Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
langostino, I agree. eom
Study: CDs Still Overshadow Digital-Music Downloads
Tue Sep 28, 2:20 PM ET
Business - NewsFactor
Robin Arnfield, www.newsfactor.com
The CD will remain the most popular music format in Europe until at least the end of the decade, when digital-music downloads will start to pose a challenge to the CD's dominance, according to a new study.
In 2009, Europeans will buy 836 million euros (US$1 billion) worth of music in the form of digital downloads, U.S.-based technology consultancy Jupiter Research predicted.
Forrester More Bullish
However, Jupiter said that digital-music downloads would account for only 8 percent of the overall 10.2 billion euro ($12.75 billion) music market in 2009. The study did not include cell-phone ring-tones in its forecasts.
This figure is more cautious than a recent estimate by rival technology consultancy Forrester Research.
Last month, Forrester Research predicted that the European digital-music market would be worth 3.5 billion euros ($4.37 billion) -- or 30 percent of the overall European market -- by 2009.
UK to Lead
The Jupiter report predicts that the UK will be the biggest online-music market in Europe by the end of the decade.
The UK will account for 30 percent of European online-music sales in 2009, the study says.
Competitive Market
Europe's online-music market is dominated by Apple's (Nasdaq: AAPL - news) iTunes music service. However, the recent launch of a legal version of Napster (news - web sites), plus dozens of other new service launches, has created an extremely competitive market in Europe.
Jupiter says that the European digital music download market will grow four-fold this year, to 46.3 million euros ($57.9 million).
Over the next five years, the largest catalyst for growth will be the sale of digital music players such as Apple's iPod and Sony's (NYSE: SNE - news) new hard-disk Walkman, the Jupiter study claimed.
http://story.news.yahoo.com/news?tmpl=story&u=/nf/20040928/bs_nf/27233
dig space, I feel compelled to...
...help cpa seek attention and save himself from a further deterioration of his mental health due to this pathogentic fixation upon destroying a company and saving long shareholders in the process. It is a g_d complex.
I'm fixated with helping him realize the irrationality of his attempt to rationalize his g_d complex of destroying and saving at the same time.
cpa, I have to admit...
...you are master manipulator and twister of facts.
Losses are only accumulated when you sell for a loss. Clearly you are in expert in understanding this as you have clearly lost even your sanity.
Further, your premise that trading a stock is contradictory to being a long is suspect. How are they related? I see them as independent.
I understood that you are an accountant. Is there a way to write off losses that aren't realized?
cpa, your deflection of the issue at hand to refocus on your own agenda (your losses) is demonstrative of your inability to focus on anything except your own privte agenda.
Your losses are yours alone. I have no loss in Wave. Losses only occur when you buy high and sell low. This is a fundamental investing rule. Hopefully your experience at buying high and selling low has led to a more seasoned approach to investing.
I'm unsure how bashing Wave corrects your losses? Does this mean you are attempting to manipulate the price much lower in order to buy it lower and sell it higher? Is this revenage against the shareholders who have not joined you in your dirty tricks campaign? Or is there a psychoses at work? What is it you are trying to accomplish if you are cognitively disposed to reflect and answer?
To answer your deflective question - was I implying anything? Simply, no. I stated it was an OT post. There was nothing to imply other than the quoted material. Do I need to preface posts with 'OT' and 'nothing implied'? If it's not doma then its you... Geez, what does a person have to do to get a break from some you?
Stupid question - I know the answer - create a loss and bash the company for my stupidity! Deflect the responsibility from me on to others - that is the solution.
cpa, I'm not implying anything - how is that you morph my post? Just because you have an ax to grind against the company doesn't mean you have to try and grind me, or does it?
I made NO presumptions or assumptions. I posted a quote. You have proceeded to presume and assume a number of things starting with your response to the posted quote.
Now you are trying to attribute claims to me from my original post. How's that?
FACT: There is an interoperability group forming in Europe around trusted devices.
FACT: A number of these companies are also members of the TCG.
FACT: I posted both of these.
FACT: You have problems with Wave.
FACT: You are deflecting your problems on to others.
FACT: This is a dicussion forum regarding Wave.
FACT: You are twisting facts.
cpa, correlate that group with TCG. eom
OT, but interesting...European Commission funds smart card consortium, lead by Gemplus
R&D initiative "InspireD" set up to develop new standards for interoperable smart card technology
Luxembourg, 21 September 2004, Gemplus International S.A. (Euronext: LU0121706294 - GEM and NASDAQ: GEMP), the world's leading provider of smart card based solutions, today announces that the European Commission1 has named it as leader of the largest consortium ever gathered for a cooperative research project in the Smart Card domain. Called "InspireD", the project will develop the new generation of smart card technology for Trusted Personal Devices (TPD). This embraces all kinds of secure portable devices, and allows users to connect to their preferred e-services wherever they are located. The EC has also granted funding for InspireD for a 3-year period.
The InspireD consortium comprises 16 of the leading industrial and academic stakeholders from the European Smart Card arena. Headed by Gemplus, the team includes representatives from ActivCard, ARTTIC, Atmel, Axalto, Everbee Networks, France Telecom, Gemplus, Giesecke & Devrient, Infineon, INRIA, NDS Technologies, Oberthur Card Systems, Orga, Philips, the Université Catholique de Louvain, and the University of Twente.
This is so far the only European Commission project exclusively dedicated to smart cards. It will create a new standard for open platforms for the entire smart card and security industry. All aspects of smart card technology will be studied, including the silicon component platform, the cryptography and security authentication protocols for data protection, operating systems, and the software application layers. This will enable a seamless integration of Trusted Personal Devices in many IT applications.
Smart card adoption is gaining speed as governments and corporate entities currently deploy a wealth of projects ranging from national identity to telecommunications, banking, e-commerce, and healthcare. With this growth comes the need to manage risk and ensure standards prevail as more solutions make use of smart card architecture. This initiative is the latest step taken to bring consistency, accuracy and openness to this industry. It will provide the best possible environment for industry players to develop the smart card technology platform to its full potential.
The European Commission has created seven key pillars around the development of an Information Society and Trust & Security is one of them. As the Information Society becomes more and more important to business and individuals, it is increasingly critical to ensure the security of both the infrastructure and the information that runs through it.
As a result of InspireD, users will see growing interoperability between a widening range of e-services of benefit to their daily lives, and they will be able to connect to them in an increasingly secure and intelligent environment.
Laurent Manteau, Gemplus and Christian Goire, Axalto, will present the aims and initiatives of the InspireD project during the e-Smart Conference, 22-24 September 2004, Sophia Antipolis, France.
(More information on the InspireD project - www.inspiredproject.com <http://www.inspiredproject.com> or www.cordis.lu/ist/directorate_d/trust-security/projects.htm <http://www.cordis.lu/ist/directorate_d/trust-security/projects.htm> )
1.This project is supported by the European Commission within the 6th Framework Programme of The Information Society Technologies
About Gemplus
Gemplus International S.A. (Euronext: LU0121706294 - GEM and NASDAQ: GEMP) is the world's leading player in the smart card industry in both revenue and total shipments (source: Gartner-Dataquest (2003); Frost & Sullivan, Datamonitor.) It has the largest R&D team, unrivalled experience, and an outstanding track record of technological innovation.
Gemplus offers an exceptional range of portable, personalized solutions that bring security and convenience to people's lives. These include Mobile Telecommunications, Public Telephony, Banking, Retail, Transport, Identity, WLAN, Pay-TV, e-government, access control, and a wealth of other applications.
Gemplus' revenue in 2003 was 749 million Euros.
www.gemplus.com <http://www.gemplus.com>
The dot of all dots...?
Carnegie Mellon Receives $20 Million from Bill & Melinda Gates Foundation To Build a New Home for the Study of Computer Science
http://www.cmu.edu/cmnews/extra/040914_gates.html
CPA, it's too bad that red, white, and blue of such little meaning for you.
Question for everyone, shorts included...
Why would this Intel CD be in Red, White, and Blue?
http://trustedcomputingsociety.org/Wave_Intel_Infineon/
doma, it helps everyone if you post links with material you are quoting.
Thanks for helping!
doma, links please? eom
Very OT and probably not worthy of posting in this forum, but I love it when I can be 2-3 years out ahead of the curve [beating my chest - "give is up to the barkster!"].
On-demand audio coming to iPod
By Ian Betteridge
September 13, 2004
In what may prove to be the next big thing for the iPod, weblogger Adam Curry has released the source code to an application which allows users to automatically download MP3 audio files from weblogs and other web sites to their iPod.
The project, called iPodder, utilizes the ability of RSS feeds to syndicate content, including files, combined with a small application which takes this content and puts it on your iPod. Both Mac and Windows versions are available, although it's stressed that both are early versions. The Mac version utilizes AppleScript, while other versions are available in Perl and Python.
The iPodder site also includes a list of current web sites distributing content in this way.
The creation of iPodder raises the prospect of truly portable time-shifted audio programming on the Internet, something which, until now, has been difficult to achieve automatically.
http://www.extremeipod.com/article2/0,1759,1645053,00.asp
On-demand audio coming to iPod
By Ian Betteridge
September 13, 2004
In what may prove to be the next big thing for the iPod, weblogger Adam Curry has released the source code to an application which allows users to automatically download MP3 audio files from weblogs and other web sites to their iPod.
The project, called iPodder, utilizes the ability of RSS feeds to syndicate content, including files, combined with a small application which takes this content and puts it on your iPod. Both Mac and Windows versions are available, although it's stressed that both are early versions. The Mac version utilizes AppleScript, while other versions are available in Perl and Python.
The iPodder site also includes a list of current web sites distributing content in this way.
The creation of iPodder raises the prospect of truly portable time-shifted audio programming on the Internet, something which, until now, has been difficult to achieve automatically.
http://www.extremeipod.com/article2/0,1759,1645053,00.asp
INSIDE MOVES - Beatles' suit could upset the Apple cart
GORDON MASSON, 09.13.04, 11:50 AM ET
LONDON --- Beatles fan Steve Jobs could lose a large bite of his Apple to his idols.
The Beatles' company, Apple Corps., is involved in a legal battle with Jobs' Apple Computer, claiming the hardware manufacturer is in breach of a 1991 agreement that that forbids it from using the trademark for any application "whose principle content is music." The two companies have been involved in a number of court battles over the years involving the use of the Apple trademark.
Word among the legal community is that an out of court settlement could be imminent and that it will massively dwarf the $26.5 million paid to the Fab Four's company in 1991 in a row over trademark use.
One lawyer told Daily Variety, "People are expecting this to be the biggest settlement anywhere in legal history, outside of a class action suit. The numbers could be mind boggling."
Earlier this year, the computer company failed in a bid to have the latest case heard in the United States, when a judge in London's High Court in London granted jurisdiction in the U.K.
The litigation is seen as one of the main reasons behind Apple Corps. preventing the Beatles catalog of songs being made available on the computer company's iTunes song store.
Some speculation suggests the settlement could see Apple Corps. becoming a major shareholder in the computer company, with Paul McCartney maybe even becoming a board member.
Lord Grabiner and Daniel Toledano are acting for Apple Computer, while Geoffrey Vos and Daniel Alexander are representing Apple Corps.
Despite splitting in 1970, the Beatles interests are still administered by Apple Corps., which is owned by McCartney, Ringo Starr and the families of John Lennon and George Harrison.
An Apple Computer rep declined to comment on the pending litigation and pointed to an earlier statement that said the two companies have "differeing interpretations" of the agreement.
For more information, please visit http://www.variety.com.
Daily Variety
Copyright ?2004 Reed Business Information. All Rights Reserved.
http://www.forbes.com/technology/feeds/general/2004/09/13/generalcahners_2004_09_13_eng-cahners_dv_e...
yelmight, that was in response to SharonB's post...
...which had STM listed in it.
All DRM is related at a conceptual level. SCMI must start thinking about other venues....
doma, agreed...
...almighty swami!
Your dots are the coolest. I think you should call Steve Jobs up and tell him about dotting his iPods with your dots.
I just love those dippin' dots...
Cheers!
doma, you are absolutely correct, hence...
...my starting the post with OT. Least I be chased off the board for posting OT stuff with out first annotating it.
Thank you for solidifying my perspective that this is a worthless 'dot' that leads to a dead-end.
I think I'm going to buddy up with CPA now.
Hey CPA -let's short this pig! Nothing but deadend dots...
or is it...?
Vader, I'm sure...
...doma may have a different take on this:
The solution proposed, as implemented by SVP, meets these goals. It allows any network operator to deliver content in a secure fashion to any SVP-enabled third-party device. With SVP-enabled chips included in each consumer electronics device on a viewer’s home network, the operator can extend access control throughout the home network to all devices — including portable devices — and realize dozens of new business models and program packaging options. This is accomplished at virtually no cost to the operator, since proprietary and conditional access components are required only in one “gateway” STB, not in all of the networked devices. Thus the operators' offerings are securely available on all TVs within a viewer household while deploying or subsidising only one STB per viewer household.
Furthermore, SVP protection extends even to content that is archived since the content license defines the access criteria as determined by the network operator. This content license must be archived with the content to allow access, and so the rights that the license encodes are always enforced. Therefore, operators can then allow viewers to record and keep content indefinitely, confident that the content can only be viewed within that viewer’s domain, not recopied and redistributed freely to friends and neighbors.
http://www.svp-cp.org/docs/copy_protection_strategies_ibc_lecture.pdf
more on the new SVP video chip at...
http://www.svp-cp.org/press_room.html
SharonB, I submit to you...
...that this is part of the trusted computing endeavor (http://www.trustedcomputing.org).
Further, notice that STMicroelectronics recently did this:
http://biz.yahoo.com/bw/040907/75596_1.html
OT? Tech Firms Announce Video Anti-Piracy Technology
Fri Sep 10, 2004 06:51 AM ET
LONDON (Reuters) - NDS, STMicroelectronics and Thomson said on Friday they will develop new encryption technology to foil video piracy, a $3.5 billion problem for broadcasters and movie studios.
The anti-piracy technology, known as the secure video processor (SVP) platform, is designed for media companies to protect their content from unauthorized copying and redistribution.
A rise in piracy has accompanied the explosion of digital video players. Crafty programmers have discovered ways to crack into DVD players, for example, to make copies of Hollywood movies quickly and cheaply.
The new technology is designed to allow media companies to encrypt their content with their own digital rights management (DRM) specifications and have it unscrambled for viewing solely by devices embedded with SVP-enabled chips.
The companies hope enough SVP-enabled video playback devices and TV set-top boxes will hit the market in coming years so as to allow consumers to transport the encrypted content to specially equipped SVP devices for playback.
NDS, 78 percent owned by Rupert Murdoch's News Corp, has developed the anti-piracy software component for SVP. Beginning next year, Thomson will embed SVP-enabled chips developed by STMicro into its video playback devices and set-top boxes.
American satellite TV operator DIRECTV, a News Corp affiliate, is the first to use the new technology, the companies said.
The SVP alliance was introduced in Amsterdam on Friday at a broadcasters conference in Amsterdam.
http://www.reuters.com/newsArticle.jhtml?type=technologyNews&storyID=6203425
greg s, I'm not sure what the issue is...
...I think it is significant that Wave has moved from a pilot/market test phase of deployment with the OEM to actually widescale deployment with the OEM.
Though the Intel rep might have been trying to encourage my white box builder to buy one of these motherboards with the claim of hundreds of thousands having been sold, but doesn't it speak of interest to be bundled in such a mundane, OEM way?
What am I missing? If you think I'm sniffing Kool-aide then you don't know me!
ROTF right back!
24601, as usual you are on mark. eom
greg s, please accept my apology for the verification...
...of your claim. It was not meant to be a barb at you.
From what I have gathered you are negative against Wave, the company and technology. You have the right to claim "show me the money" at this stage.
I think trusted computing is happening and will be standard on most boards within 2 years. There will be hold outs and that is cool.
Thank you for bringing to my attention your paradoxical position.
BTW, any thoughts on the OEM perspective of this?
rooster, interesting how...
...the iPod has become an on topic subject regarding security.
Intel and Wave report motherboard report...
As reported here, a couple of weeks ago I contacted my white box builder about getting the best Intel board with a TPM on it. He relayed to me at the time that the Intel rep told him they were selling hundreds of thousands of these motherboards. I should mention that I have not evangelized with my white box builder about wave.
He called me a couple of days ago to report the board was in. Over the phone I had him describe it to me. It was just in a brown OEM box with nothing on the box to indicate what was inside.
Inside there is a board with a TPM on it (no surprise there). What is surprising is the CD.
He reported to me there is only one CD in the box and it is an Intel CD. Printed on it is a table of contents with Wave Systems, Embassy Suite and its sub-components.
I think it is remarkable in that the Intel CD is listing Wave and the components on it (printed on the surface none-the-less). Cross-branding at the OEM level?
'Trusted' Systems Move to Mainstream
By Jason Brooks
September 3, 2004
When it comes to operating systems, it's a matter of trust—or mistrust, as the case may be.
It's often suggested that Microsoft Corp.'s security woes stem in part from the company's tardiness in updating the security assumptions it had developed when solitary, disconnected desktop PCs had little reason to fear network-borne attacks.
However, the problem of operating systems that are too trusting for anyone's good in today's wide-open, tightly connected environment extends beyond Microsoft—although Unix and Linux systems derive certain security benefits from their networked, multiuser roots, these systems are also much more permissive than they should be.
Perimeter-focused security elements such as firewalls play an important role in securing an enterprise infrastructure, but with many services, such as Web servers, it's necessary for companies to expose portions of their infrastructure to the Internet.
Enter the trusted operating system, which can make an enterprise infrastructure significantly more secure by bringing servers an access control scheme that's more fine-grained than the DAC (discretionary access control) of most operating systems.
Click here to read about how trusted operating systems are certified.
Trusted operating systems provide for and enforce mandatory access control policies, which limit user and application privileges to the minimum required to do whatever job needs to be done. With the DAC schemes of most operating systems, in contrast, a process has access to everything available to the user who launched it.
Many applications, including potentially vulnerable Internet-facing services, require superuser privileges to do things such as bind to low-numbered ports. This means that a compromised name server or Web server can give potential attackers the keys to all the data and processes on a breached machine. By limiting processes to the resources they require, trusted operating systems let companies limit the damage that a compromise can cause.
Trusted-operating-system products aren't new, and there is a variety of options available. These include Sun Microsystems Inc.'s Trusted Solaris and the National Security Agency-developed Security-Enhanced Linux, as well as PitBull LX from Argus Systems Group, a division of Innovative Security Systems Inc.
However, since the early 1980s, when trusted operating systems began to be used in government and security-sensitive private deployments, these products have typically occupied a niche position. This is because of how the systems have been marketed and, as with other computing systems, because security is inversely related to convenience—trusted operating systems typically are trickier to configure and work with than are their more trusting counterparts.
But with increasing attention being paid to security on both the vendor and consumer sides of the enterprise IT market, trusted-operating-system features are beginning to make their way into mainstream operating systems.
Sun, for example, has announced that Solaris 10, due early next year, will leverage some of the process rights management functionality present in the company's Trusted Solaris, which limits privileges for users and tasks.
In addition, Microsoft has launched a major project called NGSCB (Next Generation Secure Computing Base) for improving the security of "Longhorn," the next major Windows revision. NGSCB is designed to tighten the control that users and administrators have over their systems. However, responding to developer and user pushback, Microsoft is re-evaluating what role NGSCB will play in Longhorn when that operating system ships. (Longhorn is expected to ship sometime in 2006.)
Linux serves as a base platform for trusted-operating-system products such as PitBull LX and Immunix Inc.'s Secured OS, and SELinux provides a common option for bringing trusted-operating-system features to various Linux distributions.
Red Hat Inc. officials have said that SELinux will be included in Red Hat Enterprise Linux 4, which is expected to ship in the first quarter of next year. SELinux also integrates well with the Debian and Gentoo distributions of Linux.
http://www.eweek.com/article2/0,1759,1641954,00.asp
Capital Ventures International/E9
released on Tuesday, 9/7/4, a 1-document, 13-page 'SC 13G'
Statement of Beneficial Ownership -- Schedule 13G
filed as of Tuesday, 9/7/4, with respect to
Wave Systems Corp
Does INTC announce tomorrow? eom
probably not important, but...
...I asked the white box guy who builds my nasty little PC whiteboxes for us to look at the Intel boards with the TPM. He had no clue about them. He usually builds with Asus boards. He called his Intel rep and the rep told him that I should use one of the two boards we were talking about as they have sold "hundreds of thousands of them."
The board we are going with is D865GRH.
OT or Not, MSFT speaks on security...bolds are important (IMHO)...
These days, every Windows computer is a war zone of viruses, Trojans, spyware, and other malicious code trying to exploit security holes in Internet Explorer. One of the scariest of all, Download.Ject, discovered in late June, worked to log keystrokes (usernames, passwords, PINs). All this despite Bill Gates' 2002 declaration that security is his top priority. We asked Stephen Toulouse, Microsoft's security program manager, if Redmond is fighting a war it can't win.
WIRED: It's been more than a month since the first news of Download.Ject, and you still haven't issued a real fix for Internet Explorer. How long is it going to take?
TOULOUSE: The first step was to block this specific attack. The malicious software was being delivered from a server in Russia. We worked with law enforcement to get that shut down. And our product teams released an update that blocked the downloads that Ject had hacked. It was not specifically a security update for Internet Explorer. We're still working on that.
Meanwhile, Firefox and Opera look awfully appealing.
Security is really an industry-wide problem. Just this morning I had to install an update to Firefox to block a flaw that would've allowed an attacker to run a program on my system.* We're working around the clock to make Internet Explorer safer, and we're making changes with our Windows XP Service Pack 2 to make browsing a lot more secure.
What about removing capabilities from IE to beef up security?
We're always looking at design. There's always that trade-off between functionality and security, and we've taken some steps recently that bear that out. For instance, the address bar of Explorer was allowing a certain type of rendering. People had grown to use that functionality; they liked it. And then we started to see attackers co-opt it to try to get software onto the machine, and we reviewed that feature and made the decision to stop the product from being able to do this.
Seems like you're fighting a losing battle.
It's not a switch that can be flipped. Software written by humans will always contain errors. We're fundamentally changing the way things operate, to help to make software more resistant to attacks. We're two and a half years down a much longer road; it's more of a 10-year timeline.
http://www.wired.com/wired/archive/12.09/view.html?pg=3
*[editorial note from me: You gotta love it that MSFT's security program manager runs Firefox.]
Apple iPod with Video and WiFi Capabilities?
Posted: Mon, 30 Aug 2004 10:25:26 GMT
Author: Matt Cameron
Apple is currently seeking an engineer for its iPod hardware division. However, they are not looking for just any engineer. They are seeking an engineer with WiFi and Video integration experience.
"The iPod group is looking for a Hardware Engineer. This person will be an individual contributor on a top notch team with responsibilities for the design, implementation, and integration of digital and analog electronics. Experience in the following areas is important: system integration, digital logic, SDRAM, Flash, ASIC’s, processor selection, ATAPI, various communication protocols (ie: GSM, Bluetooth, IEEE 802.11, Firewire, and USB), display types and video and analog integration."
Does this mean we are very likely to see an iPod with a video display and capable of sending and receiving music via WiFi? This is very likely.
http://www.overclockersclub.com/?read=9387952
OT...Apple iPod with Video and WiFi Capabilities?
Posted: Mon, 30 Aug 2004 10:25:26 GMT
Author: Matt Cameron
Apple is currently seeking an engineer for its iPod hardware division. However, they are not looking for just any engineer. They are seeking an engineer with WiFi and Video integration experience.
"The iPod group is looking for a Hardware Engineer. This person will be an individual contributor on a top notch team with responsibilities for the design, implementation, and integration of digital and analog electronics. Experience in the following areas is important: system integration, digital logic, SDRAM, Flash, ASIC’s, processor selection, ATAPI, various communication protocols (ie: GSM, Bluetooth, IEEE 802.11, Firewire, and USB), display types and video and analog integration."
Does this mean we are very likely to see an iPod with a video display and capable of sending and receiving music via WiFi? This is very likely.
http://www.overclockersclub.com/?read=9387952
dabears, I suspect you will like this AMD security news then...
i3 micro's IP Set-Top Box Integrates AMD Alchemy Au1550 Processor for Embedded Network Security
Monday August 30, 12:00 am ET
i3's New Mood IP Set-Top Box Leverages Au1550(TM) Processor's High Performance and Versatility
KISTA, Sweden & AUSTIN, Texas--(BUSINESS WIRE)--Aug. 30, 2004-- i3 micro technology today announced that it selected the AMD Alchemy(TM) Au1550(TM) processor to help accelerate networking capabilities within its third-generation Mood(TM) Box (MMB3) set-top box solution. The MMB3 multi-media TV gateway with loadable codecs will give service providers unmatched flexibility in network connectivity, in-home distribution and decoding technology.
The increased capabilities of the MMB3 require high-performance processing and versatile network security technology. The AMD Alchemy Au1550 processor is a low-power, high-performance, highly integrated system on a chip (SOC) that implements security directly into the hardware thus reducing software overhead. The MIPS-based(TM) processor enables the MMB3 to run enhanced, high-performance applications at low wattage.
"The MMB3 is the next offering from our family of IP set-top boxes and provides operators with a unique feature set, enabling advanced video decoding for VoD and IP-TV, multiple video streams including HDTV and more," said Chris Chalkitis, Chief Technology Officer at i3. "For these multiple broadband features to operate smoothly, we needed a reliable, secure and efficient network processor that could operate seamlessly within such a demanding environment. The AMD Alchemy Au1550 processor provides all of the performance, integration and security features we need to deliver a set-top box that meets our customers' needs."
"i3 has found a way to marry technology and entertainment, enhancing both in the process," said Erik Salo, director of marketing, AMD, Personal Connectivity Solutions Group. "The relationship between AMD and i3 micro has produced an impressive product for the consumer."
Worldwide availability of the MMB3 is planned for September 2004.
For more information about i3 micro technology, please visit: www.i3micro.com. For more information on the AMD Alchemy Au1100 processor, please go to: www.amd.com/connectivitysolutions.
About AMD's Personal Connectivity Solutions Group (PCS)
AMD's PCS group delivers high-performance, low-power embedded solutions that are designed to address customer needs in the non-PC Internet Appliance Market. PCS offers technologies from the AMD Alchemy(TM) Solutions and the AMD Geode(TM) Solutions product families covering a wide range of applications. Target markets for PCS solutions include client, mobile client, set-top box, and access/networking device markets. These products are designed to meet customers' needs for complete connectivity solutions.
http://biz.yahoo.com/bw/040830/295009_1.html
Anybody else heard the rumor...
That Apple's FairPlay is doing a licensing deal with Macrovision?
Microsoft Reportedly Sought...
Microsoft Reportedly Sought iPod Support for Upcoming Music Store
08.25.04, 4:16 PM ET
Rolling Stone magazine is reporting that a source close to Microsoft is saying that Big Redmond "made several overtures" to Apple to get iPod support for Microsoft's upcoming music store. According to the same source, Apple rebuffed those overtures. Microsoft will be opening its music store on September 2nd, according to the article, a couple of days after Apple Expo begins in Paris. From the article:
One source close to the matter says that Microsoft has made several overtures to Apple to make its store compatible with the industry-leading iPod but has been rebuffed. (Apple declined to comment.) Manufacturers of players that support Windows Media -- essentially all of them except the iPod -- are excited about the new site. "Any store selling music that our machines support is a great thing," says Gary Byrd, a spokesman for iRiver, a top-selling manufacturer. "When it comes to the market with Microsoft's might, that's a double bonus."
There is more information in the full article, including details on the number of songs the service will launch with, and other details that have been emerging in recent weeks.
The Mac Observer Spin:There's no big surprise here: Of course Microsoft sought iPod support, and of course Apple said no. Under Apple's current path of maintaining controlled exclusivity, there is no way the company is going to give Microsoft the kind of boost Big Redmond's music store could expect from launching with iPod support.
What will be interesting to watch is what happens in the future with this subject. As Rolling Stone pointed out in the article, Microsoft's music service is most likely to eclipse the competition to become the #2 service behind Apple's iTunes Music Store. Should Microsoft gain significant traction, it is possible the day could some where Apple actually needs Microsoft's support to maintain iPod sales, which are far more profitable than iTMS sales. We don't expect that, certainly not any time soon, but it's a vague possibility.
Whatever the case, Microsoft's monopoly power in the OS market, and the enormous resources the company can bring to bear on a new market, mean its entry into this market offers the first real chance at disrupting the current power structure within the online music download business.
The Mac Observer: Daily Mac News, Reviews, and Tips. You'll Get Your Mac news Here From Now on. http://www.MacObserver.com
The Mac Observer
Copyright 2003 The Mac Observer, Inc. All Rights Reserved.
http://www.forbes.com/technology/feeds/general/2004/08/25/generalmacobserver_2004_08_25_eng-macobser...
Microsoft Reportedly Sought iPod Support for Upcoming Music Store
, 08.25.04, 4:16 PM ET
Rolling Stone magazine is reporting that a source close to Microsoft is saying that Big Redmond "made several overtures" to Apple to get iPod support for Microsoft's upcoming music store. According to the same source, Apple rebuffed those overtures. Microsoft will be opening its music store on September 2nd, according to the article, a couple of days after Apple Expo begins in Paris. From the article:
One source close to the matter says that Microsoft has made several overtures to Apple to make its store compatible with the industry-leading iPod but has been rebuffed. (Apple declined to comment.) Manufacturers of players that support Windows Media -- essentially all of them except the iPod -- are excited about the new site. "Any store selling music that our machines support is a great thing," says Gary Byrd, a spokesman for iRiver, a top-selling manufacturer. "When it comes to the market with Microsoft's might, that's a double bonus."
There is more information in the full article, including details on the number of songs the service will launch with, and other details that have been emerging in recent weeks.
The Mac Observer Spin:There's no big surprise here: Of course Microsoft sought iPod support, and of course Apple said no. Under Apple's current path of maintaining controlled exclusivity, there is no way the company is going to give Microsoft the kind of boost Big Redmond's music store could expect from launching with iPod support.
What will be interesting to watch is what happens in the future with this subject. As Rolling Stone pointed out in the article, Microsoft's music service is most likely to eclipse the competition to become the #2 service behind Apple's iTunes Music Store. Should Microsoft gain significant traction, it is possible the day could some where Apple actually needs Microsoft's support to maintain iPod sales, which are far more profitable than iTMS sales. We don't expect that, certainly not any time soon, but it's a vague possibility.
Whatever the case, Microsoft's monopoly power in the OS market, and the enormous resources the company can bring to bear on a new market, mean its entry into this market offers the first real chance at disrupting the current power structure within the online music download business.
The Mac Observer: Daily Mac News, Reviews, and Tips. You'll Get Your Mac news Here From Now on. http://www.MacObserver.com
The Mac Observer
Copyright 2003 The Mac Observer, Inc. All Rights Reserved.
http://www.forbes.com/technology/feeds/general/2004/08/25/generalmacobserver_2004_08_25_eng-macobser...
DRAFT NIST Special Publication 800-70, The NIST Security Configuration Checklists Program
NIST, with sponsorship from the Department of Homeland Security (DHS), has produced Draft NIST Special Publication 800-70: Security Configuration Checklists Program for IT Products to facilitate the development and dissemination of security configuration checklists ("benchmark settings.") The Cyber Security Research and Development Act of 2002 tasks NIST to "develop, and revise as necessary, a checklist setting forth settings and option selections that minimize the security risks associated with each computer hardware or software system that is, or is likely to become widely used within the Federal Government." Such checklists, when combined with well-developed guidance, leveraged with high-quality security expertise, vendor product knowledge, operational experience, and accompanied with tools, can markedly reduce the vulnerability exposure of an organization. This publication is intended for users and developers of IT product security configuration checklists. This publication is intended for users and developers of IT product security configuration checklists. For checklist users, this document gives an overview of the NIST Checklist Program, explains how to retrieve checklists from NIST's repository, and provides general information about threat models and baseline technical security policies for associated operational environments. For checklist developers, the publication sets forth the policies, procedures, and general requirements for participation in the NIST Checklist Program. In the winter, we expect to launch a web site for checklist distribution.
Comments may be sent to checklists@nist.gov by September 30, 2004.
http://csrc.nist.gov/publications/drafts.html