Hardware  >   Computer Hardware  >  

Personal Computers

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Apple II, Macintosh II, AT Computers, Macintosh IIcx, Desktop Computers, Multimedia Personal Computers, Desktops, Microcomputers, PC, Home Computers, XT Computers, LISA
DEFINITION: The trusted PC is an industry ideal of a PC with built-in security mechanisms that place minimal reliance on the user or administrator to keep a PC and its peripheral devices secure. Trusted personal computing devices are being developed that maximize the security of individual computers through hardware and operating system-based mechanisms rather than through add-in programs and policies. To that  … 
Definition continues below.
Personal Computers White Papers (View All Report Types)
15 Matches

There are currently no reports cataloged under the topic:
Personal Computers

Please conduct a new search.

15 Matches
PERSONAL COMPUTERS DEFINITION (continued): …  end, security mechanisms are being built into chips, chipsets, and motherboards, among other things, because industry consensus is that hardware-based mechanisms are inherently more trustworthy than those created with software.The Trusted Computing Platform Alliance (TCPA) was formed in October 1999 by Compaq, HP, IBM, Intel and Microsoft. TCPA, whose membership now includes more than 140 companies, states as its goals: "To develop a specification, based on the collaboration of PC industry platform, operating system, application, and technology vendors, that delivers a set of hardware and operating … 
Personal Computers definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement