- Analysis of Error Masking and Restoring Properties of Sequential Circuits
ARTICLE: Scaling of CMOS technology into nanometric feature sizes has raised concerns for the reliable operation of logic circuits, such as in the presence of soft errors. This paper deals with the analysis of the operation of sequential circuits.
in Public bookmarks with analysis circuits cloud computer computing error ieee masking of properties restoring sequential society
- EDMS Achieves Oracle Validated Integration with Oracle's PeopleSoft Enterprise 9.1
Solix Technologies, a Gold-level member of Oracle® PartnerNetwork (OPN), today announced it has achieved Oracle Validated Integration of Solix Enterprise Data Management Suite (EDMS) 4.5.1 with Oracle's PeopleSoft Enterprise 9.1.
in Public bookmarks with application archiving data data_subsetting database enterprise information lifecycle management masking pr press release retirement solix technologies test
- EDMS Solutions for Database Archiving
Visit Solix (leading provider of EDMS for ILM) at Booth # 1033, COLLABORATE 11, on April 10-14, 2011, Orange County Convention Center, West Orlando, Florida. Solix will be showcasing Solix EDMS Solutions for Database Archiving, Application Retirement, Database Provisioning, Data Masking and enabling Private Cloud.
in Public bookmarks with 11 archiving collaborate data database information lifecycle management masking solix solutions
- Industry’s Leading Application Retirement Solution
Solix Technologies’ comprehensive Data Management Platform used in conjunction with Sybase IQ will help customers enforce data governance across active and legacy applications in a consistent fashion to drive application portfolio management with reduced costs, data security, and compliance.
in Public bookmarks with application_retirement archiving data database edms information lifecycle management masking pr press release solix test
- Insurance Company Optim Data Masking-Case Study
Learn how Estuates Optim Data Masking Solution helps an insurance company privatizes its customers' personally- identifiable information (PII) stored in its test systems to avoid the risk of security breach and the risk of high potential losses. Read on to learn how with Estuate's customized approach, the company completed masking of a wide range of applications throughout the enterprise, with repeatable, efficient processes.
in Public bookmarks with case data estuate ibm-data-masking masking optim study whitepaper
- Low Cost NBTI Degradation Detection and Masking Approaches
Abstract—Performance degradation of integrated circuits due to aging effects, such as Negative Bias Temperature Instability (NBTI), is becoming a great concern for current and future CMOS technology. In this paper, we propose two monitoring and masking approaches that detect late transitions due to NBTI degradation in the combinational part of critical data paths and guarantee the correctness of the provided output data by adapting the clock frequency.
in Public bookmarks with approaches cloud computer computing cost degradation detection ieee low masking nbti society
- Protect Sensitive Data through Data Masking
IT organizations need to focus on risk avoidance, awareness and mitigation to protect sensitive data. By using data masking from Solix, organizations can eliminate the possibility of sensitive data being revealed through database clones, even if the entire cloned database is stolen or made public over the Internet.
in Public bookmarks with best data datamaskingtechniques mask masking practices sensitive tools
masking from all users