SlideShare a Scribd company logo
1 of 1
Download to read offline
Migrating Legacy Applications
Legacy and homegrown systems often represent years of costly software development and business process
refinement. Legacy systems also house critical data for the life of an organization. This data often has to be
integrated with new or expanded environments. Gaining access to data is possible but continued improvement
in critical business processes necessary for enhanced efficiencies and higher customer service levels drain IT
budgets. Maintenance of legacy system and integration of this data can prove to be challenging and
expensive.

Motivations for Migration

       Lower cost of maintenance of legacy applications
       Technology limitations in legacy applications and platforms
       Adoption of open source wave
       Adoption of emerging architectural concepts
       Conversion of two tier to n tier application
       Mergers and acquisitions triggering application consolidation
       Adoption of SOA philosophy
       Lack of Vendor support for legacy applications and older platforms
       Lack of skilled resources for legacy application maintenance and development
       Increase access to critical data
       Lack of documentation to support legacy system, dependency on people vs. process
       Improve scalability
       Improve reliability

Typical Questions to ask Yourself

       What business applications are critical in our organization?
       How many such applications are legacy systems?
       What percentage of our IT budget is spent in maintaining Legacy systems?
       Do we have a roadmap to maintain and upgrade such systems?
       Should we continue to invest in management of such systems?
       What issues and challenges are we facing internally using our legacy apps?
       What integration limitations are we facing within our organization?
       When will migration of legacy systems make sense?
       Have we considered migrating our legacy system?
       What best practices should our organization follow?




                     Copyright © 1999, 2008 ISHIR INFOTECH Pvt. Ltd. All Rights Reserved.   |   www.ishir.com

More Related Content

More from ISHIR

More from ISHIR (6)

White Paper : Why Outsourcing Fails
White Paper : Why Outsourcing FailsWhite Paper : Why Outsourcing Fails
White Paper : Why Outsourcing Fails
 
White paper : Cloud Computing Services
White paper : Cloud Computing ServicesWhite paper : Cloud Computing Services
White paper : Cloud Computing Services
 
White Paper How To Define Outsourced Qa Project Plan, Quality Assurance, Proj...
White Paper How To Define Outsourced Qa Project Plan, Quality Assurance, Proj...White Paper How To Define Outsourced Qa Project Plan, Quality Assurance, Proj...
White Paper How To Define Outsourced Qa Project Plan, Quality Assurance, Proj...
 
White Paper : It Is Time To Switch Outsourcing Vendor
White Paper : It Is Time To Switch Outsourcing VendorWhite Paper : It Is Time To Switch Outsourcing Vendor
White Paper : It Is Time To Switch Outsourcing Vendor
 
White Paper: IT budgets Custom Software Application Development, Custom Appli...
White Paper: IT budgets Custom Software Application Development, Custom Appli...White Paper: IT budgets Custom Software Application Development, Custom Appli...
White Paper: IT budgets Custom Software Application Development, Custom Appli...
 
White Paper: Offshore Software Development Company, Offshore Product Development
White Paper: Offshore Software Development Company, Offshore Product DevelopmentWhite Paper: Offshore Software Development Company, Offshore Product Development
White Paper: Offshore Software Development Company, Offshore Product Development
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

White Paper:Migrating Legacy Systems and Migrating Legacy Applications Strategy

  • 1. Migrating Legacy Applications Legacy and homegrown systems often represent years of costly software development and business process refinement. Legacy systems also house critical data for the life of an organization. This data often has to be integrated with new or expanded environments. Gaining access to data is possible but continued improvement in critical business processes necessary for enhanced efficiencies and higher customer service levels drain IT budgets. Maintenance of legacy system and integration of this data can prove to be challenging and expensive. Motivations for Migration Lower cost of maintenance of legacy applications Technology limitations in legacy applications and platforms Adoption of open source wave Adoption of emerging architectural concepts Conversion of two tier to n tier application Mergers and acquisitions triggering application consolidation Adoption of SOA philosophy Lack of Vendor support for legacy applications and older platforms Lack of skilled resources for legacy application maintenance and development Increase access to critical data Lack of documentation to support legacy system, dependency on people vs. process Improve scalability Improve reliability Typical Questions to ask Yourself What business applications are critical in our organization? How many such applications are legacy systems? What percentage of our IT budget is spent in maintaining Legacy systems? Do we have a roadmap to maintain and upgrade such systems? Should we continue to invest in management of such systems? What issues and challenges are we facing internally using our legacy apps? What integration limitations are we facing within our organization? When will migration of legacy systems make sense? Have we considered migrating our legacy system? What best practices should our organization follow? Copyright © 1999, 2008 ISHIR INFOTECH Pvt. Ltd. All Rights Reserved. | www.ishir.com