Design-for-Test Analysis of a Buffered SDRAM DIMM
By: Texas Instruments, Inc. View more from Texas Instruments, Inc. >>
Download this next:
A look into the minds of the 50 most influential IT leaders
By: TechTarget ComputerWeekly.com
Type: Ezine
This issue of Computer Weekly, we reveal the 7th annual UKtech50 – our list of the 50 most influential people in UK IT. And we talk to this year’s winner, ARM CEO Simon Segars, about the prospects for the UK tech sector after the uncertainty caused by the Brexit referendum vote. Read the issue now.
These are also closely related to: "Design-for-Test Analysis of a Buffered SDRAM DIMM"
-
Computer Weekly – 12 March 2013: Will software-defined networking justify the hype?
By: TechTarget Security
Type: Ezine
Computer Weekly – 12 March 2013: Will software-defined networking justify the hype?
In this week’s Computer Weekly, we take an in-depth look at one of the hottest emerging technologies – software-defined networking – and what it means for IT departments. We visit Iceland, home of the greenest datacentres, and see what they offer to CIOs. We look at the growth of governance as a key task for CIOs as business executives grab more influence over IT spending. And we examine the data privacy considerations of developing mobile apps. Read the issue now.
Buyer’s guide to software-defined networking – part one: SDN will transform your network – but not just yet
Software-defined networking (SDN) will revolutionise the router and switch business and wipe millions off costs. So what’s holding it up?
CIOs must be prepared for a shift toward governance
The CIO is an evolving role and changes in technology and budgets, which are encouraging business departments to demand and use IT without consulting the IT department, mean the CIO’s role is shifting more towards governance.
Iceland pushes green datacentres
Renewable energy resources and free air cooling make Iceland a top datacentre location, but big firms have yet to take the plunge.
Mobile data privacy rules cannot be ignored
As increased mobile use leads to a greater focus on data privacy, CIOs must ensure all mobile apps developed in-house do not fall foul of the law.
Case study: School building project uses Huddle to coordinate development suppliers
When the Education Funding Agency wanted a means of sharing data with no training required it turned to a cloud-based platform.
Interview: Corporate travel leader strives for more success to ‘change industry’
Carlson Wagonlit Travel’s CIO talks about bringing uniformity and efficiency across international borders and keeping the IT in good shape.
Opinion: Benefits management can make the difference to an IT project’s success
A coherent approach involving senior management is vital to maximising IT investments in the current economic climate, write John Ward, emeritus professor at Cranfield University School of Management and Elizabeth Daniel, professor of information management at the Open University Business School.
This week's Computer Weekly is sponsored by our own European User Awards
-
Independent analysis of Bitdefender GravityZone
By: Bitdefender
Type: White Paper
Hackers are constantly advancing their tools and strategies to perform attacks more effectively. But when compared to those of hackers, how do your tools compare?
Independent testing results can provide crucial information in their decision-making process, offering objective assessments of each solution’s efficacy under real-world conditions.
This white paper presents the results of an independent test conducted by AV-Comparatives to provide an objective analysis of Bitdefender GravityZone.
Download this white paper to unlock the findings of this independent test and see how GravityZone performed.
Find more content like what you just read:
-
Royal Holloway: Secure connected and autonomous vehicles - the long road ahead
By: TechTarget ComputerWeekly.com
Type: Research Content
Advances in technology have led to safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.
-
Why you should have a disaster recovery testing plan in place
By: TechTarget ComputerWeekly.com
Type: eGuide
With this guide, gain a better understanding of why a disaster recovery testing plan is important, how to efficiently conduct tests, and some tools and terms that you will encounter along the way.
-
The Many Faces of Software Testing
By: TechTarget Security
Type: eGuide
Read this expertly compiled e-guide to learn how your security testing mangers can educate about, plan for, and validate the communication that is required across the enterprise to make sure that your software is secure and protected.
-
Integration Testing: Tips and Best Practices
By: TechTarget Business Analytics
Type: eGuide
The term "integration test" means different things to different people. Integration testing can be challenging for all companies, no matter what the meaning. In this Solution Spotlight, readers will learn tips and best practices around Integration testing, as well as challenges they may face and how to avoid issues.
-
Buyer’s guide to evaluating SASE clouds
By: Netskope
Type: Analyst Report
Broadband-Testing is an independent testing operation which provides vendor-neutral evaluations of tech solutions. This report presents a scorecard for comparing SASE clouds and acts as a first step in the vendor evaluation process. Read on to learn more.
-
A Computer Weekly eGuide to Workspaces
By: TechTarget ComputerWeekly.com
Type: eGuide
In this eGuide we focus on all thing's workspace related. We dive into Google's new privacy settings, how the landscape of workspaces will look when the world of work fully returns and Google's new G Suite workspace overhaul.
-
Step by Step: Best practices for security patch management
By: TechTarget Security
Type: eGuide
Whether you're new to patch management or just need a refresher, this expert e-guide reviews best practices for security patch management to ensure accurate, effective patch testing in your organization.
-
E-Guide: Best practices for pen testing Web applications
By: TechTarget Security
Type: eGuide
This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls.
-
How Does Penetration Testing Work?
By: Novacoast
Type: Product Overview
In the increasingly challenging cyber threat landscape, you must identify and remedy any security weaknesses in order to protect your business. Penetration testing can help you on your path to a stronger security posture. Learn about the seven components of a penetration testing service in this overview.
-
E-Guide: Expert insights to application security testing and performance
By: TechTarget Security
Type: eGuide
Two of the biggest challenges in an organization’s application security strategies are testing and integrating best practices within the application lifecycle. In this E-Guide, readers will learn best practices for testing injection integrating security measures into the application lifecycle.
-
Tips for DevOps transformation in embedded development
By: Eficode
Type: Webcast
Along with complicating software testing, embedded software can present additional challenges to development. In this webinar, CTO at Eficode, Marko Klemetti, breaks down those obstacles and explores how organizations can power DevOps transformation in the embedded world. Watch now to unlock these insights and more.
-
Application security testing: Protecting your application and data
By: TechTarget Security
Type: eBook
Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.
-
E-Book: Definitive Guide to Exchange 2010 Migration Chapter 4: Load Testing and Security Exchange 2010
By: TechTarget Data Center
Type: eBook
This chapter explains how to test Exchange 2010 with native and third-party management tools and how best to protect your investment.
-
How Illumio performs against simulated ransomware attacks
By: Illumio
Type: Proceedings
In order to overcome ransomware, organizations need offerings that can handle the most dangerous malware. This paper presents the results of an array of attack simulations aimed at testing the security capabilities of Illumio’s Core offering. Read on to learn more about Illumio Core and see how it performs against emulated threats.
-
Securing the entire software development pipeline with Veracode Static Analysis
By: Veracode
Type: White Paper
Developers need security testing solutions that can keep pace with rapid, agile development processes. Traditional AppSec solutions can cause development to stall and delay the release of software. In this guide, learn how static analysis solutions can secure applications without hindering fast development.
-
First pass yield vs clean claim rate
By: Inovalon, Inc.
Type: Webcast
Learn how a slight shift in focus can help you not only better manage claims denials but produce fewer of them in the first place. Discover which metrics matter most to achieve faster payments, advanced visualization, and accepted claims.
-
E-Book: Technical Guide on Combatting Emerging Web Threats
By: TechTarget Security
Type: eBook
Attackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at Web threats and vulnerabilities – and how to protect your organization against them.
-
Comprehensive guide: Migrating SQL Server to AWS
By: AWS & Solarwinds
Type: eBook
Migrating SQL Server workloads to AWS needs careful planning and testing. Utilize AWS with SolarWinds SQL Sentry and Database Mapper to speed up migration. Discovery, analysis, validation, and support ensure reliable cloud data platforms. Consult the full guide for safe migration insights.
-
E-Guide: VM in the Cloud
By: TechTarget Security
Type: eGuide
Before you move services to the cloud, you must understand how the change in risk will affect your existing security strategy. View this expert resource now to gain best practices for cloud risk management and explore the importance of revisiting risk assumptions, pros and cons of aggregation, tips for pen testing cloud environments, and more.
-
Test-integrated module publishing 101: What to know
By: Microsoft + HashiCorp
Type: Product Demo
Today, developers are looking for new, easy-to-use tools to perform unit and integration testing of code. However, to benefit from high-quality modules, companies must also have an effective way of publishing them systematically. Tune into this video to learn more.
-
Royal Holloway: Rowhammer – From DRAM faults to escalating privileges
By: TechTarget ComputerWeekly.com
Type: Research Content
Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them
-
Expert Steps for Testing DR Effectiveness
By: TechTarget Storage
Type: eGuide
This E-Guide outlines three key phases of DR performance evaluation and provides two examples of how conducting a business impact analysis can minimize the effects of a disruption.
-
Quick guide to Amazon EC2 R7i for memory-intensive workloads
By: AWS & Intel
Type: Blog
In this blog, unlock a quick guide to how the Amazon Elastic Compute Cloud (Amazon EC2) R7i instance can support your memory-intensive workloads – and more.
-
HIPAA compliance: A strategic, efficient approach
By: Coalfire
Type: White Paper
Tap into this white paper to learn how you can efficiently manage your HIPAA program in a strategic fashion by assigning track leaders that are responsible for key elements of your HIPAA program.
-
Next-generation DAST: Introducing interactive application security testing (IAST)
By: Contrast Security
Type: White Paper
While dynamic application security testing (DAST) has been a go-to AppSec testing technique for decades, it is not without its drawbacks. This is where interactive application security testing (IAST) comes into play, building off of DAST, but analyzing apps from the inside out, rather than from the outside in. Read this white paper to learn more.
-
A thousand pen-testers, at your service
By: Pcysys
Type: Data Sheet
Traditionally, manual penetration testing is a costly and unreliable endeavor. However, modern automated penetration testing platforms enable organizations to better understand their unique vulnerabilities, allowing them to stay ahead of tomorrow’s threats – read this data sheet to learn more.
-
CW Nordics February 2019
By: TechTarget ComputerWeekly.com
Type: Ezine
In this ezine, we look at how digital transformation is shaking up the Nordic region and placing CIOs at the forefront of the social and economic changes that come with it. Norway, Denmark, Sweden and Finland are all heading in the same direction at pace and it appears this move is being fuelled by more traditional businesses.
-
-
How to expand app security testing coverage without slowing development
By: HCL Software
Type: Case Study
Discover in this case study how HCL Tech is helping organizations implement Interactive Application Security Testing solutions, which can help businesses expand and improve security testing without slowing down application software development.
-
Oracle cloud applications exhibit pragmatic adoption curve
By: TechTarget ComputerWeekly.com
Type: eGuide
Oracle prides itself on the full suite of the business applications it offers in the cloud, arguably ahead of its closest rival, SAP – which has prioritised building on its in-memory database Hana over the cloud per se, though its S/4 Hana ERP system is increasingly delivered over the cloud, too.
-
-
Penetration testing: Different types & how it works
By: Bitdefender
Type: White Paper
Many organizations that invested in web and mobile applications over the past few years were uneducated in the potential threats and failed to protect their end users from encountering availability and performance issues. Download this white paper to learn how it works and explore the different types of penetration testing.
-
Application Security Handbook: Application Security: Managing Software Threats
By: TechTarget Security
Type: eBook
Check out this expert e-book from the editorial team at SearchSoftwareQuality.com to read the following three articles designed to help you address your application security before it's threatened: 'Ten Ways to Build in Security From the Start', 'Secure Your Mobile Apps in Enterprise Integration', and 'How to Boost Your Application Security Savvy'.
-
Storage performance: From fundamentals to bleeding edge
By: TechTarget ComputerWeekly.com
Type: eGuide
In this guide we look at LUN provision and management, RAID and flash storage, plus tuning for analytics workloads and key emerging technologies that can give your organisation a competitive advantage in mission-critical operations, such as storage-class memory, NVMe flash and persistent memory.
-
E-Guide: Requirements for Virtualizing Exchange Server 2010
By: TechTarget Data Center
Type: eGuide
This expert e-guide provides you with everything you need to know about virtualizing Exchange 2010. Discover the hardware, storage, memory, and availability requirements you will have to meet as well as the steps you must take before getting started with this process.
-
Are we trusting social networks too much?
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
-
Key findings on the state of IETF Transport Layer Security (TLS) 1.3
By: Gigamon
Type: Research Content
Today, the push for the finalized IETF Transport Layer Security (TLS) 1.3 standard for network encryption continues to affect organization’s decisions. This white paper presents the key findings from a recent study conducted to investigate perceptions and beliefs of end users surrounding the adoption of the TLS 1.3 standard. Read on to learn more.
-
Computer Weekly - 17 December 2019: How data analytics is improving the world's greatest tennis players
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we talk to the organisation that runs men's tennis worldwide to find out how data analytics is transforming the sport. Intel processors delays will affect Windows 10 upgrades – we examine the implications. And we ask if AI is living up to the hype in enterprise IT. Read the issue now.
-
IAST fact vs. fiction: Debunking 5 common myths
By: Contrast Security
Type: Blog
While Interactive Application Security Testing (IAST) can help accelerate DevSecOps, some common misconceptions persist that can stymie even the most valiant of security testing efforts. This essential resource debunks 5 commonly-believed IAST myths.
-
Application security: best practices and risks
By: TechTarget ComputerWeekly.com
Type: eGuide
Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
-
Build and deploy quality ML models with AI observability
By: AWS & Intel
Type: Case Study
In this case study, you’ll discover how a leading bank was able to reliably speed up ML model testing, approval, and deployment by leveraging a comprehensive AI observability solution. Read on to learn how you can ensure model quality for your AI solutions by focusing on testing and monitoring throughout the software lifecycle.
-
SAST vs. IAST: Picking the Right Tool for the Job
By: Contrast Security
Type: Webcast
Watch this webinar for a demo of static application security testing (SAST) and interactive application security testing (IAST) solutions and determine which is the right tool for your needs.
-
Focus: Disaster recovery planning and virtualisation
By: TechTarget ComputerWeekly.com
Type: eGuide
We take a good look at how features and functionality built into popular virtualisation environments can help with disaster recovery planning, testing and execution.
-
Pipeline-native scanning for modern application development
By: Contrast Security
Type: White Paper
Tap into this white paper to learn about an approach to application security that uses demand-driven static analysis to automatically triage vulnerabilities according to next-step actions within a modern development environment.
-
5 Steps to Ensure the Success of Your Cloud Data Migration
By: Alation
Type: White Paper
How can organizations ensure they create tangible business value with a cloud data warehouse? It all starts with a plan. Business leaders need to map out a strategy and plan what to migrate, how to migrate it, and when to migrate it to maximize their investment in the cloud. Read on to learn 5 steps to leading a successful cloud migration.
-
6 key justifications for consolidating your monitoring tools
By: AWS & Solarwinds
Type: eBook
Discover six reasons to consolidate IT monitoring tools in this white paper. Embrace reduced costs and downtime with integrated platforms for complex hybrid IT. Gain holistic data insight and swift root-cause analysis. Learn how SolarWinds optimizes IT operations.
-
Discover how AI is revolutionizing productivity
By: Zones, Inc.
Type: White Paper
Microsoft 365 Copilot leverages AI to boost productivity; read how it streamlines workflows, reduces information overload and elevates team collaboration in Word, Excel, Outlook, PowerPoint and Teams. Participate in a 3-day Copilot workshop to unlock its potential. Learn more in the full infographic.