By Topic

Spectrum, IEEE

Issue 6 • Date June 1997

Filter Results

Displaying Results 1 - 12 of 12
  • Networking locally, area-wise

    Page(s): 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (215 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • George H. Heilmeier - The recipient of the 1997 IEEE Medal of Honor shares thoughts about research management in this Q&A with Spectrum magazine

    Page(s): 18 - 23
    Save to Project icon | Request Permissions | PDF file iconPDF (1316 KB)  
    Freely Available from IEEE
  • IEEE Awards - The 1997 Medalists

    Page(s): 24 - 30
    Save to Project icon | Request Permissions | PDF file iconPDF (1137 KB)  
    Freely Available from IEEE
  • Diagramming Minus the Gruntwork

    Page(s): 65
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (339 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HiQ, and pretty, too

    Page(s): 65 - 66
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (710 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Math for Labview

    Page(s): 66
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (386 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Too much of a good thing?

    Page(s): 8 - 14
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (839 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Moore's law: past, present and future

    Page(s): 52 - 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4576 KB)  

    A simple observation, made over 30 years ago, on the growth in the number of devices per silicon die has become the central driving force of one of the most dynamic of the world's industries. Because of the accuracy with which Moore's Law has predicted past growth in IC complexity, it is viewed as a reliable method of calculating future trends as well, setting the pace of innovation, and defining the rules and the very nature of competition. And since the semiconductor portion of electronic consumer products keeps growing by leaps and bounds, the Law has aroused in users and consumers an expectation of a continuous stream of faster, better, and cheaper high-technology products. Even the policy implications of Moore's Law are significant: it is used as the baseline assumption in the industry's strategic road map for the next decade and a half View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Thin film SOI emerges

    Page(s): 37 - 45
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (5060 KB)  

    Everyone in a position to judge recognizes the advantages of silicon-on-insulator technology-higher circuit speed, lower power consumption, greater immunity to radiation-induced errors and compatibility with existing IC fabrication processes. In the past few years, these advantages have become critical for some commercial applications, particularly in the portable electronics arena, where the pressure for lower power and higher performance is unrelenting. As companies, universities, government agencies, and consortia throughout the world address silicon-on-insulator (SOI) technology, the supply of less expensive yet high-quality SOI materials is growing, and the grasp of the fabrication process strengthening-both encouraging signs. And, as applications for the technology increase, the focus today is shifting from issues oF feasibility to issues of circuit design and yield View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The origins of the pn junction

    Page(s): 46 - 51
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (948 KB)  

    The excerpts presented, from the authors' book Crystal Fire, track the work of an unsung hero of semiconductor history: Russell Ohl, the inventor of the pn junction View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Open architecture controllers

    Page(s): 60 - 64
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1816 KB)  

    Open architectures for desktop computing revolutionized the office. The author looks at how computer numerical controllers for factory equipment may be next View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaring the cybercrook: an investigator's view

    Page(s): 31 - 36
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2248 KB)  

    In 1996 the U.S. Federal Computer Incident Response Capability (FedCIRC) reported more than 2500 incidents, defined as adverse events in a computer system or networks caused by a failure of a security mechanism, or an attempted or threatened breach of these mechanisms. The Federal Bureau of Investigation's National Computer Crimes Squad, Washington, D.C., estimates that less than 15 percent of all computer crimes are even detected, and only 10 percent of those are reported. Without solidly built investigative techniques, which would contribute to a public perception of safety, the very stability of today's military and commercial institutions, not to mention the cybermarkets that are envisioned for the Internet, is called into question. The paper discusses types of computer crime and security attacks. It also presents a classification of the types of security crackers View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Spectrum Magazine, the flagship publication of the IEEE, explores the development, applications and implications of new technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Susan Hassler
IEEE Spectrum Magazine