Leach, Ronald J. Why 2K?

ISBN 13: 9781482731071

Why 2K?

0 avg rating
( 0 ratings by Goodreads )
 
9781482731071: Why 2K?
View all copies of this ISBN edition:
 
 

This book, originally published in 1999, describes what could have happened during the era of the famous Y2K hysteria, when computers and communications devices would have had to function when four digits were needed to use the current date instead of the two digits that were commonly used in many systems. Of course, none of the expected disasters happened and none of the Y2K terrorist plots really. Or did they? Certainly the vulnerabilities of the Hoover Dam and some NASA spacecraft control centers have been fixed, but the fixes were largely the result of general security measures taken after September 11, 2001. This book tells the story of Y2K vulnerabilities from a retrospective viewpoint. According to Steven Musil of Cnet, the same type of problems occurred to a number of web servers, including Gawker, StumbleUpon, Yelp, FourSquare, and LinkedIn, when a single leap second was added to the Coordinated Universal Time. Although the scale of these problems is much smaller than Y2K, some parts of the problem are still with us. In case the leap second problem occurs again, or timing of messages on UNIX servers get corrupted in 2038, or the world ends in December, 2012, the author’s favorite recipe for Shrimp with Sizzling Rice Soup has been included at the end of this book. Enjoy!

"synopsis" may belong to another edition of this title.

About the Author:

Ronald J. Leach recently retired as Professor and Chair Emeritus from the Department of Systems and Computer Science at Howard University, where he had taught since 1969. He received the B.S., M.S., and Ph.D. degrees from the University of Maryland at College Park and the M. S. degree in Computer Science from Johns Hopkins University. His research interests include distributed systems, performance modeling and capacity planning; and most areas of software engineering, especially software reuse, fault-tolerance, and software performance measurement and their empirical foundations. Some of his current work includes the application of computing to the social sciences, especially in the area of name matching within historical documents, using both his computer search skills and genealogical knowledge. He is an experienced cruise ship lecturer, with special emphasis on identity theft and computer forensics.

"About this title" may belong to another edition of this title.

(No Available Copies)

Search Books:



Create a Want

If you know the book but cannot find it on AbeBooks, we can automatically search for it on your behalf as new inventory is added. If it is added to AbeBooks by one of our member booksellers, we will notify you!

Create a Want