects is a challenging task „83% of data migrations fail outright or exceed their allotted budgets and implementation schedules.“ [Gartner Group, 2005] ”..current success rate for the data migration portion of projects (that is those that were delivered on time and on budget) is just 16%.” [Bloor research, 2007] “Few companies have the necessary skills to manage, build and implement a successful data migration.” [Endava, 2007] 110816_CS_ICSM 2011 3
  • 4. Definition, drivers, and characteristics of data migration projects Data migration Tool supported one-time process which aims at migrating formatted data from a source structure to a target data structure whereas both structures differ on a conceptual and/or technical level Drivers Corporate events like mergers and acquisitions or carve-outs Implementation of novel business-models and processes Technological progress and upgrades New statutory and regulatory requirements Characteristics Re-occurring replacement or consolidation of existing business applications Everlasting although infrequently performed discipline Constantly underestimated in size and complexity 110816_CS_ICSM 2011 4
  • 5. Research focus How does a comprehensive process model for migrating data to relational databases looks like? What are risks frequently occurring in context of data migration projects and is there an appropriate classification scheme helping to structure them? Which dedicated testing and risk mitigation techniques cope with these issues from a technical and organizational point of view? 110816_CS_ICSM 2011 5
  • 6. Migration programs rest on an architecture Source staging database Copy of source database to uncouple both databases Transformation database Stores intermediate results of the data migration programs Target staging database Stores the result of the transfor- mation ready for the upload Data migration program Transforms and moves the data & its representation from source to target database Comprises the subprograms extract & pre-filter, transform, and upload Orchestration component Ensures the correct starting order of the programs using a timetable-like mechanism 110816_CS_ICSM 2011 6
  • 7. Migrating data in a stepwise & iterative style Practice-proven process model consists of 4 main stages which are subdivided into 14 distinct phases 1. Initialization, prepares the necessary infrastructure and organization 2. Development, implements the actual data migration programs 3. Testing, validates the correctness, stability, and execution time of both, data and migration programs 4. Cut-Over, finally switches to the target application by executing the migration programs 110816_CS_ICSM 2011 7
  • 8. A risk model helps to turn vague migration fears into concrete risks Shaped like a house, the model is subdivided into • business risks often articulated by the customer, • IT management risks with a technical focus, and • data migration risks covering issues associated with migration programs Business and IT management risks are abstract but map on data migration risks 110816_CS_ICSM 2011 8
  • 9. Different testing techniques mitigate the risk often emerging in data migration projects Concrete testing techniques, their explicit mapping on risks, as well as dedicated testing phases assure the quality of data migration projects 110816_CS_ICSM 2011 9
  • 10. Systematize the testing-based quality assurance techniques Data validation Combination of automated and manual comparisons to validate completeness, semantical correctness, and consistency on the structure & data level Completeness and type correspondence tests Automated comparison of all data to identify new or missing business objects Appearance tests Manual comparison of a selection of business objects on GUI level Integration tests Semi-automated tests dedicated to the proper functioning of the target application with the migrated data in context of its interlinked applications Processability test Test focusing on coordinated interplay of target business application and new data Partial/Full Migration run test Semi-automated validation of the data migration programs in part or entirety 110816_CS_ICSM 2011 10
  • 11. Each data migration is risk is covered by a different set of testing techniques Risk Testing technique Stability Partial/full migration run test Corruption Appearance test, processability test, integration test Semantics Appearance test, processability test, integration test Completeness completeness & type correspondence Execution risk Full migration run test Orchestration risk Partial/full migration run test Dimensioning Partial/full migration run test Interference Operational risk, no testing Parameterization Appearance test, processability test, integration test, completeness & type correspondence test 110816_CS_ICSM 2011 11
  • 12. Project management-based quality assurance Involve an external data migration team Experienced specialists bring in methodologies, tool support, and know-how Reduce IT management risks of extended delays and overspends Exercise due while perform project scoping Careful scoping in strategy phase applying source-push or target-pull principles Eliminate risk of data and transformation loss Apply a data migration platform Scalable and reusable platform ensures independence from source & target database while providing increased migration leeway for testing measures Mitigate risk of corruption and instability Prevent budget and time overruns Reduce risk of interference between the migration teams Reduce parameterization risk 110816_CS_ICSM 2011 12
  • 13. Project management-based quality assurance Thoroughly analyze and cleanse data In-depth analysis helps to understand the data’s semantics & structure and to seize migration project’s characteristics more accurately Prevent project delays and budget overruns Mitigate the risks of corruption Reduce performance and stability risk for target application Bring down the risk of unstable data migration programs Migrate in an incremental and iterative manner Early and regular generation of migration results ensures a high project traceability and the possibility for frequent adjustments Reduce risk of project failure 110816_CS_ICSM 2011 13
  • 14. Summary and outlook To deliver a data migration project in time and on budget, a stringent approach, proactive risk mitigation techniques, and distinct test activities are required This contribution… outlines a practice-proven process model describing how to proceeded when shifting data from a source to a target database introduces and classifies dedicated risk mitigation techniques and project management practices helping to assure the quality in data migration projects Future directions Empirically evaluate process model, risk mitigation, and project management techniques in practice Examine the case where several source databases have to be consolidated resulting in data migration series Enhance process model with additional data harmonization activities Identify alternative versions of the model and techniques for NoSQL databases 110816_CS_ICSM 2011 14
  • 15. Thank you for your attention! Any Questions? Contact Christian.Neubert@in.tum.de Christopher.Schulz@in.tum.de Klaus.Haller@swisscom.com Further information http://wwwmatthes.in.tum.de/wikis/sebis/mergers-and-acquisitions http://finance.swisscom.com/ 110816_CS_ICSM 2011 15