Global Sources
EE Times-Asia
Stay in touch with EE Times Asia
EE Times-Asia > Advanced Search > WORM

WORM Search results

?
?
total search19 articles
2004-12-17 TDK unveils data cartridge for LTO Ultrium format
TDK has developed a WORM-type (Write Once Read Many) LTO Ultrium 3 data cartridge for the LTO Ultrium format.
2014-03-18 Sony, Panasonic develop 1TB archive disc
The archival discs will allow inter-generational compatibility between different formats, ensuring that data can continue to be read even as formats evolve.
2004-03-01 Protocol analyzers restore network health
Network protocol analyzers are a fundamental weapon for monitoring and troubleshooting security and performance problems.
2002-03-18 Plasmon 5.25-inch optical drive provides 8MBps transfers
Targeted for use in archiving, document imaging, call centers, and banking applications, the Ultra Density Optical (UDO) 5.25-inch optical drive technology features a 30GB capacity and a data transfer rate of up to 8MBps.
2005-04-18 Net processors for advanced security apps
The proper solution for defending LAN from security attacks is by using a multilayered protective 'net.
2006-10-20 Apple turns iPod into iWorm
Apple Computer on warned that some of its recently-shipped music players contained a worm that infected Windows PCs.
2003-08-28 Yongxin cermet trimmer features precision adjustment
Sichuan Yongxing Electronics Co. Ltd has rolled out its 3296 series of cermet trimmers with five styles and tubular packages.
2014-02-07 Wireless tech seen as threat to manufacturing security
The rising use of connected devices is exposing production sites to security breaches and cyber-attacks, compelling firms to seek ways to protect their networks, according to IHS.
2011-08-26 Wind River, McAfee strengthen security for embedded designs
The rise of Internet-enabled devices has given embedded system designers the challenge to incorporate security into their designs.
2006-05-29 Will Creative's patent suit sour Apple's core?
Creative recently filed a patent suit against Apple, claiming the user interface in the iPod directly infringes upon a patent used in its own portable media players.
2008-05-15 Unwrap Robot Guitar's autotuning secret
On the heels of its Ethernet Out guitar, Gibson Guitar has released the Robot Guitar, which automatically tunes to a range of standard and alternative tunings at the touch of a button.
2004-10-28 TDK data cartridge complies to LTO Ultrium format
TDK developed a third-generation LTO Ultrium 3 data cartridge that is in full compliance with the LTO Ultrium format.
2004-05-11 STMicro memory with additional 64-bit read-only UID
STMicro has introduced a low cost 'long range' contactless memory intended for high volume apps.
2007-11-27 Network security market expands in China
The sales volume of China's network security market rose 24.3 percent, reaching $240.83 million in Q3 06, reported CCID Consulting Co. Ltd.
2015-07-31 Improving industrial cyber security one layer at a time
Although Industrial Internet of Things affords improvement in efficiencies and optimisation, there still remains cyber security issues that need to be addressed.
2015-04-24 Huawei, NXP get ready for Industry 4.0
The partnership will fully integrate Huawei's ICT infrastructure and connectivity solutions and NXP's secure connectivity solutions. Collaboration will focus on Industry 4.0 applications.
2012-07-03 Enhancing embedded OS security
Here are some security best practices that embedded system developers need to consider in their designs.
2013-05-22 Enhance functional safety in embedded designs
Find out how to increase functional safety in networked embedded designs.
2009-09-24 Communication protocols on the LRI64 Long Range RFID Memory IC
This application note aims to analyze the different solutions and to describe the advantages of the LRI64 protocols.
Bloggers Say

Bloggers Say

See what engineers like you are posting on our pages.

?
?
Back to Top