Title :
Using design recovery techniques to transform legacy systems
Author :
Dean, Thomas R. ; Cordy, James R. ; Schneider, Kevin A. ; Malton, Andrew J.
Author_Institution :
Dept. of Electr. & Comput. Eng., Queen´´s Univ., Kingston, Ont., Canada
Abstract :
The year 2000 problem posed a difficult problem for many IT shops world wide. The most difficult part of the problem was not the actual changes to ensure compliance, but finding and classifying the data fields that represent dates. This is a problem well suited to design recovery. The paper presents an overview of LS/2000, a system that used design recovery to analyze source code for year 2000 risks and guide a source transformation that was able to automatically remediate over 99% of the year 2000 risks in over three billion lines of production IT source
Keywords :
risk management; software architecture; software maintenance; software tools; system recovery; IT shops; LS/2000; compliance; data fields; dates; design recovery; design recovery techniques; legacy system transformation; production IT source; source code analysis; source transformation; year 2000 problem; year 2000 risks; Computer science; Councils; Data engineering; Data structures; Databases; Design engineering; Humans; Information science;
Conference_Titel :
Software Maintenance, 2001. Proceedings. IEEE International Conference on
Conference_Location :
Florence
Print_ISBN :
0-7695-1189-9
DOI :
10.1109/ICSM.2001.972779