IT Management  >   Systems Design and Development  >   Hardware Engineering  >  

Printed Circuit Design

RSS Feed    Add to Google    Add to My Yahoo!
Printed Circuit DesignWhite Papers (View All Report Types)
 
Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

IEEE 1149.1 Use in Design for Verification and Testability at Texas Instruments
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document introduces those products that include ASIC cells, standard interface ICs, a bus master IC, a controller interface board for IBM compatibles, a high-speed scan interface, and software to control the scan bus.
Posted: 17 Mar 2002 | Published: 05 May 2000

Texas Instruments, Inc.

Design-for-Test Analysis of a Buffered SDRAM DIMM
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document presents a design-for-test analysis of a buffered synchronous dynamic random access memory dual in-line memory module.
Posted: 11 Mar 2002 | Published: 13 Aug 1996

Texas Instruments, Inc.

Five Major Power Distribution Considerations for Data Center Racks
sponsored by Avocent
WHITE PAPER: Power densities and power consumption costs in data centers are rising. Learn what to consider when choosing the appropriate power distribution products at the rack level.
Posted: 11 Feb 2008 | Published: 01 Feb 2008

Avocent

Outsourcing IT Projects to Managed Hosting or the Cloud
sponsored by Rackspace
WHITE PAPER: View this white paper to discover 12 critical success factors when outsourcing IT to managed hosting or the cloud.
Posted: 14 Oct 2014 | Published: 07 Jun 2014

Rackspace

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Visibility Into Your Virtualized Data Center
sponsored by Gigamon
WHITE PAPER: Access this white paper to learn about how you can deliver increased visibility into your virtualized data center with a new solution. You'll learn how a traffic visibility layer for the standard reference data center architecture that delivers: Informed decisions based on real-time visibility, reduced expenses, and more.
Posted: 23 Oct 2014 | Published: 23 Oct 2014

Gigamon

Eliminating the Challenge of Branch Office Recovery
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Branch converged infrastructure delivers local performance, stores data safely in the datacenter, and enables instant recovery. Learn how to recover faster, reduce risk, and save money.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Riverbed Technology, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement