Preview

Y2K Bug

Powerful Essays
Open Document
Open Document
2724 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Y2K Bug
Y2K – The Big Issue Abstract and Executive Overview What is the Y2K issue? This paper will describe the problems associated with Y2K and how Industry, Government, and Small Businesses are handling the problem. The first chapter introduces the Y2K issues. Chapter 2 will define how this affects the different businesses and Government agencies. Chapter 3 will develop an overall plan on how to attack the problem and recommendations. The majority of this paper will develop a plan on how each of the businesses and Government agencies should attack the Y2K problems. There should be a logical approach to planning how to investigate, test, validate, and if required, develop a contingency plan for Y2K. The job is to either form a team of personnel or hire a consulting firm to assess your situation. The team should employ the following steps: assess the system, renovate the system if necessary, validate the renovation if necessary, implement the renovation if necessary, test the renovation if necessary, and finally have a contingency plan in the event that renovating the system is not feasible and/or is too late. The only necessary or required action is to assess the system. This will be discussed in detail in my paper. The real issue is that less than a year remains before the year 2000 problems are here. The recommendation is to begin working this issue now. It may be too late, but that is when the contingency plan comes in handy. TABLE OF CONTENTS 1. What are the Y2K Issues? 2. What impacts are they 're to Government, Industry, and Small Business? 3. What can Government, Industry, and Small Business Do to Combat the Y2K Issues? 4. Recommendation 5. References 6. Glossary Chapter 1 What are the Y2K Issues? There are actually more dates than just the year 2000 date. There are dates that can impact the leap year algorithms; Julian dates, fiscal year dates, calendar dates, and ASCII code dates. The top dates that need to be checked are: 1. 9 September 1999. This date can be


References: 1. Computer Design and Architecture, L. Howard Pollard, 1990, Prentice-Hall, Inc. 2. Software engineering, Roger S. Pressman, 1987, McGraw-Hill, Inc. 3. Assembly Language, Jeff Duntemann, 1992, John Wiley and Sons, Inc. 4. Assembly Language for the PC, John Socha and Peter Norton, 1992, Brady Publishing 5. Advanced Assembly Language, Allen L. Wyatt, Sr., 1992, Que Corporation 6. 8-Bit microprocessor and Peripheral Data, Motorola, Inc., 1983, Motorola, Inc. 7. Organizational Behavior Human Behavior at Work, John W. Newstrom and Keith Davis, 1997, McGraw-Hill 8. Management Information Systems, Kenneth C. Laudon and Jane P. Laudon, 1998, Prentice Hall, Inc. 9. Understanding Business, Nickels * McHugh * McHugh, 1987, Times Mirror/Mosby College Publishing 10. Project Plan Document developed by the Best Practices Subcommittee of the Interagency Committee, Unknown authors and date of publication. 11. Year 2000 Management Plan, March 1997, Office of the Assistant Secretary of Defense, (C3I) 12. Year 2000, Biting the Silver Bullet, Peter de Jager, 1/13/97, Internet paper. 13. Agencies Year 2000 Repair Pace Criticized, Rajiv Chandrasekaran and Stephen Barr, Washington Post, 3 May 1998. 14. DoD to Share Early Warning Data to Stem Y2K Failures in Russia, China, Pamela Hess, 5 May 1998, Defense Information and Electronics Report. 15 Year 2000 Bug could Spook Russians, Author Unknown, Washington Times, 5 May 1998. Glossary 1. DoD - Department of Defense 2. Y2K - Year 2000 3. C3I - Command, Control, Communications, and Intelligence

You May Also Find These Documents Helpful

  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Khosrowpour, M. (1999). Managing information technology resources in organizations in the next millennium. Idea Group Inc. (IGI).…

    • 839 Words
    • 3 Pages
    Good Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    Khosrowpour, M. (1999). Managing Information Technology Resources in Organizations in the Next Millennium. Idea Group Publishing…

    • 793 Words
    • 3 Pages
    Good Essays
  • Best Essays

    EBOOK COLLECTION: Chapter 13 - Turban. (2003). Introduction to information technology (8th Ed.). New York: Wiley. University of Phoenix. Retrieved April 05, 2008. MBA/502 – Managing Business Enterprise https://ecampus.phoenix.edu/content/eBookLibrary/content/eReader.h…

    • 1432 Words
    • 6 Pages
    Best Essays
  • Good Essays

    According to Lowrey and Morain (2014), this article is describing how state laws are following the Lystedt model for concussions, but are unaware of the many factors that would hinder or help with compliance and implementation. Lowrey & Morain conducted interviews with officials from the state departments of health, education, and athletic and activity associations to have them represent their agencies or organizations with the implementation of current concussion laws in their states. Some of the organizations are: interscholastic athletic associations, athletic trainers’ association, and the National Federation of State High School Association. The language of the concussion laws applied only mention high school athletes and does not apply…

    • 204 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    SUMMARY AND RESPONSE TO TEACHING TOLERANCE IN AMER 2 Summary and Response to Teaching Tolerance in America Within his essay “Teaching Tolerance in America,” Devlin (2011) begins by introducing the reader to the current state of the nation‟s schools, specifically high schools, by discussing a variety of ways that tolerance in schools is falling short and that this is a significant problem. He then describes in great detail this issue, but categorizes its cause into to three specific areas: racial differences, gender differences, and social differences. For example, with regard to social differences, Devlin states, “The outsiders, geeks, and gays are ridiculed by everyone and harassed, bullied, and picked on by the jocks and by other members…

    • 151 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Tosco Case Study

    • 2169 Words
    • 9 Pages

    It was a warm February day in 2001. Sunshine provided some (badly) needed relief from the winter’s blues. Donna was sitting in her office observing the green lawn bathing in the warm sun. What a beautiful day. After four-and-a-half years of implementation and approximately $40 million (excluding costs of Tosco’s internal staff and ongoing maintenance costs of COMETS) over the initial approved budget, COMETS was a success. Unlike many IT projects that are scrapped after millions have been spent, COMETS worked and had allowed Tosco to grow through major acquisitions, even during the implementation process, without adding many more personnel. However, implementing COMETS was far from smooth or easy. The COMETS project was finished. Donna reflected on the whole experience.…

    • 2169 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    Brown, S. A., Chervany, N. L., & Reinicke, B. A. (2007). What MATTERS When INTRODUCING NEW INFORMATION TECHNOLOGY. Communications of the ACM, 50(9), 91-96. Retrieved from EBSCOhost.…

    • 1302 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Marc J. Romanych, Major, USA (Retired) Editorial Abstract: A follow-on discussion from last issue’s article, “A Theory Based View of IO,” authors Robert Cordray and Marc Romanych present a methodology to “map” the information environment, much like a commander’s J2 maps the physical characteristics of the area of operations. Giving clarity to the information environment, in turn, allows the commander to gain an understanding of its impact and importance, ultimately leading to a more effective information operation.…

    • 2459 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    International Journal of Management & Information Systems – Third Quarter 2010 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25.…

    • 6624 Words
    • 27 Pages
    Powerful Essays
  • Powerful Essays

    The Fbi?

    • 1646 Words
    • 7 Pages

    This case report discusses reasons why VCF failed. The second chapter analyzes connections between the Information System Strategy and the FBI organization, while the third chapter discusses the CIO 's final comment about how to change the attitude of FBI agents towards more recent types of technology. The last chapter is concerned with the FBI 's options of integrating modern technology. This case report ends with a summary and a final conclusion.…

    • 1646 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Laudon, K. C., & Laudon, J. P. (2014). Information System, Organization, and Strategy (13th ed., pp. 94-95). Upper Saddle River, NJ: Pearson Education.…

    • 498 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The FBI

    • 679 Words
    • 2 Pages

    The Federal Bureau of Investigation of the U.S. government, the FBI, was forced to scrap its $170 million virtual case file (VCF) management system. Official reports blamed numerous delays, cost overruns, and incompatible software. But a deeper examination of the cause of this failure uncovered issues of control, culture, and incompatible organizational systems.…

    • 679 Words
    • 2 Pages
    Powerful Essays
  • Good Essays

    Keen, P.W. (1991), Every Manager’s Guide to Information Technology, Harvard Business School Press, Boston, MA., .…

    • 7139 Words
    • 29 Pages
    Good Essays
  • Good Essays

    Mis in Cambodia

    • 12755 Words
    • 52 Pages

    (MIS) In Decision Making. South-West nigerian University.   Bird, M. (2010). Modern Management Guide to Information Technology. Business Case Studies. (2013, May 1). Retrieved from businesscasestudies.co.uk/: http://businesscasestudies.co.uk/business-theory/strategy/public-and-privatesectors.html#axzz2SduvP0Vv Farlex, I. (2012, February ). TheFreeDictionary. Retrieved from TheFreeDictionary Web site: http://www.thefreedictionary.com Handbook, C. (1995). Management Information System. Comptroller of the Currency and Administrator of National Banks. (n.d.). Management Information System 8th Edition. McNurlin, B. (2009). Information Systems Management in Practice (8th ed.). Prentice Hall. Nutt, P. C. (n.d.). Comparing Public and Private Sector Decision-Making Practices. The Ohio State University. O 'Brien, J. (1999). Management Information Systems_Managing Information Technology in the Internetworked Enterprise. Boston: Irwin McGraw-Hill. School, M. G. (2013, May 1). slideshare. Retrieved from slideshare.net: http://www.slideshare.net/BusEd/different-types-of-business-organisation Sebis. (2009). Enginneering for Business Information Systems. Sebia. Vermaat, C. a. (2013, April 29). bisom. Retrieved from bisom.uncc.edu: http://bisom.uncc.edu/courses/info2130/Topics/istypes.htm wikibooks. (2013, May 2). Retrieved from wikibooks.org: http://en.wikibooks.org/wiki/The_Computer_Revolution/MIS/MIS#Background…

    • 12755 Words
    • 52 Pages
    Good Essays
  • Powerful Essays

    The Central Computer and Telecommunications Association (CCTA) was tasked alongside growing a framework for effectual and commercially accountable use of for Information Technology resources. The first edition of ITIL was shouted GITIM, Power Information Technology Groundwork Management. Countless colossal firms and chiefly power associations in Europe extremely swiftly adopted the framework across the main 1990s. ITIL was spreading distant and was utilized in both power and non-government organisations. As it produced in popularity, both in the UK and across the globe, for Information Technology itself modified and evolved, and subsequently so did ITIL. In the year 2000, The CCTA came to be a portion of the presently industrialized Workplace of Power Transactions (OGC) and in the alike year, Microsoft utilized ITIL as the basis to develop their proprietary Microsoft Procedures Framework (MOF). In 2001, edition 2 of ITIL was released. The Service Prop and Service Transport books were redeveloped into extra concise available volumes and subsequently came to be the core focus of ITIL. Over the pursuing insufficient years it came to be, by distant, the most extensively utilized for Information Technology ability association best exercise way in the world. In May 2007 edition 3 of ITIL was published. This…

    • 2910 Words
    • 12 Pages
    Powerful Essays

Related Topics