Trusted-Execution-Technique
Glossary Page
It cooperates with the respective operating system, verifying, for example, the system BIOS and firmware, and starts the operating system. If errors are detected, the operating system receives feedback. It then decides how the computer continues to function. Essentially, it strengthens platforms that are exposed to attacks on hypervisors, the BIOS, or other firmware, such as malicious rootkits or malware. This function can also be seen as an extension of Virtual Machine Extensions (VMX), Intel's technology for virtual environments.
http://www.datacenter-insider.de/hardware/komponenten/articles/488444/
Latest Webinars
Latest Articles
BMW Certificate Upload via Catena-X – Onboarding Info Webinar Series
This webinar series is an initial orientation session. We will explain the “Certificate Management” (CCM) use case, BMW’s expectations, and the required steps: registration, app access, upload, and sharing.
Read more
Luca Löffler
Oct 27, 2025
Delivering global sovereignty: T-Systems launches Catena-X connectivity in China with local infrastructure
T-Systems has launched its Connect & Integrate service on local infrastructure in China, enabling Chinese suppliers and manufacturers to securely and efficiently join the Catena-X ecosystem, bridging connectivity with global OEMs while ensuring data sovereignty and regulatory compliance.
Read more
Tushar Yadav
Oct 14, 2025
Winning with Sustainability: End-to-End Solution from T-Systems and iPoint
T-Systems and iPoint deliver a joint, production-ready Product Carbon Footprint (PCF) solution that enables end-to-end carbon transparency across the automotive value chain. Combining Catena-X-certified data exchange with decades of compliance and sustainability expertise, the solution empowers suppliers and OEMs to meet regulatory demands, integrate securely with existing systems, and scale digital sustainability — turning compliance into measurable business value.
Read more
Andrea Garcia
Oct 08, 2025