Hardware  >   Electronic Components  >  

MAC

RSS Feed    Add to Google    Add to My Yahoo!
MAC Reports
 
Embedded Security: Trusted Platform Module Technology Comes of Age
sponsored by Utimaco Safeware
WHITE PAPER: This paper examines the benefits that TPM chips bring to security-conscious businesses, and the ways in which this technology can elevate trusted computing to higher levels, enhancing security while simplifying usability.
Posted: 02 Feb 2009 | Published: 01 Dec 2005

Utimaco Safeware

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Webroot Secure Anywhere Cloud vs. Six Traditional Security Products
sponsored by Webroot
WHITE PAPER: PassMark Software recently conducted performance testing on eight security software products, on Windows 7 Ultimate Edition. View this white paper to uncover how the software performed in different areas. Each guideline is explained further in the resource.
Posted: 27 Jul 2012 | Published: 24 Jul 2012

Webroot

Dell High Availability Solutions Guide for Microsoft Hyper-V
sponsored by Dell and Microsoft
WHITE PAPER: This Dell High Availability Solutions Guide for Microsoft Hyper-V introduces different options to implement HA for Hyper-V environments.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Dell and Microsoft

Virtualization & Networking - What's New with Dell 12th Generation PowerEdge Servers?
sponsored by Dell, Inc. and Intel®
VIDEO: This brief video explores key server purchasing criteria for your virtual environment. Discover a recommended hardware offering that optimizes memory utilization, reduces latency, and eliminates I/O bottlenecks here.
Posted: 26 Jul 2012 | Premiered: 09 Mar 2012

Dell, Inc. and Intel®

Unified Visibility Fabric Architecture – A New Approach to Visibility
sponsored by Gigamon
WHITE PAPER: In this informative white paper, uncover a unified visibility fabric architecture that centralizes network monitoring and management tools for improved and simplified performance and security analysis.
Posted: 24 Sep 2013 | Published: 30 Aug 2013

Gigamon

E-Guide: Best practices to achieve optimal memory allocation and remote desktop user experience
sponsored by Dell, Inc.
EGUIDE: In this expert e-guide from SearchWindowsServer.com, learn best practices for Dynamic Memory allocation with Hyper-V R2 SP1. Plus, discover RemoteFX enhancements for RDP which delivers the "perfect" Windows 7 virtual desktop experience.
Posted: 02 Jan 2013 | Published: 16 Nov 2011

Dell, Inc.

IBM Systems Solution with SAP Discovery System
sponsored by IBM
WHITE PAPER: Whether you plan to integrate new SAP products into your infrastructure or are preparing for an upgrade, the IBM Systems solution with SAP Discovery system can help you thoroughly evaluate SAP applications - and validate their benefits.
Posted: 19 Jan 2011 | Published: 19 Jan 2011

IBM

Virtual Data Center E-Zine Volume 33: Time to Consider a Second Hypervisor?
sponsored by SearchDataCenter.com
EZINE: This expert e-zine weighs the benefits of deploying a second hypervisor against the risks. Find out what factors you should consider when selecting an additional platform and learn how to improve the performance of your virtual environment.
Posted: 01 Jun 2011 | Published: 01 Jun 2011

SearchDataCenter.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
MAC White Papers | MAC Multimedia | MAC IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement