IT Management  >   Systems Design and Development  >   Hardware Engineering  >  

IC Design

RSS Feed    Add to Google    Add to My Yahoo!
IC Design Reports
 
IEEE 1149.1 Use in Design for Verification and Testability at Texas Instruments
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document introduces those products that include ASIC cells, standard interface ICs, a bus master IC, a controller interface board for IBM compatibles, a high-speed scan interface, and software to control the scan bus.
Posted: 17 Mar 2002 | Published: 05 May 2000

Texas Instruments, Inc.

Design-for-Test Analysis of a Buffered SDRAM DIMM
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document presents a design-for-test analysis of a buffered synchronous dynamic random access memory dual in-line memory module.
Posted: 11 Mar 2002 | Published: 13 Aug 1996

Texas Instruments, Inc.

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

Five Major Power Distribution Considerations for Data Center Racks
sponsored by Avocent
WHITE PAPER: Power densities and power consumption costs in data centers are rising. Learn what to consider when choosing the appropriate power distribution products at the rack level.
Posted: 11 Feb 2008 | Published: 01 Feb 2008

Avocent

Core Network Services Survey: The Costs and Impacts of DNS and IP Address Management (IPAM) for the Enterprise and SMB
sponsored by Infoblox
ANALYST REPORT: Computerworld invited IT and business leaders to participate in a core network services survey that included specific questions about their DNS infrastructures and the costs of IP address management. The following report represents top-line results of that survey and can be used as a benchmark to measure your organization’s core network services.
Posted: 17 Jun 2010 | Published: 17 Oct 2008

Infoblox

Governance, Risk, and Compliance for Critical Data Movement
sponsored by IBM
WEBCAST: Join this webinar with experts from Forrester Research to learn about the key trends in GRC. Find out how to develop your lines of defense, learn how to measure your organization's GRC maturity, and get three key tips for developing a successful strategy.
Posted: 26 Jan 2015 | Premiered: Jan 26, 2015

IBM

Case Study: Managing Multiple Printer Devices through a Single-Pane-of-Glass
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, learn about one managed print services platform that provides you with a unified view into the fleet of devices. Read on now to learn how you can streamline printer and supply management to free resources and increase profit margins.
Posted: 26 Jan 2015 | Published: 05 Sep 2012

Hewlett-Packard Limited

Extend Compliance And Risk Management To What Really Matters For Your Business
sponsored by Absolute Software
ANALYST REPORT: Access this informative report to find out how the current focus of risk and compliance efforts is too narrow because many GRC programs largely ignore the risks that cause companies to fail. Discover how to impact performance by expanding the fundamentals of GRC to the aspects of the business that drive success with customer interactions.
Posted: 22 Jan 2015 | Published: 31 Dec 2014

Absolute Software

Protect Your Fleet With Simple, Policy-Based Print Security
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper explains the importance of securing your printing and imaging environment, and introduces a streamlined, policy-based approach to securing these devices before a data breach occurs.
Posted: 22 Jan 2015 | Published: 31 Oct 2014

Hewlett-Packard Limited

Protecting Against Web Application Threats Using SSL
sponsored by Symantec Corporation
WHITE PAPER: In this shortcut guide, readers will learn how changes in the way we deliver services, the increasing use of mobile devices, the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave web applications vulnerable to attack.
Posted: 15 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement