Examples of using Hardware-based in English and their translations into Vietnamese
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
rise of the IoT, the WISE-710 terminal is also embedded with a Microchip ATECC508A security chip that provides ultra-secure hardware-based protection and security for cloud service data operations.
Keys-a tiny USB device, similar to Yubico's YubiKey, that offers hardware-based two-factor authentication for your online accounts with the highest level of protection against phishing attacks.
Google Cloud Next'18 convention, Titan Security Key is a tiny USB device-similar to Yubico's YubiKey-that offers hardware-based two-factor authentication(2FA) for online accounts with the highest level of protection against phishing attacks.
Traditionally, routers use microprocessors to make forwarding decisions in software, while the switch performs only hardware-based packet switching(by specialized ASIC with the help of content-addressable memory).[1] However, some traditional routers
in TPMs(Trusted Platform Modules), which are hardware-based cryptography chips that work with software technologies such as Microsoft's BitLocker(included in some editions of Vista
a dedicated adder) and a faster(more hardware-based) multiplier.[11]
A hardware-based firewall is easier to administer, too.
And, a hardware-based firewall is easier to maintain.
Hardware-based TPMs must implement version 2.0 of the TPM specification.
It includes hardware-based encryption for VPN and supports numerous security features.
Hardware-based and firmware-based TPMs must implement version 2.0 of the TPM specification.
A hardware-based SIP phone looks and behaves just like a normal phone.
Hardware-based security helps you experience online and offline activities with peace of mind.
However, hardware-based emulation isn't always feasible as it adds cost to the system.
Dedicated, hardware-based cryptographic key storage using AWS CloudHSM, allowing you to satisfy compliance requirements.
The security software market performed poorly, with most users in China preferring hardware-based security solutions.
We rely on a small number of third parties to manufacture some of our hardware-based products.
Dell is also including some security features such as TPM, a hardware-based cryptography and authentication technology.
On the other hand, hardware-based firewall solutions for small business protect all computers on your network.
It uses hardware-based virtualization to keep the software confined to a container, just like Microsoft's Hyper-V.