From Clutter to Control - Time to Spring Clean the Applications Portfolio - Slide 5

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next From Clutter to Control - Time to Spring Clean the Applications Portfolio-5 Next

Sometimes you get attached to the items in your closet and it is tough to take an independent view of the value of everything. In those cases, it is best to work with a professional organizer to help you with the inventory and assessing process.

It is also wise to enlist the support of an applications expert to help make decisions based on the business and cost value of your applications, thus removing some of the human element behind the decisions. Some experts will also use software to help with this analysis to drive even higher sets of standards.

But remember, not all applications are created equal. You will also need the business case and identification of investment options to fund the cleanup

The biggest single business issue that many IT organizations wrestle with is trying to contain the size of the applications portfolio they are asked to manage. Many organizations simply fail to take a hard look at which applications can be retired and, as a result, the cost of the IT infrastructure needed to support all those applications spirals out of control. Here are some tips from Hewlett-Packard about how to rationally clean up the applications portfolio.

More Slideshows:


Five Tips for Securing Sensitive Customer Data Data tokenization combined with corporate security office best practices may have prevented the world's largest email breach.

What to Look for in a Videoconferencing System Key features to consider before purchasing a videoconferencing system.


Six Unified Communications Application Benefits Unified communications users experience a multitude of benefits – both in terms of employee time savings as well as direct financial savings.

 

Related Topics : LG

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.