Volume 16 Issue 7 • July 1979

Filter Results

Displaying Results 1 - 25 of 33
  • [Advertisement]

    Publication Year: 1979, Page(s):1 - 2
    Request permission for reuse | PDF file iconPDF (2420 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 1979, Page(s): 1
    Request permission for reuse | PDF file iconPDF (198 KB)
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 1979, Page(s):2 - 5
    Request permission for reuse | PDF file iconPDF (852 KB)
    Freely Available from IEEE
  • Calendar

    Publication Year: 1979, Page(s):6 - 7
    Request permission for reuse | PDF file iconPDF (572 KB)
    Freely Available from IEEE
  • Forum

    Publication Year: 1979, Page(s): 8
    Request permission for reuse | PDF file iconPDF (279 KB)
    Freely Available from IEEE
  • News from Washington

    Publication Year: 1979, Page(s): 9
    Request permission for reuse | PDF file iconPDF (169 KB)
    Freely Available from IEEE
  • Energy report

    Publication Year: 1979, Page(s):10 - 13
    Request permission for reuse | PDF file iconPDF (1536 KB)
    Freely Available from IEEE
  • The engineer at large

    Publication Year: 1979, Page(s):14 - 15
    Request permission for reuse | PDF file iconPDF (708 KB)
    Freely Available from IEEE
  • Best bits: Applications of microprocessors

    Publication Year: 1979, Page(s):16 - 17
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1036 KB)

    Varying the speed of large industrial motors that drive pumps and compressors is basically a mechanical operation performed with valves and dampers that suppress the speed of the motor at its output. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scanning the Institute

    Publication Year: 1979, Page(s): 18
    Request permission for reuse | PDF file iconPDF (265 KB)
    Freely Available from IEEE
  • Coming in Spectrum

    Publication Year: 1979, Page(s):18 - 20
    Request permission for reuse | PDF file iconPDF (1244 KB)
    Freely Available from IEEE
  • Spectral lines: Spectrum: A progress report

    Publication Year: 1979, Page(s): 21
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (213 KB)

    A few years ago the staff of Spectrum undertook a redesign of the magazine to make it more useful to its readers. In particular, we increased the number of articles, decreased their average length, went to great lengths to avoid obscure mathematical expressions and to convert other mathematics to words reflecting their physical equivalents, and labored over illustrations to an extent not previousl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solid state/computers: Demystifying microprocessor design: Big chips require artful compromises, as demonstrated by this design case history

    Publication Year: 1979, Page(s):22 - 30
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (2291 KB)

    Discusses the art of microprocessor design using the design of the Zilog Z8000 as an example of how it should be done. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Communications: On foiling computer crime: Can a thief with lots of LSI chips crack present data scrambling schemes? The experts debate the matter

    Publication Year: 1979, Page(s):31 - 32
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (444 KB)

    Three well-known cryptographers and two US Government agencies do battle on the question of whether the federally approved Data Encryption Standard (DES) will be secure against commercial data thefts for the next five or ten years. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • I. `des will be totally insecure within ten years'

    Publication Year: 1979, Page(s):32 - 40
    Cited by:  Papers (6)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1878 KB)

    Cryptography. The very name conjures up images of secrecy and spying, with project code names like "Magic" and "Lucifer." And indeed until fairly recently data encryption was a shrouded capability, used almost exclusively by military and diplomatic organizations. The computerization of information processing and transmission has changed this. In response to a growing commercial need, the National ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SB. Security Agency denies tampering with DES

    Publication Year: 1979, Page(s): 39
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (245 KB)

    Following is the National Security Agency's position on the debate over the Data Encryption Standard: View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • III. `Hellman's scheme breaks DES in its basic form'

    Publication Year: 1979, Page(s): 39
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (245 KB)

    The time-memory tradeoff scheme of Prof. Martin E. Hellman, for practical purposes, breaks DES in its present basic form. It should be pointed out, though, that a time-memory tradeoff can be used to break any block ciphers that have similar key lengths and can reduce deciphering time by a significant factor. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IV. `Hellman presents no shortcut solutions to the DES'

    Publication Year: 1979, Page(s):40 - 41
    Cited by:  Papers (11)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (487 KB)

    Prof. Martin Hellman presents no shortcut solutions to the Data Encryption Standard; the time-memory tradeoff is just one of many key-message exhaustion techniques. Therefore when he says, "DES is only marginally secure today and will be totally insecure within ten years," he is totally wrong. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • V. `Hellman's data does not support his conclusion'

    Publication Year: 1979, Page(s): 41
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (238 KB)

    Neither the information obtained by the National Bureau of Standards nor the discussions in Prof. Martin Hellman's paper support his conclusion that the Data Encryption Standard will likely be "totally insecure within ten years." View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aerospace: Planning Space Shuttle's maiden voyage: In a matter of months space-oriented experiments will soar aloft aboard the Columbia

    Publication Year: 1979, Page(s):42 - 48
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (2941 KB)

    Describes the United States Space Shuttle project. Topics include: the basic elements; getaway special-small payload programme for individual experiments; spacelab and upper stages; evolution and the growth of systems; projected cargo manifest for the first 35 Space Shuttle flights; Space Shuttle avionics. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Space Shuttle maiden

    Publication Year: 1979, Page(s):48 - 50
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (716 KB)

    Early design requirements for the Space Shuttle dictated a wingspan of 23.77 m, which reduced the aerodynamic stability of the 68 038.5-kg vehicle. To maintain stable flight in a vehicle that size, reactions to twisting, bending, flexing or other aerodynamic instabilities must be made in milliseconds-an impossible feat for humans. An all-digital electronic system was devised to compensate for the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power/energy: Solar Power Satellite ground stations: The ground systems for microwave beaming from the SPS would require a rectifying antenna with over 13 billion elements

    Publication Year: 1979, Page(s):51 - 55
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (998 KB)

    Discusses the ground systems required to accept microwave beams from a solar power satellite. It is estimated that a low gain rectifying antenna about 10 km in diameter consisting of 13 billion elements and having 7 billion rectifiers would be required. Topics include: rectenna; dipole assembly; panels; DC to AC convertor stations; rectenna costs estimated. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Electronics: Experts probe world outlook: Representatives of the world's nations review trends as the VLSI era approaches

    Publication Year: 1979, Page(s):56 - 59
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1128 KB)

    Reports on a forum on silicon semiconductor technology held in New York recently which reviewed world trends in the light of the era of VLSI which is now approaching. Representatives from Japan, Britain, West Germany, France, Holland, and China were present. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Management: Learning to live with red tape: It can tie up projects unduly, yet the organization man (or woman) can use it wisely

    Publication Year: 1979, Page(s):60 - 63
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1179 KB)

    Do you hate red tape? Do you consider it a point of honor to frustrate it, bypass it or simply ignore it? If you do, you have lots of company — and most of you are probably heading for a great fall. If you think, “I could run this organization better and without the red tape,“ read on. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New and recent IEEE publications

    Publication Year: 1979, Page(s):64 - 65
    Request permission for reuse | PDF file iconPDF (475 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Spectrum Magazine, the flagship publication of the IEEE, explores the development, applications and implications of new technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Susan Hassler
IEEE Spectrum Magazine