Microsoft Y2K  
Microsoft
 This static CD-based web site is representative of the www.microsoft.com/y2k site as of October 15, 1999.

Microsoft Year 2000 Readiness Disclosure & Resource Center
Microsoft Year 2000 Frequently Asked Questions

Topics on this Page
down What is the year 2000 problem?
down Why do we have this problem?
down What are some potential consequences of Y2K problems?
down What kinds of computer systems are affected by the Y2K problem?
down What is Microsoft's Y2K strategy?
down What is Microsoft's statement of year 2000 compliance?
down How will Microsoft deliver information about the compliance or non-compliance of its products?
down How can I get the Microsoft Year 2000 Product Guide?
down What are the main points of exposure for the PC?
down How are Microsoft products most vulnerable to Y2K problems?
down How do I determine what version of an application, file, or operating system I am running?
down What are the test criteria that Microsoft uses to validate date handling within its products?
down Does Microsoft recommend that customers use two-digit or four-digit data entry?
down What are Microsoft's recommendations for working with the year 2000 on a PC?
down What does Microsoft recommend for working with the PC BIOS issue?
down Does Microsoft have any process recommendations for organizations dealing with the year 2000 problem?
down What are the most important business issues for making Y2K decisions?
down What steps should organizations take when dealing with the Y2K problem?
down What will the effects of a shortage of time and resources do to the decision-making process?
down What is a Modified Rapid Replacement Strategy?
down Is there a workaround to prevent the right margin of a compliance document from getting chopped off during printing?
down How are Microsoft application development tools affected by BIOS/RTC errors?

What is the year 2000 problem? back to top

Answer:

The year 2000 problem stems from three main issues:

  • The use of only 2 digits to represent a four-digit year
  • The year 2000 is not recognized as a leap year by some systems
  • The use of date codes to provide special software functionality

The year 2000, often abbreviated as Y2K, is a challenge that can affect many aspects of a company's business and operations, including computers and technology systems, its supply chain, transportation carriers, data transmissions, customer chains, and even business investments. In addition, embedded chips and microprocessors in component parts and assemblies may depend on date-related information.

Identifying all potential exposures and assessing the real risk they pose to an organization is critical to the success of any year 2000 project.

Two-digit date storage

The most common problem occurs when software has been written to store and/or manipulate date data using only the last two digits for the year (versus a sliding 100-year window). Calculations built upon these dates may not execute properly after 1999 because they may not see dates in the 2000s as being larger numbers than those in the 1900s. For example: 2000 û 1998 = 2 but 00 û 98 = û98 (or 98 if the application does not allow negative numbers). The result of this might be that your accounting software sees all accounts receivable as overdue (98 years past due in the example above).

Leap year calculations

The year 2000 is a special case leap year that happens once every 400 years. Unfortunately, some systems and applications may not recognize the year 2000 as a leap year. This would cause dates following February 28, 2000 to be offset incorrectly by one day.

Special meanings for dates

The third Y2K problem is more commonly found in older code bases. Developers sometimes used date fields to provide special functionality. The most common date used for this was 9/9/99. In some applications the use of the special date meant "save this data item forever," or "remove this data item automatically after 30 days," or "sort this data item to the top of the report." Within each organization and application, special date codes may have been used differently. This is one of the main reasons that no single tool can locate all uses and/or misuses of date data.

Why do we have this problem? back to top

Answer:

Expensive memory costs. In the early days of Information Services, data storage space & capacity (punch cards & memory) was very valuable. By asking software developers to conserve just two bits per record in memory for example (the "19" of 1975), organizations were able to realize millions of dollars in savings. In addition, programmers didn't expect that the applications they were developing would still be in use 20 or 30 years in the future. The programming habits and processes put into place in and before the 1970s, including two-digit shortcuts, are still in use today.

Cultural. Another aspect of this challenge is the tendency to reduce our descriptions of dates to a minimum. It is likely that when asked for a birth date or graduation year, most people would describe the year in 2-digit year format. This preference for the 2-digit year format is the reason even recently released software may be vulnerable to Y2K issues.

What are some potential consequences of Y2K problems? back to top

Answer:

The potential impact of the Y2K problem is difficult to quantify. The challenge is wide reaching and it is much more than just an issue for mainframe computers or even PCs. Many other types of systems and equipment have embedded microprocessors that handle date data and could be affected by Y2K problems. Microprocessors embedded within components of transportation systems, manufacturing facilities, security systems, networks, telephone systems, or power grids, may be dependent on date-related information. Two possible failure scenarios are examined below.

Complete system breakdown. A complete system failure is obvious and therefore easy to detect. In this event, contingency plans can be implemented and immediate action can be taken to address the breakdown.

Examples of a complete breakdown:

  • An order entry application might not allow any orders to be entered after the year 2000 if the application treats 00 as an invalid number. In this situation, it would become immediately apparent that the application was not functioning properly due to the fact that business would be stalled.
  • An embedded system that controls an obvious physical function such as an air conditioner control unit could have a problem if there was date handling built into the maintenance systems. The malfunction of this device would be obvious due to the lack of cool air.

Partial breakdown. A partial breakdown is a more difficult problem to recognize and can have farther-reaching consequences than that of a complete system failure. If a system only partially fails, it may not be obvious to the user of that system. In the case of financial transactions, a calculation error may produce results that the user assumes are correct.

Examples of a partial breakdown:

  • An application designed to calculate mortgage payments might produce an incorrect result. If the application were to cease functioning it would be very obvious that there was a problem. But, if the application still produces a result, it becomes incumbent upon the operator of that application to recognize that there has been miscalculation.
  • A business phone system may experience subtle problems in some subset of its features. In most cases, a dial tone will still be available and the phone may seem to function normally. The problem may occur with the reports that detail the duration of each phone call. For organizations that use this information for billing and/or tracking, the problematic reports may not be immediately recognized and automated billing systems may generate faulty invoices.

What kinds of computer systems are affected by the Y2K problem? back to top

Answer:

The Y2K problem exists in the mainframe, mini, UNIX, and PC, and other computing environments. Mainframe computers running custom code will be the most acutely affected, but there are Y2K concerns on all of the other platforms as well. (See Answer 3, above.)

What is Microsoft's Y2K strategy? back to top

Answer:

Microsoft customers have expressed the need for three basic things: simple definitions to identify the product's level of Y2K compliance; information on the ways the product handles dates; and assistance with finding additional resources for Y2K efforts.

  • Simple definitions. In the Year 2000 Product Guide, the company's products are grouped into five categories: compliant, compliant with minor issues, not compliant, testing yet to be completed and will not test. (See question number 8 for further detail.)
  • Product Guides. Each tested product has a product guide document written which covers its compliance status, describes the date handling methods of the product, and identifies any issues or software updates that exist.
  • Resources. As a technology leader, Microsoft is committed to helping organizations find solutions to Y2K problems. Microsoft recognizes the important role remediation tools play in enabling customers to prepare their environments for the year 2000, and is committed to helping customers understand the types of tools they will need and where they can find the necessary products.

The company is actively helping customers address Y2K issues by conducting product compliance tests, and by providing information resources, remediation tools, and channel support.

Product compliance testing. Microsoft has made a company-wide commitment to test for Y2K issues in its operating system, business and personal productivity products. To date the vast majority (about 93 percent) of the products tested are either compliant or compliant with minor issues. Microsoft's Y2K testing approach is very thorough, consisting of source code review, date functionality tests and product-specific testing. Products classified as compliant with minor issues will perform without data loss or impact on core functionality regardless of the year 2000 date change. Microsoft is committed to ongoing product testing and will retest products upon the release of service packs or upgrades to ensure Y2K compliance is maintained.

Information resources. Microsoft is supplying information customers need to help them evaluate the effect the year 2000 might have on their computing environments as well as providing the resources, tools, and assistance needed for remediation. The Microsoft Year 2000 Readiness and Disclosure Resource Center Web site at: http://www.microsoft.com/y2k/ is the primary information repository. Information from this web site also is available on CD-ROM, which is delivered roughly quarterly on a subscription basis.

In addition, Microsoft is providing several other tailored information resources to make it easier for customers to make year 2000 remediation decisions. These include a new e-mail subscription service that delivers compliance news updates every two weeks, an e-mail alias offering quick turnaround on year 2000 questions, and toll-free phone numbers (in the US (888) MSFT-Y2K), for additional product information.

Y2K contact form. If, after reviewing the information in the Year 2000 Product Guide, you have additional questions related to a specific Microsoft product, go to the bottom of its compliance document in the Product Guide to submit a question to a Microsoft Support Representative.

Y2K toll-free phone number. For customers without Web access, Microsoft has launched a toll-free information line where product guides, white papers, and answers to frequently asked questions are available by fax or e-mail. The toll free number in the US is (888) MSFT-Y2K (673-8925).

Preparing for Year 2000 û briefings. As part of its quarterly briefings for information technology professionals, Microsoft is offering technical breakout sessions that focus on ways businesses of all sizes can implement year 2000 readiness programs. The sessions provide information on using tools, services, and products, such as Microsoft Systems Management Server, as components of year 2000 remediation. These free TechNet briefings are held throughout the world. To find a nearby briefing, visit the TechNet Web site at http://www.microsoft.com/technet/events/.

Microsoft Y2K BluePrint workshops. Microsoft will provide a one-day workshop to assist enterprise customers in preparing a year 2000 plan with concise and concrete actions. In the workshop, customers will learn how to apply the Microsoft Solutions Framework (MSF) methodology for year 2000 program management.

RemediationTools. Microsoft recognizes the important role remediation tools play in enabling customers to prepare their computing environments for the year 2000, and is committed to helping customers understand the types of tools they will need and where they can be found. Microsoft's solution providers have many tools for addressing the Y2K challenge. A current list of these companies and their tools is located on the Y2K Web site at: http://www.microsoft.com/technet/year2k/tools/tools.htm.

The Year 2000 Tools Guide includes information on tools designed to help you:

  • Address Y2K issues on server-based applications and products
  • Test, profile and resolve BIOS-related issues
  • Scan and analyze client server applications
  • Perform software inventory and analysis
  • Build solutions to help address legacy applications
  • Scan, analyze and revise your Microsoft Office documents
  • Create and manage your Y2K projects
  • Scan and analyze your Visual Basic code and C++ code
  • Scan and analyze your Visual Fox Pro Applications

DISCLAIMER: MICROSOFT HAS NOT TESTED, AND MAKES NO WARRANTIES CONCERNING, ANY THIRD-PARTY PRODUCTS OR RESOURCES LISTED IN THE YEAR 2000 TOOLS GUIDE. YOU WILL NEED TO DO YOUR OWN ASSESSMENT TO DETERMINE IF THE TOOLS OFFERED MEET YOUR NEEDS. FOR INFORMATION REGARDING THESE COMPANIES OR THEIR Y2K SOLUTIONS, PLEASE CONTACT THE COMPANIES DIRECTLY.

Product Analyzer. Microsoft is developing a tool to aid in remediation, called the Microsoft Y2K Product Analyzer, which scans a user's hard drive to create an inventory of Microsoft products. It then compares this inventory to the Microsoft Year 2000 Compliance product guides, identifies products (if any) for which the user should download a free software update, and provides URLs to enable the user to obtain the updates easily. The Product Analyzer will be available free of charge on Microsoft's Web site and on the Resource CD.

Channel support. Microsoft will continue to work closely with its channel providers to ensure they have the tools, technology and expertise they need to help businesses of all sizes prepare for the Y2K challenge. Microsoft has more than 775,000 partners and providers worldwide, ranging in size from small-business value-added providers to enterprise consulting organizations.

What is Microsoft's statement of year 2000 compliance? back to top

Answer:

A year 2000 compliant product from Microsoft will not produce errors processing date data in connection with the year change from December 31, 1999 to January 1, 2000 when used with accurate date data in accordance with its documentation and the recommendations and exceptions set forth in the Microsoft Year 2000 Product Guide, provided all other products (e.g., other software, firmware and hardware) used with it properly exchange date data with the Microsoft product. A Year 2000 Compliant product from Microsoft will recognize the year 2000 as a leap year.

DISCLAIMER THE STATEMENT OF COMPLIANCE REFERS TO THE MICROSOFT PRODUCT AS DELIVERED BY MICROSOFT. THE COMPLIANCE STATEMENT DOES NOT APPLY TO USER CUSTOMIZABLE FEATURES OR THIRD PARTY ADD-ON FEATURES OR PRODUCTS, INCLUDING ITEMS SUCH AS MACROS AND CUSTOM PROGRAMMING AND FORMATTING FEATURES. THE MICROSOFT STATEMENT OF COMPLIANCE DOES NOT CONSTITUTE A WARRANTY OR EXTEND THE TERMS OF ANY EXISTING WARRANTY. THE WARRANTIES PROVIDED FOR MICROSOFT'S PRODUCTS, IF ANY, ARE SET FORTH IN THE END USER LICENSE AGREEMENTS (EULAS) THAT ACCOMPANY THE PRODUCTS OR THE TERMS OF THE LICENSE AGREEMENT UNDER WHICH YOU MAKE USE OF A MICROSOFT PRODUCT. THE INFORMATION AVAILABLE FROM MICROSOFT CONCERNING THE YEAR 2000 IS PROVIDED FOR THE SOLE PURPOSE OF ASSISTING OUR CUSTOMERS IN THEIR PLANNING FOR THE TRANSITION TO THE YEAR 2000.

How will Microsoft deliver information about the compliance or non-compliance of its products? back to top

Answer:

The Microsoft Year 2000 Product Guide on the World Wide Web at: http://www.microsoft.com/technet/year2k/product/product.asp was developed in response to customer requests for quick reference information on the Y2K issue and Microsoft products.

The Microsoft products in the guide are listed in one of five categories:
Category
Description
Compliant

The product fully meets Microsoft's standard of compliance. May have prerequisite patch or service pack for compliance

Compliant with minor issues

The product meets Microsoft's standard of compliance with some disclosed exceptions that constitute minor date issues

Not Compliant

The product does not meet Microsoft's standard of compliance

Testing yet to be completed

Product test is not yet complete or has not been started but will be tested

Will not test

The product will not be tested for compliance

Microsoft's policy is that future Microsoft products be year 2000 compliant. To support customers who use versions of Microsoft products that are recent but not the most current, the company intends to maintain the year 2000 compliance of many popular operating system, business and personal productivity products through Jan. 1, 2001.

How can I get the Microsoft Year 2000 Product Guide? back to top

Answer:

The Year 2000 Product Guide is posted on the Microsoft Year 2000 Readiness and Disclosure Resource Center site at: http://www.microsoft.com/technet/year2k/product/product.asp. Information from this web site also is available on CD-ROM, which is delivered roughly quarterly on a subscription basis.

The Year 2000 Product Guide is updated continually as product test information becomes available. The Product Guides include the following information:

  1. Product Name, version number and Y2K Compliance category
  2. Language, product release date and operational range for data
  3. Prerequisites for compliance, such as service packs and patches
  4. Product dependencies and clock dependencies
  5. Describes the product's date handling capabilities
  6. If the product uses two-digit shortcuts, describes the window used and methodology for conversion to four digits.
  7. If the product is not compliant, describes how it is not.
  8. Describes common date usage errors (how the user may have used the product in a non-compliant way).
  9. Recommendations for specific items to test or testing scenarios, if applicable.

What are the main points of exposure for the PC? back to top

Answer:

The PC has 6 main layers of exposure to Y2K problems.

  1. Hardware
  2. Operating System
  3. Applications and Runtime Libraries
  4. Documents and Spreadsheets
  5. Custom Code
  6. Data Interfaces

Hardware. The most common hardware problem presented by the year 2000 is associated with the PC's Real Time Clock (RTC) and Basic Input/Output System combination (BIOS). The RTC and BIOS software reside in the computer hardware itself.

The RTC keeps track of the system date and time. Most PCs have a two-digit-year RTC. That means the RTC chip stores the values for seconds, minutes, hours, days, months, and years in 2 digits. The century value is stored separately. The BIOS sets and maintains year and century data. The BIOS software is usually stored in a memory chip or in the computer's flash memory. If the century rollover code is missing from the BIOS program, the RTC century value is not updated when the PC is turned on. When the date changes from "99" to "00" but the century bits do not change from "19" to "20," the operating system sees 1900 instead of 2000.

Logic has been included in the newer Microsoft operating systems to compensate for this type of rollover problem. Windows NT 3.51 (with Service Pack 5 plus Y2K fixes), Windows NT 4.0 (with Service Pack 4 plus Y2k fixes), and the Windows 98 (with Y2K fixes) and Windows 2000 operating systems will recognize 1900 as an error case and will automatically compensate by setting the date to 2000.

Some BIOSes revert to 1900 every time the system reboots. Throughout the year 2000, the Microsoft fix in Windows NT 3.51, Windows NT 4.0, and Windows 98 will set the system clock to 2000 every time the machine is turned on.

Other BIOSes have error handling built into them that resets a 1900 date before the Microsoft operating system begins to interact with the BIOS. If that date is a valid date, such as 1993, then the Microsoft operating system will assume that it is correct. Microsoft recommends that customers identify the BIOS make and version number in their computer(s) and test the BIOS for year 2000 functionality. For more information, see Microsoft Operating System Interactions with BIOS and Real Time Clock found in the White Papers section of the Microsoft Year 2000 Web site.

Operating systems. Software applications typically obtain date information from the operating system clock so it is important to assess the Y2K functionality of your operating system(s). The Microsoft Year 2000 Product Guide includes Y2K compliance information and guidelines for testing Microsoft operating systems.

Applications and runtime libraries. Applications and runtime libraries are interdependent. (Runtime Libraries are files that provide functionality to applications.)

Users do not directly interact with runtime libraries; rather, it is the user's actions with an application that utilize runtimes. By loading a Windows application you are using runtime libraries. It is possible, though, that you can be running an application such as Excel and then add a third-party product that provides yet another runtime library. If that is the case, the dependency roles are reversed. If a runtime library mishandles the date, it doesn't matter if the application, operating system, or BIOS were designed properly. The environment is still not ready. Therefore, it is possible for a non-Microsoft runtime library to be used in conjunction with a Microsoft application and for it to break the Microsoft application.

Some applications have internal calendars that could miscalculate the leap year; others may force a two-digit date, depending on how that particular application was designed.

Documents and Spreadsheets. Documents are the products of work done using applications. Some examples of documents would be Excel spreadsheets, Word documents and Access databases. In many cases these documents contain critical information and may assist in business decision-making. If there are unique elements of these documents such as custom mathematical formulas, macros, Visual Basic for Applications code, etc. then each instance must be identified and prioritized for analysis and potential repair. Prioritizing the documents can be very difficult due to the distributed nature of usage and storage within organizations.

Custom code. Custom code may have the largest exposure to Y2K problems. Many organizations have in-house or contracted programmers developing custom applications to better meet their business needs. Due to non-standard programming practices throughout the software development community, date handling in applications is not consistent and will need to be examined application-by-application and line-by-line of code.

An example problem in custom code would be if someone placed a two-digit date in a text string and then based a calculation on that date. The application would have no way of interpreting those two digits as a date. As a result, the calculation could be wrong. If this were done in Visual Basic for Applications (VBA) to enhance an Office application, it could lead to date handling problems. Even though the application (for example Excel) is handling dates correctly, the VBA custom code could cause it to malfunction.

Data interfaces. In many organizations, the PC is just one of many parts in the information technology system. The interfaces between the PC and other platforms must be understood, inventoried, analyzed, fixed, and tested, just like any other portion of the year 2000 project.

An end-to-end view of the organization is the best way to deal with understanding problems with data interfaces. A PC may be ready for the year 2000. Yet, if there is an interface from that PC to a system that does not handle dates properly, the information placed into the PC environment can cause problems.

How are Microsoft products most vulnerable to Y2K problems? back to top

Answer:

Custom code. In many computing environments, custom code represents the largest exposure to Y2K issues.

Excel spreadsheets. Excel is the Office application most-often customized by users. Furthermore, the use of dates in Excel is very common. Three add-on utilities are now available from Microsoft to assist with dates when converting spreadsheets from older versions to Excel 97.

  • The Date Fix Wizard allows users to change the date format of two-digit-year dates quickly and easily or to modify serial number dates so that they fall within a specified century.
  • The Date Migration Wizard helps ensure that, when a workbook that was created in an earlier version of Microsoft Excel is opened, dates with two-digit years are handled correctly. The wizard searches workbooks for functions that contain two-digit years falling between 20 and 29 in text dates.
  • The Date Watch Wizard monitors work for year-ambiguous dates and formats.

The add-ons for Excel 97 are available from the Microsoft Web site at: http://support.microsoft.com/support/kb/articles/Q176/9/43.asp.

Hardware. Although Microsoft produces very little hardware, Microsoft software is dependent upon the Y2K readiness of the computer.

Data interfaces. If a backend system has a Y2K problem and passes erroneous data (or no data) to the PC, it may initially appear that the PC itself failed even though that is not the case.

How do I determine what version of an application, file, or operating system I am running? back to top

Answer:

For applications the easiest way to determine what version you are running is activate the program, go to the Help menu, and look in the About <product name> section. For files, it is suggested to use Windows Explorer's Find feature to locate the file of interest. After finding the file, select it and right click to examine Properties. For operating systems, go to My Computer, right click, and select Properties.

What are the test criteria that Microsoft uses to validate date handling within its products? back to top

Answer:

Microsoft understands the critical nature of the Year 2000 issue. Information Technology professionals responsible for the year 2000 health of Microsoft products used in their environments need to understand how Microsoft has tested its products. Generally, a product is defined by the Microsoft code it automatically loads or offers to load.

The list below represents the framework used by Microsoft to test the year 2000 date handling capabilities of Microsoft products.

  1. The product stores and calculates dates consistent with a four-digit format throughout its operational range.
  2. If the product allows the user to enter a two-digit short cut for the year, the product recognizes the year consistent with a four-digit format.
  3. The product will correctly execute leap year calculations.
  4. The product does not use special values for dates within its operational range for data.
  5. The product will function through the end of year 2035.

Compliance is determined by satisfying the requirements of the Microsoft Year 2000 Compliance Statement and Test Criteria. Third party products are not tested or represented by Microsoft. The results of this testing process can be found in the Microsoft Year 2000 Product Guide. Microsoft continues to test for Year 2000 issues as new versions or service packs are released.

Note all references to "dates" refer to using either four digits or two digits for the YEAR portion of the date. This testing criteria does not constitute a warranty or certification expressed or implied, of any kind.

Does Microsoft recommend that customers use two-digit or four-digit data entry? back to top

Answer:

Functionality. Within Microsoft applications, the four-digit date logic is applied to meet that application's particular needs. For example, when Outlook is used for scheduling, the date window is different than the date window for birth dates in the Contact Manager. The reason is these two functions require different logic to better serve the user's needs.

Efficiency. The other major aspect of two-digit use comes back to sociological issues. First, users think in two digits, so it is more natural for them. Second, entry of two digits is quicker and easier than four digits. Finally, the use of just two-digits requires less storage space on the backend system.

Recommendation. Microsoft recommends the use of four-digit dates for date input where possible. This will lead to the highest level of accuracy in date calculations.

What are Microsoft's recommendations for working with the year 2000 on a PC? back to top

Answer:

Examine the computing environment from end-to-end. Microsoft recommends that every organization looking into the potential impact of the year 2000 take an end-to-end look at their environments. "End-to-end" means understanding how data enters an environment (user input, electronic transfer, etc.), how it is manipulated, stored, calculated, sorted, sequenced, etc. within the environment, what systems are involved with the handling of that data, and finally, how the data leaves that environment (user interface, printed hard copy, electronic data interface, etc.). "End-to-end" encompasses both hardware and software. Microsoft technologies are but one piece of most computing environments.

Use a test-bed. We recommend that customers DO NOT test for Y2K issues on production PCs. There are many date-related functions on the average desktop of which people may not be aware. Arbitrarily setting the clock ahead can have some unforeseen results. For example, auto archiving on scheduling programs, automated backup systems, special licensing timeouts on vertical applications, and demonstration applications can all be adversely affected by the year 2000 problem.

Check the BIOS and system clock. Microsoft advocates the use of an MS-DOS boot disk to check the system for clock issues. This will separate the day-to-day functionality of the system from the date testing. After the user sets the clock ahead for testing, make sure to reboot the machine to the boot disk and set the clock back to the right time. For detailed BIOS testing recommendations, see the white paper Microsoft Operating System Interactions with BIOS and Real Time Clock found in the White Papers section of the Microsoft Year 2000 Web site.

Inspect custom code. In many computing environments, custom code represents the largest exposure to Y2K issues. We advocate that experienced programmers evaluate any custom code in information systems. To locate third-party products that can assist in the inspection of custom code, please see the Year 2000 Tools Guide at: http://www.microsoft.com/technet/year2k/tools/tools.htm.

Use management tools where possible for inventory and distribution of fixes. If your PCs are on a network and you have a network management tool such as Microsoft Systems Management Server, you can use the inventory and analysis features of the tool to understand what is in your environment. Once you have this information, you can begin the process of organizing the work to be done. Many management tools also offer the capability of distributing software. This mechanism can be employed to distribute software updates and fixes, as needed.

What does Microsoft recommend for working with the PC BIOS issue? back to top

Answer:

Take inventory of your computing environment. It is important to assess the Y2K functionality of the operating system and RTC/BIOS combination you are dealing with on each machine. Unfortunately, it is possible that within a single purchase order your computer supplier delivered machines with differing versions of BIOSes. This means that your best bet is to verify each machine. For many large organizations where it is too time-consuming to touch every desktop, Information Systems departments may need to distribute instructions to the users for manually setting the system clock to 2000.

Use Microsoft operating system solutions. Download the Windows« 98 Year 2000 Update at: http://www.windowsupdate.microsoft.com/. Download updates for Windows NT at: http://support.microsoft.com/Support/NTServer/Content/ServicePacks/Default.asp. Prior to conducting year 2000 rollover tests, Microsoft recommends that you install these and other free updates for operating systems and applications that Microsoft makes available from time to time.

Use the testing steps in the white paper Microsoft Operating System Interactions with BIOS and Real Time Clock found in the White Papers section of the Microsoft Year 2000 Web site to assess how your machine's RTC/BIOS handles the rollover to year 2000 with your Windows operating systems. At the end of testing be sure to reset the operating system to the current date/time.

If necessary, manually set the date. If you encounter the most common rollover error, in which the century remains "1900," and if the machine is running one of the following operating systems Windows« 3.x, Windows« 95, or MS-DOS« version 5.x or later, manually reset the date. (If you are not operating in a test bed environment, it is recommended that you wait until after Dec. 31, 1999 to reset the date. This will prevent premature expiration of date-sensitive software and settings.) The system time should work properly from that point forward. In fact, this will be the most common practice for home users with this Y2K problem.

Contact your PC's manufacturer for assistance. If you encounter rollover errors, contact the PC's manufacturer. Many PC manufacturers have included the required BIOS logic for handling the Y2K transition for quite some time. However, some older machines may not have upgradable BIOSes (or no BIOS upgrade was made available). Many manufacturers have developed device drivers to compensate for the RTC limitations of systems that are not year 2000 ready.

Use third-party application solutions. Another option is to use one of the many products that have been developed to address BIOS issues. Select Year 2000 Tools located at: http://www.microsoft.com/technet/year2k/tools/tools.htm for links to third party suppliers. Microsoft has not tested, and makes no warranties concerning, any third-party products or resources such as those described or referred to above.

Make contingency plans. Develop contingency plans for information technology systems and business processes. Prepare to address "worst case scenarios" for the possible failure of systems or a group of systems due to the year 2000. This may include plans for handling key business processes manually.

Does Microsoft have any process recommendations for organizations dealing with the year 2000 problem? back to top

Answer:

Yes. Microsoft advocates that all organizations take an end-to-end view of their environment. End-to-end means understanding how information enters, is used, and leaves an environment. It requires an assessment of all of the physical, software and business process components. Microsoft has identified a series of steps that customers should take as part of their end-to-end review:

  • Take inventory of, and analyze all systems, including immediate testing of all systems to determine compliance.
  • Fix or replace hardware, firmware, or embedded systems where necessary, and fix or replace software as necessary. Options include fixing code, rehosting code on the same platform (rehosting on a new platform may be required), using packaged, off-the-shelf applications wherever possible, ignoring purely cosmetic problems, and outsourcing the business function to alleviate the pressure on internal resources.
  • Retire systems where fixes or replacements cannot be finished because of lack of time and resources.
  • Adapt business processes to address potential year 2000 issues. Examine the supply chain to understand how this problem affects business partners and customers. Plan for the contingencies of failure and success as they apply to the year 2000.

To address year 2000 concerns, Microsoft also suggests companies take non-technical steps such as starting to incorporate four-digit years in spreadsheets, databases and other applications wherever possible. Furthermore, companies should train information technology staff, help desk, and customer support staff to recognize date-related problems and respond promptly.

What are the most important business issues for making Y2K decisions? back to top

Answer:

Microsoft recognizes the pressures being placed upon IT professionals by the year 2000. Business solutions to Y2K problems will be founded in part upon the factors discussed below.

Resources and time. The year 2000 imposes a different set of priorities on Information Technology organizations than do traditional projects. Resources and time are the primary issues that need to be factored into technical and business decisions for the year 2000.

Personnel. The IT industry in general is experiencing a shortage of trained personnel and the year 2000 is exacerbating this problem. In the mainframe world, COBOL programmers are getting to be more and more difficult to find and their salaries are increasing. For other legacy technology environments there are similar shortages of capable staffing. The PC environment has the largest community of knowledgeable personnel. Furthermore, they have been largely unused for Y2K work, as most enterprises have been focused on central IT issues.

Hardware procurement. Today there is high demand for replacement and test platform hardware in the legacy markets. Organizations are finding it difficult to procure what they need in order to complete the work on time. The PC environment will be able to assist on this front due to the proliferation of manufacturers and service vendors.

Supply chain. The best way to explain this issue is to think about a manufacturing company. Most manufacturers only carry enough inventory to sustain production for a few weeks at most. If they lose just one key supplier and have no way to compensate for this loss, production can be jeopardized. So, if a large manufacturer identified 300 key suppliers, it would then have to think about the supply chain for each of those 300 suppliers. If there were 3-5 key suppliers for each of the manufacturer's key suppliers, the manufacturer must now worry about the Y2K health of 900 to 1500 companies.

Cost. The financial impact of the Y2K problem can be significant. Corporations are faced with potentially large outlays of capital in order to prepare their environments for the change of the millennium. As IT budgets grow to meet the needs of the Y2K projects, the rest of the organization will have to compensate for the strain created by unplanned IT expenditures.

Contingency planning. Everyone should develop contingency plans for the year 2000. There are two elements to contingency planning to consider. The first is contingency for failure. If a system or group of systems fail due to the year 2000, there should be a logical progression of reactive activities that IT professionals can pursue to compensate for that problem. The second is the contingency for success. If a key competitor or group of competitors fail because of this issue then it is possible that there will be an excessive amount of business in a very short period of time. This can be as challenging for an organization as having too little business.

Manual processes can compensate for the loss of functionality of a system either through forced retirement or outright failure of the system. In today's world, a "manual" process can be equated with a PC-based process. An example of a manual process would be if a company filled an auditorium with people sitting in front of stand-alone PCs and a printer to process daily transactions.

Digital Nervous System. The Information Technology infrastructure of an organization functions as the Digital Nervous System of the business. A healthy Digital Nervous System will enable you to respond efficiently to changes in your business environment due to the year 2000. Microsoft technologies, services and partners combine to create the basis for a healthy Digital Nervous System that can address both the technical and business issues at hand.

What steps should organizations take when dealing with the Y2K problem? back to top

Answer:

Inventory and analyze. Before considering solutions such as fixing, replacing and/or retiring systems, we recommend that the first step in any Y2K evaluation be a complete inventory and analysis of information technology assets.

Fix and/or replace.

  • Fix the code if you have access to and an understanding of the source code.
  • Re-host on same platform. More often than not this implies custom development work on that platform. This is a viable option to maintain knowledge base and expertise.
  • Re-host on a new platform. This is commonly known as the "replacement" strategy.
  • Use packaged, off-the-shelf applications with known y2k readiness. This will be one of the core components in a successful replacement strategy.
  • Outsource a broken business function. This can alleviate the pressure on internal human and physical resources.
  • Live with cosmetic bugs. If a problem can be identified as purely cosmetic then it may be acceptable to leave it alone.

Retire systems or applications. As time and human resources run short, an organization may be forced to retire systems that they deem critical while remediating others in order to survive.

What will the effects of a shortage of time and resources do to the decision-making process? back to top

Answer:

Triage becomes essential. Year 2000 project managers should identify the applications and systems throughout their organizations to determine where their maximum exposure lies. They will then need to determine which applications and systems must be saved, which would be nice to save, and which are not necessary to save. Applications and systems may be grouped into the following categories:

  1. Systems that are mission-critical but carry risks different from traditional Information Technology. (For example: manufacturing equipment with embedded control systems.)
  2. Systems that are mission critical. If these systems are lost, the company will cease to do business. (Example: core accounting systems or order-entry systems.)
  3. Systems that, if lost, will cause significant pain and will disrupt major business processes. (Example: e-mail systems, report writing systems or line-of-business applications.)
  4. Systems that, if lost, will cause only minor inconveniences. Work will continue with or without these facilitators. (Example: simple data manipulation tools.)
  5. Systems that are extraneous and should be retired. (Example: old applications that few individuals use.)

Each system should be analyzed to determine the resources and time required to address Y2K issues. As time and human resources run short, many organizations may be forced to retire systems in category 3. When the need for retirement starts to hit this level, organizations will be faced with the potential for significant disruption of business. It is at this point that Microsoft technologies can provide assistance through the use of a Modified Rapid Replacement strategy. The application of this strategy is not a matter of re-inventing the organization; it is simply a method of applying technology to the business need created by the year 2000.

What is a Modified Rapid Replacement Strategy? back to top

Answer:

Identifying and replacing critical systems. Modified rapid replacement is the idea that it is not necessary to get a 1:1 feature/function replacement ratio when replacing a system. In the context of the year 2000, the main thing that matters is "Did you get ready in time?" If you look at a business application and recognize that it will either be replaced or retired due to time and resource restrictions, the first step that needs to be taken is an understanding how that application fulfills a business requirement. If the application provides 24 great features, but only six of them are critical to its functionality, replace those six and move on to the next part of the overall project. The most cost-effective objective is to create solutions to save those critical systems prior to the very real deadline.

Using familiar technology. The advantage of the Modified Rapid Replacement strategy is that it uses a business's existing investments in knowledge of Microsoft technologies as well as the products that are already in use. IT professionals will not have to learn a new set of technologies when they use the Microsoft solution set.

For example, a business's need for a uniform e-mail system within an environment may be crucial. In order to meet the year 2000 deadline, though, perhaps the organization deploys the Exchange 5.5 infrastructure with servers only. They use browsers as the e-mail client throughout the enterprise. Is this the optimal way to use Exchange? No, but it will get the organization through the year 2000 and position it strategically for growth in the years that follow.

Another example involves an organization with a report-writing engine on a legacy platform affected by the year 2000. The organization is faced with the decision of dedicating resources to fixing that component or retiring it. (Ideally they would fix, but if they are already behind on the core, mission-critical applications, those legacy resources will have to be dedicated to that core portion of the project.) Instead of retiring the report writer, the organization creates a server-side ActiveX control using internal or third party resources to handle the report-writing component. They deploy it to the desktop for any type of browser. It may be that this replacement only does 15 of the 75 reports that the original one could do, but those 15 are the critical ones.

Is there a workaround to prevent the right margin of a compliance document from getting chopped off during printing? back to top

Answer:

Select the entire text by clicking and dragging with the mouse from the top to the bottom of the compliance document, but not the navigation bar on the left. Go to File, Print, click "Selection," then OK.

How are Microsoft application development tools affected by BIOS/RTC errors? back to top

Answer:

Visual SourceSafe uses a "time stamp" on data files. This time stamp contains date information obtained from the system clock. The time stamp is provided by the machine's BIOS (Basic Input-Output System), and is not provided by Visual SourceSafe. If the machine uses a year 2000 non-compliant BIOS/RTC that fails to reset the system clock to January 1, 2000 (and if the operating system does not automatically correct the date) new files and new versions will be saved with incorrect time stamps. This could corrupt data in the history database. For example, if the version control system checks in a "new" file with an incorrect date (say, a year in the 1900s), the control system could overwrite the "new" version with an older version of the data file. Developers should contact their PC vendor to ensure that the computer's BIOS is year 2000 compliant. For more information, see the individual product summaries for Microsoft application development tools in the Year 2000 Product Guide.


Send This To a Friend


 

 

ALL COMMUNICATIONS OR CONVEYANCES OF INFORMATION TO YOU CONCERNING MICROSOFT AND THE YEAR 2000, INCLUDING BUT NOT LIMITED TO THIS DOCUMENT OR ANY OTHER PAST, PRESENT OR FUTURE INFORMATION REGARDING YEAR 2000 TESTING, ASSESSMENTS, READINESS, TIME TABLES, OBJECTIVES, OR OTHER (COLLECTIVELY THE "MICROSOFT YEAR 2000 STATEMENT"), ARE PROVIDED AS A "YEAR 2000 READINESS DISCLOSURE" (AS DEFINED BY THE YEAR 2000 INFORMATION AND READINESS DISCLOSURE ACT) AND CAN BE FOUND AT MICROSOFTÆS YEAR 2000 WEBSITE LOCATED AT http://www.microsoft.com/year2000/ (the "Y2K WEBSITE"). EACH MICROSOFT YEAR 2000 STATEMENT IS PROVIDED PURSUANT TO THE TERMS HEREOF, THE TERMS OF THE Y2K WEBSITE, AND THE YEAR 2000 INFORMATION AND READINESS DISCLOSURE ACT FOR THE SOLE PURPOSE OF ASSISTING THE PLANNING FOR THE TRANSITION TO THE YEAR 2000. EACH MICROSOFT YEAR 2000 STATEMENT CONTAINS INFORMATION CURRENTLY AVAILABLE AND IS UPDATED REGULARLY AND SUBJECT TO CHANGE. MICROSOFT THEREFORE RECOMMENDS THAT YOU CHECK THE Y2K WEBSITE REGULARLY FOR ANY CHANGES TO ANY MICROSOFT YEAR 2000 STATEMENT. EACH MICROSOFT YEAR 2000 STATEMENT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. CONSEQUENTLY, MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. MOREOVER, MICROSOFT DOES NOT WARRANT OR MAKE ANY REPRESENTATIONS REGARDING THE USE OR THE RESULTS OF THE USE OF ANY MICROSOFT YEAR 2000 STATEMENT IN TERMS OF ITS CORRECTNESS, ACCURACY, RELIABILITY, OR OTHERWISE. NO ORAL OR WRITTEN INFORMATION OR ADVICE GIVEN BY MICROSOFT OR ITS AUTHORIZED REPRESENTATIVES SHALL CREATE A WARRANTY OR IN ANY WAY DECREASE THE SCOPE OF THIS WARRANTY DISCLAIMER. IN NO EVENT SHALL MICROSOFT OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER REGARDING ANY MICROSOFT YEAR 2000 STATEMENT INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS, PUNITIVE OR SPECIAL DAMAGES, EVEN IF MICROSOFT OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, SO THE FOREGOING LIMITATION MAY NOT APPLY TO YOU. THE INFORMATION CONTAINED IN EACH MICROSOFT YEAR 2000 STATEMENT IS FOUND AT THE Y2K WEBSITE AND IS INTENDED TO BE READ IN CONJUNCTION WITH OTHER INFORMATION LOCATED AT THE Y2K WEBSITE, INCLUDING BUT NOT LIMITED TO MICROSOFTÆS YEAR 2000 COMPLIANCE STATEMENT, THE DESCRIPTION OF THE CATEGORIES OF COMPLIANCE INTO WHICH MICROSOFT HAS CLASSIFIED ITS PRODUCTS IN ITS YEAR 2000 PRODUCT GUIDE, AND THE MICROSOFT YEAR 2000 TEST CRITERIA.

ANY MICROSOFT YEAR 2000 STATEMENTS MADE TO YOU IN THE COURSE OF PROVIDING YEAR 2000 RELATED UPDATES, YEAR 2000 DIAGNOSTIC TOOLS, OR REMEDIATION SERVICES (IF ANY) ARE SUBJECT TO THE YEAR 2000 INFORMATION AND READINESS DISCLOSURE ACT (112 STAT. 2386). IN CASE OF A DISPUTE, THIS ACT MAY REDUCE YOUR LEGAL RIGHTS REGARDING THE USE OF ANY SUCH STATEMENTS, UNLESS OTHERWISE SPECIFIED BY YOUR CONTRACT OR TARIFF.
 

Last updated October 5, 1999
1999 Microsoft Corporation. All rights reserved. Terms of use.

This site is being designated as a Year 2000 Readiness Disclosure and the information contained herein is provided pursuant to the terms hereof and the Year 2000 Information and Readiness Disclosure Act.