Millennium Meltdown
This story appears in the January 1999 issue of Entrepreneur. Subscribe »
Endlessly discussed, relentlessly hyped and moving ever closer, Y2K
is nearly upon us. While no one can be sure how the
much-anticipated Y2K computer malfunctions will affect individuals,
businesses or society as a whole, two things are certain: The Y2K
problem is real, and it will impact your small business to some
degree.
If you're looking for a reason to take this problem seriously,
consider this: With less than a year to go before the day of
reckoning, Y2K-related malfunctions have already begun to occur.
Aside from the expected problems caused by credit cards with
"00" expiration dates, last year the com-puterized
material management system of the U.S. De-fense Lo-gistics Agency
dropped 90,000 items from its inventory because of a date
calculation error. Per-ishable items that were supposed to expire
in two years (2000) were seen by the computer as having expired 98
years ago because it assumed that "00" meant 1900. This
seemingly simple miscalcu-lation took nearly 400 hours to correct.
What's worse, according to a Cap Gemini Millennium Index
survey, the percentage of com-panies experiencing Y2K-related
business problems, such as processing disruptions and financial
miscalculations, is increasing every month, from 7 percent in
De-cember 1997 to 44 percent in Octo-ber 1998.
Although the typical small business doesn't have as much
inventory or as many computers as the U.S. military, Y2K consultant
Larry Goldfarb contends small businesses will suffer from
Y2K-related mal-functions to a greater extent than larger
organizations will. "Not only do small businesses lack the
budget to make the necessary changes to their computer systems, but
small-business owners are also in a hype-induced state of denial
about the problem," says Goldfarb. "They truly don't
believe this is a [real] problem."
A recent study on small-business attitudes toward Y2K-related
problems sponsored by Wells Fargo Bank and performed by the Gallup
Organization supports Goldfarb's views. While more than 80
percent of small businesses are at risk for Y2K-related problems
caused by malfunctioning computers, cash registers and other
equipment, only 6 percent of the respondents considered the Y2K
problem to be "very serious."
This lackadaisical response is disturbing when you consider the
tremendous effort that has already been expended by government
agencies and big business to battle the Y2K bug. The Securities and
Exchange Commission, for example, has ordered all publicly traded
corporations to disclose Y2K readiness and project information in
their annual reports, including a "worst-case scenario."
And both the House and Senate have introduced a wide range of
Y2K-related measures, including the Small Business Year 2000
Readiness Act, which partially guarantees bank loans of up to
$50,000 for small businesses seeking to replace or repair
Y2K-vulnerable equipment, and an amendment to the IRS Code, which
allows businesses to write off up to $20,000 in Y2K-related
expenses on their tax returns.
Big business is also scrambling to make its computers
Y2K-com-pliant. According to Cap Gem-ini Millennium Index
estimates, U.S. businesses will have spent more than $500 billion
by 2000 to solve Y2K-related problems, including inadequate
software and hardware, lost produc-tivity and the resulting
litiga-tion. For many of these companies, achieving Y2K compliance
also means in-vesting in additional IT staff or authorizing the
thousands of overtime hours required to audit every line of
software used by the business. Big companies like General Motors
and Amoco Corp. have each already spent more than $100 million on
their Y2K compliance projects.
Seeds of Destruction
The origin of the Y2K bug is no mystery. In the Information
Age's infancy, when large corporations and government agencies
began using mainframe computers to automate tasks, the memory used
to store programming instructions was scarce and expensive.
Programmers writing the code for business applications were
encouraged to conserve space whenever they could; one way was to
use abbreviated date codes, with only two digits to indicate the
year. Assuming their programs would no longer be in use by the turn
of the century, programmers ignored the fact that come 2000, these
computers would interpret the date codes with a two-digit year
field of "00" as being 1900, and then incorporate this
corrupt data into a wide range of date-dependent
calculations.
Forty years later, this mistaken assumption is coming back to haunt
a world far more dependent on computers than these early
programmers could have imagined. And far from being corrected, the
problem has been compounded by the millions of lines of code
(studded with the problematic two-digit date fields) that were
added to the original pro-gramming over the years, making the
correction process tedious, time consuming and very costly.
Embedded chips, tiny micro-processors that control everything from
VCRs to computerized switching units at nuclear power plants, may
also be infected with the Y2K bug-but their programming is
hardwired into the chip and cannot be audited or corrected.
Instead, each and every embedded chip that is suspected to be
non-Y2K-compliant must be inspected and, if necessary,
replaced.
This faulty programming has also made its way into PC hardware and
software, says John Grover, president and CEO of Duluth, Georgia,
MillenniumPlus Consulting and author of Your Company's PCs and
the Year 2000 (self-published). "A lot of people don't
realize how vulnerable PC-based systems are to the bug," says
Grover, "especially PCs built before late 1996. If you're
running applications that rely on DOS for the correct date, you may
have some problems with those applications after the year
2000."
In a small business equipped with a handful of desktop PCs,
repairing or replacing non-Y2K-compliant equipment is relatively
simple. The real source of most post-millennial business
interruptions will come from outside your business, as a re-sult of
the Y2K bug's potential effects on infrastructure: power,
telephone communications and other services.
When a special panel under the Senate Banking Subcommitte on
Financial Services and Technology convened recently to check the
utility companies' progress on the Y2K problem, industry
experts called the chances of Y2K-related outages "extremely
low, but conceivable." But when subcommittee chair Bob Bennett
(R-UT) polled 10 power utilities and asked how many of their most
important computers had been fixed, he was given answers ranging
from 5 to 54 percent.
Blessed with big budgets for modernizing and enlarging their
computerized switching systems, telecommunications giants AT&T,
MCI and Sprint have tackled the Y2K problem head-on; each will
spend more than $200 million this year on their respective
Y2K-compliance projects. Smaller regional telecom providers,
however, don't have the same resources to battle the problem,
and no one is quite sure what collective impact this may have on
telecommunications as a whole.
Surviving the Bug
With so much riding on it, how can small-business owners minimize
the impact of the Y2K bug on their enterprise? Triage-determining
which systems are the most important to the health of the business
and attending to those first-is a good way to start, says
Gold-farb. If your business relies on desktop PCs, there's a
simple test you can perform to check the Y2K compliance of your
systems. First, back up all your files on disk or tape. Then
manually reset each PC's clock to 11:59 on December 31, 1999.
If, after a minute has passed, the clock reads anything other than
12:00 a.m. on January 1, 2000, your PC is vulnerable to the Y2K
bug. If it passes the test, try again-but this time shut off the
power after manually resetting the time. Wait a minute, reboot, and
then check the time and date again. If there are errors in the time
and date display, the PC's BIOS (basic input/output system)
needs to be replaced or fixed with a software patch.
Software installed on your machines can also cause major problems,
says Ed Yourdon, co-author of Time Bomb 2000 (Prentice Hall
Computer Books), particularly if they are "orphan"
applications. "The biggest risk for PCs is that they may be
using home-grown software or some proprietary billing package that
was developed five years ago by someone who has since
disappeared," says Yourdon. "You could very well have Y2K
problems with that application."
If you use many different types of software, it may be difficult to
keep track of compliance issues. Grover suggests performing an
inventory of your software and then going down the list and
contacting vendors to see if their products require upgrades or
patches of some type to be Y2K-com-pliant. Most software vendors
post this in-form-ation on their Web sites. Software produced by
vendors who can't or won't offer you a reasonable solution
should be replaced immediately.
Shared Misery
Just because you've made your own business Y2K-ready
doesn't mean your customers and suppli-ers have done the same,
warns Gro-ver. "Early on, everyone was wor-ried about fixing
their own prob---lems," he says. "Eventually, they
realized their biggest problems could come from suppliers or
customers who go out of business because of Y2K."
Asking a business partner if they've addressed the Y2K problem
isn't sufficient, according to Grover. "It's not
enough to solve your problem and know your partner has solved his.
You have to know how the problem was solved and test it out
beforehand," he says. "For example, if you're trading
data with your partner electronically, and to fix the Y2K problem,
you expanded your date fields to four digits, but your partner is
using a windowing process [programming a computer to interpret
two-digit numbers within a certain range as four-digit numbers] and
still keeps two-digit date fields, you won't be able to handle
each other's records." A good way to ensure that both
businesses are on the same page is to use Electronic Data
Interchange (EDI) standards like ANSI 12, an internationally
recognized data format that allows businesses to exchange common
documents without having to customize their hardware or software
for each organization they do business with.
Shoring up your supply line is also necessary to prevent business
interruptions. "Surviving Y2K means contingency
planning," says Grover. "I'm advising my clients to
develop lines of communication with trading partners. If you have a
key supplier who believes [Y2K isn't going to be a] problem,
you have to find another supplier."
Grover believes that legal actions stemming from broken contracts,
unfulfilled orders or other Y2K-related business interruptions
shouldn't be an overriding concern to small-business owners.
"The saving grace is that there will be so many lawsuits,
there won't be docket time for all of them," he says.
"The safe thing to do is document everything, but lawsuits are
the least of your worries. Business survival is your number-one
priority. If you communicate with your customers and suppliers,
that will help. The fewer surprises there are in the relationship,
the less possi-bility there is that a lawsuit will
arise."
The days after January 1, 2000, may be a time of crisis for some
businesses, but this period may also present some unprecedented
opportunities for those who are prepared to take advantage of the
situation. "The whole world is about to have some serious
computer problems. The situation may not last long, but if
you're there at the right moment, that might serve you very
well," says Leon Kappelman, chair of the Software Productivity
Group Conference and co-chair of the Society for Information
Management's Year 2000 Working Group, a nonprofit advisory
team. "If competitors are in trouble, that may open up
territory for your business in both local and international
markets. How companies react to Y2K will determine who customers
choose to do business with in the long run, because if their
computers work and they're reliable and can deliver the goods,
they'll be perceived as competent in other areas as well.
Anyone who can afford to might consider stocking up on inventory so
they can serve customers when other companies may no longer be able
to. There is risk here, but there is also the possibility of great
reward for the diligent."
Y2K Survival Kit
Web Sites
- http://www.score.org , the
home page of the Service Corps of Retired Executives, provides
articles, resources and links on Y2K for small businesses.
- http://www.microsoft.com/year2000
rates the Y2K compliance of Microsoft products and offers an
extensive list of tools and resources.
- http://www.IBM.com/IBM/Year2000
, IBM's Y2K home page, offers information on its major
platforms as well as a testing matrix to help you conduct Y2K tests
on your systems.
- http://www.year2000.com
is a clearinghouse of Y2K information, including a list of vendors,
articles on the subject and e-mail updates.
Software
YMARK2000 from the National Software Testing Laboratory tests your PC for Y2K compliance. Download the software from http://www.nstl.com/html/y2klogo.html
Book
Time Bomb 2000 (Prentice Hall Computer Books), by father-and-daughter team Ed and Jennifer Yourdon, explains the Y2K crisis in clear, concise terms, presenting various scenarios to illustrate how Y2K could impact industry, infrastructure and society.
Consultant
MillenniumPlus Consulting (http://www.millenniumplus.com , 770-521-9959) works with small businesses to determine susceptibility to the Y2K bug and provides services to ensure compliance.
Talk The Talk
Now that you're a Y2K expert, you should leaarn to sound like
one. Here are some buzzwords culled from the voluminous writings on
the impending crises:
Doomsdate(s): Calendar dates that may cause computers to
malfunction, such as 1/1/00 (Y2K), 9/9/99 (four nines are used as a
"stop" code in some programs) and 2/29/00 (the extra day
in a turn-of-the-century leap year).
Triage: Prioritizing mission-critical systems to determine
where to focus your Y2K-compliance efforts. ("We must triage
our mission critical systems before preparing them for the
doomsdate.")
Going Dark: To have computer systems, electric power grids
or even whole business operations fail as a result of the Y2K bug.
("If the electric power utility companies don't finish up
their compliance efforts in time, our company can plan on going
dark for a while.")
Workaround: A contingency plan designed to keep a business
open despite Y2K-related failures of vital systems. ("When the
cash registers go dark, we can always use battery-powered
calculators as a workaround.")
Domino Effect: The failure of a non-Y2K-compliant system
causing the failure of a Y2K-compliant system. ("Our
workaround didn't take the domino effect into account, causing
our whole operation to go dark.")
Bug Out: Once used by the military to describe a hurried
evacuation effort, it now means to leave the city for a remote
rural area to avoid social upheaval caused by Y2K-related failures
of essential services. ("After the food trucks stopped coming
and our supermarket went dark, we decided to bug out.")
TEOTWAWKI: Y2K survivalist shorthand for "The End Of
The World As We Know It."
Contact Sources
Larry Goldfarb, fargoprov@aol.com
Ed Yourdon, ed@yourdon.com, http://www.yourdon.com
Thanks to Wired magazine, Westergaard Year 2000
(http://www.y2ktimebomb.com) and
author Ed Yourdon.