scispace - formally typeset
Search or ask a question
Topic

Personal computer

About: Personal computer is a research topic. Over the lifetime, 58809 publications have been published within this topic receiving 800814 citations. The topic is also known as: PC.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, the authors show how Dell's strategies of direct sales and build-to-order production have proven successful in minimizing inventory and bringing new products to market quickly, enabling it to increase market share and achieve high returns on investment.
Abstract: The exceptional performance of Dell Computer in recent years illustrates an innovative response to a fundamental competitive factor in the personal computer industry - the value of time. This article shows how Dell's strategies of direct sales and build-to-order production have proven successful in minimizing inventory and bringing new products to market quickly, enabling it to increase market share and achieve high returns on investment. The Dell case illustrates how one business model may have inherent advantages under particular market conditions, but it also shows the importance of execution in exploiting those advantages. In particular, Dell's use of information technology (IT) has been vital to executing both elements of its business model - direct sales and build-to-order - and provides valuable insights into how IT can be applied to achieve speed and flexibility in an industry in which time is critical. Many of the insights gained from this case can be applied more generally to other time-dependen...

172 citations

Book ChapterDOI
13 Apr 1987
TL;DR: The FEAL (Fast data Encipherment ALgorihtm) fills the need for an encipherment algorithm that has safety equal to DES and is suitable for software as well as hardware implementation.
Abstract: In data communications and information processing systems, cryptography is the most effective way to secure communications and store data. The most commonly used cryptogryphic algorithm is DES (1). However, it is generally implemented with hardware, and the cost is prohibitive for small scale systems such as personal computer communications. Accordingly, an encipherment algorithm that has safety equal to DES and is suitable for software as well as hardware implementation is needed. The FEAL (Fast data Encipherment ALgorihtm) fills this need.

171 citations

Book
01 Jan 2000
TL;DR: Gilder's Telecosm as discussed by the authors is one of the best-known books on the telecosm and it is the one book that can be used to make sense of the titanic changes underway in our lives.
Abstract: The computer age is over. After a cataclysmic global run of thirty years, it has given birth to the age of the telecosm -- the world enabled and defined by new communications technology. Chips and software will continue to make great contributions to our lives, but the action is elsewhere. To seek the key to great wealth and to understand the bewildering ways that high tech is restructuring our lives, look not to chip speed but to communication power, or bandwidth. Bandwidth is exploding, and its abundance is the most important social and economic fact of our time. George Gilder is one of the great technological visionaries, and the man who put the 's' in 'telecosm' (Telephony magazine). He is equally famous for understanding and predicting the nuts and bolts of complex technologies, and for putting it all together in a soaring view of why things change, and what it means for our daily lives. His track record of futurist predictions is one of the best, often proving to be right even when initially opposed by mighty corporations and governments. He foresaw the power of fiber and wireless optics, the decline of the telephone regime, and the explosion of handheld computers, among many trends. His list of favored companies outpaced even the soaring Nasdaq in 1999 by more than double. His long-awaited Telecosm is a bible of the new age of communications. Equal parts science story, business history, social analysis, and prediction, it is the one book you need to make sense of the titanic changes underway in our lives. Whether you surf the net constantly or not at all, whether you live on your cell phone or hate it for its invasion of private life, you need this book. Ithas been less than two decades since the introduction of the IBM personal computer, and yet the enormous changes wrought in our lives by the computer will pale beside the changes of the telecosm. Gilder explains why computers will empty out, with their components migrating to the net; why hundreds of low-flying satellites will enable hand-held computers and communicators to become ubiquitous; why television will die; why newspapers and magazines will revive; why advertising will become less obnoxious; and why companies will never be able to waste your time again. Along the way you will meet the movers and shakers who have made the telecosm possible. From Charles Townes and Gordon Gould, who invented the laser, to the story of JDS Uniphase, the Intel of the Telecosm, to the birthing of fiberless optics pioneer TeraBeam, here are the inventors and entrepreneurs who will be hailed as the next Edison or Gates. From hardware to software to chips to storage, here are the technologies that will soon be as basic as the air we breathe.

171 citations

Journal ArticleDOI
TL;DR: In this paper, a short circuit on a 345-kV line in Wyoming, USA, started a chain of events leading to a breakup of the Western North American power system and five islands formed with controlled and uncontrolled load shedding, uncontrolled generation tripping, and with a blackout in Southern Idaho.
Abstract: On July 2, 1996, a short circuit on a 345-kV line in Wyoming, USA, started a chain of events leading to a breakup of the Western North American power system. Five islands formed with controlled and uncontrolled load shedding, uncontrolled generation tripping, and with a blackout in Southern Idaho. The Western power system is operated by power companies belonging to the Western Systems Coordinating Council, which had a peak 1996 summer load of around 118,000 MW. July 2 was the third and, until the August 10 large-scale power failure, the most disruptive of a series of Western system breakups. The first was caused by the January 17, 1994, Northridge California earthquake. The second breakup occurred in the early morning hours of December 14, 1994, and, like July 2, originated in Southern Idaho and Wyoming. Modern computer and communication technologies greatly facilitated dissemination of information, analysis, report writing and event simulation for the July 2 cascading outage. This article analyzes the breakup, relying heavily on recordings from portable power system monitors which are installed at key locations and serve as primary components of a wide-area measurement system project.

171 citations

Proceedings ArticleDOI
12 May 2002
TL;DR: Experiments show that enough high-frequency content remains in the emitted light to permit the reconstruction of readable text by deconvolving the signal received with a fast photosensor, and that optical compromising emanations can be received even after diffuse reflection from a wall.
Abstract: A new eavesdropping technique can be used to read cathode-ray tube (CRT) displays at a distance. The intensity of the light emitted by a raster-scan screen as a function of time corresponds to the video signal convolved with the impulse response of the phosphors. Experiments with a typical personal computer color monitor show that enough high-frequency content remains in the emitted light to permit the reconstruction of readable text by deconvolving the signal received with a fast photosensor These optical compromising emanations can be received even after diffuse reflection from a wall. Shot noise from background light is the critical performance factor In a sufficiently dark environment and with a large enough sensor aperture, practically significant reception distances are possible. This information security risk should be considered in applications with high confidentiality requirements, especially in those that already require "TEMPEST"-shielded equipment designed to minimize radio-frequency emission-security concerns.

170 citations


Network Information
Related Topics (5)
Software
130.5K papers, 2M citations
86% related
Image processing
229.9K papers, 3.5M citations
79% related
Information system
107.5K papers, 1.8M citations
79% related
The Internet
213.2K papers, 3.8M citations
78% related
User interface
85.4K papers, 1.7M citations
77% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202310
202227
2021418
2020954
20191,407
20181,342