Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

An enterprise transformation methodology to mitigate Y2K risk

An enterprise transformation methodology to mitigate Y2K risk The end of the millennium may hold significant difficulties for any system dependent on computer dates. Computers which misinterpret the year 2000 and other significant dates may require considerable repair. There have been many methodologies developed to assist companies with the process of Y2K repair. These methodologies and additional considerations for approaching Y2K solutions are presented. Specific measures to avoid logistics difficulties are discussed. The success of these measures can be considerably enhanced through the application of a transformation methodology. A proven transformation methodology for facilitating change is presented as applied to mitigating the Y2K risk. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Logistics Information Management Emerald Publishing

An enterprise transformation methodology to mitigate Y2K risk

Loading next page...
 
/lp/emerald-publishing/an-enterprise-transformation-methodology-to-mitigate-y2k-risk-cgFLlNdnSY

References (21)

Publisher
Emerald Publishing
Copyright
Copyright © 1999 MCB UP Ltd. All rights reserved.
ISSN
0957-6053
DOI
10.1108/09576059910268878
Publisher site
See Article on Publisher Site

Abstract

The end of the millennium may hold significant difficulties for any system dependent on computer dates. Computers which misinterpret the year 2000 and other significant dates may require considerable repair. There have been many methodologies developed to assist companies with the process of Y2K repair. These methodologies and additional considerations for approaching Y2K solutions are presented. Specific measures to avoid logistics difficulties are discussed. The success of these measures can be considerably enhanced through the application of a transformation methodology. A proven transformation methodology for facilitating change is presented as applied to mitigating the Y2K risk.

Journal

Logistics Information ManagementEmerald Publishing

Published: Jun 1, 1999

Keywords: Computer management; Contingency planning; Information technology; Logistics; Risk management

There are no references for this article.