IT Management  >   Systems Design and Development  >   Hardware Engineering  >  

Electronic Circuit Design

RSS Feed    Add to Google    Add to My Yahoo!
Electronic Circuit Design Reports
 
Five Major Power Distribution Considerations for Data Center Racks
sponsored by Avocent
WHITE PAPER: Power densities and power consumption costs in data centers are rising. Learn what to consider when choosing the appropriate power distribution products at the rack level.
Posted: 11 Feb 2008 | Published: 01 Feb 2008

Avocent

IEEE 1149.1 Use in Design for Verification and Testability at Texas Instruments
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document introduces those products that include ASIC cells, standard interface ICs, a bus master IC, a controller interface board for IBM compatibles, a high-speed scan interface, and software to control the scan bus.
Posted: 17 Mar 2002 | Published: 05 May 2000

Texas Instruments, Inc.

Design-for-Test Analysis of a Buffered SDRAM DIMM
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document presents a design-for-test analysis of a buffered synchronous dynamic random access memory dual in-line memory module.
Posted: 11 Mar 2002 | Published: 13 Aug 1996

Texas Instruments, Inc.

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

Core Network Services Survey: The Costs and Impacts of DNS and IP Address Management (IPAM) for the Enterprise and SMB
sponsored by Infoblox
ANALYST REPORT: Computerworld invited IT and business leaders to participate in a core network services survey that included specific questions about their DNS infrastructures and the costs of IP address management. The following report represents top-line results of that survey and can be used as a benchmark to measure your organization’s core network services.
Posted: 17 Jun 2010 | Published: 17 Oct 2008

Infoblox

The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute Software
WHITE PAPER: This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 21 Jan 2015 | Published: 29 Dec 2014

Absolute Software

Computer Weekly – 27 January 2015: Why we need cyber war games
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the UK and US are starting a cyber war – all in the name of testing each other's defences. We look at why the war games are needed. We examine what IT managers can learn from the car industry to improve supplier relationships. And we find out why innovation should be top of the IT agenda in 2015. Read the issue now.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

ComputerWeekly.com

Rethinking IT to Drive Business Value
sponsored by Hewlett-Packard Company
WHITE PAPER: This survey of 300 enterprise organization decision makers involved in hardware investment decisions gives insight into the challenges and opportunities that lie between the old and new styles of IT and drive innovation, transformation and improved delivery against business expectations.
Posted: 22 Jan 2015 | Published: 09 Jan 2015

Hewlett-Packard Company

Case Study: Managing Multiple Printer Devices through a Single-Pane-of-Glass
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, learn about one managed print services platform that provides you with a unified view into the fleet of devices. Read on now to learn how you can streamline printer and supply management to free resources and increase profit margins.
Posted: 26 Jan 2015 | Published: 05 Sep 2012

Hewlett-Packard Limited

The Zero Trust Model Of Information Security
sponsored by Zscaler
WHITE PAPER: This white paper introduces the Zero Trust Model of information security, which eliminates the idea of trusted and untrusted networks in favor of viewing all network traffic as untrusted.
Posted: 27 Jan 2015 | Published: 22 Oct 2014

Zscaler
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement