IT Management  >   Systems Design and Development  >   Hardware Engineering  >  

Electronic Circuit Design

RSS Feed    Add to Google    Add to My Yahoo!
Electronic Circuit Design Reports
 
Output short-circuit current bearable by the UPS
sponsored by Emerson Network Power
WHITE PAPER: The purpose of this white paper is to clarify the concept of prospective short circuit currently bearable by the UPS, to explain the role of fuses as well as indicate the requirements of the international IEC 62040-1 standard.
Posted: 08 Aug 2016 | Published: 01 Jan 2016

Emerson Network Power

IEEE 1149.1 Use in Design for Verification and Testability at Texas Instruments
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document introduces those products that include ASIC cells, standard interface ICs, a bus master IC, a controller interface board for IBM compatibles, a high-speed scan interface, and software to control the scan bus.
Posted: 17 Mar 2002 | Published: 05 May 2000

Texas Instruments, Inc.

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

Design-for-Test Analysis of a Buffered SDRAM DIMM
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document presents a design-for-test analysis of a buffered synchronous dynamic random access memory dual in-line memory module.
Posted: 11 Mar 2002 | Published: 13 Aug 1996

Texas Instruments, Inc.

Five Major Power Distribution Considerations for Data Center Racks
sponsored by Avocent
WHITE PAPER: Power densities and power consumption costs in data centers are rising. Learn what to consider when choosing the appropriate power distribution products at the rack level.
Posted: 11 Feb 2008 | Published: 01 Feb 2008

Avocent

Core Network Services Survey: The Costs and Impacts of DNS and IP Address Management (IPAM) for the Enterprise and SMB
sponsored by Infoblox
ANALYST REPORT: Computerworld invited IT and business leaders to participate in a core network services survey that included specific questions about their DNS infrastructures and the costs of IP address management. The following report represents top-line results of that survey and can be used as a benchmark to measure your organization’s core network services.
Posted: 17 Jun 2010 | Published: 17 Oct 2008

Infoblox

Moving Beyond Masking and Subsetting: Realizing the Value of Test Data Management
sponsored by CA Technologies
WHITE PAPER: This paper describes common problems and potential benefits of Test Data Management (TDM) in a testing and development environment. Debunk assumptions that could be holding you back from better TDM, learn why masking production data is not a simple solution, and discover a more efficient and easier TDM policy for IT.
Posted: 22 Sep 2016 | Published: 31 Jul 2016

CA Technologies

Computer Weekly – 27 September 2016: Digital knowledge at the British Library
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out about the technology plans at the British Library as it aims to store the UK's printed and digital history. Graph database technology is being used to help improve food safety throughout the supply chain. And tech leaders tell us how to architect IT for the cloud. Read the issue now.
Posted: 23 Sep 2016 | Published: 27 Sep 2016

ComputerWeekly.com

Adapting IT for Cloud Success
sponsored by VMware
EGUIDE: Enabling line organizations to undertake IT projects on their own, cloud computing is pressuring IT professionals to rethink their approach to application deployment and IT resource planning. In this eGuide, find tips on how to adapt to the cloud environment and address security and compliance risks.
Posted: 21 Sep 2016 | Published: 19 Sep 2016

VMware

Security Framework: A Guide for Business Leaders
sponsored by Palo Alto Networks
WHITE PAPER: Don't satisfy yourself with the status quo. In this guide, access an extensive security framework which will analyze, detect, prevent, and respond to all known and unknown cyber threats. Learn how to formulate a strategy that will rapidly automate protection, extend network visibility, and more.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Palo Alto Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement