Y2K Bug

Topics: 2000, Year 2000 problem, Computer Pages: 7 (2724 words) Published: January 23, 2000
Y2K – The Big Issue Abstract and Executive Overview What is the Y2K issue? This paper will describe the problems associated with Y2K and how Industry, Government, and Small Businesses are handling the problem. The first chapter introduces the Y2K issues. Chapter 2 will define how this affects the different businesses and Government agencies. Chapter 3 will develop an overall plan on how to attack the problem and recommendations. The majority of this paper will develop a plan on how each of the businesses and Government agencies should attack the Y2K problems. There should be a logical approach to planning how to investigate, test, validate, and if required, develop a contingency plan for Y2K. The job is to either form a team of personnel or hire a consulting firm to assess your situation. The team should employ the following steps: assess the system, renovate the system if necessary, validate the renovation if necessary, implement the renovation if necessary, test the renovation if necessary, and finally have a contingency plan in the event that renovating the system is not feasible and/or is too late. The only necessary or required action is to assess the system. This will be discussed in detail in my paper. The real issue is that less than a year remains before the year 2000 problems are here. The recommendation is to begin working this issue now. It may be too late, but that is when the contingency plan comes in handy. TABLE OF CONTENTS 1. What are the Y2K Issues? 2. What impacts are they're to Government, Industry, and Small Business? 3. What can Government, Industry, and Small Business Do to Combat the Y2K Issues? 4. Recommendation 5. References 6. Glossary Chapter 1 What are the Y2K Issues? There are actually more dates than just the year 2000 date. There are dates that can impact the leap year algorithms; Julian dates, fiscal year dates, calendar dates, and ASCII code dates. The top dates that need to be checked are: 1. 9 September 1999. This date can be read in code as 9999. In computer language, specifically ASCII code, this translates into a request for the processor to stop processing. 2. 1 October 1999. This is the start of the new Fiscal year for the Government (FY00). The algorithm for this may not be able to go from FY99 to FY00. 3. 31 December 1999. At midnight, the date rolls over to 1 January 2000. This problem can exist in two areas. The first is in the BIOS's that exist for most desktop machines. The BIOS's normally contain the clock and date data. The operator updates this data, when the system is first turned on and is continuously updated by the computer from then on. The problem is that older versions of BIO software recorded the date in two year digits (99, instead of 1999) so that once the date rolls into the year 2000, the BIOS's can not understand the rolling of the year and moves it back to 14 Jan 80, the default year date. The other problem is in the application software that uses the two-year date. The application software uses algorithms to roll over the dates and can not roll to the year 2000 date. It normally has to be manually input to get to the new date. 4. 28 February 2000. At midnight, the date should roll over to 29 February 2000. This is determined in the software by an algorithm that checks to see if the current year is a leap year. If it is a leap year then it should roll to 29 February 2000, if it can not determine the leap year, then it will jump to 1 March 2000. 5. 29 February 2000. This is almost the same problem as 28 February 2000. It will try to calculate the fact it is a leap year and roll the date to 1 March 2000. If it can not determine that it is the leap year, it will either go to 2 March 2000 or it will provide an incorrect date. There are several other dates that are important, based on each application software package, and needs. Examples are, a bank computer uses COBOL software that does not calculate the dates well, FORTRAN software used in scientific research...

References: 1. Computer Design and Architecture, L. Howard Pollard, 1990, Prentice-Hall, Inc. 2. Software engineering, Roger S. Pressman, 1987, McGraw-Hill, Inc. 3. Assembly Language, Jeff Duntemann, 1992, John Wiley and Sons, Inc. 4. Assembly Language for the PC, John Socha and Peter Norton, 1992, Brady Publishing 5. Advanced Assembly Language, Allen L. Wyatt, Sr., 1992, Que Corporation 6. 8-Bit microprocessor and Peripheral Data, Motorola, Inc., 1983, Motorola, Inc. 7. Organizational Behavior Human Behavior at Work, John W. Newstrom and Keith Davis, 1997, McGraw-Hill 8. Management Information Systems, Kenneth C. Laudon and Jane P. Laudon, 1998, Prentice Hall, Inc. 9. Understanding Business, Nickels * McHugh * McHugh, 1987, Times Mirror/Mosby College Publishing 10. Project Plan Document developed by the Best Practices Subcommittee of the Interagency Committee, Unknown authors and date of publication. 11. Year 2000 Management Plan, March 1997, Office of the Assistant Secretary of Defense, (C3I) 12. Year 2000, Biting the Silver Bullet, Peter de Jager, 1/13/97, Internet paper. 13. Agencies Year 2000 Repair Pace Criticized, Rajiv Chandrasekaran and Stephen Barr, Washington Post, 3 May 1998. 14. DoD to Share Early Warning Data to Stem Y2K Failures in Russia, China, Pamela Hess, 5 May 1998, Defense Information and Electronics Report. 15 Year 2000 Bug could Spook Russians, Author Unknown, Washington Times, 5 May 1998. Glossary 1. DoD - Department of Defense 2. Y2K - Year 2000 3. C3I - Command, Control, Communications, and Intelligence
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Essay on Bugs Bunny leadership speech
  • Bugs Bunny and the Marlboro Man Essay
  • Bugs Bunny : D Essay
  • Bugs Essay
  • Essay about pill bugs
  • Pill Bug Essay
  • Essay on Pill Bugs
  • Super Bugs Essay

Become a StudyMode Member

Sign Up - It's Free