8 Steps for Making Legacy Apps "Cloud Ready" - Part 1
April 25, 2018

Scott Rodgers
Monza Cloud

Clearly, moving applications to the cloud delivers significant advantages. Greater agility and scalability are top among them. In fact, according to a survey performed by Right Scale, companies are already running a majority of their workloads in the cloud, with 41% in the public cloud and 38% in a private cloud.

And the adoption of public cloud is growing fast. According to CIO Magazine, public cloud adoption in the enterprise will cross 50 percent for the first time this year.

But, what's standing in the way of full cloud adoption? For many companies it's those burdensome (but critically important) legacy applications. Because legacy applications often have a lack of documentation or even staff resources that understand them, and sometimes simply because they are old, they can be among the most challenging to move to the cloud and be made "cloud ready." However, migrating them may also deliver the greatest value, assuming their migration and cloud-readiness can be made easy.

Moving more workloads to the cloud is a top IT priority. In fact, data shows that moving more workloads to the cloud (51%) is second in priority only to optimizing existing cloud use and cost savings (58%). So, eventually it will be time to consider how to make those critical legacy applications cloud ready. Consider the following eight steps to chart your cloud journey:

1. Assess your application portfolio

It's always best to start at the beginning. In this case, the beginning means taking a comprehensive assessment of your applications to identify:

■ what you may be able to retire

■ what you may want to sunset over time

■ what could be containerized so that it can "tolerate" the cloud

■ what should be enhanced for true cloud optimization

■ what needs to be recoded for cloud operation

Each of these areas should be weighted based on the value of the application to the business along with it's age and available working knowledge of its code base, security and risk mitigation, etc. Evaluate, too, the infrastructure costs for running the application on premises, keeping in mind that the fewer applications you have to leave behind on premises, the more expensive they become individually.

2. Consider cloud costs when charting your migration strategy

Speaking of costs, it can be easy to simply map your path to the cloud without thinking all the expenses through. If you're not careful, and deliberate, the cloud can cost you more, rather than less.

Before moving applications to the cloud, factor in how their processes will adapt to cloud infrastructure. Can you streamline them for greater efficiency? Can you minimize the data retention they require? Just because an application is easy to migrate, it may not be cloud ready. Be sure you understand all its operational characteristics before you make the move.

3. Engage the business in your application decisions

Don't make the common mistake of only considering technology factors when evaluating the applications you'll move to the cloud, and when. You need to engage the business in this decision process.

If you opt to recommend that an application be sunsetted, for example, be sure that you've queried all the business teams that interact with that application. It may serve a vital business purpose you didn't expect that can't be replaced otherwise.

Likewise, if you're moving an application to the cloud, evaluate what more the business may need from that application and what it might take in order to enhance it to meet these needs during the process. Gaining business buy-in for your cloud migration decisions will ensure that your project has the support you need to be successful.

4. Evaluate your tools and options

Containers, microservices, wrappers, service brokers, native translators – where do you start? what's best? complexity? chaos?

There are a great many options when evaluating the tools and techniques to use to optimize legacy applications for the cloud. Choose your options wisely, as each has a cost. Some may deliver a cost savings that is far greater than the tool set. Others may cost more than the efficiency they deliver.

Be sure that you, again, have a full understanding of the value of the application to the business and match your investment in that application directly to its worth. Also consider the long-term benefits of the application to the business. While it may not deliver big bottom-line impact this quarter and next, it may be an application that will live with the business for years, thus needs to be easy to migrate over time to other clouds or infrastructure as cost structures evolve. Important applications shouldn't keep you locked in to a specific cloud or environment. Your business needs to remain agile.

Read 8 Steps for Making Legacy Apps "Cloud Ready" - Part 2

Scott Rodgers is CEO of Monza Cloud

The Latest

August 15, 2018

Microservices are a hot topic in IT circles these days. The idea of a modular approach to system building – where you have numerous, smaller software services that talk to each other instead of monolithic components – has many benefits ...

August 13, 2018

Agile is expanding within the enterprise. Agile adoption is growing within organizations, both more broadly and deeply, according to the 12th annual State of Agile report from CollabNet VersionOne. A higher percentage of respondents this year report that "all or almost all" of their teams are agile, and that agile principles and practices are being adopted at higher levels in the organization ...

August 09, 2018

For the past 13 years, the Ponemon Institute has examined the cost associated with data breaches of less than 100,000 records, finding that the costs have steadily risen over the course of the study. The average cost of a data breach was $3.86 million in the 2018 study, compared to $3.50 million in 2014 – representing nearly 10 percent net increase over the past 5 years of the study ...

August 08, 2018

Hidden costs in data breaches – such as lost business, negative impact on reputation and employee time spent on recovery – are difficult and expensive to manage, according to the 2018 Cost of a Data Breach Study, sponsored by IBM Security and conducted by Ponemon Institute. The study found that the average cost of a data breach globally is $3.86 million ...

August 06, 2018

The previous chapter in this WhiteHat Security series discussed dependencies as the second step of the Twelve-Factor App. This next chapter examines the security component of step three of the Twelve-Factor methodology — storing configurations within the environment.

August 02, 2018

Results from new Forrester Consulting research reveal the 20 most important Agile and DevOps quality metrics that separate DevOps/Agile experts from their less advanced peers ...

July 31, 2018

Even organizations that understand the importance of cybersecurity in theory often stumble when it comes to marrying security initiatives with their development and operations processes. Most businesses agree that everyone should be responsible for security, but this principle is not being upheld on a day-to-day basis in many organizations. That’s bad news for everyone. Here are some best practices for implementing SecOps ...

July 30, 2018

While the technologies, processes, and cultural shifts of DevOps have improved the ability of software teams to deliver reliable work rapidly and effectively, security has not been a focal point in the transformation of cloud IT infrastructure. SecOps is a methodology that seeks to address this by operationalizing and hardening security throughout the software lifecycle ...

July 26, 2018

Organizations are shifting away from traditional, monolithic architectures, with three-quarters of survey respondents delivering at least some of their applications and more than one-third delivering most of their applications as microservices, according to the State of DevOps Observability Report from Scalyr ...

July 24, 2018

What top considerations must companies make to ensure – or at least help improve – Agile at scale? The following are key techniques and practices to help accelerate Agile delivery rollouts and scale Agile and DevOps in the Enterprise ...

Share this