http://www.prcidf.com.cn/eng/systems_agenda/track.html -PDPS003 Trusted Virtualization Speaker introduction : Qing Yang What you will get from this session: 1. Overview of a Virtual Machine Manager (VMM) 2. Benefits of a Virtual Machine Manager 3. How a VMM makes the platform more trustworthy 4. An understanding of how a Trusted VMM might implement the technologies code named LaGrande 5. An overview of Intel research projects for trusted Virtual Machine Managers
-STDS002 Trusted Network Connection (TNC) Architecture Speaker introduction : Ned Smith ,Tony Dou (interpreter) What you will get from this session 1.TNC organization and technology 2.Architecture & Usage Model 3.TNC Specification 1.0 4.Roadmap and Plan
-PDOS004 Applications of Virtualization Technology on Desktop to Enhance PC Manageability and Security Speaker introduction : 黄一帆 (Ede Phang, Ng) The session will introduce applications of virtualization technology on desktop to enhance PC manageability and security, topics include Network Access Control, Network Outbreak Containment, Embedded IT, Secured Operating System Management. With these innovative applications integrated in desktop PCs, manageability and security management of desktop PCs for digital office will be greatly enhanced. The session will also address corporate IT and remote management on top of desktop PCs with these innovative applications integrated.
-PPIS001 PCIe* Architecture: What's New? PCIe 2.0 Speaker introduction : Thomas Han What you will get from this session: 1.A comprehensive overview of the latest developments in PCIe architecture, including post-1.1 updates, security, device virtualization, and future architectural directions. 2. The basic foundational knowledge necessary to understanding other PCIe sessions. This is the lead session for the PCIe track.
-XSCS002 Mobile Terminal Security and Manageability Architecture for Pervasive Wireless services Speaker introduction : Liang He In the talk, the generic wireless data services and security mechanisms are presented. Several scenarios of wireless services, and their security concerns and relevant schemes are discussed. Finally, for pervasive wireless services, the generic terminal security and manageability architecture and its deployment strategy are proposed
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.