FUNCTIONALITY OF
UTILITY 2000
UTILITY 2000 employs four phases of operation
Code Scan and Risk Assessment
Consolidation and Evaluation of Date-Related Instructions
Audited Changes to Source Code and Safety Features
Report Generation
Code Scan and Risk Assessment
UTILITY 2000
enables you to use comprehensive search parameters. UTILITY 2000 scans source code by executing fuzzy
or crisp searches that scour for pre-built, date-related keywords, and
any user-defined variables which can then be added to the scan. Results
from the scan can be savedas text files.
UTILITY 2000
It is capable of scanning faster than 100,000 lines of code (LOC) per minute,
this sets new benchmarks for speed and accuracy.UTILITY 2000 enables you to use comprehensive
search parameters, so you are certain of locating every threat you search
for. Following the scan, UTILITY 2000 generates
a risk assessment- total number of LOC, number of potential Y2K threats,
and a percentage of the total lines of code at risk. Finally,
UTILITY 2000 creates a working file containing
all the date-related instructions.
Consolidation and Evaluation
of Date-Related Instructions
The separate working file(s) can then be reviewed
by your IT specialist. No changes can be made directly to source code
during this phase. The editing commands provide a very easy and thorough
distillation of the source code. The reviewer can eliminate non-threatening
instructions from the working file one at a time or by a "global remove." The "show context" feature also helps you judge a line for potential threats. At any command time
you can determine your risk factor as a percentage of edited date exposures
to the entire application.
Audited Changes to Source Code
and Safety Features
Once the LOC which require further action have
been chosen, UTILITY 2000 will save the working file to the database.
In the commit phase, the user highlights a LOC to be edited and then UTILITY
2000 provides a dialogue box where the modified code is entered.
Safety features ensure no inadvertent changes
can be made and the project can be saved at any time. Changed LOC will
be time stamped, identified by user and group name and displayed next to the
original code. Comments can be appended to each line, right in the source
code. There is also a function that enables one to identify any line that
has been reviewed but not changed.
Report Generation
UTILITY 2000 generates a work in progress
report for each phase. Initially, the risk assessment provides the information required to manage priorities and scheduling.
The database file enables senior personnel to review, and if necessary, modify changes made to the source code. Full graphical features display at a glance
which applications have been scanned and analyzed.
|