From Clutter to Control - Time to Spring Clean the Applications Portfolio - Slide 6

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next From Clutter to Control - Time to Spring Clean the Applications Portfolio-6 Next

Now that you have made the hard choices, it is time to clean that closet. Replace missing items from your wardrobe, repair favorites. And, if you are a creative type, sew some new pieces.

With regards to your portfolio, this is the phase where you execute the roadmap you created for your applications. Each application is different and you may take a different approach based upon what is best for that specific application. You might re-host it to a lower-cost, higher-performance platform as an interim solution. You may replace it with a packaged application. You may re-architect it by building a new application but leveraging the business logic in the legacy applications. Or, you might just retire it all together. Each of these strategies is effective and should be a part of your plan.

The biggest single business issue that many IT organizations wrestle with is trying to contain the size of the applications portfolio they are asked to manage. Many organizations simply fail to take a hard look at which applications can be retired and, as a result, the cost of the IT infrastructure needed to support all those applications spirals out of control. Here are some tips from Hewlett-Packard about how to rationally clean up the applications portfolio.

More Slideshows:


Five Tips for Securing Sensitive Customer Data Data tokenization combined with corporate security office best practices may have prevented the world's largest email breach.

What to Look for in a Videoconferencing System Key features to consider before purchasing a videoconferencing system.


Six Unified Communications Application Benefits Unified communications users experience a multitude of benefits – both in terms of employee time savings as well as direct financial savings.

 

Related Topics : LG

 
More Slideshows

bots How Bots Are Going to Work to Increase Efficiency

Businesses are adopting bots to enhance business practices, in everything from procurement to marketing to sales to recruiting. ...  More >>

Remote wipe 10 Steps Your Organization Should Take to Keep Mobile Device Data Secure

In the wake of new reports of serious breaches of mobile devices and data, security professionals share their tips for securing mobile devices and their favorite security solutions. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.