Browse Definitions :
Definition

legacy platform (legacy operating system)

This definition is part of our Essential Guide: Guide to app portfolio management and legacy modernization

A legacy platform, also called a legacy operating system, is an operating system (OS) no longer in widespread use, or that has been supplanted by an updated version of earlier technology. Many enterprises that use computers have legacy platforms, as well as legacy application s, that serve critical business needs. With the release of Windows XP, for example, Windows 9x became a legacy platform. Earlier, Windows 9x had made Windows 3.x a legacy. Similar evolution has taken place, and will doubtless continue, with the Mac OS, Linux, and other platforms.

It can be difficult or impossible to run new applications on legacy platforms. In some cases, a new version of a program will work with an older OS, but this cannot be taken for granted. It is not uncommon for a new release of an "old reliable" program to function partially, marginally, or not at all on a computer with a legacy OS. The computer might even crash when the new version of the program is launched. The likelihood of encountering such problems becomes greater, in general, as the age difference between the application and the OS increases.

Historically, applications have been written for specific manufacturers' operating systems. Currently, many companies are migrating their applications to new programming languages and operating systems that follow open or standard programming interfaces. The intent is to make it easier in the future to update programs without having to rewrite them entirely, and ultimately to allow any enterprise to use its applications on any operating system.

This was last updated in March 2011

Continue Reading About legacy platform (legacy operating system)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • brute force attack

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted ...

  • spyware

    Spyware is software that is installed on a computing device without the user's knowledge. Spyware can be difficult to detect; ...

  • ATM black box attack

    An ATM black box attack, also referred to as jackpotting, is a type of banking-system crime in which the perpetrators bore holes ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

  • disaster recovery (DR) test

    A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's ...

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close