Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
MILPITAS, CA -- (Marketwire) -- 11/28/12 -- Phoenix Technologies Ltd., the global leader in UEFI firmware technology, products and tools, will unveil a new graphical user interface (GUI) BIOS Setup for its flagship UEFI BIOS product, Phoenix SecureCore Technology 3.0.
Based on the latest UEFI specifications, and fully compliant with Microsoft Windows 8, Phoenix SecureCore Technology 3.0 is the next generation UEFI BIOS firmware for cross-device, cross-codebase compatibility.
Windows 8 Style GUI BIOS Setup
The new Windows 8 style GUI BIOS Setup, designed for Phoenix SecureCore Technology 3.0, provides a seamless user experience that bridges Windows 8 and Phoenix BIOS. Phoenix continues to remain at the forefront of emerging technologies with its new GUI BIOS Setup that provides the most intuitive environment yet for users to configure their BIOS. Supporting configuration via touch, stylus, mouse, or keyboard input maximizes users' options when interacting with BIOS, and offers system developers greater opportunities to create innovative pre-OS applications.
Customizable GUI Core Engine: Phoenix Desktop Manager (PDM)
Phoenix PDM is a stacked GUI core engine that constructs a graphical framework for the BIOS menu in Visual Forms Representation (VFR). PDM provides a highly customizable user interface design that is ideal for OEM branding. GUI controls built into the PDM binary include:
Customization and development of new controls is supported through PDM source level engineering. Phoenix OEM partners can also rely on the support of our customer engineering services to create strong brand identity with a fully customized BIOS Setup look and feel.
Touch Hot Zone as Hotkey
In addition to the new GUI BIOS Setup, Phoenix SecureCore Technology 3.0 is optimized for touch-based ultra-mobile devices to support programmable touch hot zones that function as hotkeys, or run commands. Touch hot zones are an easily recognizable point for OEM product differentiation and can be configured to instantly access predefined functions such as BIOS Setup and boot device configuration, or even run applications like diagnostic tools.
BitLocker Unlock by Virtual Keyboard
To unlock a BitLocker protected hard drive, a physical keyboard or HID input is normally required. Phoenix has developed revolutionary firmware technology to support BitLocker drive encryption for keyboard-less devices by creating a virtual keyboard that can be used instead of a peripheral keyboard. This unique feature now brings BIOS configuration completely into the realm of the mobile device user's touch-only experience.
About Phoenix Technologies Ltd.
Founded in 1979, Phoenix was the first company dedicated to the development of PC BIOS firmware. Phoenix, with its rich domain expertise and IP library in firmware architecture and BIOS technology, enables the PC industry's top system builders to differentiate their products, reduce time-to-market, and increase customer value. The company's flagship UEFI firmware product, Phoenix SecureCore Technology, is revolutionizing the PC user experience by delivering unprecedented performance, security, reliability, connectivity and ease-of-use. Phoenix is a privately held company headquartered in Silicon Valley in Milpitas, California. For more information, visit http://www.phoenix.com.
Phoenix, Phoenix Technologies, Phoenix SecureCore Technology and the Phoenix Technologies logo are trademarks and/or registered trademarks of Phoenix Technologies Ltd. All other marks are the marks of their respective owners.
Add to Digg Bookmark with del.icio.us Add to Newsvine
Contact:
Carol Wu
Phoenix Technologies
+ (886)-27745-5658
Email Contact
Susan Cain
Cain Communications
(503)-538-2725
Email Contact
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs