Hardware  >   Electronic Components  >  

IC

RSS Feed    Add to Google    Add to My Yahoo!
IC Reports
 
Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

Embedded Security: Trusted Platform Module Technology Comes of Age
sponsored by Utimaco Safeware
WHITE PAPER: This paper examines the benefits that TPM chips bring to security-conscious businesses, and the ways in which this technology can elevate trusted computing to higher levels, enhancing security while simplifying usability.
Posted: 02 Feb 2009 | Published: 01 Dec 2005

Utimaco Safeware

Intervention areas for superfast broadband project Connecting Cumbria
sponsored by ComputerWeekly.com
DATA SHEET: UK broadband roll-out: Download this Excel spreadsheet detailing the intervention status of postcodes across Cumbria
Posted: 15 Oct 2013 | Published: 15 Oct 2013

ComputerWeekly.com

WAN Speak Musings – Volume I
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.
Posted: 02 May 2013 | Published: 02 May 2013

ComputerWeekly.com

Real-Time Data and Analytics Transforming Finance
sponsored by Workday
EGUIDE: Learn from Robert Kugel and Kristina West about how in-memory technology and real-time data are transforming finance and current barriers to adoption.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Workday

KPMG 2012 Global Technology Innovation Survey
sponsored by ComputerWeekly.com
IT BRIEFING: China and the US are the countries most likely to come up with disruptive technology breakthroughs over the next four years, but Europe is lagging, this report from KPMG reveals.
Posted: 27 Jun 2012 | Published: 27 Jun 2012

ComputerWeekly.com

E-Guide: Requirements for Virtualizing Exchange Server 2010
sponsored by SearchDataCenter.com
EGUIDE: This expert e-guide provides you with everything you need to know about virtualizing Exchange 2010. Discover the hardware, storage, memory, and availability requirements you will have to meet as well as the steps you must take before getting started with this process.
Posted: 15 Aug 2012 | Published: 15 Aug 2012

SearchDataCenter.com

E-Guide: SQL Server virtualization, hardware tips and trends
sponsored by Dell, Inc. and Microsoft
EGUIDE: When it comes to SQL Server virtualization, there are a few pitfalls lurking among the undeniable benefits, including hardware considerations specific to a virtualized SQL environment. Read this e-guide to learn expert tips for ensuring a successful SQL Server virtualization initiative.
Posted: 09 Feb 2012 | Published: 30 Jan 2012

Dell, Inc. and Microsoft

Virtual Data Center eZine - Vol.5
sponsored by Dell Compellent
EZINE: According to the Data Center Decisions 2008 Purchasing Intentions Survey, server selection and disaster recovery (DR) are front-burner issues for data center decision makers.
Posted: 24 Sep 2012 | Published: 31 Oct 2008

Dell Compellent

Virtualization Gets Down to Business as a Wellspring of Agility
sponsored by Dell, Inc. and AMD
EBOOK: This e-book, sponsored by Dell, Inc. and AMD, contains a variety of virtualization resources as well as product overviews and videos detailing the features and business benefits of AMD processors and Dell virtualization solutions.
Posted: 13 Sep 2010 | Published: 13 Sep 2010

Dell, Inc. and AMD
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
IC White Papers | IC Multimedia | IC IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement