Legacy Systems – How to Eat an Elephant

Neil HartleyApplication ModernizationLeave a Comment

Legacy Systems - How to Eat an Elephant

And so it continues. Those old legacy systems continue to eat 75-80% of IT budgets and prevent the business achieving its goals. Applications written in a language long forgotten, running on outdated hardware adding cost and convenient security loopholes for Hackers, Inc., continue to soak up resource and provide a formidable barrier to success. But do they? Really? If you … Read More

Modernizing the Holiday Shopping Season

Neil HartleyApplication ModernizationLeave a Comment

Holiday Shopping Season

As we discussed in recent blog posts, the cyber retail industry has come a long way since its inception. Advances in technology are taking customers from traditional brick-and-mortar locations to a combination of online and physical storefronts, or in some cases, online-only experiences. These technological advances supply consumers with more choices, flexibility and better service than ever before. As customers … Read More

Retail Giant Takes Legacy Modernization Steps

Neil HartleyApplication ModernizationLeave a Comment

Target Legacy Modernization

There has never been a better time to be a consumer. Developments in the cyber-shopping industry have afforded consumers more choices, flexibility and better service than ever before. As a result, retailers are being forced to expand their e-commerce offerings in order to keep up with the demands of the new cyber-savvy customer. As retailers work to make the overall … Read More

Catch a Brand by the (Re)tail – Legacy Systems and Retailers

Neil HartleyApplication ModernizationLeave a Comment

retailers need to upgrade legacy systems

The internet has come a long way since the first web site went live in 1990. As the the online world evolved, the cyber-shopping industry gradually developed as well, bringing consumers from traditional brick-and-mortar stores to a combination of online and physical storefronts, or in Amazon’s case, an online-only experience. Consumers are continuing to change their purchasing habits as more … Read More

Still Running Legacy Systems? Don’t Join This List!

Neil HartleyApplication ModernizationLeave a Comment

Updating legacy systems will reduce cybercrime

As technology allows us to do more online, it also leaves us vulnerable to cyberattacks. The internet has evolved since its inception and understanding and monitoring cybercrime as it progresses is critical for every organization’s security. Institutions across all industries are affected by this problem — especially those who have some sort of personal, financial or medical data on their … Read More

Retailers and Legacy Technology

Neil HartleyApplication ModernizationLeave a Comment

Reatil Sector Legacy Systems

Shopping has changed in the last decade, moving from brick-and-mortar stores with traditional cash registers to online stores, fulfillment centers and countless new payment methods like Square. Consumers are changing the way they shop, and retailers have had to account for that by evolving their sales models to be accessible online, in-store, through mobile devices and more. According to the … Read More

Have We Become Complacent With Security Risks?

Neil HartleyApplication ModernizationLeave a Comment

Carphone Warehouse

Of course, most of the world’s businesses are aware of the fact that a security breach could be detrimental to their business. But why is it that the “outdated software turns into nightmare for customers” headline continues to appear almost daily? At this point, almost every American has been affected by at least one data breach this year. Take Carphone … Read More

The Kids Are Not Alright!

Neil HartleyApplication ModernizationLeave a Comment

We’re all familiar with the major retail security breaches from major retailers like Target and Best Buy, where a lack of updated software systems put millions of customers, and their sensitive personal data, at risk. Just this month, Kiddicare, a children’s wear retailer, encountered a breach that leaked personal details of its customers including names, e-mail and home addresses and … Read More