IT Management  >   Systems Design and Development  >   Hardware Engineering  >  

Integrated Circuit Design

RSS Feed    Add to Google    Add to My Yahoo!
Integrated Circuit DesignReports
 
Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

Design-for-Test Analysis of a Buffered SDRAM DIMM
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document presents a design-for-test analysis of a buffered synchronous dynamic random access memory dual in-line memory module.
Posted: 11 Mar 2002 | Published: 13 Aug 1996

Texas Instruments, Inc.

IEEE 1149.1 Use in Design for Verification and Testability at Texas Instruments
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document introduces those products that include ASIC cells, standard interface ICs, a bus master IC, a controller interface board for IBM compatibles, a high-speed scan interface, and software to control the scan bus.
Posted: 17 Mar 2002 | Published: 05 May 2000

Texas Instruments, Inc.

Five Major Power Distribution Considerations for Data Center Racks
sponsored by Avocent
WHITE PAPER: Power densities and power consumption costs in data centers are rising. Learn what to consider when choosing the appropriate power distribution products at the rack level.
Posted: 11 Feb 2008 | Published: 01 Feb 2008

Avocent

Core Network Services Survey: The Costs and Impacts of DNS and IP Address Management (IPAM) for the Enterprise and SMB
sponsored by Infoblox
ANALYST REPORT: Computerworld invited IT and business leaders to participate in a core network services survey that included specific questions about their DNS infrastructures and the costs of IP address management. The following report represents top-line results of that survey and can be used as a benchmark to measure your organization’s core network services.
Posted: 17 Jun 2010 | Published: 17 Oct 2008

Infoblox

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Great Customer Service Takes off at WestJet
sponsored by IBM
VIDEO: Learn why WestJet turned to IBM Security Identity and Access Management to gain a better understanding of its guests.
Posted: 09 Oct 2014 | Premiered: 24 Oct 2013

IBM

HP Propel Experience
sponsored by Hewlett-Packard Company
VIDEO: Tune into the following brief video to learn about HP Propel Portal, including how it can act as the go-to gateway for IT and as a single destination for business users to answer the questions they have for IT.
Posted: 17 Oct 2014 | Premiered: 17 Oct 2014

Hewlett-Packard Company

CW Buyer's Guide to Enterprise Collaboration
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this 10-page buyer's guide, Computer Weekly highlights what the IT leader needs to know to decide on the future of the organisation's communications strategy.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement