Trusted system

Results: 509



#Item
351X86 architecture / Out-of-band management / Intel vPro / Trusted computing / Intel Active Management Technology / Intel / Trusted Execution Technology / X86 virtualization / AES instruction set / Computing / System software / Computer architecture

September[removed]Real-World Guide Enterprise Mobile Security: 4th Generation Intel® Core™

Add to Reading List

Source URL: mobilecomputing.crn.com

Language: English - Date: 2014-04-08 16:16:44
352Business / Money / International taxation / Public economics / Taxation / Finance / Public finance / Tax

Office in charge: Tax Bureau Goal Establish a tax system which can build a mutually-supportive society, adapt to socioeconomic structural changes and be trusted by the people.

Add to Reading List

Source URL: www.mof.go.jp

Language: English - Date: 2012-07-02 13:02:09
353Out-of-band management / Computer hardware / Intel vPro / Intel Active Management Technology / Intel / Trusted Execution Technology / X86 virtualization / AES instruction set / Intel AMT versions / System software / X86 architecture / Computing

Sales Brief Top Reasons to Standardize on 4th Gen Intel® Core™ vPro™ Processor Family INTEL® CORE™ vPRO™ PROCESSOR-BASED BUSINESS CLIENTS DELIVER A COLLECTIVE SOLUTION FOR ENTERPRISE-READY SECURITY AND

Add to Reading List

Source URL: arcade.intel.com

Language: English - Date: 2014-04-29 19:40:22
354X86 architecture / Intel / Cloud computing / Rootkit / McAfee / X86 virtualization / Malware / Intel vPro / Intel Active Management Technology / System software / Computing / Computer security

Introducing the Intel Science and Technology Center for Secure Computing Abstract Suppose all your personal and professional digital devices could interact on your behalf, like trusted agents. Imagine having confidence t

Add to Reading List

Source URL: scrub.cs.berkeley.edu

Language: English - Date: 2011-10-21 01:32:09
355Remote desktop / Trusted computing / Trusted Platform Module / X Window System / Trusted Execution Technology / Google Chrome OS / Thin client / Desktop virtualization / Hyper-V / Software / System software / Computing

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems Lorenzo Martignoni,∗ Pongsin Poosankam,∗† Matei Zaharia,∗ Jun Han,† Stephen McCamant,∗ Dawn Song,∗ Vern Paxson,∗ Adrian Perri

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2014-10-02 07:34:55
356Computing / Out-of-band management / Intel vPro / Intel Active Management Technology / Intel / Trusted Execution Technology / AES instruction set / X86 virtualization / McAfee / System software / X86 architecture / Computer architecture

Sales Brief Intel and McAfee 2013 Security Benefits Intel and McAfee deliver a new level of strengthened security innovation utilizing embedded hardware security technologies for unprecedented protection and

Add to Reading List

Source URL: mobilecomputing.crn.com

Language: English - Date: 2014-04-08 16:09:09
357Electronic voting / Information society / Elections / Government / Federal Voting Assistance Program / Vote counting system / Privacy / Democrats Abroad / Absentee ballot / Politics / Election technology / Ethics

Everyone Counts is the leading provider of new developments in voting and election administration.  We  provide proven and trusted transparent, secure and accessible voting systems, ensuring th

Add to Reading List

Source URL: www.sos.ca.gov

Language: English - Date: 2011-05-14 16:40:42
358Software / Webroot Software / Avira / Sophos / Symantec / Trend Micro / Malware / Webroot Internet Security Complete / Webroot Internet Security Essentials / Antivirus software / Computer security / System software

WHITE PAPER > HOW RESELLERS CAN BECOME THE TRUSTED ADVISORS How Resellers Can Become the Trusted Advisors on Security Issues Boosting Customer Satisfaction and Loyalty with Superior Antivirus Protection

Add to Reading List

Source URL: custom.crn.com

Language: English - Date: 2014-07-14 10:42:42
359Digital libraries / Museology / Open access / Communication / Digital preservation / Fedora Commons / Open Archival Information System / EPrints / Repository / Archival science / Library science / Science

Repository Software Evaluation using the Audit Checklist for Certification of Trusted Digital Repositories Joanne S. Kaczmarek Thomas G. Habing

Add to Reading List

Source URL: www.digitalpreservation.gov

Language: English - Date: 2009-02-23 12:38:11
360Monolithic kernels / Kernel / Ring / Mandatory access control / Architecture of Windows NT / Operating system / Mach / Trusted computing base / Linux kernel / Computer architecture / System software / Software

Hardware Enforcement of Application Security Policies Using Tagged Memory Nickolai Zeldovich∗ , Hari Kannan† , Michael Dalton† , and Christos Kozyrakis† ∗ † MIT

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
UPDATE