SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : TAVA Technologies (TAVA-NASDAQ) -- Ignore unavailable to you. Want to Upgrade?


To: James Strauss who wrote (15685)4/30/1998 5:59:00 PM
From: John Mansfield  Respond to of 31646
 
DOE and embedded y2k

'Mission statement:

Over the years, the Department of Energy has invested in technological approaches to solving the
challenge of protecting the nation's most sensitive information and special nuclear materials. In doing so,
significant expertise has been developed for protecting national security interests.

Much of the protection capabilities developed by the National Laboratories has application to industry as
well as to government. Numerous advances in information security and assurance have been fostered.
Significant breakthroughs have also been achieved in the protection of automated information systems
and the information they store, process and transmit.

The Department's Office of Safeguards and Security Outreach Program is intended to return to industry
and the public the technologies and strategies borne out of many years of investments in the protection of
the nation in response to the Cold War.'

_____

Year 2000 Issues for Embedded Systems
Many embedded systems, such as programmable logic controllers and other commercial
and industrial control equipment, use dates for a variety of functions, such as calibration,
scheduled maintenance, and many other time-sensitive manufacturing or processes.
Many systems in use today are not Y2K-compliant, which can result in serious
mis-operation or degraded performance after Dec. 31, 1999. In fact, embedded system
tests have demonstrated severe consequences for many such systems. Because
embedded systems are not coded in a `traditional' manner (e.g., languages such as
FORTRAN, COBOL), identifying and correcting Y2K problems is much more difficult.
This vulnerability alert describes the problem of Y2K compliance in embedded systems,
and steps that are being taken by industry and vendors to address this issue.

w3.pnl.gov:2080/iaop/vulnerable.htm