09:16 AM
Jeff Loughridge
Jeff Loughridge
Repost This

The IT Law of Holes: Stop Digging and Start the Technology Migration

Eventually, you'll need to retire the legacy systems and make that technology migration. Embrace the Law of Holes and learn how to set your cap-and-grow strategy.

IT leaders make investment decisions based on which technologies are positioned to support the business. They're faced with decreasing per-unit capex/opex costs and increasing requirements for bandwidth and computing resources. Older technologies yield to newer versions that are faster, more flexible and easier to use. But how do you know when it's time for a technology migration?

This may sound familiar: Your business relies on a 15-year-old networking technology. A newer version or a functional replacement has been available for five years. The older version is beginning to show its age in its ability to meet technology and business requirements. You find yourself in a situation in which:

  1. Engineers who understand the technology are more difficult to find, and thus more expensive.
  2. Support costs are rising as the vendor focuses on newer technologies.
  3. Network hardware is approaching end-of-life status.
  4. The technology barely meets today's performance/throughput requirements.
  5. Internal support costs are rising.

I've worked with clients who see that the legacy networking technology should be ushered out. While they may recognize the problem, the dollars required to fund a transition effort are removed from the budget year after year. Why? The pain may not yet be acute, and other items in the budget may appear much more pressing. However, the delay means that once the migration does take place, it will be more costly and complex.

These companies may not have internal staff members who can make the case for migrating from older technology. The complexity of the technology migration effort may be so daunting that no one is willing to risk his upward mobility to advocate it, lest it exceed the budget and miss the targeted completion date.

In many cases, my advice to clients follows a networking law that I call the Law of Holes: When you're in a hole, stop digging. Sounds simple, right?

My law is based on a cap-and-grow strategy: Cap your spending on the old technology. Invest in the technology that represents the future. When an abrupt stop in spending isn't possible, severely restrict it, preferably backed by a mandate that any spending on the legacy technology must be approved by the CIO. This signals to the organization that leadership stands behind the technology migration effort and sees its success as crucial.

Next: The Cap-and-Grow Philosophy

1 of 2
Comment  | 
Print  | 
More Insights
More Blogs from Commentary
SDN: Waiting For The Trickle-Down Effect
Like server virtualization and 10 Gigabit Ethernet, SDN will eventually become a technology that small and midsized enterprises can use. But it's going to require some new packaging.
IT Certification Exam Success In 4 Steps
There are no shortcuts to obtaining passing scores, but focusing on key fundamentals of proper study and preparation will help you master the art of certification.
VMware's VSAN Benchmarks: Under The Hood
VMware touted flashy numbers in recently published performance benchmarks, but a closer examination of its VSAN testing shows why customers shouldn't expect the same results with their real-world applications.
Building an Information Security Policy Part 4: Addresses and Identifiers
Proper traffic identification through techniques such as IP addressing and VLANs are the foundation of a secure network.
SDN Strategies Part 4: Big Switch, Avaya, IBM,VMware
This series on SDN products concludes with a look at Big Switch's updated SDN strategy, VMware NSX, IBM's hybrid approach, and Avaya's focus on virtual network services.
Hot Topics
Converged Infrastructure: 3 Considerations
Bill Kleyman, National Director of Strategy & Innovation, MTM Technologies,  4/16/2014
Heartbleed's Network Effect
Kelly Jackson Higgins, Senior Editor, Dark Reading,  4/16/2014
White Papers
Register for Network Computing Newsletters
Current Issue
Twitter Feed