The February 2023 issue of IEEE Spectrum is here!

Close bar

You Tell Us 2006

Winner? Loser? For many projects, it’s hard to tell. But they’re well worth pondering, because they get to the heart of what makes technologies succeed or fail. We studied the seven projects described on the pages that follow but in the end couldn’t give them thumbs up or thumbs down. So: you tell us!

9 min read
Opening illustration for this feature article.
IEEE Spectrum

Write to us at spectrum@ieee.org.

Cisco and Yahoo’s Plan To Damn Spam

Back in the 1970s, when e-mail was invented, it seemed everyone online knew everyone else. You could almost count the number of servers on two hands, so trust came to be built into the very guts of the Internet. At the time this openness was very handy, but today it’s become one of the biggest problems for the network and its millions of computers. Two consequences: spammers inundate us with so many bogus missives that we end up overlooking or losing important messages daily, and customers are suspicious of e-mail from major companies and brands like PayPal, CitiBank, and Rolex.

Keep reading...Show less

This article is for IEEE members only. Join IEEE to access our full archive.

Join the world’s largest professional organization devoted to engineering and applied sciences and get access to all of Spectrum’s articles, podcasts, and special reports. Learn more →

If you're already an IEEE member, please sign in to continue reading.

Membership includes:

  • Get unlimited access to IEEE Spectrum content
  • Follow your favorite topics to create a personalized feed of IEEE Spectrum content
  • Save Spectrum articles to read later
  • Network with other technology professionals
  • Establish a professional profile
  • Create a group to share and collaborate on projects
  • Discover IEEE events and activities
  • Join and participate in discussions

IEEE Medal of Honor Goes to Vint Cerf

He codesigned the Internet protocol and transmission control protocol

2 min read
Photo of a man with a white beard in a dark suit.
The Royal Society

IEEE Life Fellow Vinton “Vint” Cerf, widely known as the “Father of the Internet,” is the recipient of the 2023 IEEE Medal of Honor. He is being recognized “for co-creating the Internet architecture and providing sustained leadership in its phenomenal growth in becoming society’s critical infrastructure.”

The IEEE Foundation sponsors the annual award.

Keep Reading ↓Show less

Learn How Global Configuration Management and IBM CLM Work Together

In this presentation we will build the case for component-based requirements management

2 min read

This is a sponsored article brought to you by 321 Gang.

To fully support Requirements Management (RM) best practices, a tool needs to support traceability, versioning, reuse, and Product Line Engineering (PLE). This is especially true when designing large complex systems or systems that follow standards and regulations. Most modern requirement tools do a decent job of capturing requirements and related metadata. Some tools also support rudimentary mechanisms for baselining and traceability capabilities (“linking” requirements). The earlier versions of IBM DOORS Next supported a rich configurable traceability and even a rudimentary form of reuse. DOORS Next became a complete solution for managing requirements a few years ago when IBM invented and implemented Global Configuration Management (GCM) as part of its Engineering Lifecycle Management (ELM, formerly known as Collaborative Lifecycle Management or simply CLM) suite of integrated tools. On the surface, it seems that GCM just provides versioning capability, but it is so much more than that. GCM arms product/system development organizations with support for advanced requirement reuse, traceability that supports versioning, release management and variant management. It is also possible to manage collections of related Application Lifecycle Management (ALM) and Systems Engineering artifacts in a single configuration.

Keep Reading ↓Show less