Examples of using Hardware-based in English and their translations into Slovak
{-}
-
Financial
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Official/political
-
Computer
-
Programming
Hardware-based key protection(cryptochip) provides protection against these threats.
This is why the Shuttle XPCslim Barebone DS10U also comes with a hardware-based solution.
Use a hardware-based video conferencing system(H. 323/videoconference SIP).
A Trusted Platform Module(TPM) 2.0 chip provides hardware-based protection for passwords and encryption keys.
The reason is to create programd“sleeper” agents using sophisticated electronic hardware-based hypnosis.
The 860 EVO supports AES 256-bit hardware-based encryption and is compliant with TCG Opal and IEEE 1667.
If you use a virtual machine,a dongle is required with the change(hardware-based software protection).
Keeper supports FIDO-compatible U2F hardware-based security key devices such as YubiKey as a second factor.
A dongle is essential for theuse of a licence server in a virtual environment(hardware-based software protection).
There are hardware-based accelerators for IPsec encryption and signing that can be used to minimize the performance impact on the servers' CPUs.
There is also an integrated Trusted Platform Module(TPM)2.0 chip provides hardware-based protection for passwords and encryption keys.
There are hardware-based accelerators for IPSec encryption and signing that you can use to minimize the performance impact from the server's CPU.
The firmware Trusted Platform Module(TPM) provides hardware-based encryption keys to help secure your data, e-mail, and user credentials.
It is a hardware-based solution that helps to avoid attacks by hackers looking to capture passwords and encryption keys to sensitive data.
A dramatic shift in technology over the past decade has transitioned our hardware-based Media industry to one with an IT-centric infrastructure.
It is a hardware-based solution that helps to avoid attacks by hackers looking to capture passwords and encryption keys to sensitive data.
Scalable Network Virtualization Services with VRF-Lite, MPLS, and native hardware-based VPLS as well as MPLS over GRE are available at full interface speeds.
As well as hardware-based system fail-safe functions and a hardware cryptography module that can be used to encrypt and decrypt communications data.
When seeking a stand-alone, independent,and simply controlled method of notification and summons, the hardware-based solution using the multi-purpose OCP16 operator's control panel is the right choice.
Popular hardware-based security key devices such as YubiKey can be used with Keeper to perform multi-factor authentication without the need to manually enter separate access codes.
The Intel Media Processor CE 3100 also featuresIntel Media Play Technology that combines hardware-based decoding for broadcast TV and optical media playback with software-based decode for Internet content.
Hardware-based e-money: includes e-money products that provide customers with a portable electronic device, typically an integrated circuit card containing a microprocessor chip( e.g. prepaid cards).
TPM: Trusted Platform Module 2.0 is a hardware-based security feature that can be used to create and manage computer-generated encryption keys.
TPM: Trusted Platform Module 2.0 is a hardware-based security feature that can be used to create and manage computer-generated encryption keys.
Infineon Technologies OPTIGA Trust X is a hardware-based security solution that provides robust security to the diverse applications in the Internet of Things, ranging from smart homes to drones.
By analogy, in network security a firewall is a software- or hardware-based system that works as a gatekeeper between trusted and untrusted networks or its parts. It achieves this by filtering out harmful or potentially unwanted content and communication.