You've requested...

IEEE 1149.1 Use in Design for Verification and Testability at Texas Instruments

If a new window did not open, click here to view this asset.

Download this next:

CW ASEAN: Defend against disruption

The security of industrial control systems (ICS) has come under the spotlight with several high-profile incidents affecting power plants and other critical infrastructure in recent years. What are the threats to these systems in ASEAN, and what is the common approach to securing ICS systems? In this month’s issue of CW ASEAN, we take a closer look at how ICS operators are improving the visibility of ICS environments without jeopardizing operations, addressing security vulnerabilities and enhancing cooperation between IT and operational technology teams.

Also in this issue:

Cyber attacks could have cost APAC organizations $1.75tn, report reveals

A study by Frost & Sullivan has found that losses from cyber security incidents could have accounted for 7% of the Asia-Pacific region’s gross domestic product in 2017

Most airports are not protected against cyber threats, says Israel airports chief

The chairman of the Israel Airports Authority paints a dismal picture of the state of cyber security in aviation, and offers advice on what can be done to avert the next disaster

CenturyLink signals APAC expansion

US telecoms giant’s Matt Gutierrez tells Aaron Tan how the firm is growing its footprint in Asia after its merger with Level 3

These are also closely related to: "IEEE 1149.1 Use in Design for Verification and Testability at Texas Instruments"

  • Security Think Tank: Critical National Infrastructure

    We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.

  • Wi-Fi for school buses: E-Rate eligible tools

    In 2024, school bus Wi-Fi solutions are a Category 1 Service for the E-Rate program.

    So, how can you achieve E-Rate eligibility? And what should you know about driving school bus connectivity?

    Here to answer those questions are 3 subject-matter experts:

    • Director of Public Sector Sales for Southeast at Cradlepoint, Ben Moebes
    • Principal E-Rate Consultant at KB & Associates, Jim Kerr
    • Sales Director at ByteSpeed Computers, Anna Hanson

    To debunk myths about school bus Wi-Fi, watch now.

Find more content like what you just read:

  • School bus Wi-Fi: What you should know

    Now that it is 2024, school bus Wi-Fi is E-Rate eligible. To discover 3 benefits that school bus Wi-Fi can deliver – and how to unlock those benefits – check out this overview.

    Download

  • School bus Wi-Fi: Use cases and case study

    Along with improving student and driver safety, school bus Wi-Fi can help bridge the “homework gap” by supplying students with the wireless access they need to complete assignments. To learn about other use cases for school bus Wi-Fi, and to chart Berks County’s school bus connectivity journey, watch this webcast.

    Download

  • 6 benefits of LTE and 5G in schools

    Whether education takes place in a classroom, at home or on a bus, wireless networking can improve experiences, enabling students to learn from anywhere. Browse this overview to learn about 6 ways that 5G and LTE can support students’ connectivity and security.

    Download

  • Free sample: CompTIA A+ IT Fundamentals

    Download this free chapter from ITF+ CompTIA IT Fundamentals to learn how to work with and decipher the command line interface, demonstrate fundamental commands and more.

    Download

  • Cloud-managed routers help Coach Atlantic keep consistent on-board Wi-Fi

    Coach Atlantic Maritime Bus is the largest motorcoach transportation provider in the Maritimes. Download this case study to learn how Cradlepoint used cloud-managed routers help Coach Atlantic keep consistent on-board Wi-Fi.

    Download

  • The state of API security

    Application programming interfaces (APIs) are the keystone to security integration as they enable communication between the various siloed solutions. In this API Security Series, Nexum review how to use these interfaces, exploit them, and prevent an organization’s name from appearing on the news. Read on to learn more.

    Download

  • A Computer Weekly eGuide to Workspaces

    In this eGuide we focus on all thing's workspace related. We dive into Google's new privacy settings, how the landscape of workspaces will look when the world of work fully returns and Google's new G Suite workspace overhaul.

    Download

  • AI for procurement organizations: A leader’s guide

    By 2026, Gartner predicts, over 80% of businesses will have leveraged generative AI–powered application program interfaces or models. So, what will this massive adoption mean for procurement organizations? In this 15-page white paper, discover AI use cases for procurement leaders.

    Download

  • Tailored ERP for enhanced operations: Food industry guide

    Fruitful Berries adopted Aptean's tailored ERP to enhance operations and standardize reporting. This shift resulted in increased efficiency and volume management without staff expansion. Discover how Aptean's ERP can revolutionize your business in the full case study.

    Download

  • API Management: The role of APis in digital business transformation

    Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.

    Download

  • A Computer Weekly buyer's guide to API management

    Application programming interfaces define the correct way for a developer to request services from an operating system. In this 14-page buyer's guide, Computer Weekly looks at how they provide connectivity, the key role of digital bonding, and the importance of keeping APIs up to date and secure.

    Download

  • Computer Weekly – 4 October 2022: Putting APIs to work

    In this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.

    Download

  • Enterprise Strategy Group report on Fortinet solutions

    TechTarget’s Enterprise Strategy Group (ESG) research found that 52% of organizations felt that security operations are more difficult today than they were two years ago.

    Download

  • E-book: How to automate network connectivity with APIs

    50% of all B2B collaboration occurs via application programming interfaces (APIs), according to a report from Cloud Elements. Along with driving collaboration, APIs can also automate network connectivity. Find out how in this e-book.

    Download

  • Artificial Intelligence: Spotlight on ASEAN

    In this e-guide, read about ASEAN's efforts in harnessing AI, the challenges ahead, as well as the rapid developments in the burgeoning field.

    Download

  • 10 prompt engineering tips and best practices

    Generative AI is finally coming into its own as a tool for research, learning, creativity and interaction. Asking the right questions is key to using generative AI effectively. Learn 10 tips for writing clear, useful prompts, including mistakes to avoid and advice for image generation.

    Download

  • How to choose the perfect integration architecture for your needs

    Integration architectures fall in two camps: direct application programming interface (API) connections (application-to-application) or integration hubs (DataOps solutions). Read this blog to explore both options and learn how to select the perfect integration architecture for your needs.

    Download

  • Improve your contact center efforts & other CX tips for success

    Today, customer experience (CX) is more important than ever, and doing the bare minimum throughout your contact center processes is no longer cutting it. So, what can contact center leaders do to enhance their CX efforts? Access this article to learn more.

    Download

  • Security leader’s guide to API security solutions

    Today, the efficiencies gained from APIs are overshadowed by the risk introduced to an IT enterprise. This e-book takes a realistic look at what buyers of API security solutions should look for when performing a product evaluation, helping you find the API security solution that’s right for your organization’s needs. Download now to learn more.

    Download

  • How Nutanix improves and simplifies VMware environments

    Download this e-book to learn how customers jointly leverage Nutanix and VMware to benefit from higher performance and availability, easy scalability, faster time-to-value, and unmatched cost-effectiveness.

    Download

  • Modernize compute environments to boost agility & lower TCO

    Modernizing compute environments with Cisco UCS X-Series and Intersight can help organizations shorten time to modernization, improve operational efficiency and reduce overall business risk. Download this analyst report by Enterprise Strategy Group to learn how that strategy can lower TCO by up to 31% compared to alternatives.

    Download

  • Leveraging AI for employee engagement & business wins: A report

    AI is transforming the employee experience by enhancing productivity, collaboration, and career management. This report explores how organizations can effectively implement AI to boost business success while addressing cultural, data, and training challenges. Download the full report to learn more.

    Download

  • Google named a Visionary for Security Information and Event Management (SIEM)

    Google Security Operations was named a Visionary in the 2024 Gartner® Magic Quadrant™ for Security Information and Event Management (SIEM). Participating for the first time, Google earned Visionary positioning thanks to its easy to use query interface which helps in threat hunting and rapid investigation. Download your complimentary copy.

    Download

  • Deploy ML across the hybrid cloud without being limited by architecture

    Discover in this product overview how Red Hat OpenShift AI can help your team develop, train, test, and deploy ML across the hybrid cloud without being dragged down by limited architectural choices.

    Download

  • Improve your IT documentation: 10 key criteria for success

    This white paper discusses the 10 most important criteria for choosing a professional IT documentation tool. It explains how such a tool provides valuable support for IT infrastructure management and digital transformation. Download the white paper now to learn more.

    Download

  • A new approach to regaining IT and security control

    Organizations are losing control over their IT and security as their technology environment becomes more complex. Learn how a "connectivity cloud" can help regain control by providing seamless, secure, and performant connectivity across any network, cloud, or user. Read the full white paper to discover the benefits.

    Download

  • SDS implementation: What's the best option for you?

    In this expert e-guide, explore today's SDS implementation options and help you decide which one fits your needs best: commodity or custom hardware. Additionally, uncover the important considerations – like the specific needs of virtual environments, access points, and APIs – that you'll need to address when formulating your storage strategy.

    Download

  • How D-ID Agents help Build Better Communications and Connections

    As organizations continue to search for ways to enhance customer engagement and operations, many are turning to technologies like Natural User Interface (NUI) tech, which focuses on AI digital human agents. Access this guide to learn more.

    Download

  • Enterprise Strategy Group report: Boosting OT cybersecurity

    Due to their lack of built-in security, OT assets – such as critical smart devices – tend to be highly susceptible to cyberattacks. In the face of increasingly complex cyberthreats, how can you level up your business’s OT cybersecurity? Unlock guidance in this Economic Validation report by TechTarget’s Enterprise Strategy Group (ESG).

    Download

  • Managing Android devices in the enterprise

    This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).

    Download

  • Fortinet recognized as a “challenger” in 2024 SIEM market

    Fortinet named a Challenger in the 2024 Gartner Magic Quadrant for Security Information and Event Management. Learn how Fortinet's FortiSIEM platform offers advanced ITOT security analytics, AI-driven detection, and multi-tenant capabilities for enterprises and MSSPs. Download the full Gartner report to learn more.

    Download

  • Navigating Success: AI Agents for Enterprise Growth webinar series

    As organizations continue to rely on customer experiences and service centers to drive business growth, many have turned to digital agents to make the process more efficient and cost-effective. Tune into this webinar to learn more.

    Download

  • Automate cyber risk management with an AI-powered platform

    The SAFE One Platform is an AI-powered, unified solution for managing first-party and third-party cyber risks. It provides real-time visibility, enables effective board reporting, justifies security budgets, and accelerates risk decisions. Read the full datasheet to learn how this platform can empower your cybersecurity efforts.

    Download

  • Accelerate app development with Red Hat OpenShift on AWS

    Accelerate application development across hybrid cloud with Red Hat OpenShift Service on AWS. This turnkey platform simplifies cloud-native app building, deployment, and management with integrated tools and AWS service integrations. Learn more about this solution in the full white paper.

    Download

  • Simplify architecture and security with an AI-powered network

    Streamline network architecture and security with an AI-powered approach. Learn how to improve performance, automate security, and maximize existing IT investments. Download this white paper to discover the benefits of a simplified, security-first network.

    Download

  • Generative AI: A comprehensive e-guide

    In this comprehensive e-guide, you’ll gain an understanding of the inner workings of gen AI, including a look at some of the most popular interfaces as well as key use cases. It also includes gen AI FAQs, potential concerns, and ethical considerations. Read on to learn how you can navigate your gen AI journey.

    Download

  • Face the future with D-ID’s marketing solutions

    Discover how D-ID’s groundbreaking AI technology can transform every stage of your marketing funnel, from lead generation to customer loyalty. This latest PDF guide dives deep into the power of integrating human elements into digital interactions.

    Download

  • Simplify Kubernetes management with SUSE Rancher Prime on AWS

    SUSE Rancher Prime simplifies Kubernetes deployment and management on AWS. It provides a single pane of glass for teams, centralized authentication, and access to a partner network. Streamline procurement and deployment on AWS Marketplace. Read the full solution sheet to learn more.

    Download

  • Addressing EV charging infrastructure design challenges

    Explore solutions from TE Connectivity to address design challenges in EV charging infrastructure, including EMI mitigation, power distribution, and bi-directional charging. Read the full product overview to discover how TE Connectivity can power the future of mobility.

    Download

  • Meta-analysis: 70% reduction in HAPI incidence across 19K+ patients with this monitoring system

    This meta-analysis tracks results across eight studies covering more than 34,711 patients, 19,136 of whom were monitored using the LEAF◊ Patient Monitoring System.

    Download

  • Job Scheduling Vs. Workload Automation: What's the Difference?

    Enterprise workload automation software addresses the challenges brought on by job scheduling packages by offering critical process enhancements such as faster workload deployments, simpler programming, and fewer errors. Access our free whitepaper on workload automation by taking a quick survey to get started.

    Download

  • How D-ID Agents Revolutionizes Customer Engagement in Banking and Financial Services

    D-ID Agents blends advanced technology and a human touch to transform banking and finance customer engagement. Learn how this AI-powered solution can enhance personalization, cost-efficiency, and 24/7 support. Read the full blog post to discover how D-ID Agents can revolutionize your customer experience.

    Download

  • Data protection: A business imperative

    In this e-guide: While many organisations are focusing on the huge fines for non-compliance and the significant financial and reputational costs of data breaches, it is the fact that good data protection and privacy practices builds consumer trust and enables the innovative use of data that should be driving organisations to act.

    Download

  • 6 Considerations When Planning Data Center Network Upgrades

    Discover in this white paper the 6 secrets data center operators must know to avoid costly maintenance and changes in fiber cable infrastructure for years to come.

    Download

  • CW APAC - December 2020: Trend Watch on cloud infrastructure

    The rise of 5G is driving telcos to embrace cloud-native and software-defined architectures. In this handbook focused on cloud infrastructure in the Asia-Pacific region, Computer Weekly looks at the slow and steady path businesses are taking to cloud-based radio access networks.

    Download

  • Ultimate IoT implementation guide for businesses

    IT administrators and CIOs considering an internet of things (IoT) deployment must have a thorough understanding of what the IoT is, how it operates, its uses, requirements, tradeoffs and how to implement IoT devices and infrastructures. In this e-guide, learn the requirements and use best practices for a successful deployment.

    Download

  • A case study in critical infrastructure interdependency

    This article in our Royal Holloway Security Series provides a short introduction to Critical Infrastructure Protection.

    Download