Volatile memory

Results: 1130



#Item
851Electronic engineering / Computing / EEPROM / Random-access memory / CMOS / Nonvolatile BIOS memory / Computer memory / Computer hardware / Non-volatile memory

PROJECT RESULT Enabling IC technologies for applications T123: CRESCENDO

Add to Reading List

Source URL: www.catrene.org

Language: English - Date: 2009-03-25 10:39:29
852Emerging technologies / Computing / Technology / Magnetoresistive random access memory / Spintronics / Random-access memory / Static random-access memory / Dynamic random-access memory / Intel / Computer memory / Computer hardware / Non-volatile memory

PROJECT PROFILE T126: Building-up embedded memories (BLUEBERRIES) ENABLING IC TECHNOLOGIES FOR APPLICATIONS

Add to Reading List

Source URL: www.catrene.org

Language: English - Date: 2009-03-25 10:36:56
853Computing / Magnetoresistive random access memory / Dynamic random-access memory / Flash memory / Random-access memory / Ferroelectric RAM / Non-volatile memory / Soft error / Read-only memory / Computer memory / Computer hardware / Electronics

CHAPTER 1 INTRODUCTION TO ADVANCED SEMICONDUCTOR MEMORIES[removed]SEMICONDUCTOR MEMORIES OVERVIEW

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2007-10-05 22:16:26
854Data privacy / Privacy law / Computer law / Non-volatile memory / USB flash drive / Data Protection Act / Universal Serial Bus / Internet privacy / Backup / Computer hardware / Computing / Computer storage media

Data Protection Roadshow – 14 March 2012 Questions and Answers 1. How do people lose personal data? Personal data can be accidentally or, worse, deliberately compromised in a number of ways; some examples are: •

Add to Reading List

Source URL: www.kcl.ac.uk

Language: English - Date: 2012-03-26 05:22:41
855EEPROM / Information / Bit / Data / Computer memory / Non-volatile memory / Computing

MEGAMOS CRYPTO Read-Write High Security Device - Memory organisation Description The MC is a high security Read-Write RFID Transponder. A challenge and re-sponse cryptoalgorithm with 96 bits of user-configurable secretke

Add to Reading List

Source URL: www.bicotech.com

Language: English - Date: 2006-11-26 12:21:57
856Memory barrier / Circular buffer / Volatile variable / CPU cache / Cache / Data buffer / Page table / Non-volatile memory / Parallel computing / Computer memory / Computing / Computer hardware

A Better Reduction Theorem for Store Buffers Ernie Cohen1 and Norbert Schirmer2,? 1 arXiv:0909.4637v1 [cs.LO] 25 Sep 2009

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2009-09-25 04:48:39
857Electronics / Electronic engineering / Integrated circuits / Emerging technologies / Digital electronics / Magnetoresistive random access memory / Flash memory / Non-volatile random-access memory / Soft error / Computer memory / Non-volatile memory / Computer hardware

1 Introduction Semiconductor memories are usually considered to be the most vital microelectronic component of digital logic system design, such as computers and microprocessor-based applications ranging from satellites

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2010-11-09 07:09:24
858Semiconductor device fabrication / Carbon nanotube / Time / Nanotechnology / Integrated circuit / Nonvolatile BIOS memory / Wafer / Materials science / Nano-RAM / Emerging technologies / Technology / Non-volatile memory

Lockheed Martin Nanosystems National Nanotechnology Initiative at Ten: Nanotechnology Innovation Summit December 2010 Dr. Brent M. Segal

Add to Reading List

Source URL: www.nsti.org

Language: English - Date: 2010-12-16 11:03:09
859Computing / Non-volatile memory / Computer memory / Computer storage media / Computer peripherals / Computer hardware / Linear Tape-Open / Solid-state drive

PDF Document

Add to Reading List

Source URL: storageconference.us

Language: English - Date: 2014-04-22 12:47:28
860Computing / Non-volatile memory / Plaintext / Laptop / USB flash drive / Encryption / Password / Hard disk drive / Laptop theft / Computer hardware / Cryptography / Disk encryption

March/April[removed]Dear Supplier, SECURITY OF DATA HANDLING PROCEDURES I am writing to seek your assurance about your handling of the Department’s information that relates to individual people – i.e. personal data, ab

Add to Reading List

Source URL: www.gov.uk

Language: English - Date: 2013-10-17 10:38:19
UPDATE