+ 1-888-787-5890  
   + 1-302-351-4405  
 
 
 
 

Essay/Term paper: Y2k bug

Essay, term paper, research paper:  Technology

Free essays available online are good but they will not follow the guidelines of your particular writing assignment. If you need a custom term paper on Technology: Y2K Bug, you can hire a professional writer here to write you a high quality authentic essay. While free essays can be traced by Turnitin (plagiarism detection program), our custom written essays will pass any plagiarism test. Our writing service will save you time and grade.

Y2K – The Big Issue Abstract and Executive Overview What is the Y2K issue? This paper will describe the problems associated with Y2K and how Industry, Government, and Small Businesses are handling the problem. The first chapter introduces the Y2K issues. Chapter 2 will define how this affects the different businesses and Government agencies. Chapter 3 will develop an overall plan on how to attack the problem and recommendations. The majority of this paper will develop a plan on how each of the businesses and Government agencies should attack the Y2K problems. There should be a logical approach to planning how to investigate, test, validate, and if required, develop a contingency plan for Y2K. The job is to either form a team of personnel or hire a consulting firm to assess your situation. The team should employ the following steps: assess the system, renovate the system if necessary, validate the renovation if necessary, implement the renovation if necessary, test the renovation if necessary, and finally have a contingency plan in the event that renovating the system is not feasible and/or is too late. The only necessary or required action is to assess the system. This will be discussed in detail in my paper. The real issue is that less than a year remains before the year 2000 problems are here. The recommendation is to begin working this issue now. It may be too late, but that is when the contingency plan comes in handy. TABLE OF CONTENTS 1. What are the Y2K Issues? 2. What impacts are they"re to Government, Industry, and Small Business? 3. What can Government, Industry, and Small Business Do to Combat the Y2K Issues? 4. Recommendation 5. References 6. Glossary Chapter 1 What are the Y2K Issues? There are actually more dates than just the year 2000 date. There are dates that can impact the leap year algorithms; Julian dates, fiscal year dates, calendar dates, and ASCII code dates. The top dates that need to be checked are: 1. 9 September 1999. This date can be read in code as 9999. In computer language, specifically ASCII code, this translates into a request for the processor to stop processing. 2. 1 October 1999. This is the start of the new Fiscal year for the Government (FY00). The algorithm for this may not be able to go from FY99 to FY00. 3. 31 December 1999. At midnight, the date rolls over to 1 January 2000. This problem can exist in two areas. The first is in the BIOS"s that exist for most desktop machines. The BIOS"s normally contain the clock and date data. The operator updates this data, when the system is first turned on and is continuously updated by the computer from then on. The problem is that older versions of BIO software recorded the date in two year digits (99, instead of 1999) so that once the date rolls into the year 2000, the BIOS"s can not understand the rolling of the year and moves it back to 14 Jan 80, the default year date. The other problem is in the application software that uses the two-year date. The application software uses algorithms to roll over the dates and can not roll to the year 2000 date. It normally has to be manually input to get to the new date. 4. 28 February 2000. At midnight, the date should roll over to 29 February 2000. This is determined in the software by an algorithm that checks to see if the current year is a leap year. If it is a leap year then it should roll to 29 February 2000, if it can not determine the leap year, then it will jump to 1 March 2000. 5. 29 February 2000. This is almost the same problem as 28 February 2000. It will try to calculate the fact it is a leap year and roll the date to 1 March 2000. If it can not determine that it is the leap year, it will either go to 2 March 2000 or it will provide an incorrect date. There are several other dates that are important, based on each application software package, and needs. Examples are, a bank computer uses COBOL software that does not calculate the dates well, FORTRAN software used in scientific research does not do dates well, and older versions of Microsoft software used the two-year digit dates. The different application software packages that are available for computers are beginning to fix the year 2000 problem in the next revision and/or update. The problems that are being encountered are that the updates may not be compatible with the data that goes with the application software. An example is that Microsoft Access 2.0 is not year 2000 compliant. To upgrade to a compliant version, the original data associated with Access 2.0 will not run on the upgrade version. In addition, the upgrade Access will not operate on the old versions of Microsoft Windows. Therefore, additional problems are beginning to come into focus with the year 2000 issue. Another issue is all the databases that are used. Relational databases use date fields as part of wildcard actions, used as sorting identification, as grouping actions, and as part of daily identification. Some specific examples are: simple databases, such as the window explorer allow you to view and sort files in a date/time field. If this date field were only two digits, then it would incorrectly sort the files (year 00 would be first rather than last). Another example is a large database that is used to match names with addresses and billing statements. This database would need to flag dates with the billing statements. If the dates were incorrect or not sorted correctly, then the billing statements would be invalidated. As discussed, there are several issues when dealing with Y2K. These issues have a direct impact on both Government and Industry. Chapter 2 What impacts are they"re to Government, Industry, and Small Business? There are several impacts to Government, Industry, and Small Business. Dates that can impact the leap year algorithms; Julian dates, fiscal year dates, calendar dates, and ASCII code dates. These dates were discussed in chapter 1. Now we will discuss the ramifications to the new dates. For the Government, the dates will have a major impact across the board. Every Government agency, from Federal to City, will be impacted. The Federal Government uses computers on a daily basis and without them, the Federal Government would not be able to operate. Some specific examples are in the Department of Commerce, Department of Defense, and the Department of Justice. The Department of Commerce utilizes computers to run the National Oceanic Atmospheric Association (NOAA) systems that are used to chase Hurricanes. The problem is that several of the computers are used to log different data and use date/time stamping with that data. This data is later analyzed to try and map hurricanes for the future. If the Y2K issues are not resolved, important data will be lost. The Department of Defense also uses computers to a very large extent. This is especially true for the DOD large complex machinery used to defend the country. There are very few parts of the Army, Navy, Air Force, and Marines that do not use computers. Computers are the backbone to DOD and without them, there is a real fear that our armed forces would not be able to defend this country. The Department of Justice has an even worse problem. They are charged with keeping track of criminals and federal indictments across the country. Because of the complexity of the laws, if the computers used to keep track of indictments and criminal records are not Y2K compliant, then the Justice system could have criminals cleared of any wrong doing because of a simple date issue. It is well known that if the date or address were wrong on an indictment or a search warrant, anything found because of the indictment or warrant would not be used in court. Industry has the same basic problems that the Government would have. They rely on computers in almost every aspect of the business. From robotic assembly lines to employee payroll, all of industry relies on the computer to run its day to day operation. The problem that both industry and Government have is that there was no contingency to the Y2K issue. Both industry and Government have several backup systems. An example is that major banks will have the main frame computer in one location and a hot backup in a totally different location. Take Nations Bank. Nations Bank may have its primary mainframe computer, for all its checking accounts, here in town. There is a hot backup (a hot backup is a main frame computer that records the same exact information that the mainframe computer is recording, but it does not handle any transactions, just records the information) that is located in a different part of the country, say Colorado. In this way, if a major hurricane were to devastate Tampa, the hot backup would come on line take over the responsibility of the mainframe. In this way, vital information would not be lost. This was all thought out years before, but not Y2K. Y2K would impact both mainframes (the primary and the backup) and all the data would be corrupted. The problem with small business is that it relies on the computer to do many of its tasks that employees used to do. In small business, people were employed to handle payroll, marketing, office management, files, record keeping, and profit/loss ledgers. These people were replaced with the advent of the computer. Now any small business could operate without minimal employees. The office manager could now handle payroll, marketing, files, records, and ledgers right on the computer. The computer became the key piece of equipment for the small business. Without the computer, small businesses could not stay in operation. Look at a small business that provides hearing aids to the general public. Besides the payroll, this small business will keep all its customers accounts in a simple database. This database will be used to notify the business when the hearing aid needs servicing, additional hearing tests should be done, replacement batteries, and payment schedules. This is just the tip of the database. The database would also be used to send out flyers on new technology, discounts, and will serve as the business mailing lists. Without this computer, the small business would need to hire additional personnel and return to paper and pencil to operate. Chapter 3 What can Government, Industry, and Small Business Do to Combat the Y2K Issues? For both Government and Industry, it will not be a problem to combat Y2K. There is work already being done to correct the problems. Both agencies, through consulting agencies and internal working groups, have developed a series of plans to combat the Y2K issue. The standard procedure is to first do an inventory and assessment on the agency. After the assessment is done, a renovation plan is developed to renovate the different systems. After renovation is completed, the system is placed into the validation phase, where it is tested using the different Y2K dates to ensure that no problems are encountered. After the testing is completed and the validation is verified, then the implementation phase is started. The implementation phase is to implement the system into action, and begin watching the system during the actual crossover dates. The cost to perform all of the plans and phases are high. On most major DOD systems, the cost ranges from $100 Thousand to over $5 Million. For industry, their costs are about the same. It does not matter if the agency does it internally or hires consultants to perform the work. The costs are normally high. These costs are absorbed in industry and/or in the Government by the consumer and/or taxpayer. Industry will pass the costs to the consumer by increasing its price on the product. The Government will either increase taxes or modify the budget to get the necessary funds to ensure Y2K compliance. The real problem lies with small business. The plans and phases that were developed by industry and Government must also be accomplished by small business. The problem is that small business does not have the money to expend on the Y2K issue. Small businesses do not have the overhead or capital to afford to test its systems and ensure that Y2K problems do not exist in its machine. Since most small businesses do not rely on consultants and do not have a computer expert on the payroll, then small businesses must rely on the software companies to ensure that the computer is Y2K compliant. Since they do not have the funds to try and make their systems Y2K compliant, then the small business must rely on Macintosh, Microsoft, and other large software companies to ensure that the software is compliant. This becomes a real issue for the small business. The major software companies have problems with ensuring that the software they are selling is Y2K compliant. An example is that Microsoft Windows 98 may be compliant, as far as the Y2K issue is concerned. But any other application software that is used with Windows 98 may not be compliant, making the system non-compliant. Microsoft can not be held responsible for other software packages built by other software companies. In addition, most software companies will not support older versions of its software. An example is that Microsoft will not support Windows version 3.1. This is based on the availability of newer versions of Windows being available to the consumer. So where does this leave the small business? The small business is in a delicate situation. Recommendation The recommendation for small business is to work through the chamber of commerce and pool the resources that each small business has to get the support it needs. There is Federal and Local assistance available to help small business ensure that the Y2K issue is resolved prior to the actual dates. The real problem is that if the small business does not recognize that it has a problem, then it will not work to fix the Y2K issue in time. By combining their resources and working with the local chambers, a network of consultants could work together to fix the problem before the actual Y2K dates have come. The only other option would be to spend the money to go through the same plans and phases that the Government and Industry goes through to fix the Y2K issue. This cost would be too high for small business. The final option would be for the small business to cross his fingers and hope for the best. This would be the last option for the businessperson to work with. References 1. Computer Design and Architecture, L. Howard Pollard, 1990, Prentice-Hall, Inc. 2. Software engineering, Roger S. Pressman, 1987, McGraw-Hill, Inc. 3. Assembly Language, Jeff Duntemann, 1992, John Wiley and Sons, Inc. 4. Assembly Language for the PC, John Socha and Peter Norton, 1992, Brady Publishing 5. Advanced Assembly Language, Allen L. Wyatt, Sr., 1992, Que Corporation 6. 8-Bit microprocessor and Peripheral Data, Motorola, Inc., 1983, Motorola, Inc. 7. Organizational Behavior Human Behavior at Work, John W. Newstrom and Keith Davis, 1997, McGraw-Hill 8. Management Information Systems, Kenneth C. Laudon and Jane P. Laudon, 1998, Prentice Hall, Inc. 9. Understanding Business, Nickels * McHugh * McHugh, 1987, Times Mirror/Mosby College Publishing 10. Project Plan Document developed by the Best Practices Subcommittee of the Interagency Committee, Unknown authors and date of publication. 11. Year 2000 Management Plan, March 1997, Office of the Assistant Secretary of Defense, (C3I) 12. Year 2000, Biting the Silver Bullet, Peter de Jager, 1/13/97, Internet paper. 13. Agencies Year 2000 Repair Pace Criticized, Rajiv Chandrasekaran and Stephen Barr, Washington Post, 3 May 1998. 14. DoD to Share Early Warning Data to Stem Y2K Failures in Russia, China, Pamela Hess, 5 May 1998, Defense Information and Electronics Report. 15 Year 2000 Bug could Spook Russians, Author Unknown, Washington Times, 5 May 1998. Glossary 1. DoD - Department of Defense 2. Y2K - Year 2000 3. C3I - Command, Control, Communications, and Intelligence  

Other sample model essays:

College Papers / 1984
1984 is a political parable. George Orwell wrote the novel to show society what it could become if things kept getting worse. The first paragraph of the book tells the reader of the "swirl o...
College Papers / 2001 Space Odyssey
The film segment chosen was the final scene from Stanley Kubrik^s 2001 A Space Odyssey made in 1968. As the name would suggest, the film is set almost entirely in the future. Already having projected...
College Papers / 90s Music
Music in the nineties can be simply described as diverse. Diverse meaning that music has been segregated into hundreds of groups. This report will refer in detail to three genres of music: Alternativ...
College Papers / Abortion
Abortion on demand should be legal for many reasons. In countries where abortion is absolutely not tolerated it is a fact that women continue to receive abortions, from unqualified back-street aborti...
College Papers / Abortion 2
A MATTER OF CHOICE The topic of abortion is one of the most controversial of our times. It has caused countless deaths and several violent confrontations between the two separate parties of opi...
College Papers / Abortion 3
Every year in Canada, over 100 000 murders never reach the courtroom.1 They never reach the courtroom because they are completely legal. Abortion continues to grow across the world, hurting and ki...
College Papers / Abraham Of Chaldea
The following is a narrative description on the life and times of one of the most powerful characters in the Old Testament. Abraham was indeed a man of God in a time where few men believed in the ...
College Papers / Absolute Law
This vast universe, which we understand so little of, is governed by a set of rules and principles which were laid down since the dawn of time. The universe was created by God and it is He who laid d...
College Papers / Abuse Of The Innocent
Is it right to force a mouse to live it's live in a laboratory cage to test anti-cancer drug? How would you like to be squeezed in a cage with many other animals, not being able to touch the gr...
College Papers / Accounting Ethics
When examining the effect of open marketing on the profession of accounting it is important to view it from three perspectives: the client's, the profession's, and society's. Additionally, two key...
Experience with Dream Essay - Reliable and great customer service. Quality of work - High quality of work.
, ,
Dream Essay - Very reliable and great customer service. Encourage other to try their service. Writer 91463 - Provided a well written Annotated Bibliography with great deal of detail per th
, ,
it is always perfect
, ,
The experience with Dream Essay is stress free. Service is excellent and forms various forms of communication all help with customer service. Dream Essay is customer oriented. Writer 17663
, ,
Only competent & proven writers
Original writing — no plagiarism
Our papers are never resold or reused, period
Satisfaction guarantee — free unlimited revisions
Client-friendly money back guarantee
Total confidentiality & privacy
Guaranteed deadlines
Live Chat & 24/7 customer support
All academic and professional subjects
All difficulty levels
12pt Times New Roman font, double spaced, 1 inch margins
The fastest turnaround in the industry
Fully documented research — free bibliography guaranteed
Fax (additional info): 866-332-0244
Fax (additional info): 866-308-7123
Live Chat Support
Need order related assistance?—Click here to submit a inquiry
© Dreamessays.com. All Rights Reserved.
Dreamessays.com is the property of MEDIATECH LTD