FUNCTIONALITY OF
UTILITY 2000


UTILITY 2000 employs four phases of operation

Code Scan and Risk Assessment
Consolidation and Evaluation of Date-Related Instructions
Audited Changes to Source Code and Safety Features
Report Generation


Code Scan and Risk Assessment

UTILITY 2000 enables you to use comprehensive search parameters. UTILITY 2000 scans source code by executing fuzzy or crisp searches that scour for pre-built, date-related keywords, and any user-defined variables which can then be added to the scan. Results from the scan can be savedas text files.

UTILITY 2000 It is capable of scanning faster than 100,000 lines of code (LOC) per minute, this sets new benchmarks for speed and accuracy.UTILITY 2000 enables you to use comprehensive search parameters, so you are certain of locating every threat you search for. Following the scan, UTILITY 2000 generates a risk assessment- total number of LOC, number of potential Y2K threats, and a percentage of the total lines of code at risk. Finally, UTILITY 2000 creates a working file containing all the date-related instructions.


Consolidation and Evaluation of Date-Related Instructions

The separate working file(s) can then be reviewed by your IT specialist. No changes can be made directly to source code during this phase. The editing commands provide a very easy and thorough distillation of the source code. The reviewer can eliminate non-threatening instructions from the working file one at a time or by a "global remove." The "show context" feature also helps you judge a line for potential threats. At any command time you can determine your risk factor as a percentage of edited date exposures to the entire application.


Audited Changes to Source Code and Safety Features

Once the LOC which require further action have been chosen, UTILITY 2000 will save the working file to the database. In the commit phase, the user highlights a LOC to be edited and then UTILITY 2000 provides a dialogue box where the modified code is entered.

Safety features ensure no inadvertent changes can be made and the project can be saved at any time. Changed LOC will be time stamped, identified by user and group name and displayed next to the original code. Comments can be appended to each line, right in the source code. There is also a function that enables one to identify any line that has been reviewed but not changed.


Report Generation

UTILITY 2000 generates a work in progress report for each phase. Initially, the risk assessment provides the information required to manage priorities and scheduling. The database file enables senior personnel to review, and if necessary, modify changes made to the source code. Full graphical features display at a glance which applications have been scanned and analyzed.