SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Discuss Year 2000 Issues

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: John Mansfield who wrote (2285)7/26/1998 5:23:00 PM
From: John Mansfield   of 9818
 
'Now there is good news for Y2K service providers and managers of Y2K compliance projects that are just getting
started or behind schedule. The state of the art of automated find and fix tools has advanced dramatically with the
advent of second-generation tools.

The META Group, an IT advisory services firm in Stamford, CT, has coined the term "second-generation tools" to
classify and differentiate these highly effective solutions. Second-generation tools are capable of find and fix rates of
1-5 million LoC per programmer per year -- a 10-50 x increase over first-generation tools.

Three technologies from Silicon Valley fueled this revolutionary advancement in performance and reliability: advanced
functionality enabled through the application of artificial intelligence technology from Stanford University, optimizing
compiler technology used by Intel and HP in designing the next generation Merced chip and highly scaleable SMP
systems from Sun Microsystems which can scale up to 64 processors.

Second-generation tools feature pinpoint accuracy approaching 100 percent in locating date sensitive items in source
code, copybooks and related system components at very high speeds. These tools are sophisticated code analysis
techniques adapted from advanced software reengineering tools to identify and propagate date seed fields throughout
the program. Seeds are data elements that are date fields, point to dates, or flow to logic that takes or returns dates.
Next the tool maps the data flow of seeds throughout the program to identify all items that are truly date-sensitive. To
complete the analysis, the tool uses seed information and artificial intelligence to automatically deduce and propagate
the date format types (mm/yy/dd, yy/mm/dd, ccyy/dd, etc.) of the items located. The tool should provide an option
that allows users to review difficult cases where the system is not 100 percent certain of the type format.
...

esj.com
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext