Y2K bug

computer science
verifiedCite
While every effort has been made to follow citation style rules, there may be some discrepancies. Please refer to the appropriate style manual or other sources if you have any questions.
Select Citation Style
Share
Share to social media
URL
https://mainten.top/technology/Y2K-bug
Feedback
Corrections? Updates? Omissions? Let us know if you have suggestions to improve this article (requires login).
Thank you for your feedback

Our editors will review what you’ve submitted and determine whether to revise the article.

Also known as: Year 2000 bug, millennium bug
Also called:
Year 2000 bug or Millennium Bug
Related Topics:
computer program

Y2K bug, a problem in the coding of computerized systems that was projected to create havoc in computers and computer networks around the world at the beginning of the year 2000 (in metric measurements, k stands for 1,000). After more than a year of international alarm, feverish preparations, and programming corrections, few major failures occurred in the transition from December 31, 1999, to January 1, 2000.

Until the 1990s many computer programs (especially those written in the early days of computers) were designed to abbreviate four-digit years as two digits in order to save memory space. These computers could recognize “98” as “1998” but would be unable to recognize “00” as “2000,” perhaps interpreting it to mean 1900. Many feared that when the clocks struck midnight on January 1, 2000, many affected computers would be using an incorrect date and thus fail to operate properly unless the computers’ software was repaired or replaced before that date. Other computer programs that projected budgets or debts into the future could begin malfunctioning in 1999 when they made projections into 2000. In addition, some computer software did not take into account that the year 2000 was a leap year. And even before the dawn of 2000, it was feared that some computers might fail on September 9, 1999 (9/9/99), because early programmers often used a series of 9s to indicate the end of a program.

It was feared that such a misreading would lead to software and hardware failures in computers used in such important areas as banking, utilities systems, government records, and so on, with the potential for widespread chaos on and following January 1, 2000. Mainframe computers, including those typically used to run insurance companies and banks, were thought to be subject to the most serious Y2K problems, but even newer systems that used networks of desktop computers were considered vulnerable.

computer chip. computer. Hand holding computer chip. Central processing unit (CPU). history and society, science and technology, microchip, microprocessor motherboard computer Circuit Board
Britannica Quiz
Computers and Technology Quiz

The Y2K problem was not limited to computers running conventional software, however. Many devices containing computer chips, ranging from elevators to temperature-control systems in commercial buildings to medical equipment, were believed to be at risk, which necessitated the checking of these “embedded systems” for sensitivity to calendar dates.

In the United States, business and government technology teams worked feverishly with a goal of checking systems and fixing software before the end of December 1999. Although some industries were well on the way to solving the Y2K problem, most experts feared that the federal government and state and local governments were lagging behind. A Y2K preparedness survey commissioned in late 1998 by Cap Gemini America, a New York computer industry consulting firm, showed that among 13 economic sectors studied in the United States, government was the least ready for Y2K. (Rated highest for preparedness was the software industry.)

In an effort to encourage companies to share critical information about Y2K, U.S. Pres. Bill Clinton in October 1998 signed the Year 2000 Information and Readiness Disclosure Act. The law was designed to encourage American companies to share Y2K data by offering them limited liability protection for sharing information about Y2K products, methods, and best practices.

In western Europe the European Commission issued a report warning that efforts to solve Y2K in many European Union member countries were insufficient, particularly in terms of the cross-border cooperation needed to be ready by 2000. The British government announced that its armed forces would be prepared in time and would provide assistance to local police if utilities, transportation systems, or emergency services failed.

Are you a student?
Get a special academic rate on Britannica Premium.

Many other countries, notably Asian countries suffering at that time from an ongoing economic crisis as well as small or geographically isolated countries, were thought to be less well prepared. It was uncertain how this would affect the tightly integrated world economy and physical infrastructure. In mid-December 1998 the UN convened its first international conference on Y2K in an attempt to share information and crisis-management efforts and established the International Y2K Cooperation Center, based in Washington, D.C.

An estimated $300 billion was spent (almost half in the United States) to upgrade computers and application programs to be Y2K-compliant. As the first day of January 2000 dawned and it became apparent that computerized systems were intact, reports of relief filled the news media. These were followed by accusations that the likely incidence of failure had been greatly exaggerated from the beginning. Those who had worked in Y2K-compliance efforts insisted that the threat had been real. They maintained that the continued viability of computerized systems was proof that the collective effort had succeeded. In following years, some analysts pointed out that programming upgrades that had been part of the Y2K-compliance campaign had improved computer systems and that the benefits of these improvements would continue to be seen for some time to come.

The Editors of Encyclopaedia Britannica This article was most recently revised and updated by Erik Gregersen.