Solutions for Maintenance, Modernization and Transformation
CA 2E (Synon) Modernization
CA 2E (aka Synon and COOL:2E) is an enterprise CASE tool that has been in use since the 1980s. Many organizations have developed very large-scale applications with thousands of screens and millions of lines of generated code using CA 2E. These applications are critical to their business but they need maintaining and modernizing. Given the complexity, however, any major changes must be approached with great care and consideration.
CM First helps these organizations in different ways, according to their needs.
Training and services:
Some customers simply want to get more from their existing technology and staff. We offer CA 2E training optimized to current releases, delivered by experienced industry experts at your location. We also offer a cost-effective, retained services plan that places experienced CA 2E engineers at your disposal for both short- and long-term engagements. We can help with projects such as transitioning from DDS to SQL, implementing a services architecture, integrating a CM or PTC Implementer DevOps solution, or integrating with SAP and Oracle. Since CM First is in partnership with CA Technologies, IBM and PTC, we work closely with the product vendors to solve integration issues that may arise.
In some cases, CA 2E users have more ambitious goals. For example, they may need to migrate RPG or COBOL generated applications to different hardware platforms on which CA 2E is not supported. Using the CM M3 technology and methodology, we offer automated migration services to convert CA 2E applications to Java or .NET, and implement them on the platform of choice, such as Linux or a cloud service, like AWS or Azure. We support several database options ranging from Oracle to SQL Server. CM First’s automated migration services are provided with a fixed price and a guarantee.
Business Rules Analytics
Business rules are the building blocks of any enterprise software system. However, in most legacy systems, the rules are not readily available to the analysts that need to understand or recreate the software. The is because the rule may be embedded in other logic that has an indirect relationship to the actual rule. Another complicating factor is that the rule may span different program calls and storage read/writes.
Many organizations rely on manual code walkthroughs to extract the rules, often using offshore teams. This approach consumes a lot of time and resources, and typically suffers from a high error rate – it is very difficult for human analysts to comprehend enterprise systems that are comprised of tens of thousands of components, and tens of millions of lines of code.
There is a more effective way to extract rules – by using sophisticated software that filters out the noise and presents the precise rules to the analyst in an easy to understand format. The CM evolveIT innovative harvesting technology uses interactive backwards slicing on program results to remove extraneous code and generates convenient diagrams of the resulting logic. This business process documentation can be used by both business and technical teams.
In addition to the unique CM evolveIT technology, CM First also offers training and mentoring to enterprise teams that are undertaking business rules projects. We help with all project phases, from design and conception through implementation and testing.
Mainframe App Maintenance
Mainframe systems embody decades of business and technical expertise, but that knowledge is buried in the million or more lines of code of a typical legacy application. Analysts spend many hours reading code in scan results and filtering out the false hits to perform impact analysis. When they miss a path due to the complexity of the code, inconsistent data naming, or other human error, the results can be costly.
CM First provides a new technology to automate and improve this analysis as part of the DevOps cycle. CM evolveIT is the key to reduce manual analysis time by as much as 80%. In addition to automating impact analysis using sophisticated program slicing and control flow analytics, it also helps developers improve code quality. CM evolveIT enables DevOps teams to calculate software maintainability metrics at all levels, identify and manage redundant code, and analyze coding practices, using automated techniques with visual diagrams.
Legacy App Integration
Monolithic enterprise applications are often difficult to integrate with COTS, such as SAP and Oracle, or with SaaS applications running in the cloud. The application architectures and technologies deployed in the 1970s, 80s and 90s are not compatible with cloud and microservices architectures. Depending on the use case, CM First can help with this problem.
For all applications, we can wrap legacy code with a microservices bus for communicating with external packages via low code process automation software link to Axon Ivy.
For COBOL and other mainframe systems, we offer CM evolveIT as a way to automatically analyze application code and either port it to other platform for easier integration, or facilitate development of a micoservices bus.
Data Lineage and Security
It is common knowledge that over 70 percent of the world’s data is stored and processed on mainframes. While z/OS is arguably the most secure computing platform, sensitive information residing on mainframe infrastructure must be protected. This, and the ongoing needs for corporate governance and regulatory compliance, demand robust, proactive classification and protection processes for data at rest and in motion.
CM evolveIT in combination with CA Data Content Discovery provides a powerful data lineage and security solution for mainframe-resident applications and data. CA Data Content Discovery finds and classifies data across common file types, databases and transfer products. Working with popular mainframe security products, user access to sensitive information can be monitored and restricted, as necessary.
CM evolveIT completes the solution by analyzing mainframe applications to identify where and how sensitive data is processed – in screens, reports, files and databases. Its fast and complete analyses help application owners determine what code changes must be made to ensure all instances of data use are known, appropriate and secure.