Browse Definitions :
Definition

extreme ultraviolet lithography (EUVL)

Extreme ultraviolet lithography (EUVL) is an advanced technology for making microprocessors a hundred times more powerful than those made today. Intel, AMD , and Motorola have joined with the U.S. Department of Energy in a three-year venture to develop a microchip with etched circuit lines smaller than 0.1 micron in width. (Today's circuits are generally .18 micron or greater.) A microprocessor made with the EUVL technology would be a hundred times more powerful than today's. Memory chips would be able to store 1,000 times more information than they can today. The aim is to have a commercial manfacturing process ready before 2005.

EUVL is one technology vying to replace the optical lithogaphy used to make today's microcircuits. It works by burning intense beams of ultraviolet light that are reflected from a circuit design pattern into a silicon wafer. EUVL is similar to optical lithography in which light is refracted through camera lenses onto the wafer. However, extreme ultraviolet light, operating at a different wavelength , has different properties and must be reflected from mirrors rather than refracted through lenses. The challenge is to build mirrors perfect enough to reflect the light with sufficient precision. Intel is working on some early prototypes. In the meantime, optical lithography will continue to advance over the next few years until replaced by newer technologies such as EUVL.

This was last updated in March 2011

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • tokenization

    Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential ...

  • incident response

    Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also ...

  • Federal Information Security Management Act (FISMA)

    The Federal Information Security Management Act (FISMA) is United States legislation that defines a framework of guidelines and ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

Close