Home
Business Guide
 
simplicable technology guide   »  enterprise architecture   »  data architecture   »  how to caculate the value of data   »  ask the architect   »  what's a legacy system?

What's a Legacy System?

        posted by , January 06, 2012

A Legacy System is an information system (computer system) that's out of date with current technologies and system design approaches.

The term has a negative connotation. It implies that the system is marked for replacement. The term is sometimes used inaccurately (i.e. just because a system doesn't use the latest trendy technologies doesn't automatically make it legacy). There are 8 things that can make a system legacy:

1. Hardware

A system that's incompatible with new hardware. Hardware failure becomes a significant business risk.

2. Scalability

A system architecture that can't support projected business volumes.

3. End of Support

A system that's no longer supported by the vendor who created it. This also applies when sub-systems, components, libraries, programming environments and operating systems reach end of support.

4. Skills

When the skills required to support the system have become rare. Key staff turnover becomes a business risk.

5. Extensibility

When the system lacks hooks that allow it to be extended to meet new business requirements.

6. Efficiency

When IT services related to operating or extending the system are expensive (as compared to modern systems).

7. Usability

When the system has low usability (as measured by user satisfaction with the system).

8. Quality

When the system has chronic quality problems.




Related Articles



Enterprise Architecture
How to architect an organization.




Current state blueprints capture business, data and implementation architecture at the conceptual, logical and physical levels.

Explaining complex business and technical concepts in layman's terms.

Scoring the EA team on influence.

Think your website is safe from DDoS? Think again.


Recently on Simplicable


Security Risks

posted by Anna Mar
Security threats and security risk management.

Security Vulnerabilities

posted by John Spacey
Exploitable flaws and weaknesses.

Multifactor Authentication Explained

posted by Anna Mar
How to confirm the identity of users and entities.

Security Principles

posted by Anna Mar
The maxims of security.

about     contact     sitemap     privacy     terms of service     copyright