Are You Ready for 2000? Art Hendela, President Hendela System Consultants, Inc. Home of the SCANALYZER Year 2000 Solution Lyndhurst, NJ 1-888-SCANY2K WWW.SCANY2K.COM.

Slides:



Advertisements
Similar presentations
Test process essentials Riitta Viitamäki,
Advertisements

Chapter 4 Infrastructure as a Service (IaaS)
1 Computer Technician Computer Trouble Shooting & Repair Process Copyright © Texas Education Agency, All rights reserved.
Organisational policies
CS 501: Software Engineering Fall 2000 Lecture 27 Software Engineering as Engineering.
Information systems Integrity Protection. Facts on fraud  UK computer fraud 400 Million £  on companies  avg case £  France.
Business Continuity and DR, A Practical Implementation Mich Talebzadeh, Consultant, Deutsche Bank
SCANALYZER Software, Foxpro, and the Year 2000 Art Hendela, President Hendela System Consultants, Inc. Home of the SCANALYZER Year 2000 Solution Lyndhurst,
May 10, 2001An Overview of the Princeton University Web 1 Undergraduate Student Government Portal  History - Found at
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
AUSTIN ENERGY’S BILLING SYSTEM CAN’T LIGHT UP Handles electrical water and waste disposable for a city of Austin, Texas and surrounding countiies Serving.
PROFITABLE INVENTORY CONTROL SYSTEMS Your Complete Software System Integrator ProcessTrakker – Visually Tracking your Manufacturing Process.
WHAT’S A TECHNOLOGY SYSTEM? A technology system is a machine that processes digital data. A computer is a technology system. A computer installation is.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
SYSTEM LIFE CYCLES. OBJECTIVES o Be able to describe the stages of development of a hardware/software system. o Know what the different stages of the.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 14 Systems Analysis and Design: The Big Picture.
The Year 2000: Hardware and Software Issues Art Hendela, President Hendela System Consultants, Inc. Home of the SCANALYZER Year 2000 Solution Lyndhurst,
Chapter 22 Systems Design, Implementation, and Operation Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 22-1.
© Janice Regan, CMPT 128, Jan CMPT 128 Introduction to Computing Science for Engineering Students Creating a program.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Chemical Engineering Helps Art Hendela, President Hendela System Consultants, Inc. Home of SCANALYZER Analysis Software Lyndhurst, NJ
Information Systems Security Computer System Life Cycle Security.
Transaction Processing Systems and System Development Life Cycle
“EDI Solutions right sized for any size business” Drop Ship Vendor Solutions.
Faye Business Systems Group presents: The Top 10 Reasons Why CRM Implementations Fail.
EHR in Long Term Care: Are you ready?.  EHR – Electronic Health Record  Also known as EMR – Electronic Medical Record  Capturing Resident Health Information.
The Basic Input/Output System Unit objectives: Access the BIOS setup utility, change hardware configuration values, and research BIOS updates Explain the.
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
Software testing basic. Main contents  Why is testing necessary?  What is testing?  Test Design techniques  Test level  Test type  How to write.
End HomeWelcome! The Software Development Process.
A. Description Provide details of the project Identify which corridor, states, districts impacted Understand the Private sector involved Is it a domestic.
Change Management: Getting User Buy-In Karen Coffman Katie Lutes.
Database What is a database? A database is a collection of information that is typically organized so that it can easily be storing, managing and retrieving.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Operating Systems Networking for Home and Small Businesses – Chapter.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Dropbox security glitch CASE STUDY Lewis Scaife SYSM 6309 Advanced Requirements Engineering Summer 2013 Professor – Dr. Lawrence Chung.
Test and Review chapter State the differences between archive and back-up data. Answer: Archive data is a copy of data which is no longer in regular.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 4 1 Chapter 4: Basics of Preventive Maintenance and Troubleshooting IT.
20 October Management of Information Technology Chapter 6 Chapter 6 IT Infrastructure and Platforms Asst. Prof. Wichai Bunchua.
Verification & Validation F451 AS Computing. Why check data? It’s useless if inaccurate. Also, wrong data: Can be annoying Can cost a fortune Can be dangerous.
Retail Transaction Processing Year End Review and Recent Issues RMS January 2007.
GCSE ICT Systems Analysis. Systems analysis Systems analysis is the application of analytical processes to the planning, design and implementation of.
Chapter 1: Fundamental of Testing Systems Testing & Evaluation (MNN1063)
Program Development Cycle
Systems Development The Kingsway School. Systems Development This is carried out when a company is having a problem. They usually employ an ICT Consultant.
The Year 2000: Enough Crises for Everyone Art Hendela, President Hendela System Consultants, Inc. Home of the SCANALYZER Year 2000 Solution Lyndhurst,
1 Chapter 13 (Week 13) SYSTEMS MAINTENANCE AND EVALUATION Chapter 13: SYSTEMS MAINTENANCE AND EVALUATION Throughout its life, a system should operate effectively.
TAXCO BUSINESS SERVICES INC. Division of Des-Dawn Corporation BOOKKEEPING | PAYROLL | TAX FILING | TAX PLANNING | CONSULTING INTRODUCING TAXCO BILL PAY.
Verification & Validation
1 The System life cycle 16 The system life cycle is a series of stages that are worked through during the development of a new information system. A lot.
THE WHAT, WHY AND HOW OF OUTSOURCING INFORMATION SYSTEMS.
Year 2000 Project Outline Alex Khassin AM Computers.
MAJOR SOFTWARE FAILURES, WHY THEY FAILED AND LESSONS LEARNED BY AKPABIO UWANA.
1 Chapter 1- Introduction How Bugs affect our lives What is a Bug? What software testers do?
SOFTWARE FAILURES.
The Troubleshooting Process. Hardware Maintenance Make sure that the hardware is operating properly.  Check the condition of parts.  Repair or replace.
Project planning The systems life cycle.
Software Verification and Validation
Uses and Limitations of ICT
System Development Life Cycle (SDLC)
Systems Design, Implementation, and Operation
Information Technology Cornell notes
11/23/2018 3:03 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Making the System Operational Implementation & Deployment
Continuity Peter Smith, Director of Legal Sales
PROFITABLE INVENTORY CONTROL SYSTEMS
System Development Life Cycle (SDLC)
Version Control CS169 Lecture 7 Prof. Aiken CS 169 Lecture 7 1.
Software Requirement and Specification
The Web Development Life Cycle
Presentation transcript:

Are You Ready for 2000? Art Hendela, President Hendela System Consultants, Inc. Home of the SCANALYZER Year 2000 Solution Lyndhurst, NJ SCANY2K

Where are you Dec 31, 1999 at 11:59 PM? u Times Square watching the ball drop? u The Millennium Gala with champagne? u The Concorde going around the world? u Home with your friends and family? u At your PC hoping your computer applications work in one minute?

What is the Millennium Bug? u A $600 billion problem (Gartner Group) u A resource headache (4 million years of work for 2 million programmers) u A hit on your company’s bottom line u A deadline you can’t slip u A stress test every day at work u A time for real good tools to help you

How did this happen? u Conserved computer resources with 2 digit dates during 1960’s, 70’s. u Copied established techniques from old code. u Believed systems would be replaced by now. u Eased data input. People like to input less digits for dates.

What should you check? u In-house developed systems u Third party developed systems u Facilities management systems u PC and Mainframe hardware, operating systems, and software u Staffing levels

Legal Worries u Directors and upper management are personally liable for problems. u SEC Fines for under reporting Y2K impact. u Client damage awards for product failure. u IRC 482 of the IRS code may limit corporate wide solutions.

Operational Worries u Manufacturing systems fail. u Doors won’t open because security system can’t process the date as valid. u Fire systems cut off because maintenance has not been performed. u Can’t call to place an order - the phone system doesn’t work.

Inconveniences u Reports sorted incorrectly. u Budget programs don’t work so you aren’t funded. u Disk files listed with wrong dates. u Bills not calculated correctly.

How do you fix the problem? u Identify resources to help in all phases. u Assess the size of the problem. u Select tools to help fix the problem. u Prepare a triage plan. u Remediate the source code. u Test the fixes in separate environment. u Implement the fixes.

Where do you get more information? u Websites: u u u u Magazines: u Year/2000 Journal u NJ Y2K User Group - Mike Cervine,

Summary u Reviewed the history of the problem and how it occurred. u List potential Legal, Operational, and Inconvenient. u Outlined how to perform a Y2K project and select tools. u Gave sources for more information.

Who is Hendela System Consultants? u Consulting and software company based in Lyndhurst, NJ. u Established in 1988 as a custom program shop. u Clients include many Fortune 500 companies and government agencies. u Developed SCANALYZER software to aid Year 2000 analysis for major international bank.