5 Sep
2013
5 Sep
'13
9 p.m.
Folks I can see how this helps US PIV/PIV-I and connecting up physical and logical access. But is there another use it could be put to - in the devices we might be concerned with?? Cheers Colin http://gcn.com/Articles/2013/08/29/Trusted-Computing-Group-endpoint-compliance.aspx?goback=.gde_3747110_member_271044961&Page=1