SlideShare a Scribd company logo
1 of 38
Download to read offline
comForte Webinar "Application
Modernization"




          This deck of slides was used as the basis for a Webinar which comForte presented in May
          2011

          This PDF document serves as the “offline” version of the Webinar – but it is still HIGHLY
          recommended to listen to the actual Webinar which is available on YouTube:

          comForte general YouTube channel: http://www.youtube.com/comforte21

          On YouTube, this Webinar split in two parts:
          • Part 1/2: http://youtu.be/nJtUxr6DNtE
          • Part 2/2: http://youtu.be/ERcu48M6nG4




                                                                                                      1
comForte Webinar "Application                                                                         4-Jul-11
Modernization"




          As of June 2011, comForte is far and foremost the worlds largest ISV in the HP NonStop
          space which focuses on platform modernization in the key areas of security, connectivity,
          networking and emulation. comForte 21 GmbH is a privately hold organization with
          subsidiaries across the globe as shown here. It has roughly 60 employess and has a strong
          business relationship with the HP NonStop Enterprise Division (NED): several comForte
          products are OEM’d by HP.

          For more information on comForte, please see http://www.comforte.com




                                                                                                            2
comForte Webinar "Application
Modernization"




          In this section, we look at how many people (wrongly!) perceive NonStop systems as
          “legacy” and “costly”.




                                                                                               3
comForte Webinar "Application
Modernization"




          Side note on cars: On the left there is a Porsche 356, predecessor of 911, produced 1948 –
          1965. And yes, Porsche is NonStop customer !

          The headline of this slide is (unfortunately) the view shared by many CIOs and IT leaders.
          These systems have been around 35+ years after all – so OLD indeed they are. And aren’t
          these systems kind of like mainframes (so sure enough they are EXPENSIVE) ? [both true for
          the car shown here by the way] . And don’t I see my people using special emulators getting
          to the systems (INFLEXIBLE?) ?

          The reality is more complex and is discussed controversially using themes such as Total
          Cost of Ownership (TCO) discussion, the platform being “open” or “standard”. Let’s try to
          stay with the facts here:
          -yes, the systems have been around for a long time
          -So have been some applications running on it
          -Some applications have not seen changes in the last 10 years
          -the Gartner’s of the world don’t like them (if nothing else, because they don’t run on X86
          hardware)

          While the speaker personally does not find the systems either expensive or inflexible, he
          has heard that statement from customers over and over again. So it seems like that – if
          nothing else – some CIOs will find this statement accurate.




                                                                                                        4
comForte Webinar "Application
Modernization"




          From the perception “inflexible & costly” it is a small step to want to bring cost down or
          migrate off the platform. In the car analogy, that might translate into:
          -Keeping the Porsche, but don’t maintain it fully
          -Sell the Porsche, buy Golf

          This matches what comForte hears when talking to some of their NonStop customers:
          - “The platform is no longer strategic”
          -“Our CIO wants to go into the cloud direction”
          -“No new applications are put on the platform”

          At the end of the day, it seems like the two options considered most often are indeed
          “migrate off” or “get rid of it totally”




                                                                                                       5
comForte Webinar "Application
Modernization"




          What happens if you under-maintain a Porsche: worst-case it looks like this Porsche 356 in
          Berkeley, CA..

          The money spent on actual modernization of a typical NonStop system beyond the cyclical
          hardware upgrade is – in comForte’s estimate – rather low. That actually does imply risk for
          the applications running on your NonStop. If these applications would not be VITAL for your
          organization, they would not be running on the platform in the first place – so let’s look at
          some risk scenarios:
          -Scenario I: Financial institution driving their ATMs. System goes down. ATM outage. In the
          paper the next day
          -Scenario II: Payment solutions provider aquiring POS transactions. System is “hacked”. All
          credit card data of the current day (month) is lost to the hackers. Very bad press. Stock
          price will go down.
          -Scenario III: Hospital using NonStop for medical records. NonStop is hacked, medical data
          is posted online.

          So from a simple risk perspective, the NonStop seems well worth investing in. Note that
          while scenario #1 is well covered (this is what NonStop is all about), scenarios #2 and #3
          are typically not. Why is the NonStop often overlooked ?


          Photo source: http://www.flickr.com/photos/stormbear/2824269720/




                                                                                                          6
comForte Webinar "Application
Modernization"




          Obviously, you want to start with an assessment on where you are (left side, hopefully
          neither picture being close to your status). Then you need to decide where you want to be
          on the right side. Talking with many customers, we find it interesting, that there seems to
          be no “best practice” as to “how modern” NonStop systems are at the typical large IT
          operation. You will find all kind of “cars” …

          Where you want to be is obviously on the lower right … however your budget is limited –
          both in terms of human resources and capital investment.

          The car analogy is maybe not the perfect fit here, but you certainly don’t want to run your
          critical applications on IT systems which match some cars on the left side of the slide. A
          modern car (whether a Porsche, Ferrari or Golf) will cost you less money and better
          integrate with your other IT systems.




                                                                                                        7
comForte Webinar "Application
Modernization"




          Why would you want to work with comForte:
          -We have changed many tires / modernized many NonStop applications
          -We are the only vendor in the NonStop world which offers a whole breadth of products in
          areas of modernization such as Terminal access, SOAP-enabling, security standardization

          In the rest of this presentation, we’ll show some specific examples




                                                                                                     8
comForte Webinar "Application
Modernization"




          Here we (briefly) look at the foundations of Pathway and how modern it was decades ago.
          This is the reason why many of the old applications can be modernized relatively easy.




                                                                                                    9
comForte Webinar "Application
Modernization"




          This picture shows how you do *not* want to modernize your NonStop systems – changing
          an engine while driving is not a good idea…




                                                                                                  10
comForte Webinar "Application
Modernization"




          This diagram is from a HP NonStop manual on “Pathway”, the transaction monitor for
          NonStop systems. It looks somewhat old because it actually *is* old – Pathway was created
          about 20 years ago. The terminology used here (PATHCOM, TERM, Terminal, PATHMON
          etc.) certainly looks outdated.

          But let’s look behind what Pathway is actually doing – the colors in the diagram show an
          abstraction layer for:
          -database (blue),
          -server code (“app logic”, green)
          -client code (“presentation layer”, orange)




                                                                                                      11
comForte Webinar "Application
Modernization"




          This diagram is how a modern Software stack for Java development might look like. All
          acronyms are modern and up-to-date (at least today…). However, looking at the abstraction
          layer we see the same three layers (Presentation, Business logic, Database). This proves
          that Pathway was a very modern (brilliant!) concept when it was invented.




                                                                                                      12
comForte Webinar "Application
Modernization"




          The similarity between Pathway and modern development paradigms such as J2EE are very
          important: Because NonStop applications were designed based on still-up-to-date design
          “patterns” 20 years ago, they can easily be modernized with very low risk and at moderate
          cost




                                                                                                      13
comForte Webinar "Application
Modernization"




          In this section, we look at some reasons for modernizing – saving money being among
          them.




                                                                                                14
comForte Webinar "Application
Modernization"




          Side note: for many customers, NonStop system *are* their cash cows as they process the
          very transactions which generate the core revenue (credit card transactions, ATM
          transactions, stock transactions, connecting mobile phones to the network).

          The point here is different, namely that Modernization can pay for itself .We will look at
          some real-life scenarios in which actual comForte customers are saving money through
          having modernized their NonStop applications.




                                                                                                       15
comForte Webinar "Application
Modernization"




          Here is an example for a return on investment (ROI) calculation for an actual project
          comForte did for a large Dutch customer. The “ROI calculator” shown here has been put on
          the Internet by a provider of Single-Sign-On solutions, NetIQ.

          The math done here calculates potential savings through implementing an SSO solution
          based on some numbers:

          • International Data Group reports that an average user in a 10,000-employee company has
          14 separate passwords.
          • One password reset costs $10 - $30
          • Calculator from http://www.netiq.com/products/spa/roicalc.asp
          • Assumptions from comForte
          • Total cost =
          (#incidents) x (time help desk) x (wage help desk) + (#incidents) x (time end user) x (wage
          end user)
          =120000 x 5 + 120000 x 7.5 = 600000 + 900000 = 1.500.00

          The car falling in the water was in fact used as a model by the project manager: when
          facing internal resistance to put the finished project live (“we are too busy”) he threatened
          to put a crane on the parking lot and drop a brand new BMW every month as this was the
          money they were loosing by not putting the project live.




                                                                                                          16
comForte Webinar "Application
Modernization"




          Here is another look at cost savings through modernization: in the “before” scenario, costs
          occur through:
          -Maintaining of the SNA network
          -The very high license cost for SNA connectivity software on NonStop




                                                                                                        17
comForte Webinar "Application
Modernization"




          Post-modernization, the user is using the comForte product uLinga, replacing SNA network
          with “full IP”. There were no application changes required to reap these savings.




                                                                                                     18
comForte Webinar "Application
Modernization"




          The diagram shows that in many organizations, NonStop systems have not followed trends in
          security and application design which evolved over the past 20 years. The reason for that is
          probably that “the system works”; but also the system often is simply overlooked by the
          organization.
          In Information Security, it is rather hard to calculate an actual ROI. The author of these slides think,
          that ROI is the wrong approach to security: are you calculationg the ROI of the fire alarms, sprinkler
          systems, emergency stairwells in your office buildings ?
          The computer security industry is gravitating towards “best practices” which are imposed through
          regulation and that is a healthy trend. It comes down to “risk management” rather than “ROI
          calculation”.
          Many NonStop systems lack some very basic security controls such as:
          -Firewalls
          -Integration in User provisioning, Strong Authentication, Single-Sign-On
          -Network IDS
          -Modern GUI tools for operators & developers
          -Modern GUI for applications
          -Integration in user provisioning, single-sign-on
          As the information on the platform is very confidential/important this results in massive risks. In the
          payment industry, that risk can easily be calculated:
          - The typical cost to replace a stolen credit card is $2-3 per credit card replacement
          - Assuming you process 1000 TPS on your NonStop system, that translates into $2000/second or
             roughly $170 Million/day
          For application modernization, doing nothing also has implied costs such as:
          -lack of platform acceptance for new employees (operators, developers)
          -loss of end user productivity




                                                                                                                     19
comForte Webinar "Application
Modernization"




          In this section, we will look at three real-life examples of modernization using comForte
          products and services




                                                                                                      20
comForte Webinar "Application
Modernization"




          NonStop systems are complex by nature. Application –and their supporting infrastructure-
          have grown over years, so “where to start” modernizing is not always an easy question.
          Also, there is never a clear boundary between “the application” and its “foundation
          technologies” such as how to get to the application (TELSERV anyone?), how users are
          authenticated etc.

          comForte is uniquely positioned within the NonStop ISV space as only comForte has the
          breadth of modernization products and experience ranging across security, networking,
          emulation access and application design.




                                                                                                     21
comForte Webinar "Application
Modernization"




          Here we look at a rather typical application scenario of a comForte customer prior to
          working with us:
          - Beyond the NonStop platform, there were corporate standards for how integrate
            applications in the corporate SOA framework
          - On the NonStop, BASE24 is running and while it is handling the transactional load nicely,
            all management of users is done through terminal emulation

          Beyond the IT issue of having a platform which does not follow corporate design standards,
          from a business perspective there was the requirement to allow access to BASE24 for end
          users through the Internet.




                                                                                                        22
comForte Webinar "Application
Modernization"




          This diagram shows the customer scenario after modernizing with comForte products:
          BASE24 is now fully integrated into the corporate SOA ecosystems. From and end user
          perspective, NonStop/BASE24 is just “another service” which can be used when authorized
          properly.

          Note that only minimal application changes for BASE24 where required, see next slide.




                                                                                                    23
comForte Webinar "Application
Modernization"




          This “Geek Slide” shows the technical details for the chosen solution:
          • Grey/orange: the corporate SOA ecosystem for “other systems”
          • Light blue: BASE24 classic
          • Bright orange: comForte product CSL enabling integration of BASE24 via a WS endpoint
             implementing a BASE24 gateway.

          • Please contact comForte, t.burg@comforte.com, for details of this implementation




                                                                                                   24
comForte Webinar "Application
Modernization"




          This example shows how Applied Industrial Technologies chose an evolutionary approach
          to Application Modernization. From left to right, the application was modernized in two
          steps.

          ___________________________________________________

          Here is an excerpts from Connection article, written by AIT, available from comForte upon
          request:

          In our ongoing efforts to deliver top products and services, our operational infrastructure is
          critical: It plays a central role in how responsive and effective our sales and support
          organizations can be, as well as how efficient and profitable, our organization ultimately is.
          Consequently, OMNEX® is integral to our success. OMNEX is a NonStop-based operational
          system used for order entry, order processing, inventory management, and a host of other
          business-critical processes.

          In many ways, OMNEX is a typical NonStop application. Developed in COBOL over the
          course of 15 years, this system has hundreds of screens, batch programs, and associated
          Pathway servers. Accessed through traditional NonStop “green screens,” the system, while
          extremely powerful, was highly complex to use. To do anything beyond the most basic tasks,
          new users faced a very steep learning curve.




                                                                                                           25
comForte Webinar "Application
Modernization"




          The old application (leftmost figures) presented a classical text mode screen using a fixed
          size and proportional fonts.

          During the first step of the modernization, the comForte product JPath was used to do a
          quick conversion to a more modern look and feel (see figures in the center). Access is no
          via a browser; also the “proportional font block-mode screen” has been replaced by a more
          modern, HTML-type view. This works without having to redraw any screens manually.

          In the last step, the client-side code of the application was completely rewritten.




                                                                                                        26
comForte Webinar "Application
Modernization"




          This diagram shows the final architecture:
          • the old application code is still being used for these screens which were not used
             enough to justify a rewrite (using JPath via 6530 terminal sessions)
          • CSL is used to connect a middle tier implementing Web Services to the original Pathway
             servers
          • JDBC is used to make direct SQL calls from the middle tier to the SQL database
          • SOAP requests are made from new client (called Asyst and implemented using Ecclipse)
             to the middle tier




                                                                                                     27
comForte Webinar "Application
Modernization"




          We have looked at this customer early when we discussed the savings involved in many
          users having to enter their password again when logging on to the NonStop system.

          This is the “before” scenario where users first logon on to Windows using a smart card to
          provide extra security. Then they log on to NonStop using username and password which is
          both cumbersome and not very secure.




                                                                                                      28
comForte Webinar "Application
Modernization"




          The modernization project via comForte required only a couple of lines of code being
          changed in the application; now authentication to logon leverages the existing logon to
          Windows.




                                                                                                    29
comForte Webinar "Application
Modernization"




          The SecurSSO product combined with J6530 emulation here implements secure Single-
          Sign-On. SecurSSO uses the Kerberos protocol to tightly integrate NonStop into Microsoft
          Active Directory authentication.




                                                                                                     30
comForte Webinar "Application
Modernization"




                                31
comForte Webinar "Application
Modernization"




          Here are “50 reasons not to change” – found on the Internet at
          http://13c4.wordpress.com/2007/02/24/50-reasons-not-to-change/

          The red ones are probably really hard to get by (but it will depend where in the
          organization you sit).

          However, the green ones are simply not true: Modernization of NonStop applications is
          possible and not complicated. It can and has been done and it is NOT a fad.




                                                                                                  32
comForte Webinar "Application
Modernization"




          The picture here is an image drawn during a workshop on NonStop security. It shows the
          “organizational disconnect” of different players such as CIO, the CSO, Application Architect,
          NonStop group, the IBM group etc. All players have different knowledge, viewpoints and a
          different agenda. The end result very often that decisions regarding properly securing
          NonStop systems do not yield the best end result.

          A very similar situation occurs with “modernizing NonStop systems”: There is a culture
          clash between the CIO (influenced by Gartner), Midrange management, NonStop
          management (rightly mostly concerned with keeping the system and applications up), the
          CFO and other players.

          That all said, from the proper viewpoint, *not* modernizing NonStop systems does not
          seem the best choice in most customer scenarios – as this Webinar tried to explain.




                                                                                                          33
comForte Webinar "Application
Modernization"




                                34
comForte Webinar "Application
Modernization"




          Let us summarize a bit …
          -Cost cutting alone can be dangerous
          -There are many options to modernize
          -Many NonStop users are already modernizing
          -Modernizing can in fact save money




                                                        35
comForte Webinar "Application
Modernization"




          Let us try to summarize why we believe you should work with comForte in the area of
          “Modernizing your NonStop applications”
          -we do have a proven track record of successful projects. While we can not name many
          customers publicly, we are happy to provide more details about any of the scenarios shown
          here
          -no other vendor in the NonStop space comes even remotely close do our breadth of
          products and expertise
          -unfortunately, the Gartners and Accentures of the world have very little understanding of
          the NonStop platform

          comForte CAN help in these areas




                                                                                                       36
comForte Webinar "Application
Modernization"




          Finally coming back to the opening evolutionary theme (and away from the car analogy)…

          We are looking at the evolutionary graph of “cats” here with the sabre tooth cat living
          about 25 million years ago. Today, the sabre tooth cat is extinct.

          Where do you see YOUR NonStop system on this graph ? Will it become extinct ? Or a rare
          instance in zoos such as the Tiger ?

          Or a very smart, adaptable animal such as cat ?

          But please DO remember: right now your NonStop *is* vital to your organization, so some
          ‘minimal application modernization’ is highly recommended…




                                                                                                    37
comForte Webinar "Application
Modernization"




          We hope this Webinar was interesting to you. This Webinar is available on YouTube, see
          introductory slides.

          comForte does welcome any feedback to this Webinar – please see www.comforte.com or
          send an e-mail to the author of this Webinar, Thomas Burg, at t.burg@comforte.com




                                                                                                   38

More Related Content

Viewers also liked

Revolución Industrial
Revolución IndustrialRevolución Industrial
Revolución Industrialanonix
 
Forrester Research How Interactive Marketers Should Rethink Traditional App...
Forrester Research   How Interactive Marketers Should Rethink Traditional App...Forrester Research   How Interactive Marketers Should Rethink Traditional App...
Forrester Research How Interactive Marketers Should Rethink Traditional App...Julie Benlolo
 
Handout 1: Inovation Generation Broadband Policy Summit
Handout 1:  Inovation Generation Broadband Policy SummitHandout 1:  Inovation Generation Broadband Policy Summit
Handout 1: Inovation Generation Broadband Policy SummitDouglas K. Hartman
 
Präsentation Ringvorlesung Mai 2011
Präsentation Ringvorlesung Mai 2011Präsentation Ringvorlesung Mai 2011
Präsentation Ringvorlesung Mai 2011Janina Wildfeuer
 
Práctica no 3 balanza analítica
Práctica no 3 balanza analíticaPráctica no 3 balanza analítica
Práctica no 3 balanza analíticaeriksoon
 
Brand building and category expansion_ITC Interrobang Case Competition FMS_Delhi
Brand building and category expansion_ITC Interrobang Case Competition FMS_DelhiBrand building and category expansion_ITC Interrobang Case Competition FMS_Delhi
Brand building and category expansion_ITC Interrobang Case Competition FMS_DelhiSukesh Chandra Gain
 
Universal Table Spaces for DB2 10 for z/OS - IOD 2010 Seesion 1929 - favero
 Universal Table Spaces for DB2 10 for z/OS - IOD 2010 Seesion 1929 - favero Universal Table Spaces for DB2 10 for z/OS - IOD 2010 Seesion 1929 - favero
Universal Table Spaces for DB2 10 for z/OS - IOD 2010 Seesion 1929 - faveroWillie Favero
 
Living Villages 2 - Rural Isolation
Living Villages 2 - Rural IsolationLiving Villages 2 - Rural Isolation
Living Villages 2 - Rural IsolationJesse Norman
 
MitigacióN Ambiental
MitigacióN AmbientalMitigacióN Ambiental
MitigacióN Ambientaloliverlizana
 
Outline To Rough Draft
Outline To Rough DraftOutline To Rough Draft
Outline To Rough DraftBarb Jansen
 
What Spiritual Gifts are?
What Spiritual Gifts are?What Spiritual Gifts are?
What Spiritual Gifts are?Joy Joseph
 
How young people look for information online
How young people look for information onlineHow young people look for information online
How young people look for information onlineKoordinaatti
 
Is social work a profession? Imran Ahmad Sajid
Is social work a profession? Imran Ahmad SajidIs social work a profession? Imran Ahmad Sajid
Is social work a profession? Imran Ahmad SajidDr. Imran A. Sajid
 
Top 10 Need-to-Knows About Social Networking and Where It's Headed
Top 10 Need-to-Knows About Social Networking and Where It's HeadedTop 10 Need-to-Knows About Social Networking and Where It's Headed
Top 10 Need-to-Knows About Social Networking and Where It's HeadedDr. William J. Ward
 

Viewers also liked (20)

Recen20
Recen20Recen20
Recen20
 
Part 5 identity
Part 5 identityPart 5 identity
Part 5 identity
 
As redes sociais e as novas identidades
As redes sociais e as novas identidadesAs redes sociais e as novas identidades
As redes sociais e as novas identidades
 
Os05
Os05Os05
Os05
 
Revolución Industrial
Revolución IndustrialRevolución Industrial
Revolución Industrial
 
Forrester Research How Interactive Marketers Should Rethink Traditional App...
Forrester Research   How Interactive Marketers Should Rethink Traditional App...Forrester Research   How Interactive Marketers Should Rethink Traditional App...
Forrester Research How Interactive Marketers Should Rethink Traditional App...
 
Handout 1: Inovation Generation Broadband Policy Summit
Handout 1:  Inovation Generation Broadband Policy SummitHandout 1:  Inovation Generation Broadband Policy Summit
Handout 1: Inovation Generation Broadband Policy Summit
 
Präsentation Ringvorlesung Mai 2011
Präsentation Ringvorlesung Mai 2011Präsentation Ringvorlesung Mai 2011
Präsentation Ringvorlesung Mai 2011
 
Práctica no 3 balanza analítica
Práctica no 3 balanza analíticaPráctica no 3 balanza analítica
Práctica no 3 balanza analítica
 
Brand building and category expansion_ITC Interrobang Case Competition FMS_Delhi
Brand building and category expansion_ITC Interrobang Case Competition FMS_DelhiBrand building and category expansion_ITC Interrobang Case Competition FMS_Delhi
Brand building and category expansion_ITC Interrobang Case Competition FMS_Delhi
 
Universal Table Spaces for DB2 10 for z/OS - IOD 2010 Seesion 1929 - favero
 Universal Table Spaces for DB2 10 for z/OS - IOD 2010 Seesion 1929 - favero Universal Table Spaces for DB2 10 for z/OS - IOD 2010 Seesion 1929 - favero
Universal Table Spaces for DB2 10 for z/OS - IOD 2010 Seesion 1929 - favero
 
Living Villages 2 - Rural Isolation
Living Villages 2 - Rural IsolationLiving Villages 2 - Rural Isolation
Living Villages 2 - Rural Isolation
 
MitigacióN Ambiental
MitigacióN AmbientalMitigacióN Ambiental
MitigacióN Ambiental
 
Outline To Rough Draft
Outline To Rough DraftOutline To Rough Draft
Outline To Rough Draft
 
What Spiritual Gifts are?
What Spiritual Gifts are?What Spiritual Gifts are?
What Spiritual Gifts are?
 
Anticuerpo
AnticuerpoAnticuerpo
Anticuerpo
 
How young people look for information online
How young people look for information onlineHow young people look for information online
How young people look for information online
 
Gardens of Hope: Urban Micro-Farming
Gardens of Hope: Urban Micro-FarmingGardens of Hope: Urban Micro-Farming
Gardens of Hope: Urban Micro-Farming
 
Is social work a profession? Imran Ahmad Sajid
Is social work a profession? Imran Ahmad SajidIs social work a profession? Imran Ahmad Sajid
Is social work a profession? Imran Ahmad Sajid
 
Top 10 Need-to-Knows About Social Networking and Where It's Headed
Top 10 Need-to-Knows About Social Networking and Where It's HeadedTop 10 Need-to-Knows About Social Networking and Where It's Headed
Top 10 Need-to-Knows About Social Networking and Where It's Headed
 

Similar to Survival of the Fittest: Modernize your NonStop applications today

HP NonStop applications: Modernization from the Ground-up and the User-in
HP NonStop applications: Modernization from the Ground-up and the User-inHP NonStop applications: Modernization from the Ground-up and the User-in
HP NonStop applications: Modernization from the Ground-up and the User-inThomas Burg
 
SOFTWARE PLATFORM STRATEGY @The 5th International Symposium on Operations Man...
SOFTWARE PLATFORM STRATEGY @The 5th International Symposium on Operations Man...SOFTWARE PLATFORM STRATEGY @The 5th International Symposium on Operations Man...
SOFTWARE PLATFORM STRATEGY @The 5th International Symposium on Operations Man...FusionDesign Inc.
 
Digitalisation of financial supply chain some trends 2015 to 2016
Digitalisation of financial supply chain some trends 2015 to 2016Digitalisation of financial supply chain some trends 2015 to 2016
Digitalisation of financial supply chain some trends 2015 to 2016Jos Feyaerts
 
ENG 102 Unit Six Page 1 of 1 ENG 102 Composition II .docx
ENG 102 Unit Six Page 1 of 1  ENG 102 Composition II  .docxENG 102 Unit Six Page 1 of 1  ENG 102 Composition II  .docx
ENG 102 Unit Six Page 1 of 1 ENG 102 Composition II .docxSALU18
 
European SharePoint Conference: Mobile Applications for SharePoint using HTML5
European SharePoint Conference: Mobile Applications for SharePoint using HTML5European SharePoint Conference: Mobile Applications for SharePoint using HTML5
European SharePoint Conference: Mobile Applications for SharePoint using HTML5Christian Heindel
 
Report on xtuple ERP Software
Report on xtuple ERP SoftwareReport on xtuple ERP Software
Report on xtuple ERP Softwareamiteshg
 
IRJET- Voice Recognition(AI) : Voice Assistant Robot
IRJET-  	  Voice Recognition(AI) : Voice Assistant RobotIRJET-  	  Voice Recognition(AI) : Voice Assistant Robot
IRJET- Voice Recognition(AI) : Voice Assistant RobotIRJET Journal
 
New Developments in New-Product Development
New Developments in New-Product DevelopmentNew Developments in New-Product Development
New Developments in New-Product DevelopmentPTC
 
Dual licensing policy zk
Dual licensing policy zkDual licensing policy zk
Dual licensing policy zkKarel Charvat
 
Open Mobile Broadcasting Phones
Open Mobile Broadcasting PhonesOpen Mobile Broadcasting Phones
Open Mobile Broadcasting PhonesFrancois Lefebvre
 
Beware the monolith
Beware the monolithBeware the monolith
Beware the monolithDee Wilcox
 
A Tale of Contemporary Software
A Tale of Contemporary SoftwareA Tale of Contemporary Software
A Tale of Contemporary SoftwareYun Zhi Lin
 
Exploiting Maemo
Exploiting MaemoExploiting Maemo
Exploiting Maemoanidel
 
Rethinking Version Control for Agile Content
Rethinking Version Control for Agile ContentRethinking Version Control for Agile Content
Rethinking Version Control for Agile ContentJang F.M. Graat
 
Enterprise Architecture in Practice: from Datastore to APIs and Apps
Enterprise Architecture in Practice: from Datastore to APIs and AppsEnterprise Architecture in Practice: from Datastore to APIs and Apps
Enterprise Architecture in Practice: from Datastore to APIs and AppsWSO2
 
Engage 2017 - Choose your own adventure
Engage 2017 - Choose your own adventureEngage 2017 - Choose your own adventure
Engage 2017 - Choose your own adventureMark Myers
 

Similar to Survival of the Fittest: Modernize your NonStop applications today (20)

HP NonStop applications: Modernization from the Ground-up and the User-in
HP NonStop applications: Modernization from the Ground-up and the User-inHP NonStop applications: Modernization from the Ground-up and the User-in
HP NonStop applications: Modernization from the Ground-up and the User-in
 
Vroom!
Vroom!Vroom!
Vroom!
 
SOFTWARE PLATFORM STRATEGY @The 5th International Symposium on Operations Man...
SOFTWARE PLATFORM STRATEGY @The 5th International Symposium on Operations Man...SOFTWARE PLATFORM STRATEGY @The 5th International Symposium on Operations Man...
SOFTWARE PLATFORM STRATEGY @The 5th International Symposium on Operations Man...
 
Digitalisation of financial supply chain some trends 2015 to 2016
Digitalisation of financial supply chain some trends 2015 to 2016Digitalisation of financial supply chain some trends 2015 to 2016
Digitalisation of financial supply chain some trends 2015 to 2016
 
CMS White Paper
CMS White PaperCMS White Paper
CMS White Paper
 
Xenit diary dev con 2018
Xenit diary dev con 2018Xenit diary dev con 2018
Xenit diary dev con 2018
 
ENG 102 Unit Six Page 1 of 1 ENG 102 Composition II .docx
ENG 102 Unit Six Page 1 of 1  ENG 102 Composition II  .docxENG 102 Unit Six Page 1 of 1  ENG 102 Composition II  .docx
ENG 102 Unit Six Page 1 of 1 ENG 102 Composition II .docx
 
European SharePoint Conference: Mobile Applications for SharePoint using HTML5
European SharePoint Conference: Mobile Applications for SharePoint using HTML5European SharePoint Conference: Mobile Applications for SharePoint using HTML5
European SharePoint Conference: Mobile Applications for SharePoint using HTML5
 
Data web marketing
Data web marketingData web marketing
Data web marketing
 
Report on xtuple ERP Software
Report on xtuple ERP SoftwareReport on xtuple ERP Software
Report on xtuple ERP Software
 
IRJET- Voice Recognition(AI) : Voice Assistant Robot
IRJET-  	  Voice Recognition(AI) : Voice Assistant RobotIRJET-  	  Voice Recognition(AI) : Voice Assistant Robot
IRJET- Voice Recognition(AI) : Voice Assistant Robot
 
New Developments in New-Product Development
New Developments in New-Product DevelopmentNew Developments in New-Product Development
New Developments in New-Product Development
 
Dual licensing policy zk
Dual licensing policy zkDual licensing policy zk
Dual licensing policy zk
 
Open Mobile Broadcasting Phones
Open Mobile Broadcasting PhonesOpen Mobile Broadcasting Phones
Open Mobile Broadcasting Phones
 
Beware the monolith
Beware the monolithBeware the monolith
Beware the monolith
 
A Tale of Contemporary Software
A Tale of Contemporary SoftwareA Tale of Contemporary Software
A Tale of Contemporary Software
 
Exploiting Maemo
Exploiting MaemoExploiting Maemo
Exploiting Maemo
 
Rethinking Version Control for Agile Content
Rethinking Version Control for Agile ContentRethinking Version Control for Agile Content
Rethinking Version Control for Agile Content
 
Enterprise Architecture in Practice: from Datastore to APIs and Apps
Enterprise Architecture in Practice: from Datastore to APIs and AppsEnterprise Architecture in Practice: from Datastore to APIs and Apps
Enterprise Architecture in Practice: from Datastore to APIs and Apps
 
Engage 2017 - Choose your own adventure
Engage 2017 - Choose your own adventureEngage 2017 - Choose your own adventure
Engage 2017 - Choose your own adventure
 

More from Thomas Burg

HPE NonStop GTUG Berlin - 'Yuma' Workshop
HPE NonStop GTUG Berlin - 'Yuma' Workshop HPE NonStop GTUG Berlin - 'Yuma' Workshop
HPE NonStop GTUG Berlin - 'Yuma' Workshop Thomas Burg
 
Comparing the TCO of HP NonStop with Oracle RAC
Comparing the TCO of HP NonStop with Oracle RACComparing the TCO of HP NonStop with Oracle RAC
Comparing the TCO of HP NonStop with Oracle RACThomas Burg
 
BASE24 classic - modernization options
BASE24 classic - modernization optionsBASE24 classic - modernization options
BASE24 classic - modernization optionsThomas Burg
 
You may be compliant, but are you really secure?
You may be compliant, but are you really secure?You may be compliant, but are you really secure?
You may be compliant, but are you really secure?Thomas Burg
 
2014 11 data at rest protection for base24 - lessons learned in production
2014 11 data at rest protection for base24 - lessons learned in production2014 11 data at rest protection for base24 - lessons learned in production
2014 11 data at rest protection for base24 - lessons learned in productionThomas Burg
 
The attack against target - how was it done and how has it changed the securi...
The attack against target - how was it done and how has it changed the securi...The attack against target - how was it done and how has it changed the securi...
The attack against target - how was it done and how has it changed the securi...Thomas Burg
 
The attack on TARGET: how was it done - lessons learned for protecting HP Non...
The attack on TARGET: how was it done - lessons learned for protecting HP Non...The attack on TARGET: how was it done - lessons learned for protecting HP Non...
The attack on TARGET: how was it done - lessons learned for protecting HP Non...Thomas Burg
 
comForte CSL: a messaging middleware framework for HP NonStop
comForte CSL: a messaging middleware framework for HP NonStopcomForte CSL: a messaging middleware framework for HP NonStop
comForte CSL: a messaging middleware framework for HP NonStopThomas Burg
 
2014 02 comForte SecurTape product
2014 02 comForte SecurTape product2014 02 comForte SecurTape product
2014 02 comForte SecurTape productThomas Burg
 
From Russia with Love - modern tools used in Cyber Attacks
From Russia with Love - modern tools used in Cyber AttacksFrom Russia with Love - modern tools used in Cyber Attacks
From Russia with Love - modern tools used in Cyber AttacksThomas Burg
 
The Verizon 2012/2013 Data Breach Investigations Reports - Lessons Learned fo...
The Verizon 2012/2013 Data Breach Investigations Reports - Lessons Learned fo...The Verizon 2012/2013 Data Breach Investigations Reports - Lessons Learned fo...
The Verizon 2012/2013 Data Breach Investigations Reports - Lessons Learned fo...Thomas Burg
 

More from Thomas Burg (11)

HPE NonStop GTUG Berlin - 'Yuma' Workshop
HPE NonStop GTUG Berlin - 'Yuma' Workshop HPE NonStop GTUG Berlin - 'Yuma' Workshop
HPE NonStop GTUG Berlin - 'Yuma' Workshop
 
Comparing the TCO of HP NonStop with Oracle RAC
Comparing the TCO of HP NonStop with Oracle RACComparing the TCO of HP NonStop with Oracle RAC
Comparing the TCO of HP NonStop with Oracle RAC
 
BASE24 classic - modernization options
BASE24 classic - modernization optionsBASE24 classic - modernization options
BASE24 classic - modernization options
 
You may be compliant, but are you really secure?
You may be compliant, but are you really secure?You may be compliant, but are you really secure?
You may be compliant, but are you really secure?
 
2014 11 data at rest protection for base24 - lessons learned in production
2014 11 data at rest protection for base24 - lessons learned in production2014 11 data at rest protection for base24 - lessons learned in production
2014 11 data at rest protection for base24 - lessons learned in production
 
The attack against target - how was it done and how has it changed the securi...
The attack against target - how was it done and how has it changed the securi...The attack against target - how was it done and how has it changed the securi...
The attack against target - how was it done and how has it changed the securi...
 
The attack on TARGET: how was it done - lessons learned for protecting HP Non...
The attack on TARGET: how was it done - lessons learned for protecting HP Non...The attack on TARGET: how was it done - lessons learned for protecting HP Non...
The attack on TARGET: how was it done - lessons learned for protecting HP Non...
 
comForte CSL: a messaging middleware framework for HP NonStop
comForte CSL: a messaging middleware framework for HP NonStopcomForte CSL: a messaging middleware framework for HP NonStop
comForte CSL: a messaging middleware framework for HP NonStop
 
2014 02 comForte SecurTape product
2014 02 comForte SecurTape product2014 02 comForte SecurTape product
2014 02 comForte SecurTape product
 
From Russia with Love - modern tools used in Cyber Attacks
From Russia with Love - modern tools used in Cyber AttacksFrom Russia with Love - modern tools used in Cyber Attacks
From Russia with Love - modern tools used in Cyber Attacks
 
The Verizon 2012/2013 Data Breach Investigations Reports - Lessons Learned fo...
The Verizon 2012/2013 Data Breach Investigations Reports - Lessons Learned fo...The Verizon 2012/2013 Data Breach Investigations Reports - Lessons Learned fo...
The Verizon 2012/2013 Data Breach Investigations Reports - Lessons Learned fo...
 

Recently uploaded

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Recently uploaded (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Survival of the Fittest: Modernize your NonStop applications today

  • 1. comForte Webinar "Application Modernization" This deck of slides was used as the basis for a Webinar which comForte presented in May 2011 This PDF document serves as the “offline” version of the Webinar – but it is still HIGHLY recommended to listen to the actual Webinar which is available on YouTube: comForte general YouTube channel: http://www.youtube.com/comforte21 On YouTube, this Webinar split in two parts: • Part 1/2: http://youtu.be/nJtUxr6DNtE • Part 2/2: http://youtu.be/ERcu48M6nG4 1
  • 2. comForte Webinar "Application 4-Jul-11 Modernization" As of June 2011, comForte is far and foremost the worlds largest ISV in the HP NonStop space which focuses on platform modernization in the key areas of security, connectivity, networking and emulation. comForte 21 GmbH is a privately hold organization with subsidiaries across the globe as shown here. It has roughly 60 employess and has a strong business relationship with the HP NonStop Enterprise Division (NED): several comForte products are OEM’d by HP. For more information on comForte, please see http://www.comforte.com 2
  • 3. comForte Webinar "Application Modernization" In this section, we look at how many people (wrongly!) perceive NonStop systems as “legacy” and “costly”. 3
  • 4. comForte Webinar "Application Modernization" Side note on cars: On the left there is a Porsche 356, predecessor of 911, produced 1948 – 1965. And yes, Porsche is NonStop customer ! The headline of this slide is (unfortunately) the view shared by many CIOs and IT leaders. These systems have been around 35+ years after all – so OLD indeed they are. And aren’t these systems kind of like mainframes (so sure enough they are EXPENSIVE) ? [both true for the car shown here by the way] . And don’t I see my people using special emulators getting to the systems (INFLEXIBLE?) ? The reality is more complex and is discussed controversially using themes such as Total Cost of Ownership (TCO) discussion, the platform being “open” or “standard”. Let’s try to stay with the facts here: -yes, the systems have been around for a long time -So have been some applications running on it -Some applications have not seen changes in the last 10 years -the Gartner’s of the world don’t like them (if nothing else, because they don’t run on X86 hardware) While the speaker personally does not find the systems either expensive or inflexible, he has heard that statement from customers over and over again. So it seems like that – if nothing else – some CIOs will find this statement accurate. 4
  • 5. comForte Webinar "Application Modernization" From the perception “inflexible & costly” it is a small step to want to bring cost down or migrate off the platform. In the car analogy, that might translate into: -Keeping the Porsche, but don’t maintain it fully -Sell the Porsche, buy Golf This matches what comForte hears when talking to some of their NonStop customers: - “The platform is no longer strategic” -“Our CIO wants to go into the cloud direction” -“No new applications are put on the platform” At the end of the day, it seems like the two options considered most often are indeed “migrate off” or “get rid of it totally” 5
  • 6. comForte Webinar "Application Modernization" What happens if you under-maintain a Porsche: worst-case it looks like this Porsche 356 in Berkeley, CA.. The money spent on actual modernization of a typical NonStop system beyond the cyclical hardware upgrade is – in comForte’s estimate – rather low. That actually does imply risk for the applications running on your NonStop. If these applications would not be VITAL for your organization, they would not be running on the platform in the first place – so let’s look at some risk scenarios: -Scenario I: Financial institution driving their ATMs. System goes down. ATM outage. In the paper the next day -Scenario II: Payment solutions provider aquiring POS transactions. System is “hacked”. All credit card data of the current day (month) is lost to the hackers. Very bad press. Stock price will go down. -Scenario III: Hospital using NonStop for medical records. NonStop is hacked, medical data is posted online. So from a simple risk perspective, the NonStop seems well worth investing in. Note that while scenario #1 is well covered (this is what NonStop is all about), scenarios #2 and #3 are typically not. Why is the NonStop often overlooked ? Photo source: http://www.flickr.com/photos/stormbear/2824269720/ 6
  • 7. comForte Webinar "Application Modernization" Obviously, you want to start with an assessment on where you are (left side, hopefully neither picture being close to your status). Then you need to decide where you want to be on the right side. Talking with many customers, we find it interesting, that there seems to be no “best practice” as to “how modern” NonStop systems are at the typical large IT operation. You will find all kind of “cars” … Where you want to be is obviously on the lower right … however your budget is limited – both in terms of human resources and capital investment. The car analogy is maybe not the perfect fit here, but you certainly don’t want to run your critical applications on IT systems which match some cars on the left side of the slide. A modern car (whether a Porsche, Ferrari or Golf) will cost you less money and better integrate with your other IT systems. 7
  • 8. comForte Webinar "Application Modernization" Why would you want to work with comForte: -We have changed many tires / modernized many NonStop applications -We are the only vendor in the NonStop world which offers a whole breadth of products in areas of modernization such as Terminal access, SOAP-enabling, security standardization In the rest of this presentation, we’ll show some specific examples 8
  • 9. comForte Webinar "Application Modernization" Here we (briefly) look at the foundations of Pathway and how modern it was decades ago. This is the reason why many of the old applications can be modernized relatively easy. 9
  • 10. comForte Webinar "Application Modernization" This picture shows how you do *not* want to modernize your NonStop systems – changing an engine while driving is not a good idea… 10
  • 11. comForte Webinar "Application Modernization" This diagram is from a HP NonStop manual on “Pathway”, the transaction monitor for NonStop systems. It looks somewhat old because it actually *is* old – Pathway was created about 20 years ago. The terminology used here (PATHCOM, TERM, Terminal, PATHMON etc.) certainly looks outdated. But let’s look behind what Pathway is actually doing – the colors in the diagram show an abstraction layer for: -database (blue), -server code (“app logic”, green) -client code (“presentation layer”, orange) 11
  • 12. comForte Webinar "Application Modernization" This diagram is how a modern Software stack for Java development might look like. All acronyms are modern and up-to-date (at least today…). However, looking at the abstraction layer we see the same three layers (Presentation, Business logic, Database). This proves that Pathway was a very modern (brilliant!) concept when it was invented. 12
  • 13. comForte Webinar "Application Modernization" The similarity between Pathway and modern development paradigms such as J2EE are very important: Because NonStop applications were designed based on still-up-to-date design “patterns” 20 years ago, they can easily be modernized with very low risk and at moderate cost 13
  • 14. comForte Webinar "Application Modernization" In this section, we look at some reasons for modernizing – saving money being among them. 14
  • 15. comForte Webinar "Application Modernization" Side note: for many customers, NonStop system *are* their cash cows as they process the very transactions which generate the core revenue (credit card transactions, ATM transactions, stock transactions, connecting mobile phones to the network). The point here is different, namely that Modernization can pay for itself .We will look at some real-life scenarios in which actual comForte customers are saving money through having modernized their NonStop applications. 15
  • 16. comForte Webinar "Application Modernization" Here is an example for a return on investment (ROI) calculation for an actual project comForte did for a large Dutch customer. The “ROI calculator” shown here has been put on the Internet by a provider of Single-Sign-On solutions, NetIQ. The math done here calculates potential savings through implementing an SSO solution based on some numbers: • International Data Group reports that an average user in a 10,000-employee company has 14 separate passwords. • One password reset costs $10 - $30 • Calculator from http://www.netiq.com/products/spa/roicalc.asp • Assumptions from comForte • Total cost = (#incidents) x (time help desk) x (wage help desk) + (#incidents) x (time end user) x (wage end user) =120000 x 5 + 120000 x 7.5 = 600000 + 900000 = 1.500.00 The car falling in the water was in fact used as a model by the project manager: when facing internal resistance to put the finished project live (“we are too busy”) he threatened to put a crane on the parking lot and drop a brand new BMW every month as this was the money they were loosing by not putting the project live. 16
  • 17. comForte Webinar "Application Modernization" Here is another look at cost savings through modernization: in the “before” scenario, costs occur through: -Maintaining of the SNA network -The very high license cost for SNA connectivity software on NonStop 17
  • 18. comForte Webinar "Application Modernization" Post-modernization, the user is using the comForte product uLinga, replacing SNA network with “full IP”. There were no application changes required to reap these savings. 18
  • 19. comForte Webinar "Application Modernization" The diagram shows that in many organizations, NonStop systems have not followed trends in security and application design which evolved over the past 20 years. The reason for that is probably that “the system works”; but also the system often is simply overlooked by the organization. In Information Security, it is rather hard to calculate an actual ROI. The author of these slides think, that ROI is the wrong approach to security: are you calculationg the ROI of the fire alarms, sprinkler systems, emergency stairwells in your office buildings ? The computer security industry is gravitating towards “best practices” which are imposed through regulation and that is a healthy trend. It comes down to “risk management” rather than “ROI calculation”. Many NonStop systems lack some very basic security controls such as: -Firewalls -Integration in User provisioning, Strong Authentication, Single-Sign-On -Network IDS -Modern GUI tools for operators & developers -Modern GUI for applications -Integration in user provisioning, single-sign-on As the information on the platform is very confidential/important this results in massive risks. In the payment industry, that risk can easily be calculated: - The typical cost to replace a stolen credit card is $2-3 per credit card replacement - Assuming you process 1000 TPS on your NonStop system, that translates into $2000/second or roughly $170 Million/day For application modernization, doing nothing also has implied costs such as: -lack of platform acceptance for new employees (operators, developers) -loss of end user productivity 19
  • 20. comForte Webinar "Application Modernization" In this section, we will look at three real-life examples of modernization using comForte products and services 20
  • 21. comForte Webinar "Application Modernization" NonStop systems are complex by nature. Application –and their supporting infrastructure- have grown over years, so “where to start” modernizing is not always an easy question. Also, there is never a clear boundary between “the application” and its “foundation technologies” such as how to get to the application (TELSERV anyone?), how users are authenticated etc. comForte is uniquely positioned within the NonStop ISV space as only comForte has the breadth of modernization products and experience ranging across security, networking, emulation access and application design. 21
  • 22. comForte Webinar "Application Modernization" Here we look at a rather typical application scenario of a comForte customer prior to working with us: - Beyond the NonStop platform, there were corporate standards for how integrate applications in the corporate SOA framework - On the NonStop, BASE24 is running and while it is handling the transactional load nicely, all management of users is done through terminal emulation Beyond the IT issue of having a platform which does not follow corporate design standards, from a business perspective there was the requirement to allow access to BASE24 for end users through the Internet. 22
  • 23. comForte Webinar "Application Modernization" This diagram shows the customer scenario after modernizing with comForte products: BASE24 is now fully integrated into the corporate SOA ecosystems. From and end user perspective, NonStop/BASE24 is just “another service” which can be used when authorized properly. Note that only minimal application changes for BASE24 where required, see next slide. 23
  • 24. comForte Webinar "Application Modernization" This “Geek Slide” shows the technical details for the chosen solution: • Grey/orange: the corporate SOA ecosystem for “other systems” • Light blue: BASE24 classic • Bright orange: comForte product CSL enabling integration of BASE24 via a WS endpoint implementing a BASE24 gateway. • Please contact comForte, t.burg@comforte.com, for details of this implementation 24
  • 25. comForte Webinar "Application Modernization" This example shows how Applied Industrial Technologies chose an evolutionary approach to Application Modernization. From left to right, the application was modernized in two steps. ___________________________________________________ Here is an excerpts from Connection article, written by AIT, available from comForte upon request: In our ongoing efforts to deliver top products and services, our operational infrastructure is critical: It plays a central role in how responsive and effective our sales and support organizations can be, as well as how efficient and profitable, our organization ultimately is. Consequently, OMNEX® is integral to our success. OMNEX is a NonStop-based operational system used for order entry, order processing, inventory management, and a host of other business-critical processes. In many ways, OMNEX is a typical NonStop application. Developed in COBOL over the course of 15 years, this system has hundreds of screens, batch programs, and associated Pathway servers. Accessed through traditional NonStop “green screens,” the system, while extremely powerful, was highly complex to use. To do anything beyond the most basic tasks, new users faced a very steep learning curve. 25
  • 26. comForte Webinar "Application Modernization" The old application (leftmost figures) presented a classical text mode screen using a fixed size and proportional fonts. During the first step of the modernization, the comForte product JPath was used to do a quick conversion to a more modern look and feel (see figures in the center). Access is no via a browser; also the “proportional font block-mode screen” has been replaced by a more modern, HTML-type view. This works without having to redraw any screens manually. In the last step, the client-side code of the application was completely rewritten. 26
  • 27. comForte Webinar "Application Modernization" This diagram shows the final architecture: • the old application code is still being used for these screens which were not used enough to justify a rewrite (using JPath via 6530 terminal sessions) • CSL is used to connect a middle tier implementing Web Services to the original Pathway servers • JDBC is used to make direct SQL calls from the middle tier to the SQL database • SOAP requests are made from new client (called Asyst and implemented using Ecclipse) to the middle tier 27
  • 28. comForte Webinar "Application Modernization" We have looked at this customer early when we discussed the savings involved in many users having to enter their password again when logging on to the NonStop system. This is the “before” scenario where users first logon on to Windows using a smart card to provide extra security. Then they log on to NonStop using username and password which is both cumbersome and not very secure. 28
  • 29. comForte Webinar "Application Modernization" The modernization project via comForte required only a couple of lines of code being changed in the application; now authentication to logon leverages the existing logon to Windows. 29
  • 30. comForte Webinar "Application Modernization" The SecurSSO product combined with J6530 emulation here implements secure Single- Sign-On. SecurSSO uses the Kerberos protocol to tightly integrate NonStop into Microsoft Active Directory authentication. 30
  • 32. comForte Webinar "Application Modernization" Here are “50 reasons not to change” – found on the Internet at http://13c4.wordpress.com/2007/02/24/50-reasons-not-to-change/ The red ones are probably really hard to get by (but it will depend where in the organization you sit). However, the green ones are simply not true: Modernization of NonStop applications is possible and not complicated. It can and has been done and it is NOT a fad. 32
  • 33. comForte Webinar "Application Modernization" The picture here is an image drawn during a workshop on NonStop security. It shows the “organizational disconnect” of different players such as CIO, the CSO, Application Architect, NonStop group, the IBM group etc. All players have different knowledge, viewpoints and a different agenda. The end result very often that decisions regarding properly securing NonStop systems do not yield the best end result. A very similar situation occurs with “modernizing NonStop systems”: There is a culture clash between the CIO (influenced by Gartner), Midrange management, NonStop management (rightly mostly concerned with keeping the system and applications up), the CFO and other players. That all said, from the proper viewpoint, *not* modernizing NonStop systems does not seem the best choice in most customer scenarios – as this Webinar tried to explain. 33
  • 35. comForte Webinar "Application Modernization" Let us summarize a bit … -Cost cutting alone can be dangerous -There are many options to modernize -Many NonStop users are already modernizing -Modernizing can in fact save money 35
  • 36. comForte Webinar "Application Modernization" Let us try to summarize why we believe you should work with comForte in the area of “Modernizing your NonStop applications” -we do have a proven track record of successful projects. While we can not name many customers publicly, we are happy to provide more details about any of the scenarios shown here -no other vendor in the NonStop space comes even remotely close do our breadth of products and expertise -unfortunately, the Gartners and Accentures of the world have very little understanding of the NonStop platform comForte CAN help in these areas 36
  • 37. comForte Webinar "Application Modernization" Finally coming back to the opening evolutionary theme (and away from the car analogy)… We are looking at the evolutionary graph of “cats” here with the sabre tooth cat living about 25 million years ago. Today, the sabre tooth cat is extinct. Where do you see YOUR NonStop system on this graph ? Will it become extinct ? Or a rare instance in zoos such as the Tiger ? Or a very smart, adaptable animal such as cat ? But please DO remember: right now your NonStop *is* vital to your organization, so some ‘minimal application modernization’ is highly recommended… 37
  • 38. comForte Webinar "Application Modernization" We hope this Webinar was interesting to you. This Webinar is available on YouTube, see introductory slides. comForte does welcome any feedback to this Webinar – please see www.comforte.com or send an e-mail to the author of this Webinar, Thomas Burg, at t.burg@comforte.com 38