×

SUBSCRIBE TO TMCnet
TMCnet - World's Largest Communications and Technology Community

CHANNEL BY TOPICS


QUICK LINKS




 

feature.GIF (5781 bytes)
March 1999


Y2K: Should It Be Bugging You?

BY MARC ROBINS and CHRIS DONNER

Go to sidebars on:
What To Do?

Y2K And SS7
Y2K And CTI Hardware
Y2K Web Sites
Haiku Y2K?

The date: January 3, 2000. You arrive at work early and feeling groggy after a long weekend of millennium madness. Your key card doesn't work, leaving you out in the freezing cold with your ears going numb. Finally, a security guard lets you in through a side door that still takes those old-fashioned metal keys. Making your way through the building and up the stairs (for some reason the elevators aren't working), you notice that it is unusually dark - and you also notice that the emergency lighting system has been triggered. You make it to your desk, and with reflexes conditioned like one of Pavlov's dogs, the act of sitting prompts you to start checking your voice mail. Usually, your phone blinks uncontrollably with the constant influx of messages - today it's dark. You took Thursday and Friday off, and you think to yourself that there should be dozens of messages to listen to. What a way to start the week…!

Not to mention a new millennium! A new Y2K survey by the Information Technology Association of America (www.itaa.org) paints a pretty grim picture of what's to come in about 300 days. More than 33 percent of the 400 CIOs, engineers, CEOs, and attorneys surveyed for the study have already reported Y2K-related problems, including systems crashes and embedded systems failures. Problems ranged from database file corruptions to accounting and data exchange errors. To compound the issue, 71 percent of those surveyed disclosed that tests of "fixed" code turned up problems that had been overlooked or newly created during the debugging process. Other interesting statistics: 87 percent feel that Y2K will be a national and global crisis, 52 percent believe their companies will suffer financially, and only 3 percent have completed their contingency plans.

Pressure is also mounting on telecommunications technology companies to disclose potential Y2K problems with their wares and to fix them. Recently a group of customers sued AT&T and Lucent Technologies for selling products that supposedly weren't Y2K-compliant, basing their suit on New York State's consumer protection laws. Expect to see more of this type of activity in the coming months.

So call me optimistically paranoid. While I agree with Rich Tehrani (our overly optimistic publisher) that the Y2K bug represents potential boom times for CTI (due to the unleashed desires of cash-laden IT departments to spring for new generation, Y2K-compliant CTI solutions), I also believe that left unsquashed, the bug will wreak havoc with CTI systems and applications that have not been upgraded and patched. We're talkin' mission-critical here - phones, voice messaging, ACDs, fax processing, contact and sales management applications - the systems we have come to depend on as the very lifeblood of our businesses.

It's not that these things can't be fixed, because of course they can. The problem is that most humans procrastinate when it comes to deadlines - especially when those deadlines involve the prospect of spending oodles of money. The onus is not just on the CTI technology vendor to upgrade, but also on the user community to be diligent and proactive.

There are numerous other adjunct systems and systems components to put on your Y2K checklist that are increasingly linked by data connections to other systems for signaling and control purposes - especially in call center environments. One bad link in the chain can set off a panoply of errors, and the next thing you know, a system that has been secure and reliable suddenly goes wild and begins behaving unpredictably. So while individual systems may comply, connections to non-compliant resources could still cause serious problems.

Most of the CTI vendors we have spoken with seem fairly well prepared for the impending reset to 00, especially when discussing applications and coding developed relatively recently. For example, Ning Ning Yu, vice president of engineering for Net Effect Systems (www.neteffect.com), had the following advice regarding solutions involving multiple vendors: "Multi-vendor solutions will experience third-party Y2K exposure, as there are multiple systems and software involved, which may include non-compliant code. The multi-vendor solutions do have multiple business dependencies, which pose some Y2K operational risks as business interruptions that may occur if a third party fails to solve its Y2K problem. Most multi-vendor solutions are not associated with older programs that contain older, fragile mainframe code. Legacy applications have been around for a long time and often are based on undocumented code. Multi-vendor solutions based on current code with source code more readily available to troubleshoot as needed should be more readily Y2K-compliant. The Y2K problem is too complex, however, to claim that any one type of solution will guarantee complete elimination of risk."

John Belville, post sales manager of Williams Communications Solutions' Call Center Applications Team (www.wilcomsol.com) also expressed concern regarding call centers based on legacy equipment: "If the application is no longer supported by a local technical staff, I would recommend securing the services of a call center integrator now! These highly skilled technicians are gaining in popularity with existing resources currently committed to Y2K projects through year's end. If you're in this situation, locate any and all documentation on the various hardware/software platforms. From the known information, contact each vendor to obtain a statement of compliance for each component. Then create and execute a comprehensive test plan that will verify the system's integrated compliance."

Mike Whitmer, director of architecture at Witness Systems (www.witsys.com), expressed similar views: "We don't really envision Y2K affecting customer interaction centers, especially the newer ones. There is, however, the chance that older centers with more dated systems could experience challenges. The reason older centers could be affected is because they were more likely built on a legacy platform rather than a client/server platform. On the client/server side, it's much easier to ensure compliance - and if issues do arise, it's easier to make the necessary changes and conform to meet the set standards."

When discussing more recent applications and programs - say, those developed within the past 10 years - most CTI vendors have posted Y2K-compliance information to their Web sites. Additionally, many applications are reliant upon the operating system for date/time information, meaning that if the OS is compliant, the application should be too, at least in theory.

This idea is supported by Mike Coffee, president of Commetrex Corporation (www.commetrex.com): "Computer telephony (aka open telecommunications) is characterized by its being based on an open-computing platform, the PC. So the issue of Y2K readiness in CT is, for the most part, an issue of the readiness of the underlying computing platforms. It is also an issue of how applications-level software, such as messaging systems, use those platforms. For example, most messaging systems time-stamp messages. If an installed system is based on an older PC that improperly reports dates, will voice messages next January come out '4:00 p.m. on January twentieth, 1900'? Maybe, but most messaging systems don't include the year. If the system does include the year, would it matter whether the system were integrated by the developer of the application, a VAR, or the end user? It probably would if the end user were looking for a vendor to certify the system."

INTEGRATION
However, with integration being a key part of CTI, the fact is that there are many multi-vendor solutions out there that have performed acceptably until now, and yet may threaten to be somewhat less than reliable in the coming year. With this in mind, we at CTI� decided to focus on the issue of integration, as is our wont, and see what kind of response we could get from vendors and other resources in the CTI community.

To begin, we decided to query the ECTF on integration and Y2K, and Roger Huffadine, chairman of the ECTF technical committee (www.ectf.org), replied: "In the UK - whilst every supplier is seeking to satisfy their clients that supplied systems are Y2K-compliant - the legal position is still caveat emptor (let the buyer beware). Interestingly, the British Standards Institute requirement for Y2K compliance is that 'systems will operate for any date prior to and including Jan 1, 2000, and for any date after Jan 1, 2000.' Clearly this means that compliant systems must work with: BC dates, single-digit year, double-digit year, three-digit year, four-digit year, five-digit year, and so on. I'm sure that this is not what they mean by the statement, but it does show how silly things can get when Y2K statements are made up out of context.

"Very few integrated systems pass data as information - the norm is to pass key field information between the applications so that the issues of Y2K are basically isolated in the discrete applications. This could still be a problem if a critical business application that services a call center fails. Most businesses have schedules to ensure that all of their critical components are Y2K safe before Jan 1, 2000."

After hearing from the ECTF, we decided to turn to the vendor community, and we asked them to address the CTI industry as a whole, rather than the specific Y2K compliance of a particular board or application. One of the most exhaustive (and humorous) responses we received came from Dr. Mehmet Binal, president of BICOM (www.bicom-inc.com):

"The Y2K problem represents an extremely serious problem for the computer telephony industry. In fact, even if all the vendors claim that they conform with Y2K, it may not be a guarantee that the totality of the system built by using these products will work properly. As most of the time these systems remotely interact with other systems via modems, analog and digital line interfaces, each and every connection may be the cause of a particular problem. For example, an ISDN network interface communicating through the D channel may be affected by a software package with a Y2K bug (e.g., SS7) which may cause an unidentified problem in the system. The difficulty of guaranteeing a system's integrity and protecting it against Y2K may well turn out to be a formidable undertaking due to possible connection combinations through the network to different software applications. It is impossible to know beforehand where the connection will be made and what type of application will be connected to the system at the other end.

"These systems must be methodically investigated against such possibilities. Of course, this creates a real problem for turnkey system suppliers as well as for all the vendors who supply the components for the product. The probability of any DSP-based, low-level hardware being impacted directly by the Y2K bug is very low. However, these components provide a pipeline for the Y2K-related bug - a free passage to the intelligent parts of the system, making the system vulnerable. It is almost impossible to predict what kind of information will be able to pass through the DSP platforms that may cause Y2K problems.

"The Y2K problem must be addressed at the application software level where all the intelligent system-level decisions are made. However, it is impossible to assume that all the products in the market allow high-level applications to make such decisions. There may be operating system, driver level, and even hardware level implementations that cause Y2K bugs. Therefore, a thorough analysis of time-related decision-making processes must be made before attempting to solve the problem.

"If you ask me what I want to do this New Year's Eve, here is my answer: I will be at home with my family enjoying a good dinner like I always do, and I will avoid using equipment with potential Y2K bugs."

Ed Wadbrook, vice president of product management and marketing for NBX Corporation (www.nbxcorp.com), also addressed the issue of integration directly: "Multi-vendor solutions are more likely to cause problems - the weakest link in the chain theory. Controlling the quality standards is made more difficult if the design specs didn't specifically address the need. The areas of biggest concern will be the IVR systems in their ability to recognize a four-digit date range from various read/listen and write/play sources. In addition, there may be issues with the capabilities of the diverse database systems to effectively deal with Y2K date ranges. I think that the interfaces between systems, often conducted with IVR systems, pose the biggest area of concern. Many, many vendors are involved, as well as new and legacy systems…."

MULTI-VENDOR SOLUTIONS
While integration is often the name of the game when putting together a CTI solution, we wondered if opting to use open platforms and integrating multiple vendors' products would help or hurt a business in surviving the beginning of the coming year. On one hand, the integration points would seem to be obvious weak points, but on the other hand, open systems and discrete components might be easier to fix independently of one another. We received a variety of responses.

For example, John Belville of Williams Communications Solutions' Call Center Applications Team favored a single-vendor solution where possible: "CTI solutions based on multi-vendor platforms unequivocally increase the potential for Y2K complications. The application as a whole is only as compliant as its individual components. Our Y2K experience is that each vendor will only certify that their piece of the pie is compliant. Few vendors are conducting integration testing with outside equipment. Y2K testing of multi-vendor solutions will require the expertise of an integrator who can develop a test plan specific to that customer's environment. Hardware and operating systems will be the most challenging areas for quick turnaround for solutions in multi-vendor environments. Deciding who to turn to in a multi-vendor environment compared to a single solutions vendor will be more difficult. The same applies for application software.

"The end user must be diligent in identifying the technical and business impacts of Y2K. Only a detailed inventory and assessment will determine the impact. If you have in operation a known non-compliant component per the manufacturer, and it fails come January 1, 2000, then the consumer will ultimately be responsible. If you have a third party verify your readiness, and all is compliant, then pursue a letter of compliance for the entire application. The litigation issues are starting to mount, primarily in the area of manufacturers charging for upgrades and alternatives, not in the area of consumers experiencing failures caused by not upgrading non-compliant equipment. The best prevention is to comply with what the manufacturer recommends. Given all the choices in today's converging marketplace, a single vendor for integration is the best way to go if you want to avoid the vendor wars."

Rob MacLeod, senior product manager of Brooktrout Technology (www.brooktrout.com), seemed to agree that a unified solution would be the best alternative, if such a solution really existed: "Dealing with a single vendor will theoretically reduce the complexity of Y2K compliance, but it's unrealistic in today's environment to expect single-vendor systems. Computer telephony is by definition multi-vendor, because it takes advantage of the open market for hardware, operating systems, and application software. Typically, the application layer is responsible for a lot of other date-related functions, such as time-stamping play, record, fax send and receive events, activity logs, billing reports, etc."

Mike Whitmer at Witness Systems was more supportive of multi-vendor solutions: "Multi-vendor solutions will not necessarily cause more problems. The greater likelihood is that they'll be less problematic. The vast majority of vendors are required to address Y2K issues and provide proof that their products are compliant. And customers, by nature, are requiring that those vendor solutions meet that same basic prerequisite. A great deal of our integration with CTI is real-time based - meaning the date associated with it is not really relevant and therefore is not a…major concern.

"In developing and implementing your organization's Y2K action plan, it's important on the front-end to ensure that all of the system applications that interface with your CTI systems are compliant. If that step is passed over, your CTI system could be adversely affected. However, the date factor is of relatively low importance in the CTI realm. It's also important to keep in mind that Y2K-compliant CTI systems, when interfacing with other (Y2K or non-Y2K) external systems, can run 'validity checks' to avoid having outside erroneous data enter into your system."

John Landau, vice president of strategic marketing at Dialogic Corporation (www.dialogic.com), was quite clear in stating how he saw Y2K compliance affecting integration: "The issue is compliance in each system, not between systems. The only way to deal with it is to inquire with each vendor and/or to test. The more disparate the systems, the more places that must be contacted for the answers (hence, more work). The CTI industry has pretty much the same risks related to Y2K as any other IT infrastructure."

And John's statement really seems to sum it all up. Whether you are optimistic or pessimistic, or even downright paranoid, the Y2K issue really just means an increased amount of work. The catch is that it may all have to be done on January 1, 2000 - although there may be time to perform some repairs after January first. Dealing with Y2K might remind us of the fable involving the ant and the grasshopper. You can ignore the problem altogether and play in the sun for now, but winter is coming, and whether it is harsh or mild, it is best to be prepared.


What To Do?

John Andryuk, a principal Y2K consultant with Xerox Connect's Telephony Integration Services Group, just finished a five-month stint with a major insurance company. Here are some of John's suggestions, both big and small, for dealing with the Y2K bug, based on what he uncovered during his cleanup:

Worry About Everything: This means all standalone systems, and then systems in combination. Check the operating system (OS), CMOS, databases and other applications, system clocks, and clocks that might be "hidden" on circuit boards, and other internal system components. This is no joke: some CTI components and hardware resources employ their own on-board clocks to keep track of things.

Check Your Voice Mail: Voice mail systems, if not brought into compliance, can experience all sorts of failures and problems. Messages can be unceremoniously deleted by the automated purge routine, incoming messages could be stamped with the wrong date, making them irretrievable, and in the worst cases, the entire system could crash.

Don't Overlook Downstream And Ancillary Systems: Call center equipment such as PC-controlled wallboards, automatic dialers - all the stuff with timers that connect into the centers, and all the equipment on the floor - should be on your checklist.

Check The Contact Management Linkage: Are you doing screen pops? Or dialing out of PIMs running on your PCs? Make sure that the OS, BIOS, CTI hardware, and application and contact management software/PIMs are Y2K-compliant. Running off a network? Better check that too. One loose link could cause a number of screwy things to happen. Follow-up and reminder notices could be disabled. And, more seriously, your entire contact database could go kablooey.

Pagers And Paging Systems: These systems are used in increasingly sophisticated ways to alert internal and external staff about real-time problems, required action items, and problem status. Because these systems are increasingly incorporated into unified messaging systems, this is a linkage that must be checked.

Billing/Scheduling And Forecasting Systems: Pay special attention to those with client accounting routines and links to management information systems.

Digital Voice Recorders: As with your voice mail system, Y2K bugs here can cause problems on recorders that are activated by date/time schedules, affecting the playback timing of the right recordings and the storage and retrieval of messages.

Administrative Terminal Software And Event Loggers: Check, check, check. And then check again!


Y2K And SS7

"Although carriers have put major effort and dollars into fixing Y2K bugs, the fact still remains that nobody knows what will happen when networks interconnect. Telcos are scheduled to begin Y2K testing across interconnected carrier networks this month. Major switching problems aren't likely to occur, and the impact is projected to be primarily in the management systems such as billing and other date-sensitive applications that don't necessarily provide dial tone, but aid to the delivery of service."
John Belville, Williams Communications Solutions' Call Center Applications Team

"Signaling System 7 and AIN failures could occur but probably will not. With a focus on Y2K over the past five years - and an increasing emphasis on it over the past two years - the possibility for network and service problems is there, but the likelihood is not. We agree with IT industry analysts who predict that only eight percent of all problems will actually take place on January 1, 2000."
Mike Whitmer, Witness Systems


Y2K And CTI Hardware

"As for embedded resources, I know of none that have independent clock sources that store the year. Logs are time-tagged, but if the year must be included, the data are usually sent to the host for completion, or the embedded software acquires the date from the host."
Mike Coffee, Commetrex Corporation

"I'd defer to the hardware manufacturers. The issue is: Do they have an internal clock, or do they rely on an external source for information/instructions? If the external source were to change, would that corrupt their applications?"
Ed Wadbrook, NBX Corporation

"Boards do not really care about what day it is. They are concerned about reporting the beginning or ending of certain events. The host machine then uses these events to trigger the entry in some database for billing or whatever."
Rob MacLeod, Brooktrout Technology

"We would be surprised if embedded cards and associated software were very vulnerable - they normally don't use the date to operate."
John Landau, Dialogic Corporation


Y2K Web Sites

Of course, there are all kinds of Web sites that mention the Y2K issue in some form or another. A simple search on AltaVista (www.altavista.com) for "y2k" returned over 300,000 links. Some of them provide real information, some speculation, and some titillation. Some predict the end of the world, while others settle for mass chaos and anarchy. Here we have gathered together a small list (not exhaustive, by any measure) of some helpful sites that address Y2K-related issues seriously and in some depth, without resorting to hype or oversimplification.

www.y2k.gov
President's Council On Year 2000 Conversion.

www.nety2k.org
The Internet Year 2000 Campaign: attempting to raise awareness of the Year 2000 date conversion problem and facilitate preparations and the sharing of information.

www.y2k.com
Self-styled "Information Portal On The Year 2000 Computer Problem" provides information on how Y2K might affect a wide range of subjects: technology, legal issues, religion, etc.

www.y2kranch.com/links.html
Year 2000 (Y2K) links on the Internet - provides links to Web articles from various sources that discuss Y2K.

http://computers.miningco.com/msubyear2000.htm
A hodgepodge of links and resources, ranging from vendor-compliance sites to the DOOMSDAY 2000 article by Peter de Jager.

www.y2knews.com
Collected links to various published articles on the Y2K bug. Mainly social and end-user focused, but discusses technology in general terms as well.

www.sba.gov/y2k
Site designed to inform and advise small businesses on how to deal with the Y2K problem, put together by the U.S. Small Business Administration.

www.year2000.com
Another general reference and link library, with a nice link to Year 2000 User Groups, where people can go to exchange ideas and experiences, and to celebrate or commiserate.

www.y2k-status.org
An extensive site that "offers a fair and unbiased status report on the world's progress to eliminate or alleviate the Year 2000 problem."

www.datamation.com/PlugIn/issues/1998/september/09y2k.html
A look at how Y2K problems might affect embedded systems, and some helpful points.

www.y2k.co.za
South Africa's Y2K page, with a focus on the IT industry and business.


Haiku Y2K?

A file that big?
It might be very useful.
But now it is gone.

To have no errors
Would be life without meaning:
No struggle, no joy.

Seeing my great fault
Through darkening blue windows
I begin again.

Source: www.y2ktimebomb.com







Technology Marketing Corporation

2 Trap Falls Road Suite 106, Shelton, CT 06484 USA
Ph: +1-203-852-6800, 800-243-6002

General comments: [email protected].
Comments about this site: [email protected].

STAY CURRENT YOUR WAY

© 2024 Technology Marketing Corporation. All rights reserved | Privacy Policy