Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Google security exec: 'Passwords are dead'
Speaking at TechCrunch Disrupt, Google's Heather Adkins says startups should look beyond passwords to secure users and their data.
http://news.cnet.com/8301-1009_3-57602286-83/google-security-exec-passwords-are-dead/
New startups looking for ways to keep their users secure should know one thing, a top Google security executive said Tuesday: "Passwords are dead."
Speaking on a TechCrunch Disrupt panel called "Spies Like Us," Heather Adkins, Google's manager of information security, told moderator Greg Ferenstein that in the future, the "game is over for" any startup that relies on passwords as its chief method to secure users and their data.
Google manager of information security Heather Adkins.
Adkins, speaking alongside Kleiner Perkins Caufield & Byers managing partner Ted Schlein and author James Bamford, said that looking ahead, "our relationship with passwords are done," and that "passwords are done at Google."
She talked briefly about Google's use of two-step authentication and the fact that the search giant has been working to innovate in the area of non-standard password security. As a result, she said, any startup that still relies on standard passwords needs to ensure that it has an abuse team set up to deal "with customers getting compromised."
Although Adkins didn't offer any real specifics on how Google will innovate beyond today's security, she did say the company is experimenting with hardware-based tokens as well as a Motorola-created system that authenticates users by having them touch a device to something embedded, or held, in their own clothing. "A hacker can't steal that from you," she said.
Later in the conversation, which also touched on the NSA scandal, cybersecurity, and the weaponization of offensive cyber technologies, Adkins pointed out that hackers intent on making money from their bad acts had consistently found ways to exploit Google users who had yet to turn on two-factor authentication. Essentially, she explained, hackers were able to get into such users' accounts, turn on two-factor authentication themselves, and lock the users out before utilizing those accounts to send spam. "They are finding new ways to make money off it," she said. "Ways we hadn't anticipated."
Finally, Adkins argued, technology companies need to step up and build products that protect users so "they don't rely on not getting fooled." Ultimately, she said, anyone starting a new technology company should be sure that one person is designated to focus on security and privacy, and that one of the first 25 employees should work full time on security and privacy
Does this mean we've crossed the red line?
He probably has a girlfriend hooked up with someone @ google
He's a loser
So who on the BOD is worth another shot?
On paper they're a pretty impressive lot, and I can't believe they are all a bunch of SKS Toadies just in it for the money.
Any thoughts on who should stay and who should get the boot would be greatly appreciated.
Regards
At this point I'd be happy with a walk.
Steal second on an error, get to third on a bean ball then hope and pray that somebody, anybody hits even a blooper to right and sends at least 1 run home.
Baseball is probably a pretty poor analogy for this quagmire, at least in BB you don't score 150 then tumble to .49.
Hopefully this just the 7th inning stretch and not the bottom of the 9th.
Regards all
mmbg, strikes me that if someone actually wanted WAVXs product / product line, say like DELL for instance, or Samsung, they'd step to the plate and make it happen regardless of the current fiscal mess.
After all, what's WAVX worth? A few corporate jets? No make that 1. Just 1.
I'm just hopeful they really are the de facto whatever and profitability is ....well just around the corner. Then they can get their bonus.
Regards
Just revisited my 1st post, for which I was severely chastised, should have known better then...actually I did but stuck with it thinking that someone, somebody would actually use this product.
The BOD looks great on paper but for the life of me , I can not conceive the justification for paying anyone, let alone SKS a bonus!
For what? Hiring his brother? Playing footsies with the snackster?
Trades like a penny stock so what else should I have expected?
Perhaps a little, just a little honesty.
"The most important buyer in Wave's history".
?????
That will take some doing to top Bain.
This PP ATM whatever would be a lot easier to stomach without this bonus BS.
Shameless.
This echoes of the ol Bain deal. Teeny by comparison, but the more things change the more they stay......ah phoohie...
still I'd love to see a major cash infusion even if it's a ploy.
good trading/whatnot Wavoids.
gucci, I'm selling a few hundred shares today and buying my very own plaque engraved with your 5 Point Lesson.
I'm hopeful, but right now I can't afford a hot dog.
Regards
Nice to see Lenovo & Micro expect us to be around till the 3rd Q.
If this keeps up, you add Dell and a few other loyalist and we'll have enough players for a friendly game of softball.
Good wishes all
Elan
Back in '99 there was a lot of dumb money making easy money.
Well the dumb money took a well deserved pounding.
Now it's gone and WAVX's @ a buck. Probably oversold, but there is no longer the "hoard" of Snack'a reenos to pick up the slack.
It may be an imperfect world but smart money is heartless.
jmho
LinkedIn Passwords Hacked
JUNE 7, 2012 | ISSUE 48•23
The professional social-networking site LinkedIn announced that some of its passwords had been leaked in a security breach. What do you think?
http://www.theonion.com/articles/linkedin-passwords-hacked,28448/
orda, waiting for a crisis perhaps?
Alladinator, well stick that 1/2 baked theory of yours back in the oven and call me if it ever reaches 3. I'm ready.
Perhaps it's the "London Whale".
.... though I lean toward your plausible explanation.
jermart,
perhaps a bit of new$ and a quick climb to 4.
Til then I'll remain warned.
Kaleid,
yeah, my timing has been a bit off, but I like to think of it as just being ahead of the curve.
Regards
re "The Bottom"....
I believe that would be "0".
That being said, I think it's far more likely we'll see $4 than zip, so I buy accordingly.
Regards
unix, I remember a time when the same could be said for Amazon & Google.
And what's that new outfit called...the one that just filed for an IPO...Facebook? Are they profitable yet?
Time will tell.
Today's WSJ
By SIOBHAN GORMAN
WASHINGTON—Lawmakers on Wednesday seized on revelations that hackers based in China broke into the U.S. Chamber of Commerce's computer network to demand legislation bolstering government and private-sector cybersecurity.
House Intelligence Committee Chairman Mike Rogers (R., Mich.) said the breach at the business-lobbying group showed that the private sector needs better information to defend its computer networks.
"Incidents like this show that while the private sector already does much to secure its networks, it needs much clearer authority to detect threats and share information, and needs better access to what the U.S. government knows about dangerous cyber threats," he said.
The Wall Street Journal reported Wednesday that cyberspies suspected by U.S. officials of having ties to the Chinese government infiltrated the Chamber's networks for at least six months. The hackers set up a spying network that involved roughly 300 Internet addresses.
Earlier
China Hackers Hit U.S. Chamber
A spokesman for the Chinese Embassy in Washington said the allegation that the attack originated in China "lacks proof and evidence, and is irresponsible."
Mr. Rogers said legislation he is sponsoring addressed the problem by giving private-sector organizations access to classified data on cybersecurity threats. It would also clear the way, he said, for companies to share information about breaches with the government while receiving liability protection.
Government restrictions and privacy concerns often prevent the government and the private sector from sharing information on cybersecurity threats. The Chamber and a number of large corporations are backing the bill.
An investigation of the Chamber incident showed that the intruders stole the emails of four employees who worked on Asia policy issues. People familiar with the investigation said it wasn't possible to determine whether other documents or information were stolen in the months prior to the May 2010 discovery of the infiltration.
Lawmakers and U.S. intelligence officials have raised pressure on China in recent months in an effort to get the country to curb its alleged espionage, particularly industrial spying.
Mr. Rogers held a hearing on cybersecurity issues in October, where he and the top Democrat on the intelligence committee criticized China for what they said was its pervasive cyberspying. The chief of U.S. counterintelligence in November issued a report describing China as the world's most active perpetrator of economic cyberespionage.
Chamber officials worked to explain the incident to the board of directors and members. "Please rest assured that the security of our information, and your information, is an urgent priority, and we will continue to work to protect it," Chief Operating Officer David Chavern wrote in the Chamber's response to the breach. He said the Chamber had taken steps to prevent future attacks, such as barring employees from taking electronic devices to China. Such devices would include smart phones and laptops.
U.S. Attorney General Eric Holder declined to comment on the Chamber breach, but said bolstering cybersecurity was a priority. "This is something we are really focused on. It's a 21st century priority."
http://online.wsj.com/article/SB10001424052970203686204577112982825331606.html
How interesting. Wasn't it Cramer that thrashed Wave many years ago in Barron's?
Thanks VC
Interesting insight in the latest Wired.
19.08
Clive Thompson on The Breakthrough Myth
By Clive Thompson July 26, 2011 | 12:00 pm | Wired August 2011
Illustration: Dev Gupta
Tech people love stories about breakthrough innovations—gadgets or technologies that emerge suddenly and take over, like the iPhone or Twitter. Indeed, there’s a whole industry of pundits, investors, and websites trying feverishly to predict the Next New Big Thing. The assumption is that breakthroughs are inherently surprising, so it takes special genius to spot one coming.
But that’s not how innovation really works, if you ask Bill Buxton. A pioneer in computer graphics who is now a principal researcher at Microsoft, he thinks paradigm-busting inventions are easy to see coming because they’re already lying there, close at hand. “Anything that’s going to have an impact over the next decade—that’s going to be a billion-dollar industry—has always already been around for 10 years,” he says.
Buxton calls this the “long nose” theory of innovation: Big ideas poke their noses into the world very slowly, easing gradually into view.
Can this actually be true? Buxton points to exhibit A, the pinch-and-zoom gesture that Apple introduced on the iPhone. It seemed like a bolt out of the blue, but as Buxton notes, computer designer Myron Krueger pioneered the pinch gesture on his experimental Video Place system in 1983. Other engineers began experimenting with it, and companies like Wacom introduced tablets that let designers use a pen and a puck simultaneously to manipulate images onscreen. By the time the iPhone rolled around, “pinch” was a robust, well-understood concept.
A more recent example is the Microsoft Kinect. Sure, the idea of controlling software just by waving your body seems wild and new. But as Buxton says, engineers have long been perfecting motion-sensing for alarm systems and for automatic doors in grocery stores. We’ve been controlling software with our bodies for years, just in a different domain.
This is why truly billion-dollar breakthrough ideas have what Buxton calls surprising obviousness. They feel at once fresh and familiar. It’s this combination that lets a new gizmo take off quickly and dominate.
The iPhone was designed by Apple engineers who had learned plenty from successes and failures in the PDA market, including, of course, their own ill-fated Newton. By the time they added those pinch gestures, they’d made the obvious freshly surprising.
If you want to spot the next thing, Buxton argues, you just need to go “prospecting and mining”—looking for concepts that are already successful in one field so you can bring them to another. Buxton particularly recommends prospecting the musical world, because musicians invent gadgets and interfaces that are robust and sturdy yet creatively cool—like guitar pedals. When a team led by Buxton developed the interface for Maya, a 3-D design tool, he heavily plundered music hardware and software. (“There’s normal spec, there’s military spec, and there’s rock spec,” he jokes.)
OK: If it’s so easy to spy the future, what are Buxton’s predictions? He thinks tablet computers, pen-based interfaces, and omnipresent e-ink are going to dominate the next decade. Those inventions have been slowly stress-tested for 20 years now, and they’re finally ready.
Using a “long nose” analysis, I have a prediction of my own. I bet electric vehicles are going to become huge—specifically, electric bicycles. Battery technology has been improving for decades, and the planet is urbanizing rapidly. The nose is already poking out: Electric bikes are incredibly popular in China and becoming common in the US among takeout/delivery people, who haul them inside their shops each night to plug them in. (Pennies per charge, and no complicated rewiring of the grid necessary.) I predict a design firm will introduce the iPhone of electric bikes and whoa: It’ll seem revolutionary!
But it won’t be. Evolution trumps revolution, and things happen slowly. The nose knows.
Email clive@clivethompson.net.
http://www.wired.com/magazine/2011/07/st_thompson_breakthrough/
aleajactaest, that flight analogy was very good. Hopefully we won't have to wait 140million years for this to take off. It seems that way sometimes.
You write:
".....some marginal but useful product which induces folks to switch their TPMs on."
I wonder about this all the time. Close to home, my son has an Dell enterprise laptop provided by his small company. They all do, and none of them have activated the TPM. He's a smart guy, lives in Boston, his girlfriend is a Harvard grad, he hangs out with MIT guys and yet he doesn't seem interested in "complicating" something which "seems to be working just fine".
....maybe after "the unthinkable" happens.
Regards
Elan
Good point ExP,
about Google & Schmidt.
There are times, especially of late, when I feel as though we're stuck in a Steve Ballmer type holding pattern.
I'm all for an, Eric Schmidt type grownup to lead us out of this slog.
Regards
From Down Under
I know we read about this stuff everyday, but you just have to believe that someone, somewhere is looking for theTrusted solution.
9 March 2011 Last updated at 04:48 ET
Australia PM Julia Gillard's computer 'hacked'
The cyber attacks are believed to have been on the Australian Parliament House email network
Australian Prime Minister Julia Gillard's parliamentary computer and those of at least two senior ministers are suspected of being hacked, according to a newspaper report.
The government was alerted to the security breach by a US intelligence tip-off, Sydney's Daily Telegraph said.
It is reported that several thousand emails may have been accessed from the computers of at least 10 ministers.
The Australian authorities have refused to confirm or deny on the reports.
The cyber attacks are believed to have targeted the Australian Parliament House email network, the less secure of two networks used by MPs.
Among the computers allegedly breached were those belonging to Foreign Minister Kevin Rudd and Defence Minister Stephen Smith.
Reports suggest the hackers may have been trying to access information on Australia's lucrative mining industry.
Sydney's Daily Telegraph quoted four unnamed government sources as saying Chinese intelligence agencies were among a number of suspected hackers.
The government says it will not comment on specific intelligence matters.
However, Attorney-General Robert McClelland said that the Australian authorities were "constantly strengthening cyber security measures".
The US recently said China's cyber-warfare capabilities were formidable, though China routinely denies hacking claims.
http://www.bbc.co.uk/news/world-asia-pacific-12891484
re Jobs....perhaps they can pick up someone from just around the corner. Right on De Anza Blvd, then right again on Infinite Loop. A mere 0.7 of a mile.
http://maps.google.com/maps?um=1&ie=UTF-8&q=wave+systems,+cupertino,+ca&fb=1&gl=us&hq=wave+systems,&hnear=Cupertino,+CA&cid=0,0,10114625297290640753&ei=VspuTYq1MM-tgQeOw408&sa=X&oi=local_result&ct=image&resnum=1&ved=0CCYQnwIwAA
WC, perhaps this will come when they/someonecontrol more shares.
Personally I think we're being bought up in a very orderly fashion.
Regards
Elan
This from the BBC this AM.....and worth a quick read/listen.
My mobile day
Rory Cellan-Jones | 08:41 UK time, Tuesday, 15 February 2011 Comments (21)
Barcelona: If you want to know what's going on in the mobile world you have to head to Barcelona in February, where the latest phones are unveiled and the movers and shakers from the industry gather to sell their wares and tell us what comes next.
http://www.bbc.co.uk/blogs/thereporters/rorycellanjones/
ExPat, Back in the spring of 2000, there was a PP in the mid $30's when WAVX was trading mid 20's.
I don't remember the exact numbers but it was big bucks. $122M if I recall.
This is off the top of my head, it's been awhile since I researched all this.
Regards
The pros have entered the room.
I would say so. It appears an institution(maybe) sent in an order/s, for say 150K shares to test the waters. Then they took the plunge for the whole 9 yards so to speak.
They got their position within their price range w/out driving it to $5.
Pretty sweet and well done for all.
JMO
Best to all,
Elan
DRM, nice thoughtful perspective.
One of those tipping point will likely come @ 5.00. My broker encourages me to stay with my WAVX investment, but won't buy it for his other clients. Not until it establishes itself @ 5 and above.
He's been right on about foreseeing WAVX's trading patterns for the last 3 years. Uncanny. But then again he's pretty good.
Best to you
Elan
Tsunami07 That's a great piece.Thanks.
Suddenly Steven seems brilliant again.
Regards
barge, this is astounding stuff.....but I suspect of no great surprise to you.
Thanks also for replying 2X to your own post. It must be gratifying to get that kind of response.
Regards
barge, you might find this interesting.
http://digital.venturebeat.com/2009/01/01/android-netbooks-on-their-way-likely-by-2010/#disqus_thread
Always happy to see you posting with such gusto.
Regards
Elan
Google/Chrome/Netbooks
http://digital.venturebeat.com/2009/01/01/android-netbooks-on-their-way-likely-by-2010/#disqus_thread
"Android netbooks on their way, likely by 2010
January 1, 2009 | Matthäus Krzykowski & Daniel Hartmann
|
[Update: Since posting this story, we've had a lot of inquiries from readers, with questions ranging from whether Android is ready for laptops and full-scale PCs, why Android can't rely fully on Linux, and so on. See our follow-up Android FAQ post.]
The image above shows a netbook Asus EEEPC 1000H running on Google’s mobile operating system Android. Huh? You thought Android was for mobile phones, right? Well, as we’ve written before, Google is planning to use Android for any device — not just the mobile phones.
Besides writing as freelancers for VentureBeat, we also run a startup called Mobile-facts. It took us about four hours of work to compile Android for the netbook. Having done so, we (Daniel Hartmann, that is) got the netbook fully up and running on it, with nearly all of the necessary hardware you’d want (including graphics, sound and the wireless card for internet) running. See the images below for further impressions.
Here’s the significance: Imagine the billion dollar market at stake here if Google can make good on this vision. Netbooks are basically small-scale PCs. For Silicon Valley myriad of software companies, it means a well-backed, open operating system that is open and ripe for exploitation for building upon. Now think of Chrome, Google’s web browser, and the richness it allows developers to build into the browser’s relationship with the desktop — all of this could usher in a new wave of more sophisticated web applications, cheaper and more dynamic to use. Ramifications abound: What does it mean for the stock price of Microsoft? Microsoft currently owns the vast majority of the desktop operating system market share? In recent weeks, Microsoft’s Steve Ballmer repeatedly dismissed Android as competition to Windows Mobile.
Back to our experience in compiling Android for the Asus netbooks. It shows us that there is a big technology push to let Android run on netbooks under way.
Based on the progress we see in the Android open source project, we believe that getting an Android netbook to market is doable in as few as three months. Of course, the timing depends as much on decisions by the partners in Google’s OHA alliance and other developers contributing to Android, as it does on Google itself. It is these partners — including device makers and carriers — who decide how and when to adopt Android for different devices and markets. As we note below, Intel is one such contributor working on the adoption of Android to a notebook.
A mass production of the netbooks would be possible between three to nine months, depending on circumstances, two sources familiar with such matters told us. However, as we evaluate the progress of the various OHA projects, we expect conditions for a mass-market netbook to ripen in 2010, rather than in 2009. Right now a variety a of OHA members, announced and unnanounced, are working on projects to set up a sufficient ecosystem.
One important part of the ecosystem would be to have a set of well-functioning applications (an office productivity suite, for example). Google is mostly leaving applications development for Android to third parties (applications which run in the browser like Google Docs being the notable exception). At the rate things are going, we don’t see enough of these third parties developing applications for Android netbooks in the next 12 months. There have been recent predictions about Android netbooks appearing in 2009
............."
Right on telstarjohn.
Right now we have the whole pie w/ the Papa. But I'll be more than happy with a large slice of everything.... post ubiquity .
Dell has something like 14%, whilst HP about 20% of the PC market, and that's not so bad.
I'm $ure they'd like more, but who knows? Perhaps Wave might be a deciding factor in their futures.
Thanks for posting,
....enjoying the moment,
Elan