Knowledge (XXG)

Legacy system

Source đź“ť

31: 190: 417:, it is still possible to enhance (or "re-face") them. Most development often goes into adding new interfaces to a legacy system. The most prominent technique is to provide a Web-based interface to a terminal-based mainframe application. This may reduce staff productivity due to slower response times and slower mouse-based operator actions, yet it is often seen as an "upgrade", because the interface style is familiar to unskilled users and is easy for them to use. John McCormick discusses such strategies that involve 1314: 689:. These techniques allow organizations to understand their existing code assets (using discovery tools), provide new user and application interfaces to existing code, improve workflow, contain costs, minimize risk, and enjoy classic qualities of service (near 100% uptime, security, scalability, etc.). 495:
Additionally, the entire Space Shuttle system, including ground and launch vehicle assets, was designed to work together as a closed system. Since the specifications did not change, all of the certified systems and components performed well in the roles for which they were designed. Even before the
388:
Due to the fact that most legacy programmers are entering retirement age and the number of young engineers replacing them is very small, there is an alarming shortage of available workforce. This in turn results in difficulty in maintaining legacy systems, as well as an increase in costs of procuring
216:
While this term may indicate that some engineers may feel that a system is out of date, a legacy system can continue to be used for a variety of reasons. It may simply be that the system still provides for the users' needs. In addition, the decision to keep an old system may be influenced by economic
485:
program used a large amount of 1970s-era technology. Replacement was cost-prohibitive because of the expensive requirement for flight certification. The original hardware completed the expensive integration and certification requirement for flight, but any new equipment would have had to go through
476:
Andreas M. Hein researched the use of legacy systems in space exploration at the Technical University of Munich. According to Hein, legacy systems are attractive for reuse if an organization has the capabilities for verification, validation, testing, and operational history. These capabilities must
380:
Integration with newer systems may also be difficult because new software may use completely different technologies. Integration across technology is quite common in computing, but integration between newer technologies and substantially older ones is not common. There may simply not be sufficient
376:
Legacy systems may have vulnerabilities in older operating systems or applications due to lack of security patches being available or applied. There can also be production configurations that cause security problems. These issues can put the legacy system at risk of being compromised by attackers or
570:
A "legacy" product may be a product that is no longer sold, has lost substantial market share, or is a version of a product that is not current. A legacy product may have some advantage over a modern product making it appealing for customers to keep it around. A product is only truly "obsolete" if
384:
Budgetary constraints often lead corporations to not address the need of replacement or migration of a legacy system. However, companies often don't consider the increasing supportability costs (people, software and hardware, all mentioned above) and do not take into consideration the enormous loss
368:
These systems can be hard to maintain, improve, and expand because there is a general lack of understanding of the system; the staff who were experts on it have retired or forgotten what they knew about it, and staff who entered the field after it became "legacy" never learned about it in the first
542:
Ginny Hendry characterized creation of code as a `challenge` to current coders to create code that is "like other legacies in our lives—like the antiques, heirlooms, and stories that are cherished and lovingly passed down from one generation to the next. What if legacy code was something we took
696:
from the start, to avoid costly and risky rewrites. The most common legacy systems tend to be those which embraced well-known IT architectural principles, with careful planning and strict methodology during implementation. Poorly designed systems often don't last, both because they wear out and
212:
to describe computer systems probably occurred in the 1960s. By the 1980s it was commonly used to refer to existing computer systems to distinguish them from the design and implementation of new systems. Legacy was often heard during a conversion process, for example, when moving data from the
100:, where changes to the runtime environment, or surrounding software or hardware may require maintenance or emulation of some kind to keep working. Legacy code may be present to support legacy hardware, a separate legacy system, or a legacy customer using an old feature or software version. 1025:
Menychtas, Andreas; Konstanteli, Kleopatra; Alonso, Juncal; Orue-Echevarria, Leire; Gorronogoitia, Jesus; Kousiouris, George; Santzaridou, Christina; Bruneliere, Hugo; Pellens, Bram; Stuer, Peter; Strauss, Oliver; Senkova, Tatiana; Varvarigou, Theodora (2014), "Software modernization and
582:. A software product that is capable of performing as though it were a previous version of itself, is said to be "running in legacy mode". This kind of feature is common in operating systems and internet browsers, where many applications depend on these underlying components. 477:
be integrated into various software life cycle phases such as development, implementation, usage, or maintenance. For software systems, the capability to use and maintain the system are crucial. Otherwise the system will become less and less understandable and maintainable.
62:, "of, relating to, or being a previous or outdated computer system", yet still in use. Often referencing a system as "legacy" means that it paved the way for the standards that would follow it. This can also imply that the system is out of date or in need of replacement. 424:
Printing improvements are problematic because legacy software systems often add no formatting instructions, or they use protocols that are not usable in modern PC/Windows printers. A print server can be used to intercept the data and translate it to a more modern code.
486:
that entire process again. This long and detailed process required extensive tests of the new components in their new configurations before a single unit could be used in the Space Shuttle program. Thus any new system that started the certification process becomes a
385:
of capability or business continuity if the legacy system were to fail. Once these considerations are well understood, then based on the proven ROI of a new, more secure, updated technology stack platform is not as costly as the alternative—and the budget is found.
30: 248:
Even if a legacy system is no longer used, it may continue to impact the organization due to its historical role. Historic data may not have been converted into the new system format and may exist within the new system with the use of a customized
450:
The change being undertaken in some organizations is to switch to automated business process (ABP) software which generates complete systems. These systems can then interface to the organizations' legacy systems and use them as
336:" security vulnerabilities and leaves end users dependent on the good faith and honesty of the vendor providing the updates. This problem is especially acute when these secondary functions of a newer system cannot be disabled. 317:
The way that the system works is not well understood. Such a situation can occur when the designers of the system have left the organization, and the system has either not been fully documented or documentation has been
480:
According to Hein, verification, validation, testing, and operational history increases the confidence in a system's reliability and quality. However, accumulating this history is often expensive. NASA's now retired
455:. This approach can provide a number of significant benefits: the users are insulated from the inefficiencies of their legacy systems, and the changes can be incorporated quickly and easily in the ABP software. 265:
can be significant. A legacy system may include procedures or terminology which are no longer relevant in the current context, and may hinder or confuse understanding of the methods or technologies used.
606:
technology is a recent innovation allowing legacy systems to continue to operate on modern hardware by running older operating systems and browsers on a software system that emulates legacy hardware.
496:
Shuttle was scheduled to be retired in 2010, NASA found it advantageous to keep using many pieces of 1970s technology rather than to upgrade those systems and recertify the new components.
84:
and patterns that are no longer considered modern, increasing the mental burden and ramp-up time for software engineers who work on the codebase. Legacy code may have zero or insufficient
697:
because their inherent faults invite replacement. Thus, many organizations are rediscovering the value of both their legacy systems and the theoretical underpinnings of those systems.
563:
with "legacy support" can detect and use older hardware. The term may also be used to refer to a business function; e.g. a software or hardware vendor that is supporting, or providing
290:, so it cannot be taken out of service, and the cost of designing a new system with a similar availability level is high. Examples include systems to handle customers' accounts in 681:
The IT industry is responding with "legacy modernization" and "legacy transformation": refurbishing existing business logic with new user interfaces, sometimes using
373:
airline company fired its CEO in 2004 due to the failure of an antiquated legacy crew scheduling system that ran into a limitation not known to anyone in the company.
381:
demand for integration technology to be developed. Some of this "glue" code is occasionally developed by vendors and enthusiasts of particular legacy technologies.
646:
There is an alternate favorable opinion—growing since the end of the Dotcom bubble in 1999—that legacy systems are simply computer systems in working use:
392:
Some legacy systems have a hard limit on their total capacity which may not be enough for today's needs, for example the 4 GB memory limit on many older
283:
Retraining on a new system would be costly in lost time and money, compared to the anticipated appreciable benefits of replacing it (which may be zero).
189: 670:
is about five times that of reuse, even discounting the risk of system failures and security breaches. Ideally, businesses would never have to
418: 883: 516:. Eli Lopian, CEO of Typemock, has defined it as "code that developers are afraid to change". Michael Feathers introduced a definition of 357:, the cost of maintaining the system may eventually outweigh the cost of replacing both the software and hardware unless some form of 1135: 929: 825: 903: 692:
This trend also invites reflection on what makes legacy systems so durable. Technologists are relearning the importance of sound
1169: 888: 508:
prefer to describe "legacy code" without the connotation of being obsolete. Among the most prevalent neutral conceptions are
1344: 1149: 295: 1249: 1233: 324:
Newer systems perform undesirable (especially for individual or non-institutional users) secondary functions such as
559:
is often used in conjunction with legacy systems. The term may refer to a feature of modern software. For example,
1190: 1318: 1299: 1209: 951: 1339: 1094:, 6th International Systems & Concurrent Engineering for Space Applications Conference 2014, ESA, p. 3 620:
from the construction industry, where previously developed land (often polluted and abandoned) is described as
458: 198: 1288: 72:
that is no longer supported on standard hardware and environments, and is a codebase that is in some respect
1334: 397: 345:
Legacy systems are considered to be potentially problematic by some software engineers for several reasons.
436:
Biometric security measures are difficult to implement on legacy systems. A workable solution is to use a
1266:
Bisbal, J.; Lawless, D.; Wu, B.; Grimson, J. (1999). "Legacy Information Systems: Issues and Directions".
707: 579: 452: 414: 370: 362: 230: 637:
is an upgrade or addition to an existing software or network architecture that retains legacy components.
693: 671: 600:
are more difficult to place into legacy mode as they include many components making up a single system.
597: 532: 262: 258: 81: 524:, which reflects the perspective of legacy code being difficult to work with in part due to a lack of 433:
documents may be created in the legacy application and then interpreted at a PC before being printed.
1239: 757: 752: 564: 505: 333: 218: 115: 59: 1060:, 6th International Systems & Concurrent Engineering for Space Applications Conference 2014, ESA 1001: 465: 461: 307: 299: 108: 586: 528: 242: 238: 174: 135: 123: 77: 39: 589:
era saw many applications running in legacy mode. In the modern business computing environment,
1131: 831: 821: 572: 525: 354: 277: 226: 447:
to sit between users and the mainframe to implement secure access to the legacy application.
1275: 1035: 772: 767: 762: 727: 560: 426: 250: 201: 76:
or supporting something obsolete. Legacy code may be written in programming languages, use
732: 682: 659: 615: 603: 150: 112: 55: 1074:
Heritage Technologies in Space Programs - Assessment Methodology and Statistical Analysis
930:"Comair's Christmas Disaster: Bound To Fail - CIO.com - Business Technology Leadership" 747: 737: 717: 667: 254: 222: 1259: 820:. Upper Saddle River, NJ: Prentice Hall Professional Technical Reference. p. 15. 276:
The costs of redesigning or replacing the system are prohibitive because it is large,
1328: 1072: 482: 887: prior to 1 November 2008 and incorporated under the "relicensing" terms of the 321:
The user expects that the system can easily be replaced when this becomes necessary.
793: 712: 444: 287: 97: 93: 85: 17: 1106: 742: 722: 686: 651: 269:
Organizations can have compelling reasons for keeping a legacy system, such as:
234: 170: 166: 146: 89: 69: 654:" often differs from its suggested alternative by actually working and scaling. 631:
is a type of software or network architecture that incorporates legacy systems.
1077:, PhD thesis Faculty of Mechanical Engineering, Technical University of Munich 430: 303: 194: 131: 104: 835: 1040: 47: 38:
was still used in some enterprises to run legacy applications, such as this
1313: 815: 575:—if no person making a rational decision would choose to acquire it new. 488: 413:
Where it is impossible to replace legacy systems through the practice of
358: 350: 73: 850: 107:
code that no longer runs on a later version of a system, or requires a
1279: 1026:
cloudification using the ARTIST migration methodology and framework",
955: 594: 590: 437: 178: 35: 468:
approaches can be also used for the improvement of legacy software.
1089: 1055: 878: 103:
While the term usually refers to source code, it can also apply to
976: 188: 127: 119: 29: 273:
The system works well, and the owner sees no reason to change it.
1236:
SECESA 2014, 08-10 October 2014, University of Stuttgart Germany
1191:"Cost Considerations For A Mainframe to Cloud Migration Project" 441: 401: 311: 291: 162: 1234:
A.M. Hein, How to Assess Heritage Systems in the Early Phases?
393: 369:
place. This can be worsened by lack or loss of documentation.
904:"Legacy systems continue to have a place in the enterprise" 514:
source code inherited from an older version of the software
149:
like PS/2 and VGA ports, and CPUs with older, incompatible
310:, military defense installations, and systems such as the 229:, or a variety of other reasons other than functionality. 233:(such as the ability of newer systems to handle legacy 27:
Old computing technology or system that remains in use
492:
legacy system by the time it is approved for flight.
1210:"A Survey of Legacy System Modernization Approaches" 1170:"Definition of greenfield and brownfield deployment" 578:
The term "legacy mode" often refers specifically to
1091:
How to Assess Heritage Systems in the Early Phases?
1057:
How to Assess Heritage Systems in the Early Phases?
193:Although it has been unsupported since April 2014, 328:) tracking and reporting of user activity and/or 153:(with e.g. newer operating systems). Examples in 666:IT analysts estimate that the cost of replacing 648: 877:This article is based on material taken from 8: 1250:"Comair's Christmas Disaster: Bound To Fail" 1172:. Searchunifiedcommunications.techtarget.com 197:has endured continued use in fields such as 1028:Scalable Computing: Practice and Experience 365:allows the software to run on new hardware. 1039: 111:to do so. An example would be a classic 867:(for example, see Bisbal et al., 1999). 785: 510:source code inherited from someone else 409:Improvements on legacy software systems 1208:Comella-Dorda, Santiago (2000-04-01). 1289:"Legacy Systems: Why History Matters" 1260:"The Failure of the Digital Computer" 1240:"Tips and Tricks for Legacy Hardware" 977:"Benefits of Mainframe Modernization" 173:, and text files encoded with legacy 7: 1128:Working Effectively with Legacy Code 884:Free On-line Dictionary of Computing 817:Working effectively with legacy code 96:. Long-lived code is susceptible to 954:. Mousesecurity.com. Archived from 685:and service-enabled access through 614:Programmers have borrowed the term 332:) automatic updating that creates " 1150:"Take Pride in Your Legacy (Code)" 341:Problems posed by legacy computing 286:The system requires near-constant 92:dangerous and likely to introduce 25: 660:Bjarne Stroustrup, creator of C++ 213:legacy system to a new database. 1312: 257:. In either case, the effect on 1302:by Steve R. Smith, May 3, 2011. 928:Stephanie Overby (2005-05-01). 118:which will not run natively on 80:and external libraries, or use 42:food service management system. 1300:"The Danger of Legacy Systems" 1000:McCormick, John (2000-06-02). 952:"The Danger of Legacy Systems" 54:is an old method, technology, 1: 814:Feathers, Michael C. (2005). 296:computer reservations systems 245:often include in their work. 225:, the inherent challenges of 1148:Ginny Hendry (11 Jul 2014). 1105:Lopian, Eli (May 15, 2018). 678:is a perennial requirement. 547:Additional uses of the term 500:Perspectives on legacy code 1361: 1293:Enterprise Systems Journal 1002:"Mainframe-web middleware" 674:most core business logic: 208:The first use of the term 950:Razermouse (2011-05-03). 253:, or may exist only in a 1287:Jim McGee (2005-11-10). 902:Lamb, John (June 2008). 389:experienced programmers. 353:runs on only antiquated 1244:Control Design Magazine 1041:10.12694/scpe.v15i2.980 891:, version 1.3 or later. 629:Brownfield architecture 610:Brownfield architecture 398:4 billion address limit 377:knowledgeable insiders. 302:, energy distribution ( 130:application running on 1107:"Defining Legacy Code" 708:Application retirement 664: 580:backward compatibility 573:an advantage to nobody 567:, for older products. 533:characterization tests 427:Rich Text Format (RTF) 415:application retirement 363:backward compatibility 231:Backward compatibility 205: 122:, but runs inside the 43: 1252:by Stephanie Overby, 635:Brownfield deployment 263:operational reporting 259:business intelligence 192: 33: 1345:Technological change 1321:at Wikimedia Commons 1262:by Adam N. Rosenberg 1242:by Danny Budzinski, 758:Software brittleness 753:Software archaeology 565:software maintenance 506:software engineering 308:nuclear power plants 219:return on investment 1217:SEI Digital Library 466:forward engineering 300:air traffic control 243:software developers 239:character encodings 175:character encodings 159:legacy file formats 124:Classic environment 109:compatibility layer 60:application program 18:Legacy applications 1126:Michael Feathers' 1088:A.M. Hein (2014), 1071:A.M. Hein (2016), 1054:A.M. Hein (2014), 587:computer mainframe 531:. He also defined 522:code without tests 206: 136:Windows on Windows 44: 1317:Media related to 1280:10.1109/52.795108 981:Modernization Hub 958:on March 23, 2012 794:"Merriam-Webster" 561:Operating systems 535:to start putting 453:data repositories 280:, and/or complex. 241:) is a goal that 227:change management 16:(Redirected from 1352: 1316: 1296: 1283: 1221: 1220: 1214: 1205: 1199: 1198: 1187: 1181: 1180: 1178: 1177: 1166: 1160: 1159: 1157: 1156: 1145: 1139: 1124: 1118: 1117: 1115: 1113: 1102: 1096: 1095: 1085: 1079: 1078: 1068: 1062: 1061: 1051: 1045: 1044: 1043: 1022: 1016: 1015: 1013: 1012: 997: 991: 990: 988: 987: 973: 967: 966: 964: 963: 947: 941: 940: 938: 937: 925: 919: 918: 916: 914: 899: 893: 892: 874: 868: 865: 859: 858: 846: 840: 839: 811: 805: 804: 802: 800: 790: 773:Vintage computer 768:Stovepipe system 763:Software entropy 728:Digital dark age 676:debits = credits 662: 642:Alternative view 529:regression tests 251:schema crosswalk 217:reasons such as 202:operating system 151:instruction sets 68:is old computer 21: 1360: 1359: 1355: 1354: 1353: 1351: 1350: 1349: 1340:Legacy hardware 1325: 1324: 1309: 1286: 1265: 1230: 1228:Further reading 1225: 1224: 1212: 1207: 1206: 1202: 1195:Kumaran Systems 1189: 1188: 1184: 1175: 1173: 1168: 1167: 1163: 1154: 1152: 1147: 1146: 1142: 1125: 1121: 1111: 1109: 1104: 1103: 1099: 1087: 1086: 1082: 1070: 1069: 1065: 1053: 1052: 1048: 1024: 1023: 1019: 1010: 1008: 999: 998: 994: 985: 983: 975: 974: 970: 961: 959: 949: 948: 944: 935: 933: 927: 926: 922: 912: 910: 908:Computer Weekly 901: 900: 896: 876: 875: 871: 866: 862: 851:"Legacy System" 848: 847: 843: 828: 813: 812: 808: 798: 796: 792: 791: 787: 782: 777: 733:Legacy encoding 703: 683:screen scraping 663: 658: 644: 612: 553: 502: 474: 411: 343: 187: 155:legacy software 143:legacy hardware 138:feature in XP. 86:automated tests 56:computer system 28: 23: 22: 15: 12: 11: 5: 1358: 1356: 1348: 1347: 1342: 1337: 1335:Legacy systems 1327: 1326: 1323: 1322: 1319:Legacy systems 1308: 1307:External links 1305: 1304: 1303: 1297: 1284: 1274:(5): 103–111. 1263: 1257: 1247: 1246:, January 2011 1237: 1229: 1226: 1223: 1222: 1200: 1182: 1161: 1140: 1119: 1097: 1080: 1063: 1046: 1017: 992: 968: 942: 920: 894: 869: 860: 849:Tawde, Swati. 841: 826: 806: 784: 783: 781: 778: 776: 775: 770: 765: 760: 755: 750: 748:Retrocomputing 745: 740: 738:Legacy-free PC 735: 730: 725: 720: 718:Data migration 715: 710: 704: 702: 699: 668:business logic 656: 643: 640: 639: 638: 632: 611: 608: 604:Virtualization 557:legacy support 552: 545: 501: 498: 473: 470: 410: 407: 406: 405: 390: 386: 382: 378: 374: 366: 342: 339: 338: 337: 322: 319: 315: 284: 281: 274: 255:data warehouse 223:vendor lock-in 221:challenges or 186: 183: 141:An example of 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 1357: 1346: 1343: 1341: 1338: 1336: 1333: 1332: 1330: 1320: 1315: 1311: 1310: 1306: 1301: 1298: 1294: 1290: 1285: 1281: 1277: 1273: 1269: 1268:IEEE Software 1264: 1261: 1258: 1256:, May 1, 2005 1255: 1251: 1248: 1245: 1241: 1238: 1235: 1232: 1231: 1227: 1218: 1211: 1204: 1201: 1196: 1192: 1186: 1183: 1171: 1165: 1162: 1151: 1144: 1141: 1137: 1136:0-13-117705-2 1133: 1129: 1123: 1120: 1108: 1101: 1098: 1093: 1092: 1084: 1081: 1076: 1075: 1067: 1064: 1059: 1058: 1050: 1047: 1042: 1037: 1033: 1029: 1021: 1018: 1007: 1003: 996: 993: 982: 978: 972: 969: 957: 953: 946: 943: 931: 924: 921: 909: 905: 898: 895: 890: 886: 885: 880: 879:Legacy+system 873: 870: 864: 861: 856: 852: 845: 842: 837: 833: 829: 827:0-13-293174-5 823: 819: 818: 810: 807: 795: 789: 786: 779: 774: 771: 769: 766: 764: 761: 759: 756: 754: 751: 749: 746: 744: 741: 739: 736: 734: 731: 729: 726: 724: 721: 719: 716: 714: 711: 709: 706: 705: 700: 698: 695: 690: 688: 684: 679: 677: 673: 669: 661: 655: 653: 647: 641: 636: 633: 630: 627: 626: 625: 623: 619: 618: 609: 607: 605: 601: 599: 598:architectures 596: 592: 588: 583: 581: 576: 574: 568: 566: 562: 558: 550: 546: 544: 540: 538: 534: 530: 527: 523: 519: 515: 511: 507: 499: 497: 493: 491: 490: 484: 483:Space Shuttle 478: 471: 469: 467: 463: 460: 456: 454: 448: 446: 443: 439: 434: 432: 428: 422: 420: 416: 408: 403: 399: 396:CPUs, or the 395: 391: 387: 383: 379: 375: 372: 367: 364: 360: 356: 352: 348: 347: 346: 340: 335: 331: 327: 323: 320: 316: 313: 309: 305: 301: 297: 293: 289: 285: 282: 279: 275: 272: 271: 270: 267: 264: 260: 256: 252: 246: 244: 240: 236: 232: 228: 224: 220: 214: 211: 203: 200: 196: 191: 184: 182: 180: 176: 172: 168: 164: 160: 156: 152: 148: 144: 139: 137: 133: 129: 125: 121: 117: 114: 110: 106: 101: 99: 95: 91: 87: 83: 79: 75: 71: 67: 63: 61: 57: 53: 52:legacy system 49: 41: 37: 32: 19: 1292: 1271: 1267: 1254:CIO Magazine 1253: 1243: 1216: 1203: 1194: 1185: 1174:. Retrieved 1164: 1153:. Retrieved 1143: 1127: 1122: 1110:. Retrieved 1100: 1090: 1083: 1073: 1066: 1056: 1049: 1031: 1027: 1020: 1009:. Retrieved 1005: 995: 984:. Retrieved 980: 971: 960:. Retrieved 956:the original 945: 934:. Retrieved 923: 911:. Retrieved 907: 897: 882: 872: 863: 854: 844: 816: 809: 797:. Retrieved 788: 713:Software rot 694:architecture 691: 687:web services 680: 675: 665: 649: 645: 634: 628: 621: 616: 613: 602: 584: 577: 569: 556: 554: 551:in computing 548: 543:pride in?". 541: 539:under test. 536: 521: 517: 513: 509: 504:Some in the 503: 494: 487: 479: 475: 472:NASA example 459:Model-driven 457: 449: 445:proxy server 435: 423: 412: 344: 329: 325: 288:availability 268: 247: 235:file formats 215: 209: 207: 169:or .123 for 158: 154: 147:legacy ports 142: 140: 102: 98:software rot 82:architecture 65: 64: 51: 45: 743:Legacy port 723:Deprecation 652:Legacy code 537:legacy code 518:legacy code 304:power grids 171:Lotus 1-2-3 167:Adobe Flash 116:application 90:refactoring 70:source code 66:Legacy code 1329:Categories 1176:2012-04-29 1155:2021-10-07 1011:2012-04-29 986:2017-08-23 962:2012-04-29 936:2012-04-29 913:27 October 780:References 622:brownfield 617:brownfield 431:PostScript 419:middleware 349:If legacy 278:monolithic 195:Windows XP 134:using the 132:Windows XP 105:executable 78:frameworks 932:. CIO.com 836:660166658 555:The term 526:automated 359:emulation 334:back-door 314:database. 204:software. 113:Macintosh 88:, making 48:computing 34:In 2011, 1112:June 10, 799:June 22, 701:See also 657:—  489:de facto 355:hardware 351:software 185:Overview 157:include 74:obsolete 1006:Gcn.com 881:at the 672:rewrite 571:it has 462:reverse 126:, or a 40:US Navy 1134:  855:educba 834:  824:  595:3-tier 591:n-tier 549:Legacy 438:Telnet 371:Comair 210:legacy 179:EBCDIC 36:MS-DOS 1213:(PDF) 1034:(2), 593:, or 318:lost. 292:banks 177:like 161:like 128:Win16 120:macOS 58:, or 1132:ISBN 1114:2019 915:2014 889:GFDL 832:OCLC 822:ISBN 801:2013 585:The 512:and 464:and 442:HTTP 402:IPv4 312:TOPS 261:and 237:and 165:for 163:.swf 145:are 94:bugs 50:, a 1276:doi 1036:doi 520:as 440:or 429:or 400:in 394:x86 361:or 306:), 199:ATM 46:In 1331:: 1291:. 1272:16 1270:. 1215:. 1193:. 1032:15 1030:, 1004:. 979:. 906:. 853:. 830:. 624:. 421:. 298:, 294:, 181:. 1295:. 1282:. 1278:: 1219:. 1197:. 1179:. 1158:. 1138:) 1130:( 1116:. 1038:: 1014:. 989:. 965:. 939:. 917:. 857:. 838:. 803:. 650:" 404:. 330:b 326:a 20:)

Index

Legacy applications

MS-DOS
US Navy
computing
computer system
application program
source code
obsolete
frameworks
architecture
automated tests
refactoring
bugs
software rot
executable
compatibility layer
Macintosh
application
macOS
Classic environment
Win16
Windows XP
Windows on Windows
legacy ports
instruction sets
.swf
Adobe Flash
Lotus 1-2-3
character encodings

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑