Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Seagate Technology Updates Fiscal First Quarter 2008 Outlook
Tuesday August 28, 4:05 pm ET
Raising revenue, gross margin and earnings outlook for the September quarter
SCOTTS VALLEY, Calif., Aug. 28 /PRNewswire-FirstCall/ -- Seagate Technology (NYSE: STX - News) today provided an update of its expected results for the fiscal first quarter 2008 which ends September 28, 2007. The company now expects revenue of $3.15 - $3.25 billion, GAAP diluted earnings per share of $0.57 - $0.61 and non-GAAP diluted earnings per share, which excludes $27 million of purchased intangibles amortization and other charges associated with the Maxtor and EVault acquisitions, of $0.62 - $0.66.
The company's original outlook for the first fiscal quarter was for revenue of $2.9 - $3.0, GAAP diluted earnings per share of $0.35 - $0.39 and non-GAAP diluted earnings per share, which excludes $27 million of purchased intangibles amortization and other charges associated with the Maxtor and EVault acquisitions, of $0.40 - $0.44.
The primary factors leading to the improved outlook for the first fiscal quarter are [1] industry unit demand at the high-end of the predicted range; [2] favorable pricing thus far in the quarter reflecting a more balanced supply and demand environment, and [3] a better product mix.
Gross margin is expected to expand to approximately 24% due to the demand, pricing and product mix factors referenced above. Operating expenses (R&D and SG&A) are expected to increase above the company's previous outlook due to higher variable compensation costs. The revised outlook assumes a 6% tax rate and diluted shares outstanding of 555 million.
Given the typical shipment profile for a September quarter and the dynamic nature of the demand and pricing environment, actual results during the balance of the quarter will heavily influence the company's financial performance for the quarter.
About Seagate
Seagate is the worldwide leader in the design, manufacture and marketing of hard disc drives, providing products for a wide-range of applications, including Enterprise, Desktop, Mobile Computing, Consumer Electronics and Branded Solutions. Seagate's business model leverages technology leadership and world-class manufacturing to deliver industry-leading innovation and quality to its global customers, and to be the low cost producer in all markets in which it participates. The company is committed to providing award- winning products, customer support and reliability to meet the world's growing demand for information storage. Seagate can be found around the globe and at http://www.seagate.com.
New Intel(R) vPro(TM) Processor Technology Fortifies Security for Business PCs
Monday August 27, 8:00 am ET
Next Generation Product Offers New Features and Broader Vendor Support
SANTA CLARA, Calif.--(BUSINESS WIRE)--Intel Corporation (http://www.intel.com) today further reinforced desktop PC security by unveiling the newest generation of Intel® vPro(TM) (http://www.intel.com/vpro) processor technology for businesses and IT with new innovations that add better protection against hacking, viruses and other threats.
Intel vPro processor technology packages a powerful new Intel® Core(TM) 2 Duo (http://www.intel.com/greatcomputing/index.htm) processor, Intel® Q35 Express chipset and several technology innovations offering a host of security and management capabilities for desktop PCs, including some that were previously impossible, such as the ability to wake and repair a computer with an inoperative operating system or hard drive. As a result, businesses can reduce costs by limiting expensive and time-consuming deskside visits, and by improving power savings through the ability to turn off PCs and securely wake them when required.
Security features included in this latest Intel vPro processor technology (formerly codenamed Weybridge) are designed to protect against software-based attacks and also filter and defend against viruses and other threats.
"Today, the business desktop PC just got more secure," said Robert B. Crooke (http://www.intel.com/pressroom/kits/bios/crooke.htm), vice president and general manager of Intel's Business Client Group. "This generation of Intel vPro processor technology arrives with new security and management capabilities along with support from every leading PC manufacturer and software solution vendor in the world."
New in this product is Intel® Trusted Execution Technology (http://www.intel.com/technology/security/; Intel® TXT, formerly codenamed LaGrande (http://www.intel.com/technology/security/)). Intel TXT protects data within virtualized computing environments, an important feature as IT managers are considering the adoption of new virtualization-enabled computer uses. Used in conjunction with a new generation of the company's virtualization technology - Intel® Virtualization Technology for Directed I/O (http://www.intel.com/ technology/magazine/45nm/vtd-0507.htm?iid=search) (Due to its length, this URL may need to be copied/pasted into your Internet browser's address field. Remove the extra space if one exists.) - Intel TXT ensures that virtual machine monitors are less vulnerable to attacks that cannot be detected by today's conventional software-security solutions. By isolating assigned memory through this hardware-based protection, it keeps data in each virtual partition protected from unauthorized access from software in another partition.
Source: Intel Corporation
· Desktop PC with Intel(r) vPro(tm) processor technology (Photo: Business Wire). View Multimedia Gallery
In addition, Intel enhanced its Intel vPro processor technology with improved System Defense Filters. These filters can identify greater numbers and varieties of threats in the network traffic flow.
The latest version of Intel vPro processor technology also offers an embedded trust agent, the first certified by Cisco, providing the industry's only 802.1x compatible manageability solution not dependent on OS-availability. This trust agent offers Cisco's IT customers the ability to manage systems, even if powered off or the OS is down, without lowering the security on 802.1x networks and Cisco(1) Self-Defending Network products.
Further boosting PC manageability is the newest generation of Intel Active Management Technology (http://www.intel.com/technology/ platform-technology/intel-amt/index.htm) (Due to its length, this URL may need to be copied/pasted into your Internet browser's address field. Remove the extra space if one exists.) (Intel® AMT). Intel® AMT allows for inventory and repair PCs "out of band" - meaning even if the OS has crashed or the PC is turned off. Enhancements include convenient remote configuration tools and compliance with the latest industry standards. The company expects that PCs with this version of Intel vPro processor technology will be among the first to comply with the Distributed Management Task Force's DASH 1.0 draft interoperability specification and Web Services Management (WS-MAN).
The new Intel® Core(TM) 2 Duo processor and Intel® Q35 Express chipset together will deliver improvements in energy-efficiency through a combination of performance increases and reductions in power consumption, thereby helping businesses support their own "Green IT" objectives and Energy Star(1) (http://www.intel.com/cd/channel/reseller/ asmo-na/eng/products/337748.htm) (Due to its length, this URL may need to be copied/pasted into your Internet browser's address field. Remove the extra space if one exists.) requirements. For the highest-volume processor, the 2007 Intel vPro processor technology delivers 30 percent greater performance than the previous-generation product, while significantly reducing power consumption.
Major computer makers and channel resellers around the world are now selling desktop PCs with Intel vPro processor technology. Currently, more than 350 companies are deploying this technology worldwide ranging from the thousands to tens of thousands of PCs per business.
"Customers tell us that they want a partner that will help them simplify IT," said Vivek Mohindra, vice president, Dell Product Group. "The OptiPlex 755 has the most flexible systems management capabilities, including Intel vPro processor technology, to drive more efficiency so IT professionals can focus on innovation rather than system maintenance."
"Security and client management are top concerns for our customers' business," said Kevin Frost, Worldwide Vice President, HP Business PCs. "To address these customer demands, HP remains committed to supporting Intel vPro processor technology. Through providing its innovative capabilities on the industry's broadest portfolio of desktops and notebooks, HP is the leader in delivering secure and manageable vPro-enabled desktops."
"The new ThinkCentre M57 desktop combines Lenovo's innovative ThinkVantage Technologies with Intel vPro technology to provide a secure and manageable desktop that reduces the total cost of ownership," said Dilip Bhatia, executive director of Global Desktop Marketing, Lenovo. "Customers looking for a stable, secure and manageable PC will find our best-engineered desktop and notebook PCs simplify fleet management in any computing environment."
Businesses can also enjoy energy-efficient performance, PC security and manageability along with wireless mobility on notebook PCs with Intel® Centrino® Pro (http://www.intel.com/performance/mobile/centrinopro/) processor technology which started shipping in May.
Intel, the world leader in silicon innovation, develops technologies, products and initiatives to continually advance how people work and live. Additional information about Intel is available at www.intel.com/pressroom.
Intel, the Intel logo, "Intel. Leap ahead.," Intel vPro and Intel Centrino are trademarks of Intel Corporation in the United States and other countries.
(1) Other names and brands may be claimed as the property of others.
No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology (Intel® TXT) requires a computer system with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). The MLE could consist of a virtual machine monitor, an OS or an application. In addition, Intel TXT requires the system to contain a TPM v1.2, as defined by the Trusted Computing Group and specific software for some uses. Local laws and regulations may limit Intel TXT's availability in certain countries. For more information, see http://www.intel.com/technology/security.
Intel® Active Management Technology requires the computer system to have an Intel® AMT-enabled chipset, network hardware and software, as well as connection with a power source and a corporate network connection. With regard to notebooks, Intel AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power, sleeping, hibernating or powered off. For more information, see http://www.intel.com/technology/manage/iamt/.
ENERGY STAR denotes a system level energy specification, defined by the US Environmental Protection Agency, that relies upon all of the system's components, including processor, chipset, power supply, HDD, graphics controller and memory to meet the specification. For more information, see http://www.energystar.gov/index.cfm?fuseaction= find_a_product.showProductGroup&pgw_code=CO. (Due to its length, this URL may need to be copied/pasted into your Internet browser's address field. Remove the extra space if one exists.)
Performance tests and ratings are measured using specific computer systems and/or components and reflect the approximate performance of Intel products as measured by those tests. Any difference in system hardware or software design or configuration may affect actual performance. Buyers should consult other sources of information to evaluate the performance of systems or components they are considering purchasing. For more information on performance tests and on the performance of Intel products, visit Intel Performance Benchmark Limitations (http://www.intel.com/performance/resources/limits.htm).
OT: WidePoint Names Retired Air Force General George W. Norwood to Board of Directors
Wednesday August 15, 10:30 am ET
FAIRFAX, VA--(MARKET WIRE)--Aug 15, 2007 -- WidePoint Corporation (AMEX:WYY - News), a leading provider of information technology assurance and identity management services, today announced that Major General (Retired) George W. (Nordie) Norwood has been appointed to the company's board of directors.
Norwood is currently President and CEO of Norwood & Associates, Inc. of Tampa, Fla., which maintains extensive international and U.S. networks of government, military and private sector contacts while providing technical and strategic planning expertise to corporations pursuing defense-related opportunities.
General Norwood previously served as Deputy Chief of Staff for the United Nations Command and United States Forces in Korea from 1995 to 1997. He also served as the U.S. member of the United Nations Command's Military Armistice Commission responsible for crucial general officer level negotiations with North Korea.
Nordie served as Commander of the 35th Fighter Wing at Misawa Air Base in Japan in the early/mid-1990s, and earlier as Deputy Inspector General and Director of Inspections for the U.S. Air Force in Washington, D.C. Other key assignments included the following: senior leadership positions in F-16 fighter wings in Europe; War Reserve Materiel and Munitions Planning, Programming, and Budgeting expert at the Pentagon; and F-16 fighter squadron Commander and Operations Officer at Nellis Air Force Base in Nevada. Norwood also served two combat tours in Southeast Asia in A-1 and F-4 aircraft.
General Norwood currently serves on the boards of directors of Airborne Tactical Advantage Company and Scalable Network Technologies. He is on the board of strategic advisors of AtHoc, Inc.
Norwood received a bachelor's degree in mathematics from San Diego State University and a master's degree in business administration from Golden Gate University. He is a graduate of the National War College and Defense Language Institute.
WidePoint CEO Steve Komar said, "We are very pleased to welcome Major General Norwood to our board. Nordie brings an expansive network of global and federal contacts and specific expertise in optimizing the sales processes of young companies pursuing federal contracts. His experiences and connections can only have a positive and direct impact on the expansion on our growing businesses."
Norwood said, "I look forward to assisting WidePoint and its subsidiary ORC carve out a broader base of emerging government information and identity assurance markets. I also am pleased to be able to help identify and corroborate additional attractive downstream markets. I believe the company has a bright future and as a director will be committed to helping grow shareholder value."
About WidePoint
WidePoint is a technology-based provider of products and services to the government sector and commercial markets. WidePoint specializes in providing systems engineering, integration and information technology services. WidePoint's wholly owned subsidiary, ORC, is at the forefront of implementing government-compliant eAuthentication identity management managed services and associated systems engineering/integration. ORC has earned four major U.S. federal government certifications offering the highest levels of assurance for transactions over the Internet.
WidePoint's profile of customers encompasses U.S. Federal Government agencies, including the Department of Defense, the Department of Homeland Security and the Department of Justice as well as major U.S. defense contractors and several major pharmaceutical companies. For more information, visit http://www.widepoint.com
Good stuff, wavxmaster. That could be the ERAS sale.
ST may buy Infineon, says report
Mark LaPedus
EE Times
(08/13/2007 3:02 PM EDT)
SAN JOSE, Calif. — Rumors are running rampant that STMicroelectronics Inc. may acquire Infineon Technologies AG, according to a report from Reuters.
There are rumors that ST (Geneva) will bid 12.50 euros per share for Infineon (Munich), according to the report. Shares at Infineon rose $0.25 to over $15.00 on Monday (August 13), based on the reports.
No other details are known about the rumors.
ARMv7 Makes A Move To Multicore
With its multicore/multiprocessor support, ARMv7 can now handle cache coherency.
William Wong | ED Online ID #16156 | July 31, 2007
Article Rating: Not Rated
ARM's new symmetric multiprocessing (SMP) multicore architecture has found a home in the popular ARMv7 architecture. SMP is similar to the architecture found with ARM's higher-end cores.
However, the new architecture handles up to four cores plus support for accelerator and DMA units (see the figure). The enhancements apply to the low end of the newer Cortex architecture as well. Such an approach provides significantly higher performance than the software-based synchronization used in many custom ARMv7 multicore chips. Such synchronization typically uses a software cache coherent approach that adds significant overhead as the number of processors increases.
FOUR CHANGES
The main ARMv7MP processor core remains the same as the typical ARMv7 core, with four major architectural changes: cache coherence support, L1 cache coherence for system accelerators, TrustZone and Generic Interrupt Controller (GIC) Architecture support, and support for paravirtualization managers.
The instruction and data L1 caches associated with each processing core incorporate cache-coherency support that's synchronized via the snoop control unit (SCU). The SCU also is linked to any on-chip DMA or accelerators. A local coherence bus links these to the SCU. In addition, each master device can lock down blocks of memory in the L2 cache. This can prevent high-bandwidth masters from flooding the cache.
ARM VIRTUALIZATION
One of the other features included with the new architecture is better support for paravirtualization (see "Virtual Embedding" at www.electronicdesign.com, ED Online 10765). Paravirtualization requires a customized kernel of any virtualized operating system. But there are benefits, such as improved system performance.
Higher-end systems often feature more extensive virtual-machine support, which lets a virtual-machine manager (VMM) host unmodified operating systems (see "Platforms Strive For Virtual Security," ED Online 10813). However, this usually is of little consequence for embedded developers who typically have access to operating-system and application code. Paravirtualization is likely to be more important to embedded developers for security, system partitioning, and legacy support.
TrustZone is ARM's mechanism to separate secured and non-secured domains. The GIC is part of the puzzle, since it's possible to route interrupts to the appropriate domain in a multicore VMM environment. Secure cache state is maintained between domains during virtualization traps and request forwarding. This enables the secure management of system resources among cores and security domains.
Processors with this new multicore architecture won't be immediately available. ARM sells cores, not chips. Many of the initial products will be custom and hidden from most developers. Look for this technology to move into standard parts, though, especially the Cortex line.
Nokia opening an online music store using Microsoft’s PlayReady DRM
Posted August 10th, 2007 at 7:00 PM by Robert Nelson
Section: Cellphones, Online Music/Video, Communications, Audio / Video, Mobile, Content
Nokia is getting ready to open a new online music store using Microsoft’s PlayReady DRM system. Microsoft had initially announced the PlayReady system back in February as a successor to PlaysForSure. The PlayReady DRM system will be compatible with any OS and media type with support for PC’s and mobile devices. The mobile version has just been released and will be used on the S60 and S40 Nokia mobile phones. It will allow users to transfer the content they download between their PC’s or other mobile devices. The PlayReady DRM system has support for music and video but also will include ringtones and games.
“People are increasingly using their mobile devices for enjoying digital content, such as music, games, videos and photos,” said Ilkka Raiskinen, senior vice president of Multimedia Experiences at Nokia. “By adding support for Microsoft PlayReady technology, we are enabling service providers to offer a wide range of content and create truly compelling experiences across mobile devices, personal computers and online services. We plan to support PlayReady across a range of S60 and Series 40 devices starting in 2008.”
While PlayReady is still DRM, it does remove some of the restriction and allows users to legally use their content on all the devices they own.
Read [Nokia] Via [Zune-Online]
Local customers try new Windows Server
Virtualization will come 180 days after the release
Rodney Gedda 10/08/2007 08:10:48
Some 20 local enterprises are already using the pre-release of Microsoft's next-generation server operating system, Windows Server 2008, which is slated for release early next year.
Formerly code-named Longhorn, Windows Server 2008 will succeed the Windows Server 2003 operating system and introduce a large number or architectural and technological enhancements.
Microsoft Australia's director of server and tools, Martin Gregory, said there has been a good early adopter program for Longhorn server, with customers from a cross section of industries. Gregory declined to name individual organizations using the beta.
"Beta three is a good example of how customers can benefit from an early release," Gregory said, adding improvements in manageability in Server 2008 will allow IT professionals to spend less time doing system administration and more time adding value to the business.
Gregory said Server 2008 will introduce a new distribution aimed at the 500 seat or less mid-market in addition to the standard enterprise and small business products.
In Australia for the Tech.Ed conference, Microsoft's Windows server group product manager Julius Sinkevicius said the company is in the process of solidifying the code-base and responding to customer issues, but is not planning any "surprising new features" for the final release.
Sinkevicius used to be a Microsoft customer before joining the company eight years ago and admits he "felt the customer pain".
"I did a lot of branch office deployments and saw good things coming in Server 2008," he said. "The early adopter program is going well and product evaluation has 30 customers working with Microsoft for 18 months to two years."
Microsoft also has a rapid deployment program focusing on specific scenarios like network access protection.
Highlights of Server 2008 will be a hardened core operating system with a more reliable kernel and a reduced attack surface area, and scalability improvements with support for more cores, more memory, the x64 architecture and more options for customers to scale up.
Server 2008 will also sport new management tools that integrate with Microsoft's new scripting environment, PowerShell.
"PowerShell will change how people administer services in the enterprise," Sinkevicius said. "For example, you can make changes to Exchange 2007 and a PowerShell script will be generated in the backend."
PowerShell can then be used to manage a number of servers with the same scripts. It is based on the .Net framework so people familiar with Visual Basic will be able to use PowerShell.
Sinkevicius said the community is responding well to PowerShell and partners are extending it.
Four cool new features slated for SQL Server 2008
By Tim Chapman, TechRepublic | 2007/08/09 09:58:
SQL Server 2008 (code named Katmai) is scheduled to launch in February of next year, and the code isn't slated to be released to manufacturing until Q2 2008. But database gurus don't have to wait to get a sense of what's to come because Microsoft recently released SQL Server 2008 to the community for preview.
Some of the goals of the Katmai Community Technology Preview (CTP) 1 release and future CTP releases include easing the manageability of the database, more security availability, more high availability options, and scalability. These types of overall enhancements are typically included in every version of SQL Server, which is why this article skips over such high-level features.
This is an overview of four features in SQL Server 2008 that I think are neat and will be important to DBAs. (Of course, there's no guarantee that Microsoft will include these features in the final release.) For a comprehensive feature list, go to Microsoft's SQL Server 2008 Product Overview page.
Table variable parameters
For a long time, I have wished that developers could pass a table variable as a parameter to stored procedures. With the advent of SQL Server 2005, XML variables can be passed into procedures and parsed out with XQUERY inside the procedure to form a table. However, with the ability to pass a table variable in SQL Server 2008, developers will not have to be fully XQuery literate to pass a table of data into or out from a stored procedure. In my opinion, this will be one of the more integral tools for the developer in SQL Server 2008.
MERGE statement
The idea behind the MERGE statement is that the developer can construct TSQL data-manipulation language (DML) statements in which INSERT, UPDATE, or DELETE can occur in the same statement, based on different search conditions. I think this idea is very cool. The ability to complete multiple statements within one statement could potentially lead to less coding and increased performance.
In addition to this statement, another great feature has been added to the INSERT statement. In SQL Server 2008, the developer can issue multiple rows to be inserted without using a SELECT statement as the INSERT statement source. Instead, the VALUE clause of the INSERT statement can be used to specify sets of values separated by parentheses and commas.
Declarative Management Framework
The Declarative Management Framework gives DBAs a central location to manage database server policies for server management, object management, and security. I presume that some type application will be deployed with client tools that use this framework to manage your database server policies. Because it is a framework, you should be able to develop your own database policies through custom .NET code.
The potential for this type of tool is huge. It could possibly save DBAs a huge amount of time administering enterprise databases.
Change Data Capture
Change Data Capture makes database auditing easier to create and maintain. While DML auditing has been available via triggers in SQL Server for a few versions, and DDL auditing has been available since SQL Server 2005, the solutions had to be custom written by a developer with reasonably intimate details of the database's underpinnings. With Change Data Capture, system stored procedures are used to mark which types of objects you want to audit, and the stored procedures take care of how the auditing occurs.
While setting up these auditing procedures is typically a one-time deal, business requirements change over time; it is usually easier to use system stored procedures to handle changes, plus it's less error prone than changing your custom auditing code. Unfortunately, when you use Change Data Capture, you will lose the auditing flexibility that you currently have with your own auditing solution.
Try it out
I encourage you to explore the SQL Server 2008 CTP -- I know I definitely will. As the release date gets closer, I plan to write about other great new features in SQL Server 2008 in more detail.
California-Based Tryarc is Acquired by
The Revere Group, an NTT Data Company
Merger supports Chicago-based firm’s western expansion with
diverse clients and strong service offerings
CHICAGO--(BUSINESS WIRE)--Tryarc, LLC is pleased to announce that it has been acquired by the global business and technology consultancy firm, The Revere Group, an NTT Data company. Tryarc, LLC, a privately held information technology consulting firm that specializes in Business Systems and Custom Application Development, will continue to operate out of its current offices located in Los Angeles and San Francisco, CA. The merger is another step in Revere’s expansion strategy to better service fast growing and middle tier global companies as well as Japanese multi-national companies in the western U.S.
“Becoming a part of The Revere Group provides us with a platform to accelerate growth in this region. In addition to our solid service offerings in SAP, Microsoft, Business Objects and Software development, we are now positioned to offer our clients expanded services such as Business Continuity Planning, Organizational Change Management, Managed Hosting and Operational IT Services,” states Trevor Bezdek, managing partner and founder of Tryarc. “We look forward to leveraging existing relationships and strengthening the Revere and NTT Data brand in the West.”
The Tryarc merger will add approximately 100 employees to Revere. The current senior leadership’s depth of experience includes IT strategy, software development, business-process reengineering and consulting, and spans industries such as entertainment, healthcare, and manufacturing and distribution. The existing management team is committed to growing Revere’s presence in the West.
“This acquisition supports the goal of expanding our presence throughout North America over the next three years. Tryarc’s growth, reputation and service offerings are particularly complementary to Revere,” states Michael Horne, Revere’s executive vice president and managing director for the west region. “Additionally, Tryarc’s strong business partnerships and service offerings in SAP, Microsoft as a Gold Partner, and Business Objects as a Platinum Partner bring good scale, depth and breadth to our existing practices.”
Revere is actively pursuing additional acquisitions in the West Coast states. Over the next five years, the company’s strategic business plan includes a combination of organic and acquisition growth to propel Revere’s western region to approximately $125M annually. With multiple offices in the West, the company anticipates growing to over 500 employees in the region.
Knox & Co. of Westport, Connecticut, along with its Japanese alliance partner Mitsubishi UFJ Securities (USA), Inc., served as financial advisor to Revere on the transaction.
About Tryarc
Tryarc LLC, headquartered in Los Angeles, CA, is a full service information technology consulting firm that specializes in Business Systems, Custom Software Development and Process Outsourcing. Founded in 2001, Tryarc is dedicated to strengthening business performance and competitive advantage for its clients through tailor-made, high quality consulting services and software application solutions. By utilizing a defined framework, Tryarc offers its clients both a low initial investment cost and low total cost-of-ownership. Tryarc routinely functions as a virtual extension of its client's delivery organization through an accessible staff, a proven and highly efficient methodology and engineering excellence. For more information, visit www.tryarc.com.
About The Revere Group
In operation since 1992, The Revere Group is a North American business unit of NTT Data. Revere is a leading business and IT solutions firm dedicated to accelerating growth, improving profitability and driving performance for its clients. Revere’s services focus on three core business areas of Business Consulting, IT Solutions and Managed Technology Services. As a trusted advisor to its clients, Revere’s service approach of Think, Build and Source develops cost-effective solutions while achieving business results that deliver high value and return. Based in Chicago, IL, The Revere Group delivers its solutions throughout the United States, India and Asia. For more information, visit www.reveregroup.com.
go-kite, we are saying the same thing but I was not wording it correctly. I was alluding to a bundling agreement. Microsoft would then providing the complete solution.
Pickle
Go-kite,
That is what I am trying to understand. What is the flashpoint in Server 2008 that will "require" TPMs to be turned on? If Microsoft is going to toute Health Certificates, then they have to tout EEE as well.
Pickle
Cosign,
Good point. That could certainly be the case.
wavxmaster,
My guess would be the Dept of Homeland Security.
Pickle
Great link. "The reason this is important for Wave is that we see these technologies packaged in Windows 2008 server."
By technologies, I believe SKS is also talking about EEE. Bundled, packaged whatever you want to call it. Next few months are going to be exciting.
Pickle
Does Wave get paid on every FDE Drive sold, or just through Dell?
WidePoint's ORC Subsidiary's PIVotal ID System to Deploy 11,000 Seats for the United Space Alliance
Wednesday August 8, 11:45 am ET
ORC Shared Services Provider to Provide HSPD-12 Compliant Solution
FAIRFAX, VA--(MARKET WIRE)--Aug 8, 2007 -- Operational Research Consultants, Inc. (ORC), a wholly owned subsidiary of WidePoint Corporation (AMEX:WYY - News), today announced that the United Space Alliance, LLC (USA) has selected ORC's PIVotal ID© solution to implement an enterprise-wide Smart ID Badge solution. The scope includes a cradle-to-grave turnkey solution from card request to card termination. The potential target population numbers 15,000 personnel.
ADVERTISEMENT
USA selected ORC to provide and manage its PIV credentialing system to achieve HSPD-12 compliance in support of NASA contracts. The chosen solution complies with Homeland Security Presidential Directive (HSPD-12), Federal Information Processing Standards Publication Series 201 (FIPS 201) and Personal Identification Verification (PIV II) requirements and regulations.
Providing managed services for over a decade, ORC is qualified by the General Services Administration (GSA) as an HSPD-12 Systems Integration Service Provider and is approved on three GSA Special Item Numbers (SINs), 132.60, 132.61 and 132.62. ORC's certifications prove the company's ability to meet critical federal requirements essential to complying with HSPD-12.
"This award validates the growing interest within the commercial sector in leveraging the government's PIV program," said Daniel E. Turissini, CEO of ORC. "With this implementation, USA has leveraged the FIPS-201 specification to comply with federal acquisition requirements and establish a strong identity assurance system necessary to meet internal information assurance requirements. This award further underscores ORC's credibility as the premier provider of information identity services to the federal government and its trading partners."
The terms of this agreement include a base year for the installation of a USA PIVotal ID© system at USA secure facilities that will communicate to the Certificate Manufacturing Authority hosted at ORC. Also included is an annual maintenance agreement based on a five year period.
United Space Alliance issued the following statement, "USA is committed to providing outstanding capabilities and performance to meet our mission critical objectives. The award of this contract to ORC is consistent with our goal to ensure the protection and security of national assets as we work with our government and industry partners to provide the latest information technology services to space operations customers in all space market sectors."
Dell's new PC to run Linux and Windows
The PC maker plans to unveil a computer that can run Linux, Windows and other software at same time.
August 7 2007: 7:25 PM EDT
BOSTON (Reuters) -- Dell Inc is developing consumer PCs that can run multiple versions of Microsoft Corp's Windows and Linux software at the same time, the personal computer maker's chief technology officer, Kevin Kettler, told Reuters.
Users of the new Dell (Charts, Fortune 500) PCs would be able to simultaneously run multiple, software-generated computers on one machine, using an increasingly popular technology known as virtualization that allows greater flexibility and computing security.
Video More video
CNNMoney's Jim Ledbetter and Fortune's David Kirkpatrick discuss Dell's future and the future of founder, Michael Dell.
Play video
One virtual machine might run Windows Vista and handle every day computing tasks, while another could be used only to browse the Internet, limiting any security threats to the parameters of the virtual machine - which could be deleted.
A third virtual machine might run a version of Linux that is compatible with programs on the user's work computer. And a fourth virtual machine might run Windows XP software that is not compatible with the Windows Vista machine.
Such PCs could go on sale as early as next year, Kettler said in an interview by telephone while attending the LinuxWorld conference in San Francisco.
Dell gets back in the MP3 player game
He declined to say whether the machines will be able to run Apple Inc's (Charts, Fortune 500) OS X software designed for its Macintosh computers, whose sales are growing faster than the overall PC market.
"I can't speculate on that," Kettler said. "Virtualization is very powerful. It's an environment that would allow many different operating systems to co-exist. You can interpret that however you would like."
Mac computers are able to run Windows software using virtualization programs, including SWsoft's Parallels and VMware's Fusion.
Dell is developing the machines with help from several partners, including EMC Corp's (Charts, Fortune 500) VMware unit, which is expected to go public through an initial public offering next week and privately held SWsoft, he said.
The technology is already being used in consumer PCs, although so far it is not heavily marketed by personal computer makers other than Apple, which uses the same kind of microprocessors from Intel in its Mac computers that are used in many PCs that run on Microsoft (Charts, Fortune 500) Windows.
Apple's next trick
A virtualization software package known as Parallels from privately held SWsoft is one of the top-selling programs for Macintosh computers.
SWsoft, EMC Corp's VMware unit and Microsoft Corpsell similar software for PCs, consumers have yet to embrace those products.
While Dell is still hammering out its plans for the new PCs, he described the company's general plan for the product.
The PCs would either ship with several virtual machines loaded on them, just as Dell currently offers PCs preloaded with operating systems and other software. Or the company may simply choose to sell PCs that are virtualization-enabled, he said.
Whichever approach it takes, the user will end up with a computer capable of running several operating systems at once.
I believe Microsft has/will make this interoperable with TCG mobile specs.
Pickle
See Bolds. Microsoft Announces Breakthrough Technology Enabling Simple Access to Broad Set of Digital Content, Including Music, Games, Video, Ring Tones and Pictures
Microsoft PlayReady powers next-generation media experiences on mobile networks; mobile operators worldwide announcing support include Telefónica, O2, Verizon Wireless, Bouygues Telecom, and Cingular Wireless, now the new AT&T.
BARCELONA, Spain — Feb. 12, 2007 — Today at 3GSM World Congress 2007, Microsoft Corp. announced Microsoft® PlayReady™ technology, a new multimedia content access technology optimized to meet the needs of mobile operators and handset manufacturers for digital entertainment and commerce. Supporting multiple content types, and flexible rights, Microsoft PlayReady enables operators to provide a range of new services tailored toward growing consumer interest in mobile digital media. Leading mobile operators worldwide, including Telefónica, O2, Verizon Wireless, Bouygues Telecom, and Cingular Wireless, now the new AT&T, are today indicating plans to implement Microsoft PlayReady technology. In addition, Microsoft is working with mobile industry software developer PacketVideo to showcase a fully operational demonstration of Microsoft PlayReady for the first time, at the Microsoft booth, No. 1D19 in Hall 1 at the 3GSM conference.
The result of extended dialogue with the mobile industry, Microsoft PlayReady technology enables a broad spectrum of business models such as subscription, rental, pay-per-view, preview and super-distribution, which can be applied to many digital content types and a wide range of audio and video formats. Content types supported include music, video, games, ring tones and images. Audio/video formats supported include Windows Media® Audio (WMA), AAC/AAC+/HE-AAC, Windows Media Video (WMV), and H.264. Microsoft PlayReady enhancements make it easier for consumers to move their content between their devices, giving them a new level of freedom with their digital content. This technology will be available in the first half of 2007 for handset and device implementation.
Wireless delivery of content to handsets continues to grow rapidly, underscoring the need for compatibility and interoperability. To address this requirement, Microsoft PlayReady has been designed to be fully backward compatible with Windows Media DRM 10, allowing devices that support Microsoft PlayReady to access content using Windows Media DRM. Microsoft will also provide an interoperability program so content may flow to qualifying DRM and content protection technologies.
“Our wireless partners worldwide asked for a single system to power a growing array of business models and consumer scenarios — the result is Microsoft PlayReady,” said Amir Majidimehr, corporate vice president of the Consumer Media Technology group at Microsoft. “With consumer demand for digital goods of all types growing exponentially, this technology delivers a foundation for the future and accelerates the transparent delivery of rich content to consumers.”
Demand for mobile entertainment, with worldwide revenues of nearly $19 billion in 2006,1 continues to grow across all sectors, including music services, ring tones, games and video. The flexibility of Microsoft PlayReady technology makes it attractive for leading mobile operators looking to deploy next-generation entertainment services, including Telefónica, O2, Verizon Wireless, Bouygues Telecom, and Cingular Wireless, now the new AT&T, which today are announcing their support for Microsoft PlayReady.
“Microsoft PlayReady technology will be a key enabler for next-generation mobile content services. The validation process we are conducting will allow us to pioneer new service scenarios that work on both the mobile phone and consumers’ PCs,” said Cayetano Lluch, general manager of Technology and Services at Telefónica. “Demand for mobile media content is growing exponentially, and Microsoft PlayReady will help us deliver a tailored digital entertainment experience for our customers.”
“We believe Microsoft PlayReady technology will accelerate deployment this year of many services that carriers see as important for the next generation of wireless communications,” said Jim Ryan, vice president of data services at Cingular Wireless, now the new AT&T. “Microsoft’s digital media expertise and its balance between the needs of the carriers and the interest of consumers is a very positive step for the delivery of mobile entertainment.”
“Microsoft PlayReady technology will help accelerate deployment of our entertainment services, which we see growing in importance for consumers this year,” said Russ Shaw, director of Capability and Innovation at O2 UK. “Protecting content while keeping it easily accessible by consumers is a careful balance, and Microsoft’s digital media expertise and experience is critical to making this a reality.”
“We have thoroughly compared different DRM solutions that are offered in the market and decided to select Microsoft PlayReady technology for our next-generation mobile music services,” said Benoît Louvet, director of New Products and Services, Bouygues Telecom. “Microsoft PlayReady uniquely enables us to support a multitude of business scenarios targeting both the mobile phone and the end user’s PC.”
“Working closely with Microsoft has provided us with an advantage in the marketplace over the years, and added significantly to our customers’ experience in the multimedia world,” said Jim Straight, Verizon Wireless vice president of data services. “Microsoft PlayReady technology will help us usher in a new era of mobile digital media in a seamless, flexible manner that our consumers demand.”
Microsoft PlayReady technology will be available as a well-documented porting kit with source code, so it can be deployed on any mobile hardware or software platform, including low-end devices. Optimized implementations for several popular handset platforms will be available from PacketVideo in its software products for mobile phones.
“With the rapid growth of mobile content services, Microsoft PlayReady technology will quickly emerge as a mission-critical ingredient for new consumer applications because it combines greater flexibility for content and services with a rock-solid technology foundation,” said James C. Brailean, Ph.D., chief operating officer of PacketVideo. “Microsoft PlayReady will have an immediate positive impact on the mobile entertainment market. PacketVideo is partnering closely with Microsoft to include optimized implementations in our industry-leading media client applications for popular handset platforms so that operators and manufacturers can get to market quickly and cost-effectively.”
Maybe OT: Nokia Adds Microsoft PlayReady Technology for Flexible Access to Digital Entertainment
Monday August 6, 12:01 am ET
Collaboration to make it easy for content owners and service providers to offer content with more flexibility.
REDMOND, Wash. and HELSINKI, Finland, Aug. 6 /PRNewswire-FirstCall/ -- Building on their existing collaboration around mobile entertainment, Nokia and Microsoft Corp. have extended their cooperation to include support for Microsoft® PlayReady(TM) technology into the Nokia S60 and Series 40 mobile device platforms. PlayReady is a new content access technology from Microsoft that makes it easy for content owners and service providers to deliver virtually any type of digital content in a flexible manner. As part of the agreement, Nokia and Microsoft will also collaborate on expanding and simplifying consumer scenarios for accessing, experiencing and moving digital content using mobile devices.
ADVERTISEMENT
(Logo: http://www.newscom.com/cgi-bin/prnh/20000822/MSFTLOGO)
By supporting PlayReady, Nokia will make it easier for content owners and service providers to offer premium digital content for a radically increased installed base and enable more flexible business models, such as renting content or accessing it offline. For consumers, PlayReady brings flexible ways to manage their digital content between online, home and mobile devices. For example, a consumer could purchase content directly from their Nokia device and then transfer the content to enjoy on other designated devices, such as PCs or mobile devices.
"People are increasingly using their mobile devices for enjoying digital content, such as music, games, videos and photos," said Ilkka Raiskinen, senior vice president of Multimedia Experiences at Nokia. "By adding support for Microsoft PlayReady technology, we are enabling service providers to offer a wide range of content and create truly compelling experiences across mobile devices, personal computers and online services. We plan to support PlayReady across a range of S60 and Series 40 devices starting in 2008."
"Through our collaboration with Nokia, we aim to deliver a compelling platform that offers consumers seamless access to virtually any type of digital content they want," said Amir Majidimehr, corporate vice president of the Consumer Media Technology Group at Microsoft. "Nokia's breadth of offering in this space, coupled with core digital media technology from Microsoft in the form of PlayReady, will bring new mobile entertainment scenarios to life for millions of consumers around the world."
Microsoft PlayReady is designed for digital entertainment services, devices and applications, with a specific focus on meeting the needs of mobile operators, service providers and device manufacturers. The technology supports a range of business models that can be applied to almost any type of digital content (music, video, games, ringtones, images and more) and a wide range of audio and video formats (including Windows Media® Audio (WMA), Windows Media Video (WMV), AAC, AAC+ and H.264). Microsoft released the PlayReady Client Porting Kit for mobile devices in early August 2007, and expects the first services using Microsoft PlayReady technology to appear in 2008. In addition, Microsoft has designed PlayReady to be fully backward-compatible with Windows Media DRM 10, which means that devices supporting PlayReady can access existing Windows Media DRM-based content as well as new PlayReady content services.
Retirenow,
I was not looking for that option in my desktop so I cannot speak to it. Hope you get a good deal!
Pickle
cslewis, that is great to read again, especially this part.
"Now in full DoD production, the FiXs Network is operational on a global scale. The ability to conduct worldwide identity transactions represents a new era for federated identity
strategies and clearly shows the commitment of industry and government to build more secure global identity management systems for physical applications."
Pickle
OT: House approves $460B Pentagon budget
By ANDREW TAYLOR, Associated Press Writer
19 minutes ago
WASHINGTON - The House approved modest changes to President Bush's record Pentagon budget proposal early Sunday, but Democrats signaled plans to resume a more contentious debate over the Iraq war after the August recess.
The House's $459.6 billion version of the defense budget, approved on a 395-13 vote, would add money for equipment for the National Guard and Reserve, provide for 12,000 additional soldiers and Marines, and increase spending for defense health care and military housing.
The adjourned until after Labor Day minutes after the vote a little over an hour past midnight.
The White House criticized Democrats for cutting Bush's request and effectively transfering $3.5 billion of the money to domestic spending programs. It is likely the cuts will be restored this fall when Congress passes another wartime supplemental spending bill.
The administration has not threatened to veto the measure.
The measure does not include Bush's 2008 funding for the wars in Iraq and Afghanistan. Democrats say they want to consider that money in separate legislation in September. This approach would set the stage for a major clash over the war; Democrats are likely to try to impose conditions on the money.
Rep. John Murtha, D-Pa., a point man on military matters for Democrats, told reporters this past week that he backs only short-term extensions of war spending.
The massive military measure represents a nearly $40 billion increase over current levels. The Pentagon would get another several-billion-dollar budget increase through a companion measure covering military base construction and a recent round of base closures.
The defense legislation largely endorses Bush's plans for major weapons systems such as the next generation Joint Strike Fighter and the F-22 Raptor fighter jet, which has been beset by cost overruns.
The Democratic military budget would provide $8.5 billion for missile defense, about 4 percent less than requested by Bush but $1 billion more than current spending.
The Army's Future Combat System, a computerized system designed to transform the service's warfighting abilities, would absorb an 11 percent cut from Bush's request. It, too, has been plagued by cost overruns.
Those huge procurement costs are driving the Pentagon budget ever upward. Once war costs are added in, the total defense budget will be significantly higher than during the typical Cold War year, even after adjusting for inflation.
The measure would eliminate the $468 million requested to procure the Armed Reconnaissance Helicopter, whose per-unit cost has more than doubled. The helicopter recently crashed during test flights.
The bill would provide $2.2 billion to cover a 3.5 percent pay raise for service members. The administration objects and says its recommended 3 percent pay increase is sufficient.
The bill would boost substantially the money spent to oversee military contractors, including $24 million for the inspector general.
The measure provides money to build five ships — with a total cost of $3.7 billion — in addition to the seven requested by the Pentagon.
Murtha had prepared amendments to close the prison in Guantanamo Bay, Cuba, and require troops be fully trained and equipped before going to fight in Iraq. But facing the prospects of losing votes and inflaming partisan tensions, he withdrew them.
The bill contains a provision barring the establishment of permanent bases in Iraq.
Retirenow,
I bought an Optiplex 745 with DuoCore 2 prcoessor, 1.2 TPM and Wave software a few months ago. I bought through Dell Outlet as a refurbished model. It came with same warranty (3 year) as a new one and cost 65% of the price.
Pickle
Talk security with Cisco execs - TCG/Microsoft
are participating
Submitted by Cisconet on Thu, 08/02/2007 - 7:05pm.
http://www.networkworld.com/community/node/18078
Make plans to attend the Security Standard taking place in Chicago, Sept. 10-11, and produced in association with Network World. It's free to the first 500 qualified security professionals to register.
Among the sessions include a roundtable with senior Cisco security execs Richard Palmer, senior VP, Cisco's Security Technology Group and Jeff Platon, VP, CMP worldwide product and technology marketing, Security and application networking, and Scott Weiss, CEO and co-founder of IronPort Systems.
Among the topics discussed will be what the panelists see as the next big challenges and threats, the latest on Cisco's security products and technologies, how Cisco is working with customers and partners to better secure infrastructure and applications, and what's on the horizon from Cisco in the security market.
Go here for the full agenda and registration details.
10:45am-11:45am
General Session
Imperial Ballroom Foyer (Floor B2)
The Auditor Panel: Straight from the Auditors' Mouths
One of the most dynamic, yet sometimes contentious, relationships that exist in security is between an organization’s auditors and IT/Security leadership. But this relationship doesn’t need to be adversarial…or does it? When we talk about “trust but verify” Audit is the verify part of the equation. Let’s face it, an organization can have the best technologies and policies in place, but if those technologies aren’t being used correctly and if those policies aren’t being enforced, it’s all for naught. In today’s highly regulated environment few organizations can afford to take a laissez faire attitude about compliance. This special panel session will feature a discussion with auditors from top organizations discussing their interactions with security and IT leaders, what their top-of-mind concerns and ideas are, and how to improve the landscape of compliance.
What you’ll learn:
About the role of audit in ensuring compliance
How to build a relationship with audit to help secure the enterprise
The most commonly overlooked issues uncovered by Audit
What Auditors are looking for today…and more importantly, tomorrow
Moderator:
Robert Bragdon, Publisher, CSO Magazine
Panelists:
Rik Boren, Partner, PricewaterhouseCoopers
Lane H. Boyd, Director, Information Technology Audit, McDonald’s Corporation
Mike Garber, Director, IT Assurance Management, Motorola Information Protection Services
Network Access Control Update
Network access control (NAC) promises to turn our infrastructure itself into a strong defense against intruders and attacks. In this special overview session, the chair of the Trusted Network Connect initiative provides a thought-provoking overview of NAC’s development and progress in the market, including an update on standards efforts and how key industry players are embracing open NAC.
What you’ll learn:
Is NAC living up to the heady promises of its promoters?
What are real-world customers experiencing in their NAC deployments?
How are standards efforts progressing for NAC and what’s the status of NAC standards support.
What developments lie ahead for NAC?
Stephen Hanna, Co-Chair, The Trusted Network Connect Work Group, The Trusted Computing Group & Distinguished Engineer, Juniper Networks, Inc.
8:30am-10:10am
General Session
Imperial Ballroom (B2 Floor)
Fireside Chat with Scott Charney, Vice President, Trustworthy Computing, Microsoft Corporation
In a one-on-one interview with Security Standard Co-executive Producer John Gallant, Microsoft Trustworthy Computing Group Vice President Scott Charney will outline the company’s progress toward building a more trustworthy computing environment for customers and will provide insights on how he sees the security and privacy landscape evolving over time.
What you’ll learn:
Microsoft’s strategic goals and core development initiatives in security and privacy
How Windows Vista and other new products and technologies will alter the security landscape for customers and the industry
Why the industry now has a significant opportunity to innovate to deliver stronger security and privacy protection technologies for customers.
zen, without any forseeable dilution, timing this stock gets a lot more dangerous.
Pickle
SL, great!
Backward compatibility certainly enhances the cost effectiveness and speeds adoption.
OT: Fiserv Buying CheckFree for $4.2 Billion
Thursday August 2, 12:26 pm ET
By Harry R. Weber, AP Business Writer
Fiserv Buying Online Banking Firm CheckFree for About $4.2 Billion
ATLANTA (AP) -- Fiserv Inc., a provider of information management systems and services, is buying online banking company CheckFree Corp. for about $4.2 billion in cash, the companies said Thursday.
Officials said there would be cost savings from combining the two companies which serve banks and other financial institutions, but did not say how many, if any, jobs will be shed.
ADVERTISEMENT
The two companies employ a total of 27,000 people.
"Between now and the time we close, we'll be working diligently to come to those right answers," Fiserv Chief Executive Jeffery Yabuki said during a conference call with analysts and investors when asked for specifics about the synergies from the deal.
On an annualized basis, Fiserv said it expects to realize more than $100 million in cost savings and more than $125 million in extra revenue as a result of the deal. For 2008, the acquisition is expected to add to Fiserv's underlying cash earnings per share, the company said.
The deal, set to close by year-end, is worth $4.22 billion based on the purchase price of $48 per share and the 87.9 million CheckFree shares outstanding as of April 30. The two sides value the deal at $4.4 billion, which includes an unspecified amount of debt, according to a spokeswoman.
Asked about the fate of employee jobs, Fiserv spokeswoman Melanie Tolley said the planned integration of the two companies will be reviewed over the next few months.
"We are definitely putting together some transition teams," she said. "I think they're going to have to look at every piece of the business."
The combined company will have revenue of about $6 billion.
The $48 a share offer for CheckFree is a 30 percent premium over its closing price of $36.83 on Wednesday.
CheckFree shares rose $8.75, or 23.8 percent, to $45.58 in midday trading Thursday after rising to a new 52-week high of $46.10 earlier in the session. Fiserv shares rose 7 cents to $49.26.
Brookfield, Wis.-based Fiserv, which serves the financial and insurance industries, said CheckFree has complementary technology, services and business models. Norcross, Ga.-based CheckFree provides electronic billing and payment, online banking and investment management technology services, among others.
CheckFree Chairman and Chief Executive Pete Kight was asked during the analyst call whether he had any misgivings about selling the company he founded in 1981, and he was asked if the company could have gotten more.
"We have a lot of moving parts," Kight said. "The market has a lot of moving parts. Perhaps the biggest issue I focus on, we really have a definition of stakeholder as shareholders, associates and the clients we serve."
He added, "What we're trying to do is balance out the best way to serve the stakeholders."
Kight declined to say if there were any other bidders for his company. Executives said CheckFree and Fiserv had been in discussions for several months.
Yabuki said a goal of the acquisition is to "tightly integrate electronic bill payment and settlement capabilities with our core account processing and risk management solutions."
He also said the two companies have complementary client bases. Fiserv's core processing base consists of smaller and mid-market banks, credit unions and thrifts. CheckFree serves mostly larger banks.
Yabuki was asked whether any customers in the highly competitive online banking industry might be lost after the deal closes.
"We made a set of assumptions that we think are appropriate for the future," he said. "I believe some institutions will go in-house and I think some institutions will end up outsourcing."
Kight will be employed by the combined company and named to its board. The deal is subject to regulatory approval.
Wavxmaster, I agree. Server 2008 is going catapult Wave to the next level in the eyes of the market as well as other software makers. For all their faults, Microsoft plays a huge role in validating technology and driving its adoption. I am very happy Wave, along with others, sold them on TPMs.
Pickle
Nokia Formally Puts Mobile Phone Payment Into Commercial Use In China
August 2, 2007
Global mobile phone giant Nokia (NOK) has formally put its mobile phone payment service into commercial use in Beijing, Guangzhou and Xiamen.
Nokia's mobile phone payment service is based on Near Field Communication, an upgraded technology of RFID, which enables mobile phones to realize e-payment and data downloading services. The service is expected to facilitate mobile phone users by allowing them to use a mobile phone to pay their transportation fees, film tickets and food.
Zheng Shaodong, director of Nokia's Asian NFC Business Department, says that Nokia has started up the whole mobile payment chain with this first ever NFC mobile phone payment put into commercial use.
According to a survey conducted by Nokia on target mobile phone payment users, 56% of the users often use public transport cards and more than 80% of them say that they are interested in integrating the transportation card functions into mobile phone payment.
OT: For Time Being, Mobile Payments are Grounded
Javelin says contactless cards and instore mobile payments will be held back until chips are embedded in mobile devices. After that, one might lead to the other.
By John Adams
Both merchants and payment firms stand to make out like legalized bandits as contactless payments and mobile transactions take off over the next few years-and it's more likely that the two methods will follow one another rather than compete.
In any case, Javelin Research's president and founder James Van Dyke says both contactless cards and mobile payments initiatives will languish until chips are embedded in mobile devices.
If Van Dyke is right that means is that institutions planning to make heavy bets on contactless cards need to view them as a landmark on the road to a world where mobile devices replace wallets altogether.
"What we're saying is contactless payments are at best a interesting stop over point, but the only significance is it prepares us for mobile payments," he says.
Van Dyke's view is slightly different than the industry norm, which is to view contactless cards as a unique means of payments and debate whether that method has a future. Van Dyke says contactless payments do have a future, but as enabling technology rather than a robust product.
He says except for a few cases, like at airports during off- peak hours where there may be only a single queue, the idea of saving a few seconds when paying for a transaction by tapping a card rather than swiping it isn't enough to change consumer behavior in a major way.
"If contactless did not enable anything else, we would be forecasting that it's a waste of money. We're not saying that," says Van Dyke, adding contactless payments can act as a gateway technology to eventual migration to single mobile payment devices that combine traditional wallets, cell phones and other handheld devices.
New Javelin research on mobile payments says mobile payment platforms, consumer in-store cards and electronic payments growth are dependent on the continued availability of higher-functioning handsets. These handsets will provide further motivation for merchants to accept contactless payments and will lead consumers to adopt technology that replaces wallets with cell phones, m-wallets or wireless wallets-which is where the "real" opportunity for new payments technology resides.
Report a Pirate, Get Paid
The Business Software Alliance, a global organization representing software manufacturers, is increasing its software piracy reporting reward to $1 million from $200,000 as a means to snuff out internal theft and other misuse of corporate software.
Concurrent with the rewards program, BSA is also launching "Blow the Whistle," a national ad campaign that encourages employees to report software piracy.
(c) 2007 Bank Technology News and SourceMedia, Inc. All Rights Reserved. http://www.banktechnews.com http://www.sourcemedia.com
Sorry if posted. Solutions for Protecting Data at Rest
By Bill Bosen
As organizations struggle to implement encryption for stored data, one critical question frequently surfaces - Which encryption method is best for our organization, file-level encryption or full-drive encryption?
The amount of protection provided by these two approaches differs greatly, as does the management and user burden and the ability to meet legislative requirements. Before embarking on either path, it's critical that an organization understands the pros and cons of both techniques and carefully considers the best place to start.
Need for encryption of stored data
While most organizations have been encrypting data in motion on their networks for many years using technologies such as VPNs and SSL, encrypting data as it is stored is just starting to gain momentum. It's high time, since most computer crime comes from attackers who steal data directly from stored locations. Very little data theft occurs these days from network traffic. Instead, attackers are going after stored data, including theft of financial information, IP, trade secrets, customer data, and personal private information.
The news is full of incidents of stored data being stolen. The recent theft of hard drive belonging to the Transportation Security Administration (TSA) containing the bank data, payroll information, and Social Security numbers of about 100,000 employees serves as a stark example of the need to encrypt stored data. Another notable incident occurred in 2006 when a laptop containing the personal information of over 26 million military personnel was stolen from the home of a Veterans Affairs Department employee. Qualcomm CEO Jeff Irwin Jacobs had his laptop containing sensitive company data stolen during a news conference when he was standing no more than 30 feet from it.
Victims of data theft face significant consequences. Not only do organizations incur a loss of reputation resulting in diminished current and future customers, numerous laws and regulations mandate the encryption of sensitive data, and stiff penalties, fines, and even jail time await those don't implement the proper safeguards. ChoicePoint Inc. must pay $15 million to settle charges that it failed to protect consumers' personal information. DTI reports that 70% of companies go out of business after a major data loss.
Methods of encrypting stored data
File-level encryption, as the name implies, encrypts files at an individual level. Although this is sometimes referred to as folder encryption because all of the files in a folder can generally be encrypted with one action, the technology still operates at the individual file level. This means that one can encrypt just those files that contain sensitive data and leave all other files unencrypted. Of course files are decrypted or encrypted only for users who properly authenticate themselves.
On the other hand, full-drive encryption (FDE) automatically and transparently encrypts all data including user and system files as they are written to the disk drive. This is accomplished either in software through an add-on aftermarket software hard disk driver, or through hardware in the disk drive itself. Most FDE solutions require user authentication when the disk drive is powered on. The drive will not allow access to unencrypted data unless the drive can properly authenticate the user.
Comparison: file-level vs. FDE encryption
Both file-level and FDE approaches have advantages and disadvantages. In a system using file-level encryption, since only sensitive files are encrypted the system performance is faster than in a software based FDE system. This is because the CPU is not impacted by constantly encrypting and decrypting system or other files that don't require protection. While this is not usually an issue for hardware-based encryption solutions, it can be a significant matter for software-based solutions, particularly for older devices with less powerful CPUs. For applications that open and close large files such as database oriented applications or some email clients, the performance impact can be a showstopper.
Another advantage of file-based encryption is the installation process. It's a frightening thing for users to have their data scrambled. A file-level encryption solution allows users to back up and apply encryption to just a few files until they gain confidence that either an operator error or technology problem won't destroy their data. Contrast that with an FDE system that encrypts everything at installation time. Regardless of how robust the solution is, users embark on such a journey with fear and trepidation, not to mention the need to back up the entire system beforehand. A file-level solution mitigates most of those fears. It's important to note that not all FDE solutions suffer from these installation issues-this doesn't apply to FDE Solutions that are built-in at the factory. However, for add-on, software FDE solutions the installation concerns can be a significant disadvantage.
A third advantage of file-based encryption is an attribute I'll call persistent encryption. Protected files remain encrypted until an authorized application or application plug-in opens them. The data can only be obtained in clear, unencrypted format through an authorized application that authenticates the user. Other applications attempting to read the file from the disk drive will be unable to make sense of it. Even if Spyware has infiltrated a system, it cannot obtain a protected file from the disk. This also means that a protected file can be sent via ftp, instant messenger, attached to an email, backed up, copied to a USB drive or other removable media and the protection remains intact. The data encryption is persistent and is not dependant on any particular device or location for its protection.
In spite of these advantages, file-level encryption has a number of disadvantages that need to be well understood. First and perhaps foremost, is that file-level encryption can be very difficult to deploy and manage from a policy point of view. Organizations need to first determine what data needs to be encrypted and that's not a trivial exercise. All existing documents need to be analyzed for sensitive data. Determining what is sensitive and what isn't is not as easy as it sounds, and getting the whole organization to agree on and enforce the resulting policy can be even more difficult. Furthermore, a document initially classified as non-sensitive might have sensitive data added later, so monitoring all documents becomes an on-going discipline. In an attempt to ease this burden, some organizations decide to encrypt all documents of a certain type, Microsoft Word for example. But that causes problems too because more often than not, a user's needs to send a non-sensitive document to someone, and getting an exception to the policy is too much work to be practical.
Another disadvantage of file-level encryption is the dependence on user action. Since users can inadvertently forget to encrypt a file that should be encrypted, or intentionally choose not to, the whole security system is very prone to human weaknesses. One of the underlying principles of effective security is that it must be provable security. If management can't prove that all sensitive data is encrypted at all times, the security will generally not be in compliance with federal and or other regulations and management can be held accountable.
A third disadvantage of file-level encryption solutions is that it is sometimes impossible, or at least impractical to encrypt specific bits of sensitive data within an application. For example, there is no way in Microsoft Outlook to encrypt specific fields or a specific record within the Contacts database. The only option is to encrypt the all Outlook database files which can significantly degrade performance.
When deploying file-level encryption organizations also face key management challenges and the need to integrate with multiple different operating systems. A file encrypted on one PC can't be read on a different PC or by another individual unless the decryption key is also available to them, and that adds a lot of complexity to the system. The solution must also be present wherever files need to be generated or read. If files are exchanged between PCs, Blackberrys, Macs, and LINUX systems, the solution must be present on all of those devices.
Let's now turn our attention to the advantages and disadvantages of FDE systems. Once installed, FDE-based solutions are completely automatic and transparent. There are no burdensome administrative policies to establish or enforce because everything is protected, even isolated records or fields within database applications. The security is provable in an audit and it will hold up in court because it's not subject to human weaknesses. While organizations still need a method to recover data on a user's disk drive, the overall key management effort is a fraction of that required in file-level solutions.
Users generally prefer FDE solutions because there are no added burdens for them either. They don't have to make any decisions or press any buttons. Except for authenticating themselves at start up, which in the better systems happens only once and looks exactly like the authentication users are already used to, users don't even need to know the security is present. It's totally transparent.
Another big advantage of FDE solutions is that they have been around since the 1990s. The solutions are solid and very mature and are in use by large organizations the world over. Their simplicity means a lot fewer problems to deploy and manage.
One FDE solution, DriveTrust from Seagate Technologies, is completely hardware-based and as such has additional advantages. For instance, since all of the cryptographic functions are performed within secure hardware, encryption keys are never vulnerable to capture. Currently, there are no real hardware-based file-level encryption solutions for enterprises. All file-level solutions use the CPU to encrypt and decrypt the data, which means spyware could potentially capture the encryption keys used within an enterprise as the process executes. DriveTrust is not subject to this weakness.
However, FDE systems don't do everything. They do an excellent job of protecting data on a system that has been shut down because an attacker can't start the system and get any data. However, once an authorized user has started a system and it is up and running, the effect is as if no encryption were in place. Every read from the disk drive automatically decrypts data for any process that requests the data. If a machine becomes infected with spyware, the ill-intended software can obtain any data on the drive. If a machine is left unattended and unlocked, an attacker who has physical access, even momentarily, can also obtain any and all data.
FDE systems are designed to protect data on the disk drive. They don't protect data anywhere else. Data that's encrypted on a hard disk is automatically decrypted when it's read. If that data is copied and pasted as an attachment, the attachment is in the clear, unencrypted unless some other process later encrypts it like SSL or a VPN. If data is copied from the drive and burned to a CD, or copied to a USB drive, that data is decrypted by the FDE system and will be in the clear. It will not be protected by the FDE system, so unless some other protection mechanism is in place to re-encrypt the data, it will be unprotected.
What's best for your organization?
When selecting a system to encrypt your organization's stored data, many factors need to be considered as outlined above. FDE is the best approach for solid protection of data stored on disk drives. However file-level protection is better suited for providing persistent protection of files that are moving from device to device. Since both technologies serve different needs, most organizations will ultimately end up deploying both solutions at some point. The question is, where does one start today?
If your organization already has FDE deployed, then rolling out a file-level solution is a natural extension of your security and good next step. However, if you don't have any protection for stored data, starting with file-level encryption and its added complexity may be overwhelming. Unless you can make a good case that it's more important to protect data moving from device to device than it is to protect data on your organization's disk drives, you are probably better off starting with FDE. It's simpler, more mature, and gives you provable security.
The added security available with FDE solutions is another major consideration. If your organization requires the utmost in security, make sure you understand the potential of capturing the encryption keys during the execution of file-level encryption systems.
For additional information regarding this study, contact:
Bill Bosen is a partner at Trusted Strategies LLC. Trusted Strategies, together with SeaGate, conducted the study.
This is indeed the killer app. The potential uses are limitless. And most importantly, it makes companies money where there was no money before.
Pickle
Nice! EOM
cosign,
Wave undoubtedly sold the technology and got the "buy in" from Wintel which started the train rolling. I think Server 2008 will be Wave's offcial coming out party. There is no bigger name than Microsoft and now they are a "customer" per SKS. EEE is going to be a third party software solution within Server 2008 that could achieve near 100% adoption.
pickle
Wash68, correct. And TC will succeed because Microsoft and Intel want it to. Simple as that.
Thanks for your contributions. Very much appreciated.
Pickle
Great article. I like this part:
One possibility: Seagate preloads a drive with, say, the entire music library of Sony (nyse: SNE - news - people ) BMG, or every blues song ever recorded. Seagate could ship the drive to a PC maker, or build and sell its own external storage device. Watkins, a diehard Deadhead, is in talks to produce a drive holding all the Grateful Dead's tunes. To grab a song, a listener would click on it and get to it instantly, without waiting for a download à la iPod. Seagate would charge a fee and take a cut. Suddenly, new would-be rivals emerge: Apple and Wal-Mart (nyse: WMT - news - people ).
Ispro, government keeps looking like early adopters. Gotta love it.
Pickle
cosign,
I like it too. Another brick in the wall.
Pickle