Hardware  >   Electronic Components  >   Integrated Circuits  >  

Memory Chips

RSS Feed    Add to Google    Add to My Yahoo!
Memory Chips Reports
 
Memory corruption attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

FIFO Solutions for Increasing Clock Rates and Data Widths
sponsored by Texas Instruments, Inc.
WHITE PAPER: Steady increases in microprocessor operating frequencies and bus widths over recent years have challenged system designers to find FIFO memories that meet their needs.
Posted: 13 Apr 2000 | Published: 01 Jan 1996

Texas Instruments, Inc.

IBM BladeCenter: The Right Choice
sponsored by IBM
BROCHURE: In this brochure, you’ll read about the advantages of IBM® BladeCenter®, including its flexible architecture, easy deployment and energy-efficient features.
Posted: 11 Sep 2008 | Published: 11 Sep 2008

IBM

Virtual Data Center E-Zine Volume 33: Time to Consider a Second Hypervisor?
sponsored by SearchDataCenter.com
EZINE: This expert e-zine weighs the benefits of deploying a second hypervisor against the risks. Find out what factors you should consider when selecting an additional platform and learn how to improve the performance of your virtual environment.
Posted: 01 Jun 2011 | Published: 01 Jun 2011

SearchDataCenter.com

VKernel Case Study: HOVENSA
sponsored by VKernel
CASE STUDY: Using the VKernel Capacity Bottleneck Analyzer, HOVENSA is able to continuously monitor shared CPU, memory, and storage usage to properly allocate the required resources among all of its deployed virtual machines.
Posted: 14 Nov 2008 | Published: 14 Nov 2008

VKernel

Servers
sponsored by Schneider Electric
RESOURCE CENTER: This Interactive Data Center section outlines the various components that companies should consider when selecting a server, including processors, memory, and more.
Posted: 27 Dec 2012 | Published: 11 Apr 2011

Schneider Electric

The Journey to Unified Computing
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper explains how virtualization has removed many of the data center resource constraints of the past. Find out why management of your IT infrastructure should be integrated and learn how to set your business up for private cloud success.
Posted: 02 Jun 2011 | Published: 01 Apr 2010

Cisco Systems, Inc.

Virtual Data Center eZine - Vol.5
sponsored by Dell Compellent
EZINE: According to the Data Center Decisions 2008 Purchasing Intentions Survey, server selection and disaster recovery (DR) are front-burner issues for data center decision makers.
Posted: 24 Sep 2012 | Published: 31 Oct 2008

Dell Compellent

Red Hat Enterprise Linux 6 on Next-Generation Servers
sponsored by Dell, Inc., Intel and Red Hat
WHITE PAPER: This white paper examines the defining reliability, availability, and serviceability characteristics of Red Hat Enterprise Linux. Learn how they enable the addition and removal of physical and logical devices while improving system availability and increasing capacity.
Posted: 27 Apr 2011 | Published: 26 Apr 2011

Dell, Inc., Intel and Red Hat

IBM System X4: Delivering High Value through Scale Up
sponsored by IBM
WHITE PAPER: This IDC white paper explores the benefits of consolidation and virtualization, it shows how utilizing larger servers with scale-up architectures is a more cost effective approach to growing business needs.
Posted: 10 Jun 2008 | Published: 01 Jan 2008

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement