By Topic

Spectrum, IEEE

Issue 6 • Date June 2002

Filter Results

Displaying Results 1 - 21 of 21
  • Breaking into the blue

    Page(s): 18 - 19
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (242 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vying for next video player crown

    Page(s): 19 - 20
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (238 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will Microsoft verdict miss mark?

    Page(s): 26 - 28
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (235 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Taking tourists for a ride (in space)

    Page(s): 30 - 31
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (204 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Free as in freedom: Richard Stallman's crusade for free software [Book Review]

    Page(s): 56 - 57
    Save to Project icon | Request Permissions | PDF file iconPDF (207 KB)  
    Freely Available from IEEE
  • Linked: the new science of networks [Book Review]

    Page(s): 57 - 58
    Save to Project icon | Request Permissions | PDF file iconPDF (205 KB)  
    Freely Available from IEEE
  • Ch solves portability headaches

    Page(s): 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (177 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Balancing act

    Page(s): 65 - 66
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (177 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bringing in the dough

    Page(s): 66
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (166 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Watching those who watch us

    Page(s): 67 - 68
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (211 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dealing with headhunters

    Page(s): 69 - 71
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (219 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Filling the gaps

    Page(s): 80
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (193 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Checking the play in plug-and-play

    Page(s): 50 - 55
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (255 KB)  

    It's surprising to realize that buyers of intellectual property (IP) blocks used in system-on-chip (SOC) designs may not be entirely aware of what they're getting and how it works. But that's one reason why software for IC design verification is gaining attention: to ensure that those blocks will work as intended, both internally and with other components. Another reason is time to market. SOC providers could shorten their time to market considerably if they didn't have to spend up to 70 percent of it verifying that their designs will plug and play. SOCs are complex designs that fit most or all of the circuitry required for a cellphone, for instance, or a Bluetooth radio on a single IC. As their numbers and complexity increase, the design verification gap is widening. But help is at hand in a new type of design verification called assertions-based verification, although a looming standards battle threatens to slow its widespread adoption. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Not just blue sky [Herbert Kroemer]

    Page(s): 32 - 37
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (699 KB)  

    From high-speed transistor to sold-state lasers, IEEE Medal of Honor recipient Herbert Kroemer's theories have led to a wealth of semiconductor applications. His theory of heterostructures did not immediately have practical use, but it is at the root of today's CD and DVD players, cellphones and even laser pointers. For his work on heterostructures, he was awarded the Nobel Prize for Physics in 2000. The article outlines Kroemer's career and gives a brief description of semiconductor heterostructures. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hands off telecom: give deregulation a chance

    Page(s): 10 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (230 KB)  

    The US congress and the Federal Communications Commission (FCC) should stop micromanaging so the industry, in time, can shake out, wake up, and begin growing again. The US telecommunications industry has been in critical condition for more than a year; some claim that even its industry leaders are at death's door. Almost one-third of a million people in the industry have lost their jobs in one year, and dozens of leading firms have filed for bankruptcy protection. Is it time for government to step in? Absolutely not! The US congress and the US FCC should stop thinking they can facilitate competition. Industry should be allowed to take care of itself. Maintain a hands-off policy and the benefits of deregulation-competition in the local loop, lower prices, better services, increased demand, and more will materialize, and the industry will become healthy once again. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Betting on a new idea [organic LEDs]

    Page(s): 63 - 64
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (219 KB)  

    The author discusses how a model collaboration between Universal Display Corp. and Princeton University is taking cutting-edge organic LEDs from lab to market. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New life for Nixies [in digital clocks]

    Page(s): 44 - 49
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1044 KB)  

    Novel digital clocks get their glamour from the Nixie tube, the mother of electronic numerical displays. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nuclear incident could prompt more costly inspections [power plants]

    Page(s): 21 - 22
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (308 KB)  

    On 7 May 2002, the U.S. Nuclear Regulatory Commission (NRC, Rockville, Md.) formally heard the operator of an Ohio reactor report on the causes of a situation that could very nearly have led to a serious loss-of-coolant accident. The situation is now fairly well understood and can be considered isolated, but questions remain as to whether nuclear surveillance both by the NRC and plant operators is as rigorous as it needs to be. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Third-generation wireless must wait for services to catch up

    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (209 KB)  

    3G is all about new services and content to keep the wireless party going. Like cable TV companies of yore, cellular operators today are awaiting the arrival of smashing new content to generate new streams of revenue as they build a new and expensive third-generation global network. Coming in two flavors (cdma2000 and UMTS/WCDMA), 3G technologies serve largely to protect the investment of their second-generation predecessors: IS-95, and GSM/IS-136, respectively. The amazing success of 2G digital cellular is proof that there is nothing wrong with today's networks. So, why build new ones? Basically, so that operators' efforts to find new sources of revenue will not be limited by market saturation. Cable TV experience proves that subscribers care little about networks and technologies; they just want new stuff. Like cable network providers before them, wireless network providers will not have to create the new services themselves. Rather, they will have to give the content providers virtual control over the network's bandwidth, allowing them to use what they need. What both content providers and network operators must ensure is that the right amount of bandwidth is assigned to bits according to the value perceived by subscribers. It will be up to the content providers to make the bits more valuable than ever before. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless broadband in a box

    Page(s): 38 - 43
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (766 KB)  

    Despite all the talk about broadband, only about 7%, or 7.5 million, of US households subscribed to high-speed Internet access services as of last June, according to a February report issued by the US Federal Communications Commission (FCC). The situation is not much different elsewhere; only a few countries with much smaller populations report somewhat higher percentages. Lack of need is, one reason for the unimpressive numbers. Another reason is difficulty in getting service. For a variety of reasons, many would-be subscribers have been unable to get cable or digital subscriber line (DSL) service. For them, a fairly new type of technology known as non-line-of-sight (NLOS) wireless may be just what they need. NLOS wireless systems offer high-speed Internet access over several kilometers without directional antennas. When wireless routers are mounted on a subscribers' building, they can configure themselves into a mesh network. Mesh networks solve the problem of connecting widely separated wireless routers that cannot see each other by using many intermediate points, each of which can be seen by its neighbors. The article looks at the potential of this technology. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Spectrum Magazine, the flagship publication of the IEEE, explores the development, applications and implications of new technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Susan Hassler
IEEE Spectrum Magazine