A Prescriptive Model for Migration to Microservices Based on SDLC Artifacts

Author(s):  
Deepali Bajaj ◽  
Urmil Bharti ◽  
Anita Goel ◽  
S. C. Gupta

Microservices architectural style is gaining popularity in industry and is being widely adopted by large corporations like Amazon, Netflix, Spotify, eBay, and many more. Several other organizations are also preferring to migrate their existing enterprise scale applications to microservices architecture. Researchers have proposed various approaches for microservices decomposition to be used in migrating or rebuilding a monolithic application to microservices. Applying any available approach to an existing monolithic application is not a straightforward decision; thus, there is a need for guidelines that assist in the migration process. There are various challenges in a migration process because different migration approaches use different sets of input data to identify microservices. Since the available migration techniques are not structured, logically, selection of an appropriate migration strategy is a difficult decision for any system architect. So, it is a recurrent open research question – which migration technique should be adopted to get microservices for a legacy monolithic application? This paper addresses this research challenge by examining existing approaches for microservices migration and groups them based on software development life cycle (SDLC) artifacts. Our research also proposes a microservices prescriptive model (MPM) from the existing prominent microservice migration techniques. This model provides recommendation (1) for refactoring an existing legacy system to microservices, and (2) for new microservices development projects. Our study also helps in gaining more insight about greenfield and brownfield development approaches in microservices applications. Moreover, researchers and practitioners of the field can benefit from this model to further validate their migration approaches based on the available system artifacts.

Author(s):  
Hanna Dewi Aritonang ◽  
Bestian Simangunsong ◽  
Adiani Hulu

This article addresses the issue of conflict between religious communities that cause enmity amid society. Hostilities must be overcome and resolved in accordance with the call of Christianity to live in love and peace. The study used the qualitative paradigm as the method of the research and the descriptive-analyses as the writing method by describing the research problems based on data collected from related publications.One of the powerful messages of Jesus's teaching is "Love your enemies." It’s one of the greatest challenges in life. Jesus Christ gave an important doctrine about loving the enemy because love is more powerful than evil, hurtful deeds. Loving the enemy means canceling hostilities and violence, but instead, it promises acceptance of each other. The title of this study is "love your enemies": A Christian Response to Embrace Others. As the title of this study is "love your enemies," the reason for the selection of this article is because the author sees that "loving the enemy is a commandment from God that must be obeyed. This research question emphasizes how to realize "loving the enemy" amid hostility. This paper argues that Jesus's command to love the enemy is a proper Christian lifestyle choice in the midst of hostility. We use CS Song thoughts, which elaborated with other scholars' views on theology, loving, and embracing others. The purpose of the research was to gain understanding and build a theological reflection on Jesus' commandment to love the enemy. In this article, we first briefly discuss the portrait of life among religious people in Indonesia. Secondly, we discuss the conflict between religious people in Indonesia. Finally, we apply the command of Jesus to love our enemy as a Christian lifestyle in the midst of hostility to construct harmony amid hostility. We propose the command of Jesus to ‘love your enemy’ as a response to establishing sustainable peace by embrace others. Finally, the Christians must become a loving community because God so loved us, and we also ought to love and embrace others.


Author(s):  
Poul Houman Andersen ◽  
Linda Nhu Laursen

This paper, responds to the recent calls in research, to address the theoretical underpinnings of entrepreneurial strategies in MNC’s. Today, a multiplicity of entrepreneurial approaches exists, cf. skunk work, bricolage, bootlegging. However, these exists in disparate literature, that provides limited oversight to managers in, that need to select between a manifold of different entrepreneurial strategies. Moreover, these approaches typically originate from a distinctively different organizational context, namely SMEs. Through a literature review we identify two important axiomatic assumptions concerning entrepreneurial strategies within the organizational conditions of MNCs. The first fundamental assumption concerns the organizational origin of such effort. The second theoretical assumption deals with how the entrepreneurial initiative can meet either organizational resistance or support. We synthesize these two dimensions into a two-by-two matrix, that provides an answer to our research question: what are the critical dimensions for entrepreneurial strategies in an MNC context? We then employ this typology to categorize predominant entrepreneurial strategies in current literature, to create a overview that can be used both for structuring the debate in the literature; as well as a basis to discuss important implicit assumptions, that should guide the selection of entrepreneurial strategy in a MNC context in practice.


Children ◽  
2021 ◽  
Vol 8 (6) ◽  
pp. 525
Author(s):  
Emily von Scheven ◽  
Bhupinder K. Nahal ◽  
Rosa Kelekian ◽  
Christina Frenzel ◽  
Victoria Vanderpoel ◽  
...  

Promoting hope was identified in our prior work as the top priority research question among patients and caregivers with diverse childhood-onset chronic conditions. Here, we aimed to construct a conceptual model to guide future research studies of interventions to improve hope. We conducted eight monthly virtual focus groups and one virtual workshop with patients, caregivers, and researchers to explore key constructs to inform the model. Discussions were facilitated by Patient Co-Investigators. Participants developed a definition of hope and identified promotors and inhibitors that influence the experience of hope. We utilized qualitative methods to analyze findings and organize the promotors and inhibitors of hope within three strata of the socio-ecologic framework: structural, interpersonal, and intrapersonal. Participants identified three types of interventions to promote hope: resources, navigation, and activities to promote social connection. The hope conceptual model can be used to inform the selection of interventions to assess in future research studies aimed at improving hope and the specification of outcome measures to include in hope research studies. Inclusion of the health care system in the model provides direction for identifying strategies for improving the system and places responsibility on the system to do better to promote hope among young patients with chronic illness and their caregivers.


Author(s):  
Susmita J. A. Nair ◽  
T. R. Gopalakrishnan Nair

In virtualized servers, with live migration technique pages are copied from one physical machine to another while the virtual machine (VM) is running. The dynamic migration of virtual machines encumbers the data center which in turn reduces the performance of applications running on that particular physical machine. A considerable number of studies have been carried out in the area of performance evaluation during live VM migration.  However, all the aspects related to the migration process have not been examined for the performance assessment. In this paper, we propose a novel approach to evaluate the performance during migration process in different types of coupled machine environment. It is presented here that the state of art VM migration technology requires further improvement in realizing effective migration by monitoring comprehensive performance value. We introduced the parameter, θ, to compare performance value which can be used for controlling and halting unsuccessful migration and save significant amount of time in migration operation.  Our model is capable of analyzing real time scenario of cloud performance assessment targeting VM migration strategies. It also offers the possibility of further expanding to universal models for analyzing the performance variations that occurs as a result of VM migration.


2001 ◽  
Vol 1 (4) ◽  
pp. 381-407 ◽  
Author(s):  
SERGIO GRECO ◽  
CARLO ZANIOLO

In the design of algorithms, the greedy paradigm provides a powerful tool for solving efficiently classical computational problems, within the framework of procedural languages. However, expressing these algorithms within the declarative framework of logic-based languages has proven a difficult research challenge. In this paper, we extend the framework of Datalog-like languages to obtain simple declarative formulations for such problems, and propose effective implementation techniques to ensure computational complexities comparable to those of procedural formulations. These advances are achieved through the use of the choice construct, extended with preference annotations to effect the selection of alternative stable-models and nondeterministic fixpoints. We show that, with suitable storage structures, the differential fixpoint computation of our programs matches the complexity of procedural algorithms in classical search and optimization problems.


2016 ◽  
Vol 45 (2) ◽  
pp. 260-282 ◽  
Author(s):  
John E. Anderson

To improve use tax compliance, twenty-seven states have added a line to their income tax returns where taxpayers can report taxable sales. This article reports results of a behavioral study of a postcard “nudge” sent to income tax filers in one of those states, Nebraska, to encourage self-reporting of liability. The research question is whether the informational nudge was sufficient to alter self-reporting behavior. Data indicate that the nudge more than doubled the likelihood of use tax reporting and nearly doubled the amount of revenue collected, but the rate of use tax reporting remains extremely low. Probit models reveal that use tax reporting rises with income at a decreasing rate. Selection models are also estimated because of positive selection bias in the selection of the treatment group. Taken together, the results indicate that an informational nudge is not likely to be sufficient to substantially change use tax reporting behavior.


Author(s):  
Keiko Ueda ◽  
Lotfi B Merabet ◽  
Andre Brunoni ◽  
Felipe Fregni

Selecting a research question is the first step of any research project. This chapter discusses how to formulate a specific research question from a variety of scientific interests. The reader will learn that a good research question needs to consider several aspects, such as feasibility, innovation, and significance, and that merging all these aspects into one research question may be challenging. This chapter reviews the importance of generating a strong research question using the PICOT format: population (P), intervention (I), control (C), outcomes (O), and time (T). This chapter also discusses the selection of appropriate outcome variables—surrogates or clinical endpoints, based on the types of questions or study phase. The final goal of this chapter is to refine the researcher’s general idea into the process of shaping a strong research question that will be feasible, important, ethical, and answerable.


Author(s):  
GERARDO CANFORA ◽  
ANDREA DE LUCIA ◽  
GIUSEPPE A. DI LUCCA

We present a strategy for incrementally migrating legacy systems to object-oriented platforms. The migration process consists of six sequential phases and encompasses reverse engineering and reengineering activities. The aim of reverse engineering is to decompose programs into components implementing the user interface and components implementing application domain objects. The identification of objects is centred around persistent data stores and exploits object-oriented design metrics. Wrapping is the core of the reengineering activities. It makes new systems able to exploit existing resources, thus allowing an incremental and selective replacement of the identified objects. The migration strategy has been defined and experimented within the project ERCOLE (Encapsulation, Reengineering and Coexistence of Object with Legacy) on legacy systems developed in RPG for the IBM AS/400 environment.


2018 ◽  
Vol 8 (11) ◽  
pp. 2220 ◽  
Author(s):  
Hind Bangui ◽  
Said Rakrak ◽  
Said Raghay ◽  
Barbora Buhnova

Smart cities aim at integrating various IoT (Internet of Things) technologies by providing many opportunities for the development, governance, and management of user services. One of the ways to support this idea is to use cloud and edge computing techniques to reduce costs, manage resource consumption, enhance performance, and connect the IoT devices more effectively. However, the selection of services remains a significant research question since there are currently different strategies towards cloud computing, including services for central remote computing (traditional cloud model) as well as distributed local computing (edge computing). In this paper, we offer an integrated view of these two directions and the selection among the edge technologies based on MCDA (Multiple Criteria Decision Analysis) algorithms. To this end, we propose a foglet as a middleware that aims at achieving satisfactory levels of customer services by using fuzzy similarity and TOPSIS (Technique for Order of Preference by Similarity to Ideal Solution) to facilitate the rating and selection of services in the fog-to-cloud environment. Then, we describe the selection process with a numerical example, and conclude our work with an outline of future perspectives.


2016 ◽  
Vol 2 (1) ◽  
Author(s):  
Anastasia Panori ◽  
Agustín González-Quel ◽  
Miguel Tavares ◽  
Dimitris Simitopoulos ◽  
Julián Arroyo

During the last decade, there has been an increased interest on cloud computing and especially on the adoption of public cloud services. The process of developing cloud-based public services or migrating existing ones to the Cloud is considered to be of particular interest—as it may require the selection of the most suitable applications as well as their transformation to fit in the new cloud environment. This paper aims at presenting the main findings of a migration process regarding smart city applications to a cloud infrastructure. First, it summarises the methodology along with the main steps followed by the cities of Agueda (Portugal), Thessaloniki (Greece) and Valladolid (Spain) in order to implement this migration process within the framework of the STORM CLOUDS project. Furthermore, it illustrates some crucial results regarding monitoring and validation aspects during the empirical application that was conducted via these pilots. These findings should be received as a helpful experience for future efforts designed by cities or other organisations that are willing to move their applications to the Cloud.


Sign in / Sign up

Export Citation Format

Share Document