Communications Engineer
Volume 5, Issue 3, June 2007
Volume 5, Issue 3
June 2007
-
- Source: Communications Engineer, Volume 5, Issue 3, page: 2 –2
- DOI: 10.1049/ce:20070311
- Type: Article
- + Show details - Hide details
-
p.
2
(1)
- Source: Communications Engineer, Volume 5, Issue 3, page: 2 –2
- DOI: 10.1049/ce:20070312
- Type: Article
- + Show details - Hide details
-
p.
2
(1)
(10 pages) - Author(s): J. Mitchener
- Source: Communications Engineer, Volume 5, Issue 3, page: 13 –13
- DOI: 10.1049/ce:20070313
- Type: Article
- + Show details - Hide details
-
p.
13
(1)
In the first of a new column investigating communications devices and the technology behind them, Jonathan Mitchener takes a look back with affection at the original telephone. - Source: Communications Engineer, Volume 5, Issue 3, p. 14 –19
- DOI: 10.1049/ce:20070301
- Type: Article
- + Show details - Hide details
-
p.
14
–19
(6)
In its most basic sense, net neutrality advocates warn that the principle of unfettered access to IP-based content, which has allowed the Internet to become the cosmopolitan, egalitarian, champion of freedom-of-expression, destroyer of geographic/economic barriers, and revolutionary technology that it is today, is now under threat. From whom? From the large telecom carriers that own and operate the core of the Internet, they argue. What net neutrality advocates would ultimately like to see is the US Congress to introduce legislation that would prevent carriers from interfering with the data that runs through their pipes. - Source: Communications Engineer, Volume 5, Issue 3, p. 20 –23
- DOI: 10.1049/ce:20070302
- Type: Article
- + Show details - Hide details
-
p.
20
–23
(4)
The Internet is now firmly part of our everyday life. We perform many common tasks online, such as banking, grocery and gift shopping and purchasing travel or cinema tickets. Plus we get a growing portion of our entertainment from online sources: entertainment and social networking. If we are to continue doing more online, our need for bandwidth will increase. It might be very convenient if future Internet access were wireless. Benchmarking against upcoming wireless standards showed these were biased towards small screen mobile content delivery, i.e. they are not attempting to address the challenge of the Broadband 2.0 requirements for delivery of HD services to the home. - Source: Communications Engineer, Volume 5, Issue 3, p. 24 –29
- DOI: 10.1049/ce:20070303
- Type: Article
- + Show details - Hide details
-
p.
24
–29
(6)
The World Wide Web has been as influential in the exponential growth of content as the invention of the printing press. The Web is, after all, essentially a (digital) publishing tool. And like the printing press, the Web is a disruptive technology. Web technology, spanning the protocols that govern distribution, the languages that facilitate publication and the applications that process, link and display content, is shaping social, academic and commercial communications - and having a profound affect on enterprise technology use. The more communications are conducted based on Web technology, the more complexity is introduced to enterprise IT infrastructures. The Web's significance can be judged by its volume alone. Analyst firm IDC recently published research that found 161 exabytes (billion gigabytes) of new digital information was created last year alone: that is 12 stacks of books, each extending more than 93 million miles from the earth to the sun. IDC predicts a six-fold annual increase in information created through media and data such as video, work files, emails and instant messages between 2006 and 2010, surging more than six-fold to 988 exabytes and creating a compound annual growth rate of 57 per cent by the end of this period. A report sponsored by storage vendor EMC found that, although individuals will generate nearly 70 per cent of this digital content, organisations will be responsible for the security, privacy, reliability and compliance of at least 85 per cent of the data. Given this startling statistic, the work of Web researchers, developers and academics should be seen in the context of facilitating a move to the next generation of communication technology at an organisational level. - Author(s): J. Franzke
- Source: Communications Engineer, Volume 5, Issue 3, p. 30 –35
- DOI: 10.1049/ce:20070304
- Type: Article
- + Show details - Hide details
-
p.
30
–35
(6)
Carriers around the world are grappling with the double-headed problem of offering high bandwidth triple play services of voice, data and video against the backdrop of replacing their local loop copper cabling and the ultimate aim of replacing it with optical fibre for FTTH (fibre-to-the-home). - Author(s): C. MacLeod
- Source: Communications Engineer, Volume 5, Issue 3, p. 36 –37
- DOI: 10.1049/ce:20070305
- Type: Article
- + Show details - Hide details
-
p.
36
–37
(2)
Today's biggest security menace is IT itself. There are particular problems with privileged passwords. - Author(s): C. Forrester
- Source: Communications Engineer, Volume 5, Issue 3, page: 38 –38
- DOI: 10.1049/ce:20070306
- Type: Article
- + Show details - Hide details
-
p.
38
(1)
A fierce fight is developing in the UK over what should happen to the spectrum freed up by the switching off of analogue television. - Author(s): C. Bissell
- Source: Communications Engineer, Volume 5, Issue 3, page: 39 –39
- DOI: 10.1049/ce:20070307
- Type: Article
- + Show details - Hide details
-
p.
39
(1)
This paper discusses the fundamental theory of communications, which owes a debt to a paper first published in Stalinist Russia. Kotelnikov's paper, published in the USSR in 1933 was the first to address the problem of sampling a continuous, bandlimited signal in an engineering context. - Source: Communications Engineer, Volume 5, Issue 3, page: 40 –40
- DOI: 10.1049/ce:20070308
- Type: Article
- + Show details - Hide details
-
p.
40
(1)
Without the Heath Robinson codebreaking machine, British intelligence may never have gone on to crack the codes of German cipher machines during the Second World War. The machine was developed jointly by the General Post Office Research Station at Dollis Hill and the Telecommunications Research Establishment (TRE), and was used to decode the messages sent by the German Lorenz SZ40/42 machines, which were used by the Germans for strategic and higher tactical information which was too important for the less secure Enigma machines. Due to its appearance the machine was named Heath Robinson after the cartoonist and illustrator William Heath Robinson, famed for his humorous drawings of absurd mechanical devices. Despite its humorous name, the Heath Robinson machine played a vital role in the history of cryptoanalysis. - Source: Communications Engineer, Volume 5, Issue 3, p. 42 –43
- DOI: 10.1049/ce:20070314
- Type: Article
- + Show details - Hide details
-
p.
42
–43
(2)
Our grab of the hottest new gadgets from around the world. - Source: Communications Engineer, Volume 5, Issue 3, page: 44 –44
- DOI: 10.1049/ce:20070315
- Type: Article
- + Show details - Hide details
-
p.
44
(1)
Our regular round-up of the latest advances in chip technology. - Source: Communications Engineer, Volume 5, Issue 3, page: 45 –45
- DOI: 10.1049/ce:20070316
- Type: Article
- + Show details - Hide details
-
p.
45
(1)
- Author(s): I. Poole
- Source: Communications Engineer, Volume 5, Issue 3, p. 46 –47
- DOI: 10.1049/ce:20070309
- Type: Article
- + Show details - Hide details
-
p.
46
–47
(2)
New wireless and cellular technologies seem to be appearing very regularly. One that will have a major impact is LTE or long term evolution which maps out the evolution for the next phase of cellular phone technology beyond the current UMTS 3G services. - Author(s): D. Sandham
- Source: Communications Engineer, Volume 5, Issue 3, page: 48 –48
- DOI: 10.1049/ce:20070310
- Type: Article
- + Show details - Hide details
-
p.
48
(1)
In June 2001 Pond Venture Partners invested in picoChip - an A round investment in conjunction with Atlas Ventures. The company then grew to 35 people by the end of the year on the back of that funding. Today picoChip has blue-chip customers including Intel, Nortel and Korea Telecom. Now that picoChip is more established. Pond is less involved in the day-to-day running of the company although it still has partners on the board. Pond's approach to picoChip, in its early stages, was exceptionally hands on, which was what was needed at the time. A less hands-on approach is more usual.
Editorial
News
If you ask me
Couldn't care net [Internet neutrality]
Broadband 2.0 [Internet Access]
A web that understands you
The costs of devolution [fiber to the home]
The enemy within
Who gets the spectrum? [broadcasting regulation]
The sampling theorem
Heath Robinson [codebreaking machine]
Gadgets
Hot from the oven
New books
What exactly is LTE? [cellular phone technology]
Venture capital
Most viewed content for this Journal
Article
content/journals/ce
Journal
5
Most cited content for this Journal
We currently have no most cited data available for this content.