Fact-checked by Grok 2 weeks ago
References
-
[1]
[PDF] Software Archaeology - UCSB MATBooch, Software Archaeology, ACM OOPSLA (2008). Page 4. Confidential. Copyright ©. 4. Learn by Doing: A Day in the Life of a Software. Archeologist. To further ...
-
[2]
[PDF] Software ArchaeologySynoptic, plotting, and visualization tools pro- vide quick, high-level summaries that might visually indicate an anomaly in the code's static structure, in the ...
-
[3]
Using Software Archaeology to Measure Knowledge Loss in ...In this paper, we present a methodology to measure the effect of knowledge loss due to developer turnover in software projects. For a given software project, we ...
-
[4]
[PDF] Software Archaeology and the Preservation of Code-based Digital ArtApr 9, 2013 · Booch [5] defines software archaeology as "the recovery of essential details about an existing system sufficient to reason about, fix, adapt, ...
-
[5]
[PDF] An Empirical Approach to Software Archaeology∗Mar 1, 2005 · The term “software archaeology” provides a useful metaphor of the tasks that a software developer has to face when performing maintenance on ...
-
[6]
Collaborative Exploration and Note Taking in Virtual RealityJun 13, 2024 · We present Immersive Software Archaeology (ISA), a virtual reality tool that enables engineering teams to collaboratively explore and comprehend software ...
-
[7]
[PDF] Software archaeologySoftware Archaeology. Andy Hunt and Dave Thomas. Editors: Andy Hunt and Dave Thomas □ The Pragmatic Programmers andy@pragmaticprogrammer.com □ dave ...
-
[8]
[PDF] Scoops and Brushes for Software Archaeology: Metadata DatingJun 9, 2020 · Software archaeology is the field handling the recovery, preservation and study of digital material. Web archaeology is a subcategory of ...
-
[9]
Legacy Software Modernization in 2025: Survey of 500+ U.S. IT ProsA new 2025 survey of over 500 U.S.-based IT professionals reveals that 62% of organizations still rely on legacy software systems.Missing: percentage | Show results with:percentage
-
[10]
Business Case for Legacy Application Modernization 2025 - BayOneJul 14, 2025 · McKinsey research demonstrates that organizations spend up to 70% of their IT budgets on legacy systems just to keep operations running. This ...
-
[11]
How Much Can You Really Save by Upgrading Your Legacy Systems?May 19, 2025 · 30–50% Fewer Operating Costs. Although you have to invest in technology upgrades, cost savings stem from lower maintenance requirements, reduced ...Missing: statistics | Show results with:statistics<|control11|><|separator|>
-
[12]
Modernizing Legacy Systems: Prevent Vulnerabilities in GovernmentApr 13, 2025 · Cost Savings Modernization efforts at the Department of Homeland Security saved $30 million a year in operational costs alone. Solutions aren't ...Missing: statistics | Show results with:statistics
-
[13]
The Hidden Cost of Good Enough Banking Infrastructure - CARITechMay 19, 2025 · Outdated systems cost banks $36.7B annually, with 55% of IT budgets going to maintenance, and increased cyberattack risks. Legacy systems also ...
-
[14]
Hidden Risks: Why Mainframe Legacy Systems Threaten Aerospace ...Mainframe legacy systems present a significant threat to aerospace compliance in 2025. The USDA faced this reality when a 2023 National Academy of Public ...Missing: banking | Show results with:banking
-
[15]
Legacy Applications and GDPR Compliance: Bridging the GapThe Legacy Challenge: Legacy applications often lack the built-in mechanisms for ensuring GDPR compliance. They were created in an era when data privacy ...
-
[16]
Software archaeology**Summary of Challenges in Software Archaeology, Obsolescence, and Understanding Legacy Code:**
-
[17]
Why The Y2K Problem Still Persists In Software Development - ForbesJan 11, 2022 · We started using computers for record storage and processing in the 1960s and 1970s. While that is 50 years away, we have already ...
-
[18]
[PDF] Software Development Cost Estimating Handbook - DAUSoftware support costs usually exceed software development costs, primarily ... . Software maintenance cost estimates in 1976 ranged from 50 to 75 percent.
-
[19]
Legacy system - WikipediaThe first use of the term legacy to describe computer systems probably occurred in the 1960s. ... Software archaeology · Software brittleness · Software entropy ...
- [20]
-
[21]
[PDF] Concepts and Tools for the Software Life Cycle - IPN Progress Reportonly about 20% of the current software effort is coding. The 1980 NASA study committee cited the following development needs: the expansion of on-line ...
-
[22]
IDA: celebrating 30 years of binary analysis innovation - Hex-RaysMay 20, 2021 · In April 1991 the first program was fully disassembled with IDA. IDA grew up and new ideas appeared. I wanted to create a built-in C-style ...
-
[23]
Software archaeology - ResearchGateAug 10, 2025 · In terms of software, a typical definition is that software archaeology is the understanding of legacy code [24, 46], and consequently the ...
-
[24]
SE Radio 148: Software Archaeology with Dave ThomasNov 2, 2009 · Episode 148: Software Archaeology with Dave Thomas. Software Engineering Radio - the podcast for professional software developers. podcast logo.
-
[25]
ICSE '10: Proceedings of the 32nd ACM/IEEE International ...May 1, 2010 · SESSION: Keynote papers · SESSION: Dynamic analysis · SESSION: Performance ... SESSION: Software archaeology · SESSION: Legal issues · SESSION ...
-
[26]
Cloud-Native Modernization for Legacy SystemsAug 14, 2025 · Transform legacy systems with cloud-native modernization to boost scalability, agility, and innovation for future-ready enterprises.
-
[27]
Exploring Software Architecture and Design in Virtual RealityWe present the tool Immersive Software Archaeology (ISA) which (i) estimates a view of a system's architecture by utilizing concepts from software architecture ...
-
[28]
Collaborative Exploration and Note Taking in Virtual RealityWe present Immersive Software Archaeology (ISA), a virtual reality tool that enables engineering teams to collaboratively explore and comprehend software ...
-
[29]
[PDF] Techniques for Understanding Legacy Software Systems - CWITechniques for Understanding Legacy Software Systems. ACADEMISCH ... Static analysis can show that some processes can never communicate with each ...
-
[30]
[PDF] From Monolith to Microservices: A Semi-Automated Approach for ...Hence, this work proposed a semi- automated approach to transform legacy architecture to modern system architecture based on static analysis techniques.
-
[31]
Dynamic analysis for reverse engineering and program understandingDynamic analysis for reverse engineering and program understanding. Authors: Eleni Stroulia.<|control11|><|separator|>
-
[32]
Static vs Dynamic Analysis - Reverse Engineering - Aspire SystemsJul 18, 2025 · Explore reverse engineering strategies by comparing static and dynamic analysis to dissect threats and uncover hidden logic in modern ...
-
[33]
[PDF] Decompilation of Binary Programs & Structuring Decompiled GraphsMay 3, 2011 · A decompiler, or reverse compiler, is a program that attempts to perform the inverse process of the compiler: given an executable program ...<|separator|>
-
[34]
[PDF] Software Obsolescence – Complicating the Part and Technology ...1. Functional Obsolescence: Hardware, requirements, or other software changes to the system obsolete the functionality of the software (includes hardware ...Missing: archaeology | Show results with:archaeology
-
[35]
[PDF] Reconstructing the Evolution of Software SystemsA proper way to describe this issue consists in the Software Archaeology metaphor: The purpose of the software archaeologist is to understand what was in the ...
-
[36]
Pluralsight's 2025 Tech Skills Report Reveals 95% of Professionals ...Oct 6, 2025 · 48% of IT professionals and 58% of business professionals say they had to abandon projects in the past year due to technical skill shortages.Missing: maintenance | Show results with:maintenance
-
[37]
Ethics and Reverse Engineering - Online Ethics CenterBoth company employees agreed that reverse engineering was a valid practice; however, they agreed it must be done in with care. Learning from what others have ...
-
[38]
Coders' Rights Project Reverse Engineering FAQWhat Exceptions Does DMCA Section 1201 Have To Allow Reverse Engineering? ^ · You lawfully obtained the right to use a computer program; · You disclosed the ...Missing: exemptions | Show results with:exemptions
-
[39]
An Empirical Study of License Conflict in Free and Open Source ...The results show that 1,787 open source licenses are used in the project, and 27.2% of licenses conflict. Our new findings suggest that conflicts are prevalent ...Missing: archaeology | Show results with:archaeology
-
[40]
Final Rule on DMCA Grants Circumvention Exemptions - IP UpdateOct 31, 2024 · A new final rule grants exemptions to a DMCA provision that prohibits circumvention of measures that control access to copyrighted works.
-
[41]
Managing Artificial Intelligence in Archeology. An overviewThe integration of AI in archaeology poses several risks due to the oversimplification of complex archaeological data for computational ease.
-
[42]
[PDF] The great cloud mainframe migration: what banks need to knowOur survey of 150 banking executives across 16 countries focused on large banks that are planning to or are in the process of migrating their mainframe ...
-
[43]
Covid Accelerates Banks' Mainframe Migration To Cloud - ForbesMay 18, 2022 · Now banks are able to unlock their 30 years of investing in Cobol, run it in the cloud and start modernizing it in place with microservices and ...
-
[44]
Software due diligence in M&A: Key considerations and risksApr 27, 2023 · This blog post explores the key considerations that acquirers should keep in mind when conducting software due diligence in M&A, including the software risks ...Missing: archaeology | Show results with:archaeology
-
[45]
Reduce M&A risks - Software intelligenceReduce M&A risks with CAST | Fact-based technical assessments using software mapping & intelligence technology. Ensure deep, reliable software assessments…
-
[46]
OCR: Ensure Legacy Systems and Devices are Secured for HIPAA ...Nov 2, 2021 · HIPAA-covered entities to assess the protections they have implemented to secure their legacy IT systems and devices support HIPAA compliance.<|control11|><|separator|>
-
[47]
5 ways to modernize legacy applications in healthcare - TYMIQSep 9, 2025 · Embed compliance and security throughout: Apply HIPAA, GDPR, and other healthcare standards directly into the refactored code and pipeline ...
-
[48]
How a US bank modernized its mainframe applications with IBM ...In this blog, we'll discuss the example of a fictional US bank which embarked on a journey to modernize its mainframe applications.
-
[49]
Kyndryl Inspects The Modernization Plans Of IBM i And Mainframe ...Nov 6, 2023 · “On average, surveyed organizations see cost savings of $25 million per year-fueling further discussion that a modernization strategy of any ...
-
[50]
[PDF] The ARPANET IMP Program: Retrospective and ResurrectionIn 1972 BBN organized a commercial packet-based telecommunications carrier known as Telenet which originally used a version of the 516 IMP code running on ...
-
[51]
[PDF] Some Issues in the `Archaeology' of Software EvolutionAbstract. During a software project's lifetime, the software goes through many changes, as components are added, removed and modified to fix.
-
[52]
Understanding Open Source Software through Software ArchaeologyUnderstanding Open Source Software through Software Archaeology: The Case of Nethack. Publisher: IEEE. Cite This.
-
[53]
Code Decay in Legacy Software Systems: Measurement, Models ...Lucent Technologies, along with the National Science Foundation hired NISS to look at a way to quantify, measure, predict and reverse or retard code decay.Missing: paleontology | Show results with:paleontology
-
[54]
8 Science Fiction Books That Get Programming Right - ReactorAug 14, 2020 · So what novel best feels like working on legacy code? Vernor Vinge's A Deepness in the Sky. Buy the Book ...
-
[55]
Does the Star Trek Computer Run on COBOL? - Stephen DiehlJun 5, 2025 · Vernor Vinge's novel A Deepness in the Sky paints a wonderfully terrifying picture of this: So behind all the top-level interfaces was layer ...
-
[56]
Neal Stephenson's message in code | Technology - The GuardianOct 13, 1999 · A 900-page novel that hops between world war two code breaking and modern hacker culture, covering cryptography and cypherpunk politics.
-
[57]
Deciphering “Cryptonomicon”: Neal Stephenson's Epic Saga of ...Apr 8, 2024 · The grandiose epic “Cryptonomicon” by Neal Stephenson masterfully combines the past and present while exploring the depths of cryptography.
-
[58]
Mr. Robot Killed the Hollywood Hacker | MIT Technology ReviewDec 7, 2016 · Mr. Robot marks a turning point for how computers and hackers are depicted in popular culture, and it's happening not a moment too soon.
-
[59]
Last Stand | Sci-Fi Short Film Made with Artificial IntelligenceMar 30, 2023 · I'm terrified, not of aliens, but at the fact that AI already has a better understanding of humanity than humanity understands AI.
-
[60]
Virtual Ghost - TV TropesA Virtual Ghost is technically just as much an AI as a robot, but even though they are essentially a computer with a preprogrammed human personality.
-
[61]
The Science Fiction Books That Every Computer Scientist Should ...Jan 29, 2015 · The Jazz by Melissa Scott. “The novel raises many ethical issues of parental responsibility for underage hacking, and more generally of ...
-
[62]
Legacy Codebases are a DevOps Issue - SonarApr 18, 2024 · Tackling legacy code effectively hinges on integrating DevOps practices - refactoring judiciously, utilising automation for testing and integration, and ...
-
[63]
[PDF] Computer Science Curricula 2023Several successive curricular guidelines for Computer Science have been published over the years as the discipline has continued to evolve: • Curriculum 68 [1]: ...
-
[64]
[PDF] Why and How to Preserve Software Source CodeSep 20, 2017 · In this paper we present Software Heritage, an ambitious ini- tiative to collect, preserve, and share the entire corpus of publicly accessible ...