The commonly accepted use of it is Digital Rights Management (DRM) and it is used to give content providers administrator rights to your file system similar to the way a rootkit trojan does!
In it's development, TPM had also been known as Palladium and "Fritz chip" but they rename it everytime it recieves negative press reviews so when people buy a product that contains TPM, it's just more technical jargon on the box that no one knows about!
TPM has been in ibm thinkpads for a long time now and it is in apple computers aswell as many others! The consortium that makes up the Trusted Group consists of most large companies in the computer industry, including microsoft and intel...
The "public key" inside the tpm can also be used to uniquely identify a computer (much like intels failed cpu id scheme from years ago) and this is seen by many as Big Brother inside of the computer tracking and snooping on everything you do! Like the pentium2 id feature, this can be disabled in computers that have it today since the feature is gaining acceptance so slowly, it is relatively useless! Yet legislation has already been drafted to make it a crime to either manufacture, possess or use a non-compliant computer with no TPM!
A skeptical onlooker asks: "If TPM is such great security, how did some teenagers on the web crack it to allow OSX to install on any computer after apple used it for protection?"
Here come the apple lawyers... "OK pal, that's DMCA violation! You're going to jail."
2. A handy way of measuring the worth of a cinematic piece; one derives this unit by dividing the length of the movie/show by the amount of scantly clad women. One then multiplies the number of women by two to get the Tits Per Minute.
Shane: Yeah, got to love them...
1. A term used primarily by political pundits to focus and direct debate and/or media spin on a particular topic.
2. A progressive internet Blog popular with grassroots political organizing efforts.
"Did you read TPM regarding the latest lies from the Administration?"