Ad info
Search


image map

image map

Related Sites
Computing Japan News Network
Dai Job
LINC Media
 
 
October 1999 Volume 6 no.10

Y2K-it's not a computer problem (part 2)
by Tim Romero

Last month we discussed the importance of viewing Y2K as a risk-management problem rather than as a computer problem. Addressed in this way, Y2K-readiness becomes very manageable. This month, we'll cover the basic steps small and mid-sized businesses need to take in order to get ready for the new millennium. Always keep in mind that your goal should not necessarily be to ensure that your company is Y2K-compliant, but to minimize the amount of money the Y2K problem will cost your organization.

The process described in this article is embodied in Vanguard's free Y2K-COPE software package. Y2K-COPE can greatly assist in locating potential Y2K-related problems and developing contingency plans for them. Y2K-COPE can be downloaded from Vanguard's website at http://www.vanguardjp.com/y2k.

Understanding compliance

There is still some debate over the exact definition of "Y2K-compliant," but your goal is not to make your enterprise Y2K-compliant, but to make it Y2K-ready. You do not need to ensure that a system is Y2K-compliant, only that it will perform the job you require of it and, if it fails, you must develop appropriate an contingency plan.

For hardware and software products, almost all the information you need can be found at the vendors' websites.You will find that most systems are either rated fully compliant or can be upgraded to fully compliant versions with little trouble. There will be cases, however, when there will be no fully compliant version available, and the software will be rated as "compliant with issues." Most vendors provide detailed information about these defects (again, at their websites), and most such bugs are minor. A quick review of the information will give you a picture of how specific bugs may affect your company.

Understanding dependence
Evaluating software and hardware is by far the simplest part of assessing Y2K-readiness. An important but often overlooked component is the dependency chain. This applies to computer systems (a Y2K-compliant application requires a Y2K-compliant OS, which requires Y2K compliant hardware), to business processes (a Y2K-compliant fulfillment system will be useless if the PBX fails), and to your business as a whole. If your suppliers and outsourcers cannot function properly, then there is a good chance that you will not be able to either.

At first, the scope of the dependency chain seems overwhelming, but evaluating it is really just a matter of getting organized, and software like Y2K-COPE can be quite helpful when mapping out your dependency chain, determining how the failure of one link will affect other systems, and in developing contingency plans for such possibilities. And remember, you don't have to determine if other companies are Y2K-compliant, but only if they will be able to fulfill their obligations to you.

Stay up-to-date
Of all the steps involved in Y2K-readiness, keeping compliance information up-to-date is the most often overlooked. There is a strong tendency to believe that once you have evaluated your systems, mapped out your dependency chain, and developed your contingency plans, the job is done. It's not. The compliance status of software changes, and may change frequently. Software rated as compliant goes back into testing and re-emerges as "compliant with issues." Likewise, new defects are discovered in software already so rated. It is essential that you revisit vendor's websites to learn about these new issues and determine how they will affect you and your company.

Closing thoughts
Those who read my other articles on the subject or have attended my Y2K lectures will be aware that I don't see the world ending on January 1, 2000, and that I place very little stock in the prolific purveyors of doom. In fact, everything we have seen so far has been very reassuring.

Most computer systems have been processing dates in the next millennium for some time now. Banks have no trouble writing 30-year mortgages, and many companies are already operating in FY2000. We have not seen widespread computer failures. Even in terms of software rectification, the picture is far from bleak. Y2K-rectification programs in various industries are very similar in scope to those that were required in the financial industry by the introduction of the Euro. Again, there were no significant failures.

It's easy to understand why the millennium is attracting so much attention in the computer field, but a bit harder to understand the social and cultural importance people are attaching to it. After all, in a physical sense, the millennium does not even exist. We invented it. The year 2000 is strictly a figment of mankind's imagination. The sun will rise and set just as it has for millions of millennia already. The only significance the day will have is that which we give it. Of course, most people don't see it that way, and that's a good thing.

For every purveyor of millennial doom, there are ten who see the beginning of a new era. People are seeing the coming millennium as a time of reconciliation and a chance to make long-overdue changes. And since Y2K is ultimately and entirely our creation, it seems certain that this is what it will become.

Decades from now, the phrase "The Y2K Problem" will have an odd and perhaps somewhat quaint ring to it. By that time, Y2K will not be remembered as a time of short-term computer failures, but as a time of positive change and of new beginnings. I for one am looking forward to it wholeheartedly.

Tim Romero writes regularly on technology issues.
Contact him at t3@t3y.com

Back to the Table of Contents

Comments or suggestions?
Contact cjmaster@cjmag.co.jp

Find Out Where you can buy Computing Japan Magazine in Japan and the US
© Copyright 1999 Computing Japan Magazine
All Rights Reserved
Links Jobs in Japan Hot Products ISPs in Japan User Groups  IT Events Extras Features Home Back Issues About Us subscriptions current issue