Hardware  >   Electronic Components  >  

Media Access Controllers

RSS Feed    Add to Google    Add to My Yahoo!
Media Access Controllers Reports
 
Cypress Semiconductor Case Study
sponsored by IBM
WHITE PAPER: Cypress Semiconductor is a leading global designer and manufacturer of mixed-signal, programmable solutions with 3,500 employees. It needed to bring new products to market before its competitors while reducing design costs, cutting total cycle time (TCT) and increasing potential revenues and profit margins.
Posted: 19 Sep 2014 | Published: 31 May 2014

IBM

Embedded Security: Trusted Platform Module Technology Comes of Age
sponsored by Utimaco Safeware
WHITE PAPER: This paper examines the benefits that TPM chips bring to security-conscious businesses, and the ways in which this technology can elevate trusted computing to higher levels, enhancing security while simplifying usability.
Posted: 02 Feb 2009 | Published: 01 Dec 2005

Utimaco Safeware

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

Real-Time Data and Analytics Transforming Finance
sponsored by Workday
EGUIDE: Learn from Robert Kugel and Kristina West about how in-memory technology and real-time data are transforming finance and current barriers to adoption.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Workday

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

CBS E-Book: The Next Generation of Mission-Critical Computing
sponsored by Oracle Corporation
EBOOK: View this E-Book to discover why Oracle's SPARC T3 servers represent the next wave of innovation for mission-critical computing and are a logical next step for dealing with today’s most critical data center challenges.
Posted: 14 Apr 2011 | Published: 14 Apr 2011

Oracle Corporation

Computer Weekly – 19 March 2013: Delivering software development success
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.
Posted: 18 Mar 2013 | Published: 19 Mar 2013

ComputerWeekly.com

Oracle's Sun Fire X4170 M2 and Sun Fire X4270 M2 Server Architecture
sponsored by Oracle Corporation
WHITE PAPER: Oracle introduces the new Sun Fire X4170 M2, the most versatile IT infrastructure building block server and the Sun Fire X4270 M2 server, the ideal server for clustered database and virtualized workloads.
Posted: 16 Mar 2011 | Published: 01 Jul 2010

Oracle Corporation

Webroot Secure Anywhere Cloud vs. Six Traditional Security Products
sponsored by Webroot
WHITE PAPER: PassMark Software recently conducted performance testing on eight security software products, on Windows 7 Ultimate Edition. View this white paper to uncover how the software performed in different areas. Each guideline is explained further in the resource.
Posted: 27 Jul 2012 | Published: 24 Jul 2012

Webroot

Virtualization & Networking - What's New with Dell 12th Generation PowerEdge Servers?
sponsored by Dell, Inc. and Intel®
VIDEO: This brief video explores key server purchasing criteria for your virtual environment. Discover a recommended hardware offering that optimizes memory utilization, reduces latency, and eliminates I/O bottlenecks here.
Posted: 26 Jul 2012 | Premiered: 09 Mar 2012

Dell, Inc. and Intel®
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement