Hardware  >   Electronic Components  >   Integrated Circuits  >  

Custom IC

RSS Feed    Add to Google    Add to My Yahoo!
Custom IC Reports
 
Achieving Enterprise SAN Performance with the Brocade 48000 Director
sponsored by Brocade
WHITE PAPER: This paper describes how IT organizations can leverage the benefits of this SAN director to maximize performance, flexibility, and data availability in mission-critical environments.
Posted: 13 Mar 2007 | Published: 01 Jan 2007

Brocade

The Advantages of Multi-Core UTM
sponsored by SonicWALL
WHITE PAPER: The newest trend in firewall protection is Unified Threat Management (UTM) that not only guards against intrusion, but performs content filtering, data leakage protection, intrusion detection and anti-malware duties.
Posted: 18 Nov 2008 | Published: 18 Nov 2008

SonicWALL

Mercury Network Storage System
sponsored by BlueArc Corp.
DATA SHEET: The Mercury platform leverages a hybrid-core architecture that delivers the highest performance available in mid-range systems. Employing field programmable gate arrays (FPGAs) and traditional multi-core processors, this architecture separates data movement and management processes that normally compete for system resources.
Posted: 07 Aug 2009 | Published: 01 Aug 2009

BlueArc Corp.

IEEE 1149.1 Use in Design for Verification and Testability at Texas Instruments
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document introduces those products that include ASIC cells, standard interface ICs, a bus master IC, a controller interface board for IBM compatibles, a high-speed scan interface, and software to control the scan bus.
Posted: 17 Mar 2002 | Published: 05 May 2000

Texas Instruments, Inc.

The Advantages of Multi-Core Architecture in Unified Threat Management (UTM) Solutions
sponsored by SonicWALL
WHITE PAPER: Securing your company's network requires a comprehensive approach that includes intrusion prevention, data leak protection, and content filtering. This white paper examines how UTM solutions provide enhanced security that is efficient and cost-effective.
Posted: 28 Apr 2008 | Published: 01 Apr 2008

SonicWALL

Building a DBaaS Environment With A Strong Hardware and Software Partnership
sponsored by IBM
WEBCAST: In this webcast discover how a DB software built on a scalable nexus architecture, in combination with a powerful hardware can help you create the DBaaS environment needed to handle large data workloads. Learn how you can, enable cloud environments in an on premise system, work across programming platforms, and more.
Posted: 09 Nov 2016 | Premiered: Aug 17, 2016

IBM

CW@50: What was making the news in June
sponsored by ComputerWeekly.com
EGUIDE: The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

ComputerWeekly.com

Video Demo: Introducing Oracle Private Cloud Appliance
sponsored by Oracle Corporation UK Ltd
VIDEO: This video explores an integrated, wire once, software-defined, converged infrastructure system that is designed for fast cloud deployments and application consolidation. Realize how it can help you overcome installation and configuration challenges, as well as deploy cloud models such as IaaS and DaaS.
Posted: 26 Oct 2016 | Premiered: 10 Nov 2015

Oracle Corporation UK Ltd

Radically Simplify Your Data Center with FlexPod Built on Cisco UCS Integrated Infrastructure
sponsored by Cisco Systems, Inc.
BROCHURE: An Integrated infrastructure system can allow you to simplify your data center in order to gain flexibility in your system and ultimately modernize your business. This infographic offers structured information on the multiple benefits IT professionals will gain by using this integrated infrastructure system.
Posted: 26 Aug 2016 | Published: 01 Jul 2016

Cisco Systems, Inc.

Does a proprietary solution automatically mean vendor lock-in?
sponsored by ComputerWeekly.com
ANALYST REPORT: The dread of any IT manager is in making a significant purchase of hardware or software to then find that they are 'locked in' to one supplier. But analyst Clive Longbottom asks, is this still the case?
Posted: 14 Mar 2016 | Published: 14 Mar 2016

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement