sleepy
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
FYI: Intel, Toyota Drive Joint Research on Next-Generation In-Vehicle Infotainment Systems
NEWS HIGHLIGHTS
Intel and Toyota engage in leading-edge research to enable new usage models for mobile device connectivity in the car.
Joint research to focus on developing user interaction methodologies including touch, gesture and voice technologies as well as information management for the driver.
The connected car is the third-fastest growing technological device, following smartphones and tablets.
http://newsroom.intel.com/community/intel_newsroom/blog/2011/11/09/intel-toyota-drive-joint-research-on-next-generation-in-vehicle-infotainment-systems?cid=rss-258152-c1-271390
SANTA CLARA, Calif., Nov. 9, 2011 – Intel Corporation and Toyota Motor Corporation today announced that the companies are working together to define next-generation in-vehicle infotainment (IVI) systems that will enable new usage models for mobile device connectivity in the car.
According to Mobile Future, the connected car is the third-fastest growing technological device, following smartphones and tablets. With the car becoming an extension of today’s digital lifestyle, Intel and Toyota are working together to adapt features that drivers and passengers use in the latest consumer electronic devices to an automotive environment.
“Intel has been conducting research related to the connected car for years, and with the support of Toyota will extend that research to advanced services that will benefit the driver and passengers in many ways,” said Staci Palmer, general manager of Intel’s Automotive Solutions Division. “Through this joint effort, we hope to improve the driving experience by enabling a seamless connection between mobile devices and the vehicle so when brought together they naturally adapt and work in harmony.”
As technology converges with the car, silicon solutions serving the infotainment and telematics market are expected to rise from $5.6 billion in 2010 to $8.7 billion in 2018.1 Intel and Toyota aim to integrate advanced technologies in the vehicle in a more intuitive manner that reduces driver distraction. To accomplish this, the companies will focus research on developing a user interaction methodology including touch, gesture and voice technologies as well as information management for the driver. Intel will also work to optimize these features and services using the performance of the Intel® Atom™ processor family.
“Toyota aims to lead the future mobile world through integration of vehicle, home and information communication technologies as announced in the ‘Toyota Global Vision’ earlier this year,” said Kenichi Murata, project general manager, Electronics Development Div. 1, Toyota Motor Corporation. “Toyota, along with Intel, will use information technologies to drive innovations into the vehicle to make the vision a reality.”
The companies will also explore emerging connectivity technologies and effective ways to integrate vehicles with the home to provide a seamless connection across all areas of people’s lives.
stuffit, unable 2 listen -- fixing lunch for my 3 yr old and then nap time for the both of us!! my guess is they like what he is saying. Up in AH.
Cisco Systems managed to exceed Wall Street estimates with stronger-than-expected EPS and revenues. The company reported adjusted net income of 43 cents/share versus the 34 cents/share estimate and revenues of $11.26 billion versus the $11.01 billion estimate. Revenue climbed 4.7% from the same period last year.
The company has now reported lower net income fall in each of the last four quarters. Cisco Systems' revenue has grown during each of the past four quarters on a year-over-year basis.
Income:
Over the past year, Cisco Systems reported net income of $1.46/share. The company trumped analyst projections of $1.31 by 11.5%. According to the reported number, the company's income fell 7.9% from last year's levels.
...
http://www.benzinga.com/news/earnings/11/11/2112885/cisco-systems-reports-falling-profit
Cisco FYQ1 Rev $11.26B, EPS $0.43/Sh
CSCO AH 18.02 (+0.27)
titlewave, it seems like every time we have a conference call the market decides to plunge. Oh well...
MF Global: It wasn't Greece's fault
Kevin Lacroix has a typically thoughtful and interesting post on the collapse of MF Global. One point that particularly caught my eye dealt with the issuers of the debt that got MF Global into trouble:
... MF Global was not exposed to Greek debt. MF Global held the debt of other European countries. Its assets include $6.3 billion of Italian, Spanish, Belgian Portuguese and Irish debt. More than half of the total was Italian. It was the company’s exposure to these debts that led to regulatory scrutiny, downgrades, and margin calls that threatened the company’s liquidity.
It's hard not to to draw adverse conclusions about the prospects for resolving the debt crisis if the eighth largest bankruptcy in US history can be occasioned despite the absence of Greek debt from MF Global's portfolio. It certainly suggests a lack of market confidence in the prospects for countries like Italy.
http://www.professorbainbridge.com/professorbainbridgecom/2011/11/mf-global-it-wasnt-greeces-fault.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+professorbainbridge%2FsheN+%28ProfessorBainbridge.com+%C2%AE%29
Feds concerned about hackers opening prison doors
http://www.washingtontimes.com/news/2011/nov/4/feds-concerned-about-hackers-opening-prison-doors/
MIAMI — Federal authorities are concerned about new research showing U.S. prisons are vulnerable to computer hackers, who could remotely open cell doors to aid jailbreaks.
The Federal Bureau of Prisons is “aware of this research and taking it very seriously,” spokesman Chris Burke told The Washington Times.
Mr. Burke was reacting to research by private experts who found that the security systems in most American prisons are run by computer software vulnerable to hackers.
“You could open every cell door, and the system would be telling the control room they are all closed,” said John J. Strauchs, a former CIA operations officer who helped develop a cyber-attack on a simulated prison computer system and described it at a hackers’ convention in Miami last week.
The security systems in most American prisons are run by special computer equipment called industrial control systems, or ICS. They are also used to control power plants, water treatment facilities and other critical national infrastructure. ICS has increasingly been targeted by hackers because an attack on one such system successfully sabotaged Iran’s nuclear program in 2009.
A malicious cyber-intruder could “destroy the doors,” by overloading the electrical system that controls them, locking them permanently open, said Mr. Strauchs, now a consultant who has designed security systems for dozens of state and federal prisons..
Hackers could “shut down secure communications” through the prison intercom system and crash the facility’s closed-circuit television system, blanking out all the monitors, he added.
Mr. Strauchs, 67, and his daughter — attorney, professor and computer security researcher Tiffany Strauchs Rad , 37 — told an audience at the Hacker Halted conference about the attack they developed in the basement of a Washington area home for less than $2,500.
“Personally, I think the greatest danger is assassination,” Mr. Strauchs told The Washington Times afterward. “You create chaos as a way to [implement a plan to] kill someone.”
Mr. Strauchs said he and his daughter had been careful to work with U.S. authorities to alert them to the risk before publicly disclosing their attack. They organized a briefing for federal agencies over the summer at CIA headquarters in Northern Virginia.
Sean P. McGurk, who led the Department of Homeland Security’s efforts to secure ICS until leaving in September, said the department had looked into the researchers’ claims using the special ICS computer test bed at the Idaho National Laboratory.
“We validated the researchers’ initial assertion … that they could remotely reprogram and manipulate” the special software controllers that run the systems, Mr. McGurk said.
Teague Newman, another member of their team, said ICS systems are not supposed to be connected to the Internet.
“But in our experience, there were often connections” to other networks or devices, which were in turn connected to the Internet, making them potentially accessible to hackers, he said.
In some of the facilities the team visited for their research, guards had used the same computer that controls the prison’s security systems to check their personal email, exposing it directly to potential hackers, Mr. Teague said.
n many prisons, technical support staff would add connections to enable them to update the system’s software remotely after the ICS systems were installed by security specialists.
“We saw that a lot, a lot,” said Mr. Teague.
Mr. McGurk said he found Internet connections in every one of the 400-plus onsite inspections of control systems in the government and private sector he had overseen in three years at the Homeland Security Department.
“In no case did we ever not find connections,” he said. “They were always there.”
Even systems that were successfully cut off from the Internet could be attacked by malicious insiders or anyone with enough access to insert a thumb drive into a computer work station, Mr. Strauchs said.
“The mostly likely vector would be to bribe a prison guard to insert a USB drive with malicious programming. Hard to stop and hard to find out who did it,” he said.
Mr. Teague said the team’s attack was “pretty easy” to develop.
“I had no prior experience with programming ICS” Mr. Newman said, “We did not spend a lot of time, it was cheap, and we did it in my basement.”
Katmai,
didn't stay there for long!
After Hours
Time (ET) After Hours
Price After Hours
Share Volume
16:05 $ 2.638 6,100
just might stay up for this one!
Stock Futures
INDEX VALUE CHANGE TIME
DJIA INDEX 11,658.00 -110.00 04:23
S&P 500 1,221.60 -12.60 04:23
NASDAQ 100 2,286.50 -28.00 04:23
Euro, Asia Stocks Fall as EU Cuts Greek Aid
Bloomberg News - Nov 3, 2011 1:05 AM PT
The MSCI World Index dropped 0.9 percent as of 8:01 a.m. in London and the Stoxx Europe 600 Index sank 1.4 percent. Standard & Poor’s 500 Index futures retreated 1.4 percent.
Europe's Greece Ultimatum
France, Germany Say the Nation Must Decide Whether to Stay in Euro or Go
CANNES, France—Europe's leaders, making it plain that they've reached the end of their patience with Greece, demanded that the beleaguered nation declare whether it wants to stay in the euro currency union—or risk going it alone in a dramatic secession.
"Does Greece want to remain part of the euro zone or not," German Chancellor Angela Merkel said. "That is the question the Greek people must now answer."
http://online.wsj.com/article/SB10001424052970203804204577014371119242492.html?mod=WSJ_hp_LEFTTopStories
France's biggest listed bank BNP Paribas reported a 72 percent slide in quarterly earnings on Thursday after booking a bigger-than-expected 2 billion euro ($2.8 billion) charge on Greek debt and sold billions in eurozone bonds to cut risk.
http://www.reuters.com/article/2011/11/03/bnpparibas-idUSL5E7M30I120111103
MF Global exit undermines Australia grains futures
* MF Global collapse sidelines Australian grain futures
* Only 130 ASX grain contracts traded on Wednesday vs average daily volume of 1,800
* Liquidity key to success of Australian ag futures market
* Major players needed to fill hole left by MF Global's demise
http://www.reuters.com/article/2011/11/03/australia-grains-mfglobal-idUSL4E7M301220111103
New cyber attack targets chemical firms: Symantec
Mon Oct 31, 2011 11:48am EDT
http://www.reuters.com/article/2011/10/31/us-cyberattack-chemicals-idUSTRE79U4K920111031?feedType=RSS&feedName=technologyNews
(Reuters) - At least 48 chemical and defense companies were victims of a coordinated cyber attack that has been traced to a man in China, according to a new report from security firm Symantec Corp.
Computers belonging to these companies were infected with malicious software known as "PoisonIvy," which was used to steal information such as design documents, formulas and details on manufacturing processes, Symantec said on Monday.
It did not identify the companies, but said they include multiple Fortune 100 corporations that develop compounds and advanced materials, along with businesses that help manufacture infrastructure for these industries.
The bulk of the infected machines were found in the United States, Bangladesh and United Kingdom, Symantec said, adding that the victims include 29 chemicals companies, of which some developed advanced materials used in military vehicles.
"The purpose of the attacks appears to be industrial espionage, collecting intellectual property for competitive advantage," Symantec said in a white paper on the campaign, which the company dubbed the "Nitro" attacks.
The cyber campaign ran from late July through mid-September and was traced to a computer system in the United States that was owned by a man in his 20s in Hebei province in northern China, according to Symantec.
Researchers gave the man the pseudonym "Covert Grove" based on a literal translation of his name. They found evidence that the "command and control" servers used to control and mine data in this campaign were also used in attacks on human-rights groups from late April to early May, and in attacks on the motor industry in late May, Symantec said.
"We are unable to determine if Covert Grove is the sole attacker or if he has a direct or only indirect role," said Symantec's white paper. "Nor are we able to definitively determine if he is hacking these targets on behalf of another party or multiple parties."
The Nitro campaign is the latest in a series of highly targeted cyber attacks that security experts say are likely the work of government-backed hackers.
Intel Corp's security unit McAfee in August identified "Operation Shady RAT," a five-year coordinated campaign on the networks of 72 organizations, including the United Nations, governments and corporations.
In February, McAfee warned that hackers working in China broke into the computer systems of five multinational oil and natural gas companies to steal bidding plans and other critical proprietary information.
Symantec said on Monday that the Nitro attackers sent emails with tainted attachments to between 100 and 500 employees at a company, claiming to be from established business partners or to contain bogus security updates.
When an unsuspecting recipient opens the attachment, it installs "PoisonIvy," a Remote Access Trojan (RAT) that can take control of a machine and that is easily available over the Internet.
While the hackers' behavior differed slightly in each case, they typically identified desired intellectual property, copied it and uploaded it to a remote server, Symantec said in its report.
Symantec did not identify the companies that were targeted in its white paper and researchers could not immediately be reached. Dow Chemical Co was not immediately available to comment. A spokesman for DuPont declined comment, saying: "We don't comment on cyber security issues."
(Reporting by Jim Finkle. Additional reporting by Matt Daily. Editing by Gerald E. McCormick)
Taxi, nice looking tablet. Here's the video
Sony Corp is taking over the Sony Ericsson mobile phone joint venture for 1.05 billion euros ($1.45 billion) as it seeks to catch up with smartphone and tablet makers such as Apple and Samsung.
http://www.reuters.com/article/2011/10/27/us-sonyericsson-idUSTRE79Q19J20111027
ty, about my bedtime.
Sony to acquire Ericsson's share of Sony Ericsson.
http://www.marketwatch.com/story/ericsson-sony-to-acquire-ericssons-share-of-sony-ericsson-2011-10-27-237330
Carbo Ceramics Inc Q3 EPS $1.59 vs est. $1.40
Q3 rev $167.1 mln vs est. $157.1 mln
Atlas Pipeline Partners LP increases quarterly distribution to $0.54 per quarter from $0.47 per quarter.
http://247wallst.com/2011/10/26/dividend-hikes-keep-on-coming-afl-apl-abx-hep-lmt-mmpc-nem-egov/
Kantbleveit, here's another related article.
Pwn2Own organizer predicts Chrome will survive first day
http://www.macworld.com/article/157678/2011/02/pwn2own.html?lsrc=rss_main
by Gregg Keizer, Computerworld Feb 4, 2011 8:25 am
Editor's Note: This story is excerpted from Computerworld. For more Mac coverage, visit Computerworld's Macintosh Knowledge Center.
Google’s Chrome will likely survive the first day at next month’s Pwn2Own hacking challenge, but may fall the next when the rules change, the contest organizer predicted Friday.
The other three target browsers—Apple’s Safari, Microsoft’s Internet Explorer and Mozilla’s Firefox—will almost certainly tumble at Pwn2Own again this year, said Aaron Portnoy, the manager of HP TippingPoint’s security research team. But Chrome is the wild card.
“I’m fairly certain that most, if not all, of the browsers will be compromised,” Portnoy said. “I suspect that IE, Firefox and Safari will all be hacked, but Chrome won’t, not on the first day.”
TippingPoint is the sponsor of the fifth annual Pwn2Own contest, which runs March 9-11 at CanSecWest, a Vancouver, British Columbia, security conference.
Chrome will last longer than the other browsers—or maybe make it out of Pwn2Own unscathed for the third year running—because it’s the only one of the four that relies on a “sandbox.” A sandbox isolates system processes, theoretically preventing malware from escaping an application—like Chrome—to infect the computer.
To exploit a sandboxed program like Chrome—another is Adobe Reader X—hackers need not just one vulnerability but a pair: The first to escape the sandbox and a second to exploit the application itself.
“The sandbox in Chrome is the big hurdle,” said Peter Vreugdenhil, a TippingPoint researcher and past winner of Pwn2Own. Vreugdenhil will be one of the contest judges this year.
Researchers have to play under different rules if they take on Chrome. The first day of the contest, hackers can tackle the browser—and walk off with the $20,000 prize if successful—only by exploiting vulnerabilities in Google’s own code.
On the second and third days of the contest, researchers can employ a non-Chrome bug—one in Windows, for instance—to break out of the browser’s sandbox. A successful attack on the second or third day will still put $20,000 in the researcher’s pocket, but Google and TippingPoint will split the check.
“Google didn’t want to pay for a vulnerability in someone else’s code,” Portnoy said.
Google is the first browser vendor to put money into the Pwn2Own prize pool, and will pay out a maximum of $20,000. The company approached TippingPoint with its offer, a move that may have saved Chrome a spot in the challenge, Portnoy said.
“They threw out the number $20,000,” he said. “Actually, we weren’t going to include Chrome, we weren’t going to have it in the contest at all because we already had a WebKit browser.” WebKit is the open-source browser engine that powers not only Chrome but also Safari.
The rest of the cash—$15,000 for the first exploit of each browser, and another $60,000 for Pwn2Own’s mobile hacking track—came from TippingPoint.
Because Google put up its money for the Chrome part of the browser challenge, Portnoy modified the rules after getting feedback from former contest winners and other security researchers, then came up with the first day-second/third days split.
Portnoy and Vreugdenhil maintained that Chrome is hackable.
“Chrome uses WebKit, that’s its major weakness,” said Portnoy. “And the sandbox has to rely on the underlying OS to provide security that [Google] doesn’t have a way to mitigate. That increases the attack surface considerably. We know [Chrome vulnerabilities] are out there.”
And sandbox escape techniques, whether in general or for Chrome specifically, are “fairly well known,” Portnoy said.
“But it’s not trivial to find an underlying vulnerability [to escape the sandbox],” said Vreugdenhil, who is qualified to talk about exploit difficulties.
Last year, Vreugdenhil used two different Windows vulnerabilities at Pwn2Own to bypass Windows 7’s ASLR and DEP defensive technologies so he could hack IE for a $10,000 prize. At the time Portnoy called Vreugdenhil’s work “technically impressive.”
While TippingPoint hopes that the bigger prize for Chrome will convince researchers to take on Google’s browser, Portnoy is expecting that anyone armed with a WebKit vulnerability will aim at Safari first.
“If you’re coming to Pwn2Own [with a WebKit vulnerability], your first target is Safari because it’s running on a weaker OS and you’re not dealing with a sandbox,” said Portnoy.
At last year’s Pwn2Own, Firefox, IE and Safari were compromised on the first day of the contest, but Chrome was untouched throughout. Three-time winner Charlie Miller grabbed $10,000 for hacking Safari on Mac OS X, while a German computer science student, who goes only by his first name of Nils, compromised Firefox on Windows 7. Like Vreugdenhil, Nils had to evade Windows’ ASLR and DEP protections.
TippingPoint’s expecting more hacking fireworks this year.
“Perhaps this year, attackers will decide to capitalize on their Chrome vulnerabilities,” said Portnoy.
cooler
Cisco, Gemalto, WAVE Systems, and Videx Discuss Security Solutions in SecurityStockWatch.com Interviews
03.02.2011 06:11:09
http://www.live-pr.com/en/cisco-gemalto-wave-systems-and-videx-r1048723924.htm
RYE BROOK, NY -- (Marketwire) -- 02/03/11 -- "Over the next five years, approximately 500 million people will be added to the world's cities, and by 2050, a hundred new cities will each be inhabited by more than a million residents. With world populations shifting to urban areas, community leaders face increasing challenges of overcrowding, pollution, and budget and resource constraints. They need to create safe, efficient environments to attract businesses and compete in global markets. This demands better use of resources, stronger infrastructures, and better living standards." These are among the observations by Mr. Bill Stuntz, Vice President, General Manager, Cisco Systems, Physical Security Business Unit.
For the complete interview with Cisco: www.securitystockwatch.com/Interviews/in_Boardro .. :
For more information: www.cisco.com : , (NASDAQ: CSCO).
**************************************************************************
Gemalto recently announced that it has started to deliver its electronic passport solution to Korea's National Printer, Korea Minting and Security Printing Corporation, through its local partner LG CNS.
"Gemalto's global expertise and product offerings in the government sector, particularly in ePassports, make them a natural partner for us," commented Dr. Moon Hyung Yoon, Business Development Senior Leader, LG CNS. "We are happy that our cooperation has brought about a solution that meets the particularly high Korea ePassport program expectations."
"We are delighted to be part of this achievement, where we can contribute our latest technologies to the security of citizens of Korea," added Tan Teck Lee, President of Gemalto Asia. "The Sealys solution speed and durability advantages are clear and Korean ePassport holders will appreciate this secure and convenient way to travel."
For the Gemalto interviews: www.securitystockwatch.com/Interviews/Conversati .. :
For more information: www.Gemalto.com : , (PARIS: GTO) (ISIN Code: NL0000400653).
**************************************************************************
Wave Systems recently announced that it has received $5.2 million in additional license and maintenance orders through its PC OEM partners on behalf of a U.S.-based automotive company. The orders hasten the deployment and increase the total value of the automaker's software orders to $10.9 million, $6.7 million of which will be recorded as revenue over the next 12 months, $1.9 million of which was recorded as revenue in 2010 and $2.3 million of which is expected to be recognized as revenue in 2012 through 2014.
"Having utilized our solution during 2010, the customer has accelerated and significantly expanded its deployment of ERAS seats, furthering our belief that a centrally managed, hardware encryption solution can offer superior data protection," said Steven Sprague, President and CEO.
...
http://www.live-pr.com/en/cisco-gemalto-wave-systems-and-videx-r1048723924.htm
This is for those few that don't remember this post. Wow!
Yeasiknow, great read. Page 16 about the author really caught my eye:
***from the article****
Stewart is a partner in our Privacy and Information Law Group. He is dually qualified as a barrister and a solicitor holding full Higher Court Rights of Audience, with over 18 years experience as a litigator and advocate. Stewart has considerable expertise and reputation in data protection matters, contentious and non-contentious, such as auditing, consulting, data subject rights, documents (company rules and procedures, controller-processor contracts, employment contracts, privacy statements), data security and the use of privacy enhancing technologies.
- He is ranked as one of the UK’s leading data protection lawyers by the legal
directories.
- He is the Financial Times Legal Innovator of the Year 2008.
- He is the author and editor of the data protection chapter in “Goode: Consumer Credit Law and Practice” (2005 to date), author of “Data Protection and Compliance in Context” (2006), author of “Email: Law, Practice and Compliance” (November 2008) and “Data Security Law”
(November 2009).
- He is the elected President of the National Association of Data Protection Officers.
- He is a member of the InfoSec advisory council, a past member of the Sedona Conference and a past member of the British Computer Society Information Privacy Expert Panel.
- He is the founder of DPA Law (www.dpalaw.co.uk), a leading free onlineresource on data protection.
- He is the founder of Breach Action (www.breachaction.co.uk) a service for
dealing with security breaches.
- He was the legal expert on the Channel 4 Dispatches document “The Data Theft Scandal,” which exposed security failings in the Indian call centre industry.
Steven Sprague passed the wife test. I tivoed Steven's "Squawk on the street" segment and just showed it to my wife without saying anything. She liked it. Her comments were that she like his overall demeanor and that he looked very calm/confident and that his explanation was clear and easy to follow. She also expressed that she feels more positive towards our investment. [I haven't yet disclosed to her that I recently purchased more shares. Don't want to ruin a good moment.]
cooler
pep, 2000 more shares in after hours at $4.60
cooler
Mig, agree that this may not be "new" news to us, however, this will be an eye opener to those outside of our wave community. But you are absolutely correct, we should keep our expectations in check.
cooler
Awk, I'm speechless. I am afraid to say anything else except "wow"! This should place us on some people's radar if they haven't already noticed us.
I will be at work but will make sure to TIVO this.
I find it really annoying that I have the enter a "special access" code (from a safepass card)each time I buy wavx. I use Merrill Lynch.
cooler
Jaybeaux, here's the info you requested.
My work computer uses Windows 7 Enterprise
It is 32 bit
Dell ControlPoint software is not on my computer.
The IT dept can configure my TPM remotely.
I have not yet found out if they are using ERAS. When/if I do I will pass it on.
cooler
Jaybeaux, I am not at work today. Tomorrow I plan on looking at the Dell ControlPoint Software that you suggested and will get back to the board.
Snackman, in 10 minutes from ~150,000 to 1.3 million shares. Let me know next time you plan on getting your paper!
cooler
awk and aleajactaest, thank you for the links. I will pass it on to my IT department.
cooler
ExPatriate57, they just implemented this during the Christmas break. When I get back to work on Tuesday I will do some investigating and pass it on.
cooler
Follow-up on BitLocker/TPM on my work computer.
This morning I received the following message from IT support at my work:
Jaybeaux, I am at home now and won't be back at my work until Tuesday of next week. It's probably 32-bit but I am not sure. (I just got the computer and find little to go on it). I know I am using Windows 7 (ultimate or professional). All campus computers/laptops are controlled remotely. I had no say in the setup. I would have never known that my TPM was on if I hadn't looked. I will see what I can find out from the IT department next week and report back.
cooler
Cartoon, academia.
My desktop computer at my workplace was replaced over the holidays with a new Dell Optiplex 980. I just looked and Bitlocker is installed and is on. In BitLocker under the TPM Administration window I get the following message: "The TPM is on and ownership has been taken". There are about 500 computers where I work and they replace them every three years. I only once mentioned TPMs to the local tech guys and it was about two years ago. TPMs are here!
Cooler
JKIRK57, thank you for posting this. My favorite part is:
"It’s fantastic not only to have a large company make a significant commitment to our product, but having them place an additional order is always a good thing. They’re very pleased with what we’ve provided."
cooler