A method for analyzing impact on binaries, software, and hardware of a
planned software upgrade for a computer system. The method includes
performing a configuration inventory for the computer system with
profiles for the computer system of hardware, software including
operating system software, middleware, applications, development tools,
and third party software, application interfaces, and binaries. A set of
upgrade rules, e.g., rules defining hardware and software requirements
including interfaces, libraries, dependencies, and more, are accessed and
the binary profiles are analyzed based on the upgrade rules to determine
safe binaries and at-risk binaries. The at-risk binaries are further
divided into subcategories based on risks of incompatibility with the
planned software upgrade. The subcategories include failure, high risk,
and low risk. The method includes generating text or graphical reports
providing the analysis results to quantify and qualify the impacts on
binaries and other portions of the computer system.