Professional Documents
Culture Documents
Log In |
Register | Video
Benefits Slideshows Reports Tech Centers IW Mobile RSS Subscribe Newsletters Events White Papers
Commentary
Search
Software
Security
Cloud
Mobility
Social Business
Big Data
Windows
Global CIO
Government
Healthcare
Education
Financial
SMB
More
FEATURE
0
Like
0
Tw eet
0
Share
Follow InformationWeek
Mail Print
(Page 2 of 5) Step One: Analyze the Current System Look very carefully at your legacy systems before making any decision to replace them with new ones. Be careful to evaluate what the system is actually doing, rather than just the technology being used to do it. "It's best to start by looking at applications rather than just technology," warns Hewlett-Packard distinguished technologist Bruce Michelson, "because that's where the trigger always is." In most cases, the legacy system is still performing a useful function. As one wag put it, "A legacy system is one that actually works." It's likely, however, that the legacy system does not work as quickly or as well as newer systems might. Sluggish, trouble-prone systems lead to user unhappiness and put a crimp on business productivity. It could be that a virus or other malware is to blame, or the software may simply be running on older, slower hardware. Legacy systems may also no longer properly meet user needs, if they ever did. A program may need new features or access to new data, or it may need to be scaled to new products or a larger staff. For example, "We are busting at the seams," says IT director Elias Martinez of 5.11 Inc., whose business of selling tactical armor for law enforcement and military use is growing rapidly. "We don't know how we are going to sustain our growth with the systems we have today." Identify Orphan Software Another scenario is a system running on an old hardware or software platform that is no longer supported by its manufacturer - or understood by anyone on staff. Ask Santa Cruz County , Calif., IT systems analyst Gerry Doan, who supports a 500person department: "We were facing a system running on a DOSand Fox-based platform that no one knew much about, and the only guy who did understand it was about to retire." Of course, even packaged products such as operating systems and office productivity software can eventually achieve legacy status. Upgrading to new versions may enable new staff functionality or greater productivity. And new applications software may require moving to newer operating systems. Finally, the normal computer-refresh cycle may require retiring
UPCOMING EVENTS
Live Events WebCasts
How to Choose a SaaS Vendor - E2 Conference Boston Desktop Virtualization: Getting It Right from the Start Interop Las Vegas Virtualization Crash Course: Servers, Desktops and Private Clouds - Interop Las Vegas When Networks Attack: Big Data Security Tackles Incident Response - Interop Las Vegas Five Essential Steps to Mitigating Insider Threats Interop Las Vegas
More Live Events>>
White Papers
More >>
Rule-Driven Profiling: A Next Generation Approach to Vulnerability Discovery System Z: Making Great Security Even Better
Reports
More >>
Cloud Collaboration Tools: Big Hopes, Big Needs Strategy: The Next Phase of Meaningful Use
More >>
legacy systems. "We normally replace about 80 of our systems every year," says Hans Keller, CTO of the National Aquarium in Baltimore, "and when we started the process at the beginning of 2006 it seemed that our timing called for considering a changeover from Windows XP and Windows 2000 to Windows Vista for this batch of systems."
Page 3: Understanding How Current Systems Are Being Used Previous Page | 1 | 2 | 3 | 4 | 5 | Next Page Back Issues Must Reads & IT Trends
0
Like
0
Tw eet
0
Share
Related Reading
News Commentary Google Opens Compute Engine To Cloud Customers Prototype British Police Car Rivals Batmobile Anonymous Seizes North Korean Twitter, Flickr Feeds HP Cloud Evangelist: We're All About OpenStack
More News
FEATURED WHITEPAPERS
What's this?
The Business Value of Hybrid Cloud -Based Compromise Intelligence Monitoring and Threat Mitigation Learn How Neustar Technology Can Block DDoS Attacks Simple, Cost-Effective Messaging and Collaboration for Medium-Sized Businesses Email marketing in a complex world Advanced Threat Landscape: What Organizations Need to Know
Most Popular On the Web Anonymous Hits North Korea Via DDoS Anonymous: 10 Things We've Learned In 2013 Cell Phone Inventor Talks of First Cell Call CIOs Must Innovate Or Go Home
More Popular
Video Slideshow Facebook Home: You Are the Product Being Sold Microsoft Eyes Outlook For RT, Office For iOS? Facebook Home + HTC First: Not About Hardware HP Cloud Evangelist: We're All About OpenStack
More Videos
More
FEATURED REPORTS
What's this?
Cloud Collaboration Tools: Big Hopes, Big Needs Strategy: Cybersecurity on the Offense Strategy: Smartphone Smackdown: Galaxy Note II vs. Lumia 920 vs. iPhone 5 Strategy: How to Pick Endpoint Protection Best Practices: 6 Security Services Every Small Business Must Have
Informationweek Discussions
Start the Discussion
More
Showing 0 comments
M Subscribe by email S RSS
VIDEO
Subscribe to RSS
RESOURCE LINKS
Transform your business with Big Data solutions from EMC. WebEx Meetings - Unlimited online meetings with up to 3 people - free! HR and finance apps built from the cloud up. www.workday.com The Top 25 Fortune 100 Companies Use NetScout - Find Out Why The Top 25 Fortune 100 Companies Use NetScout - Find Out Why The Top 25 Fortune 100 Companies Use NetScout - Find Out Why The Top 25 Fortune 100 Companies Use NetScout - Find Out Why Healthcare IT Intelligence, Direct To Your Inbox - Subscribe Now! Premier Research App For IT Pros - TechWeb Digital Library Register Today For The Most Timely Security Insights
FEATURED UBM TECH SITES: Inform ationWeek | Netw ork Com puting | Dr. Dobb's | Dark Reading OUR MARKETS: Business Technology | Channel | Electronics | Gam e & App Developm ent Working With Us: Advertising Contacts | Event Calendar | Tech Marketing Solutions | Corporate Site | Contact Us / Feedback Terms of Service | Privacy Statement | Copyright 2013 UBM Tech, All rights reserved
Security Cloud Mobility Social Business Healthcare Financial SMB Site Map Reprints Editorial Calendar
Current Issue