Trusted Computing Module (TPM) overview by Karen Lawrence Öqvist10 November 201110:57Leave a comment on Trusted Computing Module (TPM) overviewInformation Security TPM Not a really quality video, but the content is an interesting insight into the challenges of developing TPM.