Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Thanks CM.
dude_danny
Online trusted platform module by Broadcom
Sorry if posted. Any implications to Wave?
http://gauss.ffii.org/PatentView/EP1484891#head-a6c5a0b273035271c26200f14878c0448fe83e75
An online trusted platform module (TPM) in communication with a security module that can be located elsewhere in the network in a server machine. In an embodiment, the online TPM is connected directly to a network interface card (NIC) that is also resident at the client. This allows the online TPM to communicate directly to the network, and therefore to the security module (without having to deal with the TCP/IP stack at the client machine in some circumstances, e.g., the boot process). In an embodiment, the communications channel between the online TPM and the security module is implemented using the transport layer security (TLS) protocol. A secure boot process is performed in advance of security processing. Typical security processing includes receipt, by the online TPM, of one or more commands from an application. The online TPM then proxies out the commands to the security module. After the security module has completed its processing of the commands, results of the processing and any related status information is returned to the online TPM.
dude_danny
O.T. Biometrics Making Inroads With Laptops
By BRIAN BERGSTEIN, AP Technology Writer
Wed Jun 22, 7:04 PM ET
http://news.yahoo.com/
BOSTON - Biometric technology is taking another leap toward widespread usage as Hewlett-Packard Co. ships new laptops with fingerprint readers.
ADVERTISEMENT
The nx6125 notebook PC includes a fingerprint sensor made by AuthenTec Inc., which says HP is the biggest computer maker to offer a biometric reader as standard equipment. The computer, aimed at the business market, sells for $1,000 and up.
Fingerprint biometrics are a more secure and convenient alternative to passwords, which are often forgotten or stolen. But only in recent years has the technology's accuracy improved to the point where it could confidently be deployed in a wide range of consumer applications.
Having computers ship with biometric capabilities built-in could prompt more Web sites to adopt two-factor authentication schemes requiring a second ID check beyond the simple password. Such security measures are common in many European countries, though the second verification is still generally provided as another form of password rather than a biometric ID.
dude_danny
Singapore govt to dish out US$1.3b worth of IT contracts
By Winston Chai, ZDNet Asia
Thursday , April 28 2005 04:29 PM
http://www.zdnetasia.com/news/business/0,39044229,39227943,00.htm
update SINGAPORE--Public sector IT spending is expected to see a hefty increase this year, propped up by an effort to standardize technology usage across all government departments in Singapore.
Chan Yeng Kit, chief executive officer of the Infocomm Development Authority of Singapore (IDA), said local authorities plan to call for S$2.2 billion (US$1.3 billion) worth of IT tenders over the next 12 months. He was speaking at an industry briefing to detail the government's technology budget and upcoming procurement plans.
The amount is a three-fold increase from the previous year, during which government agencies budgeted S$700 million (US$425 million) for IT deals, although only S$610 million (US$370 million) worth of contracts were eventually awarded.
"From our experience, with open competition, tender bids are always lower than the contract value," said Wu Choy Peng, IDA's deputy chief executive, referring to the difference between the budgeted and actual contract values in 2004.
IDA, which oversees technology purchases and deployments for the major government bodies in addition to its role as an industry regulator, is responsible for the bulk of public sector IT spending, Wu said.
This year, the lion's share of the budgeted IT contracts will stem from an ambitious project to streamline disparate hardware, software and IT services that are used by various government departments in Singapore.
Specifically, S$1.5 billion (US$911 million) in deals have been allocated for standardizing desktop and network components across all agencies in the public sector, with the exception of the Ministry of Defense.
Areas like PC operating systems, desktop security packages, e-mail and messaging software, as well as productivity tools, will be harmonized across the board, Wu told CNETAsia. However, she said the choice of server OS and related applications may still vary due to the unique requirements of different government agencies.
IDA's stance on open-source software also remains unchanged, Wu stressed.
IT companies are free to include open-source applications in their proposals, but the final decision will still hinge on TCO (total cost of ownership), said Chan.
As part of this initiative, the Singapore government will steer away from bulk hardware and software purchases. Instead, IDA has opted for a utility-pricing approach where interested vendors are required to suggest rental models for their products and services.
The program will be implemented in two stages over the next five years. It is envisioned to save public sector IT procurement costs and allow for faster deployment of new services and applications as they no longer need to be tested for compatibility across multiple environments, IDA said. Upon completion of this project in 2009, the annual value of government IT deals wil revert to around S$600 million (US$364 million), it added.
Besides the standardization effort, IDA will also be awarding contracts for several projects, such as the establishment of a cyber threat monitoring center and a remote access system which allows civil servants to retrieve e-mails and other corporate resources on the fly.
dude_danny
O.T. Java flaws open door to hackers
17 Jun 2005
http://www.zdnetasia.com/techguide/java/0,39044898,39237152,00.htm
Sun Microsystems has fixed a pair of security bugs in Java that could be exploited by attackers to take over computers running Windows, Linux and Solaris.
The flaws are "highly critical," security monitoring company Secunia said in an advisory posted Tuesday. Flaws that get that ranking--one notch below Secunia's most severe "extremely critical" rating--are typically remotely exploitable and can lead to full system compromise.
Both flaws affect the Java Runtime Environment, or JRE. This is the Java software many computer users have on their system to run Java applications. The bugs could allow a Java application to read and write files or execute applications on a victim's computer, Sun said in two separate security advisories released Monday.
One is a general flaw in the JRE, while the other is specific to Java Web Start, a technology to load Java applications over a network such as the Internet.
The flaws could be exploited through a malicious Web site, according to alerts from the French Security Incident Response Team, which rates both issues "critical."
Sun said it wasn't aware of any exploits or attacks using the flaws.
JRE is part of Sun's Java 2 Platform Standard Edition, or J2SE. Both flaws affect J2SE 5.0 and 5.0 Update 1 for Windows, Solaris and Linux. The general JRE flaw also affects J2SE 1.4.2_07 and earlier 1.4.2 releases for those operating systems, Sun said.
The Santa Clara, Calif.-based company is urging people to install updated software to protect against possible exploitation of the security flaws. It has released two software updates to address the issues: J2SE 5.0 Update 2, which has actually been available since February, and J2SE 1.4.2_08, which was released recently, company representatives said. The software can be downloaded from the Java.com Web site.--by Joris Evers, CNET News.com
dude_danny
CM: Great Stuff!
dude_danny
O.T. Wi-Fi Security Wakes Up to Reality
http://www.newsfactor.com/story.xhtml?story_id=102000027VR6
June 17, 2005 10:37AM
If a company can't migrate to AES encryption, which requires faster processors in the access point, then the company should consider using a virtual private network (VPN) in house for its Wi-Fi network, says Roger Sands, vice president of enterprise development at Colubris Networks.
Wi-Fi security has come a long way since two 20-somethings sat in the parking lot of a Lowe's store in Southfield, Mich., hacked their way into Lowe's datacenter in Wilkesboro, N.C., and downloaded customer credit card numbers.
Two years on and many companies are still as vulnerable today as Lowe's was then. Most experts agree that the weakest link in the enterprise today results from a failure to upgrade to the latest encryption and authentication technologies.
"Early on a lot of wireless devices were simplistic at best with a 40-bit WEP key and no support for authentication," says Richard Rushing, chief security officer for AirDefense .
In addition to WEP, another limited legacy approach to security is LEAP (Lightweight Extensible Authentication Protocol), originally a Cisco protocol for transporting authentication data. Cisco is now phasing out LEAP and other approaches in favor of PEEP (Protected Extensible Authentication Protocol), developed jointly by Cisco, Microsoft and RSA Security.
In addition, most newer Wi-Fi networks now deploy 802.11 with stronger password-protection functions and AES (Advanced Encryption Standard) authentication.
But for many large companies, a Wi-Fi network involves a multiyear rollout, which often precludes going back to square one and upgrading access points (APs) and client devices every time a newer technology is introduced.
If a company can't migrate to AES, which requires faster processors in the AP, then the company should consider using a virtual private network (VPN) in house for its Wi-Fi network, says Roger Sands, vice president of enterprise development at Colubris Networks.
"Or at least use TKIP [Temporal Key integrity Protocol], which is better than a static WEP key," Sands says.
The truth is that wireless technology in general has an inherent weakness not shared by a wired network: A physical barrier can't protect wireless.
When wireless leaves the building it is the same as putting an Ethernet connection outside the door, Rushing says.
Because almost all of the basic gambits hackers used three years ago, such as the Evil Twin, DoS and taking down all access points in order to put in a rogue AP when the system reboots, are still possible, the only real defense is to monitor and scan the airwaves for intruders, says Rich Mironov, a vice president at AirMagnet.
Despite all the high-tech gadgetry used by both good guys and bad, many security rules are commonsense, says jack Cold, a principal at JCoId Associates.
"Make sure people log out, don't leave devices hanging around, and make sure people aren't looking over your shoulder," Cold says.
All the experts spoken to for this article agreed that wireless is a magnifying glass, and if there is a security hole in your organization, wireless will magnify it.
dude_danny
RE: Dell/Wave. I forgot to mention that "Healthcare" link also gives Wave ETS.
dude_danny
DELL/WAVE
http://www1.us.dell.com/content/segmenter.aspx/pub?c=us&cs=2684&l=en&s=pub
If you click on "Software and Peripherals" on State/Local Government, K-12, and Higher Ed and type
"Wave ETS" this will appear. I think "Federal Government" link will be up there soon from the news today IMO.
Envoy
Wave ETS Enterprise TPM Security - Dell Edition 1.0
Interesting the pricing is different ie. If go look at "State/Local" section. ETS 1.0 is $18.19 for Cal., $18.42 for
N.Y., and Texas is $17.79.
dude_danny
O.T. Dell red-faced over salesman's Lenovo jibes
Sorry if posted.
http://www.theregister.com/2005/06/03/dell_lenovo_threat/
By Ashlee Vance in London
Published Friday 3rd June 2005 11:02 GMT
Horrified Dell executives scrambled this week to undo a public relations nightmare that erupted after one of its salesmen equated buying IBM/Lenovo PCs with support for China's communist government.
A Chinese paper published emails from a US Dell salesman identified only as "Chris" which contained unusual tactics meant to sway IBM customers from buying Lenovo hardware. After the emails were printed, Dell China apologized to Lenovo and said it would enforce disciplinary action against "Chris". Dell can little afford bad press in a high-growth market where it has struggled to outsell local rivals.
In one email cited by Chinese news agency Xinhua, "Chris" says: "From a IBM perspective, and please do not think I'm throwing stones. As you know Lenovo is a Chinese government owned company that recently purchased IBM's desktop/notebook business.
"While the US government has given its stamp of approval (no US secrets are in jeopardy) to continue to purchase these units people must understand that every dollar they spend on these IBM systems is directly supporting/funding the Chinese government.
"Just something to think about."
Something to think about indeed.
"Chris" rightly points out that Lenovo, which last year acquired IBM's PC business, is partly owned by the Chinese government. So, some sales money would in fact make its way back to The Reds. It seems, however, that encouraging potential customers to contemplate the anti-capitalist, anti-American nature of their purchases isn't a strategy a firm wants to go public.
"We have a code of conduct that we uphold here for Dell in the U.S. and worldwide, specific guidelines for not commenting on competitors from an employee's standpoint," a Dell spokesman told the AP. "We're pretty serious about it."
In March, the US government approved IBM's deal with Lenovo, saying it felt comfortable with a Chinese company supplying tons of PCs to government and corporate clients. The Dell salesman, however, seized on some of the fears the Feds debated in a second email with the potential customer. When asked if he had proof "every penny" of IBM computer sales go to Mao's children, "Chris" replied:
"No proof at all on my end except extensive reading and discussions with my peers. IBM's desktop and notebook business has been sold to Lenovo, which is a state sponsored/owned company. Some of my Army customers take issue with this so makes for interesting conversation. If I happen to see any interesting articles I will forward over to you."
A Lenovo spokesperson was quoted by several papers, chastising Dell for failing to "respect national governments and enterprises".
The Dell email story quickly made its way through local papers and had Chinese analysts fuming at Austin's über-capitalist attitude.
"Dell is the bane of China's IT hardware industry," Fang Dongxing, an IT analyst told Xinhuanet. "It not only undermines the advantages of Chinese companies in cost and price, but also threatens its Chinese rivals with the strong weapons of global purchasing power and international brand recognition."
The paper went on to cite an online survey that had 88 per cent of the 82,000 respondents saying Dell's stance was "a serious violation of fair competition rules."
Of course, we've heard this sort of thing before - usually from US businesses bitching about the rise of China's IT sector
The Dell salesman's tactics were particularly comical given the company's embrace of foreign workers. While still a young US company relatively speaking, Dell already owns a staff made up mostly of foreigners. The most patriotic company it ain't.
As for "Chris", no further word on his fate. However, we can't help thinking that should Dell decide to dispense with his services, a well-paid career on US talk radio beckons. ®
dude_danny
Microsoft's Secure Startup (ppt)
http://download.microsoft.com/download/9/8/f/98f3fe47-dfc3-4e74-92a3-088782200fe7/TWAR05011_WinHEC05...
dude_danny
Apple Chip Switch Opens New World for Macs
By GREG SANDOVAL and MATTHEW FORDAHL, AP Technology Writers
9 minutes ago
http://news.yahoo.com/s/ap/20050610/ap_on_hi_te/apple_chips;_ylt=AvOG2.SWhNNCyZqbC.cJvxSs0NUE;_ylu=X...
SAN FRANCISCO - In the late 1990s, Apple Computer Inc. ran TV ads mocking the Intel Corp. chips in rival Windows-based PCs: The Pentium II glued to a snail and the toasted bunny suit were supposed to suggest that Apple's Macintosh computers were simply faster.
ADVERTISEMENT
How times have changed. Apple CEO Steve Jobs warmly embraced Intel Chief Executive Paul Otellini this week as they announced that Macs will switch to chips built by the same company that has made a fortune selling the hardware that powers PCs running Microsoft Corp.'s Windows operating system.
Though the transition is likely to be rocky at first for Apple, programmers and customers, the move could lead to Macs that are both more competitive and more compatible with Windows. It could even open the Mac to software titles now available only to Windows users.
At the same time, Apple would retain as much control as it wants over its software and brand.
Beyond the future performance and energy efficiency improvements Intel has promised, Apple could deploy an Intel security scheme that could allow Apple to keep its operating system locked to Macs. Apple also could tap a separate Intel technology that lets multiple operating systems run efficiently on a single chip.
Such advances could be critical for Apple, which has gained a reputation for building innovative and stylish machines that run Apple's own, acclaimed Mac OS X operating system. By not allowing clones, as are common in the Windows world, Apple can still charge a premium and differentiate itself.
After all, the microprocessor may be the brain of a computer, but the soul is provided by the software, which Apple has said will continue to be locked to its systems.
Apple's business model of selling its own computers and operating system stems from 1970s, when Jobs and friend Steve Wozniak were pioneering the personal computer industry from a Silicon Valley garage. At the time, a fledgling company then-called Micro-Soft was just getting started.
That changed in the early 1980s, when International Business Machines Corp. rushed to put out a personal computer that could compete against Apple. Big Blue integrated hardware and software from other companies — namely, Intel and Microsoft — into its systems.
IBM famously failed to stop competitors from copying its PC. A healthy IBM clone industry grew, fueled by the support of software developers, who saw the huge business opportunity in the volume of clone PCs being purchased.
Apple continued to sell systems based on non-Intel processors and its own software. Even in 1984, when it launched the first Mac, it stuck with Motorola chips and its own software.
In the 1990s, Motorola and Apple joined forces with IBM, which by then long realized it had lost control of the PC, to build the more powerful PowerPC microprocessor to do battle with WinTel.
But Apple's market share continued to slide. Corporations and consumers embraced Windows-based systems because they could run more programs. Software developers loved WinTel because it guaranteed a huge market.
Apple became the niche player it is today, with just 2.3 percent of the worldwide market, according to the latest figures from the research firm IDC.
Still, Jobs managed to continue marketing the Mac as the Porsche of the PC industry.
But IBM and Motorola, which last year spun off its chip business into Freescale Semiconductor Inc., haven't been able to give Apple what it needs. Freescale's G4 has seen only incremental improvements in performance while IBM's G5 runs too hot for notebook computers.
And so Jobs went chip hunting.
Intel promises Apple fast, energy-efficient chips, manufacturing reliability and possibly even lower prices.
Apple could lose control of its operating system when it starts using next year the same hardware that powers the Windows world.
That's where the new technologies come into play and why Apple is so willing to make a move.
Intel has been touting a hardware-based security plan called LaGrande Technology as a way to keep systems secure by locking data with a key that's embedded in a hardware chip.
But LaGrande also could be used to ensure that certain software only runs on permitted machines, such as Mac OS X only running on systems built by Apple.
"You can tie the serial number of the software with the hardware ID, and say these things go together and shall never be separate," said Roger Kay, an analyst at IDC.
But there's a much bigger opportunity for Apple beyond faster, more efficient chips. Though it will prevent Mac OS X from leaking non-Apple PCs, it could allow Apple systems to run Windows — and its universe of programs — at full speed. Currently, running Windows programs on Macs requires emulators that slow down performance.
"It seems to me that Jobs is putting himself in the sights of Bill Gates," said Don Yachtman, a Salt Lake City-based software developer. "Microsoft may act like they don't care about Apple's move to Intel but you never know until they launch an attack."
But Microsoft isn't likely to complain. After all, Apple or its customers would still have to buy a copy of Windows.
Nonetheless, Apple faces technical and psychological hurdles in the near term.
"I'm sure some of Apple's loyal customer base see this as a sellout," said Tim Deal, senior analyst with Technology Business Research. "These users supported this niche, boutique player for years and this agreement with Intel removes a very important difference between a Mac and a PC."
dude_danny
O.T. Nokia, Intel to Cooperate on Connections By MATTI HUUHTANEN, Associated Press Writer
Fri Jun 10, 8:19 AM ET
http://news.yahoo.com/s/ap/20050610/ap_on_hi_te/finland_nokia_intel;_ylt=Agq4Sg3vNaTur65bbkN6uN2s0NU...
HELSINKI, Finland - Nokia Corp., the world's leading mobile phone maker, announced Friday that it will join forces with the world's largest chip maker, Intel Corp., to provide handset users faster voice and data services, including high-speed broadband connections to the Internet.
The companies said the cooperation, using WiMAX technology for mobile clients, building network infrastructures and market development, will bring customers new services.
"For mobile devices and notebook platforms, Intel and Nokia will work closely to identify and deliver the unique power and performance requirements of the technology," Nokia said. "It will also create new opportunities for the consumer and enterprise markets."
The Finnish company was a founding member of WiMAX, a nonprofit corporation between leaders in the industry formed to promote and certify compatibility and interoperability of broadband wireless products.
It decided to leave the organization in May 2004, but returned a month later.
"To have innovators like Nokia working to bring WiMAX and other broadband wireless technologies to the masses is very encouraging," said Sean Maloney, general manager of Intel's mobility group.
WiMAX, which stands for Worldwide Interoperability for Microwave Access, is a standards-based wireless technology that provides high-speed connections over long distances. It can be used for broadband connections, hotspots and high-speed enterprise connectivity for businesses.
If Nokia decides to integrate WiMAX into its mobile handsets in the future, it would be important for the future development of the forum, according to Julien Grivolas, an analyst at London-based Ovum, a technology research firm.
Dow Jones Newswires reported that Nokia expects to begin selling its first WiMAX devices in 2008, but not necessarily using Intel's chips. The cooperation means that engineers from the two companies will begin working together and that no money will be exchanged.
U.S. chipmaker Intel is based in Santa Clara, Calif.
Nokia, based in Espoo just outside the Finnish capital, has sales in 130 countries and about 55,500 employees.
dude_danny
O.T. Microsoft CEO Warns of Internet Dangers
By TED BRIDIS, AP Technology Writer
2 hours, 31 minutes ago
http://news.yahoo.com/s/ap/20050609/ap_on_hi_te/tech_execs_interview_9
WASHINGTON - Computer users, beware. The head of the world's largest software company worries that consumers who make Internet purchases have become too complacent about the risks of financial fraud and stolen identity.
Microsoft CEO Steve Ballmer said in an interview with The Associated Press that a calm period without significant Internet attacks has lulled computer users, even older Web surfers who traditionally have been more anxious than teenagers about their online safety.
"I don't want trepidation high, but on the other hand I want people aware of what's going on and taking appropriate precautions," Ballmer said Thursday. "I'm afraid that may have declined, a little too much."
Ballmer and other technology executives, all part of the Washington-based Business Software Alliance, met in Washington with congressional leaders and members of President Bush's Cabinet to lobby over Internet security, foreign trade and protections against software piracy.
They also met with AP reporters and editors for a broad-ranging conversation about future technologies, downloading music, keeping children away from online smut and general Internet safety.
"Convenience is improving rapidly. Things I might have been a bit hesitant to do a couple years ago, I'm willing to go a bit further with today even with some security concerns," said Stephen Elop, chief executive at Macromedia Inc., which makes popular drawing software and programs for animating Web sites.
The executives said parents should teach children to avoid the Internet's seedier neighborhoods. Ballmer said one of his sons carries a laptop to school every day and spends hours online unsupervised.
"We need to oversee and use technology and teach our children what's appropriate," Ballmer said. "Some of it's still going to have to come from parents kind of teaching their kids what's right. That was true even before the Internet."
Elop, a father of five, said he uses software tools to protect his kids online. "But I do not abdicate the responsibility to train my children," he said. "At the end of the day, you have to develop their character and trust them to respond."
Another chief executive, John McEleney of SolidWorks Corp., urged the Supreme Court not to allow expanded copyright lawsuits against manufacturers of file-sharing software popular for stealing music and movies over the Internet. A decision in the case is expected in coming weeks.
Ballmer joked that his family never downloads songs illegally.
"As I tell my three little boys, our family is going to be as holier than thou when it comes to copyrights as any family around because I have to do this kind of work," Ballmer said.
The executives predicted that future technologies will present important information for consumers using computers, wireless handheld devices, video game systems and television sets. "I want to be able to see what I need to see whether I'm on my PC or at my TV," Ballmer said.
Borland Software's chief executive, Dale Fuller, described future cars that won't start if a driver is drunk -- and automatically will call a cab, notify a driver's spouse and reschedule business appointments early the next morning.
"The solutions just open up wide," Fuller said.
dude_danny
O.T. Reincarnating PCs with Portable SoulPads
http://www.kiskeya.net/ramon/work/pubs/mobisys05.pdf
sorry if posted...interesing read
dude_danny
Dell OptiPlex GX620 and GX520
http://www.dell.com/downloads/global/products/optix/en/spec_optix_gx620-520.pdf
sorry if posted.
dude_danny
Doma: I see your point...
Thanks,
dude_danny
O.T. Laptops Outsell Desktops for First Time
By GREG SANDOVAL, AP Technology Writer
Sat Jun 4,10:37 PM ET
http://news.yahoo.com/
SAN FRANCISCO - In a sure sign that the era of mobile computing has arrived, notebooks have for the first time outsold desktops in the United States in a calendar month, the research firm Current Analysis says.
ADVERTISEMENT
After tracking sales from a sampling of electronics retailers, Current Analysis says notebook sales accounted for 53 percent of the total personal computer market last month, up from 46 percent during the same period last year.
San Diego-based Current Analysis does not follow worldwide personal computer sales.
Spurring demand for notebooks is their overall price drop as quality has improved, says Sam Bhavnani, senior analyst for Current Analysis. "Just a few years ago, the performance of notebooks was nowhere near where it is today," he said.
Notebook prices fell 17 percent during the past year while desktop prices dipped only 4 percent. Some of the features common in most notebooks are longer-lasting batteries, CD burners and wireless capability.
The computing crowd is increasingly requiring mobility.
Last year, 80 percent of notebooks offered wireless; this year, it's 95 percent, Current Analysis says.
"There used to be a time when people expected a reply to an e-mail within a couple of days. Now they expect a response within 24 hours. People want to stay connected wherever they are," said Bhavnani.
Notebooks will continue to grab bigger shares of the PC market, Bhavnani predicted. "You're not going to see the desktop go away though."
dude_danny
Gateway/Intel/Wave
Great Find Vacationhouse! I think Gateway is the new OEM for Wave IMO. If you go to Gateway's website and go to desktops section on the right you'll see "Intel Stable Image Platform"
http://www.gateway.com/work/products/sb_dtp_catalog.shtml?clv=TB
Desktop PCs with Intel® Pentium® 4 Processor with HT Technology1 (Launched June 2005)
Click on "COMPONETS" and you get this...
http://www.intel.com/business/bss/products/client/stableplatform/components.htm
Chipset Intel® 945G Express Chipset supported by Intel Stable Image Technology
Motherboards
Intel® Desktop Boards D945PSN, D945PLM, D945PVS, D945PAW, D945GNT, D945GTP, and D945GCZ
Click on "Platform transitions"...Interesting Timeline
http://www.intel.com/business/bss/products/client/stableplatform/components.htm
Aligning new platform qualification and technology transitions with the Intel® SIPP cycle can help maximize the length of time the stable platform can be purchased and deployed. The Intel Stable Image Platform Program defines annual transition cycles for desktop and notebook systems that include a 3 month qualification period followed by a 12 month stable deployment period.
For desktops, Intel recommends that IT complete new platform qualification and start deployment in the June-August window. The stable desktop platform can then be deployed for at least 12 months through the next desktop transition. For notebooks, the Intel SIPP qualification window is January-March.
Transitioning Desktop PC Technology
Complete qualification and begin deployment of new platforms based on 2005 Intel SIPP desktop components in the June-August period.
Click the image to view the entire transition cycle for desktop PCs
Transitioning Notebook PC Technology
Deploy stable platforms based on 2005 Intel SIPP notebook components through the end of 2005. The next Intel SIPP
dude_danny
O.T.? Israeli Companies Suspected of Spying
By JOSEF FEDERMAN, Associated Press Writer
25 minutes ago
http://news.yahoo.com/s/ap/20050601/ap_on_re_mi_ea/israel_high_tech_hijinks;_ylt=AgjIeA3rXdhw6faFoBH...
JERUSALEM - It started out as a family feud. But a small-time computer break-in has erupted into Israel's biggest business scandal in decades, reaching into some of the country's powerful corporate suites and jolting the cozy world of the industrial elite.
ADVERTISEMENT
Top Israeli blue chip companies, including a high-tech giant that trades in New York, are suspected of using illicit surveillance software to steal information from their rivals and enemies.
The list of victims is equally impressive, ranging from a cigarette importer to the local operations of the Ace hardware chain and Hewlett-Packard Co. Even a well-known TV entertainment reporter is caught up in the affair, claiming hackers invaded his computer to get phone numbers of celebrities.
The investigation has shed an unflattering light on the Israeli business world, where cutthroat competition in a small market, high-tech sophistication and the secretive traditions of the army form a volatile mix.
The case is also attracting the attention of top security software makers. Software firms in the U.S. have been updating their products to defend against similar outbreaks.
Sever Plocker, a leading Israeli economic commentator, said the scandal could have "unpleasant consequences" for foreign investment.
"People don't like to invest in countries where companies do some very unethical things," he said. "I think it is bad for Israel, bad for the image of Israel and nothing to be proud about."
The "Trojan horse" scandal, named after the monitoring software secretly planted on the corporate computers, has been front-page news since police lifted a gag order this week. Police say 22 people have been arrested, and more arrests are expected.
"It's getting bigger every day," said Nir Nateev, head of the police computer and cyber crime department in Tel Aviv, who said some 100 computers have been confiscated. "In the end, there will be dozens (of companies) involved."
The burgeoning scandal has sent a shudder through the business world. The country's central bank chief, American economist Stanley Fischer, warned this week that the case could harm foreign investment.
Amir Barnea, a business professor at the Interdisciplinary Center, a prestigious Israeli university, attributed the scandal to the hypercompetitive business atmosphere in a tiny market of 7 million people.
"Unfortunately some managers may lose the distinction between a legitimate fight for survival and doing illegal acts," he said.
Others said the combination of Israel's high-tech culture, fine-tuned in secretive military units, and a penchant for independent thinking made the scandal inevitable. Some of the world's top computer security companies, including Check Point Software Technologies Ltd., are Israeli.
"If Israelis see a wall, they will try to break it," said TV commentator Motti Kirshenbaum. "It is a challenge to break a wall. Israelis don't say, 'There's a fence, let's respect it.'"
Police say they stumbled upon the case after author Amnon Jackont discovered excerpts on the Internet of a book he was still writing. More documents from his computer began appearing on the Internet and someone tried to use his bank details to make transactions.
Jackont realized his computer had been invaded and told police he suspected the spy was his stepdaughter's ex-husband, Michael Haephrati.
In a newspaper interview, he said Haephrati became "vengeful and obsessive" after the collapse of his marriage. Police subsequently found the surveillance software on Jackont's machine.
Nateev said the discovery snowballed into an international investigation involving British, German and American authorities. "We never saw this in the past," he said. "They were very, very, very surprised by the size of the case and helped us a lot in this."
Investigators determined that Haephrati sold customized copies of his program to three Israeli private investigators. Haephrati, who reportedly lives in London and Germany, has been detained with his new wife by British authorities. The Metropolitan Police decline to say whether he was cooperating.
Some versions of the spy software tempted victims into installing it by posing as a package of confidential documents delivered via e-mail. Once installed, the software recorded every keystroke and collected business documents and e-mails on a victim's PC and transmitted information to a server computer registered in London.
"This was not designed very well," said Robert Sandilands, the head of the virus research lab for Authentium Inc., a Florida security firm. "This does not seem to be the work of an experienced virus writer."
The suspects in Israel include senior executives from three prominent private investigation firms, among them a former top military investigator, retired Shin Bet security agent and former police officers. Police said 12 people are in jail and eight others are under house arrest.
The list of clients implicated in the affair reads like a Who's Who of Israeli blue chips: Amdocs Ltd., a business-software maker that trades on the New York Stock Exchange; the Cellcom phone carrier and three subsidiaries of the Bezeq phone monopoly, a long-distance carrier, cell phone provider and satellite TV firm.
Most of the companies have denied wrongdoing or said they were unaware of the tactics used by investigators they hired.
The alleged victims, meanwhile, reportedly include Hewlett-Packard and the Ace hardware chain, as well as the Globes business daily, Strauss-Elite food group, the HOT cable company, and the Bezeq parent company.
Ira Winkler, author of the book "Spies Among Us," said Trojan horses are a relatively new tactic in a growing epidemic of global high-tech espionage.
He said the break in the case -- tracing the scandal to a vindictive relative -- was typical. "Never underestimate the stupidity of criminals."
dude_danny
Great Find!
Thanks.
dude_danny
A Conversation with Motorola’s Greg Brown
Very Interesting...
http://www.ita-relay.com/magazine/ew2005/First_Quarter/brown_lo_rez.pdf
EWM:
As we look at extending the enterprise
IT infrastructure wirelessly, certainly
one of the big topics that corporate
America looks at is security. How does
wireless security fit into the solutions
portfolio?
Brown:
We view security as an ingrained
component of overall device
manageability and the solutions
orientation with the wireless LAN
infrastructure. You rightly point out
that security is on the top of their
minds as we speak to the customers.
We are able to leverage our 60-plus
years in the public safety/mission critical
market where end-to-end encryption,
security and privacy are the opening
stakes to get into the game.
dude_danny
O.T. Stanford Rejects 41 Hacker Applicants
Mon May 30, 3:20 PM ET
STANFORD, Calif. - Stanford University's Graduate School of Business has rejected 41 applicants who tried to access an admissions Web site earlier this year in hopes of learning their fate ahead of schedule.
School officials said the applicants were given the opportunity to explain why they attempted to gain access to their admissions files before the date when the university was to tell them if they were admitted.
"At the end of the day, we didn't hear any stories that we thought were compelling enough to counterbalance the act," said Robert Joss, dean of the business school.
Admissions sites of at least six schools were accessed by applicants for about 10 hours in early March after a hacker posted instructions in a BusinessWeek Online forum.
The instructions told people to log onto their admissions Web page and find their identification numbers in source material that was available on the site. By plugging those numbers into another Web page address, they were directed to a page where their admissions decision would be found.
Some applicants saw blank pages and others viewed rejection letters before access was denied.
Within a week of the incident, Harvard University announced it would reject 119 applicants for following the hacker's instructions and visiting the school's admissions site. The Massachusetts Institute of Technology followed suit, rejecting 32 applicants.
Stanford had decided not to take action until hearing the applicants' explanations, but in the end they, too, lost out. The 41 Stanford applicants did not find out their admissions status at the time, as the university had not posted its decisions yet, Joss said.
The school admits just 8 percent of those who apply to the business school each year, so "it's a low probability of getting in anyway," Joss said.
dude_danny
Identity Theft Study Finds Most Americans Feel No More Secure than One Year Ago
sorry if posted.
http://www.smartcardstrends.com/det_atc.php?idu=2203
Dallas, May 23, 2005.
Despite a recent push in identity theft prevention awareness by major institutions and government agencies, 75 percent of Americans believe that their identity is no more secure than one year ago, according to a new survey commissioned by Intervoice, (Nasdaq:INTV), the world leader in converged voice and data solutions. The research was compiled by TNS from a group of over 1,000 participants in the United States and displays Americans' attitudes toward identity theft and identity safety.(1) The firm also polled 1,000 consumers in Great Britain during the same time period. The survey validates that consumers do not believe current and traditional methods of security are good enough to protect them against identity theft.
The survey finds that most Americans believe that technology puts them at the greatest risk for identity theft; however, more than 60 percent of consumers report they are not limiting their use of technology-related services such as ATMs, speech recognition systems and phone purchases, or online transactions, in order to minimize this risk.
Other highlights of the survey include:
-- Technology causes the most concern about identity theft, more so than person-to-person interactions, such as dealing with store employees. However, older consumers (60+ years) are more concerned about paper receipt trails than their younger counterparts.
-- Among those who have changed their behavior due to concern over identity theft, approximately one-fifth have stopped making purchases via telephone.
-- Older individuals are more likely to refrain from various activities such as online purchase, online banking and using ATMs, in order to protect themselves from identity theft.
"As identity theft is a significant cost threat to banks, exercising vigilance is critical to protecting funds and identities of customers," said Kenneth Newman, Vice President of Security at American Savings Bank in Hawaii, an Intervoice customer. "Safeguarding customer data has become a priority to ensure that our customer's identities are as secure as possible."
The issue of identity theft has also reached legislative proportions. In March, U.S. Senator Jon Corzine (D-NJ) proposed legislation that calls for commercial entities to establish security systems that safeguard sensitive personal information they maintain on behalf of their customers. It also addresses victim notification and recovery efforts, establishes a regulatory oversight regime for third party data collectors and allows civil actions to be taken by individuals and state attorney generals.
Many American consumers, like their European counterparts, favor a national identification card as a means of protection against identity theft. The survey found that over 40 percent of individuals in the U.S. and more than half in Great Britain would be willing to use this as their primary means of protecting themselves from identity theft. However, most Americans find that responsibility for protecting identity lies primarily with individuals themselves, instead of governments or private enterprise. In fact, 81 percent of consumers believed that they are personally responsible to protect themselves against identity theft. "Researching institutions with the highest security standards" ranked second to a national ID card in terms of methods of protection.
"Make no mistake about it, identity theft poses a very real threat to our economy -- and it is on the rise," Senator Corzine said. "In fact, it's our nation's fastest growing crime. And last year, identity theft complaints to the Federal Trade Commission grew by fifty percent since 2002. With so many instances of fraudsters seeking to abuse an individual's good name, it is clear that more must be done to prevent the proliferation of identity theft."
"Identity theft has been a growing concern for both our customers and their customers. This data proves that more must be done to protect the global consumer's transactions whether they be in-person, over the phone or online," said George Platt, Senior Vice President and General Manager, Enterprise Business Unit, at Intervoice. "New security options and technologies will help prevent this form of crime and ease the consumer's anxiety."
dude_danny
Foam: "R" could stand for ROBUST, RESILIENT, RAGE'N, ROYAL, RADICAL ...IMO
dude_danny
Thanks Awk.
dude_danny
Thanks Telsar.
dude_danny
Thanks Knute and Vacationhouse:
:3. Breakeven in approximately 12 months! (I actually missed this one trying to take notes but I think this is correct per my discussions after the meeting)
I think 12 months is very conservative IMO.
dude_danny
O.T. Banks Notify Customers of Data Theft By PAUL NOWELL, AP Business Writer
28 minutes ago
http://news.yahoo.com/s/ap/data_theft
CHARLOTTE, N.C. - More than 100,000 customers of Wachovia Corp. and Bank of America Corp. have been notified that their financial records may have been stolen by bank employees and sold to collection agencies.
ADVERTISEMENT
So far, Bank of America has alerted about 60,000 customers whose names were included on computer disks discovered by police, bank spokeswoman Alex Liftman said Monday.
"We are trying to communicate with our customers as promptly as possible," she said. "So far, we have no evidence that any of our customer information has been used for account fraud or identity theft."
Wachovia said it has identified 48,000 current and former account holders whose accounts may have been breached.
"The numbers have increased as we continue to receive additional names from police," Wachovia spokeswoman Christy Phillips said Monday.
Both banks are providing the affected customers with free credit reporting services.
In a separate case with the potential for identity theft, a laptop containing the names and Social Security numbers of 16,500 current and former MCI Inc. employees was stolen last month from the car of an MCI financial analyst in Colorado, said company spokeswoman Linda Laughlin.
The car was parked in the analyst's home garage and the computer was password-protected, she said. MCI would not comment on whether the data was encrypted.
The bank record theft was exposed last month when police in Hackensack, N.J., charged nine people, including seven bank workers in an alleged plot to steal financial records of thousands of bank customers.
The bank employees accessed records for customers of Cherry Hill, N.J.-based Commerce Bank, PNC Bank of Pittsburgh, and Charlotte-based banks Wachovia and Bank of America, according to Hackensack Police Chief Ken Zisa.
Orazio Lembo Jr., 35, of Hackensack allegedly made millions of dollars through the scheme, Zisa has said.
Authorities said they discovered the plot after they executed a search warrant at Lembo's apartment in February as part of a separate investigation. They seized 13 computers which contained details about the plan, Zisa said.
Lembo received lists of people sought for debt collection and turned that information over to the seven bank workers, who would compare those names to their client lists. The bank workers were paid $10 for each account they turned over to Lembo, Zisa said.
dude_danny
O.T. CITRUS Research
http://www.citris.berkeley.edu/events/2005/csd_nasa_2005-04-18/presentations/05-shankar-sastry-citri...
dude_danny
O.T. Feds Faulted For Weak Wireless Security
Sorry if posted.
http://www.securitypipeline.com/showArticle.jhtml?articleId=163105182
Feds Faulted For Weak Wireless Security
By Eric Chabrow Courtesy of InformationWeek
Congressional auditors contend the federal government isn't doing enough to secure its wireless networks.
In a 31-page report issued Tuesday, the Government Accountability Office said federal agencies have yet to fully apply key controls such as policies, practices, and tools to let them operate wireless networks securely. GAO tests of the security of wireless networks at six federal agencies revealed unauthorized wireless activity and "signal leakage," wireless signals broadcasting beyond the perimeter of the building and thereby increasing the networks' susceptibility to attack.
A diagram in the report shows signal leakage emanating from wireless-access points in three federal buildings onto surrounding streets and into nearby privately owned buildings in Washington, presenting security exposures. "Without implementing key controls, agencies cannot adequately secure federal wireless networks and, as a result, their information may be at increased risk of unauthorized disclosure, modification, or destruction," said the report, co-written by GAO information security issues director Gregory Wilshusen and chief technologist Keith Rhodes.
The report detailed four examples of wireless network security threats:
• Eavesdropping: The attacker monitors transmissions for message content. For example, a person listens to the transmissions on a network between two workstations or tunes in to transmissions between a wireless handset and a base station.
• Traffic analysis: The attacker, in a more subtle way, gains intelligence by monitoring transmissions for patterns of communication. A considerable amount of information is contained in the flow of messages among communicating parties.
• Masquerading: The attacker impersonates an authorized user and exploits the user's privileges to gain unauthorized access in order to modify data.
• Replay: The attacker places himself between communicating parties, intercepting their communications, and retransmitting them; this is commonly referred to as "Man-in-the-Middle."
GAO pointed out the wide range of benefits wireless networks offer federal agencies, including increased flexibility and ease of network installation. Still, the report said, wireless networks also present significant security challenges, including protecting against attacks to the networks, establishing physical control over wireless-enabled devices, and preventing unauthorized deployments of wireless networks. "To secure wireless devices and networks and protect federal information and information systems, it is crucial for agencies to implement controls--such as developing wireless security policies, configuring their security tools to meet policy requirements, monitoring their wireless networks, and training their staffs in wireless security," the report says.
GAO recommends that the director of the White House Office of Management and Budget instruct the agencies to ensure that wireless network security is incorporated into their agencywide information-security programs in accordance with the Federal Information Security Management Act.
Congressional auditors briefed representatives of OMB's Office of Information and Regulatory Affairs and the Office of General Council on its findings. OBM told GAO it generally agreed with the contents of the report, and that the Commerce Department's National Institute for Standards and Technology is updating wireless guidance for federal agencies, which is slated to be issued for comments in August.
OMB stressed that it's the individual agencies and departments, not the White House, that have the primary responsibility for complying with FISMA's information-security-management program requirements. As part of its annual review of agency information-security programs, OMB told GAO it would consider whether agencies' programs adequately addressed emerging-technology issues such as wireless security before approving them.
In 2002, the National Institute for Standards and Technology issued guidelines for securing wireless networks. Those recommendations include identifying who may use wireless LAN technology in an agency; describing the type of information that may be sent over wireless links; describing who can install access points and other wireless equipment; describing conditions under which wireless devices are allowed; describing limitations on how the wireless device may be used, such as location; and providing guidelines on reporting losses of wireless devices and security incidents.
It also urged agencies to describe the hardware and software configuration of all wireless devices; provide guidelines for the protection of wireless clients to minimize and reduce theft; and identify whether Internet access is required. It also suggested that agencies define standard security settings for access points; provide limitations on the location of and physical security for access points; define the frequency and scope of security assessments, including access point discovery; and provide guidelines for the use of encryption and key management.
dude_danny
RSS support/Tvtonic
According to M. Sprague RSS support with TvTonic will be available next month.
http://www.thepodcastnetwork.com/mediacenter/2005/05/16/the-media-center-show-7-michael-sprague/
dude_danny
Thanks Lugan,
dude_danny
Thanks Eamonn,
dude_danny
Thanks Foam!
dude_danny
Awk: I hope so...
dude_danny
Can somebody tell me what "RSS Support" is?
TVTonic with RSS support will be coming soon, but in the meantime there is an unpublished feature in the existing TVTonic interface that enables you to add channels of custom wmv or mp3 files to the TVTonic channel menu.
In Program Files\Wavexpress\TVTonic\My Collection\, create a folder called “Feeds”. Any folder found in the Feeds directory will become a channel named after the folder. The files in that folder become the individual shows in the channel.
So simply by pointing your rss client to deposit enclosures in subfolders of “TVTonic\My Collection\Feeds”, you can make use of the simple TVTonic channel interface in MCE to navigate and view video blogs or listen to podcasts.
Thanks,
dude_danny
OknPV: Very Cool!
Thanks,
dude_danny
The Media Center Show #8 with Michael Sprague - 16th May 2005 (40min)
http://www.thepodcastnetwork.com/mediacenter/2005/05/16/the-media-center-show-7-michael-sprague/
This week I talked to Michael Sprague President and COO of Wavepress makers of TVTonic an Online Spotlight application for Windows Media Center. We talked about TVTonic and the broadcast of TV over broadband
I also read out some email from John Hoole about RegMechanic, Christopher Addicott and Shaun Adams.
I played a messge in to the Skype line from Herc and have another chance to win MyRemoteMouse
The Skype line for the show is MediaCenterShow and the email address is isdixon@gmail.com
dude_danny
XBOX 360 won't kill off Media Center: Ian Dixon's Blog
http://spaces.msn.com/members/iandixon/Blog/cns!1pG33U4bh6jzLG6yE4ZZG2Bg!534.entry
Sorry if posted.
Tim Coyle on this Excellent blog here says that the Xbox 360 could kill off Media Center as a platform.
So there’s been a lot of leaks lately on the next Xbox system coming out and the two features that I find the most interesting are:
the interface will look very similiar to the Media Center interface
you can stream content from your Windows XP PC to the Xbox console
If this is true, and the price point stays at $299 (the current cost of a Media Center extender), then why would anyone buy a Media Center PC? It looks like the only thing that will be left out of the next Xbox is the ability to view and record TV. But you can throw a TV tuner into any PC and record TV. You still won’t have live TV to stream but with time-shifted TV available how many people actually watch live TV anyway? Plus you can get a HD capable Tivo or something like that.
I think that the Media Center function will be at the heart of a consumer version of Longhorn and they will position MCE as the digital media server for the home.
The MCE PC will be more that just TV, it will be downloading content from the web (like TVTonic, Online Spotlight will enable streaming content on to the xbox via the PC)
So I don't see MCE going, but I see it taking more of a server role and the xbox is a endpoint for your content. I can't wait to see what Media Center function will be on the XBOX 360.
Maybe in the rest of the world we will finally get entenders?
Plus another point is that some people don't want a XBOX as an extender, they want a very small set top box type extender without the complications of a XBOX.
The XBOX 360 will open up Media Center rather than cut it off.
dude_danny