Muutke küpsiste eelistusi

Countdown Y2K: Business Survival Planning for the Year 2000 2nd Revised edition [Pehme köide]

  • Formaat: Paperback / softback, 368 pages, kõrgus x laius: 233x190 mm, kaal: 624 g, Illustrations
  • Ilmumisaeg: 24-Nov-1998
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 0471327344
  • ISBN-13: 9780471327349
  • Formaat: Paperback / softback, 368 pages, kõrgus x laius: 233x190 mm, kaal: 624 g, Illustrations
  • Ilmumisaeg: 24-Nov-1998
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 0471327344
  • ISBN-13: 9780471327349
The Year 2000 problem (The Millennium Bug) is now acknowledged to be a universal computing emergency, but few organizations fully understand what that means. Despite the vast sums of money that will go into a remedy, efforts are still largely confined to the corporate back office. This revised text updates the first edition by taking the Y2K problem out of IT and making it the focus of an end-to-end corporate solution. It is a manual for end-to-end business solutions and contingency planning and authoritative because Peter De Jager is the original prophet of the Year 2000 crisis and its most visible spokesman. His book aims to teach readers how to do contingency planning for the inevitable computer failures and business challenges they will face in the year 2000. New chapters include: how to assess your PC-based exposure (addressing the BIOS problem); how to diagnose and cure (or isolate) embedded systems; legal aspects and corporate liabilities; a report on the state of the banks; government activities and regulator environment world-wide; triage, contingency planning, and recovery planning; and extended case study demonstrating end-to-end business issues for the middle market.
Foreword xv(6)
Preface xxi(8)
Acknowledgments xxix(2)
Introduction xxxi
Chapter 1 Ground Double-Zero
1(20)
Out of the Closet
2(1)
Getting Embed with Dates
3(3)
Date Stamping
5(1)
No Comprendo COBOL
6(1)
Counting the Costs
7(8)
Application Software
8(1)
The Cost of the Update
9(2)
Counting Other Costs
11(2)
Tick, Tick, Tock
13(2)
Costs You Can't Control
15(6)
Vendors
15(6)
Chapter 2 Behind Every Great Machine
21(16)
Team Spirit
23(3)
Wake-up Call
26(2)
Reading Is Fundamental
27(1)
Team against Machine
28(9)
Hardware and Software
28(9)
Chapter 3 The Monster in the Closet
37(14)
Embedded Systems
37(2)
"Watson, My Magnifying Glass, Please!"
39(3)
Sensors and Detectors
39(2)
Computers Subsystems
41(1)
How Serious Can It Be?
42(9)
Catching Small Bugs with a Net
44(1)
How Do I Find and Test Them?
44(4)
Soldering Irons and Sledge Hammers
48(3)
Chapter 4 Avoiding Future Shock
51(14)
Action Hero
51(7)
The Dangers of Codependency
52(1)
Dependent and Unsupported
53(1)
Multilingual Madness
54(1)
An Arm and a Leg
54(2)
Trouble on the Horizon
56(1)
A Magazine Publisher's Y2K Project
56(2)
Triage: Business Style
58(3)
Looking Out for Number One
59(2)
Beg, Borrow, Steal
61(4)
Buy
61(1)
Trade Up
62(1)
Transform
62(1)
Calling in the Cavalry
63(2)
Chapter 5 Ready to Run
65(16)
Setting Standards
66(4)
Year 2000-Compliant
67(3)
Creating an Update Process
70(1)
Creating a Controlled Change Environment
71(1)
Planning and Tracking
71(2)
Control Change
72(1)
Creating a Test Environment
73(1)
Selecting Tools
74(4)
Code-Change Tools
76(2)
Choosing and Executing a Process Pilot
78(3)
Chapter 6 Managing the Fix
81(14)
Too Late?
81(3)
Instant Replay
84(4)
The European Monetary Unit and the Gamble
88(7)
The Bathtub Race
88(1)
Walk and Chew Gum?
89(1)
Comparing Year 2000 and the European Monetary Unit Project
89(3)
Time To Tell the Truth
92(3)
Chapter 7 Power to the People
95(22)
Manual Labor
95(3)
Time in a Bottle
98(1)
Heading South
98(1)
A Project by Any Other Name
99(1)
Centralized Authority
99(6)
Organize for Success
101(4)
Process Management and Continuous Improvement
105(4)
Defining the Activity
105(1)
Describing the Work
106(1)
Measuring the Work
107(1)
Reducing Skill Dependencies
107(1)
Building a Factory
108(1)
Create Talent Pools
109(2)
Tiger Teams
110(1)
Flying Squad
111(1)
Keeping Project Staff
111(6)
Money
112(3)
Other Incentives
115(2)
Chapter 8 A Date with Destiny
117(18)
How To Approach Ground Double-Zero
120(3)
Let's Get Physical
120(1)
It's Logical
121(1)
Pick Your Poison
122(1)
Windows, Bridges, and Wrappers
123(7)
Doing Windows
123(1)
Building Bridges
124(3)
Under Wrappers
127(2)
Getting and Using Windows, Bridges, and Wrappers
129(1)
To Test or Not to Test
130(5)
Chapter 9 Taking a Tool Inventory
135(14)
What's in Your Toolbox?
136(3)
Tool Inventory List
136(3)
Automate or Extricate
139(2)
Gap Analysis
141(6)
Use `Em or Lose `Em
143(1)
The Learning Curve
144(1)
Buyer Beware
145(1)
Platform Tooling
145(2)
Conclusion
147(2)
Chapter 10 2000: A Tool Odyssey
149(32)
Bringing Method to the Madness
150(2)
Primary Function
150(1)
Year 2000 Relevance
151(1)
Idiosyncrasies
151(1)
Staffing Impact
151(1)
Cost Models/Estimators
152(1)
Primary Function
152(1)
Year 2000 Relevance
152(1)
Idiosyncrasies
152(1)
Staffing Impact
153(1)
Relationship Mappers
153(1)
Primary Function
153(1)
Year 2000 Relevance
153(1)
Idiosyncrasies
153(1)
Staffing Impact
154(1)
Repository
154(2)
Primary Function
154(1)
Year 2000 Relevance
155(1)
Idiosyncrasies
155(1)
Staffing Impact
155(1)
Project Planning/Tracking
156(1)
Primary Function
156(1)
Year 2000 Relevance
156(1)
Idiosyncrasies
156(1)
Staffing Impact
157(1)
Workflow Managers
157(1)
Primary Function
157(1)
Year 2000 Relevance
157(1)
Idiosyncrasies
157(1)
Staffing Impact
158(1)
Library Managers
158(1)
Primary Function
158(1)
Year 2000 Relevance
158(1)
Idiosyncrasies
158(1)
Staffing Impact
159(1)
Change/Problem Managers
159(1)
Primary Function
159(1)
Year 2000 Relevance
159(1)
Idiosyncrasies
159(1)
Staffing Impact
160(1)
Configuration Managers
160(1)
Primary Function
160(1)
Year 2000 Relevance
160(1)
Idiosyncrasies
160(1)
Staffing Impact
161(1)
Distribution Managers
161(1)
Primary Function
161(1)
Year 2000 Relevance
161(1)
Idiosyncrasies
162(1)
Staffing Impact
162(1)
Version Managers
162(1)
Primary Function
162(1)
Year 2000 Relevance
163(1)
Idiosyncrasies
163(1)
Staffing Impact
163(1)
Analysis Tools: Scanners and Parsers
163(2)
Primary Function
163(1)
Year 2000 Relevance
164(1)
Idiosyncrasies
164(1)
Staffing Impact
164(1)
Data-Modeling and Design Recovery Aids
165(1)
Primary Function
165(1)
Year 2000 Relevance
165(1)
Idiosyncrasies
165(1)
Staffing Impact
166(1)
Documentation Aids
166(1)
Primary Function
166(1)
Year 2000 Relevance
166(1)
Idiosyncrasies
166(1)
Staffing Impact
166(1)
Change Tools: Editors
167(1)
Primary Function
167(1)
Year 2000 Relevance
167(1)
Idiosyncrasies
167(1)
Staffing Impact
167(1)
Rule-Based Change Tools: Intelligent Editors
168(2)
Primary Function
168(1)
Year 2000 Relevance
168(1)
Idiosyncrasies
169(1)
Staffing Impact
170(1)
Date (Clock) Simulators
170(1)
Primary Function
170(1)
Year 2000 Relevance
170(1)
Idiosyncrasies
170(1)
Staffing Impact
171(1)
Code (Static) Analyzers
171(1)
Primary Function
171(1)
Year 2000 Relevance
171(1)
Idiosyncrasies
171(1)
Staffing Impact
171(1)
Interactive Debuggers
172(1)
Primary Function
172(1)
Year 2000 Relevance
172(1)
Idiosyncrasies
172(1)
Staffing Impact
172(1)
Code Comparators
172(1)
Primary Function
172(1)
Year 2000 Relevance
173(1)
Idiosyncrasies
173(1)
Staffing Impact
173(1)
Code Generators/Fourth-Generation Languages
173(1)
Primary Function
173(1)
Year 2000 Relevance
173(1)
Idiosyncrasies
174(1)
Staffing Impact
174(1)
Test Scripters
174(1)
Primary Function
174(1)
Year 2000 Relevance
174(1)
Idiosyncrasies
175(1)
Staffing Impact
175(1)
Date Routines
175(1)
Primary Function
175(1)
Year 2000 Relevance
175(1)
Idiosyncrasies
175(1)
Staffing Impact
176(1)
Migration Tools: Data Analyzers
176(1)
Primary Function
176(1)
Year 2000 Relevance
176(1)
Idiosyncrasies
176(1)
Staffing Impact
176(1)
File Definition/File Modification Aids
176(1)
Primary Function
176(1)
Year 2000 Relevance
177(1)
Idiosyncrasies
177(1)
Staffing Impact
177(1)
Test-Data Generators
177(1)
Primary Function
177(1)
Year 2000 Relevance
177(1)
Idiosyncrasies
178(1)
Staffing Impact
178(1)
Database Conversion Tools
178(1)
Primary Function
178(1)
Year 2000 Relevance
178(1)
Idiosyncrasies
178(1)
Staffing Impact
178(1)
And More Tools Everyday
178(3)
Chapter 11 When in Doubt, Outsource
181(22)
Outsourcing Strategies
182(15)
Improve Process
183(2)
Sustain Strategic Focus
185(1)
Contain Costs
186(1)
Improve Management Control
187(1)
Transfer Knowledge
187(4)
Before You Buy
191(6)
Finding the Offer You Can't Refuse
197(3)
Approaching the Runway
197(1)
Your Place of Mine?
198(1)
The Acid Test
199(1)
Before You Sign on the Dotted Line
200(3)
Chapter 12 Staying Afloat
203(18)
The Twelfth Hour
203(2)
Risk Management
205(16)
Ten Steps to Safety
206(2)
Finding the Roots of Risk
208(3)
Monsters under the Bed
211(6)
Ashes to Phoenix?
217(4)
Chapter 13 The Price of Failure
221(16)
Obligatory Legal Disclaimer
221(1)
Enterprise Headaches
222(5)
Warranties
222(2)
Breach of Contract
224(1)
Liability Claims
225(2)
Follow the Rules, or Else
227(2)
Breach of Fiduciary Duties
228(1)
Don't Feed the Bears
229(4)
Who's Responsible?
230(1)
Lease and License Obligations
231(1)
Consultants
232(1)
Inventory Risks
233(1)
Insurance
234(3)
Appendix A TruAuto: A Year 2000 Case Study 237(20)
Appendix B Year 2000 Vendors 257(42)
Appendix C Year 2000 Web Sites 299(4)
Appendix D Recommended Reading 303(12)
Epilogue 315(8)
Index 323