Special Report on
Trusted Computing Platforms
Trusted Computing Platforms - Trends
Latest Trending Story:
Security researcher Christopher Tarnovsky has shown a labor-intensive way to crack Trusted Platform Module chips widely used in government and enterprise. At the Black Hat DC Conference 2010 security researcher Christopher Tarnovsky of FlyLogic Engineering has demonstrated a way to defeat the Trusted Platform Module chips widely used to secure data in computers, identity cards, gaming systems like the Xbox 360, cable set-top boxes, and other electronics. TPM modules are widely used in enterprise, health care, government, and military applications to protect data through encryption, particularly on portable devices that might be ...
The relationship between trusted computing (TC) systems and digital rights management (DRM) systems is discussed. Trusted systems technology was developed in the 1960s, while the modern concept of DRM is a brainchild of the Internet era of the 1990s. While TC technology can be used to build DRM systems, both belong to different categories and should not be confused. TC technology may as well be deployed to protect "darknets" (Biddle et al. 2003) for sharing data. Making TC-based "copyright boxes" (Stefik 1999) is by no means a guarantee for business success in marketing ... Read More
SURVEY RESULTS FOR
TRUSTED COMPUTING PLATFORMS
Telstra Cloud Computing: Dr Steve Hodginkson talks about choices and trusted managed services
Cloudforce 2010: San Jose, June 22, 2010
- Mainsoft Webcast w/ Forrester Research: Drive SharePoint Adoption ...
- Patton Technical Webinar March 3, 11am EST /8am PST | Voip Store ...