You've requested...

Design-for-Test Analysis of a Buffered SDRAM DIMM

If a new window did not open, click here to view this asset.

Download this next:

A look into the minds of the 50 most influential IT leaders

This issue of Computer Weekly, we reveal the 7th annual UKtech50 – our list of the 50 most influential people in UK IT. And we talk to this year’s winner, ARM CEO Simon Segars, about the prospects for the UK tech sector after the uncertainty caused by the Brexit referendum vote. Read the issue now.

These are also closely related to: "Design-for-Test Analysis of a Buffered SDRAM DIMM"

  • Computer Weekly – 12 March 2013: Will software-defined networking justify the hype?

    Computer Weekly – 12 March 2013: Will software-defined networking justify the hype?

    In this week’s Computer Weekly, we take an in-depth look at one of the hottest emerging technologies – software-defined networking – and what it means for IT departments. We visit Iceland, home of the greenest datacentres, and see what they offer to CIOs. We look at the growth of governance as a key task for CIOs as business executives grab more influence over IT spending. And we examine the data privacy considerations of developing mobile apps. Read the issue now.

     

    Buyer’s guide to software-defined networking – part one: SDN will transform your network – but not just yet

    Software-defined networking (SDN) will revolutionise the router and switch business and wipe millions off costs. So what’s holding it up?

     

    CIOs must be prepared for a shift toward governance

    The CIO is an evolving role and changes in technology and budgets, which are encouraging business departments to demand and use IT without consulting the IT department, mean the CIO’s role is shifting more towards governance.

     

    Iceland pushes green datacentres

    Renewable energy resources and free air cooling make Iceland a top datacentre location, but big firms have yet to take the plunge.

     

    Mobile data privacy rules cannot be ignored

    As increased mobile use leads to a greater focus on data privacy, CIOs must ensure all mobile apps developed in-house do not fall foul of the law.

     

    Case study: School building project uses Huddle to coordinate development suppliers

    When the Education Funding Agency wanted a means of sharing data with no training required it turned to a cloud-based platform.

     

    Interview: Corporate travel leader strives for more success to ‘change industry’

    Carlson Wagonlit Travel’s CIO talks about bringing uniformity and efficiency across international borders and keeping the IT in good shape.

     

    Opinion: Benefits management can make the difference to an IT project’s success

    A coherent approach involving senior management is vital to maximising IT investments in the current economic climate, write John Ward, emeritus professor at Cranfield University School of Management and Elizabeth Daniel, professor of information management at the Open University Business School.

     

    This week's Computer Weekly is sponsored by our own European User Awards

  • Royal Holloway: Secure connected and autonomous vehicles - the long road ahead

    Recent advances in technology have led to new safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed which are expected to reduce accidents, pollution and congestion.


    The Department for Transport 2019 publication, UK Connected and Automated Mobility Roadmap to 2030, is a comprehensive foundation to build on and the next decade promises to be an exciting time. At the same time as technology is progressing, society is changing, and urban populations are becoming more dense. Vehicles are set to become highly sophisticated mobile computers which monitor their surroundings and make instant decisions based on what they detect, independently and unsupervised. They will simultaneously exchange information across networks, using the information received from wide area services and also the digital devices around them as input for decision-making.

    CAVs will operate as nodes in the intelligent transport networks they rely on, consisting of dynamic and fixed elements. This article will look at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.

    This technology is in its infancy. What if CAVs malfunction or their processors hang? It is difficult to see how there can be any error margin – yet lives will rely on them functioning safely. In this new paradigm, mobile computers will be out and about, under no one’s direct control, and they will be too numerous to individually monitor. Will all go according to plan or should we strap in for a bumpy ride?

Find more content like what you just read:

  • A Computer Weekly eGuide to Workspaces

    In this eGuide we focus on all thing's workspace related. We dive into Google's new privacy settings, how the landscape of workspaces will look when the world of work fully returns and Google's new G Suite workspace overhaul.

    Download

  • A Computer Weekly eGuide to Workspaces

    In this eGuide we focus on all thing's workspace related. We dive into Google's new privacy settings, how the landscape of workspaces will look when the world of work fully returns and Google's new G Suite workspace overhaul.

    Download

  • Why you should have a disaster recovery testing plan in place

    With this guide, gain a better understanding of why a disaster recovery testing plan is important, how to efficiently conduct tests, and some tools and terms that you will encounter along the way.

    Download

  • The Many Faces of Software Testing

    Read this expertly compiled e-guide to learn how your security testing mangers can educate about, plan for, and validate the communication that is required across the enterprise to make sure that your software is secure and protected.

    Download

  • Integration Testing: Tips and Best Practices

    The term "integration test" means different things to different people. Integration testing can be challenging for all companies, no matter what the meaning. In this Solution Spotlight, readers will learn tips and best practices around Integration testing, as well as challenges they may face and how to avoid issues.

    Download

  • A careful approach to analyzing big & high-dimensional data

    A number of unique issues must be solved when analyzing big and very high-dimensional data and/or big data with discrete variables of very high cardinality. Read this white paper to learn how your team can perform the data pre-processing and analysis of big and wide data efficiently and effectively.

    Download

  • Devops Pipeline Health Check For World-Leading Manufacturer

    A world-leading manufacturer of coding and marking solutions was suffering from development inefficiencies, so they opted for a Ten10 DevOps Health Check. Thanks to the analysis, the company saw improved operational efficiency. Access this brief to learn how you can receive your own DevOps health check and improve your pipeline.

    Download

  • Vantage Inspect: Testing application code for security vulnerabilities

    Organizations need a way to test application code for security vulnerabilities that is easy, repeatable, and part of an automated process. Open this data sheet to learn how Vantage Inspect combines I-SCA, SAST, and Infrastructure-as-code technologies into one solution that can help inspect an application's source code, open-source, and more.

    Download

  • Step by Step: Best practices for security patch management

    Whether you're new to patch management or just need a refresher, this expert e-guide reviews best practices for security patch management to ensure accurate, effective patch testing in your organization.

    Download

  • Explore the perks of pen testing vulnerabilities

    In this guide, learn how to maximize your application security with automated and continuous web application scanning plus periodic pen testing to find and fix crucial vulnerabilities faster. This advanced approach will significantly reduce the risk of data breaches and other cybersecurity incidents. Get the details first-hand here.

    Download

  • E-Guide: Best practices for pen testing Web applications

    This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls.

    Download

  • Application security testing: Protecting your application and data

    Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.

    Download

  • E-Guide: Expert insights to application security testing and performance

    Two of the biggest challenges in an organization’s application security strategies are testing and integrating best practices within the application lifecycle. In this E-Guide, readers will learn best practices for testing injection integrating security measures into the application lifecycle.

    Download

  • E-Book: Definitive Guide to Exchange 2010 Migration Chapter 4: Load Testing and Security Exchange 2010

    This chapter explains how to test Exchange 2010 with native and third-party management tools and how best to protect your investment.

    Download

  • DAST to the future: Shifting the modern application security paradigm

    If the goal of application security testing is a digital future that is free from breaches, a DAST-forward approach is a must. Read on to learn how a modern paradigm can take your application security DAST to the future.

    Download

  • 4 key factors to choosing the best microphone for a room

    The optimal audio solution for any given meeting space depends on a wide range of factors, including the size of the room, the number of people involved, the number of presenters and the style of presentation. In this Shure white paper, get a sense of which microphones work best in different types of business rooms.

    Download

  • Best way to use HDR video without bogging down your workflow

    HDR video is all the buzz, but your creative staff will have trouble handling it with the usual systems. Access this white paper to learn how Dell Precision workstations with high-end video cards and 8k monitors can solve that. Take our short survey on your PC hardware purchase plans to get free access now.

    Download

  • E-Book: Technical Guide on Combatting Emerging Web Threats

    Attackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at Web threats and vulnerabilities – and how to protect your organization against them.

    Download

  • SD-WAN: Moving forward with the help of automation

    Software-defined WAN represents the largest change to networking that has occurred in recent memory. AI and automation look to take on the insights and analyses provided by SD-WAN and take things one step farther. Read this e-guide to learn more about the role automation plays in the future of SD-WAN.

    Download

  • Penguin Computing LiveData with MemVerge Memory Machine overview

    Access this e-book to for a full overview of LiveData with MemVerge Memory Machine a complete, end-to-end big memory computing solution for memory-centric real-time workloads.

    Download

  • E-Guide: VM in the Cloud

    Before you move services to the cloud, you must understand how the change in risk will affect your existing security strategy. View this expert resource now to gain best practices for cloud risk management and explore the importance of revisiting risk assumptions, pros and cons of aggregation, tips for pen testing cloud environments, and more.

    Download

  • Security testing for web & mobile apps

    According to the NTT 2020 Global Threat Intelligence Report, 55% of all attacks last year were application specific. Named a leader in a recent Gartner Magic Quadrant report, WhiteHat offers an application security testing bundle – designed to automate testing across the entire DevOps lifecycle. Download this solution brief to learn more.

    Download

  • Frontend testing: best practices for building end-to-end tests

    As UX often ultimately decides the success of an application, being able to test and optimize all aspects of potential user experience is an indispensable too. Read this white paper to learn best practices for end to end (E2E) testing and get the most of your application testing.

    Download

  • Royal Holloway: Rowhammer – From DRAM faults to escalating privileges

    Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them

    Download

  • HCL AppScan: Comprehensive product review

    This Enterprise Strategy Group (ESG) Technical Review highlights ESG’s evaluation of HCL AppScan and how it helps developers continuously secure applications. The review also discusses how to integrate AppScan into CI/CD pipelines and support other aspects of DevSecOps initiatives – read on for the full review.

    Download

  • 5 steps of a standard penetration test

    In today’s evolving threat landscape, the use of standard security testing methods cannot prevent today’s emerging risks. Access this white paper to learn how penetration testing is designed to evaluate your cybersecurity programs effectivenessIn 5 steps.

    Download

  • Physical dangers of IoT devices

    The proliferation of IoT devices is rising exponentially in homes and businesses. With this explosive growth comes productivity gains, but also potential dangers as IoT manufacturers race to market their product first. Read on to learn how Bluetooth- and Wi-Fi-enabled products present similar risks of bodily harm & privacy invasion.

    Download

  • CW Nordics February 2019

    In this ezine, we look at how digital transformation is shaking up the Nordic region and placing CIOs at the forefront of the social and economic changes that come with it. Norway, Denmark, Sweden and Finland are all heading in the same direction at pace and it appears this move is being fuelled by more traditional businesses.

    Download

  • Your ultimate guide to co-presenting webinars

    Having in-house expertise is great for presenting successful webinars, but you can risk entering a state of content fatigue if you overuse the same internal speakers. Consider asking a partner or customer to co-present your next webinar with you to spice up your content mix. Download “Your ultimate guide to partner presentations,” to get started.

    Download

  • Expert Steps for Testing DR Effectiveness

    This E-Guide outlines three key phases of DR performance evaluation and provides two examples of how conducting a business impact analysis can minimize the effects of a disruption.

    Download

  • Are we trusting social networks too much?

    This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks

    Download

  • High-Calibre Academy Engineers Supporting The Delivery Of Change Across The Full Technology Engineering Lifecycle.

    A lack of qualified technical engineers is affecting almost every business across software development. To help you address these challenges, Ten10 Academy is designed to provide adept engineers trained across the engineering lifecycle. Access this white paper to learn more.

    Download

  • How audio quality influences perceptions

    Download this article to learn why audio quality has a significantly greater impact than speaker credibility or presentation content on audience engagement.

    Download

  • Dynatrace: Cost savings and business benefits

    When you’re evaluating cloud observability and security solutions, it’s not just about capabilities. It’s about ROI. Read Forrester’s Total Economic Impact study, commissioned by Dynatrace, to explore the value of the Dynatrace platform. Download your complimentary report to see Forrester’s customer interviews, data analysis, and findings.

    Download

  • Using AI to Prevent Data Loss from Disk Drive Failure

    Ensuring the stability and reliability of HDDs and SSDs alike is critical to safeguarding that data. With this in mind, you can actually predict drive failure using AI. Examine this white paper to learn how and to get a glimpse at the predictive processes of Acronis Disk Health Service.

    Download

  • HIPAA compliance: A strategic, efficient approach

    Tap into this white paper to learn how you can efficiently manage your HIPAA program in a strategic fashion by assigning track leaders that are responsible for key elements of your HIPAA program.

    Download

  • Establish cost-effective object storage with Hitachi Content Platform

    Today's organizations are increasing their object storage demands for analytics workloads, but increased storage brings fear of increased cost. Read through this ESG report for an inside look at how Hitachi Content Platform performance testing demonstrated consistent and scalable high performance object storage while remaining cost-effective.

    Download

  • Computer Weekly - 17 December 2019: How data analytics is improving the world's greatest tennis players

    In this week's Computer Weekly, we talk to the organisation that runs men's tennis worldwide to find out how data analytics is transforming the sport. Intel processors delays will affect Windows 10 upgrades – we examine the implications. And we ask if AI is living up to the hype in enterprise IT. Read the issue now.

    Download

  • Application Security Handbook: Application Security: Managing Software Threats

    Check out this expert e-book from the editorial team at SearchSoftwareQuality.com to read the following three articles designed to help you address your application security before it's threatened: 'Ten Ways to Build in Security From the Start', 'Secure Your Mobile Apps in Enterprise Integration', and 'How to Boost Your Application Security Savvy'.

    Download

  • The priceless role of security testing in a thriving SaaS company

    Security testing your SaaS application is critical to winning customers’ trust, growing your business, and avoiding regulatory non-compliance penalties. This appknox guide shows security testing’s critical role in a SaaS company’s ecosystem and the key elements that need testing to ensure software quality and a seamless customer experience.

    Download

  • 2 important disaster recovery questions to ask

    Companies that encounter the most surprises during a disaster are the ones that don’t test their BCDR plans or perform tests that aren’t as close to reality as possible. Access this data sheet to learn the questions you should be asking about your BCDR plan, why testing will make your BCDR plans stronger, and helpful scenarios to test.

    Download

  • A novel approach to automating unstructured text processing

    It is a fact that many organizational processes are still dominated by paperwork. Even if most documents are now digitized, manual analysis of their content remains the rule.

    Download

  • Functional testing vs. non-functional testing: Which is best for your project?

    Is functional testing or non-functional testing more important to your project? The more pertinent question is how much of each is required to deliver the expected business benefit whilst mitigating the high priority risks. Access this white paper to learn more about both types of testing and when it makes sense to prioritize one over the other.

    Download

  • Oracle cloud applications exhibit pragmatic adoption curve

    Oracle prides itself on the full suite of the business applications it offers in the cloud, arguably ahead of its closest rival, SAP – which has prioritised building on its in-memory database Hana over the cloud per se, though its S/4 Hana ERP system is increasingly delivered over the cloud, too.

    Download

  • Oracle cloud applications exhibit pragmatic adoption curve

    Oracle prides itself on the full suite of the business applications it offers in the cloud, arguably ahead of its closest rival, SAP – which has prioritised building on its in-memory database Hana over the cloud per se, though its S/4 Hana ERP system is increasingly delivered over the cloud, too.

    Download

  • Discover an application stress test

    Download this data sheet to explore the capabilities of Snapt LoadTest, a managed service that tests your business-critical applications for their ability to operate under heavy load.

    Download

  • A thousand pen-testers, at your service

    Traditionally, manual penetration testing is a costly and unreliable endeavor. However, modern automated penetration testing platforms enable organizations to better understand their unique vulnerabilities, allowing them to stay ahead of tomorrow’s threats – read this data sheet to learn more.

    Download