Sample IT Essays on Decommissioning Legacy Systems

Decommissioning legacy systems

The two security issues that can lead to decommissioning of a legacy system are: If the legacy systems do not meet the business needs and when they become completely inefficient. If they are technically inefficient in terms of job delivery. When they are constantly falling over or become expensive to maintain. But the best way to determine is when negative feedback from others is overwhelming.

If we are using multiple applications that perform similar or nearly similar tasks, we determine the fully burdened costs to support each system and then ask the business to select which one it wants to keep. The business then manages the transition to a single platform. The task of managing the applications portfolio is made easier by having a robust process. The fact that an application may be five years old or more does not, in itself, justify decommissioning.
Evaluate the fitness of applications across two dimensions: If an application is judged to be both important and effective, then it should, in most cases, be retained. One exception is where the application’s supplier is no longer in business or viable. Then it may be prudent to replace applications even though they are fit-for-purpose in the short term South African Information Security Multi-Conference, (Clarke, Furnell, Von & University of Plymouth, 2010).
Migrate the archive links for all container instances to the consolidated system, and set up the retrieval components in the target system. Retrieval strategy should minimize the need for the end users to access same entity type for different systems from different places as much as possible. Ideally, this process occurs in parallel with the open transactional/master data migration and customizing of the new system. User acceptance is easier to attain when users have a single, familiar search screen that offers them access to the data they need, regardless of its original system.


South African Information Security Multi-Conference, Clarke, N., Furnell, S., Von, S. R., & University of Plymouth. (2010). Proceedings of the South African Information Security Multi-conference: Port Elizabeth, South Africa, 17-18 May 2010. Plymouth, U.K: University of Plymouth.