Trusted-Execution-Technique
Glossary Page
It cooperates with the respective operating system, verifying, for example, the system BIOS and firmware, and starts the operating system. If errors are detected, the operating system receives feedback. It then decides how the computer continues to function. Essentially, it strengthens platforms that are exposed to attacks on hypervisors, the BIOS, or other firmware, such as malicious rootkits or malware. This function can also be seen as an extension of Virtual Machine Extensions (VMX), Intel's technology for virtual environments.
http://www.datacenter-insider.de/hardware/komponenten/articles/488444/
Latest Webinars
Latest Articles
Blog post video test
Test
Read more
Tim Ganther
Mar 19, 2024
Block editor test
Block editor test
Read more
Tim Ganther
Jul 17, 2023
Integrate Keycloak, Kubeapps and Pinniped
Integrating kubeapps with Keycloak and Pinniped on the cloud can provide a secure and streamlined experience for managing applications in a Kubernetes environment.
Read more
Tim Ganther
Jun 12, 2023