Anyone interested in a Powerpoint presentation?greenspun.com : LUSENET : TimeBomb 2000 (Y2000) : One Thread
For those of you who may not have read a previous post of mine, I have created a Powerpoint presentation on Y2K which anyone is free to use, borrow from, edit, etc. It is filled with facts, quotes, etc. It was created using Office '97, but can be viewed with version 7.0 also.
-- Steve Hartsman (email@example.com), September 04, 1998
For everyone who has requested the presentation, thank you. I hope I was able to get it to all who requested. I know a few were undeliverable. I will make frequent updates to the presentation. When enough changes have been made, I will announce a new version and post it here. If anyone has any specific questions or comments regarding the presentation, please e-mail me at firstname.lastname@example.org.
I mention Beach's Law of Vulnerability under the topic of Imported Data. At least one of you has said that it is an obscure reference. I don't expect many of you know it, so I'll explain it here (as I do, of course, when giving the presentation).
Beach's Law of Vulnerability states that the number (N) of computing devices a corporation and its partners have connected results in (N squared) the risk of having data corrupted. This is a crucial point, and it goes a long way to dispelling the "myth" stated earlier in the presentation that "large companies will make it; small ones won't". By "make it", I don't mean compliance; I mean survival. The big companies are completely reliant on technology. Small companies can much more easily revert to pencil and paper if forced to.
-- Steve Hartsman (email@example.com), September 09, 1998.
Thank you sir.
-- Robert A. Cook, P.E. (firstname.lastname@example.org), September 09, 1998.