USB Power Manager requires no external control.

USB Power Manager requires no external control.

Single-IC, autonomous power manager and battery charger, Model LTC4055 provides power to USB peripheral device and charges peripheral's single-cell Li-Ion battery from USB VBUS or wall adapter power supply. Unit automatically reduces battery charge current as system load current increases. Once power source is removed, current flows from battery to load through internal low loss diode. Float...

Read More »
Power Supply Toolkit addresses AC/DC topologies.

Power Supply Toolkit addresses AC/DC topologies.

Web-based Offline Power Supply Toolkit provides tutorials such as Magnetic Reminder, which serves as primer on practical application of magnetics in power supply design. Design aids allow users to decide between topologies, evaluate advantages and disadvantages of each topology, and review background information for choosing optimal topology for particular design.

Read More »

Network Hub optimizes broadband performance for SMBs.

ARCXtend AX1255-SM Strand Mount Network Hub enables cable operators to deliver dynamically optimized, fixed wireless IP service. Product incorporates ARCSmart(TM) performance optimization engine and remote monitoring capabilities that enable seamless deployment into existing cable plant infrastructure. Wireless last mile solution also incorporates PureBurst(TM) Upstream Ingress Noise Suppression...

Read More »

Interfacing Product links laboratory equipment.

Links for LIMS consists of configurable instrument interfacing and integration product suited for Aquakem/konelab Instruments used in Water and Environmental Laboratories. Integrating with LIMS provides benefits in terms of analytical quality and interconnectivity between laboratory systems, including analytical instrumentation. It requires no user programming to implement and is suited for...

Read More »

Software offers client and storage support.

TotalStorageÂ-® SAN File System is a network-based heterogeneous file system for data sharing and policy-based storage management in open environment. It can reduce overall amount of storage required by allowing storage resources to be shared across servers. Software supports clients on Red Hat Linux servers, IBM and select non-IBM storage and multiple types of storage concurrently, unlimited...

Read More »

Software delivers OpenSSH technology on z/OS platform.

Ported Tools for z/OSÂ-® allows non-z/OS server to communicate with z/OS server using IETF Secure Shell protocols SSH1 and SSH2 in secure environment. OpenSSH provides privacy features through encryption of data that passes through network, and data integrity is provided by ensuring that data travels over network unaltered. Software also provides secure login and file transfer mechanism,...

Read More »

Software automates I/O, processor, and system operations.

TivoliÂ-® System Automation for z/OSÂ-® V2.3 can help customers who have single processor z/OS systems and Parallel SysplexÂ-® clusters by providing functions that ease systems management. It offers message management with self-configuration and single action automation policy. Users can navigate through dependency graph, fill or overwrite start and stop requests with customer chosen...

Read More »

Software moves resources from failing system before crash.

Tivoli System Automation for Multiplatforms v1.2 supports AIX and premier Linux distributions on IBM eserver and 32-bit Intel(TM)-based systems. Upon discovering system, application, and resource failures, software decides recovery actions using policy-based availability goals and knowledge about application components and their relationships. When configuration or states change, software alerts...

Read More »

Software generates event-based messages.

CICSÂ-® Business Event Publisher for MQSeriesÂ-®, V1.2 enables extension and re-use of existing CICS applications, through events, to drive new business processes and utilize new technology. It generates user-defined WebSphereÂ-® MQ messages as a side effect when certain EXEC CICS commands are executed by application, or when VSAM, DB2Â-®, or IMS(TM) data is modified. User can...

Read More »

Software assesses IT systems for security compliance.

TivoliÂ-® Security Compliance Manager V5.1 lets user define consistent security policies and monitor compliance of defined policies. With automation and centralization features, software cuts time needed to manage security policies, establish compliance, and conduct security audits. Manual processes are moved to automated scan of systems and desktops.

Read More »
Sponsored

Simple Connection – MGB with EtherNet/IP

The new MGB with EtherNet/IP is a leap forward in access door safety. Designed for easy installation, flawless performance, and long service life, it is engineered with robust features and cutting-edge technology that places it firmly at the leading edge of the door safety device industry. To learn all about the benefits of the Euchner MGB, see our video.

Read More »

All Topics