{"id":70240,"date":"2025-09-03T09:45:27","date_gmt":"2025-09-03T09:45:27","guid":{"rendered":"https:\/\/nag.com\/?post_type=insights&#038;p=70240"},"modified":"2025-09-03T09:47:44","modified_gmt":"2025-09-03T09:47:44","slug":"the-hidden-risks-in-legacy-numerical-systems-and-why-they-matter-today","status":"publish","type":"insights","link":"https:\/\/nag.com\/insights\/the-hidden-risks-in-legacy-numerical-systems-and-why-they-matter-today\/","title":{"rendered":"The Hidden Risks in Legacy Numerical Systems \u2013 And Why They Matter Today"},"content":{"rendered":"<!-- Spacer -->\n<div class=\"pt-1 pt-lg-1 pt-xl-1\" ><\/div>\n\n<div class=\"container content-area-default \">\n    <div class=\"row justify-content--center\">\n        <div class=\"col-12 col-md-10 col-lg-8 col-xl-6\">\n            <h5>Every large enterprise relies on a web of critical software systems. But what happens when the code at the heart of these systems was written decades ago, by experts who have long since retired?<\/h5>\n        <\/div>\n    <\/div>\n<\/div>\n\n<!-- Spacer -->\n<div class=\"pt-2 pt-lg-2 pt-xl-2\" ><\/div>\n\n<div class=\"container content-area-default \">\n    <div class=\"row justify-content--center\">\n        <div class=\"col-12 col-md-10 col-lg-8 col-xl-6\">\n            <p>We hear this story over and over:<\/p>\n        <\/div>\n    <\/div>\n<\/div>\n\n<div class=\"container content-area-default \">\n    <div class=\"row justify-content--center\">\n        <div class=\"col-12 col-md-10 col-lg-8 col-xl-6\">\n            <ul>\n<li>\u201cIt works\u2026 but don\u2019t touch it.\u201d<\/li>\n<li>\u201cWe\u2019re one failure away from downtime.\u201d<\/li>\n<li>\u201cOur auditors don\u2019t understand the code we\u2019re running.\u201d<\/li>\n<\/ul>\n        <\/div>\n    <\/div>\n<\/div>\n\n<!-- Spacer -->\n<div class=\"pt-2 pt-lg-2 pt-xl-2\" ><\/div>\n\n<div class=\"container content-area-default \">\n    <div class=\"row justify-content--center\">\n        <div class=\"col-12 col-md-10 col-lg-8 col-xl-6\">\n            <p>From financial services to engineering and healthcare, unsupported numerical software is a growing risk. Not because businesses don\u2019t care, but because fixing it is complex and costly.<\/p>\n        <\/div>\n    <\/div>\n<\/div>\n\n<!-- Spacer -->\n<div class=\"pt-2 pt-lg-2 pt-xl-2\" ><\/div>\n\n<div class=\"container content-area-default \">\n    <div class=\"row justify-content--center\">\n        <div class=\"col-12 col-md-10 col-lg-8 col-xl-6\">\n            <p>The irony? Everyone knows modernization is the end goal\u2014but few can afford to wait years for a total rebuild. What\u2019s missing is the <em>bridge<\/em>. A practical path that gives enterprises confidence, continuity, and compliance while they figure out the future.<\/p>\n        <\/div>\n    <\/div>\n<\/div>\n\n<!-- Spacer -->\n<div class=\"pt-2 pt-lg-2 pt-xl-2\" ><\/div>\n\n<div class=\"container content-area-default \">\n    <div class=\"row justify-content--center\">\n        <div class=\"col-12 col-md-10 col-lg-8 col-xl-6\">\n            <p>Our team is exploring what a bridge might look like: delivering new forms of support that ensure compliance, continuity, and structured transition without waiting years for a full rebuild. Early feedback has been eye-opening\u2014some leaders only realized the scale of their risk once they saw the options mapped out.<\/p>\n        <\/div>\n    <\/div>\n<\/div>\n\n<!-- Spacer -->\n<div class=\"pt-2 pt-lg-2 pt-xl-2\" ><\/div>\n\n<div class=\"container content-area-default \">\n    <div class=\"row justify-content--center\">\n        <div class=\"col-12 col-md-10 col-lg-8 col-xl-6\">\n            <p><em>In the months ahead, we\u2019ll share insights to how enterprises can tackle this problem\u2014what works, what doesn\u2019t, and what\u2019s next. What\u2019s the biggest legacy challenge you\u2019re facing right now?<\/em><\/p>\n        <\/div>\n    <\/div>\n<\/div>\n\n\n<div class=\"gbc-title-banner tac tac-lg tac-xl\" style='border-radius: 0px; '>\n    <div class=\"container\" style='border-radius: 0px; '>\n        <div class=\"row justify-content--center\" >\n            <div class=\"col-12\"  >\n                <div class=\"wrap pv-2 \" style=\"0pxbackground-color: \">\n                                <div class=\"col-12 col-md-10 col-lg-8 col-xl-6  banner-content\"  >\n    \n                    \n                    <div class=\"mt-1 mb-1 content\"><\/div>\n\n                    \n                    <a href='https:\/\/nag.com\/contact-us\/' style='background-color: #ff7d21ff; color: #ffffffff; border-radius: 30px; font-weight: 600; ' class='btn mr-1  ' >Get information <i class='fas fa-angle-right'><\/i><\/a>                <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n\n\n<!-- Spacer -->\n<div class=\"pt-1 pt-lg-1 pt-xl-1\" ><\/div>\n\n<div class=\"container content-area-default \">\n    <div class=\"row justify-content--center\">\n        <div class=\"col-12 col-md-10 col-lg-8 col-xl-6\">\n            <h5>Related reading:<\/h5>\n        <\/div>\n    <\/div>\n<\/div>\n\n<div class=\"container content-area-default \">\n    <div class=\"row justify-content--center\">\n        <div class=\"col-12 col-md-10 col-lg-8 col-xl-6\">\n            <ul>\n<li>Mechanical Orchard reports that <strong>\u201cmaintaining those systems can be a costly burden, with an average of 60\u201380% of IT budgets allocated to keeping them running.\u201d<\/strong> <a href=\"https:\/\/www.mechanical-orchard.com\/insights\/1-14-trillion-to-keep-the-lights-on-legacys-drag-on-productivity\">https:\/\/www.mechanical-orchard.com\/insights\/1-14-trillion-to-keep-the-lights-on-legacys-drag-on-productivity<\/a><\/li>\n<li>TechRadar Pro cites <strong>\u201ca report from Dell estimates that organizations currently allocate 60\u201180% of their IT budget to maintaining existing on\u2011site hardware and legacy apps.\u201d<\/strong> <a href=\"https:\/\/www.techradar.com\/pro\/fix-it-even-if-it-aint-broke-the-price-of-legacy-technology\">https:\/\/www.techradar.com\/pro\/fix-it-even-if-it-aint-broke-the-price-of-legacy-technology<\/a> \u00a0<\/li>\n<li>RecordPoint notes that <strong>in 2019, the U.S. federal government spent 80% of its IT budget on operations and maintenance, primarily involving legacy systems.<\/strong> <a href=\"https:\/\/www.recordpoint.com\/blog\/maintaining-legacy-systems-costs\">https:\/\/www.recordpoint.com\/blog\/maintaining-legacy-systems-costs<\/a> \u00a0<\/li>\n<li>Audacia similarly states: <strong>\u201cMaintaining those systems can be a costly burden, with an average of 60\u201180% of IT budgets allocated to keeping them running.\u201d<\/strong> <a href=\"https:\/\/audacia.co.uk\/blog\/cost-of-legacy-systems\">https:\/\/audacia.co.uk\/blog\/cost-of-legacy-systems<\/a> \u00a0<\/li>\n<li>PSP\u2011IT says: <strong>\u201cResearch estimates that organizations spend anywhere between 60\u201180% on keeping their older IT systems running.\u201d<\/strong> <a href=\"https:\/\/psp-it.com\/blogs\/staggering-stats-that-show-how-outdated-technology-could-be-damaging-your-business\/\">https:\/\/psp-it.com\/blogs\/staggering-stats-that-show-how-outdated-technology-could-be-damaging-your-business\/<\/a> \u00a0<\/li>\n<\/ul>\n        <\/div>\n    <\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Every large enterprise relies on a web of critical software systems. But what happens when the code at the heart of these systems was written decades ago, by experts who have long since retired?<\/p>\n","protected":false},"author":16,"featured_media":70242,"parent":0,"menu_order":0,"template":"","meta":{"content-type":"","footnotes":""},"post-tag":[28,45,29,30,18,44,63],"class_list":["post-70240","insights","type-insights","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Hidden Risks in Legacy Numerical Systems \u2013 And Why They Matter Today - nAG<\/title>\n<meta name=\"description\" content=\"Every large enterprise relies on a web of critical software systems. But what happens when the code at the heart of these systems was written decades ago, by experts who have long since retired? This blog explores the problem.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nag.com\/insights\/the-hidden-risks-in-legacy-numerical-systems-and-why-they-matter-today\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Hidden Risks in Legacy Numerical Systems \u2013 And Why They Matter Today - nAG\" \/>\n<meta property=\"og:description\" content=\"Every large enterprise relies on a web of critical software systems. But what happens when the code at the heart of these systems was written decades ago, by experts who have long since retired? This blog explores the problem.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nag.com\/insights\/the-hidden-risks-in-legacy-numerical-systems-and-why-they-matter-today\/\" \/>\n<meta property=\"og:site_name\" content=\"nAG\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-03T09:47:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nag.com\/wp-content\/uploads\/2025\/08\/iStock-2163194862.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2121\" \/>\n\t<meta property=\"og:image:height\" content=\"1414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@NAGTalk\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nag.com\/insights\/the-hidden-risks-in-legacy-numerical-systems-and-why-they-matter-today\/\",\"url\":\"https:\/\/nag.com\/insights\/the-hidden-risks-in-legacy-numerical-systems-and-why-they-matter-today\/\",\"name\":\"The Hidden Risks in Legacy Numerical Systems \u2013 And Why They Matter Today - nAG\",\"isPartOf\":{\"@id\":\"https:\/\/nag.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/nag.com\/insights\/the-hidden-risks-in-legacy-numerical-systems-and-why-they-matter-today\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/nag.com\/insights\/the-hidden-risks-in-legacy-numerical-systems-and-why-they-matter-today\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nag.com\/wp-content\/uploads\/2025\/08\/iStock-2163194862.jpg\",\"datePublished\":\"2025-09-03T09:45:27+00:00\",\"dateModified\":\"2025-09-03T09:47:44+00:00\",\"description\":\"Every large enterprise relies on a web of critical software systems. But what happens when the code at the heart of these systems was written decades ago, by experts who have long since retired? This blog explores the problem.\",\"breadcrumb\":{\"@id\":\"https:\/\/nag.com\/insights\/the-hidden-risks-in-legacy-numerical-systems-and-why-they-matter-today\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nag.com\/insights\/the-hidden-risks-in-legacy-numerical-systems-and-why-they-matter-today\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nag.com\/insights\/the-hidden-risks-in-legacy-numerical-systems-and-why-they-matter-today\/#primaryimage\",\"url\":\"https:\/\/nag.com\/wp-content\/uploads\/2025\/08\/iStock-2163194862.jpg\",\"contentUrl\":\"https:\/\/nag.com\/wp-content\/uploads\/2025\/08\/iStock-2163194862.jpg\",\"width\":2121,\"height\":1414,\"caption\":\"Technician in server hub doing face palm gesture, trying to protect hardware from hacker stealing information. Close up of data center employee stressed by security breach alert caused by virus\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nag.com\/insights\/the-hidden-risks-in-legacy-numerical-systems-and-why-they-matter-today\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/nag.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insights\",\"item\":\"https:\/\/nag.com\/insights\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Hidden Risks in Legacy Numerical Systems \u2013 And Why They Matter Today\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nag.com\/#website\",\"url\":\"https:\/\/nag.com\/\",\"name\":\"NAG\",\"description\":\"Robust, trusted numerical software and computational expertise.\",\"publisher\":{\"@id\":\"https:\/\/nag.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nag.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/nag.com\/#organization\",\"name\":\"Numerical Algorithms Group\",\"alternateName\":\"NAG\",\"url\":\"https:\/\/nag.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nag.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/nag.com\/wp-content\/uploads\/2023\/11\/NAG-Logo.png\",\"contentUrl\":\"https:\/\/nag.com\/wp-content\/uploads\/2023\/11\/NAG-Logo.png\",\"width\":1244,\"height\":397,\"caption\":\"Numerical Algorithms Group\"},\"image\":{\"@id\":\"https:\/\/nag.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/NAGTalk\",\"https:\/\/www.linkedin.com\/company\/nag\/\",\"https:\/\/www.youtube.com\/user\/NumericalAlgorithms\",\"https:\/\/github.com\/numericalalgorithmsgroup\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Hidden Risks in Legacy Numerical Systems \u2013 And Why They Matter Today - nAG","description":"Every large enterprise relies on a web of critical software systems. But what happens when the code at the heart of these systems was written decades ago, by experts who have long since retired? This blog explores the problem.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nag.com\/insights\/the-hidden-risks-in-legacy-numerical-systems-and-why-they-matter-today\/","og_locale":"en_US","og_type":"article","og_title":"The Hidden Risks in Legacy Numerical Systems \u2013 And Why They Matter Today - nAG","og_description":"Every large enterprise relies on a web of critical software systems. But what happens when the code at the heart of these systems was written decades ago, by experts who have long since retired? This blog explores the problem.","og_url":"https:\/\/nag.com\/insights\/the-hidden-risks-in-legacy-numerical-systems-and-why-they-matter-today\/","og_site_name":"nAG","article_modified_time":"2025-09-03T09:47:44+00:00","og_image":[{"width":2121,"height":1414,"url":"https:\/\/nag.com\/wp-content\/uploads\/2025\/08\/iStock-2163194862.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@NAGTalk","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/nag.com\/insights\/the-hidden-risks-in-legacy-numerical-systems-and-why-they-matter-today\/","url":"https:\/\/nag.com\/insights\/the-hidden-risks-in-legacy-numerical-systems-and-why-they-matter-today\/","name":"The Hidden Risks in Legacy Numerical Systems \u2013 And Why They Matter Today - nAG","isPartOf":{"@id":"https:\/\/nag.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nag.com\/insights\/the-hidden-risks-in-legacy-numerical-systems-and-why-they-matter-today\/#primaryimage"},"image":{"@id":"https:\/\/nag.com\/insights\/the-hidden-risks-in-legacy-numerical-systems-and-why-they-matter-today\/#primaryimage"},"thumbnailUrl":"https:\/\/nag.com\/wp-content\/uploads\/2025\/08\/iStock-2163194862.jpg","datePublished":"2025-09-03T09:45:27+00:00","dateModified":"2025-09-03T09:47:44+00:00","description":"Every large enterprise relies on a web of critical software systems. But what happens when the code at the heart of these systems was written decades ago, by experts who have long since retired? This blog explores the problem.","breadcrumb":{"@id":"https:\/\/nag.com\/insights\/the-hidden-risks-in-legacy-numerical-systems-and-why-they-matter-today\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nag.com\/insights\/the-hidden-risks-in-legacy-numerical-systems-and-why-they-matter-today\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nag.com\/insights\/the-hidden-risks-in-legacy-numerical-systems-and-why-they-matter-today\/#primaryimage","url":"https:\/\/nag.com\/wp-content\/uploads\/2025\/08\/iStock-2163194862.jpg","contentUrl":"https:\/\/nag.com\/wp-content\/uploads\/2025\/08\/iStock-2163194862.jpg","width":2121,"height":1414,"caption":"Technician in server hub doing face palm gesture, trying to protect hardware from hacker stealing information. Close up of data center employee stressed by security breach alert caused by virus"},{"@type":"BreadcrumbList","@id":"https:\/\/nag.com\/insights\/the-hidden-risks-in-legacy-numerical-systems-and-why-they-matter-today\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nag.com\/"},{"@type":"ListItem","position":2,"name":"Insights","item":"https:\/\/nag.com\/insights\/"},{"@type":"ListItem","position":3,"name":"The Hidden Risks in Legacy Numerical Systems \u2013 And Why They Matter Today"}]},{"@type":"WebSite","@id":"https:\/\/nag.com\/#website","url":"https:\/\/nag.com\/","name":"NAG","description":"Robust, trusted numerical software and computational expertise.","publisher":{"@id":"https:\/\/nag.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nag.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/nag.com\/#organization","name":"Numerical Algorithms Group","alternateName":"NAG","url":"https:\/\/nag.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nag.com\/#\/schema\/logo\/image\/","url":"https:\/\/nag.com\/wp-content\/uploads\/2023\/11\/NAG-Logo.png","contentUrl":"https:\/\/nag.com\/wp-content\/uploads\/2023\/11\/NAG-Logo.png","width":1244,"height":397,"caption":"Numerical Algorithms Group"},"image":{"@id":"https:\/\/nag.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/NAGTalk","https:\/\/www.linkedin.com\/company\/nag\/","https:\/\/www.youtube.com\/user\/NumericalAlgorithms","https:\/\/github.com\/numericalalgorithmsgroup"]}]}},"_links":{"self":[{"href":"https:\/\/nag.com\/wp-json\/wp\/v2\/insights\/70240","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nag.com\/wp-json\/wp\/v2\/insights"}],"about":[{"href":"https:\/\/nag.com\/wp-json\/wp\/v2\/types\/insights"}],"author":[{"embeddable":true,"href":"https:\/\/nag.com\/wp-json\/wp\/v2\/users\/16"}],"version-history":[{"count":16,"href":"https:\/\/nag.com\/wp-json\/wp\/v2\/insights\/70240\/revisions"}],"predecessor-version":[{"id":70348,"href":"https:\/\/nag.com\/wp-json\/wp\/v2\/insights\/70240\/revisions\/70348"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nag.com\/wp-json\/wp\/v2\/media\/70242"}],"wp:attachment":[{"href":"https:\/\/nag.com\/wp-json\/wp\/v2\/media?parent=70240"}],"wp:term":[{"taxonomy":"post-tag","embeddable":true,"href":"https:\/\/nag.com\/wp-json\/wp\/v2\/post-tag?post=70240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}