DCMI Reports

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Facilitating “sound practices” in risk management with IBM OpenPages ORM
sponsored by IBM
WHITE PAPER: This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

IBM

15 Minute Guide To Case Management
sponsored by EMC Corporation
WHITE PAPER: In 15 minutes we'll discuss case management, explain why it's important, suggest how it enables connected government, touch on how it can be applied across a variety of case types, discuss the components of a case management solution, and offer deployment guides and suggestions.
Posted: 23 Nov 2009 | Published: 23 Nov 2009

EMC Corporation

One Click Away: Where Does the Data Come From?
sponsored by LANSA
WHITE PAPER: Thirty-five percent of consumers say they would never use a mobile app again if it contained incorrect product data. This brief resource explores how the global standards body GS1 established the Global Data Synchronization Network (GDSN) as a means of combatting outdated, inconsistent product information.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

LANSA

E-Guide: Prioritizing Application Security Concerns
sponsored by TechTarget Security
EGUIDE: Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
Posted: 02 May 2012 | Published: 02 May 2012

TechTarget Security

Skills Forecast: Big Data Analytics
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report analyses the projected demand for IT professionals with Big Data Analytic skills in the UK over the next five years.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

TechTarget ComputerWeekly.com

IT Priorities 2021 - European Topics Infographic
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This year, a survey was conducted quizzing nearly 500 European IT sector professionals to gather what topics they identified as being imperative for 2021. In this infographic see whether remote working is here to stay, if there will be shifts in information management trends and what infrastructure tools will be deployed by most in 2021.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

TechTarget ComputerWeekly.com

An Introduction to Quantum Lifecycle Management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.
Posted: 18 Jan 2013 | Published: 05 Nov 2012

TechTarget ComputerWeekly.com

IEEE 1149.1 Use in Design for Verification and Testability at Texas Instruments
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document introduces those products that include ASIC cells, standard interface ICs, a bus master IC, a controller interface board for IBM compatibles, a high-speed scan interface, and software to control the scan bus.
Posted: 17 Mar 2002 | Published: 05 May 2000

Texas Instruments, Inc.