Year 2000 Fix on Schedule

In an initial report on agencies' progress in getting their computer systems ready for the year 2000, the Office of Management and Budget has told Congress that no agency reported being behind schedule.

The OMB report to Congress also said only 3 percent of agencies' systems have yet to be evaluated for year 2000 readiness, and 21 percent of systems already are year 2000-ready. Agencies reported to OMB that they have 7,649 mission-critical information systems and estimated they will spend $2.8 billion to fix the year 2000 problem.

Among individual agencies, the Social Security Administration is the clear leader, with 71 percent of its systems needing no further repairs. Next comes the Environmental Protection Agency, with 46 percent of its systems already compliant.

"Getting Federal Computers Ready for 2000: Progress Report" is OMB's first quarterly report based on agencies' reports to the White House. It shows that 17 percent of the necessary repair work has been done. Of the systems inventory, more than 15 percent will be retired or replaced altogether, instead of being repaired. The total inventory of 7,649 does not include 29,139 software modules reported by Social Security.

The report calls the progress as of May 15 "a good start" but notes pointedly that 5,430 essential systems remain to be fixed. It says the governmentwide cost estimate continues to climb as agencies get a better handle on the problem.

The problem goes back to the early days of computing, when programmers began to use two-digit entries to refer to years such as "68." It was understood that all years began with "19." With the century change, older systems will mistake the date unless their programs are updated. Modifying old software is a labor-intensive and sometimes difficult job.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.