Hardware  >   Electronic Components  >  

Framers

RSS Feed    Add to Google    Add to My Yahoo!
FramersReports
 
Cypress Semiconductor Case Study
sponsored by IBM
WHITE PAPER: Cypress Semiconductor is a leading global designer and manufacturer of mixed-signal, programmable solutions with 3,500 employees. It needed to bring new products to market before its competitors while reducing design costs, cutting total cycle time (TCT) and increasing potential revenues and profit margins.
Posted: 19 Sep 2014 | Published: 31 May 2014

IBM

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

Embedded Security: Trusted Platform Module Technology Comes of Age
sponsored by Utimaco Safeware
WHITE PAPER: This paper examines the benefits that TPM chips bring to security-conscious businesses, and the ways in which this technology can elevate trusted computing to higher levels, enhancing security while simplifying usability.
Posted: 02 Feb 2009 | Published: 01 Dec 2005

Utimaco Safeware

Big Data on Openstack
sponsored by Rackspace
RESOURCE: Find out how Hadoop can be used to accommodate the scaling needs of big data.
Posted: 02 Oct 2014 | Published: 29 Aug 2013

Rackspace

Dealing with Network Latency Issues and the Impact on SQL Server Performance
sponsored by Idera
WEBCAST: Find out how to resolve the problems memory, disk, processor and network presents for SQL Servers due to data growth.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

Idera

CW Buyer's Guide: Tablets for business
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this 11-page buyer's guide, Computer Weekly looks at the use of tablets in business and how the effect of mass adoption of tablets in the enterprise could be far more significant than either the desktop or laptop computer.
Posted: 14 Jan 2013 | Published: 14 Jan 2013

ComputerWeekly.com

Evolution of Integrity Checking with Intel® Trusted Execution Technology: an Intel IT Perspective
sponsored by Intel
WHITE PAPER: As part of an effort to address security concerns, Intel IT evaluated Intel® Trusted Execution Technology (Intel® TXT), a new security technology in Intel® processors. Intel TXT is a foundation technology that can be applied to enhance security in multiple usage models. Read this white paper to learn more.
Posted: 02 May 2011 | Published: 25 Mar 2011

Intel

E-Book: Virtualizing Your Infrastructure Chapter 2: Virtualization Management Strategies and Guidelines
sponsored by SearchDataCenter.com
EBOOK: Get an analysis of challenges that accompany server virtualization, and strategies to address them.
Posted: 07 Mar 2013 | Published: 31 Dec 2012

SearchDataCenter.com

Dell PowerEdge R720xd
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Easily scale for massive data growth with the excellent storage capacity, memory density and I/O capabilities of the PowerEdge™ R720xd rack server.
Posted: 03 Jan 2014 | Published: 30 Sep 2013

Dell, Inc. and Intel®

Frequently Asked Questions (FAQ): SAN Acceleration Using FalconStor Network Storage Server (NSS)
sponsored by FalconStor Software
WHITE PAPER: Do you have questions regarding SAN acceleration? Learn more about solid state storage, which solid state technologies are currently on the market, and why your enterprise needs solid state storage. This concise white paper is designed to answer frequently asked questions on these topics and more.
Posted: 25 Oct 2010 | Published: 25 Oct 2010

FalconStor Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement