Hardware  >   Electronic Components  >  

Media Access Controllers

RSS Feed    Add to Google    Add to My Yahoo!
Media Access Controllers White Papers (View All Report Types)
 
Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

Embedded Security: Trusted Platform Module Technology Comes of Age
sponsored by Utimaco Safeware
WHITE PAPER: This paper examines the benefits that TPM chips bring to security-conscious businesses, and the ways in which this technology can elevate trusted computing to higher levels, enhancing security while simplifying usability.
Posted: 02 Feb 2009 | Published: 01 Dec 2005

Utimaco Safeware

Breaking the Scalability Barrier with Infinite Cache
sponsored by EnterpriseDB Corporation
WHITE PAPER: Infinite Cache™ from EnterpriseDB revolutionizes distributed cache management on commodity blade server hardware by substantially increasing the amount of memory available to hold data including entire databases with outstanding performance.
Posted: 23 Sep 2009 | Published: 22 Sep 2009

EnterpriseDB Corporation

Oracle Unbreakable Linux: True Enterprise-Quality Linux Support
sponsored by Oracle Corporation
WHITE PAPER: Read this white paper for tips on selecting the best support approach for your IT shop's Linux platform. You'll learn about various options and the essential components of a successful support system.
Posted: 17 Dec 2008 | Published: 17 Dec 2008

Oracle Corporation

Virtual Machines Are Not Free
sponsored by VKernel
WHITE PAPER: This paper explains the advantages that virtual machine provides to the IT department.
Posted: 14 Nov 2008 | Published: 14 Nov 2008

VKernel

Video: Virtualization on IBM System x and IBM BladeCenter Servers
sponsored by IBM Software Group
WHITE PAPER: Learn how virtualization can make your infrastructure more efficient. See the different types of virtualization and how IBM technology can help you achieve a virtualized environment.
Posted: 28 Nov 2007 | Published: 28 Nov 2007

IBM Software Group

Dellâ„¢Reliable Memory Technology
sponsored by Dell, Inc.
WHITE PAPER: This paper examines the root causes of memory errors and discusses and discusses the core concepts of technology designed to remediate and obviate these errors.
Posted: 12 Mar 2014 | Published: 12 Mar 2014

Dell, Inc.

Designing Power-Friendly Devices
sponsored by Intel Corporation
WHITE PAPER: This white paper discusses the best practices for power management and explains the technologies available for designing power-friendly devices. Not just for system's designers this information is valuable and applicable to any computing enviro...
Posted: 31 Oct 2007 | Published: 01 Oct 2007

Intel Corporation

The Journey to Unified Computing
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper explains how virtualization has removed many of the data center resource constraints of the past. Find out why management of your IT infrastructure should be integrated and learn how to set your business up for private cloud success.
Posted: 02 Jun 2011 | Published: 01 Apr 2010

Cisco Systems, Inc.

Unified Visibility Fabric Architecture – A New Approach to Visibility
sponsored by Gigamon
WHITE PAPER: In this informative white paper, uncover a unified visibility fabric architecture that centralizes network monitoring and management tools for improved and simplified performance and security analysis.
Posted: 24 Sep 2013 | Published: 30 Aug 2013

Gigamon
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement