Examples of using Trusted computing in English and their translations into Portuguese
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Official/political
What is the Trusted Computing world like?
Trusted Computing and DRM enable remote control over content.
Sounds crazy? This is where Trusted Computing comes in.
Trusted Computing could be used to combat cheating in online games.
The storage root key is defined by the Trusted Computing Group TCG.
Trusted Computing Group members have refused to implement owner override.
The package requires that the caller have the Trusted Computing Base(TCB) privilege.
Trusted Computing, in effect, enables the publisher to write their own copyright law.
The TPM commands available to an owner are defined by the Trusted Computing Group.
The critical thing about Trusted Computing is that you cannot decide what is trustworthy and what is not.
In fact this right is threatened by the rise of things such as DRM and Trusted Computing.
Trusted Computing is seen as harmful or problematic to independent and open source software developers.
Suggestions have been made to use hash trees in trusted computing systems.
Preventing cheating in online games===Trusted Computing could be used to combat cheating in online games.
With Trusted Computing, the computer will consistently behave in expected ways, and those behaviors will be enforced by computer hardware and software.
The specifications, as published by the Trusted Computing Group, are open and are available for anyone to review.
TPM Management works with Trusted Platform Module(TPM)security hardware that supports the specifications defined by the Trusted Computing Group TCG.
Some limited form of trusted computing can be implemented on current versions of Microsoft Windows with third-party software.
The TPM driver is a kernel-mode device driver designed for TPM security hardware that conforms to the Trusted Computing Group(TCG) 1.2 specifications.
Trusted Computing(sometimes more accurately called"Treacherous Computing") means a computer can only run"Trusted" Software.
Some trends are visible as improving wireless, standards for technologies,better user interfaces, a trusted computing environment and miniaturization.
They suggest Trusted Computing as a possible enabler for future versions of mandatory access control, copy protection, and digital rights management.
Chip manufacturers Intel and AMD, hardware manufacturers such as HP and Dell, andoperating system providers such as Microsoft include Trusted Computing in their products if enabled.
The Linux kernel has included trusted computing support since version 2.6.13, and there are several projects to implement trusted computing for Linux.
The electronic infrastructure needed to implement DRM is being sold by the industry under the tempting name of"Trusted Computing"(TC). The name suggests that a device equipped with this technology can be trusted by the user.
Trusted Computing(TC) Trusted Computing(sometimes more accurately called"Treacherous Computing") means a computer can only run"Trusted" Software.
The current version of the TPM command specification defined by the Trusted Computing Group provides a set of 120 standard commands for use in directing the operation of the TPM.
Trusted Computing would allow companies to create a digital rights management(DRM) system which would be very hard to circumvent, though not impossible.
This has the potential to undermine the applications of trusted computing to enforce DRM, control cheating in online games and attest to remote computations for grid computing. .
Trusted Computing requests that all software and hardware vendors will follow the technical specifications released by the Trusted Computing Group in order to allow interoperability between different trusted software stacks.