Hardware  >   Electronic Components  >   Integrated Circuits  >   Memory  >   Memory Management Units  >  

Associative Memory

RSS Feed    Add to Google    Add to My Yahoo!
Associative MemoryReports
 
Guidelines for the Evaluation of Enterprise De-Duplication Solutions: How to Navigate the Pitfalls and Hyperbole
sponsored by IBM
WHITE PAPER: This document is not intended to judge what is good or bad, right or wrong. The primary focus is educational, providing a background on the principles of de-duplication and recommendations to consider in planning an evaluation of de-duplication solutions.
Posted: 01 Apr 2009 | Published: 01 Apr 2009

IBM

Memory corruption attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Unlock possibilities with IBM MessageSight
sponsored by IBM
WEBCAST: Check out this brief video to learn about a way to connect sensors and mobile devices safely, securely, and conveniently to the cloud. You'll learn about a new full-featured messaging appliance that connects customer apps and front office systems with back office systems, delivering the performance and simplicity needed for the mobile world.
Posted: 08 Oct 2014 | Premiered: Oct 8, 2014

IBM

How Red Hat Brings OpenStack into the Enterprise
sponsored by Red Hat
PRODUCT OVERVIEW: Explore this exclusive resource to uncover Red Hat's approach to OpenStack, what they've gained from this technology and much more.
Posted: 02 Apr 2014 | Published: 31 Dec 2013

Red Hat

Achieve Successful Facial-Recognition Technology
sponsored by NEC Corporation of America
CASE STUDY: Read this concise case study now to discover how The Pennsylvania Justice Network (JNET) achieved successful facial-recognition technology with simplified usability, improved accuracy and more.
Posted: 29 Apr 2014 | Published: 28 Mar 2013

NEC Corporation of America

Enterprise Solution Design for SAP HANA
sponsored by HP & Intel®
WHITE PAPER: In this resource, explore the three principles of great enterprise design—stability, scalability, and agility—and learn how to apply them to your SAP landscape with a focus on SAP HANA. Read on for best practices and key design considerations for implementing your SAP HANA enterprise-level solution.
Posted: 25 Sep 2013 | Published: 28 Feb 2013

HP & Intel®

Authentication Devices - User-friendly authenticators for every use case
sponsored by HID
BROCHURE: In this brochure, access over 10 different authentication devices from a reliable provider to achieve the strength and security you strive for.
Posted: 09 Jul 2014 | Published: 09 Jul 2012

HID

Why Back Up Network Hardware?
sponsored by EMC Corporation
EGUIDE: In this e-guide, from the experts at SearchDataBackup.com examine backing up network hardware and why data backup administrators should no longer overlook this practice as well as some best practices when executing a network hardware backup.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

EMC Corporation

HP Fast Start rapid-deployment solution for SAP HANA
sponsored by HP & Intel®
SERVICE LISTING: Access this resource to learn about a rapid-deployment technology for SAP HANA that allows you to easily incorporate SAP HANA hardware into your local network, upgrade to the latest software, and start experiencing the benefits of real-time data processing sooner than ever.
Posted: 25 Sep 2013 | Published: 30 Apr 2013

HP & Intel®

What can go wrong with counterfeit parts : What unauthorized support providers don't tell you - Government Finance customer
sponsored by Hewlett-Packard Company
CASE STUDY: Read through this concise case study to find out how HP resolved an organization's data loss issues, when it was discovered their hardware was not genuine HP parts.
Posted: 24 Jan 2014 | Published: 30 Nov 2013

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement