scispace - formally typeset
Search or ask a question
Topic

Legacy mode

About: Legacy mode is a research topic. Over the lifetime, 51 publications have been published within this topic receiving 693 citations. The topic is also known as: compatibility mode.


Papers
More filters
Patent
12 Oct 2006
TL;DR: In this article, the authors propose a method and an apparatus for preserving compatibility between legacy mode of operation and new mode of operating in a communication system, wherein allocation of resources is different in the legacy mode and the new mode-of-operation is disclosed.
Abstract: A method and an apparatus for preserving compatibility between legacy mode of operation and new mode of operation in a communication system, wherein allocation of resources is different in the legacy mode of operation and the new mode of operation is disclosed. Accordingly, an entity of a wireless access network, e.g., a base station, transmits signals comprising information about reallocation of resources from a legacy mode of operation to a new mode of operation. These signals are received at another entity of a wireless access network, e.g., a subscriber station, which then controls use by the subscriber station of resources allocated to the subscriber station in accordance with the information.

24 citations

Patent
Daniel D. J. Leroux1, Steven R. Shaw1
28 Jan 2008
TL;DR: In this article, a system and method for legacy system component incremental migration from a legacy system to a new system comprises a read-only ghost or shadow in the new system and a one-way bridge is provided so that the two systems can interact.
Abstract: A system and method for legacy system component incremental migration from a legacy system to a new system comprises a read-only ghost or shadow in the new system. When changes are made in the legacy system, the changes are incrementally and automatically migrated to the new system allowing the legacy system and the new system to maintain availability during the migration. The concept of “mastership” is used where a component exists in the “New System”, but is actually mastered in the “Legacy System”. By allowing a sub-component to exist as a read-only ghost or shadow in the new system, and still be mastered/edited in the legacy system, a one-way bridge is provided so that the two systems can interact. The synchronization of the legacy system component is managed so that the ghost component is automatically updated when changes are made to the legacy system component and there is little maintenance that the user needs to do to create the bridge between the two systems.

20 citations

Patent
08 May 2009
TL;DR: In this paper, a radio network node is configured to operate in a legacy mode and is further configured in a non-legacy mode, and at least one carrier is operated so that it switches (602) from non legacy mode to legacy mode.
Abstract: A method in a radio network node for dynamic carrier mode switching is provided. The radio network node is comprised in a radio communications system. The radio network node is configured to operate in a legacy mode and is further configured to operate in a non legacy mode. At least one carrier is operated so that it switches (602) from non legacy mode to legacy mode. When operating the carrier in the legacy mode, the radio network node signals (603) with a user equipment. The user equipment operates in legacy mode, but can not operate in non legacy mode. The radio network node then operates the at least one carrier so that it switches (604) from legacy mode back to non legacy mode.

13 citations

Book ChapterDOI
01 Jan 2000
TL;DR: A controlled pattern-oriented legacy system migration strategy must focus upon the controlled elimination of these anti-patterns by the step-wise application of six corresponding desirable patterns to result in adaptive systems reflecting purposeful architectures open to the ongoing reflection of business process change.
Abstract: Mature information systems grow old disgracefully as successive waves of hacking result in accidental architectures which resist the reflection of ongoing business process change. Such petrified systems are termed legacy systems. Legacy systems are simultaneously business assets and business liabilities. Their hard-won dependability and accurate reflection of tacit business knowledge prevent us from undertaking green-field development of replacement systems. Their resistance to the reflection of business process change prevents us from retaining them. Consequently, we are drawn in this paper to a controlled pattern-oriented legacy system migration strategy. Legacy systems exhibit six undesirable anti-patterns. A legacy system migration strategy must focus upon the controlled elimination of these anti-patterns by the step-wise application of six corresponding desirable patterns. Adherence to this migration strategy results in adaptive systems reflecting purposeful architectures open to the ongoing reflection of business process change. Without such a strategy there is a very real danger that legacy system migration will occur all too literally. That is, the old legacy system will be migrated to a new legacy system albeit it one using the latest buzzword-compliant technology.

13 citations

Patent
19 Dec 2008
TL;DR: In this article, a virtualization software that is executable on the new processor in the legacy mode is presented, where the switch page has a first section to store a part of switching instructions conforming to the new instruction set and a second section to storing another part of the switching instructions that conforms to the legacy instruction set.
Abstract: The computer program includes a virtualization software that is executable on the new processor in the legacy mode. The new processor includes a legacy instruction set for a legacy operating mode and a new instruction set for a new operation mode. The switching includes switching from the new instruction set to the legacy instruction set and switching paging tables. Each of the new operating mode and the legacy operating mode has separate paging tables. The switch routine is incorporated in a switch page that is locked in physical memory. The switch page has a first section to store a part of switching instructions conforming to the new instruction set and a second section to store another part of the switching instructions conforming to the legacy instruction set.

13 citations

Network Information
Related Topics (5)
Layer (object-oriented design)
5.8K papers, 44.8K citations
83% related
Reference architecture
11K papers, 196.4K citations
81% related
Software measurement
5.3K papers, 129.1K citations
79% related
Darwin (ADL)
4.2K papers, 72.3K citations
79% related
Software design pattern
5.9K papers, 147.8K citations
79% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20211
20191
20182
20172
20163
20152