The Year 2000 Software Systems Crisis: Challenge of the Century

Overview

Don't just resolve the Year 2000 software crisis: Leverage it for competitive advantage!

By now, many IT organizations have realized that their business-critical applications contain code that will fail on January 1, 2000. But exactly how serious is your organization's problem--and what's the best way to resolve it?

In The Year 2000 Software Crisis: Challenge of the Century, two leading IT consultants deliver a comprehensive blueprint for ...

See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (8) from $1.99   
  • New (2) from $34.79   
  • Used (6) from $0.0   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$34.79
Seller since Wed Aug 06 13:32:10 EDT 2014

Feedback rating:

(1)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
PAPERBACK New 0136556647 Brand New US Edition Book in Perfect Condition. Fast Shipping with tracking number.

Ships from: Houston, TX

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$105.00
Seller since Tue Oct 07 09:37:03 EDT 2014

Feedback rating:

(184)

Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

Don't just resolve the Year 2000 software crisis: Leverage it for competitive advantage!

By now, many IT organizations have realized that their business-critical applications contain code that will fail on January 1, 2000. But exactly how serious is your organization's problem--and what's the best way to resolve it?

In The Year 2000 Software Crisis: Challenge of the Century, two leading IT consultants deliver a comprehensive blueprint for evaluating and responding to the Year 2000 crisis in your company. While there's no silver bullet, you'll learn the basic building blocks and guiding principles that apply to all Year 2000 initiatives. With unprecedented detail, the authors show how to:

  • Select the best migration approach and methodology.
  • Coordinate with customers, suppliers and other external stakeholders.
  • Budget and manage Year 2000 projects.
  • Implement, deploy and validate the solutions you choose.
  • Choose and acquire the appropriate tools.
  • Evaluate outside services--and write better RFPs for obtaining them.

Most important, you'll learn how a Year 2000 project can serve as a catalyst for strategic change--and how to leverage the knowledge you gain for competitive advantage throughout your organization.

The Year 2000 Software Crisis also contains coverage targeted at smaller IT organizations, as well as an extensive list of tool vendors, consulting firms and conversion companies, sample forms, a glossary, and a meta-model for project tracking deliverables.

Whether you're an IT manager, software vendor, or senior business manager, it's time to move full-speed ahead on resolving your Year 2000 crisis. With this book, you'll get the job done right.

Read More Show Less

Product Details

  • ISBN-13: 9780136556640
  • Publisher: Prentice Hall Professional Technical Reference
  • Publication date: 2/6/1997
  • Series: YOURDON Press Computing Series
  • Edition number: 1
  • Pages: 624
  • Product dimensions: 7.05 (w) x 9.30 (h) x 1.02 (d)

Read an Excerpt

PREFACE: This book is about the pending Year 2000 software crisis. It is a surprisingly mundane problem with far-reaching consequences. When the first business programs were written in the 1950s, who would have believed that the decision to store years as two digits, say, 57, rather than four digits, 1957, would have tremendous ramifications forty years later? These programmers would have been astonished to find that many of their programs and the data associated with those programs are still in use. Unfortunately, the Year 2000 issue is not limited to 40-year-old programs. Originally devised to save expensive hardware resources, this shortcut found its way into the standard programming methods employed throughout the computer industry. Even the newest PC software may still reference years in a two-digit format.

In one way or another, Year 2000 issues touch the life of almost every person who directly or indirectly relies on computers. Many computer professionals will spend a large percentage of their time over the next five to six years reprogramming software to correctly process century-related data, or handling the consequences of incorrect date processing. Businesses will face a multitude of expected and unexpected problems. Reports will be sorted incorrectly, date-based calculations will be wrong, and data co mparisons that include date values will produce unwanted results. Some of these consequences will be minor annoyances. Other consequences will cause serious financial losses as inventory systems order unnecessary replacements, financial transactions are incorrectly posted, and customers are dropped from master files. And given our litigious society, many of theseissues will end up in court.

The pervasiveness of computers and computer-generated data and services in modern society means that even individuals who have never used a computer can and will be affected. They will suffer the consequences of Year 2000-related breakdowns within both government and business institutions. Even if the problem is corrected in time, they will in some way pay a portion of the bill. The worldwide cost of the problem has been estimated in the hundreds of billions of dollars.

After a slow start, the Year 2000 crisis is finally gaining public attention. In our travels and work with clients, we have been surprised to find people from all walks of life who have heard about the problem. While a few leading edge companies and government agencies recognized the problem early, much of the Information Technology (IT) industry has been in a state of denial. The first individuals who raised Year 2000 issues publicly were derided as millennium moaners and were viewed simply as consultants seeking a new way to make money. Many IT organizations simply felt that their applications would be replaced before century dates became a problem. In 1995, reality began to hit. In that year, there was one major industry conference on the topic. In 1996, there were over fifty. The topic has become front page news in the business press as well as in the computer media. Suddenly, a major market appeared for consulting vendors and software firms.

IT organizations have progressed from inaction to panic as they begin to comprehend the magnitude of the problem. Their panic has been fed by the media and the public relations efforts from the growing multitude of software vendors and consultants in the marketplace. Conflicting stories abound. Rumors of magic bullets and other shortcuts are interspersed with horror stories of impending failures and outrageous costs. Lost in this maelstrom is a coherent method for solving the problem. Providing that method to a wide variety of organizations is the goal of this book.

We began work on the Year 2000 issue at the insistence of our client base. Our consulting efforts focused on helping clients assess their degree of exposure, related costs, understanding their options and constraints, and developing strategies to achieve Year 2000 compliance. Exposure to many IT organizations taught us that there are no magic solutions; there isn't even a single best strategy. There are, however, basic building blocks and guiding principles that apply to all Year 2000 initiatives. We found that by following these principles, an IT organization can assemble the right set of strategies, tools, internal resources, and consulting services to meet the unique needs of their organization. This knowledge is the foundation of this book.

Our intent is to expose our readers to the full range of possible issues and the multitude of solutions for those issues. Armed with this information, readers can separate market hype from reality as they develop the optimum Year 2000 solution for their organization.

Audience for this Book
This book is written for IT managers, business managers, software vendors, consultants, and other individuals that require an in-depth understanding of Year 2000 issues. It is written in four major sections: Year 2000 Overview, Issues and Strategies, Assembling a Solution, and Strategic Implications. These sections are designed to communicate multiple levels of understanding. Sectional chapter overviews are provided for readers requiring high-level knowledge, while more detailed information is provided for the project managers charged with implementing a Year 2000 project. This book is not intended to replace the need for a proper methodology. The breadth of the topic prevents the authors from duplicating the implementation knowledge available within a detailed Year 2000 methodology.
Nontechnical readers or senior executives requiring a high-level understanding of Year 2000 issues may wish to read the first section in its entirety and the overviews for each remaining section. Those charged with implementing a century-date compliant effort will want to read all sections in detail and use this book as an ongoing reference guide on the Year 2000 topic.

Summary of Contents
The Year 2000 overview section provides a high-level explanation of the Year 2000 issue and its effect on IT organizations. It provides readers with a realistic idea of what is wrong, the extent of the problem, what it will take to solve it, how to justify a solution effort and the importance of beginning immediately. It describes the specific ramifications of the Year 2000 problem and how these issues can affect a typical organization. These include ramifications outside of IT as well as internal issue s. These ramifications can be positive as well as negative, offering hope for gaining value from the migration effort. Finally, the overview section discusses impacts on specific industries and why some organizations and industries are at more risk than others.
he Issues and Strategies section describes the building blocks of a Year 2000 strategy. It demonstrates that Year 2000 projects encompass a wide range of issues that extend beyond simply changing code. These issues include:     * Asset management issues. Application software no longer exists solely on large, central computers. Nor is it the only software impacted by the Year 2000. Different issues arise, based on system type, age, technology, platform, and support levels.
    * Migration issues. Selecting the optimal migration approach for each application requires an understanding of the most common strategies and application characteristics that lead to optional approach selection. If multiple strategies are available, this section describes the benefits and risks of each choice.
    * Environmental issues and support technologies. The quality of the software and testing environment that supports the operation, maintenance, and migration of production systems is critical to the success of a Year 2000 migration. This section describes the type of environment needed to support a Year 2000 project and approaches for achieving this type of environment.
    * External organizations. Year 2000 compliance projects are not completely under the control of the IT organization. Companies share data and interfaces with many external organizations. Even when a century date conversion is the responsibility of an external entity, the timing and approach may have a profound impact on organizational functions. This section describes strategies for assessing and mitigating the risks associated with external organizational interfaces.
    * Management issues. The size and scope of a Year 2000 project is significantly larger than any single project previously faced by IT organizations. Studies have shown that most IT organizations are notoriously poor at meeting deadlines and budget commitments. Unless corrected, this weakness will be fatal in Year 2000 projects where there is no latitude in project scope or delivery dates. This section explores project management issues that must be overcome to ensure the success of major Year 2000 initiati ves.
Part 3, Assembling a Solution, describes the tasks needed to implement a Year 2000 project. It emphasizes the importance of planning and methods for creating a cost-effective, implementable solution. The chapters in this section are arranged by the phases of a typical Year 2000 project and are followed by guidance for selecting tools and consulting assistance. A chapter is included to cover the special requirements of small IT organizations. This section includes:
    * Strategies. High-level strategies for a formal process to guide Year 2000 planning, project implementation and tool utilization are covered in depth in this section.
    * Year 2000 budgeting. The size of the Year 2000 issue makes accurate, one-shot budgeting impossible. The reader is taken through a strategy of building a rolling budget that provides accurate and obtainable goals through the use of multiple industry budget models.
    * Project mobilization. Project Mobilization is the process of setting up a Year 2000 project. This section offers the reader guidance on the activities to be performed, the work products to be produced, office setup, and guidelines for estimating the effort required to implement the phase.
    * Enterprise assessment. The enterprise assessment phase of a Year 2000 project gathers the detailed information needed to select strategies, formalize a more concrete budget, and scope and conduct the implementation phase.
    * Implementation and deployment. This section describes the execution of the implementation phase of a Year 2000 project. This phase conducts the actual conversion of data and system and the production implementation of the software systems. The tasks and deliverables of this phase are described at a project management level along with analysis guidelines for conversion specialists. Techniques are described broadly but without excessive technical details. This section also includes a discussion on applicat ion package and system software upgrade projects.
    * Validation. Testing and validation will use as much as 50 percent of the typical Year 2000 migration budget. This section discusses the tools, infrastructures, and techniques needed to guarantee that the migrated applications will truly function in the year 2000. Two major approaches are covered.
    * Tool and technology selection. Year 2000 projects are too large and complex to be conducted without tools. This section describes the tool characteristics needed to support a Year 2000 project and the criteria for selecting and acquiring the right tools.
    * Small IT organizations. Small IT organizations may not have the budget or the resources available to establish a comprehensive Year 2000 delivery capability. This section is aimed at those organizations and should allow them to look toward various alternatives that will keep their systems running. This section also addresses the PC user.
    * Services selection. Most IT organizations will rely heavily on outside services to implement their Year 2000 strategies. This section guides IT management through the many variations of conversion assistance available for Year 2000 projects. It describes the pros and cons of each service option, as well as describing how to write a valid RFP to obtain these services.

The fourth section of the book describes the strategic implications of the Year 2000 initiative. Many organizations view Year 2000 projects as pure overhead-no business value is gained. Fortunately, this view is incorrect because IT organizations can take advantage of a Year 2000 project to position themselves for the future. This section describes how to apply the knowledge, tools, and techniques from a Year 2000 project to the long-term advantage of the IT organization. It also explores how the lessons f rom the Year 2000 project can be a catalyst for strategic change. The high cost of obtaining century compliance in legacy applications should inspire IT management to move beyond their traditional caretaker role to initiate strategic change.

Following the last section of the book is an appendix containing sources of assistance. This supplement provides a noninclusive list of tool vendors, consulting firms, and conversion companies. The appendixes also include sample forms and a meta-model for project tracking deliverables. A glossary defines terms used in the book.

Acknowledgments
This book could not have been written without the help of many dedicated individuals and companies. First, we would like to thank our wives, Anne Hayes and Kathy Ulrich, for their masterful job of editing the first drafts of each chapter and for putting up with many nights and weekends of their husbands working on their PCs.
The ideas within this book were not developed in a vacuum. Rather, they evolved over many years from many collective discussions, experiments, and use on consulting projects. It is impossible to acknowledge everyone by name, but we want to express our gratitude to our clients, Year 2000 conference attendees, software vendors, and consulting firms that have contributed to these ideas. Hopefully, we are able to repay some of this favor through this book.
Many software vendors and consulting firms contributed literature on their products and services as background materials for this book. These vendors are listed in Appendix A. These materials were very helpful for understanding the range of tools and services on the market. We greatly appreciated this assistance. We apologize in advance to any vendors who were inadvertently omitted.
We also wish to thank Paul Becker from Prentice Hall for believing in this project and supporting our writing efforts. We especially appreciated his astonishment at our ability to deliver the book manuscript on time. In addition, we want to thank Joanne Anzalone, our Prentice Hall production editor, for her efforts in turning our mingled prose into proper English.
Finally, we would like to thank the readers of this book. We sincerely hope that it helps you and your organization successfully survive the Year 2000 crisis. We wish you the best of luck on your projects.

Ian S. Hayes
Clarity Consulting
Marblehead, MA


William M. Ulrich
Tactical Strategy Group, Inc.
Soquel, CA

August, 1996
Read More Show Less

Table of Contents

Preface.
Audience for this Book. Summary of Contents. Acknowledgments.

PART 1. YEAR 2000: CRISIS OR OPPORTUNITY?


1. Separating Hype from Reality.
What Is the Year 2000 Issue? Implications and Risks Beyond the IT World. Six Common Myths of Century Compliance. Outside Help Is Available-But Beware of False Prophets. Terminology. Real Problem, Real Solutions, Real Opportunities.

2. Ramifications of the Year 2000 on Organizational Infrastructures.
Breakdown of Information Management Capability. Industry-Specific Risks and Levels of Readiness. Legal Ramifications of Noncompliance. Global View of the Year 2000 Challenge. Business Case for Correcting Year 2000. Call to Action: Why Expedite Implementation?

PART 2. ISSUES AND STRATEGIES.


3. Overviews of Issues and Solutions.
Asset Management Issues. Year 2000 Conversion Issues. Environmental Issues and Support Technologies. Relationships, External Entities, and Related Responsibilities. Management Issues.

4. Asset Management Issues.
Assessment Challenges. Conversion Strategies. New Developments. Software Categories.

5. Year 2000 Migration Issues.
Defining Standards and Guidelines For Year 2000 Compliance. Year 2000 Century Representation Issues. Interfaces Between Applications.

6. Environmental Issues and Support Technologies.
Obsolete Tools and Environments. Configuration Management. Common Date Routines. Migration Tool Requirements. Testing and Validation Facilities. Migration Work Environment.

7. Relationships, External Entities, and Related Responsibilities.
The Impact on Organizations within an Enterprise. The Impact on Business Relationships. The Impact on IT Vendor Relationships.

8. Management Issues.
Project Management. Project Ownership. Organizational Maturity and Readiness. Year 2000 Staffing Issues.

PART 3. ASSEMBLING A YEAR 2000 SOLUTION.


9. Enterprise Strategy for Year 2000.
Ten Common Mistakes in a Year 2000 Project. Sponsorship: An Executive's Role in a Year 2000 Project. Year 2000: An Evolutionary Planning Process. Formal Process to Address Year 2000. Getting Started on the Right Foot.

10. The Year 2000 Budget.
Year 2000 Budget Models and Costing Techniques. Phase I: Year 2000 Mobilization Budget. Phase II: Year 2000 Enterprise Budget. Phase III: Year 2000 Implementation Budget. Multiphased Budgeting: Putting it All Together.

11. Year 2000 Project Mobilization.
Mobilization Project Initiation. Year 2000 Project Office. Year 2000 Advisory Board. Distribution of Guidelines and Standards. System Inventory and Environmental Summary. Preliminary Risk Assessment. High-Level Project Strategy. Enterprise Assessment Project Plan. Mobilization Strategy for External Service Providers. Defining a Preliminary Year 2000 Budget. Mobilization Finalization.

12. Year 2000 Enterprise Assessment.
Enterprise Assessment: Roles and Skills Summary. Enterprise Assessment: Technology and Assessment Project Infrastructure Summary. Enterprise Assessment: Inventory Process. Business Area Risk Assessment. Upgrade Unit Segmentation Strategies. Upgrade Unit Migration Strategies. Existing IT Support Infrastructure Assessment. Year 2000 Implementation Infrastructure. Year 2000 Implementation Strategy Finalization. Pilot Project Planning. Enterprise Assessment Finalization and Ongoing Coordination.

13. Year 2000 Implementation and Deployment.
Implementation Roles and Skills Summary. Implementation Technology Summary. Infrastructure Upgrade Projects. Upgrade-Unit, Detailed-Design. Library and Environmental Setup. Upgrade Unit Date Field Expansion. Upgrade Unit Procedural Workaround. Upgrade Unit Package Upgrade Solution. Off-site Upgrade Unit Migration Project. Interface Creation, Activation, and Deactivation. Change Control, Quality Assurance, and Production Turnover. Central Project Office Communication and Status Reporting. Contingency Options and Project Finalization.

14. Validation Strategies.
Validation Roles and Skill Requirements. Validation Technology Requirements. Validation Planning and Preparation. Establishing a Validation Baseline. Year 2000 Validation: Functional Equivalence Testing. Year 2000 Compliance Certification Testing. Change Control and Code Synchronization. System and Integration Testing. Post-Implementation Audit Facility.

15. Year 2000 Tool and Technology Selection.
Technical Background. Tool Selection Criteria. Tool Categories.

16. Small Information Technology Organizations.
Defining the Small Organization or Business Unit. Problem Determination: How Do You Know You Have a Problem? Solutions and Strategies for Small IT Shops. Implementation Options for Small Companies. Solutions for Companies with No Full-time IT Staff. Options for Individual Personal Computer Users. Stay Aware, Be Calm, and Act Judiciously.

17. Selection of Year 2000 Service Providers.
Why Consultants? Consulting Strategies. Selecting Consulting Vendors. Writing an RFP.

PART 4. STRATEGIC IMPLICATIONS OF THE YEAR 2000.


18. Gaining Value from a Year 2000 Effort.
Foundation for Application Management. Enhanced Application Portfolio. An Environment for Future Support. Lessons for the Future.

19. Architecture Transition Strategies -Looking Beyond the Year 2000.
The Case for Transforming Legacy Architectures. Legacy Transition Meta-model: Baseline for Architecture Transition Planning. Leveraging a Year 2000 Project. Transition Mapping Approaches and Techniques. Data Warehouse Projects. Enterprise Data Interconnectivity. Package Selection and Assimilation. Code-Based System Migration Projects. Model-Driven Architecture Transition Projects. Adjusting the Focus of a Year 2000 Project. Beyond the Year 2000.

Appendix A. Vendor Lists.
Consulting Firms. Tool Vendors. Conversion Vendors. The Authors' Firms.

Appendix B. Year 2000 Survey Forms.
TSRM Year 2000 Enterprise Survey Form 047. TSRM Year 2000 System Survey Form 045.

Appendix C. Legacy Transition Meta-model (LTM).
LTM Baseline Object Definitions.

Glossary.
Index.

Read More Show Less

Preface

PREFACE: This book is about the pending Year 2000 software crisis. It is a surprisingly mundane problem with far-reaching consequences. When the first business programs were written in the 1950s, who would have believed that the decision to store years as two digits, say, 57, rather than four digits, 1957, would have tremendous ramifications forty years later? These programmers would have been astonished to find that many of their programs and the data associated with those programs are still in use. Unfortunately, the Year 2000 issue is not limited to 40-year-old programs. Originally devised to save expensive hardware resources, this shortcut found its way into the standard programming methods employed throughout the computer industry. Even the newest PC software may still reference years in a two-digit format.

In one way or another, Year 2000 issues touch the life of almost every person who directly or indirectly relies on computers. Many computer professionals will spend a large percentage of their time over the next five to six years reprogramming software to correctly process century-related data, or handling the consequences of incorrect date processing. Businesses will face a multitude of expected and unexpected problems. Reports will be sorted incorrectly, date-based calculations will be wrong, and data co mparisons that include date values will produce unwanted results. Some of these consequences will be minor annoyances. Other consequences will cause serious financial losses as inventory systems order unnecessary replacements, financial transactions are incorrectly posted, and customers are dropped from master files. And given our litigious society, many oftheseissues will end up in court.

The pervasiveness of computers and computer-generated data and services in modern society means that even individuals who have never used a computer can and will be affected. They will suffer the consequences of Year 2000-related breakdowns within both government and business institutions. Even if the problem is corrected in time, they will in some way pay a portion of the bill. The worldwide cost of the problem has been estimated in the hundreds of billions of dollars.

After a slow start, the Year 2000 crisis is finally gaining public attention. In our travels and work with clients, we have been surprised to find people from all walks of life who have heard about the problem. While a few leading edge companies and government agencies recognized the problem early, much of the Information Technology (IT) industry has been in a state of denial. The first individuals who raised Year 2000 issues publicly were derided as millennium moaners and were viewed simply as consultants seeking a new way to make money. Many IT organizations simply felt that their applications would be replaced before century dates became a problem. In 1995, reality began to hit. In that year, there was one major industry conference on the topic. In 1996, there were over fifty. The topic has become front page news in the business press as well as in the computer media. Suddenly, a major market appeared for consulting vendors and software firms.

IT organizations have progressed from inaction to panic as they begin to comprehend the magnitude of the problem. Their panic has been fed by the media and the public relations efforts from the growing multitude of software vendors and consultants in the marketplace. Conflicting stories abound. Rumors of magic bullets and other shortcuts are interspersed with horror stories of impending failures and outrageous costs. Lost in this maelstrom is a coherent method for solving the problem. Providing that method to a wide variety of organizations is the goal of this book.

We began work on the Year 2000 issue at the insistence of our client base. Our consulting efforts focused on helping clients assess their degree of exposure, related costs, understanding their options and constraints, and developing strategies to achieve Year 2000 compliance. Exposure to many IT organizations taught us that there are no magic solutions; there isn't even a single best strategy. There are, however, basic building blocks and guiding principles that apply to all Year 2000 initiatives. We found that by following these principles, an IT organization can assemble the right set of strategies, tools, internal resources, and consulting services to meet the unique needs of their organization. This knowledge is the foundation of this book.

Our intent is to expose our readers to the full range of possible issues and the multitude of solutions for those issues. Armed with this information, readers can separate market hype from reality as they develop the optimum Year 2000 solution for their organization.

Audience for this Book
This book is written for IT managers, business managers, software vendors, consultants, and other individuals that require an in-depth understanding of Year 2000 issues. It is written in four major sections: Year 2000 Overview, Issues and Strategies, Assembling a Solution, and Strategic Implications. These sections are designed to communicate multiple levels of understanding. Sectional chapter overviews are provided for readers requiring high-level knowledge, while more detailed information is provided for the project managers charged with implementing a Year 2000 project. This book is not intended to replace the need for a proper methodology. The breadth of the topic prevents the authors from duplicating the implementation knowledge available within a detailed Year 2000 methodology.
Nontechnical readers or senior executives requiring a high-level understanding of Year 2000 issues may wish to read the first section in its entirety and the overviews for each remaining section. Those charged with implementing a century-date compliant effort will want to read all sections in detail and use this book as an ongoing reference guide on the Year 2000 topic.

Summary of Contents
The Year 2000 overview section provides a high-level explanation of the Year 2000 issue and its effect on IT organizations. It provides readers with a realistic idea of what is wrong, the extent of the problem, what it will take to solve it, how to justify a solution effort and the importance of beginning immediately. It describes the specific ramifications of the Year 2000 problem and how these issues can affect a typical organization. These include ramifications outside of IT as well as internal issue s. These ramifications can be positive as well as negative, offering hope for gaining value from the migration effort. Finally, the overview section discusses impacts on specific industries and why some organizations and industries are at more risk than others.
he Issues and Strategies section describes the building blocks of a Year 2000 strategy. It demonstrates that Year 2000 projects encompass a wide range of issues that extend beyond simply changing code. These issues include:     * Asset management issues. Application software no longer exists solely on large, central computers. Nor is it the only software impacted by the Year 2000. Different issues arise, based on system type, age, technology, platform, and support levels.
    * Migration issues. Selecting the optimal migration approach for each application requires an understanding of the most common strategies and application characteristics that lead to optional approach selection. If multiple strategies are available, this section describes the benefits and risks of each choice.
    * Environmental issues and support technologies. The quality of the software and testing environment that supports the operation, maintenance, and migration of production systems is critical to the success of a Year 2000 migration. This section describes the type of environment needed to support a Year 2000 project and approaches for achieving this type of environment.
    * External organizations. Year 2000 compliance projects are not completely under the control of the IT organization. Companies share data and interfaces with many external organizations. Even when a century date conversion is the responsibility of an external entity, the timing and approach may have a profound impact on organizational functions. This section describes strategies for assessing and mitigating the risks associated with external organizational interfaces.
     * Management issues. The size and scope of a Year 2000 project is significantly larger than any single project previously faced by IT organizations. Studies have shown that most IT organizations are notoriously poor at meeting deadlines and budget commitments. Unless corrected, this weakness will be fatal in Year 2000 projects where there is no latitude in project scope or delivery dates. This section explores project management issues that must be overcome to ensure the success of major Year 2000 initiati ves.
Part 3, Assembling a Solution, describes the tasks needed to implement a Year 2000 project. It emphasizes the importance of planning and methods for creating a cost-effective, implementable solution. The chapters in this section are arranged by the phases of a typical Year 2000 project and are followed by guidance for selecting tools and consulting assistance. A chapter is included to cover the special requirements of small IT organizations. This section includes:
    * Strategies. High-level strategies for a formal process to guide Year 2000 planning, project implementation and tool utilization are covered in depth in this section.
    * Year 2000 budgeting. The size of the Year 2000 issue makes accurate, one-shot budgeting impossible. The reader is taken through a strategy of building a rolling budget that provides accurate and obtainable goals through the use of multiple industry budget models.
    * Project mobilization. Project Mobilization is the process of setting up a Year 2000 project. This section offers the reader guidance on the activities to be performed, the work products to be produced, office setup, and guidelines for estimating the effort required to implement the phase.
    * Enterprise assessment. The enterprise assessment phase of a Year 2000 project gathers the detailed information needed to select strategies, formalize a more concrete budget, and scope and conduct the implementation phase.
    * Implementation and deployment. This section describes the execution of the implementation phase of a Year 2000 project. This phase conducts the actual conversion of data and system and the production implementation of the software systems. The tasks and deliverables of this phase are described at a project management level along with analysis guidelines for conversion specialists. Techniques are described broadly but without excessive technical details. This section also includes a discussion on applicat ion package and system software upgrade projects.
    * Validation. Testing and validation will use as much as 50 percent of the typical Year 2000 migration budget. This section discusses the tools, infrastructures, and techniques needed to guarantee that the migrated applications will truly function in the year 2000. Two major approaches are covered.
    * Tool and technology selection. Year 2000 projects are too large and complex to be conducted without tools. This section describes the tool characteristics needed to support a Year 2000 project and the criteria for selecting and acquiring the right tools.
    * Small IT organizations. Small IT organizations may not have the budget or the resources available to establish a comprehensive Year 2000 delivery capability. This section is aimed at those organizations and should allow them to look toward various alternatives that will keep their systems running. This section also addresses the PC user.
    * Services selection. Most IT organizations will rely heavily on outside services to implement their Year 2000 strategies. This section guides IT management through the many variations of conversion assistance available for Year 2000 projects. It describes the pros and cons of each service option, as well as describing how to write a valid RFP to obtain these services.

The fourth section of the book describes the strategic implications of the Year 2000 initiative. Many organizations view Year 2000 projects as pure overhead-no business value is gained. Fortunately, this view is incorrect because IT organizations can take advantage of a Year 2000 project to position themselves for the future. This section describes how to apply the knowledge, tools, and techniques from a Year 2000 project to the long-term advantage of the IT organization. It also explores how the lessons f rom the Year 2000 project can be a catalyst for strategic change. The high cost of obtaining century compliance in legacy applications should inspire IT management to move beyond their traditional caretaker role to initiate strategic change.

Following the last section of the book is an appendix containing sources of assistance. This supplement provides a noninclusive list of tool vendors, consulting firms, and conversion companies. The appendixes also include sample forms and a meta-model for project tracking deliverables. A glossary defines terms used in the book.

Acknowledgments
This book could not have been written without the help of many dedicated individuals and companies. First, we would like to thank our wives, Anne Hayes and Kathy Ulrich, for their masterful job of editing the first drafts of each chapter and for putting up with many nights and weekends of their husbands working on their PCs.
The ideas within this book were not developed in a vacuum. Rather, they evolved over many years from many collective discussions, experiments, and use on consulting projects. It is impossible to acknowledge everyone by name, but we want to express our gratitude to our clients, Year 2000 conference attendees, software vendors, and consulting firms that have contributed to these ideas. Hopefully, we are able to repay some of this favor through this book.
Many software vendors and consulting firms contributed literature on their products and services as background materials for this book. These vendors are listed in Appendix A. These materials were very helpful for understanding the range of tools and services on the market. We greatly appreciated this assistance. We apologize in advance to any vendors who were inadvertently omitted.
We also wish to thank Paul Becker from Prentice Hall for believing in this project and supporting our writing efforts. We especially appreciated his astonishment at our ability to deliver the book manuscript on time. In addition, we want to thank Joanne Anzalone, our Prentice Hall production editor, for her efforts in turning our mingled prose into proper English.
Finally, we would like to thank the readers of this book. We sincerely hope that it helps you and your organization successfully survive the Year 2000 crisis. We wish you the best of luck on your projects.

Ian S. Hayes
Clarity Consulting
Marblehead, MA


William M. Ulrich
Tactical Strategy Group, Inc.
Soquel, CA

August, 1996
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)