Embedded systems designers attending next week's Embedded Systems Conference, Boston, can see Trusted Computing components and applications in action and learn how to design in security based on Trusted Computing specifications. . . .
Embedded systems designers attending next week's Embedded Systems Conference, Boston, can see Trusted Computing components and applications in action and learn how to design in security based on Trusted Computing specifications.

TCG's specifications have been developed to help vendors build products that let users protect critical data and information in a variety of computing systems. More than 5 million computing systems with hardware to protect passwords, digital keys and certificates have been shipped, and many applications for using this hardware are available. As embedded devices, smart sensors and other intelligent controllers become pervasive on wired and wireless networks, security is increasingly critical.

The link for this article located at BUSINESS WIRE is no longer available.