Is it anticipated that TC deliverables will be broadly used, deployed, and/or implemented? Or are the deliverables intended for a narrow audience, possibly including only the TC membership?
It is anticipated that deliverables from the EKMI TC will be used by every company and industry that needs to manage sensitive information through encryption. Much like DNS, Dynamic Host Configuration Protocol (DHCP) or a Relational Database Management System (RDBMS), a Symmetric Key Management System (SKMS) and the SKSML can be used by any application on any operating system.
Related Questions
- Is it anticipated that TC deliverables will be broadly used, deployed, and/or implemented? Or are the deliverables intended for a narrow audience, possibly including only the TC membership?
- How do the dramatic techniques used in the play help the audience to understand Shirleys transformation?
- Can postponement of an adverse outcome be used to present risk reductions to a lay audience?