Why 2K? Why 2K?

Why 2K‪?‬

    • $2.99
    • $2.99

Publisher Description

This book, originally published in 1999, describes what could have happened during the era of the famous Y2K hysteria, when computers and communications devices would have had to function when four digits were needed to use the current date instead of the two digits that were commonly used in many systems. Of course, none of the expected disasters happened and none of the Y2K terrorist plots did happen either. Or did they? Certainly the vulnerabilities of the Hoover Dam and some NASA spacecraft control centers have been fixed, but the fixes were largely the result of general security measures taken after September 11, 2001.
This book tells the story of Y2K vulnerabilities from a retrospective viewpoint. According to Steven Musil of Cnet, the same type of problems occurred to a number of web servers, including Gawker, StumbleUpon, Yelp, FourSquare, and LinkedIn, when a single leap second was added to the Coordinated Universal Time. Although the scale of these problems is much smaller than Y2K, some parts of the problem are still with us.
In case the leap second problem occurs again, or timing of messages on UNIX servers get corrupted in 2038, or the world ends in December, 2012, the author’s favorite recipe for Shrimp with Sizzling Rice Soup has been included at the end of this book. Enjoy!

GENRE
Sci-Fi & Fantasy
RELEASED
2013
July 26
LANGUAGE
EN
English
LENGTH
283
Pages
PUBLISHER
Ronald J. Leach
SELLER
Draft2Digital, LLC
SIZE
331.6
KB
Fragments and Remains - Excerpts From A Vanished World Fragments and Remains - Excerpts From A Vanished World
2022
The Noah Equation The Noah Equation
2014
Prometheus and the Dragon Prometheus and the Dragon
2022
Cow Fart Apocalypse Cow Fart Apocalypse
2021
Puppeteer Puppeteer
2019
The Power of Illusion The Power of Illusion
2013
The 101 Most Important UNIX and Linux Commands The 101 Most Important UNIX and Linux Commands
2012
Using C in Software Design, Second Edition Using C in Software Design, Second Edition
2012
C and Linux/UNIX Commands: Two Books C and Linux/UNIX Commands: Two Books
2013
C and UNIX C and UNIX
2013
Advanced Topics In UNIX, Second Edition Advanced Topics In UNIX, Second Edition
2012
Twelve and a Half Steps to Avoid Identity Theft Twelve and a Half Steps to Avoid Identity Theft
2012