• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
the it pro podcast: uprooting legacy tech

The IT Pro Podcast: Uprooting legacy tech

You are here: Home / General Cyber Security News / The IT Pro Podcast: Uprooting legacy tech
February 10, 2023

Old technology stacks can be found throughout the sector, especially in firms that have been about for more than a few several years. While most corporations have gone through electronic transformation of some type, shedding legacy tech is no straightforward position and can direct men and women to acquire the path of least resistance, utilizing a mix of aged and new tech across their IT estate.

This can direct to large issues down the line. A latest instance is the outage that led to thousands of flights getting cancelled and delayed throughout the United States, which the Federal Aviation Administration (FAA) blamed on accidental file deletion even though updating a databases. The authority is intensely-reliant on old units, and has reported it will consider right up until 2029 to section them out.

In this episode, Jane and Rory speak to Ravi Mayuram, SVP of engineering and CTO at cloud databases system Couchbase, to discuss the worries offered by legacy infrastructure, and why enterprises require to acquire the prospect to improve just before troubles turn out to be entrenched.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Highlights

“Those methods were being not constructed for this, they could just take a downtime of a night. These days it is really 5 nines (99.999%) availability, you are not able to have the techniques go down for much more than five seconds in a year.”

“Say you just want to get one particular microservice absent from your legacy monolithic procedure to modernise it, and use other devices which will give you this, I’m utilizing this analogy of a pounds bearing wall. Which you would know in your technique, how you have to sort of take the excess weight off of the 1 that you want to modernise.”

“Now, if you really don’t acquire that obstacle and commence the journey now, you will find by yourself on the improper facet of the digital divide. You may perhaps not cross the chasm and items will move by, or you will be absolutely upended.”

Examine the complete transcript here.

Footnotes

  • Civil servants blame legacy technology for sluggish federal government digital transformation development
  • BT Team extends Kyndryl deal to migrate legacy mainframe apps to the cloud
  • Defra’s legacy program difficulty ‘threatens’ UK gov cyber security right up until 2030
  • Taking care of a blend of legacy and present day IT in the course of digital transformation
  • Government ‘must aim on replacing legacy IT systems’

Subscribe

  • Subscribe to The IT Pro Podcast on Apple Podcasts
  • Subscribe to The IT Pro Podcast on Google Podcasts
  • Subscribe to The IT Pro Podcast on Spotify
  • Subscribe to the IT Pro publication
  • Subscribe to IT Pro 20/20

Some sections of this posting are sourced from:
www.itpro.co.uk

Previous Post: «3 overlooked cybersecurity breaches 3 Overlooked Cybersecurity Breaches
Next Post: North Korean Hackers Targeting Healthcare with Ransomware to Fund its Operations north korean hackers targeting healthcare with ransomware to fund its»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Telegram, WhatsApp Trojanized to Target Cryptocurrency Wallets
  • Pro-Russian Winter Vivern APT Targets Governments and Telecom Firm
  • Google Exposes 18 Zero-Day Flaws in Samsung Exynos Chips
  • Free decryptor released for Conti ransomware variant infecting hundreds of organisations
  • Bitwarden to release fix for four-year-old vulnerability
  • THN Webinar: 3 Research-Backed Ways to Secure Your Identity Perimeter
  • New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS Attacks
  • A New Security Category Addresses Web-borne Threats
  • ICO Reprimands Metropolitan Police for Data Snafu
  • Lookalike Telegram and WhatsApp Websites Distributing Cryptocurrency Stealing Malware

Copyright © TheCyberSecurity.News, All Rights Reserved.