Hardware  >   Electronic Components  >  

Media Access Controllers

RSS Feed    Add to Google    Add to My Yahoo!
Media Access Controllers Reports
Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

Embedded Security: Trusted Platform Module Technology Comes of Age
sponsored by Utimaco Safeware
WHITE PAPER: This paper examines the benefits that TPM chips bring to security-conscious businesses, and the ways in which this technology can elevate trusted computing to higher levels, enhancing security while simplifying usability.
Posted: 02 Feb 2009 | Published: 01 Dec 2005

Utimaco Safeware

Computer Weekly Special Report: Fujitsu
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11 page special report updated for 2014 gives you the facts on  Fujitsu its strategy, products and services and financial performance.
Posted: 04 Feb 2014 | Published: 04 Feb 2014


Two Server Memory Types Shaking Up Performance Expectations
sponsored by Dell EMC and Microsoft
EGUIDE: Memory manufacturers are getting creative for high performance. High Bandwidth Memory (HBM) and Hybrid Memory Cube (HMC) module could appear in the next generation of servers. This exclusive e-guide details each new memory type and how they're shaking up performance expectations.
Posted: 22 Sep 2016 | Published: 20 Sep 2016

Dell EMC and Microsoft

Sap business suite now available on Sap Hana
sponsored by ComputerWeekly.com
ANALYST REPORT: This analyst report from Nucleus Research assess the impact of SAPs decision to power SAP Business Suite by its SAP HANA in memory database technology.
Posted: 01 Feb 2013 | Published: 01 Feb 2013


Evolution of Integrity Checking with Intel® Trusted Execution Technology: an Intel IT Perspective
sponsored by Intel
WHITE PAPER: As part of an effort to address security concerns, Intel IT evaluated Intel® Trusted Execution Technology (Intel® TXT), a new security technology in Intel® processors. Intel TXT is a foundation technology that can be applied to enhance security in multiple usage models. Read this white paper to learn more.
Posted: 02 May 2011 | Published: 25 Mar 2011


Unified Visibility Fabric Architecture – A New Approach to Visibility
sponsored by Gigamon
WHITE PAPER: In this informative white paper, uncover a unified visibility fabric architecture that centralizes network monitoring and management tools for improved and simplified performance and security analysis.
Posted: 24 Sep 2013 | Published: 30 Aug 2013


Barcodes vs RFID: The pros and cons of each side reviewed
sponsored by IQMS
EGUIDE: This e-guide reviews the pros and cons of bar code technology, and addresses niche areas where radio frequency identification (RFID) is gaining traction.
Posted: 02 Oct 2013 | Published: 02 Oct 2013


Virtual Data Center E-Zine Volume 33: Time to Consider a Second Hypervisor?
sponsored by SearchDataCenter.com
EZINE: This expert e-zine weighs the benefits of deploying a second hypervisor against the risks. Find out what factors you should consider when selecting an additional platform and learn how to improve the performance of your virtual environment.
Posted: 01 Jun 2011 | Published: 01 Jun 2011


From faster performance to better BI, understanding the benefits of in-memory technology in SAP shops
sponsored by HP & Intel®
EBOOK: One of the most exciting technologies in the market today is in-memory. It holds the potential to make running SAP applications more efficient, and enable businesses to execute processes more effectively. In-memory is a huge part of SAP’s product strategy going forward.
Posted: 21 Feb 2011 | Published: 21 Feb 2011

HP & Intel®
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement