Examples of using Platform module in English and their translations into Russian
{-}
-
Official
-
Colloquial
Tpm file extension Trusted Platform Module Password File.
The Trusted Platform Module(TPM) must be initialized before it can be used to help secure your computer.
The mast section weighs 82 kg and the platform module around 130 kg.
Prior to Iraq's invasion and occupation of Kuwait, AOC had contracted for the fabrication andinstallation of a new offshore platform module.
This connector connects to a TPM(Trusted Platform Module) module optional.
There are two major sets of AggreGate Platform modules sharing a common core that offer a unified vision of company's technological infrastructure.
Integrity checking requires a compatible trusted platform module(TPM).
Clearing the Trusted Platform Module(TPM) resets the TPM to an unowned state.
Integrity checking requires a compatible trusted platform module(TPM).
Unique built-in Trusted Platform Module(TPM) for highly secure cryptographic operations.
BitLocker provides the most protection when used with a Trusted Platform Module(TPM) version 1.2.
It uses a Trusted Platform Module(TPM) to provide enhanced protection for your data and to assure early boot-component integrity.
This connector connects to a TPM(Trusted Platform Module) module optional.
This connector supports Trusted Platform Module(TPM) system, which can securely store keys, digital certificates, passwords, and data.
This connector connects to a TPM(Trusted Platform Module) module optional.
Trusted Platform Module(TPM) is a secure cryptoprocessor embedded in the motherboard that can be used to authenticate a hardware device.
If the failure of any module is detected, the routing rules between the platform modules are automatically adjusted.
Support for Trusted Platform Module(TPM) 2.0 and virtual TPM- Enhanced security to protect the hypervisor and guest operating system against unauthorized access.
Cryptographic operations, for authentication and encryption,are only executed inside the unique built-in Trusted Platform Module(TPM).
The Trusted Platform Module(TPM) is an implementation of a secure cryptoprocessor that brings the notion of trusted computing to ordinary PCs by enabling a secure environment.
Graduating to EPLAN Electric P8 also gives Transpak the opportunity to add the complementary EPLAN Fluid platform module for engineering pneumatics and hydraulics.
A Trusted Platform Module(TPM) chip is not strictly required to install this release, though it is necessary in order to use certain features such as BitLocker Drive Encryption.
We secure data from hackers by encrypting it at the hardware level,using a cryptographic key that is safely stored in an unique built-in Trusted Platform Module(TPM).
Semantic graph and platform modules allow us not only search for words in the dictionary, but also identify context environment, which ensures completely accurate text meaning understanding.
Like all Bosch network cameras, the MIC IP models offer various software and hardware measures,such as a built-in Trusted Platform Module, to keep video data secure.
Jafarzadeh informed about the special microscheme- TPM(Trusted Platform Module) used on many computers to support additional security features and stated that up to now, more than 500 million computers have been equipped with the TPM chip.
Like all Bosch network cameras, these models offer various software and hardware measures,such as a built-in Trusted Platform Module, to keep video data secure.
All Bosch IP-cameras have a trusted platform module(TPM) installed to safely store cryptographic keys and enable encryption of all video data, which is then sent from the camera to the Genetec Archiver using SRTP(Secure Real-Time Transport Protocol).
And, like all Bosch network cameras, the range offers various sophisticated software andhardware measures, such as a built-in Trusted Platform Module, to maintain the security of vital video data.
Snowball devices use tamper-resistant enclosures, 256-bit encryption, andan industry-standard Trusted Platform Module(TPM) designed to ensure both security and full chain-of-custody for your data.