Open Access   Article Go Back

Digital World Bug: Y2k38 an Integer Overflow Threat-Epoch

S. Harshini1 , K.R. Kavyasri2 , P. Bhavishya3 , T. Sethukkarasi4

Section:Review Paper, Product Type: Journal Paper
Volume-5 , Issue-3 , Page no. 106-109, Mar-2017

Online published on Mar 31, 2017

Copyright © S. Harshini, K.R. Kavyasri, P. Bhavishya, T. Sethukkarasi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Harshini, K.R. Kavyasri, P. Bhavishya, T. Sethukkarasi, “Digital World Bug: Y2k38 an Integer Overflow Threat-Epoch,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.3, pp.106-109, 2017.

MLA Style Citation: S. Harshini, K.R. Kavyasri, P. Bhavishya, T. Sethukkarasi "Digital World Bug: Y2k38 an Integer Overflow Threat-Epoch." International Journal of Computer Sciences and Engineering 5.3 (2017): 106-109.

APA Style Citation: S. Harshini, K.R. Kavyasri, P. Bhavishya, T. Sethukkarasi, (2017). Digital World Bug: Y2k38 an Integer Overflow Threat-Epoch. International Journal of Computer Sciences and Engineering, 5(3), 106-109.

BibTex Style Citation:
@article{Harshini_2017,
author = {S. Harshini, K.R. Kavyasri, P. Bhavishya, T. Sethukkarasi},
title = {Digital World Bug: Y2k38 an Integer Overflow Threat-Epoch},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2017},
volume = {5},
Issue = {3},
month = {3},
year = {2017},
issn = {2347-2693},
pages = {106-109},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1218},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1218
TI - Digital World Bug: Y2k38 an Integer Overflow Threat-Epoch
T2 - International Journal of Computer Sciences and Engineering
AU - S. Harshini, K.R. Kavyasri, P. Bhavishya, T. Sethukkarasi
PY - 2017
DA - 2017/03/31
PB - IJCSE, Indore, INDIA
SP - 106-109
IS - 3
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
616 496 downloads 526 downloads
  
  
           

Abstract

Digital universe has been menaced by plenty of bugs but only a few seemed to pose a great hazard. Y2K,Y2K10 were the most prominent bugs which were blown away. And now we have Y2K38. The Y2K38 bug, if not resolved, it will get hold off the predictions that were made for the Y2K bug would come face reality this time. Y2K38 bug will affect all the system applications and most of the embedded systems which use signed 32 bit format for representing the internal time. The number of seconds which can be represented using this signed 32 bit format is 2,147,483,647 which will be equal to the time 19, January, 2038 at 03:14:07 UTC(Coordinated Universal Time),where the bug is expected to hit the web. After this moment the systems will stop working correctly. This could wipe out programs that rely on the internal clock to make measurements. There have been some solutions which delayed this problem, that we can have some more time to find a universal solution and so does our proposed solution.

Key-Words / Index Term

Date,Time,Y2K,Y2K38 bug

References

[1]. M. Schumacher,”Year 2000, Y2K, millennium bug”, Power Engineering Society Summer Meeting, 1999. IEEE, ISBN: 0-7803-5569-5
[2]. Zijiang Yang,J.C.Paradi,”DEA evaluation of a Y2K software retrofit program”, IEEE Transactions on Engineering Management , Vol.51(3),ISSN: 0018-9391,2004.
[3]. Vikas Chandra Sharma,”YK-2028 Bug”,Journal Of Image Processing And Artificial Intelligence, Vol .1(3),2015.
[4]. Diomidis Spinellis,”Code quality: the open source perspective. Effective software development series in Safari Books Online”. Adobe Press. ISBN 0-321-16607-8.
[5]. Margaret Ross,”The Y2K Legacy—The Time Bomb of Tomorrow”, Kluwer Academic Publishers, Vol 10(4), pp 281–283,2002 Print ISSN:0963-9314
[6]. Carrington, Damia “Was Y2K bug a boost?”BBC News. Archived from the original on 22 April 2004.
[7]. Raymond B.Howard,”The Case for Windowing: Techniques That Buy 60 Years”, Year/2000 Journal, Mar/Apr 1998.”
[8]. “Issue 16899: Year 2038 problem,”Android, 16 May 2011.
[9]. J. L. Smoot and P. J. Meyer, “What is UTC?,”NASA - Marshall Flight Space Center, 29 March 1995.
[10]. Jet Propulsion Laboratory, “Mission Fantastic to Mars (Part 4),”California Institute of Technology,
[11]. The Open Group and IEEE, “The Open Group Base Specifications Issue 6, IEEE Std 1003.1, 2004 Edition (definition of epoch),”The Open Group; IEEE;, 2004
[12]. “Y2K Bug,”National Geographic Society 1996-2013
[13]. Dutton, Denis , ”It`s Always the End of the World as We Know It”, The opinion Pages,The New York Times. 31 December 2009.
[14]. R. M. Wilcox, “The Year 2038 Problem,”23 October 2003.
[15]. Rae Zimmerman,”Y2K readiness helped NYC on 9/11”, MIT News, 19 November 2002.
[16]. Arnd Bergmann,”The End Of Time(32bit edition)”,Embedded Linux Conference,San Jose,CA,2015.