VICUG-L Archives

Visually Impaired Computer Users' Group List

VICUG-L@LISTSERV.ICORS.ORG

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Jamal Mazrui <[log in to unmask]>
Reply To:
VICUG-L: Visually Impaired Computer Users' Group List
Date:
Thu, 8 Oct 1998 21:51:39 -0400
Content-Type:
TEXT/PLAIN
Parts/Attachments:
TEXT/PLAIN (1742 lines)
From a file in portable document format (.pdf) on the web site 
http://www.gao.gov

Pages 1--35 from

   GAO/ AIMD-10.1.14
   September 1997 Year 2000 Computing Crisis:
   An Assessment Guide
   
   GAO
   United States General Accounting Office
   Accounting and Information Management Division 

   The year 2000 is not rocket science, but it is the largest project
   ever to
   be undertaken by the IT organization. The complexity of the project is
   not in the solution but rather in the size and scope of the project
   itself.
   This means that the year 2000 requires "world class" project
   management.
   
   Kevin Schick
   Gartner Group
   April 16, 1996 

   Preface
   ______________________________________________________________________
   ________
   At 12: 01 on New Year's morning of the year 2000, many computer
   systems worldwide could
   malfunction or produce incorrect information simply because the date
   has changed. Unless
   corrected, the impact of these failures could be widespread and
   costly. For example:
   
   · IRS' tax systems could be unable to process returns, which in turn
   could jeopardize the collection of revenue and the entire tax
   processing system.
   
   · Payments to veterans with service-connected disabilities could be
   severely delayed because Veterans Affairs' compensation and pension
   system either halts or produces checks that are so
   erroneous that the system must be shut down and the checks processed
   manually.
   
   · The Social Security Administration's disability insurance process
   could experience major disruptions because the interface with various
   state systems fails, thereby causing delays and
   interruptions in disability payments to citizens.
   
   · Federal systems used to track student education loans could produce
   erroneous information on loan status, such as indicating that an
   unpaid loan had been satisfied.
   
   The Year 2000 problem is rooted in the way dates are recorded and
   computed in many computer
   systems. For the past several decades, systems have typically used two
   digits to represent the year,
   such as "97" representing 1997, in order to conserve on electronic
   data storage and reduce
   operating costs. With this two-digit format, however, the Year 2000 is
   indistinguishable from
   1900, 2001 from 1901, and so on. As a result of this ambiguity, system
   or application programs
   that use dates to perform calculations, comparisons, or sorting may
   generate incorrect results when
   working with years after 1999.
   
   Many government computer systems were originally designed and
   developed 20 to 25 years ago,
   are poorly documented, and use a wide variety of computer
   languages--many of which are old or
   obsolete. The systems consist of tens or hundreds of computer
   programs, each with thousands,
   tens of thousands, or even millions of lines of code, which must be
   examined for date problems.
   Moreover, the government's computer systems, like private sector
   systems, have numerous
   components--hardware, software stored in read-only-memory, operating
   systems, communications
   applications, and database software--that are affected by the date
   problem. Correcting the problem
   and achieving Year 2000 compliance--defined as the ability of
   information systems to accurately
   process date data from, into, and between the twentieth and
   twenty-first centuries, including leap
   year calculations--will not be easy.
   
   Every federal agency is at risk of widespread system failures. Because
   converting systems to a
   4-digit year will be a massive undertaking for large systems, agencies
   must start now to renovate
   their systems. They need to identify their inventories of
   mission-critical computer systems, develop
   conversion strategies and plans, and dedicate sufficient resources to
   converting and adequately
   testing their computer systems and programs before January 1, 2000.
   
   This guide provides a framework and a checklist for assessing the
   readiness of federal agencies to
   achieve Year 2000 compliance. It provides information on the scope of
   the challenge and offers a 

   structured approach for reviewing the adequacy of agency planning and
   management of the Year
   2000 program.
   
   Because each agency is different, there is no single, cookie cutter
   approach for solving the Year
   2000 problem. Some agencies are highly centralized, while others
   operate in a highly decentralized
   information resource environment. This guide addresses issues that
   will be common to most Year
   2000 programs; however, each agency must tailor its Year 2000 program
   in response to its unique
   needs.
   
   The guide is divided into five phases supported by program and project
   management activities:
   · Awareness
   · Assessment
   · Renovation
   · Validation
   · Implementation
   
   An electronic version of this guide is available from GAO's World Wide
   Web server at the
   following Internet address: <http:// www. gao. gov>. If you have any
   questions about the guide or
   the Year 2000 process outlined here, please contact us, or Mirko J.
   Dolak, Technical Assistant
   Director, at (202) 512-6362. We can also be reached by e-mail at
   willemssenj. aimd@ gao. gov,
   franklinw. aimd@ gao. gov, and dolakm. aimd@ gao. gov.
   
   Joel C. Willemssen William S. Franklin
   Director Director
   Information Resources Management Information Systems Methods and
   Support 

   Contents
   ______________________________________________________________________
   ________
   Preface 2
   
   ______________________________________________________________________
   ________
   Year 2000 Conversion Model: Structured Approach and 5
   Rigorous Project Management Can Decrease Risks
   
   ______________________________________________________________________
   ________
   Awareness 7
   
   ______________________________________________________________________
   ________
   Assessment 10
   
   ______________________________________________________________________
   ________
   Renovation 14
   
   ______________________________________________________________________
   ________
   Validation 16
   
   ______________________________________________________________________
   ________
   Implementation 18
   
   ______________________________________________________________________
   ________
   Program and Project Management 20
   
   ______________________________________________________________________
   ________
   Year 2000 Program Assessment Checklist 22
   
   ______________________________________________________________________
   ________
   Selected Year 2000 Resources 28
   
   ______________________________________________________________________
   __ Glossary 30 

   Year 2000 Conversion Model: Structured Approach and
   Rigorous Program Management Can Decrease Risks
   ______________________________________________________________________
   ________
   
   The Year 2000 date conversion poses a global challenge to the
   information technology industry.
   Every organization, whether federal or private, must ensure that its
   information systems are fully
   Year 2000 compliant well before December 31, 1999. While the Year 2000
   problem is not
   technically challenging, it is massive and complex. For many agencies,
   the Year 2000 conversion
   program will be the largest project ever to be managed and implemented
   by their information
   resource management organizations.
   
   This guide presents a structured approach and a checklist to aid
   federal agencies in planning,
   managing, and evaluating their Year 2000 programs. The guide draws on
   the work of the CIO
   Council Subcommittee on Year 2000 and incorporates guidance and
   practices identified by leading
   organizations in the information technology industry.
   
   The guide describes five phases--supported by program and project
   management--with each phase
   representing a major Year 2000 program activity or segment.
   
   Year 2000 Conversion Model
   
   Program &
   Project
   Management
   
   Implementation
   Validation
   
   Define the Year 2000 problem and gain executive level
   support and sponsorship. Establish Year 2000 program
   team and develop an overall strategy. Ensure that
   everyone in the organization is fully aware of the issue.
   
   Implement converted or replaced platforms,
   applications, databases, utilities, and interfaces.
   Implement data exchange contingency plans, if
   necessary.
   
   Test, verify, and validate converted or replaced
   platforms, applications, databases, and utilities. Test
   the performance, functionality, and integration of
   converted or replaced platforms, applications,
   databases, utilities, and interfaces in an operational
   environment.
   
   Awareness
   Assess the Year 2000 impact on the enterprise.
   Identify core business areas and processes, inventory
   and analyze systems supporting the core business
   areas, and prioritize their conversion or replacement.
   Develop contingency plans to handle data exchange
   issues, lack of data, and bad data. Identify and secure
   the necessary resources.
   
   Assessment
   
   Convert, replace, or eliminate selected platforms,
   applications, databases, and utilities. Modify
   interfaces.
   
   Renovation
   
   Plan and manage the Year 2000 program as a single large information
   system development
   effort. Promulgate and enforce good management practices on the
   program and project levels. 

   Immovable Deadline and Fixed Schedule
   ______________________________________________________________________
   ________
   Time is running out. Renovation work should be done by mid-1998 to
   allow sufficient time for validation and implementation. However, only
   half of the 24 departments and major agencies
   reported that they completed the assessment phase by the end of August
   1997. The 12 agencies that have not completed the assessment phase
   account for about 70 percent of the estimated federal
   cost of achieving Year 2000 compliance. These agencies must act
   quickly to complete the assessment phase and begin to renovate their
   mission-critical systems now.
   
   Year 2000 Schedule
   
   Renovation
   Awareness
   1997
   
   1998
   1999
   
   1996
   J
   F
   M
   A
   M
   J
   J
   A
   S
   O
   N
   D
   J
   F
   M
   A
   M
   J
   J
   A
   S
   O
   N
   D
   J
   F
   M
   A
   M
   J
   J
   A
   S
   O
   N
   D
   J
   F
   M
   A
   M
   J
   J
   A
   S
   O
   N
   D
   
   Assessment
   Validation
   &
   Implementation 

   1.0 Awareness
   ______________________________________________________________________
   ________
   It is essential that executive management be fully aware of the Year
   2000 problem and its potential
   impact on the enterprise and its customers. It is the responsibility
   of the chief information officer
   to provide the leadership in defining and explaining the importance of
   achieving Year 2000
   compliance, selecting the overall approach for structuring the
   agency's Year 2000 program,
   assessing the adequacy of the existing information resource management
   infrastructure to
   adequately support the Year 2000 efforts, and mobilizing needed
   resources.
   
   1.1. Define the Year 2000 problem and its potential impact on the
   enterprise
   Developing and publishing a high-level assessment of the Year 2000
   issue provides
   executive management and staff with a high-level overview of the
   potential impact of the
   Year 2000 problem on the enterprise.
   
   1.2. Conduct a Year 2000 awareness campaign
   A Year 2000 awareness campaign is an important first step to raise the
   awareness of
   executive management and line staff about the potential impact of the
   Year 2000 problem
   on the agency's operations.
   
   1.3. Assess the adequacy of the agency's program management
   capabilities, including
   · policies, guidelines, and processes for program and project
   management, configuration management, quality assurance, and risk
   management
   · staffing levels and skill mix
   The ability to successfully manage the Year 2000 program will depend
   on the degree to which the agency has institutionalized key system
   development and program management
   practices and on its experience in managing large-scale software
   conversion or system development efforts. With only a few activities
   within federal agencies operating above
   level 1 on the Software Engineering Institute's Capability Maturity
   Model, 1 most
   
   1 "Process Maturity Profile of the Software Community, 1996 Update,"
   Software Engineering Institute,
   April 1996.
   
   Key Processes
   1.1. Define the Year 2000 problem and its potential impact on the
   enterprise
   1.2. Conduct Year 2000 awareness campaign
   1.3. Assess the adequacy of the agency's program management
   capabilities
   1.4. Develop Year 2000 strategy
   1.5. Obtain support from executive management
   1.6. Establish Year 2000 executive management council
   1.7. Appoint Year 2000 program manager and establish a Year 2000
   program office
   1.8. Identify technical and management contacts in core business areas
   

   information resource management organizations lack the basic policies,
   tools, and practices necessary to successfully manage a large-scale
   Year 2000 program. While there
   may not be enough time to achieve a higher maturity level, agencies
   should assess, and upgrade, if needed, their information resource
   management capabilities. Agencies should
   consider the establishment of an enterprise competency center to
   provide training and to foster adherence to proven industry system
   development and program management
   practices. Agencies also need to consider soliciting assistance from
   organizational entities experienced in performing or managing major
   software conversions.
   
   1.4. Develop and document a high-level Year 2000 strategy
   A high-level Year 2000 strategy provides the agency's executive
   management with a
   roadmap for achieving Year 2000 compliance. The strategy should
   discuss key Year 2000
   issues, including the program's management structure, program metrics
   and reporting
   requirements, the mix of enterprise-wide solutions, and initial cost
   and schedule estimates.
   
   1.5. Obtain and formalize executive management support through
   issuance of
   · Year 2000 policy directive
   · Year 2000 program charter
   
   The management support for the agency's Year 2000 strategy should be
   formalized by the
   issuance of a Year 2000 policy directive and/ or Year 2000 program
   charter. Without such
   support, information resource managers may not be able to mobilize
   adequate resources to
   implement the strategy and to interact with other organizations and
   data sources.
   
   1.6. Establish Year 2000 executive management council
   A committee or a council needs to be established within the agency to
   continually
   coordinate with the programmatic and functional area managers on
   priorities and
   potential mission impact if certain processes and systems malfunction.
   A process for quick
   conflict resolution on priorities between programmatic and functional
   areas is also
   needed.
   
   1.7. Appoint a Year 2000 program manager and establish an agency-level
   Year 2000 program
   office
   
   It is essential that agencies appoint a Year 2000 program manager and
   establish an
   agency-level program office to manage and coordinate the enterprise's
   Year 2000
   program activities. The solutions of the Year 2000 problem extend
   beyond simple software
   conversion, hardware upgrades, and database restructuring. The
   problem--and the
   solutions--involve a wide range of dependencies among information
   systems; the need to
   centrally develop or acquire conversion and validation standards,
   inspection, conversion,
   and testing tools; the need to coordinate the conversion of
   cross-boundary information
   systems and their components; the need to establish priorities; and
   the need to reallocate
   resources as needed. 

   1.8. Identify technical and management points of contact in core
   business areas
   A Year 2000 program should not be viewed as a system development or
   maintenance effort
   managed by the information resource management organization, but
   rather as an
   enterprise-wide effort requiring the input and cooperation of all
   organizational units.
   Thus, it is important that the technical and management staff of the
   core business areas
   work closely with the Year 2000 project teams in the assessment and
   testing process. 

   2.0 Assessment
   ______________________________________________________________________
   ________
   Federal agencies may not have enough resources, skill, or time to
   convert or replace all of their
   information systems. Agencies must determine what systems are
   mission-critical and must be
   converted or replaced, what systems support important functions and
   should be converted or
   replaced, and what systems support marginal functions, and may be
   converted or replaced later.
   
   The Year 2000 problem is not just an information technology problem,
   but is primarily a business
   problem. Thus, the process of identifying and ranking information
   systems should not be limited to
   a simple inventory of applications and platforms, but must include
   assessments of the impact of
   information systems' failures on the agency's core business areas and
   processes.
   
   The assessment should also include systems using information
   technology which operate outside
   the traditional information resource area, including building
   infrastructure systems and telephone
   switching equipment.
   
   2.1. Define Year 2000 compliance
   2.2. Focus on core business areas and processes and develop a Year
   2000 assessment document
   Information systems are not created equal. Systems supporting
   mission-critical business
   processes are clearly more important than systems supporting mission
   support functions--
   usually administrative--although these are necessary functions. A
   focus on core business
   
   Key Processes
   2.1. Define Year 2000 compliance
   2.2. Focus on core business areas and processes and develop a Year
   2000 assessment
   document
   2.3. Assess the severity of an impact of Year 2000-induced failures
   2.4. Conduct enterprise-wide inventory of information systems for each
   business area
   2.5. Develop a comprehensive automated system portfolio
   2.6. Analyze system portfolio
   2.7. Prioritize systems and components to be converted or replaced
   2.8. Establish Year 2000 project teams for business areas and major
   systems
   2.9. Develop Year 2000 program plan
   2.10. Identify, prioritize, and mobilize needed resources
   2.11. Develop validation strategies, testing plans, and scripts
   2.12. Define requirements for Year 2000 test facility
   2.13. Identify and acquire Year 2000 tools
   2.14. Address implementation schedule issues
   2.15. Address interface and data exchange issues
   2.16. Initiate the development of contingency plans for
   mission-critical systems
   2.17. Identify Year 2000 vulnerable systems and processes operating
   outside the
   information resource management area 

   areas and processes is essential to the task of assessing the impact
   of the Year 2000
   problem on the enterprise and for establishing the priorities for the
   Year 2000 program.
   
   2.3. Assess the severity of an impact of potential Year 2000-induced
   failures
   An assessment of the severity of Year 2000 failure needs to be done
   for each core business
   area and associated processes.
   
   2.4. Conduct an enterprise-wide inventory of information systems for
   each business area
   An enterprise-wide inventory of information systems and their
   components provides the
   necessary foundation for Year 2000 program planning. A thorough
   inventory ensures that
   all systems are identified and linked to a specific business area or
   process, and that all
   enterprise-wide, cross-boundary systems are considered.
   
   2.5. Use inventory data to develop a comprehensive automated system
   portfolio and identify, for
   each system
   
   · links to core business areas or processes
   · platforms, languages, and database management systems
   · operating system software and utilities
   · telecommunications
   · internal and external interfaces
   · owners
   · the availability and adequacy of source code and associated
   documentation
   
   2.6. Analyze portfolio and identify for each system
   · non-repairable items (lack of source code or documentation)
   · conversion or replacement resources required for each platform,
   application, database management system, archive, utility, or
   interface
   
   2.7. Prioritize system conversions and replacements
   An agency must determine priorities for system conversion and
   replacement by ranking
   based on key factors, such as business impact and the anticipated
   failure date. An agency
   also needs to identify applications, databases, archives, and
   interfaces that cannot be
   converted because of resource and time constraints.
   
   2.8. Establish Year 2000 project teams for business areas and major
   systems
   Multi-disciplinary project teams consisting of domain experts in
   relevant functional areas,
   system and software specialists, operational analysis specialists, and
   contract specialists
   need to be established with explicit objectives and time schedules.
   Access to legal advice is
   also a necessity. 

   2.9. Develop Year 2000 program plan, including
   · schedules for all tasks and phases of the Year 2000 program
   · master conversion and replacement schedule, including identification
   of systems and their components
   
   · assessment and selection of outsourcing options
   · assignment of conversion or replacement projects to Year 2000
   project teams
   · risk assessment
   · contingency plans for all systems
   
   2.10. Identify, prioritize, and mobilize needed resources
   Achieving Year 2000 compliance will require significant investment in
   two vital
   resources--money and people. Accordingly, agencies will need to make
   informed choices
   about information technology priorities within their organization by
   assessing the costs,
   benefits, and risks of competing projects. In some instances, agencies
   may have to defer or
   cancel new system development efforts and reprogram the freed
   resources to achieve Year
   2000 compliance.
   
   2.11. Develop validation strategies and testing plans for all
   converted or replaced systems and
   their components. Identify and acquire automated test tools and
   develop test scripts.
   
   The testing and validation of the converted or replaced systems will
   require a phased
   approach. For example, an approach developed by IBM includes four
   phases:
   
   · Phase I--unit testing--focus on functional and compliance testing of
   a single application or software module.
   · Phase II--integration testing--test the integration of related
   software modules and applications.
   · Phase III--system testing--test all of the integrated components of
   an information system.
   · Phase IV--acceptance testing--test the information system with live
   operational data.
   Regardless of the selected validation and testing strategy, the scope
   of the testing and
   validation effort will require careful planning and use of automated
   tools, including test
   case analyzers and test data libraries.
   
   2.12. Define requirements for Year 2000 test facility
   Agencies may have to acquire a Year 2000 test facility to provide an
   adequate testing
   environment and to avoid potential contamination or interference with
   the operation of
   production systems.
   
   2.13. Identify and acquire Year 2000 tools
   Agencies should identify and acquire Year 2000 tools to facilitate the
   conversion and
   testing processes. 

   2.14. Address implementation schedule issues, including
   · the identification and selection of conversion facilities
   · time needed to put converted systems into production
   · the conversion of backup and archival data
   
   2.15. Address interface and data exchange issues, including
   · the development of a model showing the internal and external
   dependency links between enterprise core business areas, processes,
   and information systems
   · the notification of all outside data exchange entities
   · the need for data bridges and filters
   · contingency plans if no data are received from an external source
   · validation process for incoming external data
   · contingency plans for invalid data
   
   2.16. Initiate the development of contingency plans for
   mission-critical systems.
   Agencies should initiate the development of realistic contingency
   plans--including the
   development of manual and contract procedures--to ensure the
   continuity of core business
   processes.
   
   2.17. Identify Year 2000 vulnerable systems and processes operating
   outside the information
   resource management area
   
   Identify and assess Year 2000 vulnerable systems and processes outside
   the information
   resource management area, including telephone and network switching
   equipment, and
   building infrastructure systems. Develop a separate plan for their
   renovation. 

   3.0 Renovation
   ______________________________________________________________________
   ________
   The renovation--conversion, replacement, or retirement--phase involves
   making and documenting
   software and hardware changes, developing replacement systems, and
   decommissioning eliminated
   systems. Renovation involves conversion of an existing application;
   replacement deals with the
   development of a new application; elimination focuses on the
   retirement or decommissioning of an
   existing application or system component. In all three cases, the
   process must also consider the
   complex interdependencies among applications, hardware platforms,
   databases, and the internal
   and external interfaces.
   
   All changes to the information systems and their components must be
   made under configuration
   management to ensure that changes are adequately documented and
   coordinated throughout the
   agency. Equally important is the need for each agency to assess
   dependencies and to communicate
   all changes to the information systems to internal and external users.
   
   3.1. Convert selected applications, databases, archives, and related
   system components
   In converting application systems, consider changes in operating
   systems, compilers,
   utilities, domain-specific program products, and commercial database
   management
   systems.
   
   3.2. Develop data bridges and filters
   Ensure that all internal and external data sources meet the Year 2000
   date standards of the
   converted or replaced systems. Develop bridges or filters to convert
   non-conforming data.
   
   3.3. Replace selected applications, platforms, database management
   systems, operating systems,
   compilers, utilities, and other commercial off-the-shelf (COTS)
   software
   
   Ensure that replacement products are Year 2000 compliant, including
   their ability to
   properly handle the leap year adjustments. Direct contract specialist
   and legal staff to
   review contracts and warranties.
   
   Key Processes
   3.1. Convert selected applications, databases, archives, and related
   system components
   3.2. Develop data bridges and filters
   3.3. Replace selected applications and related system components
   3.4. Document code and system changes
   3.5. Schedule unit, integration, and system tests
   3.6. Retire selected applications and related system components
   3.7. Communicate changes to information systems to internal and
   external users
   3.8. Track conversion and replacement process, collect project metrics
   3.9. Share information among Year 2000 projects, including lessons
   learned and best
   practices 

   3.4. Document code and system changes
   Implement and use configuration management procedures to ensure that
   all changes to
   information systems and their components are properly documented and
   managed.
   
   3.5. Schedule unit, integration, and system tests
   Schedule unit, integration, and system tests following the conversion
   of individual
   application and software modules. Coordinate scheduling with other
   project teams to
   ensure that all components--including data bridges or filters--are
   available for testing.
   
   3.6. Retire selected applications, platforms, database management
   systems, operating
   systems, utilities, and COTS software
   
   Prepare to retire replaced applications, platforms, database
   management systems,
   operating systems, utilities, and COTS software upon the successful
   completion of
   acceptance testing.
   
   3.7. Communicate changes to information systems to all internal and
   external users
   Communicate changes to the agency's information systems and
   components, and
   specifically all changes to date formats for data exchanged with other
   systems or external
   organizations. Document changes through the configuration management
   process.
   
   3.8. Track the conversion and replacement process and collect project
   metrics
   Track the conversion and replacement projects and collect and use
   project metrics to
   manage cost and schedule.
   
   3.9. Share information among Year 2000 projects and disseminate
   lessons learned and best
   practices
   
   Ensure that project staffs understand the need to collect and
   disseminate information on
   lessons learned and best practices. Develop dissemination strategy and
   tools, such as
   intranet web sites and newsletters. 

   4.0 Validation
   ______________________________________________________________________
   ________
   We expect that agencies may need over a year to adequately validate
   and test converted or replaced
   mission-critical systems for Year 2000 compliance, and that the
   testing and validation process may
   consume over half of the Year 2000 program resources and budget. The
   length of the validation
   and test phase and its cost are driven by the complexity inherent in
   the Year 2000 problem.
   Agencies must not only test Year 2000 compliance of individual
   applications, but also the complex
   interactions between scores of converted or replaced computer
   platforms, operating systems,
   utilities, applications, databases, and interfaces. Moreover, in some
   instances, agencies may not be
   able to shut down their production systems for testing, and may thus
   have to operate parallel
   systems implemented on a Year 2000 test facility.
   
   All converted or replaced system components must be thoroughly
   validated and tested to
   (1) uncover errors introduced during the renovation phase, (2)
   validate Year 2000 compliance, and
   (3) verify operational readiness. The testing should account for
   application, database
   interdependencies, and interfaces. The testing should take place in a
   realistic test environment. A
   Year 2000 test facility may be required to ensure adequate testing of
   licensed software and
   converted applications while preventing the contamination or the
   corruption of operational
   information systems and related databases. Agencies should assess
   their testing procedures and
   tools to ensure that all converted system components meet quality
   standards and are Year 2000
   compliant.
   
   4.1. For each converted or replaced application or system component,
   develop and document test
   and compliance plans and schedules
   
   Establish a compliance validation process. Most suppliers of COTS
   software do not
   disclose their source code or the internal logic of their products;
   therefore, testing should
   be complemented by a careful review of warranties and/ or guarantees.
   
   4.2. Develop a strategy for managing the testing of
   contractor-converted systems
   In many instances, the agency will contract for the conversion of
   selected systems and their
   components. The contract conversion must be closely managed to ensure
   that the
   contractor follows the agency's Year 2000 conversion standards. In
   addition, the agency
   must ensure that the contractor-converted systems are adequately
   tested.
   
   Key Processes
   4.1. Develop and document test and compliance plans and schedules
   4.2. Develop strategy for managing the testing of contractor-converted
   systems
   4.3. Implement Year 2000 test facility
   4.4. Implement automated test tools and test scripts
   4.5. Perform unit, integration, and system testing
   4.6. Define, collect, and use test metrics to manage the testing and
   validation process
   4.7. Initiate acceptance testing 

   4.3. Implement Year 2000 test facility
   Testing the converted or replaced systems and their components for
   Year 2000 compliance
   will likely require an isolated test facility capable of simulating
   Year 2000 requirements.
   The test facility should provide sufficient disk storage for large
   test databases and multiple
   versions of the application software.
   
   4.4. Implement automated test tools and test scripts
   The use of computer-aided software testing tools and test scripts has
   the potential to
   significantly reduce the testing and validation burden. Test
   management tools may help in
   the preparation and management of test data, in the automation of the
   comparison of test
   results, in scheduling and incident tracking, and in managing test
   documentation.
   
   4.5. Perform unit, integration, and system testing
   Using a phased approach, perform unit, integration, and system
   testing. Use selected
   testing techniques to ensure that the converted or replaced systems
   and accompanying
   components are functionally correct and Year 2000 compliant. The
   testing should include
   regression, performance, stress, and forward and backward time
   testing.
   
   4.6. Define, collect, and use test metrics to manage the testing and
   validation process
   4.7. Initiate acceptance testing
   Acceptance testing is the final stage of the multiphase testing and
   validation process.
   During this phase, the entire information system--including data
   interfaces--is tested with
   operational data. In general, acceptance testing should be done on the
   Year 2000 test
   facility with duplicate databases to avoid risk to the production
   systems and the potential
   contamination of data. 

   5.0 Implementation
   ______________________________________________________________________
   ________
   Implementation of Year 2000 compliant systems and their components
   requires extensive
   integration and acceptance testing to ensure that all converted or
   replaced system components
   perform adequately in a heterogeneous operating environment. Because
   of the scope and
   complexity of the Year 2000 conversion changes, integration,
   acceptance, and implementation will
   likely be a lengthy and costly process.
   
   Once converted or replaced and subsequently tested, Year 2000
   compliant applications and system
   components must be implemented. Since not all system components will
   be converted or replaced
   simultaneously, agencies may be expected to operate in a heterogeneous
   computing environment
   comprised of a mix of Year 2000 compliant and non-compliant
   applications and system
   components. The reintegration of the Year 2000 compliant applications
   and components into the
   agency's production environment must be carefully coordinated to
   account for system
   interdependencies. Parallel processing--where the old and the
   converted systems are run
   concurrently--may be needed to reduce risk.
   
   5.1. Define transition environment and procedures
   The transition from the current environment to Year 2000 compliant
   systems will be difficult
   and complex. First, some key components of the agency systems--Year
   2000 compliant
   databases, operating systems, utilities, and other COTS products--may
   not be available
   until late 1998 or early 1999. Second, external data suppliers may not
   plan to complete
   their conversion and testing until 1999. Third, the testing,
   validation, and correction
   processes may take much of 1999. Fourth, replacement systems may not
   be ready for
   testing until late 1999. As a result, agencies may be forced to
   operate--at least for a time--
   parallel systems and databases.
   
   5.2. Develop implementation schedule
   The Year 2000 implementation schedule must not only deal with
   uncertainties common to
   all large system development efforts, but also should indicate all
   major milestones and the
   critical path for the completion of the Year 2000 program.
   
   Key Processes
   5.1. Define transition environment and procedures
   5.2.. Develop implementation schedule
   5.3. Resolve data exchange issues and interagency concerns
   5.4. Deal with database and archive conversion
   5.5. Complete acceptance testing
   5.6. Implement contingency plans
   5.7. Update or develop disaster recover plans
   5.8. Implement converted and replaced systems 

   5.3. Resolve data exchange issues and interagency concerns, including
   ensuring that
   · all outside data exchange entities are notified
   · data bridges and filters are ready to handle non-conforming data
   · contingency plans and procedures are in place if data are not
   received from an external source
   
   · contingency plans and procedures are in place if invalid data are
   received from an external source
   · the validation process is in place for incoming external data
   All data issues and interagency concerns should be resolved prior to
   acceptance testing and
   implementation. Bridges and filters should be in place to handle
   non-conforming data
   received from external sources, and contingency plans and procedures
   should be in place to
   handle no data or bad data situations.
   
   5.4. Deal with database and archive conversion
   Because the conversion of large databases from 2-digit to 4-digit year
   fields is a time
   consuming effort, agencies may consider off-site conversion
   alternatives.
   
   5.5. Complete acceptance testing
   In general, formal testing uncovers about 80-90 percent of software
   errors, with the
   remaining 10-20 percent of errors discovered during operations.
   Acceptance testing should
   be completed no later than Fall of 1999, to allow sufficient time for
   the correction of
   software errors discovered following implementation.
   
   5.6. Implement contingency plans as necessary
   Implement contingency plans to ensure support for business functions
   and processes that
   may be interrupted by the failure to achieve Year 2000 compliance of a
   specific mission-critical
   system.
   
   5.7. Update or develop disaster recovery plans
   All Year 2000 compliant systems--including the converted and replaced
   systems and related
   databases--should have disaster recovery plans for the restoration of
   operations and data
   in case of extended outage, sabotage, or natural disaster.
   
   5.8. Implement converted and replaced systems
   Reintegrate the converted and replaced systems and related databases
   into the production
   environment. 

   Program and Project Management
   ______________________________________________________________________
   ________
   The Year 2000 program is likely the largest and most complex system
   conversion effort ever
   undertaken by many federal agencies. It requires the disciplined and
   coordinated application of
   scarce resources to an enterprise-wide system conversion effort that
   must be completed by a fixed
   date. To succeed, agencies must manage the Year 2000 program as a
   large system development
   effort.
   
   A. Establish Year 2000 program management structure
   · appoint a Year 2000 program manager and establish a Year 2000
   program team
   · identify technical and management representatives from each core
   business area
   
   The agency's Year 2000 program--headed by a program manager--should be
   adequately
   staffed to ensure the successful completion of the assessment phase.
   In addition to technical
   skills, the program staff should be able to track the cost and
   schedule for individual Year
   2000 projects, and to coordinate the agency's Year 2000 activities
   with other organizations.
   
   B. Develop and implement needed policies, guidelines and procedures to
   manage a major program
   Based on the assessment of the agency's program management capability
   performed during
   the awareness phase, ensure that necessary enterprise-wide program
   management policies
   and procedures are in place, including
   
   ° configuration management
   ° quality assurance
   ° risk management
   ° project scheduling and tracking
   ° metrics
   · budgeting
   
   Agencies may consider establishing an enterprise-level competency
   center to train staff and
   to foster the use of proven industry system development and program
   management practices.
   
   Key Processes
   A. Establish Year 2000 program management structure
   B. Develop and implement needed policies, guidelines and procedures to
   manage a major
   program
   C. Implement program management processes and tools 

   C. Implement program management processes and tools
   Monitor Year 2000 projects, and ensure that projects follow required
   policies and
   procedures for configuration management, project scheduling and
   tracking, and metrics.
   Agencies may consider subjecting their Year 2000 program to an
   independent verification
   and validation effort. This verification and validation may be
   performed by the agency's
   quality assurance staff complemented by internal auditors. 

   Year 2000 Program Assessment Checklist
   ______________________________________________________________________
   ________
   Agency Year 2000 Program Phase or Activity
   q Awareness q Validation
   q Assessment q Implementation
   q Renovation q Program Management
   
   ______________________________________________________________________
   ________
   
   Awareness
   q Has the agency defined and documented the potential impact of the
   Year 2000 problem?
   q Has the agency conducted a Year 2000 awareness campaign?
   q Has the agency assessed the adequacy of its program management
   policies, capabilities, and
   practices, including configuration management, program and project
   management, and
   quality assurance?
   
   q Has the agency developed and documented a Year 2000 strategy?
   q Is the Year 2000 strategy supported by executive management?
   The agency has
   q Year 2000 policy directive
   q Year 2000 program charter
   
   q Has the agency established an executive management council or
   committee to guide the Year
   2000 program?
   
   q Has a program manager been appointed and a Year 2000 program office
   been established
   and staffed?
   
   q Has the agency identified technical and management points of
   contacts in core business
   areas?
   
   Assessment
   q Has the agency defined Year 2000 compliance?
   q Has the agency identified core business areas and processes?
   q Has the agency assessed the severity of potential impact of Year
   2000-induced failures for
   core business areas and processes? 

   q Has the agency conducted a comprehensive enterprise-wide inventory
   of its information
   systems?
   
   The agency has
   q system inventory listing components and interfaces for each system
   q comprehensive plan to identify and eliminate obsolete code
   
   q Has the agency developed a comprehensive automated system portfolio?
   The agency's portfolio identifies
   q links to core business areas or processes
   q platforms, languages, and database management systems
   q operating system software and utilities
   q telecommunications
   q internal and external interfaces
   q owners
   q the availability and adequacy of source code and associated
   documentation
   
   q Has the agency analyzed its system portfolio and identified for each
   system
   q non-repairable items (lack of source code or documentation)
   q conversion or replacement resources required for each platform,
   application,
   database management system, archive, utility, or interface
   
   q Has the agency prioritized its system conversion and replacement
   program?
   The agency's prioritization process includes
   q ranking by business impact
   q ranking by anticipated failure date
   q identification of applications, databases, archives, and interfaces
   that cannot be
   converted because of resource and time constraints
   
   q Has the agency established Year 2000 project teams for business
   areas and major systems?
   q Has the agency developed a Year 2000 program plan?
   The agency's program plan includes
   q schedules for all tasks and phases
   q master conversion and replacement schedule
   q assessment and selection of outsourcing options
   q assignment of conversion or replacement projects to project teams
   q risk assessment
   q contingency plans for all systems 

   q Has the agency identified and mobilized required resources and
   capabilities?
   q Has the agency developed validation strategies and testing plans for
   all converted or replaced
   systems and their components?
   
   q Has the agency analyzed and identified requirements for a Year 2000
   test facility?
   q Has the agency identified and acquired Year 2000 tools?
   q Has the agency considered implementation scheduling issues?
   The agency's program plan addresses
   q where conversion will take place (data center or off-site location)
   q time needed to place converted systems into production
   q conversion of backup or archived data
   
   q Has the agency addressed interface and data exchange issues?
   The agency has
   q analyzed dependencies on data provided by other organizations
   q contacted all entities with whom it exchanges data
   q identified the need for data bridges or filters
   q made contingency plans if no data are received from external sources
   q made plans to determine that incoming data are valid
   q developed contingency plans to handle invalid data
   
   q Has the agency initiated the development of contingency plans for
   critical systems?
   o Does the impact assessment document identify Year 2000 vulnerable
   systems and processes
   outside the traditional information resource management area that may
   affect the agency's
   operations?
   
   The assessment document addresses the impact of potential Year 2000
   induced failure of
   q telecommunication systems, including telephone and data networks
   switching
   equipment q building infrastructure
   
   Renovation
   q Is the agency meeting its budget and schedule in the conversion of
   targeted applications,
   platforms, databases, archives, or interfaces?
   
   q Is the agency meeting its budget and schedule in developing bridges
   and filters to handle non-conforming
   data? 

   q Is the agency meeting its budget and schedule in the replacement of
   targeted applications and
   system components?
   
   q Is the agency documenting all code and system modifications and
   using configuration
   management to control changes?
   
   q Is the agency scheduling unit, integration, and system tests?
   q Is the agency meeting its budget and schedule in eliminating
   targeted applications and system
   components?
   
   q Is the agency communicating the changes to its information systems
   to all internal and external
   users?
   
   q Is the agency tracking the conversion and replacement process and
   collecting and using project
   metrics to manage the conversion and replacement process?
   
   q Is the agency sharing information among Year 2000 projects?
   The agency is disseminating
   q "lessons learned"
   q best practices
   
   Validation
   q Has the agency developed and documented test and validation plans
   for each converted or
   replaced application or system component?
   
   q Has the agency developed and documented a strategy for testing
   contractor-converted or
   replaced applications or system components?
   
   q Has the agency implemented a Year 2000 test facility?
   q Has the agency implemented automated test tools and scripts?
   q Has the agency performed unit, integration, and system tests on each
   converted or replaced
   component
   
   The agency's testing procedures include the following types of tests
   q regression
   q performance
   q stress
   q forward and backward time 

   q Is the agency tracking the testing and validation process and
   collecting and using test metrics to
   manage the testing activities?
   
   q Has the agency initiated acceptance tests?
   
   Implementation
   q Has the agency defined its transition environment and procedures?
   
   q Has the agency developed and documented a schedule for the
   implementation of all converted
   or replaced applications and system components?
   
   q Has the agency resolved data exchange issues and interagency
   concerns?
   q Has the agency dealt with database and archive conversion?
   q Has the agency completed acceptance testing?
   q Has the agency implemented contingency plans?
   q Has the agency updated or developed disaster recovery plans?
   q Has the agency reintegrated the converted and replaced systems and
   related databases into the
   production environment?
   
   Program and Project Management
   q Has the agency established a Year 2000 program management structure?
   
   The agency has
   q appointed a Year 2000 program manager and established a Year 2000
   program
   team
   q identified technical and management representatives from each core
   business area
   
   q Based on the assessment of its program management capabilities, has
   the agency developed
   and implemented policies, guidelines, and procedures to manage a major
   program?
   
   The agency's policies, guidelines, and procedures include
   q configuration management
   q quality assurance
   q risk management
   q project scheduling and tracking
   q metrics
   q budgeting 

   q Is the agency monitoring the Year 2000 program to ensure that
   projects are following required
   policies and procedures for configuration management, project
   scheduling and tracking, and
   metrics? 

   Selected Year 2000 Resources
   ______________________________________________________________________
   ________
   There are many readily accessible sources of useful information on the
   Year 2000 problem, with
   many government and industry organizations establishing Year 2000 web
   sites. These sites
   provide information about Year 2000 compliant products, tools, and
   practices.
   
   Best Practices
   The Program Manager's Guide to Software Acquisition Best Practices
   (Version 1.1), Software
   Acquisition Best Practice Initiative, Department of Defense (Undated).
   
   A framework of best practices focused on effective project management,
   software defect
   detection, and project risk reduction. The guide and several companion
   publications are
   available at <http:// spmn. com/>.
   
   Key Practices of the Capability Maturity Model, Version 1.1, Software
   Engineering Institute,
   Carnegie Mellon University, February 1993.
   
   A set of key practices for planning, engineering, and managing
   software development. Discussed
   practices include configuration management, software quality
   assurance, project tracking and
   oversight, and project planning. More information on the capability
   model may be found at
   <http:// www. sei. cmu. edu/ technology/ cmm. html>.
   
   CIO Council Subcommittee on Year 2000 Best Practices, CIO Council
   Subcommittee on
   Year 2000, April 1997.
   
   A compendium of best practices focused on a Year 2000 program
   presented in a framework of
   awareness, assessment, renovation, validation, and implementation
   phases. Available at
   <http:// www. itpolicy. gsa. gov/ mks/ yr2000/ y207best. htm>.
   
   The Year 2000 and 2-Digit Dates: A Guide for Planning and
   Implementation, International
   Business Machines Corporation, April 1997.
   
   The guide provides information on the cause and scope of using dates
   represented by 2-digit
   years, problems with programs using 2-digit-year data, the best
   technique for reformatting the
   year-date notations, migration strategies to a Year 2000-ready
   environment, testing techniques,
   and a list of IBM tools. Available at <http:// ppdbooks. pok. ibm.
   com/ cgi-bin/
   bookmgr/ bookmgr. cmd/ books/ y2kpaper/ contents>.
   
   Selected Year 2000 Web Sites
   Federal Year 2000 Web Sites
   o CIO Council Subcommittee on Year 2000
   <http:// www. itpolicy. gsa. gov/ mks/ yr2000/ y201toc1. htm> 

   o Army
   <http:// imabbs. army. mil/ army-y2k/>
   
   o Air Force
   <http:// infosphere. safb. af. mil/~ jwid/ fadl/ world/ y2k. htm>
   
   o Navy
   <http:// www. doncio. navy. mil/ y2k/ year2000. htm>
   
   o Marine Corps
   <http:// issb-www1. mqg. usmc. mil/ year2000/>
   
   o Defense Information Systems Agency
   <http:// www. disa. mil/ cio/ y2k/ cioosd. html>
   
   General Year 2000 Sites
   o The Year 2000 Information Center
   <http:// www. year2000. com>
   
   o Year 2000 Technical Audit Center
   <http:// www. auditserve. com/>
   
   o Year 2000 Information Network
   <http:// web. idirect. com/% 7Embsprog/ y2kcon. html>
   
   o The Year 2000 Resource
   <http:// www. deweerd. org/ year2000/>
   
   o CIO Year 2000 Resource Center
   <http:// www. cio. com/ forums/ year2k. html>
   
   Year 2000 Products, Tools, and Patches
   o Defense Information Systems Agency Tools
   <http:// www. mitre. org/ research/ y2k/ docs/ TOOLS_ CAT. html>
   
   o Air Force Software Technology Support Center
   <http:// www. stsc. hill. af. mil/ RENG/ index. html/>
   
   o Army Tools
   <http:// www. army. mil/ army-y2k/ tools/ tools~ 1. htm>
   
   o RighTime PC Patches
   <http:// www. RighTime. com/> 

   Glossary
   ______________________________________________________________________
   ________
   The definitions in this glossary were developed by the project staff
   or were drawn from other
   sources, including the Computer Dictionary: The Comprehensive Standard
   For Business, School,
   Library, and Home, Microsoft Press, Washington, DC, 1991; The Year
   2000 Resource Book,
   Management Support Technology Corp., Framingham, Massachusetts, 1996;
   The Year 2000 and
   2-Digit Dates: A Guide for Planning and Implementation, International
   Business Machines
   Corporation, 1997; Denis Howe's "Free On-line Dictionary of
   Computing," at
   <http:// wombat. doc. ic. ac. uk/>; and the Gartner Group's "IT
   Glossary" at
   <http:// gartner5. gartnerweb. com/ gartner/ itglossary/ dlist. html>.
   
   Application A computer program designed to help people perform a
   certain type of
   work. Depending on the work for which it was designed, an application
   can manipulate text, numbers, graphics, or a combination of these
   elements.
   
   Architecture A description of all functional activities to be
   performed to achieve the
   desired mission, the system elements needed to perform the functions,
   and
   the designation of performance levels of those system elements. An
   architecture also includes information on the technologies,
   interfaces, and
   location of functions and is considered an evolving description of an
   approach to achieving a desired mission.
   
   Business A description of the systems, databases, and interactions
   between
   architecture systems and databases that will be needed to fulfill
   business requirements.
   
   Business area A grouping of business functions and processes focused
   on the production
   of specific outputs.
   
   Business function A group of logically related tasks that are
   performed together to
   accomplish an objective.
   
   Business plan An action plan that the enterprise will follow on a
   short-term and/ or long-term
   basis. It specifies the strategic and tactical objectives of the
   company
   over a period of time. The plan, therefore, is time dependent; it will
   change with the enterprise. Although a business plan is usually
   written in
   a style unique to a specific enterprise, it should concisely describe
   "what"
   is planned, "why" it is planned, "when" it will be implemented, by
   "who,"
   and "how" it will be gauged. The architects of the plan are typically
   the
   principals of the enterprise.
   
   Component A single resource with defined characteristics. The
   component concept is
   used in defining precise specifications for testing the validity of
   various
   resources. These components are also defined by their relationship to
   other components. 

   Configuration The continuous control of changes made to a system's
   hardware,
   management software, and documentation throughout the development and
   operational
   life of the system.
   
   Contingency plan In the context of the Year 2000 program, a plan for
   responding to
   the loss of a system due to a Year 2000 problem. In general, a
   contingency plan describes the steps the enterprise would take--
   including the activation of manual or contract processes--to ensure
   the continuity of its core business processes in the event of a Year
   2000-induced system failure.
   
   Conversion The process of making changes to databases or source code.
   Database An aggregation of data; a file consisting of a number of
   records or tables,
   each of which is constructed of files of a particular type, together
   with a
   collection of operations that facilitate searching, sorting,
   recombination,
   and similar operations.
   
   Data dictionary A repository of information about data, such as its
   meaning, relationships
   to other data, origin, usage and format. The dictionary assists
   company
   management, database administrators, systems analysts and application
   programmers in effectively planning, controlling, and evaluating the
   collection, storage and use of data. A data dictionary manages data
   categories such as aliases, data elements, data records, data
   structures,
   data stores, data models, data flows, relationships, processes,
   functions,
   dynamics, size, frequency, resource consumption, and other
   user-defined
   attributes.
   
   Debug With software, to detect, locate, and correct logical or
   syntactical errors in
   a computer program.
   
   Defect A problem or "bug" that if not removed, could cause a program
   to either
   produce erroneous results or otherwise fail.
   
   Information A description of the enterprise in terms of its business
   activity,
   architecture business information, and their interaction.
   
   Infrastructure The computer and communication hardware, software,
   databases, people,
   and policies supporting the enterprise's information management
   functions.
   
   Integration testing Testing to determine that the related information
   system components
   perform to specification.
   
   Interface A boundary across which two systems communicate. An
   interface might
   be a hardware connector used to link to other devices, or it might be
   a
   convention used to allow communication between two software systems.
   

   Inventory In the context of a Year 2000 program, the process of
   determining the
   components that comprise the agency's systems portfolio. The inventory
   should include all applications, databases, files, and related system
   components that will require inspection to locate date data and
   related date
   computations.
   
   Line of code A single computer program command, declaration, or
   instruction.
   Program size is often measured in lines of code.
   
   Metrics Means by which software engineers measure and predict aspects
   of
   processes, resources, and products that are relevant to the software
   engineering activity.
   
   Mission-critical A system supporting a core business activity or
   process.
   system
   
   Object code The machine code generated by a source code language
   processor such as
   an assembler or compiler. A file of object code may be immediately
   executable or it may require linking with other object code files, e.
   g.
   libraries, to produce a complete executable program.
   
   Operating system The software which schedules tasks, allocates
   storage, handles the
   interface to peripheral hardware, and presents a default interface to
   the
   user when no application program is running.
   
   Outsourcing Paying another company to provide services which an
   organization might
   otherwise have performed itself, e. g. software development.
   
   Parallel processing The simultaneous use of more than one computer to
   solve a problem.
   Platform The foundation technology of a computer system. Typically, a
   specific
   combination of hardware and operating system.
   
   Portfolio In the context of the Year 2000 program, an
   inventory--preferably
   automated--of an agency's information systems and their components
   grouped by business areas.
   
   Production The system environment where the agency performs its
   routine
   environment information processing activities.
   
   Quality assurance All the planned and systematic actions necessary to
   provide adequate
   confidence that a product or service will satisfy given requirements
   for
   quality.
   
   Regression testing Selective retesting to detect faults introduced
   during modification of a
   system. 

   Risk assessment A continuous process performed during all phases of
   system development
   to provide an estimate of the damage, loss, or harm that could result
   from
   a failure to successfully develop individual system components.
   
   Risk management A management approach designed to reduce risks
   inherent to system
   development.
   
   Source code The form in which a computer program is written by the
   programmer.
   Source code is written in a programming language which is then
   compiled
   into object code or machine code or executed by an interpreter.
   
   Standard In computing, a set of detailed technical guidelines used as
   a means of
   establishing uniformity in an area of hardware or software
   development.
   
   Strategic IRM plan A long-term, high-level plan that defines a
   systematic way of how the
   agency will use information technology to effectively accomplish the
   agency's missions, goals, and objectives.
   
   Strategic plan A long-term, high-level plan that identifies broad
   business goals and
   provides a roadmap for their achievement.
   
   System testing Testing to determine that the results generated by the
   enterprise's
   information systems and their components are accurate and the systems
   perform to specification.
   
   Test The process of exercising a product to identify differences
   between
   expected and actual behavior.
   
   Test facility A computer system isolated from the production
   environment dedicated to
   the testing and validation of applications and system components.
   
   Unit testing Testing to determine that individual program modules
   perform to
   specification.
   
   Utilities Computer programs designed to perform maintenance work on
   the system
   or on system components--for example, a storage backup program, a disk
   or file recovery program, or a resource editor.
   
   Validation The process of evaluating a system or component during or
   at the end of
   the development process to determine whether it satisfies specified
   requirements.
   
   Year 2000 compliant "Year 2000 compliant . . . means, with respect to
   information technology,
   that the information technology accurately processes date/ time data
   (including, but not limited to, calculating, comparing, and
   sequencing)
   from, into, and between the twentieth and twenty-first centuries, and
   the
   years 1999 and 2000 and leap year calculations, to the extent that
   other
   information technology, used in combination with the information 

   technology being acquired, properly exchanges date/ time data with
   it." (48
   CFR Part 39.002)
   
   Year 2000 problem The potential problems and its variations that might
   be encountered in any
   level of computer hardware and software from microcode to application
   programs, files, and databases that need to correctly interpret
   year-date
   data represented in 2-digit-year format.
   
   (511428)

----------
End of Document






ATOM RSS1 RSS2