Published/updated: April 2010
by Jon Collins and Martin Atherton
Introducing application retirement: what’s really important to you?
Whatever can be said about IT in today’s organisations, our research shows us that we must start from the premise that ‘it’s not wrong’. Plentiful reasons exist why infrastructure and applications are as they are: some of them historical, because it made sense at the time, or organisational in terms of who had the budget, or indeed because yesterday’s innovations can so quickly become today’s legacy.
This is particularly relevant in how applications, and the repositories upon which they depend, deliver services to business users. A senior business manager once said to us:
“What’s wrong with silos? At least they work. I would rather have off the shelf proprietary systems and employ four or five extra people, than spend millions on a system, and the day after its implemented, somebody comes along saying, “Can it do this?” and you end up with 3 or 4 programmers continually working on the system and modifying it.”
Against this background it is unlikely we will ever arrive at what could be considered as ‘application nirvana’ – that is, the perfect software layer which supports the business’ every requirement without ever needing to be changed. As organisations evolve and new capabilities emerge, from online banking to mobile access, so do the software and hardware platforms upon which they depend. And in turn, these impose new challenges on the data.
The downside is that IT has to deal with the consequences of constant change. We talk about such challenges as fragmentation, inefficient operations, data security and so on, which often result from where IT systems have not kept up with the changing requirements of the business. Change events can be difficult to pre-empt or indeed predict – one strategic business acquisition or change in market dynamics, such as a merger or indeed (as we have seen most recently) the credit crunch, can result in even recently deployed applications becoming more of a burden than a help.
The insights upon which this paper is based are taken from a number of research projects designed, executed and interpreted independently by Freeform Dynamics. This paper has been authored independently by Freeform Dynamics and is sponsored by IBM.
This report is free of charge. Click above to download the PDF or view the interactive e-document.
If you experience any problems during this process please contact us at;
email@example.com or call +44 (0)1425 626501 / 620008
By Jack Vile & Dale Vile
As both company and personally owned mobile devices are increasingly used in business, understanding and dealing with the associated risks has become a significant concern for many. In this report we explore some of the trends in mobile technology adoption. ...more
By Dale Vile & Tony Lock
If it has been a while since you thought about your DR measures, or a review has been prompted by a risk assessment, compliance audit, actual disaster or some other scare, it’s worth taking some time to understand what can be achieved in light of important changes that have taken place over the past few years. ...more
By Tony Lock
With the advent of digitisation, all public sector environments generate and capture a significant amount of electronic data. Against this background, this paper explores how to manage costs and risks while meeting these changing needs through ‘active archiving’. ...more
By Dale Vile
In some organisations, the tension between IT and business teams has come to a head around the topic of devices & the so called ‘Bring Your Own Device’ phenomenon.It’s time for IT and business managers to get together & start a proper dialogue about to deal with evolving requirements. ...more
By Dale Vile
By Dale Vile
Organisations of all sizes are trying to understand the security implications of mobile working, device proliferation and BYOD. But with IT vendors offering up a broad range of options, it can be hard to know where to focus your efforts ...more
By Tony Lock
While the importance of business information is almost universally recognised, few organisations have enjoyed either the time or the resources required to ensure that the data they store across an expanding range of computer systems is adequately protected. ...more