The Year 2000: Enough Crises for Everyone Art Hendela, President Hendela System Consultants, Inc. Home of the SCANALYZER Year 2000 Solution Lyndhurst,

Slides:



Advertisements
Similar presentations
Test process essentials Riitta Viitamäki,
Advertisements

StormingForce.com Motion. StormingForce.com StormingForce’s technology is significantly increasing productivity and quality of manual repetitive tasks.
Gate Entry Planned Flow of the Software # 004 = Gate Entry.
Review Questions Business 205
Project Planning and Management in E-Discovery DAVID A. ELLIS – MAYER BROWN BROWNING E. MAREAN – DLA PIPER.
Organisational policies
Software Quality Assurance Inspection by Ross Simmerman Software developers follow a method of software quality assurance and try to eliminate bugs prior.
Rafiki Airways Online Booking and Check-in system.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 7-1 Chapter 7 CHAPTER 7 THE EFFECT OF INFORMATION TECHNOLOGY ON THE AUDIT.
Feb. 2, 2004CS WPI1 CS 509 Design of Software Systems Lecture #3 Monday, Feb. 2, 2004.
1 Testing. 2 About Testing  The reason the program is in testing is that it probably doesn’t work!  We test to find bugs before our users and hope that.
Computers: Tools for an Information Age
SCANALYZER Software, Foxpro, and the Year 2000 Art Hendela, President Hendela System Consultants, Inc. Home of the SCANALYZER Year 2000 Solution Lyndhurst,
Processing Integrity and Availability Controls
IT is our job! Mind your own business.. 1.Consulting 2.Support 3.Maintenance Network Assessment We provide you with an overview of your current network,
1 How to Write a Test Plan? A Case Study. 2 What Must be Included? Introduction Test Spec Test Plan Test Procedure Unit Test Integration Test Validation.
Chapter 13 Auditing Information Technology
Systems Analysis Chapter 8 P 94 to P 101
Online banking Using the internet for your banking.
INDOT’s Scheduling / Project Management System (SPMS) Vision & Objectives for Next Generation SPMS Mike Jenkins, Indiana DOT Teresa Franklin, Info Tech,
SYSTEM LIFE CYCLES. OBJECTIVES o Be able to describe the stages of development of a hardware/software system. o Know what the different stages of the.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 14 Systems Analysis and Design: The Big Picture.
Standard Grade Computing COMMERCIAL DATA PROCESSING CHAPTER 13.
The Year 2000: Hardware and Software Issues Art Hendela, President Hendela System Consultants, Inc. Home of the SCANALYZER Year 2000 Solution Lyndhurst,
March 2008 Electronic Billing (EB) Developed by the Department of Developmental Services Developed by the Department of Developmental Services.
Chemical Engineering Helps Art Hendela, President Hendela System Consultants, Inc. Home of SCANALYZER Analysis Software Lyndhurst, NJ
The Islamic University of Gaza
Transaction Processing Systems and System Development Life Cycle
Licitware a forensic software tool designed to investigate computer crimes.
Risk Management A Key Project Management Knowledge Area.
1 Advanced Computer Programming Project Management: Methodologies Copyright © Texas Education Agency, 2013.
CIS 321—IS Analysis & Design Chapter 4: Analysis— Investigating System Requirements.
The Computer vote ! The Way of the Future ?. The old-fashioned way is the way! The mind set of most people. (it was good enough for dad, it’s good enough.
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
Project Tracking. Questions... Why should we track a project that is underway? What aspects of a project need tracking?
Thomas L. Gilchrist Testing Basics Set 6: Use Cases, Audits, and Meetings By Thomas L. Gilchrist, CSQE, CSQA 2009.
The Requirements BEARS GROUP Rebecca A Barfield M Atiq siddiqui Nick Shahab Karen Soltis Nidian Torres.
End HomeWelcome! The Software Development Process.
CDP Standard Grade1 Commercial Data Processing Standard Grade Computing Studies.
Presented by: Masoud Shams Ahmadi February 2007 Enterprise Resource Planning (ERP) Selection Presented by: Masoud Shams Ahmadi
(A radical interpretation) Tomo Lennox Bow Tie computer services Why Agile Works.
System Development Lifecycle Verification and Validation.
What Counts for a DBA Observant Louis Davidson
Slide 6.1 © The McGraw-Hill Companies, 2002 Object-Oriented and Classical Software Engineering Fifth Edition, WCB/McGraw-Hill, 2002 Stephen R. Schach
Database What is a database? A database is a collection of information that is typically organized so that it can easily be storing, managing and retrieving.
Building Marketing Databases. In-House or Outside Bureau? Outside Bureau: Outside agency that specializes in designing and developing customized databases.
Test and Review chapter State the differences between archive and back-up data. Answer: Archive data is a copy of data which is no longer in regular.
Verification & Validation F451 AS Computing. Why check data? It’s useless if inaccurate. Also, wrong data: Can be annoying Can cost a fortune Can be dangerous.
Systems Development The Kingsway School. Systems Development This is carried out when a company is having a problem. They usually employ an ICT Consultant.
Are You Ready for 2000? Art Hendela, President Hendela System Consultants, Inc. Home of the SCANALYZER Year 2000 Solution Lyndhurst, NJ SCANY2K
TAXCO BUSINESS SERVICES INC. Division of Des-Dawn Corporation BOOKKEEPING | PAYROLL | TAX FILING | TAX PLANNING | CONSULTING INTRODUCING TAXCO BILL PAY.
“Medical Identity Theft” February 9th 2016
Verification & Validation
GCSE ICT 3 rd Edition The system life cycle 18 The system life cycle is a series of stages that are worked through during the development of a new information.
1 The System life cycle 16 The system life cycle is a series of stages that are worked through during the development of a new information system. A lot.
 The laws vary from state to state. The California Medical Association website states:  There is no general law requiring a physician to maintain records.
KEEPS – a system for UELMA preservation and security
Electronic Data Processing Systems Chapter 6.
Project planning The systems life cycle.
Software Verification and Validation
Systems Analysis and Design
Systems Design, Implementation, and Operation
Mary Torjussen A2 ICT Week 1.
“Would I have to do this all by myself …….?”
Unit 6: Application Development
CHAPTER 15 AUDITING EDP SYSTEMS.
Chapter 11 The Accounting Information System
CompSci 1: Principles of Computer Science Lecture 1 Course Overview
What is a System? A system is a collection of interrelated components that work together to perform a specific task.
Presentation transcript:

The Year 2000: Enough Crises for Everyone Art Hendela, President Hendela System Consultants, Inc. Home of the SCANALYZER Year 2000 Solution Lyndhurst, NJ SCANY2K

Where are you Dec 31, 1999 at 11:59 PM? u Times Square watching the ball drop? u The Millennium Gala with champagne? u The Concorde going around the world? u Home with your friends and family? u At your PC hoping your computer applications work in one minute?

What is the Millennium Bug? u A $600 billion problem (Gartner Group) u A resource headache (4 million years of work for 2 million programmers) u A hit on your company’s bottom line u A deadline you can’t slip u A stress test every day at work u A time for real good tools to help you

How did this happen? u Conserved computer resources with 2 digit dates during 1960’s, 70’s. u Copied established techniques from old code. u Believed systems would be replaced by now. u Eased data input. People like to input less digits for dates.

What should you check? u Record center vendor u In-house Records Management system u Third party Records Management system u Facilities management systems u PC and Mainframe hardware, operating systems, and software u Staffing levels

Records Management Legal Worries u Keep records too long because destruction date never occurs (1900). u Destroy wrong records due to incorrect retention schedule dates. u Can’t find records in a certain date range while searching for legal evidence. u Follow-up notices come too late.

Record Management Operational Worries u Bar codes rejected because ‘00’ for year is invalid. u Vaults won’t open because security system can’t process the date as valid. u Fire systems cut off because maintenance has not been performed. u Can’t call to place an order - the phone system doesn’t work.

Records Management Inconveniences u Activity Logs sorted incorrectly. u Budget programs don’t work so you aren’t funded. u Optical disk files listed with wrong dates. u Activity bills not calculated correctly.

How do you fix the problem? u Identify resources to help in all phases. u Assess the size of the problem. u Select tools to help fix the problem. u Prepare a triage plan. u Remediate the source code. u Test the fixes in separate environment. u Implement the fixes.

Where do you get more information? u Websites: u u u u Magazines: u Year/2000 Journal u NJ Y2K User Group - Mike Cervine,

Summary u Reviewed the history of the problem and how it occurred. u List potential Records Management Legal, Operational, and Inconvenient. u Outlined how to perform a Y2K project and select tools. u Gave sources for more information.

Who is Hendela System Consultants? u Consulting and software company based in Lyndhurst, NJ. u Established in 1988 as a custom program shop. u Clients include many Fortune 500 companies and government agencies. u Developed SCANALYZER software to aid Year 2000 analysis for major international bank.