SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Microcap & Penny Stocks : PINC - Planet City -- Software and Services -- Ignore unavailable to you. Want to Upgrade?


To: ztect who wrote (1051)11/19/1998 1:46:00 AM
From: TENNET  Respond to of 1754
 
PC Y2K fix market to heat up says article:

--------- San Francisco SPG Conference, September 23-25
PART 2: Continuation of GIGA presentation

This is the second of two reports on "Year 2000 Project
Strategies for Small and Mid-Sized Companies," a
start-to-finish Year 2000 plan for corporate project
managers, presented by Ann Coffou and Stephanie Moore of
Giga Information Group.

During their presentation at the San Francisco SPG
Conference, Moore noted that Y2K problems with PCs are
rapidly emerging as an area of major concern for project
managers. PC issues were pushed to the back burner last
year, because mainframe millennium bug problems seemed much
more important. But now companies are surprised to find
many critical systems residing on PCs.

Moore said managing a PC conversion can be more difficult
than converting a billion lines of COBOL code, in part
because most companies have a terrible inventory of their
PC hardware and software. She told of one company who told
their vendor they needed site licenses for 16,000 machines.
When the vendor scanned the networks in the company, they
found 22,000 PCs. Moore used herself as another example of
how widespread the PC problem is. She told the audience
about her desktop computer at work and her laptop she
travels with, both owned by GIGA. But she also has a laptop
of her own in her home office, which she uses to access
everything at GIGA. Nobody at GIGA was aware she had it or
what software was on it. That computer of hers could
re-introduce problems in applications that have been fixed.

Thousands of spreadsheets have been "inherited" by companies
whose employees may use them for expense accounts,
attendance and hundreds of other minor but useful business
applications. But those inherited programs can cause trouble
if companies allow their employees to continue using them.
So don't forget home and remote workers. Dealing with such
employees and their home systems is resource-intensive work
and without careful and redundant checks, users can easily
reintroduce programs that had been deleted in company
offices because they were not Y2K compliant.

End users not only need to be taught awareness, but they
need to be brought into the whole Y2K process. They also
need to know they are accountable for keeping their machine
and their network compliant, Moore said, and that there will
be consequences for backsliding. She recommended taking a
new inventory at least every month, to make sure the new
rules are being followed. There isn't enough time left to
introduce a system of asset management here, but taking
frequent inventories will provide the framework for a
system after 2000 that will be much better then the
unchecked and uncontrolled proliferation of PCs that many
companies now have.

The good news about distributed computer systems (PCs) is
that second-generation Y2K tools now available are much
better than the first ones to come out, even though there
still is no "silver bullet". The new tools will scan systems
and report on the hardware and software on the network, and
fix the BIOS. Moore recommended several companies, and told
the audience to avoid freeware, because it varies in quality
and, without a contractual agreement, you can't go back to
the maker in case of trouble.