Hardware  >   Electronic Components  >  

IC

RSS Feed    Add to Google    Add to My Yahoo!
IC Reports
 
Embedded Security: Trusted Platform Module Technology Comes of Age
sponsored by Utimaco Safeware
WHITE PAPER: This paper examines the benefits that TPM chips bring to security-conscious businesses, and the ways in which this technology can elevate trusted computing to higher levels, enhancing security while simplifying usability.
Posted: 02 Feb 2009 | Published: 01 Dec 2005

Utimaco Safeware

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

E-Guide: Requirements for Virtualizing Exchange Server 2010
sponsored by SearchDataCenter.com
EGUIDE: This expert e-guide provides you with everything you need to know about virtualizing Exchange 2010. Discover the hardware, storage, memory, and availability requirements you will have to meet as well as the steps you must take before getting started with this process.
Posted: 15 Aug 2012 | Published: 15 Aug 2012

SearchDataCenter.com

Deploying and Optimizing SQL Server for Virtual Machines
sponsored by SolarWinds, Inc.
WHITE PAPER: In this white paper, you will gain deeper insight into the four critical resource areas that impact database performance and reliability in a virtual machine.
Posted: 29 Aug 2013 | Published: 29 Aug 2013

SolarWinds, Inc.

All New 2010 Intel® Core™ vPro™ Processor Family Brochure
sponsored by Intel
BROCHURE: Learn more about the cost-saving manageability, smart security, intelligent performance and broad industry support delivered by the all new 2010 Intel Core processor family.
Posted: 27 Apr 2010 | Published: 27 Apr 2010

Intel

Virtualization Gets Down to Business as a Wellspring of Agility
sponsored by Dell, Inc. and AMD
EBOOK: This e-book, sponsored by Dell, Inc. and AMD, contains a variety of virtualization resources as well as product overviews and videos detailing the features and business benefits of AMD processors and Dell virtualization solutions.
Posted: 03 Nov 2010 | Published: 13 Sep 2010

Dell, Inc. and AMD

The Journey to Unified Computing
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper explains how virtualization has removed many of the data center resource constraints of the past. Find out why management of your IT infrastructure should be integrated and learn how to set your business up for private cloud success.
Posted: 02 Jun 2011 | Published: 01 Apr 2010

Cisco Systems, Inc.

Global Application and SAN Acceleration with Solid-State Storage
sponsored by FalconStor Software
WHITE PAPER: This paper investigates the deployment models of solid-state storage, and explains how the FalconStor Network Storage Server SAN Accelerator solution enhances this technology to deliver additional value through application-specific and global SAN acceleration.
Posted: 25 Oct 2010 | Published: 25 Oct 2010

FalconStor Software

Oracle TimesTen In-Memory Database
sponsored by Oracle Corporation
WEBCAST: In this 40 minute webcast, listen to Oracle's Marie-Anne Neimat introduce the Oracle TimesTen In-Memory Database. Learn why people use in-memory database (it's all about low latency) and how this technology can accelerate existing Oracle Database applications as well as new applications.
Posted: 04 Nov 2010 | Premiered: Nov 4, 2010

Oracle Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
IC White Papers | IC Multimedia | IC IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement