0% found this document useful (0 votes)
46 views

Upgrading Your Legacy Systems: John Dickinson

:D

Uploaded by

Nidhy Khajuria
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views

Upgrading Your Legacy Systems: John Dickinson

:D

Uploaded by

Nidhy Khajuria
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Welcome Guest | Home News

Log In |

Register | Video

Benefits Slideshows Reports Tech Centers IW Mobile RSS Subscribe Newsletters Events White Papers

Commentary

Search

Software

Security

Cloud

Mobility

Social Business

Big Data

Windows

Global CIO

Government

Healthcare

Education

Financial

SMB

More

FEATURE

Upgrading Your Legacy Systems


John Dickinson
See more from John Connect directly with John: Bio | Contact

Get InformationWeek Daily


Don't miss each day's hottest technology news, sent directly to your inbox, including occasional breaking news alerts.

Start The Discussion

0
Like

0
Tw eet

0
Share

StumbleUpon subm it Submit

Follow InformationWeek
Mail Print

Assessing the Costs and Benefits

(Page 4 of 5) Step Three: Make the Business Case Standard cost-benefit analyses of upgrading legacy systems are not always easy and don't always address all the important business issues. The cost of hardware and packaged software upgrades and replacements is relatively easy to measure and, if the benefit is the difference between a system working and a system not working, so is the dollar value of the benefit. But costs can easily cascade beyond basic hardware and software upgrades. "If we upgrade our IBM AS/400 hardware," says Martinez, "all the software guys would be in here looking for more license fees." Estimating software development costs -- especially actual code development -- is inherently harder than calculating hardware or software purchases. The advent of enterprise resource planning (ERP) systems that come with prewritten code and service-oriented architecture (SOA) designs that include reusable module libraries have made estimating the costs of software development easier. Both developments shrink the amount of code to create and help define the scope of what such custom software can do. A significant but hard-to-measure cost is the loss of knowledge in the outgoing legacy system. "Ultimately the biggest cost is the migration," says 5.11's Martinez, who points out the difficulty of creating time lines that include user retraining as well as the planning and work that go into parallel operation while users are learning the new system. Sometimes you can get lucky, though: "We developed a one-hour training course for new Windows Vista users," says Keller, "but most people only needed about 10 minutes." Understanding Benefits Requires Faith, Guesswork If estimating costs is tough, figuring out the benefits may feel like pure guesswork. But even when the benefits may not be directly measurable, they may be still be convincing. The benefit of replacing a broken legacy system is pretty clear. It's harder to measure the negative impact of users spending time creating offsystem spreadsheets in order to do their work, but it does make a difference. Sometimes, a single issue can bring the benefits of upgrading into sharp focus. When Santa Cruz County upgraded, "we lost the requirement to support a handful of nonstandard machines, that included some Windows 95 equipment, and a computer running an older Linux version," says Doan. That was a big relief to the busy department. Security can also be a hard-to-measure issue. "Too often midsize business people focus entirely on cost," says HP's Michelson,

UPCOMING EVENTS
Live Events WebCasts

How to Choose a SaaS Vendor - E2 Conference Boston Desktop Virtualization: Getting It Right from the Start Interop Las Vegas Virtualization Crash Course: Servers, Desktops and Private Clouds - Interop Las Vegas When Networks Attack: Big Data Security Tackles Incident Response - Interop Las Vegas Five Essential Steps to Mitigating Insider Threats Interop Las Vegas
More Live Events>>

MORE INSIGHTS Webcasts


Data Virtualization: A Win-Win for Business & IT Unlock the Value of Your Enterprise Apps with Smart Process Apps

White Papers

More >>

Rule-Driven Profiling: A Next Generation Approach to Vulnerability Discovery System Z: Making Great Security Even Better

THIS WEEK'S ISSUE


Subscribe to InformationWeek Subscribe to Digital Read the Cover Story

Reports

More >>

Cloud Collaboration Tools: Big Hopes, Big Needs Strategy: The Next Phase of Meaningful Use

"but if you don't upgrade hardware in time, for example, you open yourself up to the risk of virus attack and software obsolescence."

Download This Issue

Ultimately, "we have to study the problem carefully and plan for a specific number of users and a specific volume of business," says More >> Martinez, "and then make a cost-benefit analysis." The benefits have to be spelled out in a way that convinces management as well, he says. "When business is rolling along, they may not care very much how hard it is to track or manage."
Page 5: Finding Unexpected Upsides Previous Page | 1 | 2 | 3 | 4 | 5 | Next Page

Back Issues Must Reads & IT Trends

CURRENT HEALTHCARE ISSUE


In this issue:
The Right Health IT Priorities? Regulatory requirements dominate, our research shows. The challenge is to innovate with technology, not just dot the i's and cross the t's. Tech Is Just One Factor: Real change takes much more than technology.

ABOUT THE AUTHOR


Continued See more from John Connect directly with John: Bio | Contact

Start The Discussion

0
Like

0
Tw eet

0
Share

StumbleUpon subm it Submit

Back Issues Must Reads & IT Trends Mail Print

Related Reading
News Commentary Google Opens Compute Engine To Cloud Customers Prototype British Police Car Rivals Batmobile Anonymous Seizes North Korean Twitter, Flickr Feeds HP Cloud Evangelist: We're All About OpenStack
More News

And much more! Read the Current Issue

FEATURED WHITEPAPERS
What's this?
The Business Value of Hybrid Cloud -Based Compromise Intelligence Monitoring and Threat Mitigation Learn How Neustar Technology Can Block DDoS Attacks Simple, Cost-Effective Messaging and Collaboration for Medium-Sized Businesses Email marketing in a complex world Advanced Threat Landscape: What Organizations Need to Know

Most Popular On the Web Anonymous Hits North Korea Via DDoS Anonymous: 10 Things We've Learned In 2013 Cell Phone Inventor Talks of First Cell Call CIOs Must Innovate Or Go Home
More Popular

More

Video Slideshow Facebook Home: You Are the Product Being Sold Microsoft Eyes Outlook For RT, Office For iOS? Facebook Home + HTC First: Not About Hardware HP Cloud Evangelist: We're All About OpenStack
More Videos

FEATURED REPORTS
What's this?
Cloud Collaboration Tools: Big Hopes, Big Needs Strategy: Cybersecurity on the Offense Strategy: Smartphone Smackdown: Galaxy Note II vs. Lumia 920 vs. iPhone 5 Strategy: How to Pick Endpoint Protection Best Practices: 6 Security Services Every Small Business Must Have

Informationweek Discussions
Start the Discussion

More

Login or Register to Comment


Real-time updating is paused. (Resume)

Showing 0 comments

Sort by oldest first

M Subscribe by email

S RSS

VIDEO
Subscribe to RSS

WATCH: Bob Metcalfe Plans Ethernet's 40th

WATCH: CES 2013: It's A Wrap!

WATCH: Intel shows off eye tracking and gesture ...

View All Videos

RESOURCE LINKS
Transform your business with Big Data solutions from EMC. Click here for an Atlantic Health Case Study Get Today's Hottest Tech News, Direct To Inbox - Subscribe now! No Jitter Daily blogging and analysis of enterprise IP-telephony Click here for an Atlantic Health Case Study Get Expert Coverage Of Consumer Tech In Business On BYTE Government IT Intelligence, Direct To Your Inbox - Subscribe Now! Healthcare IT Intelligence, Direct To Your Inbox - Subscribe Now! Premier Research App For IT Pros - TechWeb Digital Library Register Today For The Most Timely Security Insights

FEATURED UBM TECH SITES: Inform ationWeek | Netw ork Com puting | Dr. Dobb's | Dark Reading OUR MARKETS: Business Technology | Channel | Electronics | Gam e & App Developm ent Working With Us: Advertising Contacts | Event Calendar | Tech Marketing Solutions | Corporate Site | Contact Us / Feedback Terms of Service | Privacy Statement | Copyright 2013 UBM Tech, All rights reserved

InformationWeek Home News Personal Tech About Us Contact Us

Commentary Video Windows Education Customer Support

Slideshows Global CIO

Software Government Back Issues

Security Cloud Mobility Social Business Healthcare Financial SMB Site Map Reprints Editorial Calendar

Current Issue

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy