Definitions
Sorry, no definitions found. You may find more data at trusted.
Etymologies
Sorry, no etymologies found.
Support

Help support Wordnik (and make this page ad-free) by adopting the word Trusted.
Examples
-
For convenience, these evaluation criteria use the term Trusted Computing Base to refer to the reference validation mechanism, be it a security kernel, front-end security filter, or the entire trusted computer system.
The Department of Devense Trusted Computer System Evaluation Criteria (The Orange Book) 1993
-
The term Trusted Computing and related technologies, like Palladium, Trusted Platform Module,
-
Our favourite way to keep your email inbox empty is a simple, three-folder system we call The Trusted Trio.
Empty Your Inbox with Gmail and the Trusted Trio | Lifehacker Australia 2008
-
ABIT's new motherboard includes hardware crypto support -- presumably as part of participation in Trusted Computing/Palladium?
Boing Boing 2003
-
Opens: Nov. 24 vs. Wilkinson County (Irwinton, Ga.) in Trusted Choice Tournament of Champions.
-
These requirements -- dubbed the Trusted Internet Connection (TIC) initiative -- mandate that all federal agencies deploy a standard set of security tools including antivirus, firewall, intrusion detection and traffic monitoring on their networks to protect against hacking attacks launched by foreign governments and criminals.
How Treasury, AT&T botched billion-dollar network upgrade Carolyn Duffy Marsan 2010
-
The project, to be called Trusted Voices, will offer in-depth perspectives and coverage from McClatchy foreign correspondents based in select regions, including Iraq, the Middle East, China, and Latin America.
-
I have also been reminded of another similar site, called Trusted Places, which runs off user-written reviews.
Winner Winner, Spanish Dinner Annemarie 2007
-
I have also been reminded of another similar site, called Trusted Places, which runs off user-written reviews.
Archive 2007-08-01 Annemarie 2007
-
Three major initiatives now put online privacy at risk: Digital rights management (DRM), which protects content from being copied and shared online; digital IDs, which ensure that you are who you say you are online; and so-called Trusted Computing, a Microsoft (MSFT ) initiative that will give individual PCs a seal of approval before they can download music, movies, and software.
Comments
Log in or sign up to get involved in the conversation. It's quick and easy.