You are on page 1of 4

Welcome Guest | Home News

Log In |

Register | Video

Benefits Slideshows Reports Tech Centers IW Mobile RSS Subscribe Newsletters Events White Papers

Commentary

Search

Software

Security

Cloud

Mobility

Social Business

Big Data

Windows

Global CIO

Government

Healthcare

Education

Financial

SMB

More

FEATURE

Upgrading Your Legacy Systems


John Dickinson
See more from John Connect directly with John: Bio | Contact

Get InformationWeek Daily


Don't miss each day's hottest technology news, sent directly to your inbox, including occasional breaking news alerts.

Start The Discussion

0
Like

0
Tw eet

0
Share

StumbleUpon subm it Submit

Follow InformationWeek
Mail Print

System Analysis and Identification

(Page 2 of 5) Step One: Analyze the Current System Look very carefully at your legacy systems before making any decision to replace them with new ones. Be careful to evaluate what the system is actually doing, rather than just the technology being used to do it. "It's best to start by looking at applications rather than just technology," warns Hewlett-Packard distinguished technologist Bruce Michelson, "because that's where the trigger always is." In most cases, the legacy system is still performing a useful function. As one wag put it, "A legacy system is one that actually works." It's likely, however, that the legacy system does not work as quickly or as well as newer systems might. Sluggish, trouble-prone systems lead to user unhappiness and put a crimp on business productivity. It could be that a virus or other malware is to blame, or the software may simply be running on older, slower hardware. Legacy systems may also no longer properly meet user needs, if they ever did. A program may need new features or access to new data, or it may need to be scaled to new products or a larger staff. For example, "We are busting at the seams," says IT director Elias Martinez of 5.11 Inc., whose business of selling tactical armor for law enforcement and military use is growing rapidly. "We don't know how we are going to sustain our growth with the systems we have today." Identify Orphan Software Another scenario is a system running on an old hardware or software platform that is no longer supported by its manufacturer - or understood by anyone on staff. Ask Santa Cruz County , Calif., IT systems analyst Gerry Doan, who supports a 500person department: "We were facing a system running on a DOSand Fox-based platform that no one knew much about, and the only guy who did understand it was about to retire." Of course, even packaged products such as operating systems and office productivity software can eventually achieve legacy status. Upgrading to new versions may enable new staff functionality or greater productivity. And new applications software may require moving to newer operating systems. Finally, the normal computer-refresh cycle may require retiring

MORE INSIGHTS Webcasts


Data Virtualization: A Win-Win for Business & IT Unlock the Value of Your Enterprise Apps with Smart Process Apps

UPCOMING EVENTS
Live Events WebCasts

How to Choose a SaaS Vendor - E2 Conference Boston Desktop Virtualization: Getting It Right from the Start Interop Las Vegas Virtualization Crash Course: Servers, Desktops and Private Clouds - Interop Las Vegas When Networks Attack: Big Data Security Tackles Incident Response - Interop Las Vegas Five Essential Steps to Mitigating Insider Threats Interop Las Vegas
More Live Events>>

White Papers

More >>

Rule-Driven Profiling: A Next Generation Approach to Vulnerability Discovery System Z: Making Great Security Even Better

Reports

More >>

Cloud Collaboration Tools: Big Hopes, Big Needs Strategy: The Next Phase of Meaningful Use
More >>

THIS WEEK'S ISSUE


Subscribe to InformationWeek

legacy systems. "We normally replace about 80 of our systems every year," says Hans Keller, CTO of the National Aquarium in Baltimore, "and when we started the process at the beginning of 2006 it seemed that our timing called for considering a changeover from Windows XP and Windows 2000 to Windows Vista for this batch of systems."
Page 3: Understanding How Current Systems Are Being Used Previous Page | 1 | 2 | 3 | 4 | 5 | Next Page Back Issues Must Reads & IT Trends

Subscribe to Digital Read the Cover Story Download This Issue

ABOUT THE AUTHOR


Continued See more from John Connect directly with John: Bio | Contact

CURRENT HEALTHCARE ISSUE


In this issue:
The Right Health IT Priorities? Regulatory requirements dominate, our research shows. The challenge is to innovate with technology, not just dot the i's and cross the t's. Tech Is Just One Factor: Real change takes much more than technology.

Start The Discussion

0
Like

0
Tw eet

0
Share

StumbleUpon subm it Submit

Mail

Print Back Issues Must Reads & IT Trends

Related Reading
News Commentary Google Opens Compute Engine To Cloud Customers Prototype British Police Car Rivals Batmobile Anonymous Seizes North Korean Twitter, Flickr Feeds HP Cloud Evangelist: We're All About OpenStack
More News

And much more! Read the Current Issue

FEATURED WHITEPAPERS
What's this?
The Business Value of Hybrid Cloud -Based Compromise Intelligence Monitoring and Threat Mitigation Learn How Neustar Technology Can Block DDoS Attacks Simple, Cost-Effective Messaging and Collaboration for Medium-Sized Businesses Email marketing in a complex world Advanced Threat Landscape: What Organizations Need to Know

Most Popular On the Web Anonymous Hits North Korea Via DDoS Anonymous: 10 Things We've Learned In 2013 Cell Phone Inventor Talks of First Cell Call CIOs Must Innovate Or Go Home
More Popular

Video Slideshow Facebook Home: You Are the Product Being Sold Microsoft Eyes Outlook For RT, Office For iOS? Facebook Home + HTC First: Not About Hardware HP Cloud Evangelist: We're All About OpenStack
More Videos

More

FEATURED REPORTS
What's this?
Cloud Collaboration Tools: Big Hopes, Big Needs Strategy: Cybersecurity on the Offense Strategy: Smartphone Smackdown: Galaxy Note II vs. Lumia 920 vs. iPhone 5 Strategy: How to Pick Endpoint Protection Best Practices: 6 Security Services Every Small Business Must Have

Informationweek Discussions
Start the Discussion

More

Login or Register to Comment


Real-time updating is paused. (Resume)

Showing 0 comments
M Subscribe by email S RSS

Sort by oldest first

VIDEO

Subscribe to RSS

WATCH: Bob Metcalfe Plans Ethernet's 40th

WATCH: CES 2013: It's A Wrap!

WATCH: Intel shows off eye tracking and gesture ...

View All Videos

RESOURCE LINKS
Transform your business with Big Data solutions from EMC. WebEx Meetings - Unlimited online meetings with up to 3 people - free! HR and finance apps built from the cloud up. www.workday.com The Top 25 Fortune 100 Companies Use NetScout - Find Out Why The Top 25 Fortune 100 Companies Use NetScout - Find Out Why The Top 25 Fortune 100 Companies Use NetScout - Find Out Why The Top 25 Fortune 100 Companies Use NetScout - Find Out Why Healthcare IT Intelligence, Direct To Your Inbox - Subscribe Now! Premier Research App For IT Pros - TechWeb Digital Library Register Today For The Most Timely Security Insights

FEATURED UBM TECH SITES: Inform ationWeek | Netw ork Com puting | Dr. Dobb's | Dark Reading OUR MARKETS: Business Technology | Channel | Electronics | Gam e & App Developm ent Working With Us: Advertising Contacts | Event Calendar | Tech Marketing Solutions | Corporate Site | Contact Us / Feedback Terms of Service | Privacy Statement | Copyright 2013 UBM Tech, All rights reserved

InformationWeek Home News Personal Tech About Us Contact Us

Commentary Video Windows Education Customer Support

Slideshows Global CIO

Software Government Back Issues

Security Cloud Mobility Social Business Healthcare Financial SMB Site Map Reprints Editorial Calendar

Current Issue

You might also like