Trusted-Execution-Technique

Glossary Page

It cooperates with the respective operating system, verifying, for example, the system BIOS and firmware, and starts the operating system. If errors are detected, the operating system receives feedback. It then decides how the computer continues to function. Essentially, it strengthens platforms that are exposed to attacks on hypervisors, the BIOS, or other firmware, such as malicious rootkits or malware. This function can also be seen as an extension of Virtual Machine Extensions (VMX), Intel's technology for virtual environments.

http://www.datacenter-insider.de/hardware/komponenten/articles/488444/ external-link

Latest Webinars

Latest Articles

Blog Post Cover

ADIS: Traceability & PCF in Catena-X

ADIS, a leading Tier-1 supplier, partnered with T-Systems to enable scalable, Catena-X-compliant data exchange. Leveraging the "Connect & Integrate" solution, ADIS achieved fast onboarding via a sandbox-to-Pre-Prod approach, enhancing traceability and carbon footprint visibility. This strategic move aligns with industry standards, ensures regulatory compliance, and supports long-term participation in the evolving Catena-X ecosystem—without major in-house development.

Read more

external-link
Author image

Andrea Garcia

May 28, 2025

Blog Post Cover

Making manufacturing systems talk to each other

Interoperability in manufacturing is often misunderstood. Not because companies doubt its importance, but because it's difficult to visualize what success looks like. This blog uses simple analogies to explain the core challenges: outdated machines that can’t “speak” to modern systems, and people hesitant to share data without context or trust. With solutions like Asset Administration Shells and Data Spaces, manufacturers can unlock hidden value, foster secure collaboration, and take real steps toward digital transformation.

Read more

external-link
Author image

Nick Jephcott

May 18, 2025

Blog Post Cover

Enabling cross-ecosystem commerce: A perspective by NTT and T-Systems

T-Systems and NTT are shaping the future of trusted global data exchange by combining telecom-grade infrastructure with federated identity and dataspace interoperability. Their joint contributions to the IDSA paper and cross-border testbeds between Europe and Japan show how telcos can drive secure, scalable, and regulation-compliant data collaboration across ecosystems. This approach supports real-world use cases like Digital Product Passports, predictive maintenance, and circular economy models—laying the groundwork for a network of sovereign, interoperable digital infrastructures.

Read more

external-link
Author image

Lena Matsela

May 13, 2025