Recently there has been a lot of discussion about Y2K
This essay Recently there has been a lot of discussion about Y2K has a total of 2322 words and 13 pages.
Recently there has been a lot of discussion about Y2K,
or the millennium bug as it is known. Many people know that
the bug could be disastrous, but they do not know why it
cannot be fixed in time, or how it could have been
prevented. Because of the bug and its origin, society will
be affected in many areas, but the areas it will affect the
most are health, utilities, government, and business.
When programmers make programs they use dates several
times in the lines of the program. To save time, most
programmers would use only the last two numbers of the year
in the program. For example, they would use “99” instead of
using 1999. Therefore, when the year 2000 comes the date
that computer chips will read will be “00”, or 1900, when it
should actually read 2000.
In order to fix the program a programmer would have to
go through every line of programming and put a “19” in front
of the last two numbers of the year so that the program
would read the change in the millennium as 2000 instead of
“00”. This does not sound to be a difficult task at first,
but what most people do not understand is that a single
program can contain millions of lines of code in which the
date would appear in approximately every fifty lines of
code! To add to the task, most of the programs that will be
affected were written in a language called COBOL. This
language is very complex and undocumented (Vistica et al.
54). If even one date is accidentally missed in fixing the
program, the entire system will still fail because one wrong
date could contaminate the rest of the system (Devine n.p.).
This is the only way there is to fix the problem at the
present time though. The only problem with this method is
that before all programs can be fixed, the year 2000 will be
here. A couple extra years of time would have made a huge
difference in the preparation of the millennium bug.
Some people think that the bug will have a huge effect
on society, while others say the effects will be minute.
In the millennium bug, we have developed a
technological equivalent to natural forces. If
it is anywhere, it is everywhere. Nowhere at any
time in human history has there existed such a
problem. (Zuckerman n.p.)
Anything that has a computer chip in it could have some
problems (Reuters n.p.).
With all the problems arising at the present time,
people look to how it could have been prevented. The most
obvious way it could have been prevented is that programmers
should have typed the whole date in instead of just typing
the last two digits of the date. What most people do not
know however, is that we knew about this problem almost
fifteen years ago. In 1984 Paul Schoon uncovered the
problem, but nobody listened. He had his theory published
in magazines but programmers refused to deal with it at the
time (Devine n.p.). If people would have listened to him in
1984, there would have been plenty of time to fix the
glitch. Now people are wishing that they would have
listened because of the drastic effects that are being
uncovered in many areas of society.
The medical field will be affected in many ways. There
could be several computer mix-ups in hospitals due to the
bug. These computer glitches could have serious effects on
almost all equipment being used in hospitals(Reuters n.p.).
However, some newer equipment being used in hospitals has
been made compliant with the millennium bug. A recent
survey found that 73 percent of the nations manufacturers of
biomedical equipment had performed tests on their devices.
Of the 73 percent that had performed tests, 47 percent said
that their devices would not suffer effects of the
millennium bug (Ante n.p.) Hospitals do not have the time
or the money to update all of their equipment in time
though. Medical equipment may not stop working, but data
readouts will be affected. These readouts provide doctors
with vital information about the patient’s status (Vistica
et al. 56). Without these readouts doctors will be lost and
Obviously doctors will not be the only ones who will
see the consequences of the bug as stated by Ackerman:
The problem extends far beyond hospital wards.
Many patients, such as diabetics, self-medicate
using computerized equipment at home, he said,
while other types of institutions, including
nursing homes, are increasingly reliant on
high-tech monitors and drug delivery
systems.(Vistica et al. n.p.)
Patients who need radiation treatments may be affected at a
Topics Related to Recently there has been a lot of discussion about Y2K
Software bugs, Software engineering, COBOL, Hazards, Year 2000 problem, Neuropsychology, Problem solving, Computer, Vulnerability, Digital on-screen graphic, Computing
Essays Related to Recently there has been a lot of discussion about Y2K
The wave of the future is drowning out very quickly All the technology The wave of the future is drowning out very quickly. All the technology we have created will bit the dust before the systems really are used. At the end of the century all systems that have calendars to monitor systems or use calendars to show dates will shut down all at once. Major electronic systems such as elevators, alarm systems, fax machines, telephones, cars with computer systems will be nothing more than paper weights or wall designs nothing more. For years computers and electronic equi
Abstract EXAMPLESAbstract EXAMPLES This paper describes an empirical life cycle model and uses it to predict the behavioral responses to a change in the Social Security Disability Insurance (SSDI) program known internally within the Social Security Administration as the “$1 for $2 benefit offset”. This policy has not been enacted yet, but has been actively supported by disability advocates as a way to provide greater incentives for SSDI benefi-ciaries who have fully or partially recovered from their disabilities
Published Word of Mouth Referable Consumer-Published Word of Mouth: Referable, Consumer- Generated Information on the Internet April 2002 Published Word of Mouth: Referable, Consumer- Generated Information on the Internet Abstract Consumer-to-consumer communication about products and services, often known as “word of mouth” (WOM), is an important source of marketplace information. The Internet is becoming an increasingly active medium for this type of communication. We describe the ways in which word-of-mouth information is communicated
How Bill Gates Changed The WorldHow Bill Gates Changed The World Bill Gates, the single richest man alive. Yet he his days that started as a hacker where not always glorious, the way that he rode up to the top doing what he does best (hacking) make him a very interesting person to learn about. Today Bill Gates gives generously to the population and is nothing short of a great man. He used a lot of Homo Faber in his work, as he and his best friend (Paul Allen, Co-Founder of Microsoft) created many programs during there free tim
Java Applet Security ProblemsJava Applet Security Problems 1) Introduction: For most people, their first exposure to the Java programming language was in late 1995, when Netscape Navigator began running apples, small Java programs that ran within a World Wide Web browser, At the time, this was a revolutionary development for the Web, because applets were the first interactive content that could be delivered as part of a Web page. Although you can do similar things with Macromedia Flash, Microsoft ActiveX, and other technolo
Security On The WebSecurity On The Web Security on the Web, By Sina How do you secure something that is changing faster than you can fix it? The Internet has had security problems since itï¿½s earliest days as a pure research project. Today, after several years and orders of magnitude of growth, it still has security problems. The Internet is being used for a purpose for which it had never intended to be used for. It is somewhat ironic that the early Internet was design as a prototype for a high-availability comma
Introduction Introduction Object Orientation has become more and more important in the last years. Object oriented programming was designed for re-use of codes. It is a type of programming in which programmers define not only the data structure, but also the types of operations that can be applied to the data structure. In this way, the data structure becomes an object that includes both data and functions. In addition, programmers can create relationships between one object and another. For example, object
Y2K Year 2000 Problem Y2K (Year 2000 Problem) T h e Y e a r 2 0 0 0 P r o b l e m Argument for the statement The Year 2000 bug will have such extensive repercussions that families and individuals should begin planning now for the imminent chaos. The Ticking Bomb Introduction A serious problem called the Millennium Bug, and also known as the Year 2000 Problem and Y2K, is bringing a new century celebration into a daunting nightmare. In the 1860s and 1970s, when computer systems were first built, the computer h
The Y2K BugThe Y2K Bug Introduction The year 2000 problem could have been completely prevented had some early people envisioned the degree to which the microprocessor would change our lives. Surely, no one would have thought that in the early days of ENIAC that everything from your alarm clock to your car would be computerized. Even the IT managers of the 80's could not be blamed: The disk space savings from dropping the two digits of the date over 100 Million Records would represent almost 200 Megabytes!
The Year 2000 Computer ProblemThe Year 2000 Computer Problem by John Muirhead-Gould Last updated: 12/12/98. New email address- the one from school- Mount Union College New: I've added listings of some books that I would recommend reading about the millennium bug. Take a look at them here. This is a term paper I did for English IV my senior year at Central Catholic High School (in Canton, Ohio). If you have any comments, feel free to email me and I would be more than happy to discuss this topic with you. Please be aware that
The Success of MicrosoftThe Success of Microsoft Advanced English Microsoft has become a very large, industrious, competitive and successful business company over the years. Hard work and persistence have accomplished this since it’s beginning. Bill Gates has never given up his dream for the Microsoft Corporation, and never will for years to come (Lowe 73). This paper will attempt to cover how the corporation of Microsoft has become so successful over the years. Bill Gates and Paul Allen worked together for many years,
Computer ProgrammerComputer Programmer As a computer programmer you design and create the software tools that make computers tick and computer users sail through their tasks. You analyze, design, develop, test, and maintain computer and Internet-based applications. You evaluate the project requirements, participate in design meetings, determine the best solution to a problem or feature, and develop detail design specifications. You use development tools and programming languages in creating software. You identify
PiracyPiracy October 28, 1996 Ian Sum Recently, The Toronto Star published an article entitled RCMP seizes BBS, piracy charges pending. The RCMP have possessed all computer components belonging to the 90 North bulletin board system in Montreal, Quebec. The board is accused of allowing people the opportunity to download (get) commercial and beta (or commercial) software versions. I feel that the RCMP should not charge people that are linked to computer piracy, because the pirated software offers va
INTEL Knows Best A Major Marketing MistakeINTEL Knows Best? A Major Marketing Mistake Problem Statement When Thomas Nicely, a mathematician at Lynchburg College in Virginia, first went public with the fact that Intel's new Pentium chip was defective Intel admitted to the fact that it had sold millions of defective chips, and had known about the defective chips for over four months. Intel said its reasoning for not going public was that most people would never encounter any problems with the chip. Intel said that a spreadsheet user doing
Are Good Computer Viruses Still a Bad IdeaAre Good Computer Viruses Still a Bad Idea? Vesselin Bontchev Research Associate Virus Test Center University of Hamburg Vogt-Koelln-Str. 30, 22527 Hamburg, Germany [email protected] [Editor's note: Vesselin's current email address is [email protected]] During the past six years, computer viruses have caused unaccountable amount of damage - mostly due to loss of time and resources. For most users, the term computer virus is a synonym of the worst nightmares that can
Computer VirusesComputer Viruses A virus is a program that copies itself without the knowledge of the computer user. Typically, a virus spreads from one computer to another by adding itself to an existing piece of executable code so that it is executed when its host code is run. If a virus if found, you shouldn't panic or be in a hurry, and you should work systematically. Don't rush! A Viruse may be classified by it's method of concealment (hiding). Some are called stealth viruses because of the way that they h
Computer CrimeComputer Crime Computer crimes need to be prevented and halted thought increased computer network security measures as well as tougher laws and enforcement of those laws in cyberspace: Computer crime is generally defined as any crime accomplished through special knowledge of computer technology. All that is required is a personal computer, a modem, and a phone line. Increasing instances of white-collar crime involve computers as more businesses automate and information becomes an important asset
Get Informed - Buying The Right ComputerGet Informed! - Buying The Right Computer Buying the right computer can be complicating. Because of this many people are detoured from using or purchasing a very beneficial machine. Some people have questions about memory, Windows95, and choosing the best system to purchase. Hopefully, I can clear up some of this terms and inform you on what hardware is available. How much memory do you really need? As much as you can get. Due to todays sloppy programmers, you can't have too much memory. Today's
Electronic crime electronic crime electronic crime: In the past decade, computer and networking technology has seen enormous growth. It is now possible for people all over the world to communicate and share information from virtually anywhere. This growth however, has not come without a price. With the advent of the Information Highway , as it's coined, a new methodology in crime has been created. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- [Category]: Law [Paper Title]: electron
Economic EspionageEconomic Espionage Economic Espionage A small Mississauga electronics safety equipment company is broken into. Although filing cabinets and desks were rummaged through, nothing was seemingly taken. An officer discovered the company had drawn up a bid for $7 million dollar contract a day or so before the break-in. The contract in question was for a foreign country. It was later discovered that the company in question was known for its aggressive economic espionage. An iron ore shipping company wa
Computer virusescomputer viruses Title Computer Viruses Thesis Statement This report on Computer Viruses will include a identification of Computer Viruses, as well as analyzation of Computer Viruses. Outline 1. Introduction a. New form of Computer Viruses. b. What a Computer Viruses is. 2. Body a. Basic Definitions b. Preventive Action c. Worms d. Human Threats e. Hackers f. Phone Phreaks g. Configuration Errors and Passwords h. Internal Threats i. Information Dissemination 3. Conclusion a. What will become of