Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
I don't doubt that 'that guy' and his company were strong proponents of the TCG TNC standards. My point was that, regardless of his support of TNC, he seems dismissive of the merger, on the grounds that it ignores current TCG TNC (i.e., non-perimeter defense) thinking, whereas I voiced the opinion that the merger may portend a move by juniper and symantec away from perimeter defence constructs, and toward TCG TNC non-perimeter defense architectures and product offerings.
I read his blog post, and am not impressed. Here's why. He keys on the 'perimeter defense' blurb in the merger PR, but, in my opinion, takes that term too literally. Clearly, this juniper/symantec merger seems prompted by the looming relevance of the TCG's TNC standards. If that is true, the term 'perimeter defense' should not be taken literally, and as gospel, as to any analysis of the merging parties future intentions and likely network archetectures and new product offerings. Maybe the Juniper/Symantec merger partners are not being led by French Generals, but by upstart insurgents fashioning a new class of I.U.Ds. for the Cisco/Microsoft battlefield.
Actions will speak louder than words, and time will tell. My gut feeling is that if Microsoft has to 'allay fears', something anti-competitive has already crossed its mind.
The goal here? Slap the pieces together, and get it to market. I expected that the i2Telecom announcement would shake some telecom players' butts loose.
Your question is unclear. Do you mean who produces the pysical server hardware platform. Do you refer to a software authentication 'server'??? Please clarify in what sense are you asking the question... what are you really asking?
The issue is not the iPod. The issue is the MacTel, and what may have gone on there with respect to Apple/Wave collaborative development in the area of secure content distribution and subscriber management. Sure, it's only a question, or a hunch, but it is a very salient question.
In plain English, or the English on this message board?
Long term, the platforms are going to converge, or subsume each other (MacTel platforms), so long term, which is what I am thinking of, 'consumer' vs. 'enterprise', is not a viable distinction as aplied to 'markets'. So, I'm really conceding nothing, because I don't see an impenetrable 'wall' separating the two 'markets'. Especially given the rapid pace of change in the downloaded content arena.
Facts perspective? Facts are meaningless without context, and context is not synonymous with 'wishful thinking', whatever your view of it is.
Apple is invading the enterprise market. They are selling those MacTels into a heterogeneous enterprise market. They will be cutting there own marketing throat if the software that authenticates those TPM-equipped MacTels uses a totally non-interoperable network security software infrastructue. That's what I mean. Apple will not be able to run it's own authentication 'stovepipe' on the internet, with respect to selling premium digital content through TPM-equiped MacTel platforms. No way does such a strategy have any viability.
When the floodgate of premium digital content starts to flow from the movie studios and other manner of content providers, whose interoperable device and end user authentication solutions and subscription management services will THOSE CONTENT PROVIDERS use to feed that content to those MacTEL TPM-equipped PCs? You are analyzing this issue from the wrong end of the telescope, and thereby misconstruing the available evidence, which BTW, has nothing to do with who rents space in an office building on Stevens Creek Blvd. in Cupertino.
OT - Bravo, and let's start with the annual New Year's Eve performance by the Berlin Philharmonic of the Choral Symphony of Beethoven. Then we'll hop the plane for Vegas!
The gauntlet has been thrown down. I wonder who will slip on it? Is anybody guessing my bet?
I think it's more than 'speculation'. Do you recall a few months back when infineon seemed to be developing relationships with, i believe, RSA, involving PKI certification? Or is it just my faulty recollection operating now?
Here's an analogy that might help make sense to you regarding 'file and folder' vs. full disk encryption: imagine a book being like a hard drive. Imagine the book's table of contents, bibliography, index, footnotes, etc. being analogous to the system files on the hard disk. Likewise, imagine the text chapters and similar stretches of printed text being analogous to the files and folders on the hard drive, i.e., the NON-system files. In full disk encryption EVERYTHING existing on the disk, which means the system files (which are stored in their own separate partition), and the (non-system) files and folders (formerly the 'directories') are ALL encrypted, just as everything in a book could be encrypted... the table of contents, the indexes, the footnotes, as well as the textual content, as opposed to encrypting just the textual content alone. Whether encryption is done on the fly, or only when closing a file or folder is not relevant to the distinction between FDE and F&F encryption.
They chose infineon CHIPS. As yet, we do not know WHAT they chose to manage the CHIP on the software level, nor in terms of the network infrastructure for secure content distribution or subscriber management. Now, back to lurking
!!!
Barge should exchange his magnifying glass for a Doppler microphone, and go back to Cupertino for another drive-by!
The TPM enabled a number of functions that benefit by being able to be run in a virtual partition. Many of these functions/application-type systems of code, such as 'manageability suites' will be employed when a TPM is present. When such applications are employed, they have no impact on the TPM-related applications that Wave provides to run on the same TPM-equiped platform. One could write, for example, a home security monitoring program (i.e. an app that turns appliances off and on, running a burgler alarm, etc.)to run in a TPM-equiped computer that has the vPro virtualization technology, and that app would have ZERO competitive significance on Wave , because it would be just an unrelated application to be run in a virtualized partition. Please, please, try to understand what virtualization offers for a platform, and why a TPM is as it is used in conjunction with Intel'spp and AMD's virtualization technologies. Doing so will avoid a lot of heartburn, and anxiety, and will conserve a lot of DD bandwidth.
Wave competition? It does not seem so. Manageability solutions are not the same as security solutions... nothing having to do with key management, key archiving, platform attestation, data encryption, etc. is mentioned. Someone who is familiar with Altiris's manageability solution(s) can comment further, or confirm this.
I ascribe this apparent anomoly to the fact that the technology involved is like a modular house that is in unassembled status, anybody following the industry knows how to pull togather the pieces and roll out a product, so if the market looks right, the business issue is to put the pieces together first, before the putative competitors, and start selling the product before equally capable competitors capture a stake in the market. Anybody in the telco business can put togather a VoIP service, and these will be fiercely competitive and rapidly commoditized, so, if a company can be a market entrant with a differentiating advantage (here, TC-based security and secure subscription management) it pays to deploy the service, and start signing up subscribers as soon as possible.
This may be a quibble, but I think the subscriber's PC will have to be loaded with (will be the locus of) the necessary Embassy software, c.f. the Seagate FDE TC software architecture), and not the i2 VoIP calling device.
Of course, that is part of it too, but I thought it was clear from the i2 PR, and didn't need to be commented on. They mention one alternative means of placing a VoIP call on their service as being through a TPM-equiped PC, so that presupposes an installed base of subscriber PCs that have TPMs and hopefully Wave's ETS as the TPM-enabling software. Everybody looks for the 'killer app' for TPMs. Secure VoIP may just be one of many!
It don't think it's a 'development-stage' project, as that phrase is generally connoted. IMO, the technology is mature, and, while the pieces have to be assembled into a deployed system, that should not take a particularly long time. The challenge is in marketting this service, not in 'developing' it.
wow...! Lovely DD here, huh?
Subscription management... you call with the TPM-associated hardware, equivalent functionally to a mobile phone, but transmitting over the internet, and WaveXpress will have a server sitting on the internet to 'ring the register' i.e. accumulate the billing call detail securely. SKS has been taking about secure subscription management for some time now, but focusing on on-line secure sale (distribution) of digital content. Well, this is it, if you understand that a VoIP phone call is nothing more than 'digital content' -- bi-directional digital content, rather than uni-directional content.
The phone service business can ramp from miniscule to major in a relatively short time. If one has the physical assets (a switch and POP), and the access to the requisite telco technology, ramping up is basically a matter of signing up subscribers... re-read the history of the cell phone industry. Re-read the history of MCI (often dubbed 'money coming in'), or Worldcom.
Re "baby steps"... the importance of baby steps depends on the characteristics of the baby. You be the judge:
QUOTE
Company History
About Us
Company History
Awards
i2Telecom was founded in 2002 by a management team experienced in communications and Internet technology. They were committed to leveraging recent advances in microprocessor and DSP technology, plus the increasing availability of high-speed Internet access, into a way to enable small/medium businesses to dramatically reduce their telephone costs.
In January, 2003, i2Telecom acquired SuperCaller Community, Inc., a small engineering company with a big idea; the world's most advanced VoIP "microgateway". This microgateway enables any telephone to plug into the Internet and use it as a virtual private phone network.
i2Telecom's switching centers in Atlanta , Georgia and Foshan , China provide comprehensive access to global telecommunications carriers, enabling microgateway users to complete calls to any phone in the world at the lowest possible cost with unprecedented quality.
Today, i2Telecom's microgateway technology is available from dealers in most major countries and the company is the fastest growing VoIP provider in the world.
In 2004, i2 Telecom continued its string of innovation by introducing VoiceStick – a softphone on a USB drive. This patent-pending product affords a user the portability of VoIP by enabling the user to call any phone or VoiceStick customer from anywhere in the world.
i2 Telecom also introduced innovative channel strategy programs called VVNE (Virtual VoIP Network Enabler) and VVNO (Virtual VoIP Network Operator). These program provide a flexible, cost effective, and rapidly deployable platform that enable agents, resellers and operators to quickly enter into the VoIP services arena. The new service offerings provide channel partners additional revenue streams and new profit centers .
ENDQUOTE
Is't kind of ironic that only last week the chronic whiners were calling for WaveXpress to be gotten rid of, as an unproductive 'waste of money', or a nepotistic 'jobs program' for Michael Sprague. I refer to this:
QUOTE
Under the plan, Wave's subsidiary Wavexpress, Inc. would provide the back-office systems for enabling new subscribers of this product. Details of the project remain subject to the negotiation and execution of a definitive development agreement.
Wave's EMBASSY software leverages the open standards specified by the Trusted Computing Group, an industry standards body (TCG) www.trustedcomputinggroup.org. The computer industry has shipped tens of millions of PCs embedded with Trusted Platform Module chips.
ENDQUOTE
Hi Foam, now that's a succinct, brilliant summation. that's what the point of good 'DD' is all about, not the constant kvetching abount 'how small' the share price has become today.
iPod is great, but it has only softened up consumer resistance to the opportunity that WaveXpress can realize, just as the immensely popular Ford Model T opened up personal vehicular transportation to popular use/exploitation, technology innovation, and civil (highways) engineering infrastructure investment that still grows today. There's a long view that seems to get short schrift here.
'secure' monetized video distribution? Who are you kidding? The post today pointed to the potential problem that Amazon might have to surmount in persuading sufficient numbers of on-line consumers to pay for the videos by credit card. Clearly, you still don't understand the value-added that the use of WaveXpress will bring to internet commerce (e.g. really 'secure' on-line payment, user and device authentication, super-distribution capabilities, more effective subscription management, interoperable DRM, etc., etc., etc.) You're complaining about a house (WaveXpress) not being built, while not knowing what a brick or a piece of wood looks like, or when they all will be available to use in the appropriate time and measure.
I love the SP -- I average down every time it gets pushed down drastically. See ya at the bank next year, and we can swap retrospective anecdotes.
People who have negative questions should do a little research, and help formulate their own negative answers. I want a lolipop, but nobody here has given me one!
This is largely a theoretical debate... while it's true that M'soft will be M'soft, corporations do have intrinsic life cycles, and no matter how preditory or aggressive they may be in their nascent and formative growth years, the seeds of their own eventual demise are planted in their beginning. At some point, the traits that contributed to their monopoly domination germinate and cause internal loss of focus, loss of the capacity to efficiently and effectively execute in their evolving competetive environment, and general operational sclerosis. IMO, M'soft has already reached that stage of corporate senescence. The filing of the anti-trust suit against them by the software competitors was the signal event, though most analysts, even today, miss or under-rate its profound competitive significance. The Justice Department knee-capped and handcuffed M'soft, and no-one seems to grasp the real significance of M'soft's legal defeat. Certainly M'soft itself continues on the rhetorical front as if nothing ever happened to constrain its monopolistic habits, but facts are facts, and they disclose a different M'soft than we had to deal with in the past. Seize the opportunity (-ies), and kick their a**, you just might, if you are a competitor, be surprised, and win your strategic competitive objective. M'soft has no choice but to 'play nice', and its documented internal confusion and inability to execute will be the other factor working in any competitor's favor.
Agreed, but don't you see that necessary TCG marketing happening, albeit not as aggressively as we want? Especially beginning the last two or three months, or so?
its going from two optional to fifteen STANDARD. Standard means the train has left the station, for the VPro platform.
for some functions. but, for example, what does Symantec have to do with the remote management via the use of virtualization, as one example of functionality that would require the concurrent purchase/use of third party solutions. you are looking at the wrong end of the telescope with this posting exchange. (remote management doesn't just mean management of the status of virus software on a machine. as an example, what if IT wants to be able to inventory all attached peripherals on a networked PC -- a simple asset management function?) Obviously the myriads of possible uses of the vPro virtualized platform are not understood here, and consequently, from that lack of understanding, what is the range of third party solutions, Wave,s ETS included, Intel is refering to.
Who has such a 'discrete third-party solution'... maybe that is what led me to think that ETS was covered, as a requirement for these motherboard, and therefore a standard item to be sourced through the expanded Wave/Intel licensing agreement.
seems unlikely that ETS continues to be optional, rather than standard, as the number of motherboards is now 15 and feature vPro technology.
not this press release, but the one posted this morning, and commented on by AWK. It's somewhere, maybe the post was on tht Atomic Bob WAVX DD board.
it was in the press release posted here