0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (216)
  • R250 - R500 (848)
  • R500+ (8,505)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems

Introduction to Hardware Security and Trust (Hardcover, 2012): Mohammad Tehranipoor, Cliff Wang Introduction to Hardware Security and Trust (Hardcover, 2012)
Mohammad Tehranipoor, Cliff Wang
R4,604 Discovery Miles 46 040 Ships in 12 - 19 working days

This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society's microelectronic-supported infrastructures.

More than Moore Technologies for Next Generation Computer Design (Hardcover, 2015 ed.): Rasit O. Topaloglu More than Moore Technologies for Next Generation Computer Design (Hardcover, 2015 ed.)
Rasit O. Topaloglu
R3,845 R3,563 Discovery Miles 35 630 Save R282 (7%) Ships in 12 - 19 working days

This book provides a comprehensive overview of key technologies being used to address challenges raised by continued device scaling and the extending gap between memory and central processing unit performance. Authors discuss in detail what are known commonly as "More than Moore" (MtM), technologies, which add value to devices by incorporating functionalities that do not necessarily scale according to "Moore's Law". Coverage focuses on three key technologies needed for efficient power management and cost per performance: novel memories, 3D integration and photonic on-chip interconnect.

Windows 10 For Seniors For Dummies, 4th Edition (Paperback, 4th Edition): P Weverka Windows 10 For Seniors For Dummies, 4th Edition (Paperback, 4th Edition)
P Weverka
R486 Discovery Miles 4 860 Ships in 12 - 19 working days

The easy way to get up and running with Windows 10! With Windows 10 For Seniors For Dummies, becoming familiarized with Windows 10 is a painless process. If you're interested in learning the basics of this operating system without having to dig through confusing computer jargon, look no further. This book offers a step-by-step approach that is specifically designed to assist first time Windows 10 users who are over-50, providing easy-to-understand language, large-print text, and an abundance of helpful images along the way! Protect your computer Follow friends and family online Use Windows 10 to play games and enjoy media Check your security and maintenance status Step-by-step instructions are provided to ensure that you don't get lost at any point along the way.

Towards Next Generation Grids - Proceedings of the CoreGRID Symposium 2007 (Hardcover, 2007 ed.): Thierry Priol, Marco Vanneschi Towards Next Generation Grids - Proceedings of the CoreGRID Symposium 2007 (Hardcover, 2007 ed.)
Thierry Priol, Marco Vanneschi
R4,388 Discovery Miles 43 880 Ships in 10 - 15 working days

This book is the fifth volume of the CoreGRID series. Organized jointly with the Euro-Par 2007 conference, The CoreGRID Symposium intends to become the premiere European event on Grid Computing. The aim of this symposium is to strengthen and advance scientific and technological excellence in the area of Grid and Peer-to-Peer Computing. The book includes all aspects of Grid Computing including service infrastructure. It is designed for a professional audience composed of researchers and practitioners in industry. This volume is also suitable for advanced-level students in computer science.

Processor Description Languages, Volume 1 (Hardcover): Prabhat Mishra, Nikil Dutt Processor Description Languages, Volume 1 (Hardcover)
Prabhat Mishra, Nikil Dutt
R1,941 Discovery Miles 19 410 Ships in 12 - 19 working days

Efficient design of embedded processors plays a critical role in embedded systems design. Processor description languages and their associated specification, exploration and rapid prototyping methodologies are used to find the best possible design for a given set of applications under various design constraints, such as area, power and performance.
This book is the first, comprehensive survey of modern architecture description languages and will be an invaluable reference for embedded system architects, designers, developers, and validation engineers. Readers will see that the use of particular architecture description languages will lead to productivity gains in designing particular (application-specific) types of embedded processors.
* Comprehensive coverage of all modern architecture description languages... use the right ADL to design your processor to fit your application;
* Most up-to-date information available about each architecture description language from the developers...save time chasing down reliable documentation;
* Describes how each architecture desccription language enables key design automation tasks, such as simulation, synthesis and testing...fit the ADL to your design cycle;

The Real MCTS/MCITP Exam 70-649 Upgrading Your MCSE on Windows Server 2003 to Windows Server 2008 Prep Kit with CDROM... The Real MCTS/MCITP Exam 70-649 Upgrading Your MCSE on Windows Server 2003 to Windows Server 2008 Prep Kit with CDROM (Paperback)
Brien Posey
R1,091 Discovery Miles 10 910 Ships in 12 - 19 working days

This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSEs) AD, Network Infrastructure, and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from the existing MCSE skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exams 70-640, 70-642, and 70-643.
The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers.
MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management.
In addition MCTS candidates must understant connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet.
* THE independent source of exam day tips, techniques, and warnings not available from Microsoft
* Comprehensive study guide guarantees 100% coverage of all Microsoft's exam objectives
* Interactive FastTrack e-learning modules help simplify difficult exam topics
* Two full-function ExamDay practice exams guarantee double coverage of all exam objectives
* Free download of audio FastTracks for use with iPods or other MP3 players
* 1000 page "DRILL DOWN" reference for comprehensive topic review

The Real MCTS/MCITP Exam 70-648 Prep Kit - Independent and Complete Self-Paced Solutions (Paperback): Brien Posey The Real MCTS/MCITP Exam 70-648 Prep Kit - Independent and Complete Self-Paced Solutions (Paperback)
Brien Posey
R1,077 Discovery Miles 10 770 Ships in 12 - 19 working days

This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSAs) AD and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from the existing MCSA skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exams 70-640 and 70-643.
The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers.
MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management.
In addition MCTS candidates must understant connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet.

* THE independent source of exam day tips, techniques, and warnings not available from Microsoft
* Comprehensive study guide guarantees 100% coverage of all Microsoft's exam objectives
* Interactive FastTrack e-learning modules help simplify difficult exam topics
* Two full-function ExamDay practice exams guarantee double coverage of all exam objectives
* Free download of audio FastTracks for use with iPods or other MP3 players
* 1000 page "DRILL DOWN" reference for comprehensive topic review

Evaluating Children's Interactive Products - Principles and Practices for Interaction Designers (Paperback): Panos... Evaluating Children's Interactive Products - Principles and Practices for Interaction Designers (Paperback)
Panos Markopoulos, Janet C. Read, Stuart Macfarlane, Johanna Hoysniemi
R1,248 Discovery Miles 12 480 Ships in 12 - 19 working days

Interactive products designed for children-whether toys, games, educational products, or websites-are increasingly embedded in children's lives and school experiences. Making these products safe, effective, and entertaining requires new methodologies for carrying out sound and unbiased evaluations for these users with unique requirements, environments, and ethical considerations.
This book directly addresses this need by thoroughly covering the evaluation of all types of interactive technology for children. Based on the authors' workshops, conference courses, and own design experience and research, this highly practical book reads like a handbook, while being thoroughly grounded in the latest research. Throughout, the authors illustrate techniques and principles with numerous mini case studies and highlight practical information in tips and exercises and conclude with three in-depth case studies. Essential reading for usability experts, product developers, and researchers in the field.
* Presents an essential background in child development and child psychology, particularly as they relate to technology.
* Captures best practices for observing and surveying children, training evaluators, and capturing the child user experience using audio and visual technology.
* Examines ethical and legal issues involved in working with children and offers guidelines for effective risk management.

Multimedia Multiprocessor Systems - Analysis, Design and Management (Hardcover, 2010): Akash Kumar, Henk Corporaal, Bart... Multimedia Multiprocessor Systems - Analysis, Design and Management (Hardcover, 2010)
Akash Kumar, Henk Corporaal, Bart Mesman, Yajun Ha
R2,971 Discovery Miles 29 710 Ships in 10 - 15 working days

Modern multimedia systems are becoming increasingly multiprocessor and heterogeneous to match the high performance and low power demands placed on them by the large number of applications. The concurrent execution of these applications causes interference and unpredictability in the performance of these systems. In Multimedia Multiprocessor Systems, an analysis mechanism is presented to accurately predict the performance of multiple applications executing concurrently. With high consumer demand the time-to-market has become significantly lower. To cope with the complexity in designing such systems, an automated design-flow is needed that can generate systems from a high-level architectural description such that they are not error-prone and consume less time. Such a design methodology is presented for multiple use-cases -- combinations of active applications. A resource manager is also presented to manage the various resources in the system, and to achieve the goals of performance prediction, admission control and budget enforcement.

Dynamically Reconfigurable Systems - Architectures, Design Methods and Applications (Hardcover, 2010 ed.): Marco Platzner,... Dynamically Reconfigurable Systems - Architectures, Design Methods and Applications (Hardcover, 2010 ed.)
Marco Platzner, Norbert Wehn
R3,144 Discovery Miles 31 440 Ships in 10 - 15 working days

Dynamically Reconfigurable Systems is the first ever to focus on the emerging field of Dynamically Reconfigurable Computing Systems. While programmable logic and design-time configurability are well elaborated and covered by various texts, this book presents a unique overview over the state of the art and recent results for dynamic and run-time reconfigurable computing systems.

Reconfigurable hardware is not only of utmost importance for large manufacturers and vendors of microelectronic devices and systems, but also a very attractive technology for smaller and medium-sized companies. Hence, Dynamically Reconfigurable Systems also addresses researchers and engineers actively working in the field and provides them with information on the newest developments and trends in dynamic and run-time reconfigurable systems.

Check Point NGX R65 Security Administration (Paperback): Ralph Bonnell Check Point NGX R65 Security Administration (Paperback)
Ralph Bonnell
R1,290 Discovery Miles 12 900 Ships in 12 - 19 working days

Check Point NGX R65 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN and management solutions. It enables enterprises of all sizes to reduce the cost and complexity of security management and ensure that their security systems can be easily extended to adapt to new and emerging threats. This title is a continuation of Syngress' best-selling references on Check Point's market leading Firewall and VPN products.
* First book to market covering Check Point's new, flagship NGX R65 Firewall/VPN.
* Provides bonus coverage for Check Point's upcoming NGX R65 Certification exams.
* Companion Web site offers customized scripts for managing log files.

Mobile Devices and Smart Gadgets in Medical Sciences (Hardcover): Sajid Umair Mobile Devices and Smart Gadgets in Medical Sciences (Hardcover)
Sajid Umair
R7,197 Discovery Miles 71 970 Ships in 10 - 15 working days

Each day, new applications and methods are developed for utilizing technology in the field of medical sciences, both as diagnostic tools and as methods for patients to access their medical information through their personal gadgets. However, the maximum potential for the application of new technologies within the medical field has not yet been realized. Mobile Devices and Smart Gadgets in Medical Sciences is a pivotal reference source that explores different mobile applications, tools, software, and smart gadgets and their applications within the field of healthcare. Covering a wide range of topics such as artificial intelligence, telemedicine, and oncology, this book is ideally designed for medical practitioners, mobile application developers, technology developers, software experts, computer engineers, programmers, ICT innovators, policymakers, researchers, academicians, and students.

Architecture Design for Soft Errors (Hardcover): Shubu Mukherjee Architecture Design for Soft Errors (Hardcover)
Shubu Mukherjee
R1,867 Discovery Miles 18 670 Ships in 12 - 19 working days

This book provides a comprehensive description of the architetural techniques to tackle the soft error problem. It covers the new methodologies for quantitative analysis of soft errors as well as novel, cost-effective architectural techniques to mitigate them. To provide readers with a better grasp of the broader problem deffinition and solution space, this book also delves into the physics of soft errors and reviews current circuit and software mitigation techniques.
TABLE OF CONTENTS
Chapter 1: Introduction
Chapter 2: Device- and Circuit-Level Modeling, Measurement, and Mitigation
Chapter 3: Architectural Vulnerability Analysis
Chapter 4: Advanced Architectural Vulnerability Analysis
Chapter 5: Error Coding Techniques
Chapter 6: Fault Detection via Redundant Execution
Chapter 7: Hardware Error Recovery
Chapter 8: Software Detection and Recovery
* Helps readers build-in fault tolerance to the billions of microchips produced each year, all of which are subject to soft errors
* Shows readers how to quantify their soft error reliability
* Provides state-of-the-art techniques to protect against soft errors

Fundamental Problems in Computing - Essays in Honor of Professor Daniel J. Rosenkrantz (Hardcover, 2009 ed.): Sekharipuram S.... Fundamental Problems in Computing - Essays in Honor of Professor Daniel J. Rosenkrantz (Hardcover, 2009 ed.)
Sekharipuram S. Ravi, Sandeep Kumar Shukla
R3,187 Discovery Miles 31 870 Ships in 10 - 15 working days

Fundamental Problems in Computing is in honor of Professor Daniel J. Rosenkrantz, a distinguished researcher in Computer Science. Professor Rosenkrantz has made seminal contributions to many subareas of Computer Science including formal languages and compilers, automata theory, algorithms, database systems, very large scale integrated systems, fault-tolerant computing and discrete dynamical systems. For many years, Professor Rosenkrantz served as the Editor-in-Chief of the Journal of the Association for Computing Machinery (JACM), a very prestigious archival journal in Computer Science. His contributions to Computer Science have earned him many awards including the Fellowship from ACM and the ACM SIGMOD Contributions Award.

High Quality Test Pattern Generation and Boolean Satisfiability (Hardcover, 2012): Stephan Eggersgluss, Rolf Drechsler High Quality Test Pattern Generation and Boolean Satisfiability (Hardcover, 2012)
Stephan Eggersgluss, Rolf Drechsler
R2,880 Discovery Miles 28 800 Ships in 10 - 15 working days

This book provides an overview of automatic test pattern generation (ATPG) and introduces novel techniques to complement classical ATPG, based on Boolean Satisfiability (SAT). A fast and highly fault efficient SAT-based ATPG framework is presented which is also able to generate high-quality delay tests such as robust path delay tests, as well as tests with long propagation paths to detect small delay defects.

The aim of the techniques and methodologies presented in this book is to improve SAT-based ATPG, in order to make it applicable in industrial practice. Readers will learn to improve the performance and robustness of the overall test generation process, so that the ATPG algorithm reliably will generate test patterns for most targeted faults in acceptable run time to meet the high fault coverage demands of industry. The techniques and improvements presented in this book provide the following advantages:

Provides a comprehensive introduction to test generation and Boolean Satisfiability (SAT);Describes a highly fault efficient SAT-based ATPG framework; Introduces circuit-oriented SAT solving techniques, which make use of structural information and are able to accelerate the search process significantly;Provides SAT formulations for the prevalent delay faults models, in addition to the classical stuck-at fault model;Includes an industrial perspective on the state-of-the-art in the testing, along with SAT; two topics typically distinguished from each other.

"

Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography - Efficient Modular Exponential Techniques... Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography - Efficient Modular Exponential Techniques (Hardcover, 1st ed. 2021)
Satyanarayana Vollala, N. Ramasubramanian, Utkarsh Tiwari
R4,929 Discovery Miles 49 290 Ships in 12 - 19 working days

Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly depends on the efficient implementation of modular exponentiation and modular multiplication. Since 1984, when Montgomery first introduced a method to evaluate modular multiplications, many algorithmic modifications have been done for improving the efficiency of modular multiplication, but very less work has been done on the modular exponentiation to improve the efficiency. This research monograph addresses the question- how can the performance of modular exponentiation, which is the crucial operation of many public-key cryptographic techniques, be improved? The book focuses on Energy Efficient Modular Exponentiations for Cryptographic hardware. Spread across five chapters, this well-researched text focuses in detail on the Bit Forwarding Techniques and the corresponding hardware realizations. Readers will also discover advanced performance improvement techniques based on high radix multiplication and Cryptographic hardware based on multi-core architectures.

SystemVerilog for Design Second Edition - A Guide to Using SystemVerilog for Hardware Design and Modeling (Hardcover, 2nd ed.... SystemVerilog for Design Second Edition - A Guide to Using SystemVerilog for Hardware Design and Modeling (Hardcover, 2nd ed. 2006)
Stuart Sutherland; Foreword by P. Moorby; Simon Davidmann, Peter Flake
R6,395 Discovery Miles 63 950 Ships in 12 - 19 working days

SystemVerilog is a rich set of extensions to the IEEE 1364-2001 Verilog Hardware Description Language (Verilog HDL). These extensions address two major aspects of HDL-based design. First, modeling very large designs with concise, accurate, and intuitive code. Second, writing high-level test programs to efficiently and effectively verify these large designs. The first edition of this book addressed the first aspect of the SystemVerilog extensions to Verilog. Important modeling features were presented, such as two-state data types, enumerated types, user-degined types, structures, unions, and interfaces. Emphasis was placed on the proper usage of these enhancements for simulation and synthesis.

IT and European Bank Performance (Hardcover): E. Beccalli IT and European Bank Performance (Hardcover)
E. Beccalli
R2,876 Discovery Miles 28 760 Ships in 10 - 15 working days

Does IT spending really boost bank performance? It is widely accepted that technological developments have had a major impact on reshaping both front- and back-office operations, but there still remains some doubt as to whether the massive spending on IT by banks has improved performance or productivity in this sector. Elena Beccalli provides a useful insight into the effects of IT investments on European bank performance, drawing on new empirical evidence that academics, bankers, and IT consultants alike will find to be a fascinating contribution to this ongoing strategic debate.

Constraining Designs for Synthesis and Timing Analysis - A Practical Guide to Synopsys Design Constraints (SDC) (Hardcover,... Constraining Designs for Synthesis and Timing Analysis - A Practical Guide to Synopsys Design Constraints (SDC) (Hardcover, 2013 ed.)
Sridhar Gangadharan, Sanjay Churiwala
R4,249 Discovery Miles 42 490 Ships in 12 - 19 working days

This volume gives the latest developments in on the mechanisms of cancer cell resistance to apoptotic stimuli, which eventually result in cancer progression and metastasis. One of the main challenges in cancer research is to develop new therapies to combat resistant tumors. The development of new effective therapies will be dependent on delineating the biochemical, molecular, and genetic mechanisms that regulate tumor cell resistance to cytotoxic drug-induced apoptosis. These mechanisms should reveal gene products that directly regulate resistance in order to develop new drugs that target these resistance factors and such new drugs may either be selective or common to various cancers. If successful, new drugs may not be toxic and may be used effectively in combination with subtoxic conventional drugs to achieve synergy and to reverse tumor cell resistance. The research developments presented in this book can be translated to produce better clinical responses to resistant tumors.

The Best Damn Exchange, SQL and IIS Book Period (Paperback): Henrik Walther, Mark Horninger, Chris Adams The Best Damn Exchange, SQL and IIS Book Period (Paperback)
Henrik Walther, Mark Horninger, Chris Adams
R1,292 Discovery Miles 12 920 Ships in 12 - 19 working days

Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools and the addition of features that support "anywhere access" present IT professionals with a steep learning curve. Making certain that these products are configured to meet regulatory compliance requirements adds addtionaly complexity to day-to-day management network management.
The Best Damn Exchange, SQL and IIS Book Period delivers an all-in-one reference for Windows System Administrators deploying the 2007 releases of these core Microsoft servers. The coverage is comprehensive, and provides users with just about everything they need to manage a Windows enterprise server. Special Bonus coverage includes how to gather and analyze the many log files generated by these servers.
Key Features:
* All-in-one coverage includes Exchange, SQL, and IIS Servers
* Integrated coverage on all key security features
* Bonus coverage includes analyzing server logs and integrating Communicator 2007

Reconfigurable Computing, Volume 1 - The Theory and Practice of FPGA-Based Computation (Hardcover): Scott Hauck, Andre Dehon Reconfigurable Computing, Volume 1 - The Theory and Practice of FPGA-Based Computation (Hardcover)
Scott Hauck, Andre Dehon
R2,174 Discovery Miles 21 740 Ships in 12 - 19 working days

The main characteristic of Reconfigurable Computing is the presence of hardware that can be reconfigured to implement specific functionality more suitable for specially tailored hardware than on a simple uniprocessor. Reconfigurable computing systems join microprocessors and programmable hardware in order to take advantage of the combined strengths of hardware and software and have been used in applications ranging from embedded systems to high performance computing. Many of the fundamental theories have been identified and used by the Hardware/Software Co-Design research field. Although the same background ideas are shared in both areas, they have different goals and use different approaches.This book is intended as an introduction to the entire range of issues important to reconfigurable computing, using FPGAs as the context, or "computing vehicles" to implement this powerful technology. It will take a reader with a background in the basics of digital design and software programming and provide them with the knowledge needed to be an effective designer or researcher in this rapidly evolving field.
- Treatment of FPGAs as computing vehicles rather than glue-logic or ASIC substitutes
- Views of FPGA programming beyond Verilog/VHDL
- Broad set of case studies demonstrating how to use FPGAs in novel and efficient ways

Keeping Found Things Found: The Study and Practice of Personal Information Management (Paperback): William Jones Keeping Found Things Found: The Study and Practice of Personal Information Management (Paperback)
William Jones
R1,438 Discovery Miles 14 380 Ships in 12 - 19 working days

WE ARE ADRIFT IN A SEA OF INFORMATION. We need information to make good decisions, to get things done, to learn, and to gain better mastery of the world around us. But we do not always have good control of our information - not even in the "home waters" of an office or on the hard drive of a computer. Instead, information may be controlling us - keeping us from doing the things we need to do, getting us to waste money and precious time. The growth of available information, plus the technologies for its creation, storage, retrieval, distribution and use, is astonishing and sometimes bewildering. Can there be a similar growth in our understanding for how best to manage information and informational tools?
This book provides a comprehensive overview of personal information management (PIM) as both a study and a practice of the activities people do and need to be doing so that information can work for them in their daily lives.
Introductory chapters of "Keeping Found Things Found: The Study and Practice of Personal Information Management" provide an overview of PIM and a sense for its many facets. The next chapters look more closely at the essential challenges of PIM, including finding, keeping, organizing, maintaining, managing privacy, and managing information flow. The book also contains chapters on search, email, mobile PIM, web-based support, and other technologies relevant to PIM.
*For more information and author blog visit http: //www.keepingthingsfound.com/.
* Focuses exclusively on one of the most interesting and challenging problems in today's world
* Explores what good and better PIM looks like, and how to measure improvements
* Presents key questions to consider when evaluating any new PIM informational tools or systems

An ASIC Low Power Primer - Analysis, Techniques and Specification (Hardcover, 2013 ed.): Rakesh Chadha, J. Bhasker An ASIC Low Power Primer - Analysis, Techniques and Specification (Hardcover, 2013 ed.)
Rakesh Chadha, J. Bhasker
R4,222 Discovery Miles 42 220 Ships in 12 - 19 working days

This book provides an invaluable primer on the techniques utilized in the design of low power digital semiconductor devices. Readers will benefit from the hands-on approach which starts form the ground-up, explaining with basic examples what power is, how it is measured and how it impacts on the design process of application-specific integrated circuits (ASICs). The authors use both the Unified Power Format (UPF) and Common Power Format (CPF) to describe in detail the power intent for an ASIC and then guide readers through a variety of architectural and implementation techniques that will help meet the power intent. From analyzing system power consumption, to techniques that can be employed in a low power design, to a detailed description of two alternate standards for capturing the power directives at various phases of the design, this book is filled with information that will give ASIC designers a competitive edge in low-power design.

Exam Ref AZ-204 Developing Solutions for Microsoft Azure (Paperback, 2nd edition): Santiago Munoz Exam Ref AZ-204 Developing Solutions for Microsoft Azure (Paperback, 2nd edition)
Santiago Munoz
R825 Discovery Miles 8 250 Ships in 12 - 19 working days

Prepare for Microsoft Exam AZ-204-and help demonstrate your real-world mastery of Microsoft Azure solution development. Designed for working Azure developers, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Solutions Associate level. Focus on the expertise measured by these objectives: * Develop Azure compute solutions * Develop for Azure storage * Implement Azure security * Monitor, troubleshoot, and optimize Azure solutions * Connect to and consume Azure services and third-party services This Microsoft Exam Ref: * Organizes its coverage by exam objectives * Features strategic, what-if scenarios to challenge you * Assumes you want to show your ability to design and build diverse Microsoft Azure cloud solutions, and successfully participate in all phases of their development About the Exam Exam AZ-204 focuses on knowledge needed to implement IaaS solutions; create Azure App Service Web Apps; implement Azure Functions; develop solutions using Cosmos DB and Blob Storage; implement user authentication, authorization, and secure cloud solutions; integrate caching and content delivery within solutions; instrument solutions to support monitoring and logging; develop an App Service Logic App; implement API Management; develop event- and message-based solutions. About Microsoft Certification Passing this exam fulfills your requirements for the Microsoft Certified: Azure Developer Associate credential, demonstrating your readiness to design, build, test, and maintain Microsoft Azure cloud solutions, and partner with other cloud professionals and clients to implement them. This exam is also a prerequisite for the Microsoft Certified: Azure DevOps Engineer Expert credential. See full details at: microsoft.com/learn

Emerging Technologies and Circuits (Hardcover, 2010 ed.): Amara Amara, Thomas Ea, Marc Belleville Emerging Technologies and Circuits (Hardcover, 2010 ed.)
Amara Amara, Thomas Ea, Marc Belleville
R4,505 Discovery Miles 45 050 Ships in 10 - 15 working days

With the semiconductor market growth, new Integrated Circuit designs are pushing the limit of the technology and in some cases, require speci?c ?ne-tuning of certain process modules in manufacturing. Thus the communities of design and technology are increasingly intertwined. The issues that require close interactions and colla- ration for trade-off and optimization across the design/device/process ?elds are addressed in this book. It contains a set of outstanding papers, keynote and tutorials presented during 3 days at the International Conference on Integrated Circuit Design and Technology (ICICDT) held in June 2008 in Minatec, Grenoble. The selected papers are spread over ?ve chapters covering various aspects of emerging technologies and devices, advanced circuit design, reliability, variability issues and solutions, advanced memories and analog and mixed signals. All these papers are focusing on design and technology interactions and comply with the scope of the conference. v . Contents Part I Introduction 1 Synergy Between Design and Technology: A Key Factor in the Evolving Microelectronic Landscape. . . . . . . . . . . . . . . . . . . . . . 3 Michel Brilloue]t Part II Emerging Technologies and Circuits 2 New State Variable Opportunities Beyond CMOS: A System Perspective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Victor V. Zhirnov, Ralph K. Cavin, and George I. Bourianoff 3 A Simple Compact Model to Analyze the Impact of Ballistic and Quasi-Ballistic Transport on Ring Oscillator Performance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 S. Martinie, D. Munteanu, G. Le Carval, and J. L. Autran Part III Advanced Devices and Circuits 4 Low-Voltage Scaled 6T FinFET SRAM Cells . . . . . . . . . . . . . . . . . . . 55 N. Collaert, K. von Arnim, R. Rooyackers, T."

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Advances in Intelligent Systems…
Sergey Yurish Hardcover R2,605 Discovery Miles 26 050
The System Designer's Guide to VHDL-AMS…
Peter J Ashenden, Gregory D. Peterson, … Paperback R2,421 Discovery Miles 24 210
Linux Command - A Comprehensive…
William Vance Hardcover R631 R575 Discovery Miles 5 750
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright Paperback R1,581 Discovery Miles 15 810
Demystifying Chipmaking
Richard F. Yanda, Michael Heynes, … Paperback R1,389 Discovery Miles 13 890
CSS and HTML for beginners - A Beginners…
Ethan Hall Hardcover R1,115 R950 Discovery Miles 9 500
Intelligent IT Outsourcing
Sara Cullen, Leslie Willcocks Paperback R1,982 Discovery Miles 19 820
Mobile Computing
Ian Phillips Hardcover R3,265 R2,962 Discovery Miles 29 620
DNSSEC Mastery, 2nd Edition
Michael W Lucas Hardcover R947 R853 Discovery Miles 8 530
Microsoft Windows 10 Tips & Tricks
Joan Lambert Fold-out book or chart R244 Discovery Miles 2 440

 

Partners