You've requested...

Design-for-Test Analysis of a Buffered SDRAM DIMM

If a new window did not open, click here to view this asset.

Download this next:

A look into the minds of the 50 most influential IT leaders

This issue of Computer Weekly, we reveal the 7th annual UKtech50 – our list of the 50 most influential people in UK IT. And we talk to this year’s winner, ARM CEO Simon Segars, about the prospects for the UK tech sector after the uncertainty caused by the Brexit referendum vote. Read the issue now.

These are also closely related to: "Design-for-Test Analysis of a Buffered SDRAM DIMM"

  • Independent analysis of Bitdefender GravityZone

    Hackers are constantly advancing their tools and strategies to perform attacks more effectively. But when compared to those of hackers, how do your tools compare?

    Independent testing results can provide crucial information in their decision-making process, offering objective assessments of each solution’s efficacy under real-world conditions.

    This white paper presents the results of an independent test conducted by AV-Comparatives to provide an objective analysis of Bitdefender GravityZone.

    Download this white paper to unlock the findings of this independent test and see how GravityZone performed.

  • Royal Holloway: Secure connected and autonomous vehicles - the long road ahead

    Recent advances in technology have led to new safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed which are expected to reduce accidents, pollution and congestion.


    The Department for Transport 2019 publication, UK Connected and Automated Mobility Roadmap to 2030, is a comprehensive foundation to build on and the next decade promises to be an exciting time. At the same time as technology is progressing, society is changing, and urban populations are becoming more dense. Vehicles are set to become highly sophisticated mobile computers which monitor their surroundings and make instant decisions based on what they detect, independently and unsupervised. They will simultaneously exchange information across networks, using the information received from wide area services and also the digital devices around them as input for decision-making.

    CAVs will operate as nodes in the intelligent transport networks they rely on, consisting of dynamic and fixed elements. This article will look at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.

    This technology is in its infancy. What if CAVs malfunction or their processors hang? It is difficult to see how there can be any error margin – yet lives will rely on them functioning safely. In this new paradigm, mobile computers will be out and about, under no one’s direct control, and they will be too numerous to individually monitor. Will all go according to plan or should we strap in for a bumpy ride?

Find more content like what you just read:

  • Why you should have a disaster recovery testing plan in place

    With this guide, gain a better understanding of why a disaster recovery testing plan is important, how to efficiently conduct tests, and some tools and terms that you will encounter along the way.

    Download

  • A Computer Weekly eGuide to Workspaces

    In this eGuide we focus on all thing's workspace related. We dive into Google's new privacy settings, how the landscape of workspaces will look when the world of work fully returns and Google's new G Suite workspace overhaul.

    Download

  • How Illumio performs against simulated ransomware attacks

    In order to overcome ransomware, organizations need offerings that can handle the most dangerous malware. This paper presents the results of an array of attack simulations aimed at testing the security capabilities of Illumio’s Core offering. Read on to learn more about Illumio Core and see how it performs against emulated threats.

    Download

  • A Global Look at Emerging Regulatory Frameworks for AI Governance

    AI at scale is the end goal for many organizations. However, the uncertainty of future regulation and potential for risk - especially when it comes to Generative AI - presents challenges. This e-book unpacks how you can scale AI with ease by implementing AI governance best practices that will withstand the test of new regulations.

    Download

  • Managed testing services yield 40% savings for global FS leader

    This BFSI giant found their Agile transformation was faltering due to quality and agility issues. Qualitest's comprehensive Quality Engineering strategy delivered 40% cost savings, 85% defect reduction, and 3.6x defect detection improvement. Read the full case study to learn how.

    Download

  • Utility leader improves MDM for better service

    A major utility company upgraded its meter data management (MDM) system across three operating companies, deploying a common platform with new functionality. This case study highlights how the company improved billing services for 10 million customers and reduced IT costs by 60%. Read the full case study.

    Download

  • Royal Holloway: Rowhammer – From DRAM faults to escalating privileges

    Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them

    Download

  • Quick guide to strategic penetration testing

    This infographic explores how penetration testing can help businesses reduce costs, build trust and gain a competitive edge. Learn more about the benefits and stages of penetration testing by reading on.

    Download

  • CW Nordics February 2019

    In this ezine, we look at how digital transformation is shaking up the Nordic region and placing CIOs at the forefront of the social and economic changes that come with it. Norway, Denmark, Sweden and Finland are all heading in the same direction at pace and it appears this move is being fuelled by more traditional businesses.

    Download

  • Next-generation DAST: Introducing interactive application security testing (IAST)

    While dynamic application security testing (DAST) has been a go-to AppSec testing technique for decades, it is not without its drawbacks. This is where interactive application security testing (IAST) comes into play, building off of DAST, but analyzing apps from the inside out, rather than from the outside in. Read this white paper to learn more.

    Download

  • A thousand pen-testers, at your service

    Traditionally, manual penetration testing is a costly and unreliable endeavor. However, modern automated penetration testing platforms enable organizations to better understand their unique vulnerabilities, allowing them to stay ahead of tomorrow’s threats – read this data sheet to learn more.

    Download

  • Secure your apps by shifting left with Contrast

    Penetration tests can be expensive and time-consuming, an issue luxury car maker BMW realized very quickly when attempting to secure their massive number of apps. Discover how they were able to speed up their testing by shifting left with Contrast, which supports automated security tests throughout the entire software delivery lifecycle.

    Download

  • Publishing Test

    Publishing Test

    Download

  • Oracle cloud applications exhibit pragmatic adoption curve

    Oracle prides itself on the full suite of the business applications it offers in the cloud, arguably ahead of its closest rival, SAP – which has prioritised building on its in-memory database Hana over the cloud per se, though its S/4 Hana ERP system is increasingly delivered over the cloud, too.

    Download

  • How ERP partners can help you can ensure success

    ERP systems play a crucial role in business, but implementing them can be challenging. Dedicated quality engineering partners bring specialized expertise, independence, and advanced tools to ensure ERP success. Learn how these partners can optimize your ERP implementation in the blog.

    Download

  • Are we trusting social networks too much?

    This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks

    Download

  • PHC Test sessions res

    PHC Test sessions res

    Download

  • Penetration testing: Different types & how it works

    Many organizations that invested in web and mobile applications over the past few years were uneducated in the potential threats and failed to protect their end users from encountering availability and performance issues. Download this white paper to learn how it works and explore the different types of penetration testing.

    Download

  • Cloud leader’s guide to cloud testing

    In the eyes of many, cloud computing is now the backbone of modern business. Cloud testing can play a key role in safeguarding the cloud ecosystem. Read this blog article to learn more about cloud testing and why it matters.

    Download

  • Discover vulnerabilities & strengthen your security posture

    In this white paper, learn about how penetration testing can help you discover security weaknesses, evaluate response capabilities and get recommendations to strengthen your security posture.

    Download

  • Storage performance: From fundamentals to bleeding edge

    In this guide we look at LUN provision and management, RAID and flash storage, plus tuning for analytics workloads and key emerging technologies that can give your organisation a competitive advantage in mission-critical operations, such as storage-class memory, NVMe flash and persistent memory.

    Download

  • Computer Weekly - 17 December 2019: How data analytics is improving the world's greatest tennis players

    In this week's Computer Weekly, we talk to the organisation that runs men's tennis worldwide to find out how data analytics is transforming the sport. Intel processors delays will affect Windows 10 upgrades – we examine the implications. And we ask if AI is living up to the hype in enterprise IT. Read the issue now.

    Download

  • Software supply chain security & the SOC: End-to-end security is key

    Check out this report to learn how a modern software security assurance strategy can bring the SOC into the loop of continuous integration/continuous deployment (CI/CD) software development and release cycles. In addition, the report outlines comprehensive software supply chain security best practices.

    Download

  • Discover how AI is revolutionizing productivity

    Microsoft 365 Copilot leverages AI to boost productivity; read how it streamlines workflows, reduces information overload and elevates team collaboration in Word, Excel, Outlook, PowerPoint and Teams. Participate in a 3-day Copilot workshop to unlock its potential. Learn more in the full infographic.

    Download

  • Economic analysis of NGFW by Palo Alto Networks

    To deepen your understanding of the operational and financial benefits of a next-generation firewall, tune into this webcast that features subject-matter experts from Forrester.

    Download

  • Strengthen medical device cybersecurity with simulation technology

    Secure medical device development with simulation technology. Learn how to use penetration testing and fault injection to detect and mitigate cybersecurity vulnerabilities throughout the device lifecycle. Download the white paper to explore how simulation can strengthen your medical device cybersecurity.

    Download

  • IAST fact vs. fiction: Debunking 5 common myths

    While Interactive Application Security Testing (IAST) can help accelerate DevSecOps, some common misconceptions persist that can stymie even the most valiant of security testing efforts. This essential resource debunks 5 commonly-believed IAST myths.

    Download

  • The value of shift-left security testing in 2024

    Traditional security testing often comes too late, leaving customers vulnerable. Shift left security testing earlier in the SDLC can identify and fix vulnerabilities faster. Learn how to build an effective shift-left security testing strategy in this article.

    Download

  • Application security: best practices and risks

    Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.

    Download

  • 5 Steps to Ensure the Success of Your Cloud Data Migration

    How can organizations ensure they create tangible business value with a cloud data warehouse? It all starts with a plan. Business leaders need to map out a strategy and plan what to migrate, how to migrate it, and when to migrate it to maximize their investment in the cloud. Read on to learn 5 steps to leading a successful cloud migration.

    Download

  • SAST vs. IAST: Picking the Right Tool for the Job

    Watch this webinar for a demo of static application security testing (SAST) and interactive application security testing (IAST) solutions and determine which is the right tool for your needs.

    Download

  • Guide to Implementing Professional IT Documentation

    This white paper outlines best practices for implementing professional IT documentation, including defining goals, performing inventory and gap analysis, assessing data quality, and managing ongoing documentation. Download the full guide to learn how to ensure a smooth migration to a comprehensive IT documentation solution.

    Download

  • Speaker recruitment 101: How to enhance your webinars

    A great presenter can elevate a brand faster than almost anything else, but identifying the right speakers can be difficult for even the most experienced program planners. Plus, once you've identified your perfect presenter, how do you even get them on board? Watch this webinar to learn more.

    Download

  • Focus: Disaster recovery planning and virtualisation

    We take a good look at how features and functionality built into popular virtualisation environments can help with disaster recovery planning, testing and execution.

    Download

  • Utilities optimize smart grids and meters with QA and testing

    Smart grids, smart meters, and microgrids are transforming the energy industry. Expert QA and testing are crucial to unlock their full potential. Learn how utilities can optimize these technologies through quality engineering in this blog.

    Download

  • Build a better webinar: Crafting talking points

    Clear and succinct communication is an art, especially when it comes to live webinars. You may be an expert in your field, but do you present your content in a way your audience can actually understand? Watch this webinar to learn more.

    Download

  • Data integration to support modern BI and advanced analytics programmes

    In this e-guide we discuss why data integration and preparation are the unsung heroes of modern BI and advanced analytics. More so than ever, it would seem, due to the ever-increasing volume and variety of data.

    Download

  • What should you ask a pentesting service provider?

    To augment their security stances, many organizations have partnered with a penetration testing (pentesting) service provider. Is your business considering doing the same? Step in “11 Questions to Ask Your Pentesting Service Provider,” a white paper that can guide your market exploration. Read now to unlock insights.

    Download

  • CW ANZ, November 2018: Exploring blockchain

    Blockchain technology has been in the news due to its ability to provide much better security, transparency and efficiency. In this issue of CW ANZ, we look at how enterprises in Australia and New Zealand are using blockchain technology to improve security and efficiency, and what it takes to spur greater adoption among ANZ enterprises.

    Download

  • CW@50 - What was making the news in May

    The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of May over the past five decades.

    Download

  • Key findings on the state of IETF Transport Layer Security (TLS) 1.3

    Today, the push for the finalized IETF Transport Layer Security (TLS) 1.3 standard for network encryption continues to affect organization’s decisions. This white paper presents the key findings from a recent study conducted to investigate perceptions and beliefs of end users surrounding the adoption of the TLS 1.3 standard. Read on to learn more.

    Download

  • 10 major trends impacting health systems

    In the wake of the worst financial year in recent memory, 2023 was a story of resilience for health systems. On top of that, the entrance of generative AI tools (some valuable, others not), along with value-based care, has encouraged caution when investing in hyped healthcare technology. Learn about these trends, and 7 others, in this report.

    Download

  • The long march of S/4 Hana

    S/4 Hana, the ERP system built on SAP's in-memory, columnar database Hana has been on a long march through the enterprise since its launch in February 2013. In this e-guide, we discuss the pros and cons of upgrading to S/4 Hana, what the future has in store for the system and how its users are feeling about C/4 Hana integration.

    Download

  • Royal Holloway: Man proposes, fraud disposes

    In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.

    Download

  • Personalized Computational Approach Identifies Four Alzheimer's Subtypes

    Researchers presenting at this year's SNMMI Annual Meeting demonstrated that a computational model can accurately identify four subtypes of Alzheimer's disease, which may help generate insights into the condition's underlying biology and personalize future treatment methods. Download the article to know more.

    Download

  • WAAP Buying Guide: Essential elements, features, & benefits

    This buying guide for web app and API protection (WAAP) solutions explores how to protect your business from today’s ever-present threats, examine key elements of an effective WAAP, and gain comprehensive protection for your organization.

    Download

  • Computer Weekly – 21 August 2018: Delivering the potential of the internet of things

    In this week's Computer Weekly, we hear from early adopters of internet of things technologies about how to deliver on the potential of IoT. We examine strategies for combining hyper-converged infrastructure and cloud storage to best effect. And we find out how the UK government intends to use data to improve Britain's railways. Read the issue now.

    Download