SlideShare a Scribd company logo
Upcoming Webinar
A Webcast Hosted by Solix Technologies ,[object Object],[object Object],[object Object],[object Object]
“ On average 10% of applications in an unoptimized portfolio are candidates for retirement. An additional one-third can require migration or rationalization”. - Jim Duggan, Gartner analyst (Plan Legacy Application Retirements carefully, April 2009)  Application Retirement is part of Application Portfolio Management that must be undertaken on a continuing basis since applications often outlive their usefulness. However, one may need to retain and manage legacy data from such applications which are candidates for retirement.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Register Now

More Related Content

What's hot

ITIL helpdesk
ITIL helpdeskITIL helpdesk
ITIL helpdesk
citrusservicedesk
 
Omzig
OmzigOmzig
Octopus Service Level Agreements
Octopus Service Level AgreementsOctopus Service Level Agreements
Octopus Service Level Agreements
vincent.biot
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended Enterprise
NextLabs, Inc.
 
Laserfiche regulatory + technology convergence webinar
Laserfiche regulatory + technology convergence webinarLaserfiche regulatory + technology convergence webinar
Laserfiche regulatory + technology convergence webinar
Laserfiche
 
Accelerating the Healthcare Revenue Cycle
Accelerating the Healthcare Revenue CycleAccelerating the Healthcare Revenue Cycle
Accelerating the Healthcare Revenue Cycle
Dan Corcoran
 
17 domains
17 domains17 domains
17 domains
Allison Giddens
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
Vincent Kwon
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Vincent Kwon
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Joanna Hendricks
 
five AI applications for ITSM that you need to know.
 five AI applications for ITSM that you need to know. five AI applications for ITSM that you need to know.
five AI applications for ITSM that you need to know.
markomdcms
 
Services, Compliance and Innovation
Services, Compliance and InnovationServices, Compliance and Innovation
Services, Compliance and Innovation
Jose Ivan Delgado, Ph.D.
 
IT Support with Managed Services
IT Support with Managed ServicesIT Support with Managed Services
IT Support with Managed Services
Felix Yanko
 
50% of existing IT Applications will NOT survive!: Top 15 Reasons
50% of existing IT Applications will NOT survive!: Top 15 Reasons50% of existing IT Applications will NOT survive!: Top 15 Reasons
50% of existing IT Applications will NOT survive!: Top 15 Reasons
VSR *
 
Healthcare Analytics - Product Selector
Healthcare Analytics - Product SelectorHealthcare Analytics - Product Selector
Healthcare Analytics - Product Selector
Bialogics
 
Mobility- Form vs. Function (By Dell)
Mobility- Form vs. Function (By Dell)Mobility- Form vs. Function (By Dell)
Mobility- Form vs. Function (By Dell)
itnewsafrica
 
Addressing Password Creep
Addressing Password CreepAddressing Password Creep
Addressing Password Creep
DigitalPersona
 
Oss In A Corporate Environment
Oss In A Corporate EnvironmentOss In A Corporate Environment
Oss In A Corporate Environment
petr_havel
 
THE WINNER-DANIEL ALVES DA SILVA-Missão Critica e Suporte Remoto
THE WINNER-DANIEL ALVES DA SILVA-Missão Critica e Suporte RemotoTHE WINNER-DANIEL ALVES DA SILVA-Missão Critica e Suporte Remoto
THE WINNER-DANIEL ALVES DA SILVA-Missão Critica e Suporte Remoto
Daniel Alves da Silva
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
Matthew Moldvan
 

What's hot (20)

ITIL helpdesk
ITIL helpdeskITIL helpdesk
ITIL helpdesk
 
Omzig
OmzigOmzig
Omzig
 
Octopus Service Level Agreements
Octopus Service Level AgreementsOctopus Service Level Agreements
Octopus Service Level Agreements
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended Enterprise
 
Laserfiche regulatory + technology convergence webinar
Laserfiche regulatory + technology convergence webinarLaserfiche regulatory + technology convergence webinar
Laserfiche regulatory + technology convergence webinar
 
Accelerating the Healthcare Revenue Cycle
Accelerating the Healthcare Revenue CycleAccelerating the Healthcare Revenue Cycle
Accelerating the Healthcare Revenue Cycle
 
17 domains
17 domains17 domains
17 domains
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580
 
five AI applications for ITSM that you need to know.
 five AI applications for ITSM that you need to know. five AI applications for ITSM that you need to know.
five AI applications for ITSM that you need to know.
 
Services, Compliance and Innovation
Services, Compliance and InnovationServices, Compliance and Innovation
Services, Compliance and Innovation
 
IT Support with Managed Services
IT Support with Managed ServicesIT Support with Managed Services
IT Support with Managed Services
 
50% of existing IT Applications will NOT survive!: Top 15 Reasons
50% of existing IT Applications will NOT survive!: Top 15 Reasons50% of existing IT Applications will NOT survive!: Top 15 Reasons
50% of existing IT Applications will NOT survive!: Top 15 Reasons
 
Healthcare Analytics - Product Selector
Healthcare Analytics - Product SelectorHealthcare Analytics - Product Selector
Healthcare Analytics - Product Selector
 
Mobility- Form vs. Function (By Dell)
Mobility- Form vs. Function (By Dell)Mobility- Form vs. Function (By Dell)
Mobility- Form vs. Function (By Dell)
 
Addressing Password Creep
Addressing Password CreepAddressing Password Creep
Addressing Password Creep
 
Oss In A Corporate Environment
Oss In A Corporate EnvironmentOss In A Corporate Environment
Oss In A Corporate Environment
 
THE WINNER-DANIEL ALVES DA SILVA-Missão Critica e Suporte Remoto
THE WINNER-DANIEL ALVES DA SILVA-Missão Critica e Suporte RemotoTHE WINNER-DANIEL ALVES DA SILVA-Missão Critica e Suporte Remoto
THE WINNER-DANIEL ALVES DA SILVA-Missão Critica e Suporte Remoto
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
 

Viewers also liked

BDI Models and its Application to Retirement Savings
BDI Models and its Application to Retirement SavingsBDI Models and its Application to Retirement Savings
BDI Models and its Application to Retirement Savings
Anand Rao
 
Application retirement road_map_for_legacy_applications
Application retirement road_map_for_legacy_applicationsApplication retirement road_map_for_legacy_applications
Application retirement road_map_for_legacy_applications
Frank Morris
 
Application Consolidation and Retirement
Application Consolidation and RetirementApplication Consolidation and Retirement
Application Consolidation and Retirement
IBM Analytics
 
An Integrated Approach to Application Portfolio Rationalization
An Integrated Approach to Application Portfolio RationalizationAn Integrated Approach to Application Portfolio Rationalization
An Integrated Approach to Application Portfolio Rationalization
Cognizant
 
Application decommissioning stop spending millions supporting legacy applicat...
Application decommissioning stop spending millions supporting legacy applicat...Application decommissioning stop spending millions supporting legacy applicat...
Application decommissioning stop spending millions supporting legacy applicat...
Flatirons Solutions®
 
DevOps in Practice: When does "Practice" Become "Doing"?
DevOps in Practice: When does "Practice" Become "Doing"?DevOps in Practice: When does "Practice" Become "Doing"?
DevOps in Practice: When does "Practice" Become "Doing"?
Michael Elder
 
Industry Perspective: DevOps - What it Means for the Average Business
Industry Perspective: DevOps - What it Means for the Average BusinessIndustry Perspective: DevOps - What it Means for the Average Business
Industry Perspective: DevOps - What it Means for the Average Business
Michael Elder
 
Decommissioning presentations complete
Decommissioning presentations   completeDecommissioning presentations   complete
Decommissioning presentations complete
Nuclear Energy Insider
 
Managing and Rationalizing the Application Portfolio with CA PPM
Managing and Rationalizing the Application Portfolio with CA PPMManaging and Rationalizing the Application Portfolio with CA PPM
Managing and Rationalizing the Application Portfolio with CA PPM
CA Technologies
 
Application Portfolio Management
Application Portfolio ManagementApplication Portfolio Management
Application Portfolio Management
Alain Charpentier
 
Application Portfolio Rationalization
Application Portfolio RationalizationApplication Portfolio Rationalization
Application Portfolio Rationalization
Bob Rhubart
 
How To Reduce Application Support & Maintenance Cost
How To Reduce Application Support & Maintenance Cost How To Reduce Application Support & Maintenance Cost
How To Reduce Application Support & Maintenance Cost
HCL Technologies
 
What is Application Performance Management?
What is Application Performance Management?What is Application Performance Management?
What is Application Performance Management?
CA Technologies
 

Viewers also liked (13)

BDI Models and its Application to Retirement Savings
BDI Models and its Application to Retirement SavingsBDI Models and its Application to Retirement Savings
BDI Models and its Application to Retirement Savings
 
Application retirement road_map_for_legacy_applications
Application retirement road_map_for_legacy_applicationsApplication retirement road_map_for_legacy_applications
Application retirement road_map_for_legacy_applications
 
Application Consolidation and Retirement
Application Consolidation and RetirementApplication Consolidation and Retirement
Application Consolidation and Retirement
 
An Integrated Approach to Application Portfolio Rationalization
An Integrated Approach to Application Portfolio RationalizationAn Integrated Approach to Application Portfolio Rationalization
An Integrated Approach to Application Portfolio Rationalization
 
Application decommissioning stop spending millions supporting legacy applicat...
Application decommissioning stop spending millions supporting legacy applicat...Application decommissioning stop spending millions supporting legacy applicat...
Application decommissioning stop spending millions supporting legacy applicat...
 
DevOps in Practice: When does "Practice" Become "Doing"?
DevOps in Practice: When does "Practice" Become "Doing"?DevOps in Practice: When does "Practice" Become "Doing"?
DevOps in Practice: When does "Practice" Become "Doing"?
 
Industry Perspective: DevOps - What it Means for the Average Business
Industry Perspective: DevOps - What it Means for the Average BusinessIndustry Perspective: DevOps - What it Means for the Average Business
Industry Perspective: DevOps - What it Means for the Average Business
 
Decommissioning presentations complete
Decommissioning presentations   completeDecommissioning presentations   complete
Decommissioning presentations complete
 
Managing and Rationalizing the Application Portfolio with CA PPM
Managing and Rationalizing the Application Portfolio with CA PPMManaging and Rationalizing the Application Portfolio with CA PPM
Managing and Rationalizing the Application Portfolio with CA PPM
 
Application Portfolio Management
Application Portfolio ManagementApplication Portfolio Management
Application Portfolio Management
 
Application Portfolio Rationalization
Application Portfolio RationalizationApplication Portfolio Rationalization
Application Portfolio Rationalization
 
How To Reduce Application Support & Maintenance Cost
How To Reduce Application Support & Maintenance Cost How To Reduce Application Support & Maintenance Cost
How To Reduce Application Support & Maintenance Cost
 
What is Application Performance Management?
What is Application Performance Management?What is Application Performance Management?
What is Application Performance Management?
 

Similar to Retire Your Legacy Applications & Reduce Costs

Simplifying Enterprise Application Retirement with Solix ExAPPS – Industry’s ...
Simplifying Enterprise Application Retirement with Solix ExAPPS – Industry’s ...Simplifying Enterprise Application Retirement with Solix ExAPPS – Industry’s ...
Simplifying Enterprise Application Retirement with Solix ExAPPS – Industry’s ...
LindaWatson19
 
Insider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection ImperativeInsider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection Imperative
DataCore Software
 
Power of the Platform: Andy Walker, BMC Software
Power of the Platform: Andy Walker, BMC SoftwarePower of the Platform: Andy Walker, BMC Software
Power of the Platform: Andy Walker, BMC Software
BMC Software
 
Dit yvol5iss36
Dit yvol5iss36Dit yvol5iss36
Dit yvol5iss36
Rick Lemieux
 
Transformation of legacy landscape in the insurance world
Transformation of legacy landscape in the insurance worldTransformation of legacy landscape in the insurance world
Transformation of legacy landscape in the insurance world
NIIT Technologies
 
Lastmile banking v1.3
Lastmile banking v1.3Lastmile banking v1.3
3 Considerations for IT Teams at Small-Midsized Firms
3 Considerations for IT Teams at Small-Midsized Firms3 Considerations for IT Teams at Small-Midsized Firms
3 Considerations for IT Teams at Small-Midsized Firms
ReadyTalk
 
Using Cloud Computing to Change the Game of Finance
Using Cloud Computing to Change the Game of FinanceUsing Cloud Computing to Change the Game of Finance
Using Cloud Computing to Change the Game of Finance
BAASS Business Solutions Inc.
 
Clextra platform
Clextra platformClextra platform
Clextra platform
Edgevalue
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deck
Richard (Dick) Kaufman
 
M. Josephs - Reaching for the Clouds - Final for Distribution
M. Josephs - Reaching for the Clouds - Final for DistributionM. Josephs - Reaching for the Clouds - Final for Distribution
M. Josephs - Reaching for the Clouds - Final for Distribution
Michael Josephs
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
IRJET Journal
 
Five Steps to Better Application Performance
Five Steps to Better Application PerformanceFive Steps to Better Application Performance
Five Steps to Better Application Performance
Sumo Logic
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
ssusera76ea9
 
I360 Gov Kaplan Presentation V03 15 10
I360 Gov Kaplan Presentation V03 15 10I360 Gov Kaplan Presentation V03 15 10
I360 Gov Kaplan Presentation V03 15 10
Jeffrey Kaplan
 
Business Continuity for Mission Critical Applications
Business Continuity for Mission Critical ApplicationsBusiness Continuity for Mission Critical Applications
Business Continuity for Mission Critical Applications
DataCore Software
 
Karen Forster Top 10 IT Costs
Karen Forster Top 10 IT CostsKaren Forster Top 10 IT Costs
Karen Forster Top 10 IT Costs
pvjeff
 
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docxWeek 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
helzerpatrina
 
Anything as a Service - Factors to Consider
Anything as a Service - Factors to ConsiderAnything as a Service - Factors to Consider
Anything as a Service - Factors to Consider
snewell4
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
tcarrucan
 

Similar to Retire Your Legacy Applications & Reduce Costs (20)

Simplifying Enterprise Application Retirement with Solix ExAPPS – Industry’s ...
Simplifying Enterprise Application Retirement with Solix ExAPPS – Industry’s ...Simplifying Enterprise Application Retirement with Solix ExAPPS – Industry’s ...
Simplifying Enterprise Application Retirement with Solix ExAPPS – Industry’s ...
 
Insider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection ImperativeInsider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection Imperative
 
Power of the Platform: Andy Walker, BMC Software
Power of the Platform: Andy Walker, BMC SoftwarePower of the Platform: Andy Walker, BMC Software
Power of the Platform: Andy Walker, BMC Software
 
Dit yvol5iss36
Dit yvol5iss36Dit yvol5iss36
Dit yvol5iss36
 
Transformation of legacy landscape in the insurance world
Transformation of legacy landscape in the insurance worldTransformation of legacy landscape in the insurance world
Transformation of legacy landscape in the insurance world
 
Lastmile banking v1.3
Lastmile banking v1.3Lastmile banking v1.3
Lastmile banking v1.3
 
3 Considerations for IT Teams at Small-Midsized Firms
3 Considerations for IT Teams at Small-Midsized Firms3 Considerations for IT Teams at Small-Midsized Firms
3 Considerations for IT Teams at Small-Midsized Firms
 
Using Cloud Computing to Change the Game of Finance
Using Cloud Computing to Change the Game of FinanceUsing Cloud Computing to Change the Game of Finance
Using Cloud Computing to Change the Game of Finance
 
Clextra platform
Clextra platformClextra platform
Clextra platform
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deck
 
M. Josephs - Reaching for the Clouds - Final for Distribution
M. Josephs - Reaching for the Clouds - Final for DistributionM. Josephs - Reaching for the Clouds - Final for Distribution
M. Josephs - Reaching for the Clouds - Final for Distribution
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
Five Steps to Better Application Performance
Five Steps to Better Application PerformanceFive Steps to Better Application Performance
Five Steps to Better Application Performance
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
I360 Gov Kaplan Presentation V03 15 10
I360 Gov Kaplan Presentation V03 15 10I360 Gov Kaplan Presentation V03 15 10
I360 Gov Kaplan Presentation V03 15 10
 
Business Continuity for Mission Critical Applications
Business Continuity for Mission Critical ApplicationsBusiness Continuity for Mission Critical Applications
Business Continuity for Mission Critical Applications
 
Karen Forster Top 10 IT Costs
Karen Forster Top 10 IT CostsKaren Forster Top 10 IT Costs
Karen Forster Top 10 IT Costs
 
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docxWeek 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
 
Anything as a Service - Factors to Consider
Anything as a Service - Factors to ConsiderAnything as a Service - Factors to Consider
Anything as a Service - Factors to Consider
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 

More from xmeteorite

Launch: Silicon Valley 2013
Launch: Silicon Valley 2013Launch: Silicon Valley 2013
Launch: Silicon Valley 2013
xmeteorite
 
Launch: Silicon Valley 2013, High-Value, High -Visibility Product Launch Even...
Launch: Silicon Valley 2013, High-Value, High -Visibility Product Launch Even...Launch: Silicon Valley 2013, High-Value, High -Visibility Product Launch Even...
Launch: Silicon Valley 2013, High-Value, High -Visibility Product Launch Even...
xmeteorite
 
Launch: Silicon Valley 2013
Launch: Silicon Valley 2013Launch: Silicon Valley 2013
Launch: Silicon Valley 2013
xmeteorite
 
Launch: Silicon Valley 2012
Launch: Silicon Valley 2012Launch: Silicon Valley 2012
Launch: Silicon Valley 2012
xmeteorite
 
A video: Innovation in the Cloud
A video: Innovation in the CloudA video: Innovation in the Cloud
A video: Innovation in the Cloud
xmeteorite
 
Innovation in the Cloud
Innovation in the CloudInnovation in the Cloud
Innovation in the Cloud
xmeteorite
 
Disaster Recovery, Local Operational Recovery, and High Availability
Disaster Recovery, Local Operational Recovery, and High AvailabilityDisaster Recovery, Local Operational Recovery, and High Availability
Disaster Recovery, Local Operational Recovery, and High Availability
xmeteorite
 
The Economics of Parallel System Design in Commercial-Scale Solar Plants
The Economics of Parallel System Design in Commercial-Scale Solar PlantsThe Economics of Parallel System Design in Commercial-Scale Solar Plants
The Economics of Parallel System Design in Commercial-Scale Solar Plants
xmeteorite
 
Disaster Recovery Coupled with High Exchange Availability
Disaster Recovery Coupled with High Exchange AvailabilityDisaster Recovery Coupled with High Exchange Availability
Disaster Recovery Coupled with High Exchange Availability
xmeteorite
 
A Cost-Effective Integrated Solution for Backup and Disaster Recovery
A Cost-Effective Integrated Solution for Backup and Disaster RecoveryA Cost-Effective Integrated Solution for Backup and Disaster Recovery
A Cost-Effective Integrated Solution for Backup and Disaster Recovery
xmeteorite
 
eIQ Datasheet - 350-WATT DC-TO-DC Converter Module
eIQ Datasheet - 350-WATT DC-TO-DC Converter ModuleeIQ Datasheet - 350-WATT DC-TO-DC Converter Module
eIQ Datasheet - 350-WATT DC-TO-DC Converter Module
xmeteorite
 
Installation and operations_manual
Installation and operations_manualInstallation and operations_manual
Installation and operations_manual
xmeteorite
 
eIQ Datasheet - 250-WATT DC-TO-DC Converter Module
eIQ Datasheet - 250-WATT DC-TO-DC Converter ModuleeIQ Datasheet - 250-WATT DC-TO-DC Converter Module
eIQ Datasheet - 250-WATT DC-TO-DC Converter Module
xmeteorite
 
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCSecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRC
xmeteorite
 
SecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaSSecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaS
xmeteorite
 
SecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaSSecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaS
xmeteorite
 
QuEST Global ranked World No.1 in Engineering Service Outsourcing by the Blac...
QuEST Global ranked World No.1 in Engineering Service Outsourcing by the Blac...QuEST Global ranked World No.1 in Engineering Service Outsourcing by the Blac...
QuEST Global ranked World No.1 in Engineering Service Outsourcing by the Blac...
xmeteorite
 
Press Release: Intent-Driven Enterprise Marketing Automation 2.0 Solution Lau...
Press Release: Intent-Driven Enterprise Marketing Automation 2.0 Solution Lau...Press Release: Intent-Driven Enterprise Marketing Automation 2.0 Solution Lau...
Press Release: Intent-Driven Enterprise Marketing Automation 2.0 Solution Lau...
xmeteorite
 
Big Blue sued for preventing mainframe customers from saving millions of dollars
Big Blue sued for preventing mainframe customers from saving millions of dollarsBig Blue sued for preventing mainframe customers from saving millions of dollars
Big Blue sued for preventing mainframe customers from saving millions of dollars
xmeteorite
 
Supercharge Your Savings and Mainframe Performance
Supercharge Your Savings and Mainframe PerformanceSupercharge Your Savings and Mainframe Performance
Supercharge Your Savings and Mainframe Performance
xmeteorite
 

More from xmeteorite (20)

Launch: Silicon Valley 2013
Launch: Silicon Valley 2013Launch: Silicon Valley 2013
Launch: Silicon Valley 2013
 
Launch: Silicon Valley 2013, High-Value, High -Visibility Product Launch Even...
Launch: Silicon Valley 2013, High-Value, High -Visibility Product Launch Even...Launch: Silicon Valley 2013, High-Value, High -Visibility Product Launch Even...
Launch: Silicon Valley 2013, High-Value, High -Visibility Product Launch Even...
 
Launch: Silicon Valley 2013
Launch: Silicon Valley 2013Launch: Silicon Valley 2013
Launch: Silicon Valley 2013
 
Launch: Silicon Valley 2012
Launch: Silicon Valley 2012Launch: Silicon Valley 2012
Launch: Silicon Valley 2012
 
A video: Innovation in the Cloud
A video: Innovation in the CloudA video: Innovation in the Cloud
A video: Innovation in the Cloud
 
Innovation in the Cloud
Innovation in the CloudInnovation in the Cloud
Innovation in the Cloud
 
Disaster Recovery, Local Operational Recovery, and High Availability
Disaster Recovery, Local Operational Recovery, and High AvailabilityDisaster Recovery, Local Operational Recovery, and High Availability
Disaster Recovery, Local Operational Recovery, and High Availability
 
The Economics of Parallel System Design in Commercial-Scale Solar Plants
The Economics of Parallel System Design in Commercial-Scale Solar PlantsThe Economics of Parallel System Design in Commercial-Scale Solar Plants
The Economics of Parallel System Design in Commercial-Scale Solar Plants
 
Disaster Recovery Coupled with High Exchange Availability
Disaster Recovery Coupled with High Exchange AvailabilityDisaster Recovery Coupled with High Exchange Availability
Disaster Recovery Coupled with High Exchange Availability
 
A Cost-Effective Integrated Solution for Backup and Disaster Recovery
A Cost-Effective Integrated Solution for Backup and Disaster RecoveryA Cost-Effective Integrated Solution for Backup and Disaster Recovery
A Cost-Effective Integrated Solution for Backup and Disaster Recovery
 
eIQ Datasheet - 350-WATT DC-TO-DC Converter Module
eIQ Datasheet - 350-WATT DC-TO-DC Converter ModuleeIQ Datasheet - 350-WATT DC-TO-DC Converter Module
eIQ Datasheet - 350-WATT DC-TO-DC Converter Module
 
Installation and operations_manual
Installation and operations_manualInstallation and operations_manual
Installation and operations_manual
 
eIQ Datasheet - 250-WATT DC-TO-DC Converter Module
eIQ Datasheet - 250-WATT DC-TO-DC Converter ModuleeIQ Datasheet - 250-WATT DC-TO-DC Converter Module
eIQ Datasheet - 250-WATT DC-TO-DC Converter Module
 
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCSecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRC
 
SecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaSSecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaS
 
SecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaSSecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaS
 
QuEST Global ranked World No.1 in Engineering Service Outsourcing by the Blac...
QuEST Global ranked World No.1 in Engineering Service Outsourcing by the Blac...QuEST Global ranked World No.1 in Engineering Service Outsourcing by the Blac...
QuEST Global ranked World No.1 in Engineering Service Outsourcing by the Blac...
 
Press Release: Intent-Driven Enterprise Marketing Automation 2.0 Solution Lau...
Press Release: Intent-Driven Enterprise Marketing Automation 2.0 Solution Lau...Press Release: Intent-Driven Enterprise Marketing Automation 2.0 Solution Lau...
Press Release: Intent-Driven Enterprise Marketing Automation 2.0 Solution Lau...
 
Big Blue sued for preventing mainframe customers from saving millions of dollars
Big Blue sued for preventing mainframe customers from saving millions of dollarsBig Blue sued for preventing mainframe customers from saving millions of dollars
Big Blue sued for preventing mainframe customers from saving millions of dollars
 
Supercharge Your Savings and Mainframe Performance
Supercharge Your Savings and Mainframe PerformanceSupercharge Your Savings and Mainframe Performance
Supercharge Your Savings and Mainframe Performance
 

Recently uploaded

zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 

Recently uploaded (20)

zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 

Retire Your Legacy Applications & Reduce Costs

  • 2.
  • 3. “ On average 10% of applications in an unoptimized portfolio are candidates for retirement. An additional one-third can require migration or rationalization”. - Jim Duggan, Gartner analyst (Plan Legacy Application Retirements carefully, April 2009) Application Retirement is part of Application Portfolio Management that must be undertaken on a continuing basis since applications often outlive their usefulness. However, one may need to retain and manage legacy data from such applications which are candidates for retirement.
  • 4.