Book Image

Working with Legacy Systems

By : Robert Annett
Book Image

Working with Legacy Systems

By: Robert Annett

Overview of this book

The IT industry is constantly evolving with the introduction of new technologies. While it is important to keep up with advancements, maintaining legacy systems is equally necessary to ensure that the infrastructure of your organization functions to the best of its ability. Sound knowledge of techniques that can be used for maintaining legacy systems can help you avoid common pitfalls. The book begins with a quick overview of what a real legacy system looks like, how it works, and common issues that may be faced when trying to maintaining it. You'll then explore the architecture of a legacy system in detail and understand each of its components. As you progress, you'll discover a variety of techniques for analyzing a legacy system and how to apply them. Once you get to grips with the security constraints associated with legacy systems, you'll explore ways to secure them. Finally, you'll be able to easily make changes in legacy systems to enhance their performance. By the end of this book, you’ll have developed the skills and confidence to work with legacy systems and efficiently maintain them.
Table of Contents (7 chapters)

Safely Making Changes


If you are lucky, you work in an environment where it's acceptable to take risks, make changes, and sometimes break things. In my experience, this is rarely the case when dealing with a legacy system. The users are unlikely to be used to change and you need to goodwill with them before any negative impacts.

This section covers how to make changes to your legacy system in a predictable and safe way. Much of this should be useful even if the system is intended to be kept as functionally unmodified as possible.

Please note that the advice here is more applicable to line-of-business applications than others, such as ISV products, embedded systems, and so on. You may still find the discussion useful but I'm not suggesting you virtualize a standalone mobile phone application in this way!

Virtualization Is Your Friend

Making low-impact changes to complex systems used to be a nightmare. You needed a complete physical and logical replica of your system, with expensive duplicates...