Y2K-it's
not a computer problem (part 2)
by Tim Romero
Last month we
discussed the importance of viewing Y2K as a risk-management problem rather than
as a computer problem. Addressed in this way, Y2K-readiness becomes very manageable.
This month, we'll cover the basic steps small and mid-sized businesses need to
take in order to get ready for the new millennium. Always keep in mind that your
goal should not necessarily be to ensure that your company is Y2K-compliant, but
to minimize the amount of money the Y2K problem will cost your organization.
The process described
in this article is embodied in Vanguard's free Y2K-COPE software package. Y2K-COPE
can greatly assist in locating potential Y2K-related problems and developing contingency
plans for them. Y2K-COPE can be downloaded from Vanguard's website at http://www.vanguardjp.com/y2k.
Understanding
compliance
There is still
some debate over the exact definition of "Y2K-compliant," but your goal is not
to make your enterprise Y2K-compliant, but to make it Y2K-ready. You do not need
to ensure that a system is Y2K-compliant, only that it will perform the job you
require of it and, if it fails, you must develop appropriate an contingency plan.
For hardware and
software products, almost all the information you need can be found at the vendors'
websites.You will find that most systems are either rated fully compliant or can
be upgraded to fully compliant versions with little trouble. There will be cases,
however, when there will be no fully compliant version available, and the software
will be rated as "compliant with issues." Most vendors provide detailed information
about these defects (again, at their websites), and most such bugs are minor.
A quick review of the information will give you a picture of how specific bugs
may affect your company.
Understanding
dependence
Evaluating software and hardware is by far the simplest part of assessing Y2K-readiness.
An important but often overlooked component is the dependency chain. This applies
to computer systems (a Y2K-compliant application requires a Y2K-compliant OS,
which requires Y2K compliant hardware), to business processes (a Y2K-compliant
fulfillment system will be useless if the PBX fails), and to your business as
a whole. If your suppliers and outsourcers cannot function properly, then there
is a good chance that you will not be able to either.
At first, the scope
of the dependency chain seems overwhelming, but evaluating it is really just a
matter of getting organized, and software like Y2K-COPE can be quite helpful when
mapping out your dependency chain, determining how the failure of one link will
affect other systems, and in developing contingency plans for such possibilities.
And remember, you don't have to determine if other companies are Y2K-compliant,
but only if they will be able to fulfill their obligations to you.
Stay up-to-date
Of all the steps involved in Y2K-readiness, keeping compliance information up-to-date
is the most often overlooked. There is a strong tendency to believe that once
you have evaluated your systems, mapped out your dependency chain, and developed
your contingency plans, the job is done. It's not. The compliance status of software
changes, and may change frequently. Software rated as compliant goes back into
testing and re-emerges as "compliant with issues." Likewise, new defects are discovered
in software already so rated. It is essential that you revisit vendor's websites
to learn about these new issues and determine how they will affect you and your
company.
Closing thoughts
Those who read my other articles on the subject or have attended my Y2K lectures
will be aware that I don't see the world ending on January 1, 2000, and that I
place very little stock in the prolific purveyors of doom. In fact, everything
we have seen so far has been very reassuring.
Most computer systems
have been processing dates in the next millennium for some time now. Banks have
no trouble writing 30-year mortgages, and many companies are already operating
in FY2000. We have not seen widespread computer failures. Even in terms of software
rectification, the picture is far from bleak. Y2K-rectification programs in various
industries are very similar in scope to those that were required in the financial
industry by the introduction of the Euro. Again, there were no significant failures.
It's easy to understand
why the millennium is attracting so much attention in the computer field, but
a bit harder to understand the social and cultural importance people are attaching
to it. After all, in a physical sense, the millennium does not even exist. We
invented it. The year 2000 is strictly a figment of mankind's imagination. The
sun will rise and set just as it has for millions of millennia already. The only
significance the day will have is that which we give it. Of course, most people
don't see it that way, and that's a good thing.
For every purveyor
of millennial doom, there are ten who see the beginning of a new era. People are
seeing the coming millennium as a time of reconciliation and a chance to make
long-overdue changes. And since Y2K is ultimately and entirely our creation, it
seems certain that this is what it will become.
Decades from now,
the phrase "The Y2K Problem" will have an odd and perhaps somewhat quaint ring
to it. By that time, Y2K will not be remembered as a time of short-term computer
failures, but as a time of positive change and of new beginnings. I for one am
looking forward to it wholeheartedly.
Tim Romero writes
regularly on technology issues.
Contact him at t3@t3y.com
Back
to the Table of Contents
Comments
or suggestions?
Contact cjmaster@cjmag.co.jp
|