Conquering Data Conversion Projects. Who is that furry guy anyway? Austin Zellner = presenter 15+ years Information Technology Multiple large data migration.

Slides:



Advertisements
Similar presentations
best practice project management methodology ©Platinum Services Group Limited What is XPRODi ?
Advertisements

Introduction to ReportSmith and Effective Dated Tables
System Development Life Cycle (SDLC)
SmartConnect Integrations
Main Menu F3 Exit = Press F3 to exit this screen. Commonly Use Keys: F4 Prompt = Position cursor in front of ‘?’ location and press F4 to display a list.
DATA DICTIONARY. DATA DICTIONARY - Introduction The data dictionary is a specialised application of the kinds of dictionaries used as reference in everyday.
1 presented by: Tim Haithcoat University of Missouri Columbia QA/QC and Risk Management.
Computers: Tools for an Information Age
IMPROVE Phase Consider these Improvement Initiatives! Six Sigma Simplicity.
Systems Analysis I Data Flow Diagrams
Agile Testing with Testing Anywhere The road to automation need not be long.
Welcome to CMPE003 Personal Computer Concepts: Hardware and Software Winter 2003 UC Santa Cruz Instructor: Guy Cox.
000000_1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
©2011 Quest Software, Inc. All rights reserved. Steve Walch, Senior Product Manager Blog: November, 2011 Partner Training Webcast.
Page 1 ISMT E-120 Desktop Applications for Managers Introduction to Microsoft Access.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 14 Systems Analysis and Design: The Big Picture.
Systems Analysis and Design: The Big Picture
Rev Jul-o6 Oracle Identity Management Automate Provisioning to Oracle Applications and Beyond Kenny Gilbert Director of Technology Services.
©2008 TTW Where “Lean” principles are considered common sense and are implemented with a passion! Product Training Cash and Cash Management.
Month End/Year End Procedures VMS (GUI) Presenter: Linda Kennedy.
Easy update New security features Batch enhancements Improved buying and DSD module Margin, markdown and forecast Label printing automation More synchronizing.
To add an encounter manually, click on “Add”. To upload an electronic file of encounters, click on “Data Transfer” and then “Upload.” See separate training.
©2008 TTW Where “Lean” principles are considered common sense and are implemented with a passion! Product Training Purchase Invoices.
Objectives Overview Define the term, database, and explain how a database interacts with data and information Define the term, data integrity, and describe.
Information Systems Analysis and Design
ITEC224 Database Programming
Software Inspection A basic tool for defect removal A basic tool for defect removal Urgent need for QA and removal can be supported by inspection Urgent.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
End HomeWelcome! The Software Development Process.
© 2007 by Prentice Hall 1 Introduction to databases.
Moving into Implementation SYSTEMS ANALYSIS AND DESIGN, 6 TH EDITION DENNIS, WIXOM, AND ROTH © 2015 JOHN WILEY & SONS. ALL RIGHTS RESERVED.Roberta M. Roth.
Requirements and Estimation Process From a CMM Level 5 Organization Alan Prosser.
IT 456 Seminar 5 Dr Jeffrey A Robinson. Overview of Course Week 1 – Introduction Week 2 – Installation of SQL and management Tools Week 3 - Creating and.
This material is approved for public release. Distribution is limited by the Software Engineering Institute to attendees. Sponsored by the U.S. Department.
Building the cube – Chapter 9 & 10 Let’s be over with it.
Project Charters Module 3
EDS 2 Early Delivery Systems Review and Request for Approval May 2007 John Webb.
Understanding Allocations Brian Chizever Cognos Corporation.
A State Perspective Mentoring Conference New Orleans, LA 2/28/2005 RCRAInfo Network Exchange.
7 Strategies for Extracting, Transforming, and Loading.
Timeline and Milestones. The first step to any plan is thinking about a timeline. You want to know what needs to get done and when, to ensure that you.
Relational Databases: Why So Many Tables? William Blozan, Ph.D. Fast Answers.
Proficy Workflow for Water reduce. improve. secure.
20 Copyright © 2008, Oracle. All rights reserved. Cache Management.
Tyler Implementation Kick-Off Aaron Joyal, PMP Financials Project Manager.
Chapter 1 Page ref. Chapter 1 Company File Setup and Maintenance 1.
University of Toronto at Scarborough © Kersti Wain-Bantin CSCC40 testing and installation 1 for testing you need: test data and test cases test plans and.
SAP R/3 User Administration1. 2 User administration in a productive environment is an ongoing process of creating, deleting, changing, and monitoring.
1 Management Information Systems M Agung Ali Fikri, SE. MM.
Company File Setup and Maintenance Chapter 6. PAGE REF #CHAPTER 6: Company File Setup and Maintenance SLIDE # 2 2 Objectives Use the EasyStep Interview.
Local Government Corporation. On the Fixed Assets panel, select “Maintenance” and “Asset Maintenance” Entering Assets.
Anytime, Anywhere Access Benefits Functionality Work Order Administration Dispatch Work Order Work Order Details New Work Order Additional Functionality.
Chapter 1 Assuming the Role of the Systems Analyst.
Company File Setup and Maintenance Chapter 6. PAGE REF #CHAPTER 6: Company Setup SLIDE # 2 2 Objectives Use the EasyStep Interview to setup your company.
Systems Analysis and Design in a Changing World, Fourth Edition
Overview Rental Quote Overview
Graphical Data Engineering
Leveraging Features and Functionality in PeopleSoft 9
SQL Saturday Pittsburgh
Deck 12 Accounting Information Systems Romney and Steinbart
Description of Revision
Systems Design, Implementation, and Operation
INTAKE OF NEW PORTFOLIO AND INVOICES
General Fund Enterprise Business System (GFEBS) Navigation Overview
Reserved for Intro Picture
C/S Windows Overview Nigel Pilsbury.
Product Training Purchase Invoices
Software Testing Lifecycle Practice
James Baranello MIS 5121:Business Process, ERP Systems & Controls Week 8: Security 2 – Roles Financial Processes and Controls.
What If Process is Your Problem?
Presentation transcript:

Conquering Data Conversion Projects

Who is that furry guy anyway? Austin Zellner = presenter 15+ years Information Technology Multiple large data migration projects Recognized patterns to these projects

Have you ever read Dune? Data = life force of information systems Data migration least well understood projects by management. High Risk / Low tolerance for error

Phases of Data Conversion Discovery Mapping Programming Conversion Post Conversion

Discovery Phase Define Success = Guiding Principle Need to know “When” Need to understand options and Scope

Discovery Phase – Gathering your forces Get an inventory of your Knowledge Knowledge: Documentation Experts System Self Documentation Source Code

Discovery Phase – Intelligence Gathering Based on Guiding Principle: Generate transactions in source system Generate transactions in target system Identify tables / data modified in source Identify tables / data modified in target This will give a rough estimate of what needs to be touched

Discovery Phase – Siege Points Identify access to target system Direct DB Access = Flexible / High Risk Import Tools = Consistent / Lower Risk Data Entry = Slow / Least Risk

Discovery Phase – Changing Business Practices May need to change business practices Change code Change business process Convert data to support

Discovery Phase – Going from Apples to Oranges Differing data models adds Risk Structural differences Conceptual differences Must be accounted for in timeline

Discovery Phase – Watch out for Fuzziness Fuzzy data = values relative to the user Fields overridden Value means different things in time Fields co-opted by departments

Discovery Phase – Transaction Types Treat Transaction Types as distinct May require specific mapping Source valuable for understanding

Discovery Phase – Calculating Mapping Phase Calculating Mapping Phase ( in hours ) Each field in source and target =.25 Knowledge Modifiers: No documentation / source = x2 Apples to Oranges = x3

Discovery Phase – Calculating Programming Phase Calculating Programming Phase ( in hrs ) Each table / view = 5 Modifiers: New to any tools = x2 Direct to DB with Triggers = x3 QA = Total x2

Discovery Phase – More stuff you have no control over Buck stops here designated Provide pros / cons for decisions May require secrecy

Discovery Phase – End of the Beginning What you should have: -Agreement on what “success” is -Delivery date based on calculations -Buck stops here designated -Test system matching source / target -Real test data -QA Team identified

Mapping Phase - Overview Mapping is getting the data from the source system to the target so that the “information” is preserved Automation <> Understanding

Mapping Phase – Two types of data Business data = describes record System data = record’s state in system

Mapping Phase – Practical Approach From Target Perspective A field level listing of tables For each field: Identify source value that fills Business Identify logic that fills System

Mapping Phase – Duplicate Data If merging two datasets, watch for dupes 2 types: Duplicate Keys = renumbering Duplicate Values = merging In both cases, requires creating XRef

Mapping Phase – System Maintenance Screens Systems often have “global” configuration screens Often have explanations of what obscure codes mean Easier to just manually set in target system than to convert

Mapping Phase – When you are done Should have the following at end: -Master document showing field mappings from source to target -Xref for converted keys, values -Notes on logical conversion of system data from source to target

Programming Phase - Overview Bringing records from source to target Simplicity is key Build safeguards to protect accidental launch

Programming Phase – Example Code One program per table Establish connection to source and target Read in from source -For each column is there anything to be modified? -> Yes -> log old / new value -Write to target Loop until done

Conversion Phase - Preparing Plan as if major outage -Coordinate with departments affected -Have black out period for system use -No new records into system after cutoff Central Gatekeeper designated

Conversion Phase – Conversion Time Gatekeeper verifies backups in place -All batch jobs / sql tasks / etc. stopped -Initiate the conversion process -Monitor logs for success -Once complete, begin test transactions -Once signed off, start processes -Allow users back in

Post Conversion – Work left to do Watch for broken records -Spot fix individual, batch groups Take care around special events -Month end, year end -New transactions, closing transactions The Spice Must Flow