Thursday, December 26, 2019
Wednesday, December 18, 2019
Mass Media And Its Effects On Children - 1631 Words
Mass media is part of the average persons everyday life, from morning to night; modern society absorbs and consumes it constantly. Adults are aware of it and see the media, as advertisements on television, the latest blockbuster at the theaters or the trendy new clothing. Children are not free from it either; they to are exposed to the medias imagery and ideals maybe more than adults are. Parents may not pay close attention to the media their children are exposed to; adults may think they are just harmless childrenââ¬â¢s toys or games. From the time they wake up and they pour themselves a bowl of brand name cereal, to the time they are put in bed with their stuff animal or toy, they are in the presence of some sort of media and its imagery.â⬠¦show more contentâ⬠¦Parents might think that the idea of their 5-year-old girl dieting as too farfetched, but that same thin ideal is already being pushed on them. In fact, children who watch hours of television a day are exposed to dieting, and may see it as a part of growing up. ââ¬Å"Heavier-viewing children may glamorize dieting and view it as a way of ââ¬Ëplaying grown-upââ¬â¢ before they begin to diet with the intention of meeting an internalized body ideal.â⬠(Harrison et al) Children are very receptive to these images, they may see dieting as just a grown up thing now, but later on may see it as a necessary part of growing up. If children can catch on to things like that, then they can certainty catch on to things like the thin ideal. An experiment was done where preschool aged girls were given a choice between playing with three different game pieces, a fat one, a normal one, and a thin game piece; this was what the researchers discovered. ââ¬Å"Preschool girls between the ages of 3 and 5 attribute more negative adjectives to fat targets and more positive adjectives to thin targets. In addition, preschool girls were less likely to select a fat target as their playmate or best friend and m ore likely to select a thin target asShow MoreRelatedMass Media And Its Effect On Children1363 Words à |à 6 PagesIn todayââ¬â¢s society Mass Media portrays gender roles in a negative way as well as the educational systems for both males and females. Mass media is defined ââ¬Å"as any of the means of communication such as television, newspapers that reach to large amount of peopleâ⬠. (Dictionary.com, 2015). Todayââ¬â¢s educational system, mass media reaches out to large amount of people such as the students. In schools, the mass media shows more negativity to gender roles than positivity, for example males would be portrayedRead MoreMass Media And Its Effect On Children1668 Words à |à 7 Pagesadvance and increase usage of mass media. The mass media parent the children of today. Consequently, radio, video games, television, movies, videos, phones, and social networks play a significant role in their upbringing. For, they assist in influencing a childââ¬â¢s values, beliefs, and behaviors. Children rather unconsciously heed and imitate the images exhibited, for example, in television, they learn the appropriate way to comport and oneââ¬â¢s countenance. Electronic mass media, in particular, contains anRead MoreEffects of Television as Mass Media on Children of 10 Years1893 Words à |à 8 Pagescom/component/k2/item/11170-effect-of-mass-media-on-children.html Thursday, 01 November 2012 12:27 Effect of Mass Media on ChildrenFeatured Written byà à customwritingtips.com Introduction Mass media is a collective term that refers to all the media technologies whose sole intention is reaching a vast audience through mass communication. There are two major categories of mass media, which are, broadcast media and print media. Transmission of information by broadcast media is via electronic meansRead MoreEssay on Mass Media Society1080 Words à |à 5 PagesImpact of Mass Media on Individuals, Society, and Culture Mass media, over the years, has had a profound effect on American society, on its culture, and on the individuals exposed to the media. Mass media is a form of socialization, having a long-term effect on each member of American society. While mass media targets the individual in short-term intervals, the overall influence on them has been established as the consumer moves from one impressionable age category to another. The long or short-Read MoreEssay about Impact of Mass Media on Individuals, Society, and Culture1178 Words à |à 5 PagesImpact of Mass Media on Individuals, Society, and Culture Mass media, over the years, has had a profound effect on American society, on its culture, and on the individuals exposed to the media. Mass media is a form of socialization, having a long-term effect on each member of American society. While mass media targets the individual in short-term intervals, the overall influence on them has been established as the consumer moves from one impressionable age category to another. The long or short-Read MoreMass Media as an Agent of Socialisation1747 Words à |à 7 PagesMass media as an agent of Socializations According to the reading, ââ¬Å"Socialization and Cultureâ⬠from the book ââ¬Å"Interdisciplinary Englishâ⬠by Loretta F. Kasper, Socialization is the process in which a child learns how to behave in life and participate in a group in society. Socialization has four basic/main agents: family, school, peers and the mass media. Each one of these agents plays a role in our lives. However, in my opinion, the most important agent of socialization for the development of theRead MoreBad Influence of Mass Media on Kids1499 Words à |à 6 Pagesfewer hours with their children. As a result, outside influences have greater access and influence over our children than ever before. The internet and the media are bringing the outside world into your home; your childs peers; the influences on children from movies and the music they listen to are growing in importance and influence every day, the negative effects of television violence to children, negative effects marijuana, cigarettesRead MoreMass Media Communication1719 Words à |à 7 PagesDefinition Mass media is a media intended for a large audience. It may take the form of broadcast media, as in the case of television and radio, or print media, like newspapers and magazines. Internet media can also attain mass media status, and many media outlets maintain a web presence to take advantage of the ready availability of Internet in many regions of the world. Some people also refer to it as the ââ¬Å"mainstream media,â⬠referencing the fact that it tends to stick to prominent stories whichRead MoreThe Impact Of Mass Media On Youth And Society1378 Words à |à 6 PagesThe Impact of Mass Media on the Youth and Society Nowadays, the issue of mass media has caused much debate in the modern society, as well as mass media is becoming more important as a component that negatively affects the behavior of young people. There are many other factors, such as micro-environment, economic instability, the decline of moral values affecting children and young people and encourage them to commit unlawful acts. However, unlimited access to the Internet, mobile phone use in theRead MoreMedia Violence And Its Effect On Society1184 Words à |à 5 PagesIn recent years, many scholars have begun to examine the negative effects of media violence. There is a debate on whether negative effects directly derive from media violence. Because media violence has been proven to have a negative effect on society, this essay will argue that there needs to be more censorship on media violence. I will first examine the influence media violence has on mass shootings. Next I will discuss a study relating to dating violence, certain movies and shows encourage dating
Tuesday, December 10, 2019
Project Planning And Control Of Techniques - MyAssignmenthelp.com
Question: Discuss about the Project Planning And Control Of Techniques. Answer: Introduction This report is intended for Brisbane Multi-Faith Temple which is a charitable organisation that provides service to patrons to make payment via bank transfer to the temple trust account. In context to this patrons can get free of cost food during lunch time at the temple site. However, the existing process of preparing food and maintaining records of patrons as well as transactions is manual. Hence, this report is focused on developing an information system for the organization to make the business process easier for operation. The main objective of this report is to analyze the functional and non-functional requirements of the system to be developed along with analyzing the costs and benefits associated with the project. Further, this report also provides a plan for development of the information system. Approach to Systems Development Proposed approach for developing the information system The approach that will be followed for developing the information system is JAD (Joint Application Development) that accelerates the process for developing technological solutions. This approach uses involvement of customers along with group dynamics to view of users perspective to business need for developing a solution. Selected approach for systems development The selected approach for system development is suitable compared to the traditional approaches as it offers faster development time along with satisfaction of client as they are involved throughout the entire process of development. In this approach, the system requirements are being investigated by the developer along with taking input from client with the help of interviews. Systems Requirements Functional requirements The functional requirements for the system to be developed are identified as below: Donation of money online, sponsoring of specific events or creation of scholarships by patrons. Automatic email generation for thanking the patrons for their contribution. Storing information about contribution under specific client data. Automated processing of order for food products. Registration: The patrons should register as a member for accessing the system. Authentication: There will be valid username and password for different users of the system. Levels of Authorization: Different users will use the system for different purposes so there will be different levels of access to data according to the roles of user. Non-functional requirements The non-functional requirements being identified for the system are listed as below: Reduction is costs for staffs. Saving the wastage of food. Increasing the overall savings. Reduction in maintenance costs. Project Cost /Benefit Analysis The cost benefit analysis is considered as a procedure to estimate the associated costs along with possible profits that will be achieved from the project. This analysis considers both quantitative as well as qualitative factors to analyze the value for money in context to a particular project. The ratio of costs and benefits along with other indicators is used to conduct this analysis. Figure 1: Cost benefit analysis table Project Schedule Figure 1: Work Breakdown Structure for the project The Work Breakdown Structure defines the work packages that will be executed for successful completion of the project. It provides an overview of the activities that are required for development of the information system. The Work Breakdown Structure offers hierarchical decomposition of the project into various phases along with deliverables as well as work packages. According to Kerzner (2017), it is an essential element so that a project can be carried out successfully according to requirement of the client. Figure 2: Project Schedule and Gantt chart The project schedule lists the various activities that are required for the project along with the duration for completion of a particular activity (Burke 2013). The project schedule is essential for completion of the project within the estimated time and budget. It also ensures that the objectives are met to meet the requirements of client. The schedule is reasonable in terms of the duration that has been estimated for completing development of the new information system. The schedule that has been prepared for the project takes into account the various essential activities that are required to develop an information system. The schedule also illustrates that enough time as well as resource have been allocated for each and every activity required to accomplish the project. System Information Requirement Investigation Techniques Stakeholders Stakeholder Description Project Sponsor This person is responsible for providing financial support to execute the project. Business Analyst This person has the responsibility to analyze the decisions and make proper implementation to enhance the business processes. Project Manager This person is responsible for entire execution of the project stating from planning to closure phase in developing the information system. System Analyst This person has the responsibility to analyze the functional and non-functional requirements of the system in context to the requirements of the client. Developer This person is responsible for developing the whole information system and ensure proper working of the system. Database Developer This person will be responsible for developing the database required as backend to support the information system. Technical Support This person will perform the necessary actions as and when required to support the Developer, Database Developer as well as System Analyst. Investigation techniques The three investigation techniques that are considered useful for this particular project are listed as below: Interview with users and stakeholders: This investigation technique involves interviewing the users of current system or the stakeholders that are associated with the existing system. Distribution and collection of questionnaires: This technique comprises of preparing a questionnaire with closed ended questions to acquire information about the present system. This technique is helpful in achieving accurate results so as to identify the requirements. Review of inputs, outputs and documentation: In this technique, the inputs as well as outputs of the existing system are reviewed. Further, this technique also focuses on analyzing the documentation that is available for existing system. The above mentioned investigation techniques for analyzing the requirements is suitable as those help to understand the requirements clearly that have to be fulfilled by the new system. The mentioned techniques also provides an in depth knowledge on the process that is being followed by the existing system. Reflections and Conclusions This project can be accomplished successfully by following the project plan that has been developed and illustrated as schedule for the project. This project will prove to be beneficial for Brisbane Multi-Faith Temple as it will eliminate the existing issues within the organization. The work breakdown structure that has been prepared has a significant role to achieve success of the project. The cost benefit analysis being conducted on the project represents that it will be beneficial in terms of the return on investment that will be achieved from the project. From the analysis, it has been achieved that the return on investment can be gained within a period of 3.78 years. This project will help to reduce the various additional costs that are incurred due to manual processing of business functions within the organization. References Burke, R., 2013. Project management: planning and control techniques.New Jersey, USA. Cicmil, S., Cooke-Davies, T., Crawford, L. and Richardson, K., 2017, April. Exploring the complexity of projects: Implications of complexity theory for project management practice. Project Management Institute. Crawford, J.K., 2014. Project management maturity model. CRC Press. Joslin, R. and Mller, R., 2015. Relationships between a project management methodology and project success in different project governance contexts.International Journal of Project Management,33(6), pp.1377-1392. Kerzner, H., 2013.Project management: a systems approach to planning, scheduling, and controlling. John Wiley Sons. Kerzner, H., 2017.Project management metrics, KPIs, and dashboards: a guide to measuring and monitoring project performance. John Wiley Sons. Larson, E.W. and Gray, C., 2013.Project Management: The Managerial Process with MS Project. McGraw-Hill. Martinelli, R.J. and Milosevic, D.Z., 2016.Project management toolbox: tools and techniques for the practicing project manager. John Wiley Sons. Mir, F.A. and Pinnington, A.H., 2014. Exploring the value of project management: linking project management performance and project success.International journal of project management,32(2), pp.202-217. Schwalbe, K., 2015.Information technology project management. Cengage Learning. Todorovi?, M.L., Petrovi?, D.?., Mihi?, M.M., Obradovi?, V.L. and Bushuyev, S.D., 2015. Project success analysis framework: A knowledge-based approach in project management.International Journal of Project Management,33(4), pp.772-783. Turner, R., 2016.Gower handbook of project management. Routledge.
Monday, December 2, 2019
Y2k (2431 words) Essay Example For Students
Y2k (2431 words) Essay Y2kLess than two years until the year 2000. Two seemingly small digits may turn January 1, 2000 from a worldwide celebration into a universal nightmare. With computers mistaking the year 2000 for 1900, virtually all businesses that use dates will be affected. Not only will the companies be affected, but they are paying millions upon millions of dollars in order for computers to recognize the difference between the years 2000 and 1900. The year 2000 computer bug is a huge problem that our world must face. In order to explain how to solve the millennium bug, it is a good idea to be informed about exactly what the year 2000 problem is. The year 2000 industry expert, Peter de Jager, described the problem quite well. We programmed computers to store the date in the following format: dd/mm/yy. This only allows 2 digits for the year. January 1, 2000 would be stored as 01/01/00. But the computer will interpret this as January 1, 1900- not 2000 (de Jager 1). The 19 is hard-coded into computer hardware and software. Since there are only 2 physical spaces for the year in this date format, after 99, the only logical choice is to reset the number to 00. We will write a custom essay on Y2k (2431 words) specifically for you for only $16.38 $13.9/page Order now The year 2000 problem is unlike any other problem in modern history for several reasons. William Adams points out some of the most important ones. Time is running out- the Year 2000 is inevitable! The problem will occur simultaneously worldwide, time zones withstanding. It affects all languages and platforms, hardware software. The demand for solutions will exceed the supply. Survivors will survive big, losers will lose big. There is no silver bullet that is going to fix things (Adams 2). It is too big and too overwhelming even for Microsoft (Widder 3). Separate, any one of these points makes Y2K, a common abbreviation for the year 2000 problem, an addition to the obstacle. Combined, they form what seems more like a hideous monster than an insignificant bug. The impact of Y2K on society is enormous, bringing the largest companies in the world to their knees, pleading for a fix at nearly any cost. The modern world has come to depend on information as much as it has on electricity and running water. Fixing the problem is difficult because there are two years left to correct 40 years of behavior (de Jager 1). Alan Greenspan has warned that being 99 percent ready isnt enough (Widder 2). Chief Economist Edward Yardeni has said that the chances for a worldwide recession to occur because of Y2K are at 40% (Widder 3). Senator Bob Benett (Republican, Utah) made a good analogy about the potential of the problem. In the 1970s, oil was the energy that ran our world economy. Today it runs on the energy of information. He later said, To cripple the technological flow of information throughout the world is to bring it to a virtual standstill (Widder 3). The potential of the problem in everyday life is alarming. Imagine making a loan payment in 1999 for a bill that is due in 2000. The companys computers could interpret the 00 as 1900 and you would then be charged with 99 years of late fees (Moffitt ; Sandler 48). If the year 2000 problem isnt solved, there could be no air traffic, traffic lights, no lights in your company, companies could not produce goods, no goods delivered to the stores, stores could not send you bills, you could not send bills to anyone else. Business come to a halt (de Jager 1). The costs of fixing Y2K are staggering. The Gartner Group estimates that costs per line of code to be between $1.50 and $2.00 (Conner 1). It is not uncommon for a single company to have 100,000,000 lines of code (de Jager 6). Capers Jones, an expert who has studied software costs for over ten years, estimates total worldwide costs to be $1,635,000,000,000 (One-trillion, 635 billion dollars) (Jones 58). To put this number into perspective, if five people were to spend $100 for every second of every day, 24 hours a day, 365 days a year, it would take them about 100 years to finish the task!The year 2000 problem is not only limited to what happens with computers between December 31, 1999 and January 1, 2000. There are several other important dates that are a factor. Last October was considered the last point where a large company could start fixing the problem with any hopes to finish before the deadline (DBA 1). Also, all fixes should be done by January 1, 1999. There are two major rea sons for having the fixes done a year early. The first is that there are many special dates during 1999 that mean special things. For example, September 9, 1999 (09/09/99) has been commonly used as the expiration date for references and data that have no expiration date (Reid 6). The computer required that a date must be entered in, and in many cases, 9/9/99 was it. Also, it has been established that an entire years cycle of events should be used to test all of the modifications that have been made to a system. Also, one should be sure to test to see which day of the week is 01/01/00. January 1, 1900 was a Monday, but January 1, 2000 will be a Saturday. Other possible failure dates: 1/10/2000 (1st 9 character date), 2/29/2000 (Leap day- the year 2000 is a leap year), 10/10/2000 (1st 10 character date), and 12-31-2000 (Day 366 of the year 2000) (Martin 15) (GTE Appendix A). .u7733e3d4a0647e00d152337e7b052c8c , .u7733e3d4a0647e00d152337e7b052c8c .postImageUrl , .u7733e3d4a0647e00d152337e7b052c8c .centered-text-area { min-height: 80px; position: relative; } .u7733e3d4a0647e00d152337e7b052c8c , .u7733e3d4a0647e00d152337e7b052c8c:hover , .u7733e3d4a0647e00d152337e7b052c8c:visited , .u7733e3d4a0647e00d152337e7b052c8c:active { border:0!important; } .u7733e3d4a0647e00d152337e7b052c8c .clearfix:after { content: ""; display: table; clear: both; } .u7733e3d4a0647e00d152337e7b052c8c { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u7733e3d4a0647e00d152337e7b052c8c:active , .u7733e3d4a0647e00d152337e7b052c8c:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u7733e3d4a0647e00d152337e7b052c8c .centered-text-area { width: 100%; position: relative ; } .u7733e3d4a0647e00d152337e7b052c8c .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u7733e3d4a0647e00d152337e7b052c8c .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u7733e3d4a0647e00d152337e7b052c8c .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u7733e3d4a0647e00d152337e7b052c8c:hover .ctaButton { background-color: #34495E!important; } .u7733e3d4a0647e00d152337e7b052c8c .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u7733e3d4a0647e00d152337e7b052c8c .u7733e3d4a0647e00d152337e7b052c8c-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u7733e3d4a0647e00d152337e7b052c8c:after { content: ""; display: block; clear: both; } READ: Freud And Dreams Essay PaperWith the millennium bug coming closer and closer to destroying the crops of the worlds information every day, experts from around the globe have discovered several ways to deal with or exterminate this menace. Five major solutions to the problem will now be discussed. The most straightforward approach to solving Y2K is to simply change the 2-digit date fields to 4-digit ones. This is considered to be the only complete solution to the problem, giving businesses a seemingly endless range of dates for the future. This approach also can make it much easier for the company to reformat the display screens with a hard-coded format present (IBM 5.2). Unfortunately, expanding the date field from 2 to 4 digits has several downsides to it. The most obvious one is that in order to convert the dates, every program and database that references to date data will have to be modified. These modifications are mostly manual labor- not an automatic process. Also, this requires display screens to be reformatted manually, as well as increasing record lengths in databases (IBM 5.2). Another common method for swatting the millennium bug involves what is termed date logic, or windowing techniques. This procedure involves having a separate program to determine which millennium certain dates are in. For example, the program could determine that if the year ends in numbers between 00 and 20, the date is in the second millennium. If the year ends in 21 to 99, the date is in the first millennium. This technique avoids some of the massive changes and coordination associated with the expansion approach (Martin 5). Date logic routines also have some downsides to them. The most important one is that the time window can never be more than 100 years, and the length of the time window cannot change in the future. Also, system performance may slow down with this extra step for each date to be processed. On top of that, all of the assumptions and logic must be the same for all of the programs that will use it (IBM 5.7). If and only if all three of these downsides to windowing techniques are able to be overcome, should a business consider this solution. Another way of getting around 2-digit dates involves a bridge program. This type of solution is used to convert data from one record format to another. This allows a system to convert 2-digit to 4-digit dates as they are needed. This also allows a business to have very little down time for year 2000 renovations. Instead of converting all of the data at one time, it is instead converted gradually. Also, this technique is very cost effective and fairly easy to do (Moffitt Sandler 5.8). Be aware that a bridge program has the potential to ruin a computer system. By removing the bridge before all data has been converted, 2-digit dates may become mixed with 4-digit dates, creating a larger problem than in the beginning. Replacing the systems is probably the most straightforward method of solving Y2K. By simply discarding old, non-compliant systems and purchasing new systems that are year 2000 ready, a business can eliminate the year 2000 problem altogether (Martin 6). This avoids the hassle of coming up with solutions to the problem, but presents the difficulties of starting from scratch. This solution should be considered if a companys systems are too costly to fix, or if there are not very many systems that need to be fixed. Another idea that incorporates the replacement idea is for one company to merge with or buy another company that has Y2K compliant systems. Then, the old systems can be retired (Martin 6). The last alternative that will be discussed is to do nothing to current computer systems that a business may use. This is not the same as ignoring the millennium bug and hoping that it will go away. Instead, it involves analyzing exactly what will happen to a companys computer systems and determining that the effect it will have is either none or very little (Martin 6). If this would be the case, and employees could work around any damages that may be caused, this selection could work. .u89c4be6b7ce975641ba00d001900bf69 , .u89c4be6b7ce975641ba00d001900bf69 .postImageUrl , .u89c4be6b7ce975641ba00d001900bf69 .centered-text-area { min-height: 80px; position: relative; } .u89c4be6b7ce975641ba00d001900bf69 , .u89c4be6b7ce975641ba00d001900bf69:hover , .u89c4be6b7ce975641ba00d001900bf69:visited , .u89c4be6b7ce975641ba00d001900bf69:active { border:0!important; } .u89c4be6b7ce975641ba00d001900bf69 .clearfix:after { content: ""; display: table; clear: both; } .u89c4be6b7ce975641ba00d001900bf69 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u89c4be6b7ce975641ba00d001900bf69:active , .u89c4be6b7ce975641ba00d001900bf69:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u89c4be6b7ce975641ba00d001900bf69 .centered-text-area { width: 100%; position: relative ; } .u89c4be6b7ce975641ba00d001900bf69 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u89c4be6b7ce975641ba00d001900bf69 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u89c4be6b7ce975641ba00d001900bf69 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u89c4be6b7ce975641ba00d001900bf69:hover .ctaButton { background-color: #34495E!important; } .u89c4be6b7ce975641ba00d001900bf69 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u89c4be6b7ce975641ba00d001900bf69 .u89c4be6b7ce975641ba00d001900bf69-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u89c4be6b7ce975641ba00d001900bf69:after { content: ""; display: block; clear: both; } READ: Gender Identity Disorder (GID) EssayCarrying out a solution in any business involves careful planning in order to be successful. Each of the four steps- awareness, planning, implementation, and testing- are crucial for a company to successfully get beyond the year 2000. Though the shortest step, the awareness step can be considered to be the most important step. This involves a detailed description of the problem to CEOs and the other decision makers for the company. Also, the management must be informed of the impact that is likely to occur if Y2K is not solved. Without successfully informing the company executives of the millennium bug, there is no hope of getting funding appropriated and fixes underway (Conner 2). The preparation and planning phase involves finding all applications that use dates and choosing the right combination of solutions to result in a successful endeavor. Also, a business must consider any dependencies on outside systems- other companies, for example. In addition to this, a priority schedule should be created, to determine which systems are absolutely necessary to the operation of the business, and to fix them in accordance to their importance (Conner 2). A standard date interface should be agreed upon both within the company and with all other companies which are relied on. Also, the first estimate of how costly and how prolonged the fixes should be done (Conner 2). The implementation phase is probably the most tedious phase of year 2000 compliance. This involves taking proposed solutions and incorporating them into a business computer systems. Depending on which solutions are chosen, and how the solutions affect everyday business, a companys commerce could be crippled due to the need for various systems to be down at all times (Moffitt ; Sandler 66). Testing the solutions may be seen as an unimportant phase in the conversion process. The rewards seem few, and the costs of are high. However, testing solutions is the only way to ensure that a business will flow smoothly into the 21st century. This procedure involves making sample databases and records to verify that the fixes were made correctly, and that all systems work correctly. During this phase, a few glitches will most likely be found, and correcting these will be relatively easy. There are two common approaches to testing the solutions. The first involves making sure the systems work correctly in the 20th century, testing the computers for the 21st century, and then putting the systems back into everyday use. An advantage of this method is that all of the tests are done at the same times, allowing quicker feedback. The downside is that the amount of down time will be fairly high. The other approach is the same as the first, except switching the second and third items. The s ystems are first put back into production, and then they are tested for year 2000 compliance while they are ensuring the flow of business at the same time. The advantage of this method is that down time is much shorter. However, getting results will take a longer time (Pollner 2-3). As the year 2000 comes closer and closer, companies are losing precious time in order to swat the millennium bug. The deadline is fixed. The price of survival is high and the only reward is the hope of continuing to operate in the worlds of commerce and industry. Businesses that continue into the next millennium will enjoy the happiness of existence. Companies that fail to act now will probably crumble under their own weight. The alternative to addressing the year 2000 will be going out of business (Moffitt ; Sandler 3). BibliographyMartin, Robert A. Dealing with Dates: Solutions for the Year 2000. Available October 1997 Widder, Pat. Scramble to catch year 2000 bug is on. Available November 20, 1997 Moffitt, John ; Sandler, Robert J. The year 2000 FAQ. Available January 14, 1997 de Jager, Peter. Youve got to be kidding! Available January 10, 1997 Conner, Jim. Businesses should get a jump on solving Year 2000 problem. Available December 8, 1997 GTE Government Systems Corporation. GTE Proposed Criteria for Century Compliance. Available December 20, 1996 Reid, Warren S. Brower, Stephen. Beyond Awareness: Ten management and ten legal pitfalls regarding the Year 2000 computer problem that you may have not considered, yet! Available March 17, 1997 Jones, Capers. The Global Economic Impact of the Year 2000 Software Problem. Available in Adobe Acrobat Format IBM. The Year 2000 2-digit dates: a guide for planning and implementation. Available September, 1997 Pollner, Andrew. Testing Year 2000 conve rsions. Available January 1998 Computers and Internet Essays
Subscribe to:
Posts (Atom)