Modernizing and Improving the Maintainability of RPG Applications Using X-Analysis Version 5.6
An IBM Redpaper publication
Published 01 February 2006
IBM Form #: REDP-4046-00
Authors: LindaMay Patterson, Hiroshi Araki, Stuart Bramley, Gene Cobb, Joel Eikenhorst, Stuart Milligan, James Simons, Mark Tregear
Contributing companies: Databorough Limited
This IBM Redpaper covers the use of X-Analysis to accelerate the modernization and improve the maintainability of existing RPG applications. It discusses how X-Analysis is used to restructure and reuse the RPG application’s business logic and application data model, and includes step-by-step examples and scenarios showing an RPG application exposed by the tool. The paper shows how an application is visually displayed, starting from a high-level model and drilling down to program details such as the specific use of fields and files.
Use of X-Analysis to convert an existing application to the Model-View-Controller architecture is explained. In this instance, the View and Controller portions of the application are converted to JavaServer Faces and JavaBeans. X-Analysis takes advantage of the implicit data and process model in the application to create individually callable pieces of business logic.
This paper explores many of the capabilities available in X-Analysis and shows you how to write programs to use information stored in the cross-reference repository. You can use this information to simplify and automate your conversion process.
If you are thinking about modernization or maintainability, and want to accelerate the process, this is the Redpaper for you.
Table of contents
Chapter 1. Overview: modernization and X-Analysis
Chapter 2. Introducing the sample application
Chapter 3. Re-engineering an existing application to the MVC architecture
Chapter 4. Application maintainability and re-engineering
Chapter 5. Recovering application design
Chapter 6. Using the recovered model
Appendix A. Getting started with X-Analysis
Appendix B. X-Analysis cross-reference repository details
Others who read this publication also read
Follow IBM Redbooks
Follow IBM Redbooks