Examples of using Trusted computing in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Trusted Computing aims to detect unauthorized changes to a system based on an established security anchor embedded in a computing device.
we kept pushing on“trusted computing” and“SecureBoot”.
high bandwidth, and trusted computing and storage.
The individual, successful connections were signed off by a tester from the Trusted Computing Group- with an official TCG certificate.
TPM Management works with Trusted Platform Module(TPM) security hardware that supports the specifications defined by the Trusted Computing Group TCG.
It shall be demonstrated and evaluated using two case studies taken from the areas of trusted computing applications and secure software updates.
The TPM driver is a kernel-mode device driver designed for TPM security hardware that conforms to the Trusted Computing Group(TCG) 1.2 specifications.
As the long-standing market and innovation leader in the trusted computing space, Infineon offers a broad portfolio of standardized, certified ICT security systems.
We think it is a mistake to use the enemy's favorable-sounding propaganda terms such as"trusted computing" to describe a malicious plan.
On 19th November, as the first government, the German Ministry of the Interior published a white paper about"Trusted Computing" and"Secure Boot.
In addition, Intel TXT requires the system to contain a TPM v1.2, as defined by the Trusted Computing Group, and specific software for some uses.
open source) based upon the Trusted Computing Group's IF-MAP specification.
to certificate-based solutions in accordance with IEEE 802.1X to the implementation of the Trusted Computing Group's security concepts.
President and Chairman of the Trusted Computing Group.
VOGUE is based on the hardware properties of Trusted Computing and mobile devices and makes available a software architecture, which helps to achieve stronger trust in the devices by the service providers.
and"Trusted Computing" TC.
In August 2007 the Federal Ministry of Economy and Technology has issued a study carried out by WIK-Consult to analyse the recent status of"Trusted Computing" and its implacts on industry and society.
The commands on the default list have either been deprecated by the Trusted Computing Group or have privacy implications that should be considered before allowing these commands to be used with TPMs in your organization.
In August 2007 the Federal Ministry of Economy and Technology has issued a study carried out by WIK-Consult to analyse the recent status of"Trusted Computing" and its impacts on industry and society.
Trusted security protection OPTIGATM family for IP protection, secure communication, authentication and trusted computing in critical industrial installations M2M SIM for cellular wireless connectivity NFC Tag enabling smart asset tagging smart manufacturing Smart home and consumer.