{"id":4174,"date":"2017-10-21T10:39:48","date_gmt":"2017-10-21T14:39:48","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5206sec701fall17\/?p=4174"},"modified":"2018-04-25T09:44:27","modified_gmt":"2018-04-25T13:44:27","slug":"week-9-all-questions-2","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5206sec951summer2026\/2017\/10\/21\/week-9-all-questions-2\/","title":{"rendered":"Week 9 &#8211; All Questions"},"content":{"rendered":"<p><strong>Case Study: <em>A Hospital Catches the &#8220;Millennium Bug&#8221;<\/em><\/strong><\/p>\n<p><strong>Introduction:<\/strong> <em>To prevent disaster and assure business continuity, Year 2000 (also known as &#8220;Millennium Bug&#8221; or &#8220;Y2K Bug&#8221; or &#8220;Y2K&#8221;) compliance projects entailed the following technical steps which applied to: all categories of software (operating systems, transaction processing and decision support applications, vendor packages, custom and user-developed software applications, etc.), computing hardware (desktop, midrange and mainframe systems), and programmable devices (such as elevator controls &#8211; which contained date-sensitive microprocessors):<\/em><\/p>\n<ul>\n<li>Inventory:\u00a0 \u00a0 \u00a0 \u00a0 \u00a0Identify hardware and software that might five rise to &#8220;Year 2000&#8221; (Y2K) problems<\/li>\n<li>Analysis:\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Examine code for date fields, determining which ones needed to be fixed<\/li>\n<li>Remediation:\u00a0 \u00a0Alter the code for Y2K compliance (aka &#8220;renovation,&#8221; &#8220;conversion&#8221;)<\/li>\n<li>Testing:\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Ensure the altered code produces correct results<\/li>\n<li>Migration:\u00a0 \u00a0 \u00a0 \u00a0 Put the new code into production<\/li>\n<\/ul>\n<p><strong>Question 1:<\/strong> Based on the facts presented in the case, how far had Fetcher-Allen progressed in these steps by the end of June, 1998?\u00a0 How likely is it that Fletcher-Allen would have achieved full-year 2000 compliance by December 31, 1999?\u00a0 (Explain your reasoning, supported by specific evidence from the case and assigned readings.)<\/p>\n<p><strong>Question 2:<\/strong> At the end of the case, Sadlemire observes, &#8220;This project sometimes plays second fiddle to other projects that I believe are less critical.&#8221;\u00a0 What &#8220;other projects&#8221; do you think he is referring to here? What advice would you give Sadlemire to help him address this issue of conflicting priorities?<\/p>\n<p><strong>Question 3:<\/strong> What should Bob Sadlemire tell the Board of Trustees at the June meeting?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Case Study: A Hospital Catches the &#8220;Millennium Bug&#8221; Introduction: To prevent disaster and assure business continuity, Year 2000 (also known as &#8220;Millennium Bug&#8221; or &#8220;Y2K Bug&#8221; or &#8220;Y2K&#8221;) compliance projects entailed the following technical steps which applied to: all categories of software (operating systems, transaction processing and decision support applications, vendor packages, custom and user-developed [&hellip;]<\/p>\n","protected":false},"author":31478,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[],"tags":[],"class_list":{"0":"post-4174","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5206sec951summer2026\/wp-json\/wp\/v2\/posts\/4174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5206sec951summer2026\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5206sec951summer2026\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5206sec951summer2026\/wp-json\/wp\/v2\/users\/31478"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5206sec951summer2026\/wp-json\/wp\/v2\/comments?post=4174"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5206sec951summer2026\/wp-json\/wp\/v2\/posts\/4174\/revisions"}],"predecessor-version":[{"id":4293,"href":"https:\/\/community.mis.temple.edu\/mis5206sec951summer2026\/wp-json\/wp\/v2\/posts\/4174\/revisions\/4293"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5206sec951summer2026\/wp-json\/wp\/v2\/media?parent=4174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5206sec951summer2026\/wp-json\/wp\/v2\/categories?post=4174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5206sec951summer2026\/wp-json\/wp\/v2\/tags?post=4174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}