Examples of using Trusted computing in English and their translations into Portuguese
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Official/political
This has the potential to undermine the applications of trusted computing to enforce Digital Rights Management,
The commands on the default list have either been deprecated by the Trusted Computing Group or have privacy implications that should be considered before allowing these commands to be used with TPMs in your organization.
This has the potential to undermine the applications of trusted computing to enforce DRM,
The electronic infrastructure needed to implement DRM is being sold by the industry under the tempting name of"Trusted Computing"(TC). The name suggests that a device equipped with this technology can be trusted by the user.
The Opal specification of the Trusted Computing Group(TCG) is a standard for creating
operating system providers such as Microsoft include Trusted Computing in their products if enabled.
operating system providers such as Microsoft all plan to include Trusted Computing in coming generations of products.
Trusted Computing could be used to guarantee participants in a grid computing system are returning the results of the computations they claim to be instead of forging them.
One of the early motivations behind trusted computing was a desire by media
Trusted Computing proponents such as International Data Corporation, the Enterprise Strategy Group
Criticism==Trusted Computing opponents such as the Electronic Frontier Foundation
hardware vendors will follow the technical specifications released by the Trusted Computing Group in order to allow interoperability between different trusted software stacks.
There is concern amongst critics that it will not always be possible to examine the hardware components on which Trusted Computing relies, the Trusted Platform Module,
Digital rights management===One of the early motivations behind trusted computing was a desire by media
Trusted Computing encompasses six key technology concepts,
Proponents of trusted computing believe that owner override defeats the trust in other computers since remote attestation can be forged by the owner.
People have voiced concerns that trusted computing could be used to keep
Shutting out of competing products===People have voiced concerns that trusted computing could be used to keep
Users unable to override===Some opponents of Trusted Computing advocate"owner override": allowing an owner
Such controversy has led opponents of trusted computing, such as free software activist Richard Stallman, to refer to it instead as treacherous computing, even to the point where some scholarly articles have begun to place scare quotes around"trusted computing. .