• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Gartner Says Take A Hard Look At App Dev And Maintenance

    April 21, 2014 Timothy Prickett Morgan

    Making the application code and tending that code as systems, conditions, and other code around it all change eats a big part of the IT budget at most companies. And the analysts at Gartner say there is a methodical way to rein those costs in and have the funds available to apply to other projects.

    Perhaps even a decent pay raise. . . .

    Gartner is hosting an application development summit next month, and as is its tradition, it puts some teaser information out there to whet people’s appetite and get them thinking about what they are doing in their own shops. In a nutshell, Gartner says that on average, application development and maintenance eats up 34 percent of the total IT budget and that by getting rid of legacy applications, simplifying complex architectures, and ceasing outdated approaches to IT staffing, companies can cut those application development and maintenance costs in half.

    “Most organizations tend to assume that the cost of ADM can only grow over time due to rising labor costs and the increasing complexity and number of applications,” explains Claudio Da Rold, a vice president and distinguished analyst at Gartner, who tracks application development. “The ADM unit cost can be significantly optimized over time, provided that best practices across the application and sourcing life cycle–strategy, selection, negotiation and management–are followed.”

    The common practice in the industry, says Da Rold, is to think tactically about application development and maintenance, asking a few services companies to step in with programmers to compete on price to do any work the inside programmers can’t or won’t handle.

    The first thing companies need to do is stop winging it. That means doing an application portfolio audit to find out precisely what applications are running in the company, what they are coded in, how they are linked, and how relatively modern that code is, and at what point in their lifecycle they are at. All code should not live forever, and much of it really belongs in the bit bucket.

    Once you know what you have and the relative vintage of the code, you can start grouping applications together and presenting them for replacement or modernization efforts to the CIO, CFO, and CEO.

    Personally, I find it hard to believe that as much as 17 percent of the total IT budget can be saved, but perhaps at large companies with thousands of applications and hundreds of programmers, this is true. I wonder how far this data can scale down into the SMB space where most IBM i shops are. The typical IBM i shop has one, two, or three programmers and in the smallest of shops they are often doing double duty as system administrators and VPDPs or CIOs at their companies. But, that said, getting more organized and methodical about the application portfolio is a good thing, and at the very least it helps the next programmers who come into the company get a handle on what is in all that code that runs the business. As for having multiple sources for programming, sometimes the cost is not as important as the quality of the code, and that has to be a weighing factor as well. IBM i shops have shown that they are willing to pay a premium for a better product when it comes to their systems, and I suspect they take the same attitude–and pride–with their programming, whether it is in-house or outsourced.

    RELATED STORIES

    What’s Your IBM i Application Debt?

    Dropping Soon: IBM’s Big Application Modernization Redbook

    RPG OA: Open Opportunity, Open To Interpretation

    Application Modernization: Destination Success

    What’s Happening In IBM i App Dev?

    DB2 For i Modernization Gets Assist From RPG OA

    Business Strategy Bumps Into Database Deficiency

    Application Modernization Priorities Meet Simple Solutions



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    UCG Technologies

    CYBER-ATTACKS ON THE RISE. PROTECT WITH THE TRIPLE PLAY.

    COVID-19 has not only caused a global pandemic, but has sparked a “cyber pandemic” as well.

    “Cybersecurity experts predict that in 2021, there will be a cyber-attack incident every 11 seconds. This is nearly twice what it was in 2019 (every 19 seconds), and four times the rate five years ago (every 40 seconds in 2016). It is expected that cybercrime will cost the global economy $6.1 trillion annually, making it the third-largest economy in the world, right behind those of the United States and China.”1

    Protecting an organization’s data is not a single-faceted approach, and companies need to do everything they can to both proactively prevent an attempted attack and reactively respond to a successful attack.

    UCG Technologies’ VAULT400 subscription defends IBM i and Intel systems against cyber-attacks through comprehensive protection with the Triple Play Protection – Cloud Backup, DRaaS, & Enterprise Cybersecurity Training.

    Cyber-attacks become more sophisticated every day. The dramatic rise of the remote workforce has accelerated this trend as cyber criminals aggressively target company employees with online social engineering attacks. It is crucial that employees have proper training on what NOT to click on. Cyber threats and social engineering are constantly evolving and UCG’s Enterprise Cybersecurity Training (powered by KnowBe4) is designed to educate employees on the current cutting-edge cyber-attacks and how to reduce and eliminate them.

    A company is only as strong as its weakest link and prevention is just part of the story. Organizations need to have a quick response and actionable plan to implement should their data become compromised. This is the role of cloud backup and disaster-recovery-as-a-service (DRaaS).

    Data is a company’s most valuable asset. UCG’s VAULT400 Cloud Backup provides 256-bit encrypted backups to two (2) remote locations for safe retrieval should a cyber-attack occur. This is a necessary component of any protection strategy. Whether a single click on a malicious link brings down the Windows environment or an infected SQL server feeds the IBM i, once the data is compromised, there is no going back unless you have your data readily available.

    Recovery is not a trivial task, especially when you factor in the time sensitive nature of restoring from an active attack. This leads to the third play of the Triple Play Protection – DRaaS.  Companies have myriad concerns once an attack is realized and a managed service disaster recovery allows employees to keep focus on running the business in a crisis state.

    The combination of training employees with secure backup and disaster recovery offers companies the best chance at avoiding financial disruption in an age of stronger, more frequent cyber-attacks.

    Reach out to UCG Technologies to discuss your company’s security needs and develop a data protection plan that fits you best.

    ucgtechnologies.com/triple-play

     800.211.8798 | info@ucgtechnologies.com

     

    1. https://theconversation.com/cyberattacks-are-on-the-rise-amid-work-from-home-how-to-protect-your-business-151268

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: Elements Of An IBM i Incident Management Plan, Part 2 Avoiding Application Modernization Disasters

    Leave a Reply Cancel reply

Volume 24, Number 14 -- April 21, 2014
THIS ISSUE SPONSORED BY:

ProData Computer Services
HelpSystems
BCD
Essextec
RJS Software Systems

Table of Contents

  • IBM i TR8, Database Driven
  • Power Systems: Look Ahead, Don’t Look Back
  • Java On IBM i 7.1 Brings JVM Migrations
  • Mad Dog 21/21: When Oxford Was Obnoxford
  • IBM Enhances I/O On Power7 And Power7+ Machines
  • IBM Pulls The Plug On Some More Power Iron
  • Maxava And Vision Reach Settlement in Lawsuit
  • SAP Continues To Soar In The First Quarter
  • Gartner Says Take A Hard Look At App Dev And Maintenance
  • IBM Italy Gives Power-To-Pure Migration Rebate

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Doing The Texas Two Step From Power9 To Power10
  • PHP’s Legacy Problem
  • Guru: For IBM i Newcomers, An Access Client Solutions Primer
  • IBM i 7.1 Extended Out To 2024 And Up To The IBM Cloud
  • Some Practical Advice On That HMC-Power9 Impedance Mismatch
  • IBM Extends Dynamic Capacity Pricing Scheme To Its Cloud
  • Here’s What You Should Do About The IBM i Skills Shortage
  • Matillion Founder Recounts Midrange Roots
  • Four Hundred Monitor, February 24
  • IBM i PTF Guide, Volume 23, Number 8

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2021 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.