Final Version of Thesis

Total Page:16

File Type:pdf, Size:1020Kb

Final Version of Thesis JAPANESE INNOVATION STRATEGY AND THE ACQUISITION OF UK INFORMATION TECHNOLOGY FIRMS T H W Minshall Christ’s College, Cambridge A dissertation submitted to the University of Cambridge for the Degree of Doctor of Philosophy Cambridge University Engineering Department April 1997 Preface Except for commonly understood and accepted ideas, or where specific reference is made, the work reported in this dissertation is my own and includes nothing which is the outcome of work done in collaboration. No part of the dissertation has been previously submitted to any university for any degree, diploma or other qualification. T H W Minshall Cambridge April 1997 Acknowledgements I am particularly grateful to my supervisor, Elizabeth Garnsey, for her guidance and support throughout the course of this research. In addition, thanks are due to Nick Oliver and Hugh Whittaker, and all my colleagues at the Manufacturing and Management Division of the Engineering Department, and at the Judge Institute of Management Studies for their advice and constructive criticism. On the industry side, my gratitude to the companies in the UK and Japan who agreed to contribute to the contents of this dissertation. Finally, my thanks to my family, for encouraging me, and to Nicola, for all her support and for applying her new-found skills at proof-reading. This programme of research was supported by a Postgraduate Training Award (J00 429 332012) from the ESRC. Table of contents Chapter 1 Introduction ............................................................................................................ 1 Introduction to the research .................................................................................................................................. 1 Background........................................................................................................................................................... 3 Reported motives for the acquisitions .................................................................................................................. 9 Chapter 2 Convergence towards the ‘digital industry’ .......................................................... 15 Chapter overview................................................................................................................................................ 15 Changes in the computer industry ...................................................................................................................... 15 Convergence towards the ‘digital industry’........................................................................................................ 22 Alliances within the digital industry................................................................................................................... 38 Japanese firms within the digital industry .......................................................................................................... 44 Conclusions......................................................................................................................................................... 51 Chapter 3 Literature review .................................................................................................. 52 Chapter overview................................................................................................................................................ 52 Part I: Strategic Management ............................................................................................................................. 53 Part II: Management of Innovation..................................................................................................................... 64 Part III: Management of Acquisitions ................................................................................................................ 74 Conclusions......................................................................................................................................................... 84 Chapter 4 Conceptual approach........................................................................................... 86 Chapter overview................................................................................................................................................ 86 Introduction......................................................................................................................................................... 87 Competences and capabilities............................................................................................................................. 89 Building up competences and capabilities.......................................................................................................... 95 Components of an analytical framework.......................................................................................................... 102 Chapter 5 Research methodology ...................................................................................... 106 Chapter overview.............................................................................................................................................. 106 Methodology selection...................................................................................................................................... 106 Design of the case study ................................................................................................................................... 109 Sources of data.................................................................................................................................................. 113 Selection of case study firms ............................................................................................................................ 115 Data collection protocol.................................................................................................................................... 116 Validity, reliability and generalisability ........................................................................................................... 117 Compilation of data .......................................................................................................................................... 118 Chapter 6 Case Study A: Fujitsu-ICL.................................................................................. 120 Chapter overview.............................................................................................................................................. 120 Fujitsu ............................................................................................................................................................... 121 ICL.................................................................................................................................................................... 127 Acquisition........................................................................................................................................................ 133 Motives for the acquisition ............................................................................................................................... 135 Post acquisition................................................................................................................................................. 137 Closing comments............................................................................................................................................. 153 Chapter 7 Case Study B: MELCO-Apricot.......................................................................... 156 Chapter overview.............................................................................................................................................. 156 MELCO ............................................................................................................................................................ 157 Apricot .............................................................................................................................................................. 164 Acquisition........................................................................................................................................................ 168 Motives for the Acquisition .............................................................................................................................. 168 Post-acquisition................................................................................................................................................. 169 Closing comments............................................................................................................................................. 184 Chapter 8 Case Study C: Kao-Protoscan .......................................................................... 186 Chapter overview.............................................................................................................................................. 186 Kao Corporation ............................................................................................................................................... 187 Protoscan Software Services Limited............................................................................................................... 198 Acquisition.......................................................................................................................................................
Recommended publications
  • ADMINISTRATION GUIDE Version 7.2
    GUIDE STORMSHIELD ENDPOINT SECURITY ADMINISTRATION GUIDE Version 7.2 Document last update: June 2, 2021 Reference: ses-en-administration_guide-v7.2 SES - ADMINISTRATION GUIDE - V 7.2 Table of contents Preface 9 Thanks! 9 What is the target audience? 9 Contact 9 1. Use environment 10 1.1 Recommendations on security watch 10 1.2 Recommendations on keys and certificates 10 1.3 Recommendations on algorithms 10 1.4 Recommendations on administrators 10 1.5 Recommendations on workstations 10 1.6 Recommendations on administration workstations 11 1.7 Certification and qualification environment 11 2. Stormshield Endpoint Security Overview 12 2.1 Concepts 12 2.1.1 Concept 1: Integrated security 12 2.1.2 Concept 2: Proactive protection 12 2.1.3 Concept 3: Adaptive control 13 2.1.4 Concept 4: Flexible policy control 13 2.1.5 Concept 5: Application of policies based on the organization's directory 13 2.1.6 Concept 6: Information feedback 13 2.1.7 Concept 7: Data encryption 13 2.2 Protection mechanisms 13 2.2.1 Rule-based protection 14 2.2.2 Automatic protections 14 2.3 Architecture 15 2.3.1 Concepts 15 2.3.2 Stormshield Endpoint Security components 15 2.4 Packages and licenses 18 2.4.1 Packages 18 2.4.2 Licenses 21 3. Stormshield Endpoint Security Installation and Uninstallation 24 3.1 Downloading the Stormshield Endpoint Security software 24 3.1.1 Downloading from the client area 24 3.1.2 Checking software authenticity 24 3.2 System prerequisites for Stormshield Endpoint Security under Windows 25 3.2.1 Active Directory prerequisites 25 3.2.2 Stormshield
    [Show full text]
  • Network Working Group J. Reynolds Request for Comments: 1700 J
    Network Working Group J. Reynolds Request for Comments: 1700 J. Postel STD: 2 ISI Obsoletes RFCs: 1340, 1060, 1010, 990, 960, October 1994 943, 923, 900, 870, 820, 790, 776, 770, 762, 758,755, 750, 739, 604, 503, 433, 349 Obsoletes IENs: 127, 117, 93 Category: Standards Track ASSIGNED NUMBERS Status of this Memo This memo is a status report on the parameters (i.e., numbers and keywords) used in protocols in the Internet community. Distribution of this memo is unlimited. OVERVIEW This RFC is a snapshot of the ongoing process of the assignment of protocol parameters for the Internet protocol suite. To make the current information readily available the assignments are kept up-to- date in a set of online text files. This RFC has been assembled by catinating these files together with a minimum of formatting "glue". The authors appologize for the somewhat rougher formatting and style than is typical of most RFCs. We expect that various readers will notice specific items that should be corrected. Please send any specific corrections via email to <[email protected]>. Reynolds & Postel [Page 1] RFC 1700 Assigned Numbers October 1994 INTRODUCTION The files in this directory document the currently assigned values for several series of numbers used in network protocol implementations. ftp://ftp.isi.edu/in-notes/iana/assignments The Internet Assigned Numbers Authority (IANA) is the central coordinator for the assignment of unique parameter values for Internet protocols. The IANA is chartered by the Internet Society (ISOC) and the Federal Network Council (FNC) to act as the clearinghouse to assign and coordinate the use of numerous Internet protocol parameters.
    [Show full text]
  • Network Working Group J. Reynolds Request for Comments: 1700 J
    Network Working Group J. Reynolds Request for Comments: 1700 J. Postel STD: 2 ISI Obsoletes RFCs: 1340, 1060, 1010, 990, 960, October 1994 943, 923, 900, 870, 820, 790, 776, 770, 762, 758,755, 750, 739, 604, 503, 433, 349 Obsoletes IENs: 127, 117, 93 Category: Standards Track ASSIGNED NUMBERS Status of this Memo This memo is a status report on the parameters (i.e., numbers and keywords) used in protocols in the Internet community. Distribution of this memo is unlimited. OVERVIEW This RFC is a snapshot of the ongoing process of the assignment of protocol parameters for the Internet protocol suite. To make the current information readily available the assignments are kept up-to- date in a set of online text files. This RFC has been assembled by catinating these files together with a minimum of formatting "glue". The authors appologize for the somewhat rougher formatting and style than is typical of most RFCs. We expect that various readers will notice specific items that should be corrected. Please send any specific corrections via email to . Reynolds & Postel [Page 1] RFC 1700 Assigned Numbers October 1994 INTRODUCTION The files in this directory document the currently assigned values for several series of numbers used in network protocol implementations. ftp://ftp.isi.edu/in-notes/iana/assignments The Internet Assigned Numbers Authority (IANA) is the central coordinator for the assignment of unique parameter values for Internet protocols. The IANA is chartered by the Internet Society (ISOC) and the Federal Network Council (FNC) to act as the clearinghouse to assign and coordinate the use of numerous Internet protocol parameters.
    [Show full text]
  • Xerox Corporation 00-00-02
    00-00-00 (hex) XEROX CORPORATION 00-00-01 (hex) XEROX CORPORATION 00-00-02 (hex) XEROX CORPORATION 00-00-03 (hex) XEROX CORPORATION 00-00-04 (hex) XEROX CORPORATION 00-00-05 (hex) XEROX CORPORATION 00-00-06 (hex) XEROX CORPORATION 00-00-07 (hex) XEROX CORPORATION 00-00-08 (hex) XEROX CORPORATION 00-00-09 (hex) XEROX CORPORATION 00-00-0A (hex) OMRON TATEISI ELECTRONICS CO. 00-00-0B (hex) MATRIX CORPORATION 00-00-0C (hex) CISCO SYSTEMS, INC. 00-00-0D (hex) FIBRONICS LTD. 00-00-0E (hex) FUJITSU LIMITED 00-00-0F (hex) NEXT, INC. 00-00-10 (hex) SYTEK INC. 00-00-11 (hex) NORMEREL SYSTEMES 00-00-12 (hex) INFORMATION TECHNOLOGY LIMITED 00-00-13 (hex) CAMEX 00-00-14 (hex) NETRONIX 00-00-15 (hex) DATAPOINT CORPORATION 00-00-16 (hex) DU PONT PIXEL SYSTEMS . 00-00-17 (hex) TEKELEC 00-00-18 (hex) WEBSTER COMPUTER CORPORATION 00-00-19 (hex) APPLIED DYNAMICS INTERNATIONAL 00-00-1A (hex) ADVANCED MICRO DEVICES 00-00-1B (hex) NOVELL INC. 00-00-1C (hex) BELL TECHNOLOGIES 00-00-1D (hex) CABLETRON SYSTEMS, INC. 00-00-1E (hex) TELSIST INDUSTRIA ELECTRONICA 00-00-1F (hex) Telco Systems, Inc. 00-00-20 (hex) DATAINDUSTRIER DIAB AB 00-00-21 (hex) SUREMAN COMP. & COMMUN. CORP. 00-00-22 (hex) VISUAL TECHNOLOGY INC. 00-00-23 (hex) ABB INDUSTRIAL SYSTEMS AB 00-00-24 (hex) CONNECT AS 00-00-25 (hex) RAMTEK CORP. 00-00-26 (hex) SHA-KEN CO., LTD. 00-00-27 (hex) JAPAN RADIO COMPANY 00-00-28 (hex) PRODIGY SYSTEMS CORPORATION 00-00-29 (hex) IMC NETWORKS CORP.
    [Show full text]
  • Practical-Computing
    AUGUST 1987 Volume 10 Issue 8 £1 .50 PRACTICAL COMPUTING FOR BUSINESS AND PROFESSIONAL MICRO USERS LASERS TAKE OVER HARDWARE Apricot Xen-i 386 Mac II SOFTWARE Harvard Professional Publisher FEATURES The superconducting micro PLUS How healthy is Ashton-Tate? The secret of Borland's success is "Quality, Speed, Power, & Price" We'reone of the biggest software Sidekick° Turbo Lightning* companies in the world-and we Instant Desktop Management! Solves All Your Spelling Problems! Powerful desktop management program and the While you use SideKick, Reflex, Lotus 1-2-3,6 and got that way by making "Quality, #1 best seller for the IBM PC. SideKick includes most popular programs, Turbo Lightning proofreads Speed, Power, & Price" essential notepad, calendar, calculator, appointment scheduler, as you write! If you misspell a word, Turbo Lightning telephone directory, autodialer, and ASCII table. It's will beep at you instantly, and suggest a correction for characteristics of every Borland RAM-resident-which means SideKick is always there the word you just misspelled. Press one key, and the software program. Look for ready to react when you need to do something, call misspelled word is immediately replaced by the someone, or find out something in a hurry. And it correct word. And if you're ever stuck for a word, Borland software-then look does all this while you run other programs. Minimum Turbo Lightning's thesaurus is there with instant no further. memory: 128K. alternatives. Minimum memory: 256K. Traveling Sidekick" Lightning Word Wizard" It's the electronic organizer for this electronic age. Technical Reference Manual For Neither you nor your secretary need to face 1987 Turbo Lightning! with old-fashioned 1887 diaries.
    [Show full text]
  • Ethernet Tables
    Network Troubleshooting by Othmar Kyas E Ethernet Tables An Agilent Technologies Publication Agilent Technologies Ethernet Tables E E.1 Ethernet IEEE 802.3 Ethertype Field Coding The most recent listing of IEEE 802.3 Ethertype field codes is available under http://standards.ieee.org/regauth/ethertype/type-pub.html Ethertype Description Ethertype Description value (Hex) value (Hex) 0000-05DC I EEE802.3 Length Field 8019 Apollo Computers 0101-01FF Xerox (Experimental) Chelmsford, MA Webster, NY 802E Tymshare 0200 XEROX PUP Cupertino, CA Webster, NY 802F Tigan, Inc. 0201 Xerox PUP Addr Trans Palo Alto, CA Webster, NY 8035 Stanford University 0400 Nixdorf Stanford, CA Paderborn West Germany 8036 Aeonic Systems 0600 XEROX NS IDP Billerica, MA Webster, NY 8044 Planning Research Corp 0660 - 0661 DLOG 8046 - 8047 AT & T Olching Germany Naperville, IL 0800 - 0803 Xerox 8049 ExperData Webster, NY Boulogne, France 0804 Symbolics Research 805B - 805C Stanford University Cambridge, MA Stanford, CA 0805 Xerox 805DEvans & Sutherland Webster, NY Salt Lake City, UT 0806 Symbolics, Inc. 8060 Little Machines Cambridge, MA San Diego, CA 0807 Xerox 8062 Counterpoint Computers Webster, NY San Jose, CA 0808 Xerox (Frame Relay ARP) 8065 - 8066 University of Mass. at Amherst Webster,NY Amherst, MA 0844 Planning Research Corp. 8067 Veeco Integrated Automation Bellevue, NE Dallas, TX 0888 - 088A Xyplex 8068 General Dynamics Concord, MA Fort Worth, TX 0A00 Xerox IEEE802.3 PUP 8069 AT & T Webster, NY Naperville, IL 0A01 Xerox 806A Autophon Webster, NY Solothurn Switzerland
    [Show full text]
  • ISA PNP and ACPI ID List
    Last updated: August 25, 2015 Company PNPid Approved on Date 21ST CENTURY ENTERTAINMENT BUT 04/25/02 2-Tel B.V. TTL 03/20/99 3Com Corporation TCM 11/29/96 3D Perception TDP 05/16/02 3M VSD 10/16/98 3NOD Digital Technology Co. Ltd. NOD 12/11/14 A D S Exports NGS 07/16/98 A Plus Info Corporation API 11/29/96 A&R Cambridge Ltd ACG 06/13/07 A/Vaux Electronics AVX 08/29/12 A+V Link APV 01/27/10 Aashima Technology B.V. TRU 05/08/98 Aava Mobile Oy AAM 08/13/13 ABBAHOME INC. ABA 11/08/99 Abeam Tech Ltd MEG 11/29/96 Ably-Tech Corporation ATC 11/29/96 AboCom System Inc ABC 03/28/97 ACC Microelectronics WTC 11/29/96 Access Works Comm Inc AWC 11/29/96 Acco UK ltd. PKA 05/12/03 Accton Technology Corporation ACC 11/29/96 Acculogic ACU 11/29/96 AccuScene Corporation Ltd ASL 06/13/07 Ace CAD Enterprise Company Ltd ANT 11/29/96 Acer Inc CHE 11/29/96 Acer Labs ALI 11/29/96 Acer Netxus Inc ANX 11/29/96 Acer Technologies ACR 11/29/96 Acksys ACK 11/29/96 Acnhor Datacomm ADC 11/29/96 Acon CAL 11/29/96 Acrolink Inc ALK 03/12/97 Acroloop Motion Control Systems Inc ACM 03/26/98 ACT Labs Ltd LAB 09/02/97 Actek Engineering Pty Ltd ACE 11/29/96 Actiontec Electric Inc AEI 11/29/96 ActivCard S.A ACV 05/08/98 Aculab Ltd ACB 11/29/96 Acutec Ltd.
    [Show full text]
  • Celebrating 30 Years of Microscope
    December 2012 MicroScope Indispensable channel analysis microscope.co.uk CELEBRATING 30 YEARS OF MICROSCOPE TO KICK OFF OUR ANNIVERSARY YEAR, WE INVITE INDUSTRY FIGURES TO SHARE THEIR THOUGHTS ON WHAT THEY CONSIDER TO BE THE MOST SIGNIFICANT DEVELOPMENTS IN THE CHANNEL OVER THE PAST THREE DECADES AND TAKE A LOOK AT THE MOST IMPORTANT TECHNOLOGICAL ADVANCES DURING THAT TIME IAN NIXON/ISTOCKPHOTO ◆ THE MONTH IN IT ◆ OPINION ◆ LEttERS ◆ FIVE-MINUTE INTERVIEW ◆ the month in the channel Cisco merges cloud and managed SMEs reluctant to boost staff services reseller programmes More Comet stores face closure numbers, research finds Cisco has merged its Cloud Provider SME budgets might be recovering, and Cloud Services Reseller roles as potential buyers weigh in but small and medium-sized busi- with its Managed Services Channel nesses remain cautious when it Programme to form a single Cloud Comet's administrators are preparing to close a further 125 shops over the comes to investing in fresh staff to and Managed Services Programme next few weeks unless a buyer emerges quickly. help drive the business forward. An (CMSP) in a nod to the extensive Deloitte, which was appointed administrator last month, has already cut insight from Spiceworks into the sec- synergies that exist between the two more than 1,000 jobs and closed 41 stores in a bid to reduce costs. tor, described by many as the engine areas. Richard Roberts, Cisco UK But no firm offers have emerged, despite reports of several potential room of the economy, shows that and Ireland partner organisation buyers, including business turnaround expert Clive Coombes and e-tail caution remains despite signs that lead, said the move was an acknowl- specialist DRL.
    [Show full text]
  • The Use of Technology in Adult Literacy Programs. SPONS AGENCY Australian Dept
    DOCUMENT RESUME ED 319 930 CE 054 878 AUTHOR Anderson, Jonathan; And Others TITLE The Use of Technology in Adult Literacy Programs. SPONS AGENCY Australian Dept. of Employment, Education and Training, Canberra. PUB DATE Jan 90 NOTE 189p. PUB TYPE Reports - Descriptive (141) EDRS PRICE MF01/PC08 Plus Postage. DESCRIPTORS *Adult Basic Education; Adult Literacy; Adults; Basic Skills; Computer Assisted Instruction; *Computer Software; Educational Media; Educational Resources; *Educational Technology; Foreign Countries; Functional Literacy; Hypermedia; Interactive Video; *Literacy Education; *Multimedia Instruction; Teaching Methods; Teleconferencing IDENTIFIERS *Australia ABSTRACT This document describes the use of educational technology (including radio, television, computers, telephones, satellites, and optical laser discs) in adult literacyprograms in Australia. Chapter 1 describes the scope of the study thatresulted in the document and defines both literacy and educationaltechnology. Chapter 2 contains a generalized set of questions thatcan be asked about any educational technology and that providea framework for evaluating educational technology. Chapter 3 describes theuse of educational technology in adult literacyprograms in Australia. Descriptions of the technologies in use are included for printmedia, audio material supporting print material, radio, videoand television, subtitling, computers, drill and practice,simulation programs, word processing, word and text manipulation, story programs, databases, computer peripherals, teleconferencing, optical laser discs, CD-ROM, videodisc, and hypermedia. Chapters 4-9present case studies of the use of technology in particular literacy programs. Chapter 10 describes computer software programs thatare appropriate for use in adult literacy classes. Chapter 11 isdevoted to an exploration of the uses of HyperCard and HyperStoryin adult literacy learning. Chapter 12 considers emerging issuesand the potential of using educational tech slogies in adultliteracy education.
    [Show full text]
  • Thesis Rests with Its Author
    University of Bath PHD The development of a micro-computerised plant establishment and growth model for use with landscape taxa Hope, Frank Award date: 1990 Awarding institution: University of Bath Link to publication Alternative formats If you require this document in an alternative format, please contact: [email protected] General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal ? Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Download date: 09. Oct. 2021 THE DEVELOPMENT OF A MICRO-COMPUTERISED PLANT ESTABLISHMENT AND GROWTH MODEL FOR USE WITH LANDSCAPE TAXA submitted by Frank Hope for the degree of Ph.D of the University of Bath 1990 "Attention is drawn to the fact that copyright of this thesis rests with its author. This copy of the thesis has been supplied on condition that anyone who consults it is understood to recognise that its copyright rests with its author and that no quotation from the thesis and no information derived from it may be published without prior written consent of the author".
    [Show full text]
  • Mac Address Vendor Lookup
    Mac Address Vendor Lookup BGP Looking Glass Mac Address Vendor Lookup MAC ADDRESS Vendor Lookup 00:00:00 XEROX CORPORATION 8 MAC ADDRESS Vendor Lookup 00:00:01 XEROX CORPORATION MAC ADDRESS Vendor Lookup 00:00:02 XEROX CORPORATION MAC ADDRESS Vendor Lookup 00:00:03 XEROX CORPORATION MAC ADDRESS Vendor Lookup 00:00:04 XEROX CORPORATION MAC ADDRESS Vendor Lookup 00:00:05 XEROX CORPORATION MAC ADDRESS Vendor Lookup 00:00:06 XEROX CORPORATION MAC ADDRESS Vendor Lookup 00:00:07 XEROX CORPORATION MAC ADDRESS Vendor Lookup 00:00:08 XEROX CORPORATION MAC ADDRESS Vendor Lookup 00:00:09 XEROX CORPORATION MAC ADDRESS Vendor Lookup 00:00:0A OMRON TATEISI ELECTRONICS CO. MAC ADDRESS Vendor Lookup 00:00:0B MATRIX CORPORATION MAC ADDRESS Vendor Lookup 00:00:0C CISCO SYSTEMS, INC. MAC ADDRESS Vendor Lookup 00:00:0D FIBRONICS LTD. MAC ADDRESS Vendor Lookup 00:00:0E FUJITSU LIMITED MAC ADDRESS Vendor Lookup 00:00:0F NEXT, INC. MAC ADDRESS Vendor Lookup 00:00:10 Hughes MAC ADDRESS Vendor Lookup 00:00:11 Tektrnix MAC ADDRESS Vendor Lookup 00:00:12 INFORMATION TECHNOLOGY LIMITED MAC ADDRESS Vendor Lookup 00:00:13 Camex MAC ADDRESS Vendor Lookup 00:00:14 Netronix MAC ADDRESS Vendor Lookup 00:00:15 DATAPOINT CORPORATION MAC ADDRESS Vendor Lookup 00:00:16 DU PONT PIXEL SYSTEMS . MAC ADDRESS Vendor Lookup 00:00:17 Oracle MAC ADDRESS Vendor Lookup 00:00:18 WEBSTER COMPUTER CORPORATION MAC ADDRESS Vendor Lookup 00:00:19 APPLIED DYNAMICS INTERNATIONAL MAC ADDRESS Vendor Lookup 00:00:1A AMD MAC ADDRESS Vendor Lookup 00:00:1B NOVELL INC.
    [Show full text]
  • Mitsubishi Electric ADVANCE Vol.83
    VOL. 83/JUN. 1998 Thin-Film Transistor LCDs Edition MITSUBISHI ELECTRIC A Quarterly Survey of New Products, Systems, and Technology Color liquid-crystal displays (LCDs) must possess on/off switching characteristics adequate to ensure ●Vol. 83/Jun. 1998 Mitsubishi Electric ADVANCE that the proper voltages are applied to the elec- trodes controlling pixel elements, and must use highly reliable thin-film transistors (TFTs). These are the basic requirements in forming TFT arrays. The Shisui Factory (shown upper left) uses a single larger glass panel measuring 410 x 520mm (and only 0.7mm thick, shown in the center) to form four 12.1” TFT arrays. Each array comprises some 1.5 million elements. Color filter panels are laminated onto these arrays to form cells which are then filled with liquid-crystal material to complete display Thin-Film Transistor LCDs Edition panels like that shown at the lower right. CONTENTS Editor-in-Chief Shin Suzuki TECHNICAL REPORTS Editorial Advisors Jozo Nagata OVERVIEW Toshimasa Uji Introducing the Special Edition on TFT-LCDs .......................................... 1 Kazumi Iwaizumi by Makoto Morishita Yasuo Kobayashi Masao Hataya The Concept and Vertical Ramp of the Shisui Toshiharu Nozawa TFT-LCD Fabrication Line .......................................................................... 2 Seiya Inoue by Ikuo Ogo and Kazuo Yoshida Hiroaki Kawachi Static Electricity Control and Glass-Cutting Akihiko Naito Technique for Narrow Margins .................................................................. 7 Nobuo Yamamoto by Takayuki Ohishi and Dr. Kazushi Haruna Shingo Maeda Toshikazu Saita Design Technologies Akira Inokuma for Low-EMI Notebook Personal Computers .......................................... 11 Kouji Kadota by Dr. Eishi Gofuku and Shinji Tanabe An Optimum Pixel Light-Shield Pattern Design Vol. 83 Feature Articles Editor for TFT-LCDs ............................................................................................
    [Show full text]