The document "Trusted Computing Is Real and It's Here," written by Roger L. Kay (and available at https://www. trustedcomputinggroup.org/news/Industry_Data/Endpoint_Technoiogies_ Associates_TCG_report_Jan_29_2007.pdf describes Trusted Computing applications that have been implemented in big companies as a solution to their security problems. Among the various use-cases, a Japanese pharmaceutical company was able to control access to its network and confidential data (about 50 out of 20,000 computers had an unknown provenance), and a franchise pizza company in the U.S. managed its many stores centrally, while ensuring that employees' privacy was respected. These use-cases demonstrate the power and effectiveness of Trusted Computing solutions and how they can become pervasive and ensure both the security and privacy of next-generation computing systems.
Was this article helpful?
Read how to maintain and repair any desktop and laptop computer. This Ebook has articles with photos and videos that show detailed step by step pc repair and maintenance procedures. There are many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket.