Solved

y2k

Posted on 1999-01-09
4
244 Views
Last Modified: 2010-04-21
Are linux and unix ready for the millenium buh? Discuss the
above statement with regards to Linux, Unix OS's and their applications on both the PC and SPARC platforms.
0
Comment
Question by:kapa
  • 3
4 Comments
 
LVL 4

Expert Comment

by:davidmwilliams
ID: 2008673
 Sounds like some sort of silly homework question.
  Firstly, Linux is a version of Unix.  Secondly, the 'Y2K bug' can occur in hardware, on the OS, in applications, in data ... even if your specific OS was Y2K compliant, that doesn't mean the applications you want to use necessarily are.
  In any case, you should check the Web sites of specific Unix vendors for information.  For example, going to www.sun.com reveals that Solaris 2.6 is Y2K compliant, whereas SunOS 4.1.1 isn't, for those still using it.  SunOS 4.1.3ui is compliant after a patch is installed, and so on.
  Boy - Y2K, sheesh - I dread getting into taxi these days, because when the driver asks me my profession, the next thing I get is, 'say, is my computer Y2K ok?' or some such ...
0
 

Accepted Solution

by:
what9 earned 50 total points
ID: 2008674
Linux is Y2K
Got to www.redhat.com
and click on the bottom on Y2K
CU


0
 
LVL 4

Expert Comment

by:davidmwilliams
ID: 2008675
 The answer doesn't quite answer the question.  Linux, the OS, is Y2k compliant, but as to the PC and other platforms -- it then depends on the hardware, too.
  Further, there are a number of variants of 'Unix' ...
0
 
LVL 4

Expert Comment

by:davidmwilliams
ID: 2008676
 The answer doesn't quite answer the question.  Linux, the OS, is Y2k compliant, but as to the PC and other platforms -- it then depends on the hardware, too.
  Further, there are a number of variants of 'Unix' ...
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When you do backups in the Solaris Operating System, the file system must be inactive. Otherwise, the output may be inconsistent. A file system is inactive when it's unmounted or it's write-locked by the operating system. Although the fssnap utility…
Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now