Legacy systems and current infrastructure, Computer Engineering

Legacy systems and current infrastructure - Information System

This problem is most easily understood using the everyday example of the rail ways where the rail network infrastructure is so large and well established that any new innovation must be used in conjunction with infrastructure that may be over a century old. It is therefore difficult to introduce a new type of train as it has to interface with a track that maybe a century old meaning that the ability to use new technology is limited at conception. The rapidly changing face of technology especially in the area of information systems and the race to install these that has been taking place over the last 40 years results in many cases (especially in larger organisations) in solutions being chosen for their ability to interface and integrate with an older less able systems as the cost of an 'upgrade' or 'bolt-on' is seen as more palatable than a completely new system. 

Hopefully however more recently with the trend towards standardised hardware and custom software; combined with greater vision being displayed by systems designers in terms of modular approaches; together with forwards and backwards compatibility strategies this problem should reduce.

Posted Date: 3/14/2013 5:14:01 AM | Location : United States







Related Discussions:- Legacy systems and current infrastructure, Assignment Help, Ask Question on Legacy systems and current infrastructure, Get Answer, Expert's Help, Legacy systems and current infrastructure Discussions

Write discussion on Legacy systems and current infrastructure
Your posts are moderated
Related Questions
Why is the data bus in most microprocessors bidirectional while the address bus is unidirectional?  Data Bus:  These lines are used to send data to memory by output ports and

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

How to fetch random ID from table by SQL query Select * from Table_Name order by NewID()


Design, write, and implement distributed networked application using Java Design the communication protocol (message format and exchange procedure) that your application will re

1- The Privacy Policy: The vendor must explain to the customer how all his information especially sensitive ones will be totally private, and no one can read them or use them i

ascii code add=2unit,replace=1unit,delete=3unit.convert ascii code in minimum cost

Add +25 to -15 by using 2's complement ? Ans. Firstly convert the numbers 25 and 15 in its 8-bit binary equivalent and determine the 2's complement of 15, after that add +25 to -

What are the basic components of dialog program? Screens (Dynpros) Every dialog in an SAP system is controlled by dynpros. A dynpros having of a screen And its flow log

Q. What is Memory Address Register? Memory Address Register (MAR): It specifies address of memory location from that data or instruction is to be accessed (read operation) or t