Trusted Computing Module (TPM) overview by Karen10 November 201110:57Leave a comment on Trusted Computing Module (TPM) overviewInformation Security TPM Not a really quality video, but the content is an interesting insight into the challenges of developing TPM.