Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
http://moneycentral.msn.com/investor/srs/srsmain.asp?Symbol=WAVX
Only last week, this was at #1. I find it interesting...
dude_danny
Trust within the Mobile VCE Personal Distributed Environment
http://www-dse.doc.ic.ac.uk/Projects/UbiNet/ws2004/Papers/22-Irvine.pdf
dude_danny
SECURE EXECUTION ENGINE™ WHITE PAPER by ncipher
http://www.ncipher.com/resources/downloads/files/white_papers/SEE_white_paper.pdf
dude_danny
Applications of Trusted Computing for Medical Privacy
http://www.eecs.harvard.edu/~greenie/portia-slides.pdf
sorry if posted.
Conclusions
DRM technology seems like the right answer
Can mediate trust between administrative
domains
Not ready for prime time yet
Hardware chips in some computers (IBM
laptops)
Most of software unimplemented
No one knows how it will play out" ( I think Wavoids know how it will play out...)
dude_danny
CIAC (Computer Incident Advisory Capability)
http://ciac.llnl.gov/ciac/CIACHome.html (Sorry if posted)
Boy,... do we ever need wave's services
dude_danny
Thanks Awk...
dude_danny
TPM/Samsung/India
http://www.dqchannelsindia.com/content/reselleralert/105020902.asp?
"Our challenge is to increase awareness about our products"
Ramanjeet Singh, Country Product Manager, Note PCs, Samsung said that he is keen on promoting the Trusted Platform Module technology, which will be introduced by the end of this quarter in Note PCs
Faiz Askari
Wednesday, February 09, 2005
Getting Note PCs into smaller markets and building a good brand recall for Samsung in this product line is Ramanjeet큦 prime objective currently. He is especially keen on promoting the Trusted Platform Module technology, which will be introduced by the end of this quarter in Note PCs. This feature helps users to trace out whether his data is hacked by someone or not. It allows hardware lock and transfer of data through a very secured path.
What challenges do you foresee for Samsung to gain marketshare in India?
For any latecomer in the market, there are negative and positive points. The pros are that we can learn from the experiences and case studies available in the market and thus focus as per market큦 needs. There are many challenges ahead of us to gain momentum in the notebook market. At one point, low awareness about our Note PCs in the market was a big challenge. To increase awareness about our product range and enhance the acceptability of these notebooks are some challenges we are aggressively working on.
What USPs do Note PCs offer to customers that will help it gain this marketshare?
We are offering unique features through the Note PCs range. It is the thinnest and lightest notebook in the market. We have specialized products for various customer segments. There is a complete range of note PCs ranging for life style customers to entry level customers. Series X is for the lifestyle range of customers, where we are offering the lightest and thinnest notebook.
The Series P is targeted at the corporate segment and is known as a multifunctional notebook. Series Q will attract senior management officials and travelers who require a low-weight notebook. Finally, there is Series M, which has a wide screen, AV portability and more enhanced resolution capacity. Through this series, we are targeting doctors, architects and gamers. Apart from this, we are offering a comprehensive three-year warranty support to customers.
What is the present market scenario in India and how Samsung is positioned in it?
The notebook market in India is evolving. As per IDC큦 predictions, the notebook market is expected to go up to 3,00,000 in terms of volumes by the end of fiscal 2005. However, IDC showed that around 1,60,000 notebooks were sold in 2004.
The ratio between PCs and notebooks is 1:12. But nevertheless, the Indian market is expecting a growth of 100% in the notebook market. Market segments are categorized as price sensitive, technology savvy, enthusiasts-customer큦 segment and corporate. Samsung caters to all these segments.
In terms of market share, as per IDC's report, Samsung is among the top six players of the Indian notebook market. We have 5% market share of the notebook market and are targeting to expand it to 10% by the end of the current fiscal.
Now that Samsung wants to double its marketshare, what expansion plans has it outlined, especially in terms of service support?
We are expanding at a good rate. Right now, we have service support centers in 24 locations across India. By the end of 2005, we are targeting to expand our service center locations to 45 cities.
What is your strategy for channel expansion? How many partners will you are add to your network this fiscal?
At present, we have around 150 channel partners covering all regions in the country. We will increase this to 400 by the end of this fiscal. We have a very clear channel strategy in place. Our Note PCs will be distributed in the market through two channels, consumer retail channels and conventional IT channels. For IT channels, we have three categories -- silver, gold and platinum partners.
Do you have any exclusive focus on building relations with system integrators and solution providers, as they are considered a huge potential for business?
Yes, synergy with SIs and VARs is crucial for our business. We are dedicated towards strengthening our relations with SIs. Currently, we have 20 of them as our partners and are spread in eight locations across India. We plan to have 40 SIs as partners by the end of this fiscal.
Samsung has introduced value-adds like biometric security solution in its notebooks. What other new features will you offer in your products in the near future?
Note PCs have the Biometric security solutions. Now we are planning new things like Trusted Platform Module (TPM) enabled Note PCs. This is another dimension of securing the data inside the notebook. Through TPM technology, the user can easily trace out whether his data is hacked by someone or not. It allows hardware lock and transfer of data through a very secured path. We will introduce this feature by the end of this quarter. This will be enabled in Series P where we are targeting the corporate sector.
FAIZ ASKARI
NEW DELHI
dude_danny
Open Mobile Alliance
http://www.openmobilealliance.org/about_oma/oma_ipr_declarations.html
Hope Wave Systems will be one of the companies listed along side RSA.
dude_danny
Infineon: Press Briefing, Regensburg, February 1st, 2005
"FCOS – The Evolution of Chip Card Modules"
http://www.infineon.com/cmc_upload/FCOS_The_Evolution_of_Chip_Card_Modules_01.pdf
dude_danny
Thanks Awk.
dude_danny
TCG and CELF
Can anyone explain what CELF is?
http://66.102.7.104/search?q=cache:sXyoxGwTFXwJ:tree.celinuxforum.org/pubwiki/moin.cgi/TechConferenc...
Thanks,
dude_danny
O.T. Drug Records, Confidential Data Vulnerable
Harvard ID numbers, PharmaCare loophole provide wide-ranging access to private data
(I think Wave should contact Harvard)
dude_danny
http://www.thecrimson.com/today/article505402.html
The confidential drug purchase histories of many Harvard students and employees have been available for months to any internet user, as have the e-mail addresses of high-profile undergraduates whose contact information the University legally must conceal, a Crimson investigation has found.
Administrators shut down a Harvard website contributing to the breach minutes after The Crimson demonstrated the problem yesterday afternoon. But at press time, sensitive data—including the drug histories of those insured by the University—remained vulnerable to anyone who obtains a student or professor’s non-confidential Harvard ID number.
The now-disabled Harvard website, iCommons Poll Tool, required nothing more than a free, anonymous Hotmail account and five minutes to look up the eight-digit ID of any student, faculty or staff member.
A list of all three prescription drugs purchased by one student at University Health Services (UHS) Pharmacy was accessed by The Crimson by typing his ID number and birthday into another website, run by Harvard drug insurer PharmaCare. Birthdates of undergraduates are published to fellow students, and are in many cases more widely available on sites such as anybirthday.com.
Last night, the insurer’s website still required nothing more than these two pieces of information to provide a list of drugs purchased by anyone covered by Harvard’s drug insurance policy—which is mandatory for all undergraduates and also covers many faculty and staff.
UHS, after being alerted to the security issues on PharmaCare’s website by The Crimson yesterday, said it immediately called the insurer for an explanation.
“We’re in contact with PharmaCare,” UHS Compliance Officer Barbara Skane said yesterday evening. “We’ve expressed to them how serious this is and that we’re asking their senior management to look into it to see what we can do to correct any inappropriate access.” She added she did not yet know whether PharmaCare’s website might violate HIPAA, a federal law prohibiting the unauthorized disclosure of individual medical records.
Moreover, from the now-disabled University website, it took under a minute to produce the ID number and e-mail address of a student who told The Crimson he had been granted security status at Harvard under the Family Educational Rights and Privacy Act (FERPA) because his family is prominent in international politics.
“If a student contacts their Registrar and requests total privacy under FERPA, this FERPA status...must also [be] recorded in the central directory system,” wrote Jane E. Hill, Harvard’s Directory Services project manager, in an e-mail.
FERPA legally requires universities not to disclose or verify directory information, including names and e-mail addresses, of individuals with a secure flag, except as required for specific educational purposes. This protection is used both by “publicity-shy” celebrities and for students who “are legitimately terrified of some potentially harmful person—a woman trying to disappear from a stalker, for example,” wrote former Dean of the College Harry R. Lewis ’68 in an e-mail.
Additionally, though Faculty policy prohibits it, many professors still e-mail their students all class grades listed by ID numbers. Thus any of the 311 students in Psychology 1 this year, among others, could have also used the disabled website to determine what exam grades their classmates received—a confidential academic record.
After the iCommons Poll Tool was shut down last night, University Technology Security Officer Scott Bradner said that “there’s no condition under which [the ID number] should have been shared…It was not a design feature.”
The glitch—and the vulnerabilities that remain—underscore the difficulties posed to information privacy by the widespread use of ID numbers to verify identity, even though those numbers are often not kept secret.
“The University has a custodial obligation to protect the personal information of its students, its faculty and its employees,” said Marc Rotenberg ’82, executive director of the Electronic Privacy Information Center, after learning of The Crimson’s findings. “People need to understand how pervasive the University’s information gathering and collating capabilities are…The impact on the Harvard community in terms of the privacy exposure is substantial.”
SKELETON KEYS
These vulnerabilities stem from Harvard’s use of a non-confidential number to verify identity and access secure systems. ID numbers, which Bradner says are considered “non-public but not secret,” are often widely distributed—to course heads and staff, on printed ID cards and even to students planning a barbecue.
Though most Harvard websites with secure information require a confidential PIN or other password in addition to the ID, The Crimson has identified a number of online applications—ranging from PharmaCare to network access to mail forwarding—that require nothing more than an ID number and birthday, or ID and last name.
Computer security experts say such use of a non-secure identifier as a password is a serious and common problem.
“The ID number, much like the Social Security Number, has always had this problem of operating both as a record identifier and as a password,” Rotenberg said. “It’s the interchangeable nature of the identifier that creates a security risk.”
Until yesterday afternoon, exploiting such vulnerabilities could have been made easier by the long-standing glitch in the polling tool. The website, which allows people to design and conduct surveys, enabled anyone—with or without Harvard affiliation—to search the entire Harvard directory by first or last name, e-mail address or Harvard ID number. Unlike other campus directories, the system did not hide users who have requested FERPA security from the University, or respect other user-set restrictions on the distribution of their directory data.
A series of steps common in conducting a poll enabled any iCommons user to directly look up the ID number of any Harvard affiliate—from secure-flagged students to University President Lawrence H. Summers. No other public system permits students to search ID numbers or to associate ID numbers with names.
Susan Rogers, project manager for iCommons, was surprised when The Crimson demonstrated the technique for looking up a FERPA protected student’s information, though she had previously planned to remove the search by ID number feature.
She added yesterday evening that preliminary analysis of the usage logs of the poll tool showed that prior to pulling the site, only The Crimson had used the method that non-Harvard affiliates could use to gain access.
BEHIND UNPINNED DOORS
But even if iCommons is fixed, The Crimson has identified a variety of web tools that require no more than the non-secret ID, or a combination of ID and last name or birthday, to access information that would generally be considered confidential.
For instance, anyone on campus can delete or register a Harvard network connection just knowing an individual’s ID and last name. This would permit someone to illegally share files traceable to another person’s identity.
A last name and ID are also the keys to choosing course sections and accessing the Student Employment Office’s jobs database. Only an ID is required to access the Office of Career Services’ MonsterTrak job listings database.
With a Harvard ID and birthday—obtainable by undergraduates through an online facebook, and more widely through websites like anybirthday.com—a user can post or download resumés on someone else’s eRecruiting account or access the online UHS health insurance waiver form. Individuals can also activate an e-mail address for someone who is eligible for a Faculty of Arts and Sciences account but has not requested one.
Setting up all campus mail to forward to a different physical address requires the ID and the last four digits of a student’s social security number—often obtainable by searching online directories like Lexis-Nexis and Accurint. Accessing mail forwarding would also show the individual’s current Harvard address, which for a secure-flag student could result in the disclosure of their on-campus whereabouts.
The most sensitive data accessible with only a Harvard ID and birthday, though, appears to be that from Harvard’s primary drug insurance provider, PharmaCare.
Bradner said the healthcare industry is under unusually strict requirements to protect sensitive information, in part due to HIPAA.
“Despite that, there are a lot of people in the healthcare industry who just don’t get it,” he said. “If indeed they’re using just [ID and birthday] to identify somebody, that’s an example of just not getting it.”
Skane, the UHS compliance officer, said that without more information from PharmaCare she was unsure whether Harvard or PharmaCare would be able to determine whether unauthorized individuals had used the site.
A PharmaCare spokeswoman last night said she was unaware that information about past pharmacy drug purchases was available through its website.
Jerome B. Tichner Jr., an attorney practicing healthcare law at Boston-based Brown and Rudnick, said that while he could not comment on PharmaCare’s specific case, current law requires insurance providers to “maintain reasonable safeguards to protect against improper access and disclosure of healthcare records.”
“If an entity [covered by HIPAA] does not have adequate security systems, and it’s very easy for any third party to walk in or log in and obtain pharmaceutical information or other…healthcare information, that may pose liability concerns,” he said.
Lewis, who is also a computer science professor and will teach a Core course next semester on computers and public policy, said he has advocated since 1996 for clearer Harvard policies on ID privacy.
“Ten years ago the most you could get with a Harvard ID number was a bag lunch,” he said. “But now data of all kinds are on web servers for reasons of convenience, and those Harvard ID numbers, if those are the keys, suddenly are much more powerful tools to get at sensitive information.”
“It’s too bad that everything hasn’t been shifted over to PIN authentication, which should today represent the minimum of security for confidential university records,” Lewis added.
—Staff writer J. Hale Russell can be reached at jrussell@fas.harvard.edu.
—Staff writer Elisabeth S. Theodore can be reached at theodore@fas.harvard.edu.
Thanks VC
dude_danny
Great Find Vacationhouse!
"Attendance is for institutional investors only."
I'm wondering if Wave is anticipating it's stock price to around 5 or greater to catch their attention.
Do you know if this is Wave's first time at the WSAF.
Thanks,
dude_danny
http://www.centrovirtual.com/hardcom/prod_view.php?product=911
36 Meses de Garantía*
mATX, Intel® 915G Express Chipset, Dual-channel DDR2-533 memory support, LGA775 socket support, Intel(r) Graphics Media Accelerator 900, PCI Express* x16 graphics, Intel® High Definition Audio (6-channel), 1 PCI Express* x1 expansion slot, Gigabit LAN, Trusted Platform Module, Includes the following software: Wave Systems* EMBASSY* Trust Suite, Intel® Desktop Utilities, Norton Internet Security*, Sonic Focus*, Musicmatch* Jukebox
dude_danny
O.T. OKnPV...This artlcle reminds me...a couple of years ago Bill Gates showed off his "futuristic" house to the public. His house is the ultimate "Tech house". I think he envisions the futuristic home to be like his...Just like "Windows", he wants everyone to buy into his stuff...and sure enough, everyone will...
Thanks,
dude_danny
O.T. TiVo's Plans Lead to Fight On Copyrights
http://story.news.yahoo.com/news?tmpl=story&cid=1804&ncid=1804&e=3&u=/washpost/20040...
Thu Jul 22, 9:08 AM ET Add Technology - washingtonpost.com to My Yahoo!
By Jonathan Krim, Washington Post Staff Writer
Hollywood studios and the National Football League are seeking to block the maker of the popular TiVo (news - web sites) television recorder from expanding its service so that users could watch copies of shows and movies on devices outside their homes.
• TiVo's Plans Lead to Fight On Copyrights
• 2004 Interactive Laptop Guide
• Personal Tech Special Report
• Today in photos
--------------------------------------------------------------------------------
Search news on
washingtonpost.com
Missed Tech Tuesday?
You can buy low-priced PCs, but should you? We rank the top value PCs, and grade manufacturers' service and reliability.
In filings with the Federal Communications Commission (news - web sites), the organizations say the new technology could compromise the copyrights of shows that broadcasters send over the airwaves in digital form, which offers much higher sound and video quality than what viewers typically get today.
The organizations fear that computer enthusiasts would capture those programs and begin trading them online in the same way that millions of music files are shared daily, which record companies have said has cut into their profit. TiVo Inc. insists its system will not allow such mass Internet distribution.
The battle is one of several being waged in federal agencies and on Capitol Hill this summer, as content companies such as the movie and music companies seek to keep control of copyrighted works that increasingly can be digitally stored, copied, manipulated and distributed by users. In turn, several public advocacy groups and technology companies warn that the content companies are trying to revoke long-standing consumer rights to "fair use" of artistic works.
With 1.6 million subscribers, TiVo is the leading provider of the digital recorders that are revolutionizing television viewing. In addition to copying shows for later viewing, consumers can pause live shows, skip commercials and use other features to control the TV experience.
To date, users generally have been unable to send copied programs to another device, although some digital recorders include "burners" that allow programs to be copied to a DVD and played elsewhere.
TiVo wants to make copies more portable, in stages. Sometime this fall, the company plans to roll out a system that will allow programs to be transferred from the TiVo box to a computer via a small device attached to the PC.
The program could then be sent to other devices within the home and viewed on them. Such devices, including laptops or desktop computers, would be registered with the company and would share encoding and decoding technology that prevents viewing by nonregistered devices.
Next year, TiVo plans to expand the system to allow programs to be transferred to registered devices outside the home, such as at an office, vacation cabin or even a friend's house across the country. A maximum of 10 devices could be registered by the subscriber.
"TiVo has an interest in keeping everything secure," said its Washington attorney, James M. Burger. "We are trying to bring innovation to consumers."
But the system alarms the content industry, which promised to roll out more digital programming over free television networks only after insisting that the FCC (news - web sites) adopt rules requiring makers of recording devices to certify that they have technologies to prevent mass Internet distribution.
Digital programming is far more appealing for online distribution because the quality does not degrade as it is copied over and over.
TiVo was one of 13 companies that asked the FCC for approval, arguing that its copy-protection system met the requirements. The Motion Picture Association of America, Hollywood's lobbying arm, and the NFL then filed objections to TiVo's plan.
"Our concern is grounded in the fact that the remote access is not limited to the recipient's summer home or boat or office," said Fritz Attaway, the MPAA's Washington legal counsel. "The people that can receive the programming can be totally unrelated in any place on the globe."
Attaway said that even if TiVo's system prevents mass Internet distribution, if each of TiVo's customers add 10 devices to a registered group, many potentially unrelated users would be able to see the copied show.
The NFL, meanwhile, is concerned that a user could send a copy of a game to someone in another time zone, where the game is blacked out. Burger responded that at current bandwidth, such a transfer would take 144 hours.
Burger would not say what would happen if the FCC rules against TiVo's system, saying the company respects the content owners' concerns and wants to work with them. But TiVo would be at a significant disadvantage if its device is not certified for the coming increase in digital programming.
Mike Godwin, policy counsel for Public Knowledge, an advocacy group for consumer digital rights, said the fight highlights the danger of requiring technologies to be approved by government agencies.
"We've always thought that once the FCC got into the role of approving content protection technologies that the content companies would leverage this to use the agency to throttle various technologies," he said.
An FCC official, who spoke on condition of anonymity because he is not authorized to speak for the commission, said a decision on approved technologies is scheduled to be made in the next couple of weeks.
Meanwhile, yesterday, the House Judiciary Committee (news - web sites) approved a bill that would significantly broaden user rights. The bill would exempt from copyright law technologies enabling users to zap objectionable parts of shows and movies to make the programming more suitable for children.
Directors and studios oppose the bill as giving people the right to alter copyrighted material.
On the flip side, the Senate Judiciary Committee will hear testimony today on a bill that would ban any technology that "induces" a copyright violation, in a direct attack on file-trading services.
One of those scheduled to testify is Marybeth Peters, the government's register of copyrights, who will endorse the bill, according to prepared testimony obtained by The Washington Post. Peters plans to testify that Congress might need to change the law to invalidate a Supreme Court decision that established a key underpinning of fair-use rights, which is that developers of technologies cannot be held responsible for the actions of those who might use them to violate copyrights.
dude_danny
Security Testing and Evaluation Labs
Security Evaluation Laboratory (SEL)
http://www.cygnacom.com/labs/backup/sel.htm
dude_danny
Choosing Secure Platforms in the Enterprise
Comparing Linux and Windows Security Head-to-Head
Sorry if already posted
http://oss.software.ibm.com/linux/presentations/security/Linux%20Security%20-%20RFG.pdf
dude_danny
"E-Government & Smart Card International Meeting " is the first
conference gathering both the e-Government and Smart Card
communities at a worldwide level.
http://www.eurosmart.com/Update/Download/June04/eGOV_Prog04_Final.pdf
dude_danny
O.T. The 32nd IPP Symposium March 25, 2004
sorry if posted.
More education...
http://www.cs.brown.edu/industry/ipp/symposia/ipp32/home.html
http://www.cs.brown.edu/industry/ipp/symposia/ipp32/camenisch.html
http://www.cs.brown.edu/industry/ipp/symposia/ipp32/brickell.html
dude_danny
O.T. IBM Israel Research Seminars
The Trusted Computing Initiative
More education going on...
http://domino.research.ibm.com/comm/wwwr_seminar.nsf/pages/sem_abstract_291.html
dude_danny
O.T. Net Attack Aimed at Banking Data
http://story.news.yahoo.com/news?tmpl=story&cid=1804&e=1&u=/washpost/20040630/tc_washpos...
By Mike Musgrove, Washington Post Staff Writer
Computer security experts warned yesterday of another new Internet threat that can steal the passwords and account information of people who bank online -- the second such discovery in a week.
Users can pick up the latest bug, which doesn't yet have a name, from pop-up ads that secretly download software capable of capturing their keystrokes. The pop-ups originate at Web sites that receive their ads from certain online ad services, which apparently had themselves been hacked to spread the malicious code.
The bug targets users of Microsoft Corp.'s Internet Explorer browser. Experts said users can protect themselves from the bug by using a non-Microsoft Corp. browser or by using software to block pop-ups. Internet Explorer users are immune if they download and install a patch that was released in April. Internet Explorer users are also being advised to set the security setting for their browsers to "high," a level that makes it more difficult to interact with some Web sites.
Software on computers that pick up the bug will record the keystrokes of users who visit any of 50 targeted financial Web sites, security experts said. The bug apparently attempts to send the stolen information to a Web site based in Estonia.
The bug is not widespread; the first instance was reported Friday afternoon by the Internet Storm Center, a warning system established by an organization for computer security professionals called the SANS Institute. A director for the center said that only a few additional instances of the bug had been found by yesterday afternoon.
The bug appears to be unrelated to an Internet attack on Friday in which users could pick up malicious, keystroke-logging software merely by visiting infected Web sites. That attack also targeted users of financial services sites.
"I believe that this particular type of malware represents a huge threat to the online financial industry," wrote Tom Liston, a computer security expert who analyzed the latest exploit in a report released yesterday by the Internet Storm Center.
Where banks and online commerce sites use encrypted connections between a user's computer and the company's computer, this new strain of software records a user's keystrokes from outside the encrypted connection on a user's computer. In other words, users who make sure to look for the padlock on the bottom-right corner of Internet Explorer when they make transactions could still be vulnerable to theft if their computer is infected with this program.
But some computer security experts said that the nature of the threat means that future versions might also be more easily contained than traditional viruses, which push and multiply themselves aggressively across networks. The newest scheme can be stopped by cutting off Internet traffic to the Web site that collects the recorded information.
"Anything that requires a fixed address to do business is much easier to shut down," said David Perry, global director of information at Trend Micro Inc.
The bug was reported to the Internet Storm Center on Friday, by a "high-profile e-commerce site, a dot-com that you know the name of," said Marcus Sachs, director of the Internet Storm Center, who declined to identify the site by name. An employee had unwittingly downloaded the program, but his or her computer had not installed it because its browser security settings were set on the highest level.
dude_danny
Notes on Martin Reynolds, Gartner, Inc.:
No wonder Wave loves this guy.
http://www3.gartner.com/AnalystBiography?authorId=7642
Before joining Gartner Dataquest, Mr. Reynolds designed and developed advanced electronic cash registers, wrote software as a consultant in the banking industry, and was involved in the early development of IBM-compatible personal computers. Mr. Reynolds has been involved with industry groups, including the Video Electronics Standards Association (VESA), the Micro Channel Developers Association (MCDA), and the WinHEC Technical Advisory Council. He has served on the Microprocessor Report editorial board and has lectured at Stanford University. Mr. Reynolds was educated at Oxford University and holds a master's degree, as well as a bachelor's degree in engineering science.
http://www.technewsworld.com/story/31251.html
Intel Partners with Wave Systems to Put Security Into Chips
By Jay Lyman TechNewsWorld 08/01/03
"It's a pretty robust way to keep a secret," Gartner vice president of research Martin Reynolds told TechNewsWorld. "It's possible to get pretty good security in the chip itself."
vice president of research Martin Reynolds said the move marks one of the first uses of the TPM, a smart-card-like hardware feature that is present but rarely used in PCs today.
"It's not just a chip on the board, now -- it's something that's useful," Reynolds said.
"We're going to see more and more of this as people realize the need for security," Reynolds said.
"With this, you can put security in the TPM and use relatively simple software to bridge to Windows," Reynolds said. "You don't have to remember [a password]. The chip, effectively, does it for you."
Reynolds said that while TPM and the security mechanisms it entails might have difficulty penetrating the IT markets because it is both new and difficult to understand, there is an eager audience for trustworthy computing.
"It's a significant increase in the level of security," he said. "There are people who realize the need for this and they will buy it."
Can we trust trusted computing?
Thursday April 17, 2003
Martin Reynolds, vice president of Gartner's Dataquest organization, thinks that in the end it will turn out that "LaGrande is a hardware technology that supports a Palladium environment."
http://www.us.design-reuse.com/news/news5606.html
ARM Builds Security Foundation For Future Wireless And Consumer Devices
ARM TrustZone technology will ensure that data downloaded or run on the device remains secure, protecting consumer privacy and opening up a range of services, such as mobile banking and multimedia entertainment to wider consumer use. In turn, network operators and service providers will benefit from a consumer uptake of these innovative services.
"Phone software must remain inviolate from any actions of downloaded software, and only hardware-enforced security can provide this level of trust," said Martin Reynolds, Gartner fellow, Gartner. "Security-enhanced processors are an essential component for the future of mobile phone technology, opening the way for a vast ecosystem of third-party applications."
dude_danny
TvTonic stuff
Sorry if already posted.
This guy, Michael Creasy, works at Microsoft. Look at May 13/ 2004
http://blogs.msdn.com/mcreasy/
http://www.mediachannel.com/guides/sports.htm
dude_danny
O.T. HCL partners with Microsoft & Intel to revolutionize digital entertainment in India
Sounds like HCL could do business with Wave.
http://www.mediacenterpcworld.com/news/33
http://www.hclinfosystems.com/pd_bus.htm
dude_danny
Doma and Helpfulbacteria,
Thank you for your finds! Looking at slide #6 of Infosec slides, I see that Thomas B. of Verisign is leading the INFRASTRUCTURE WG. I thought that Wave was heading this group.
Any comments/thoughts?
dude_danny
Trusted Computing, Peer-To-Peer Distribution,
and the Economics of Pirated Entertainment
Rooster, that article reminded me of this paper.
Interestingly, this was supported by Compaq, HP, IBM, Intel, and Microsoft.
http://www.eecs.harvard.edu/~stuart/papers/eis03.pdf
Thanks for you DD.
dude_danny
MS Sceurity Summit report (Chicago)
http://www.certtutor.net/forums/messageview.cfm?catid=46&threadid=43295
Trustworthy Computing 2003 Year in Review
Sorry if posted.
http://www.microsoft.com/mscorp/twc/yearinreview03.mspx
I found the last part of this article by Scott Charney from MS similar to what Steven said at the last CC. IMO
What to Expect in 2004
Microsoft is fully committed to the long-term success of the Trustworthy Computing Initiative. This year, we will continue to: collaborate with industry, academia, and governments worldwide to address critical technology trust issues; work to increase standardization of internal development and quality assurance processes companywide; and share practices and development tools to help partners strengthen the security and reliability of their products. We will work to make our products more resilient and to develop privacy-enabling technologies. And we will work to make the customer feedback loop even stronger.
We have made progress toward our goals, but there is still a lot of work to be done. We believe that we have the right vision; what matters now is how that vision is refined and how well we realize it. Ultimately, what matters is not what we say but what we do. It does not matter how well we talk; it matters how well we listen. We have consistently said that there are no quick fixes, that Trustworthy Computing is a long-term initiative. But it is the right thing for our customers, partners, and the public, and that makes it the right thing for Microsoft.
dude_danny
Eamonnshute,
On a side note:
I think The New York Helmsley is better hotel than the Metropolitan of year's past.
Great Job on the new matrix!
dude_danny
MSFT Security Summit PDF
http://www.nbg.com/pdf/Security%20Summit%20Partner%20Kit_FINAL.pdf
dude_danny
oknpv:
I was wondering the same thing. I do agree that the recent summits have sparked interset in the busniess community and many of them IMO bought some stock today.
What a day! You were right about a "POP". Looking for more "POPS" in the near future.
dude_danny
MSFT Sec. Summit Industry Press Releases:
only trend-micro and wave so far.
http://www.microsoft.com/presspass/events/securitysummits/partner.asp
sorry if posted.
dude_danny
MSFT Security Summit in Japan
http://www.event-info.jp/events/ss2004/default.htm
dude_danny
SECURE SYSTEM Training Tour 2004
MSFT in Japan. Wondering if Wave is there?
http://www.microsoft.com/japan/security/default.mspx
dude_danny
Washington Wavoids info MSFT Summit on 4/8
1000 participants
http://events.dcconvention.com/default.asp?yr=2004
dude_danny
Intel D865GRH at this Swiss site names it "ROCK HARBOR"...
interesting and how appropriate.
dude_danny
Intel D865GRH in switzerland
http://en.toppreise.ch/index.php?search=INTEL+Rock+Harbor+D865GRH
dude_danny