Professional Documents
Culture Documents
Abstract:
The rapid evolution of cloud computing technologies has
revolutionized the way applications are developed, deployed, and managed.
Legacy applications, though robust, often face challenges in adapting to
modern cloud paradigms, such as Function as a Service (FaaS) and serverless
computing. This research paper explores the process of transforming legacy
applications into serverless architectures, delving into the challenges faced,
the strategies employed, and the benefits reaped during this transition. The
paper combines theoretical analysis with real-world case studies to provide a
comprehensive understanding of this transformative process.
Definition of Terms:
Clearly define terms such as legacy applications, FaaS, and serverless computing
to ensure a common understanding among readers. Explain the basic concepts
and principles associated with each term.
Significance:
Explain why transforming legacy applications into serverless architectures is
significant. Discuss the advantages of serverless computing, including reduced
operational overhead, automatic scaling, and pay-as-you-go pricing models
Research Questions:
Research Design:
i. Experimental Design: If your research involves experiments, explain the
design, variables, and control groups.
ii. Survey Design: If surveys are used, describe the survey structure, question
types, and sampling methods.
iii. Case Study Design: For qualitative research, detail the selection criteria,
data collection methods, and analysis approach for the case studies.
2. Participants or Sample:
i. Describe the characteristics of the participants (if human subjects are
involved) or the sample size and selection criteria.
ii. Discuss any biases, limitations, or ethical considerations related to the
selection process.
3. Data Collection Methods:
i. Quantitative Methods: Explain how numerical data will be collected. This
could involve surveys, experiments, sensors, or other measurable means.
ii. Qualitative Methods: Describe how non-numerical data, such as interviews,
observations, or textual materials, will be collected and recorded.
iii. Data Sources: Specify the sources of your data, whether they are primary
(collected firsthand) or secondary (from existing sources).
Data Analysis Techniques:
1. Quantitative Analysis: Detail the statistical methods (such as regression
analysis, t-tests, or ANOVA) you plan to use to analyze numerical data.
2. Qualitative Analysis: Explain how qualitative data will be analyzed, including
techniques like thematic analysis, content analysis, or discourse analysis.
3. Software Tools: If applicable, mention the software or tools (such as SPSS,
NVivo, or Excel) you will use for data analysis.
Review Protocol:
The development of review protocol is the 1st step towards systematic literature
review. The SLR protocol helps to designate the search plan in the form of search
strategies for the extraction of relevant literature. This process includes research
questions, research scope, and source of information, inclusion & exclusion
criteria and literature assessment criteria.
It includes Following:
1) RESEARCH QUESTIONS
In order to conduct a systematic review, it is essential to formulate the
primary research questions. After specifying the research questions, the
review procedure involves building the search strategies to recognize
and extract relevant studies. The answers to these research questions
are searched in the published literature using the procedures of
systematic literature reviews as proposed by Kitchenham and
DARE/CDR criteria . The basic intent of this review is to summarize the
current state of the art research in MLSCA (Multilingual Source Code
Analysis) domain and to identify efficient techniques used for MLSCA.
We searched for MLSCA techniques that were empirically evaluated to
identify needs for future research.
Keywords: Legacy Applications, Serverless Computing, Function as a
Service (FaaS), Cloud Computing, Transformation Strategies, Case Studies,
Benefits, Challenges, Scalability, Security, Cloud Paradigms, Digital
Transformation.
2) SEARCH STRATEGY
A well-organized research is required for extracting appropriate
information and filtering irrelevant studies from focused research
areas. The planning and formulation of effective search is an important
step to finding out the meaningful research available in the respective
domain. We followed both automatic and manual search mechanism
for the exploration of the search term. At first, we performed automatic
search followed by the manual search is executed. The automatic
search is based on search string and is performed on search engines of
relevant electronic data repositories. The purpose of the manual search
is to gather more literature relevant to multilingual source code
analysis domain. The manual search includes reference lists of relevant
primary studies and gray literature. In order to ensure the extraction of
relevant information, we limit our search terms on following conditions.
• Identification of major search keywords, based on for
mulated research questions. -
• Search for alternate words and synonyms for major
keywords.
• Developing a search string by combining keywords with
Boolean operator ‘‘AND’’, and alternate keyword with
Boolean operator ‘‘OR’’.
Search Term: The search term is the combination of keywords that
precisely returns the relevant literature from a large number of studies.
In order to ensure the reliability of search term, we analyzed the main
concepts and terminologies in the domain of multilingual source code
analysis. We recognized keywords used in the literature that is related
to research questions. The meta-sentence for this literature review
contains ‘‘Analysis of Software Systems developed using the source
code ofMultiple Programming Languages’’. We finalized initial
keywords.
((Multi∗ ) OR (Cross∗ ) OR (Hetero∗ ) OR (Hybrid∗ ) OR (Inter∗ ) OR (∗operability∗ )
OR (∗depend∗ ) OR (∗Lingual) OR (∗Language∗ ) OR (Artifact)) AND ((Analy∗ ) OR
(Recover∗ ) OR (Revers∗ ) OR (Invest∗ ) OR (Synthes∗ ) OR (Detect∗ )) AND
((Software∗ ) OR (Source∗ ) OR (Application) OR (Program∗ ) OR (Pars∗ )).
LITERATURE RESOURCES
Scope of Study:
Key Search Attributes:
Selection Process:
DOMAINS FOR SYSTEMATIC REVIEW:
Critical review
SLR
Title: Transformation of Legacy Applications towards FaaS and Serverless Paradigm: A
Comprehensive Review
Abstract:
The transformation of legacy applications towards Function as a Service (FaaS) and serverless paradigms
represents a significant shift in modern software engineering. This Systematic Literature Review (SLR)
provides a comprehensive analysis of the existing body of knowledge in this domain. The review critically
assesses the challenges, methodologies, impact, and future prospects associated with transforming legacy
applications into serverless architectures. By synthesizing research findings from various sources, this SLR
aims to provide valuable insights for researchers, practitioners, and decision-makers navigating the
intricate landscape of legacy application modernization.
1. Introduction:
1.1 Background:
Legacy applications, though robust, often hinder organizational agility and innovation. The advent of
serverless computing offers a promising solution, enabling seamless scaling, reduced operational
overhead, and enhanced flexibility.
1. What are the common challenges faced during the transformation of legacy applications into serverless architectures?
2. What methodologies and best practices have been employed for successful migration?
3. What is the economic and operational impact of adopting serverless paradigms?
4. What are the emerging trends and innovations in this field?
2. Methodology:
Utilizing key search attributes, relevant literature from academic databases (such as IEEE Xplore, ACM
Digital Library, and Google Scholar) and reputable online platforms will be systematically searched.
Studies published between 20XX and 20XX, focusing on legacy application transformation, serverless
architectures, challenges, methodologies, impact assessment, and future trends will be included.
Included studies will be assessed for quality using established evaluation tools ensuring the credibility and
reliability of the sources.
3. Challenges in Legacy Application Transformation: