Hardware  >   Electronic Components  >   Integrated Circuits  >  

Custom IC

RSS Feed    Add to Google    Add to My Yahoo!
Custom IC Reports
 
IEEE 1149.1 Use in Design for Verification and Testability at Texas Instruments
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document introduces those products that include ASIC cells, standard interface ICs, a bus master IC, a controller interface board for IBM compatibles, a high-speed scan interface, and software to control the scan bus.
Posted: 17 Mar 2002 | Published: 05 May 2000

Texas Instruments, Inc.

Achieving Enterprise SAN Performance with the Brocade 48000 Director
sponsored by Brocade
WHITE PAPER: This paper describes how IT organizations can leverage the benefits of this SAN director to maximize performance, flexibility, and data availability in mission-critical environments.
Posted: 13 Mar 2007 | Published: 01 Jan 2007

Brocade

Mercury Network Storage System
sponsored by BlueArc Corp.
DATA SHEET: The Mercury platform leverages a hybrid-core architecture that delivers the highest performance available in mid-range systems. Employing field programmable gate arrays (FPGAs) and traditional multi-core processors, this architecture separates data movement and management processes that normally compete for system resources.
Posted: 07 Aug 2009 | Published: 01 Aug 2009

BlueArc Corp.

The Advantages of Multi-Core Architecture in Unified Threat Management (UTM) Solutions
sponsored by SonicWALL
WHITE PAPER: Securing your company's network requires a comprehensive approach that includes intrusion prevention, data leak protection, and content filtering. This white paper examines how UTM solutions provide enhanced security that is efficient and cost-effective.
Posted: 28 Apr 2008 | Published: 01 Apr 2008

SonicWALL

The Advantages of Multi-Core UTM
sponsored by SonicWALL
WHITE PAPER: The newest trend in firewall protection is Unified Threat Management (UTM) that not only guards against intrusion, but performs content filtering, data leakage protection, intrusion detection and anti-malware duties.
Posted: 18 Nov 2008 | Published: 18 Nov 2008

SonicWALL

Exchange 2016: To Virtualize or Not to Virtualize, That is the Question
sponsored by Veeam Software
WHITE PAPER: In the debate surrounding whether to virtualize Exchange, there's no clear answer for or against. This white paper discusses some of the reasons in favor of virtualizing Exchange to keep you informed on the debate, and empower you to make the best decision for your organization's needs.
Posted: 10 Feb 2017 | Published: 31 Mar 2016

Veeam Software

Repsol meets demands of competitive Oil Markets with Red Hat
sponsored by Red Hat
CASE STUDY: Repsol, an oil and gas company, needed to migrate its UNIX system to something more capable of handling dynamic business demands. Access this white paper to learn about the open source infrastructure Repsol migrated to in order to stay competitive and the benefits they realized.
Posted: 14 Mar 2017 | Published: 30 Dec 2016

Red Hat

How Printing is Improving Student Performance in Unexpected Ways
sponsored by Xerox
WHITE PAPER: Printing is a major spending point for every budget, especially in schools. Fortunately, new printing technologies are keeping cost effectiveness in mind. Access this white paper to see how new, economical printing technologies are meeting student expectations while accommodating budget concerns.
Posted: 06 Jan 2017 | Published: 31 Dec 2012

Xerox

OpenStack 5-in-1 Solution
sponsored by Red Hat
PRODUCT OVERVIEW: There's a lot more to cloud computing than just the cloud. Access this product overview to learn about a 5-in-1 tool that will improve these aspects of your business and how incorporating this tool will impact your organization's digital transformation strategy.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Red Hat

Protecting Your Data in the Digital Transformation Journey
sponsored by HPE and IntelĀ®
WHITE PAPER: Application performance enables competitive advantage by increasing productivity, but could you be wasting time with servers that aren't secure? Discover a number of overarching rules and business attributes to help protect your organization's data.
Posted: 29 Jun 2016 | Published: 29 Feb 2016

HPE and IntelĀ®
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement