Hardware  >   Electronic Components  >  

Media Access Controllers

RSS Feed    Add to Google    Add to My Yahoo!
Media Access Controllers Reports
 
Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

Embedded Security: Trusted Platform Module Technology Comes of Age
sponsored by Utimaco Safeware
WHITE PAPER: This paper examines the benefits that TPM chips bring to security-conscious businesses, and the ways in which this technology can elevate trusted computing to higher levels, enhancing security while simplifying usability.
Posted: 02 Feb 2009 | Published: 01 Dec 2005

Utimaco Safeware

Announcing a Breakthrough Processor: Software in Silicon
sponsored by Oracle Corporation
VIDEO: In this webinar, John Fowler, Executive Vice President of Systems at Oracle, will introduce to you the all-new family of M7 Systems built on the new 32-core, 256-thread SPARC M7 microprocessor. View this video now to understand how to use a broad set of ciphers for all your apps, complete with end-to-end security.
Posted: 12 Nov 2015 | Premiered: 26 Oct 2015

Oracle Corporation

Dell High Availability Solutions Guide for Microsoft Hyper-V
sponsored by Dell, Inc.
WHITE PAPER: This Dell High Availability Solutions Guide for Microsoft Hyper-V introduces different options to implement HA for Hyper-V environments.
Posted: 28 Jan 2010 | Published: 11 Dec 2008

Dell, Inc.

Increase security and ROI: The benefits of Intel vPro technology
sponsored by Intel
PRODUCT DEMO: Significantly improve your company’s IT security and ROI with the all new 2010 Intel® Core™ vPro™ processor family.
Posted: 28 Apr 2010 | Premiered: 28 Apr 2010

Intel

Global Application and SAN Acceleration with Solid-State Storage
sponsored by FalconStor Software
WHITE PAPER: This paper investigates the deployment models of solid-state storage, and explains how the FalconStor Network Storage Server SAN Accelerator solution enhances this technology to deliver additional value through application-specific and global SAN acceleration.
Posted: 25 Oct 2010 | Published: 25 Oct 2010

FalconStor Software

Best Practices for a Data Warehouse on Oracle Database 11g
sponsored by Oracle Corporation
WHITE PAPER: In order to ensure the enterprise data warehouse will get the optimal performance and will scale as your data set grows you need to get three fundamental things correct, the hardware configuration, the data model and the data loading process.
Posted: 19 Jan 2009 | Published: 19 Jan 2009

Oracle Corporation

Dell PowerEdge R720xd
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Easily scale for massive data growth with the excellent storage capacity, memory density and I/O capabilities of the PowerEdge™ R720xd rack server.
Posted: 03 Jan 2014 | Published: 30 Sep 2013

Dell, Inc. and Intel®

Barcodes vs RFID: The pros and cons of each side reviewed
sponsored by IQMS
EGUIDE: This e-guide reviews the pros and cons of bar code technology, and addresses niche areas where radio frequency identification (RFID) is gaining traction.
Posted: 02 Oct 2013 | Published: 02 Oct 2013

IQMS

Unified Visibility Fabric Architecture – A New Approach to Visibility
sponsored by Gigamon
WHITE PAPER: In this informative white paper, uncover a unified visibility fabric architecture that centralizes network monitoring and management tools for improved and simplified performance and security analysis.
Posted: 24 Sep 2013 | Published: 30 Aug 2013

Gigamon
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement