Реферат

Реферат на тему Year 2000 Computer Problem Y2k Bug Essay

Работа добавлена на сайт bukvasha.net: 2015-06-12

Поможем написать учебную работу

Если у вас возникли сложности с курсовой, контрольной, дипломной, рефератом, отчетом по практике, научно-исследовательской и любой другой работой - мы готовы помочь.

Предоплата всего

от 25%

Подписываем

договор

Выберите тип работы:

Скидка 25% при заказе до 22.11.2024


Year 2000 Computer Problem (Y2k Bug) Essay, Research Paper

Less than two years until the year 2000. Two seemingly small

digits may turn January 1, 2000 from a worldwide celebration into a

universal nightmare. With computers mistaking the year 2000 for 1900,

virtually all businesses that use dates will be affected. Not only

will the companies be affected, but they are paying millions upon

millions of dollars in order for computers to recognize the difference

between the years 2000 and 1900. The year 2000 computer bug is a huge

problem that our world must face.

In order to explain how to solve the “millennium bug”, it is a

good idea to be informed about exactly what the year 2000 problem is.

The year 2000 industry expert, Peter de Jager, described the problem

quite well. “We programmed computers to store the date in the

following format: dd/mm/yy. This only allows 2 digits for the year.

January 1, 2000 would be stored as 01/01/00. But the computer will

interpret this as January 1, 1900- not 2000″ (de Jager 1). The ‘19′ is

“hard-coded” into computer hardware and software. Since there are only

2 physical spaces for the year in this date format, after ‘99′, the

only logical choice is to reset the number to ‘00′.

The year 2000 problem is unlike any other problem in modern

history for several reasons. William Adams points out some of the most

important ones. “Time is running out- the Year 2000 is inevitable! The

problem will occur simultaneously worldwide, time zones withstanding.

It affects all languages and platforms, hardware & software. The

demand for solutions will exceed the supply. Survivors will survive

big, losers will lose big. There is no ’silver bullet’ that is going

to fix things” (Adams 2). “It is too big and too overwhelming even for

[Bill Gates and] Microsoft” (Widder 3). Separate, any one of these

points makes Y2K, a common abbreviation for the year 2000 problem, an

addition to the obstacle. Combined, they form what seems more like a

hideous monster than an insignificant bug.

The impact of Y2K on society is enormous, bringing the largest

companies in the world to their knees, pleading for a fix at nearly

any cost. “The modern world has come to depend on information as much

as it has on electricity and running water. Fixing the problem is

difficult because there are [less than] two years left to correct 40

years of behavior” (de Jager 1). Alan Greenspan has warned that being

99 percent ready isn’t enough (Widder 2). Chief Economist Edward

Yardeni has said that the chances for a worldwide recession to occur

because of Y2K are at 40% (Widder 3). Senator Bob Benett (Republican,

Utah) made a good analogy about the potential of the problem. “In the

1970’s, oil was the energy that ran our world economy. Today it runs

on the energy of information.” He later said, “To cripple the

technological flow of information throughout the world is to bring it

to a virtual standstill” (Widder 3).

The potential of the problem in everyday life is alarming.

Imagine making a loan payment in 1999 for a bill that is due in 2000.

The company?s computers could interpret the ‘00′ as 1900 and you would

then be charged with 99 years of late fees (Moffitt & Sandler 48). If

the year 2000 problem isn’t solved, there could be “no air traffic,

traffic lights, no lights in your company, companies could not produce

goods, no goods delivered to the stores, stores could not send you

bills, you could not send bills to anyone else. Business [could] come

to a halt” (de Jager 1).

The costs of fixing Y2K are staggering. The Gartner Group

estimates that costs per line of code to be between $1.50 and $2.00

(Conner 1). It is not uncommon for a single company to have

100,000,000 lines of code (de Jager 6). Capers Jones, an expert who

has studied software costs for over ten years, estimates total

worldwide costs to be $1,635,000,000,000 (One-trillion, 635 billion

dollars) (Jones 58). To put this number into perspective, if five

people were to spend $100 for every second of every day, 24 hours a

day, 365 days a year, it would take them about 100 years to finish the

task!

The year 2000 problem is not only limited to what happens with

computers between December 31, 1999 and January 1, 2000. There are

several other important dates that are a factor. Last October was

considered the last point where a large company could start fixing the

problem with any hopes to finish before the deadline (DBA 1). Also,

all fixes should be done by January 1, 1999. There are two major

reasons for having the fixes done a year early. The first is that

there are many “special dates” during 1999 that mean special things.

For example, September 9, 1999 (09/09/99) has been commonly used as

the “expiration date” for references and data that have no expiration

date (Reid 6). The computer required that a date must be entered in,

and in many cases, 9/9/99 was it. Also, it has been established that

an entire year’s cycle of events should be used to test all of the

modifications that have been made to a system. Also, one should be

sure to test to see which day of the week is 01/01/00. January 1, 1900

was a Monday, but January 1, 2000 will be a Saturday. Other possible

failure dates: 1/10/2000 (1st 9 character date), 2/29/2000 (Leap day-

the year 2000 is a leap year), 10/10/2000 (1st 10 character date), and

12-31-2000 (Day 366 of the year 2000) (Martin 15) (GTE Appendix A).

With the millennium “bug” coming closer and closer to destroying

the “crops” of the world’s information every day, experts from around

the globe have discovered several ways to deal with or “exterminate”

this menace. Five major solutions to the problem will now be

discussed.

The most straightforward approach to solving Y2K is to simply

change the 2-digit date fields to 4-digit ones. This is considered to

be the only complete solution to the problem, giving businesses a

seemingly endless range of dates for the future. This approach also

can make it much easier for the company to reformat the display

screens with a hard-coded format present (IBM 5.2).

Unfortunately, expanding the date field from 2 to 4 digits has

several downsides to it. The most obvious one is that in order to

convert the dates, every program and database that references to date

data will have to be modified. These modifications are mostly manual

labor- not an automatic process. Also, this requires display screens

to be reformatted manually, as well as increasing record lengths in

databases (IBM 5.2).

Another common method for swatting the millennium bug involves

what is termed “date logic”, or “windowing techniques”. This procedure

involves having a separate program to determine which millennium

certain dates are in. For example, the program could determine that if

the year ends in numbers between 00 and 20, the date is in the second

millennium. If the year ends in 21 to 99, the date is in the first

millennium. This technique avoids some of the massive changes and

coordination associated with

the expansion approach (Martin 5).

Date logic routines also have some downsides to them. The most

important one is that the “time window” can never be more than 100

years, and the length of the time window cannot change in the future.

Also, system performance may slow down with this extra step for each

date to be processed. On top of that, all of the assumptions and logic

must be the same for all of the programs that will use it (IBM 5.7).

If and only if all three of these downsides to windowing techniques

are able to be overcome, should a business consider this solution.

Another way of getting around 2-digit dates involves a bridge

program. This type of solution is used to convert data from one

record format to another. This allows a system to convert 2-digit to

4-digit dates as they are needed. This also allows a business to have

very little down time for year 2000 renovations. Instead of converting

all of the data at one time, it is instead converted gradually. Also,

this technique is very cost effective and fairly easy to do (Moffitt &

Sandler 5.8). Be aware that a bridge program has the potential to ruin

a computer system. By removing the bridge before all data has been

converted, 2-digit dates may become mixed with 4-digit dates, creating

a larger problem than in the beginning.

Replacing the systems is probably the most straightforward

method of solving Y2K. By simply discarding old, non-compliant systems

and purchasing new systems that are year 2000 ready, a business can

eliminate the year 2000 problem altogether (Martin 6). This avoids the

hassle of coming up with solutions to the problem, but presents the

difficulties of starting from scratch. This solution should be

considered if a company?s systems are too costly to fix, or if there

are not very many systems that need to be fixed. Another idea that

incorporates the replacement idea is for one company to merge with or

buy another company that has Y2K compliant systems. Then, the old

systems can be retired (Martin 6).

The last alternative that will be discussed is to do nothing to

current computer systems that a business may use. This is not the

same as ignoring the millennium bug and hoping that it will go away.

Instead, it involves analyzing exactly what will happen to a company?s

computer systems and determining that the effect it will have is

either none or very little (Martin 6). If this would be the case, and

employees could work around any damages that may be caused, this

selection could work.

Carrying out a solution in any business involves careful

planning in order to be successful. Each of the four steps- awareness,

planning, implementation, and testing- are crucial for a company to

successfully get beyond the year 2000.

Though the shortest step, the awareness step can be considered

to be the most important step. This involves a detailed description of

the problem to CEO?s and the other decision makers for the company.

Also, the management must be informed of the impact that is likely to

occur if Y2K is not solved. Without successfully informing the company

executives of the millennium bug, there is no hope of getting funding

appropriated and fixes underway (Conner 2).

The preparation and planning phase involves finding all

applications that use dates and choosing the right combination of

solutions to result in a successful endeavor. Also, a business must

consider any dependencies on outside systems- other companies, for

example. In addition to this, a “priority schedule” should be created,

to determine which systems are absolutely necessary to the operation

of the business, and to fix them in accordance to their importance

(Conner 2). A standard date interface should be agreed upon both

within the company and with all other companies which are relied on.

Also, the first estimate of how costly and how prolonged the fixes

should be done (Conner 2).

The implementation phase is probably the most tedious phase of

year 2000 compliance. This involves taking proposed solutions and

incorporating them into a business? computer systems. Depending on

which solutions are chosen, and how the solutions affect everyday

business, a company?s commerce could be crippled due to the need for

various systems to be down at all times (Moffitt & Sandler 66).

Testing the solutions may be seen as an unimportant phase in the

conversion process. The rewards seem few, and the costs of are high.

However, testing solutions is the only way to ensure that a business

will flow smoothly into the 21st century. This procedure involves

making sample databases and records to verify that the fixes were made

correctly, and that all systems work correctly. During this phase, a

few glitches will most likely be found, and correcting these will be

relatively easy. There are two common approaches to testing the

solutions. The first involves making sure the systems work correctly

in the 20th century, testing the computers for the 21st century, and

then putting the systems back into everyday use. An advantage of this

method is that all of the tests are done at the same times, allowing

quicker feedback. The downside is that the amount of down time will be

fairly high. The other approach is the same as the first, except

switching the second and third items. The systems are first put back

into production, and then they are tested for year 2000 compliance

while they are ensuring the flow of business at the same time. The

advantage of this method is that down time is much shorter. However,

getting results will take a longer time (Pollner 2-3).

As the year 2000 comes closer and closer, companies are losing

precious time in order to swat the millennium bug. The deadline is

fixed. The price of survival is high and the only reward is the hope

of continuing to operate in the worlds of commerce and industry.

Businesses that continue into the next millennium will enjoy the

happiness of existence. Companies that fail to act now will probably

crumble under their own weight. “The alternative to addressing the

year 2000 will be going out of business” (Moffitt & Sandler 3).


1. Реферат Основные виды деликтов в законах XII таблиц
2. Реферат Зависимость цены и спроса
3. Реферат Политические идеи античности 3
4. Курсовая Разработка функциональных узлов выполняющих типовые для цифровых устройств микрооперации
5. Реферат Физика за 9 класс
6. Диплом Проблемы развития туризма в Республике Казахстан на современном этапе
7. Реферат Роль и значение технического обслуживания и ремонта автомобильного транспорта
8. Курсовая Анализ финансового состояния предприятия 71
9. Реферат на тему Computers Essay Research Paper Computers
10. Реферат на тему Наказание рыцарей