Why 2K?

Par : Ronald J. Leach

Formats :

Offrir maintenant
Ou planifier dans votre panier
Disponible dans votre compte client Decitre ou Furet du Nord dès validation de votre commande. Le format ePub est :
  • Compatible avec une lecture sur My Vivlio (smartphone, tablette, ordinateur)
  • Compatible avec une lecture sur liseuses Vivlio
  • Pour les liseuses autres que Vivlio, vous devez utiliser le logiciel Adobe Digital Edition. Non compatible avec la lecture sur les liseuses Kindle, Remarkable et Sony
Logo Vivlio, qui est-ce ?

Notre partenaire de plateforme de lecture numérique où vous retrouverez l'ensemble de vos ebooks gratuitement

Pour en savoir plus sur nos ebooks, consultez notre aide en ligne ici
C'est si simple ! Lisez votre ebook avec l'app Vivlio sur votre tablette, mobile ou ordinateur :
Google PlayApp Store
  • FormatePub
  • ISBN978-1-393-03982-2
  • EAN9781393039822
  • Date de parution28/02/2021
  • Protection num.pas de protection
  • Infos supplémentairesepub
  • ÉditeurRelay Publishing

Résumé

This book, originally published in 1999, describes what could have happened during the era of the famous Y2K hysteria, when computers and communications devices would have had to function when four digits were needed to use the current date instead of the two digits that were commonly used in many systems.  Of course, none of the expected disasters happened and none of the Y2K terrorist plots really.  Or did they?  Certainly the vulnerabilities of the Hoover Dam and some NASA spacecraft control centers have been fixed, but the fixes were largely the result of general security measures taken after September 11, 2001.
This book tells the story of Y2K vulnerabilities from a retrospective viewpoint.  According to Steven Musil of Cnet, the same type of problems occurred to a number of web servers, including Gawker, StumbleUpon, Yelp, FourSquare, and LinkedIn, when a single leap second was added to the Coordinated Universal Time.  Although the scale of these problems is much smaller than Y2K, some parts of the problem are still with us.
In case the leap second problem occurs again, or timing of messages on UNIX servers get corrupted in 2038, or the world ends in December, 2012, the author's favorite recipe for Shrimp with Sizzling Rice Soup has been included at the end of this book.  Enjoy!
This book, originally published in 1999, describes what could have happened during the era of the famous Y2K hysteria, when computers and communications devices would have had to function when four digits were needed to use the current date instead of the two digits that were commonly used in many systems.  Of course, none of the expected disasters happened and none of the Y2K terrorist plots really.  Or did they?  Certainly the vulnerabilities of the Hoover Dam and some NASA spacecraft control centers have been fixed, but the fixes were largely the result of general security measures taken after September 11, 2001.
This book tells the story of Y2K vulnerabilities from a retrospective viewpoint.  According to Steven Musil of Cnet, the same type of problems occurred to a number of web servers, including Gawker, StumbleUpon, Yelp, FourSquare, and LinkedIn, when a single leap second was added to the Coordinated Universal Time.  Although the scale of these problems is much smaller than Y2K, some parts of the problem are still with us.
In case the leap second problem occurs again, or timing of messages on UNIX servers get corrupted in 2038, or the world ends in December, 2012, the author's favorite recipe for Shrimp with Sizzling Rice Soup has been included at the end of this book.  Enjoy!
Templar Mysteries Solved
Ronald J. Leach
E-book
5,49 €
Lincoln, Douglass and Clark
Ronald J. Leach
E-book
5,49 €
Data Recovery
Ronald J. Leach
E-book
7,99 €
Eat Kids at School
Ronald J. Leach
E-book
2,99 €
Why 2K?
Ronald J. Leach
E-book
2,99 €