Vertical Industries  >  

Microelectronics Industry

RSS Feed    Add to Google    Add to My Yahoo!
Microelectronics IndustryWhite Papers (View All Report Types)
 
Step up Your Game. Global Delivery Capabilities for the Electronics Industry
sponsored by IBM Line of Business
WHITE PAPER: How can your business meet the ever-increasing demands of end users and still make a healthy profit? IBM takes a look at innovation's role in driving business objectives and helping electronics enterprises move forward.
Posted: 17 Jun 2008 | Published: 17 Jun 2008

IBM Line of Business

Cutting Edge Multicore Development Techniques for the Next Wave of Electronics Products
sponsored by IBM
WHITE PAPER: As more and more software is embedded into both consumer and industrial electronics, the electronics industry is being challenged with ensuring rigor within its software development process, often a new core competency, and the integration of hardware and software. Read this paper to learn about solutions that address these complex challenges.
Posted: 01 Sep 2010 | Published: 19 Mar 2010

IBM

Winning the Global Challenge: The Japanese Electronics Companies'Race to Innovate
sponsored by IBM Line of Business
WHITE PAPER: Japanese electronics companies (JEC) are taking bold action to regain market share,profitability and their place as global innovators. Download this IBM Institute for Business Value Study to learn how JECs are transforming their businesses.
Posted: 29 Nov 2007 | Published: 01 Mar 2007

IBM Line of Business

Ensuring Successful Manufacturing Execution in the Fabless Semiconductor Model
sponsored by SAP AG
WHITE PAPER: The number of semiconductor companies adopting a fabless manufacturing model continues to increase. And to thrive in this highly competitive market, the fabless company must produce the best product designs for its intended market. This SAP Executive Insight examines the growing trend toward the fabless manufacturing model.
Posted: 17 Sep 2008 | Published: 17 Sep 2008

SAP AG

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

CW Special report on Atos
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 9 page special report, updated for 2014, gives you the facts on Atos, its strategy, products and services and financial performance.
Posted: 01 May 2014 | Published: 05 May 2014

ComputerWeekly.com

E-Guide: PCI DSS 2011: Key themes to watch
sponsored by SearchSecurity.com
EGUIDE: This expert tip pinpoints key observations and common themes related to what’s currently happening with today’s PCI DSS compliance programs and explains what’s in store for the future as companies transition to the PCI DSS 2.0 guidelines.
Posted: 20 May 2011 | Published: 20 May 2011

SearchSecurity.com

Collaboration capability: The new imperative for empowered information workers
sponsored by SearchContentManagement
EGUIDE: In this Tip Guide, ebizQ.com Site Editor Anne Stuart takes a multi-faceted look at the use of collaboration and social networking strategies and tools for case management. Readers will gain a big-picture introduction to collaboration and related trends, including insights from several industry thought leaders.
Posted: 21 Nov 2011 | Published: 17 Nov 2011

SearchContentManagement

An Introduction to Quantum Lifecycle Management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.
Posted: 18 Jan 2013 | Published: 05 Nov 2012

ComputerWeekly.com

CW Special Report on IBM
sponsored by ComputerWeekly.com
IT BRIEFING: This special 12-page report from Computer Weekly analyses the challenges facing IBM, its financial performance, the services it offers, its place in the IT market and its future strategy..
Posted: 15 Aug 2014 | Published: 15 Aug 2014

ComputerWeekly.com

The best way to begin an enterprise information management program
sponsored by SearchDataManagement
EGUIDE: Approaching an enterprise information management (EIM) strategy and ensuring it will provides the best business opportunities for your organization can be a challenge. In this e-guide, readers will learn EIM best practices from Michael Jennings, a data governance director at Walgreens.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

SearchDataManagement

Best practices for planning for data integration process
sponsored by IBM
EGUIDE: Integrating data and planning a data integration process can be difficult for any organization. In this brief yet informative e-guide, readers will learn standard methods and best practices, such as implementing a data profiling program as a production process, to ensure a successful transition.
Posted: 13 Jan 2012 | Published: 13 Jan 2012

IBM

E-Guide: The dangers of application logic attacks
sponsored by SearchSecurity.com
EGUIDE: Developing a secure and effective Web application can be daunting. And, hackers aren't making this task any easier. In this tip from our Ask the Experts section, Web application security expert Michael Cobb explains how hackers use application logic to solicit an attack and advises how to prevent them.
Posted: 14 Apr 2011 | Published: 13 Apr 2011

SearchSecurity.com

E-Guide: Database Tools for Auditing and Forensics
sponsored by SearchSecurity.com
EGUIDE: This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting  database performance.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

SearchSecurity.com

E-Guide: Avoiding Application Security Pitfalls
sponsored by SearchSecurity.com
EGUIDE: This e-guide will explain why people aren’t integrating security with application lifecycle management, the risks businesses take by not taking security measures seriously and what you can do. Read this e-guide to learn why application security measures often fail and what can be done to mitigate them.
Posted: 14 Jan 2011 | Published: 14 Jan 2011

SearchSecurity.com

Creating a Compliance Culture: Best Practices
sponsored by SearchSecurity.com
EGUIDE: Check out this E-Guide and learn key tips on how to make sure your compliance culture is operating efficiently.
Posted: 17 Nov 2011 | Published: 17 Nov 2011

SearchSecurity.com

E-Guide: Improving software with the building security in maturity model
sponsored by SearchSecurity.com
EGUIDE: This expert tip introduces a model that utilizes a framework to organize software security tasks and help organizations determine where their security practices stand and how to advance them over time.
Posted: 26 May 2011 | Published: 26 May 2011

SearchSecurity.com

Great collaboration begins with good governance
sponsored by SearchContentManagement
EGUIDE: For a growing number of companies today, collaboration is no longer a “soft,” nice-to-have concept—it’s an essential component for competitive differentiation. In this Tip Guide, learn how organizations can promote and support effective worker collaboration, and how managers can provide effective governance for collaborative efforts.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

SearchContentManagement

Securing the enterprise application layer: Expert Guidelines
sponsored by SearchSecurity.com
EGUIDE: If you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation.  Find out how securing a naming and directory service will help build a solid platform that application can trust.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

SearchSecurity.com

How to create an effective data protection strategy for IT compliance
sponsored by SearchSecurity.com
EGUIDE: Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This tip guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

SearchSecurity.com

E-Guide: Integrating security into the ALM lifecycle
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, readers will learn the risks businesses take by not taking security measures seriously and what can be done to help integrate security with application lifecycle management.
Posted: 21 Nov 2011 | Published: 16 Nov 2011

SearchSecurity.com

E-Guide: Expert insights to application security testing and performance
sponsored by SearchSecurity.com
EGUIDE: Two of the biggest challenges in an organization’s application security strategies are testing and integrating best practices within the application lifecycle. In this E-Guide, readers will learn best practices for testing injection integrating security measures into the application lifecycle.
Posted: 11 Nov 2011 | Published: 11 Nov 2011

SearchSecurity.com

Beating web application security threats
sponsored by SearchSecurity.com
EGUIDE: Application security plays an important role in ensuring the accuracy and confidentiality of data, yet at times teams may fear that security can interfere with overall performance. Read this e-book for tips that discuss the value of application security and explain how to implement it to ensure the highest availability and usability.
Posted: 14 Nov 2011 | Published: 31 Oct 2011

SearchSecurity.com

Application security testing: Protecting your application and data
sponsored by SearchSecurity.com
EBOOK: Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.
Posted: 07 Nov 2011 | Published: 07 Nov 2011

SearchSecurity.com

Building a Cost-Effective Private Cloud Computing Environment
sponsored by Cisco & Fujitsu
WHITE PAPER: Access this case study to learn how this organization was able to plan and implement a cost-effective private cloud computing environment that provided flexible, efficient IT management and a reduced IT footprint.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

Cisco & Fujitsu

Best practices for effective information management
sponsored by SearchDataManagement
EGUIDE: In this expert e-guide take away tips to optimize your business value of successful data management processes, manage the lifecycle of your information and create effective deployments.
Posted: 29 Sep 2011 | Published: 29 Sep 2011

SearchDataManagement

Case Study Ziarre Limited
sponsored by Cisco & Fujitsu
CASE STUDY: Hong Kong-based business consultation provider, Ziarre, needed a way to expand its offerings in cloud-computing solutions and applications to capture its market share in this segment in a more time-efficient and cost-effective way. This case study explores how they did so by adopting Fujitsu and PRIMEQUEST 1800E.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Cisco & Fujitsu

Data Protection 101: Essential Steps for Holistic Information Security
sponsored by SearchSecurity.com
EGUIDE: Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This e-guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.
Posted: 17 Nov 2011 | Published: 17 Nov 2011

SearchSecurity.com

Storage Through the Looking Glass
sponsored by ComputerWeekly.com
ANALYST REPORT: This analyst report aims to help you take a much needed step away from the technical detail of storage to create some strategic perspective.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

CW+: Leverage memory technology to cut data centre power consumption
sponsored by ComputerWeekly.com
WHITE PAPER: Within modern data centers, virtualization has become the means of choice when it comes to operating efficient server infrastructures for cloud and enterprise computing. On an individualsystem level, this translates into a massive increase of DRAM deployments per server.
Posted: 20 Oct 2011 | Published: 28 Dec 2010

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement