sleepy
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Steven Sprague replies to: [FDE] DRAM attack - not thwarted at all by Seagate's driveCORRECTION the data on the HDD IS Protected!!!
Sunday, March 02, 2008
http://security-basics.blogspot.com/2008/03/re-fde-dram-attack-not-thwarted-at-all_02.html
Garrett,
There is no time like the present to begin to investigate the tools that have been provided to secure the network.
All enterprise authentication should leverage the TPM.
Start Monday.
Take a wireless 802.1x hot spot and use the TPM to hold the client side keys in a security chip and never in RAM.
This is done by asking the original keys to be created in the TPM and MSCAPI pretty much takes care of the rest. When you create a client side certificate click advanced on the CA request and use the CSP (cryptographic Service Provider) for the TPM. If you select that the keys are not migratable, then the secret key will never leave the chip. Once this is done you have authentication keys on the TPM that can be used for many network purposes. This will dramatically reduce the attack vectors on authentication.
P.S. this only works if you turned your TPM on in bios.
Only by machines with Seagate Drives
Read as much as you can on Intel’s VPRO and *T technologies. This is how we will create secure processing in the future.
Security takes hardware- It worked for cellphones, set top boxes, garage doors, ….. No it’s time for you to use it on your PC.
To ultimately thwart DRAM all memory must be encrypted all of the time. This is no different then all network traffic must be encrypted.
Steven Sprague
CEO Wave Systems Corp.
From: fde-bounces@www.xml-dev.com [<a href="mailto:fde-bounces@www.xml-dev.com" target="_blank"mailto:fde-bounces@www.xml-dev.com</a] On Behalf Of Garrett M. Groff
Sent: Saturday, March 01, 2008 12:14 AM
To: fde@www.xml-dev.com
Subject: Re: [FDE] DRAM attack - not thwarted at all by Seagate'sdriveCORRECTION the data on the HDD IS Protected!!!
I concede your points. My frustration is not with Secude's hardware+software solution specifically. In fact, I think hardware-based encryption (like the Momentus drive) is the way to go in the long haul (hardware+software attacks are typically more difficult than software-only attacks). Just a bit frustrated that I can't sleep as easy at night knowing that the "theoretical" RAM analysis technique will (soon?) be used by more than a group of researchers at Princeton, realistically.
- Garrett
----- Original Message -----
From: Larry Massey
To: fde@www.xml-dev.com
Sent: Friday, February 29, 2008 3:30 PM
Subject: Re: [FDE] DRAM attack - not thwarted at all by Seagate's driveCORRECTION the data on the HDD IS Protected!!!
Garrett:
Glad you “conveniently” received that email…J
Yes, you may be a bit too picky.
Our solution is to solve a Data At Rest problem that in pure Software Laptop Encryption products is broken by exposing the encryption key residing in PC DRAM and NOT to solve the problem of securing the contents of DRAM which would a different data exposure problem, of course.
We make no claim to solve the problem of data exposed in DRAM, simply to not put data in DRAM at a point in time that it could be exposed and used to defeat HDD on board encryption technology. You may want to spend some time learning more about the Seagate drive, as it is quite an interesting and secure technology.
If any of you will be attending the Data Protection Summit in LA next month, we will have a presentation on this specific topic (again DAR only), I will also be attending and would love to meet any members of this very enjoyable although overly cloaked group on this blog. Maybe we can even get together for a dinner one evening. I am sure that some of this blogs under cover vendors might even be willing to foot the bill.
Regards,
Larry
___________________________________________________
Larry Massey
President
SECUDE IT Security, LLC
380 Sundown Drive
Dawsonville, GA 30534 USA
Tel : +1 706 216 8609
Fax: +1 706 216 4696
Mobile : +1 706 215 3854
larry.massey@usa.secude.com
www.secude.com
From: fde-bounces@www.xml-dev.com [<a href="mailto:fde-bounces@www.xml-dev.com" target="_blank"mailto:fde-bounces@www.xml-dev.com</a] On Behalf Of Garrett M. Groff
Sent: Friday, February 29, 2008 2:07 PM
To: fde@www.xml-dev.com
Subject: [FDE] DRAM attack - not thwarted at all by Seagate's drive
I conveniently got an email from Secude in my inbox. One of the closing paras had the following:
As you continue your investigation of disk-encryption technologies, I invite you to contact us to learn more about our partnership with Seagate and other hard drive manufacturers and how we eliminate the types of vulnerabilities found in DRAM attacks. By encrypting data at the drive level, we are able to offer you the highest level of protection.
Of course, that's not true at all. The vulnerability of data residing in DRAM still exists. That will be the case until we get "secure RAM," or something along those lines.
However, it is true that the particular attack involving reading the FDE key directly from RAM is defeated since that key is never written to RAM.
Maybe I'm being too picky here, but looking ahead, this technique could be used to read information from any application that happens to be open at the moment using software that looks for juicy keywords (like "confidential" or "password"). Doesn't that seem like the next logical threat once the "low-hanging fruit" (such as it is) of cold-boot key discovery is patched? I mean, how long are we going to have secure disks with wide-open RAM chips?
- Garrett
cooler
Another article at computerworld. Steven Sprague again quoted.
http://www.computerworld.com.au/index.php/id;2097600156;fp;4;fpid;1968336438
Disk encryption easily cracked, researchers find
New findings reveal disk encryption technology used to secure the data in your Windows, Apple and Linux laptops can be easily circumvented
Network World staff (Network World) 26/02/2008 09:51:56
[Several paragraphs down in the article]
The Princeton findings prompted Steven Sprague, CEO of Wave Systems, which makes management software for hardware security devices, to point out that such attacks on laptops would be preventable via hardware-based encryption offerings.
"The advantage of hardware-based encryption is that all the encryption, key management and access control all happen inside the chip so there is no software risk to reverse engineer the encryption silicon," Sprague said. The encryption key never leaves the hardware-based encryption disk in this case, he said.
cooler
JKIRK57, nice read just before I settle down for the night. I had my wife go over it and it made sense to her and she doesn't have a tech bone in her (on the re-read that doesn't sound too good -- but you know what I mean!).
cooler
JKIRK57, Thanks for the link. Here's a link at this site to their publication detailing their method
http://citp.princeton.edu.nyud.net/pub/coldboot.pdf
cooler
i think that the Google news is VERY germane to my investment in Wave. WHAT HAPPENS IN THE EVoLUTION OF MEDICAL RECORDS electronic storage and retention, with it's attendant data privacy issues, directly affects Wave's long-term success!
I too strongly concur with your assessment. Where my wife is a doctor, they recently switched over to electronic documentation. Security was and still is an on going issue at her company which has over well over 5000 clinicians.
cooler
Snack, can you tell us how this news may relate to Wave DD?
Thanks
TCO
For example,
http://investorshub.advfn.com/boards/read_msg.asp?message_id=27020122
cooler
Digital Healthcare
Debate Persists Over What’s the Right Safeguard Strategy
http://www.digitalhcp.com/DigitalHealthCare_Article.aspx?id=72284
By Neil Versel
Feb. 19, 2008 | Recent laptop thefts from Fallon Community Health Plan in Worcester, Mass., and from Horizon Blue Cross and Blue Shield of New Jersey have focused attention anew on the issue of data security in health care.
In this age of identity theft, “I’ve actually heard health care systems referred to as one-stop shopping,” says John Carmichael, a security trainer at Security Innovation, Wilmington, Mass. Health records often contain individuals’ names, addresses, phone numbers, Social Security numbers, and payment information — exactly the kinds of data criminals want.
Both Fallon and Horizon say they are not aware of any records being compromised from the incidents, and an e-mailed statement from Horizon indicates that a security feature on the stolen laptop automatically destroyed all of the computer’s data on Jan. 23, 18 days after the theft.
Still, it has been costly. Horizon is offering a year of free credit monitoring for the 300,000 members whose information was on the pilfered machine and Fallon is doing the same thing for the 30,000 Medicare Advantage and Summit ElderCare enrollees affected.
“One thing is clear: When [security breaches] happen, it’s a bad thing for the organization, in terms of bad publicity and in terms of cost,” says John Petze, president and chief executive of Charlottesville, Va.-based biometric device and software-maker Privaris. “It’s clear that it’s going to cost a lot of money even if none of the data is ever compromised.”
Audits, contacting people whose information may have been stolen, credit monitoring, and sometimes legal defense efforts all factor into the cost, according to Petze. According to a 2007 study from Ponemon Institute (Traverse City, Mich.), the average cost of a data breach to the affected company is $197 per customer record — with an average total cost of $6.3 million among the 35 U.S. companies reporting an incident. The majority of the cost was in the form of lost opportunities and brand damage.
About 40 percent of reported incidents originated with contractors, consultants, or other external entities—up from 29 percent a year earlier. Breaches by third parties were more costly than internal data loss, at $231 per record, vs. $171.
“There’s just a panoply of different things that can happen,” from the bad press to loss of customers to extra expenses, not to mention the threat of lawsuits, says Rich Temple, vice president of information technology and chief information officer for Saint Clare’s Health System, a three-hospital organization in Denville, N.J.,
That state has had two well-publicized incidents of late. In addition to the Horizon laptop theft, several dozen employees of Palisades Medical Center in North Bergen, N.J., were suspended after allegedly taking unauthorized peeks at the electronic medical records of actor George Clooney, who was treated there following a motorcycle accident last fall. “I thought that was an appropriate response,” Temple says of the suspensions.
In Fallon’s case, the stolen machine belonged to an outside consultant. “It’s our understanding that it did not have any protection on it, which is against our policy,” according to Jeannette Frey, privacy officer for Fallon Community Health Plan.
Not surprisingly, and critics say too slowly, health care organizations nationwide are taking a closer look at their security plans and making efforts to plug potential security holes.
Right now, Saint Clare’s is taking bids on hard-drive encryption. “We’re going to have that in a matter of weeks,” reports Temple, who adds that the IT department is contemplating blocking certain types of files from being copied to USB drives to prevent sensitive data from leaving the premises.
Those in the security community recommend taking multiple precautions against data loss, but opinions wary widely on which technologies are most effective. Some love biometrics, others think encrypted hard drives are the way to go, and there is a healthy debate over whether to protect computers at the hardware or software levels.
Remember in the mid-1990s when cell-phone users had to enter a PIN to place a call as a precaution against phone hacking?
“The software security solution has failed,” contends Steven Sprague, CEO of Wave Systems, a Lee, Mass.-based maker of hardware security devices. “It failed in the cable [TV] industry, it failed in the cell-phone industry, and it’s failed in the PC industry,” Sprague says.
“The reasons we like our cell phones and BlackBerrys are that there is hardware security.” He says PC makers are moving that way too.
With software security, “You’re basically strapping the armor on after you bought the car,” Sprague argues. It also takes a lot of time to encrypt a drive with software, and smaller organizations may feel a productivity hit.
Seagate Technology is the first major manufacturer to offer encrypted hard drives, with a hardware-based platform called DriveTrust that adds about $60 to $140 to the cost of a new computer. “It’s by far the easiest solution to the ‘I lost my laptop’ problem,” Sprague says.
“Anyone in health care who’s looking at a laptop or, later this year, a desktop PC, should ask for an encrypted hard drive,” Sprague says. It requires a password or a fingerprint to unlock the drive. “If you don’t have the right password, it’s a brick.”
Privaris is more bullish about identity verification at the point of access, with “personal biometrics,” in the form of portable fingerprint readers. Individuals carry the reading device with them — usually a key fob — so it doesn’t have to be wired into a wall or built into a keyboard. It attaches to a computer with a USB plug or wirelessly via Bluetooth.
“Only I can make it work,” Petze says. “I’ve eliminated one of the greatest risks. The insider threat is one of the greatest risks, and the mode is sharing.” He says it also eliminates the need for users to remember multiple passwords.
For his part, Carmichael much prefers hard-drive encryption to biometric authentication. The security trainer says many commercially available fingerprint readers fail the “gummi bear test”: Thieves can press a gummi bear against the reader to lift a user’s fingerprint, and typical readers are not accurate enough to distinguish between the lifted print and the real thing, leading to a serious conundrum for an IT department.
“If my credentials are compromised, you have to revoke the credentials,” he says. Passwords are easy to change. “I can’t change my fingerprints.”
Of course, there is also the perpetual threat of laziness. “Flip over mouse pads and keyboards,” Carmichael says. “How many passwords will you find?”
Evanston-Northwestern Healthcare, a three-hospital system based in Evanston, Ill., prohibits users from writing their passwords near workstations. “We check physical workstations and look for that from time to time,” says CIO Thomas Smith.
Indeed, Carmichael and others believe staff training must be part of any strong security program. “Not everyone is going to realize the sensitivity of the data,” Carmichael says. IT departments need to make sure all users understand organizational policies and procedures, including HIPAA requirements.
“It’s worth being paranoid about,” Temple adds. “A little bit of investment can go a long way later.”
[Apologies if this link was already posted]
cooler
wavedoctor,
Here's are numbers that I have posted in the past based on info secured from the nasdaq site. We broke 16% somewhere between Jan 23 and February 20 of this year.
15.99% on Jan 23, 2008
14.68% on February 20, 2008
15.95% on August 14, 2007
12% on August 10, 2007
9.26% on July 20, 2007
8.89% on July 11, 2007
http://investorshub.advfn.com/boards/read_msg.asp?message_id=26195135
http://investorshub.advfn.com/boards/read_msg.asp?message_id=22074555
cooler
New STATS at nasdaq site.
Institutional Ownership: 14.68%
Ownership Analysis # Of Holders Shares
Total Shares Held: 38 7,281,986
New Positions: 3 64,319
Increased Positions: 8 155,125
Decreased Positions: 10 4,691,355
Holders With Activity: 18 4,846,480
Sold Out Positions: 7 4,503,684)
Wave Systems Corp. (WAVX) Corporate Event Announcement Notice
Friday, February 15, 2008; Posted: 09:32 PM
Feb 15, 2008 (Wall Street Horizon via COMTEX) -- WAVX | news | PowerRating | PR Charts -- Wave Systems Corp. (WAVX)
Expected next earnings release: Announcement date: 3/12/2008 - After Market Earnings Quarter: Q4 Announcement Status: Unconfirmed
http://www.tradingmarkets.com/.site/news/Stock%20News/1104892/
cooler
Pav, I somewhat understand. I've only been invested in wavx for 15 months or so and not once have I broken down and shared this stock's potential with fellow workers, relatives, neighbors, friends or foes for that matter. It's been very difficult but I have managed to hold my tongue. I'm not sure how much longer I can hold out!
cooler
Commissions-
Wow, $10 commissions for all day trades -- that's impressive. At BAIS (Banc of America Invest services) I pay $7 per trade.
cooler
New STATS at nasdaq site.
Institutional Ownership: 15.46%
Ownership Analysis # Of Holders Shares
Total Shares Held: 39 7,670,553
New Positions: 3 64,319
Increased Positions: 9 131,329
Decreased Positions: 11 4,701,890
Holders With Activity: 20 4,833,219
Sold Out Positions: 7 4,503,684
SECURITY, SURVEILLANCE & SURVIVAL
14th February 2008, 09:36 GMT
http://news.softpedia.com/news/Intel-Plans-on-Shipping-Hardware-Security-Enabled-Chipsets-78710.shtml
http://news.softpedia.com/cat/Gadgets/Security-Surveillance-and-Survival/index.shtml
Intel Plans on Shipping Hardware Security-Enabled Chipsets
- Because hardware devices are much more reliable than software applications
By: Bogdan Botezatu, Hardware Editor
Infineon's TPM chip
Enlarge picture
Hardware-enabled security devices are quite storming the IT industry fronts lately. Ranging from miscellaneous biometric security devices (such as fingerprint readers or iris scanners) to hardware-based firewall
solutions, they offer much better protection than any software-based equivalent on the market.
Lenovo was one of the first computer vendors to include them in its own computing products back in 2003. Two years later, HP and Dell joined the club and started delivering their own hardware security-enabled workstations. Mac systems are also making heavy use of them, despite their being "different" than the mainstream computers.
According to Steven Sprague, CEO of Wave Systems Corporation, more than 150 million PCs and laptops come rigged with the Trusted Platform Module (TPM) microprocessor, a hardware device that is used to store data encryption keys that represent the central piece of an informational puzzle stored on the computer's hard-drive. Shortly put, the chip is a keyring that stores the data encryption keys. Without the right key, the stored information represent nothing more that an useless pile of bytes. The chip also provides authentication services for users.
Intel plans on shipping the Trusted Platform Module as a core part of its upcoming chipsets, starting from the second quarter of the year. The TPM system is already a strong presence on the market and Sprague claims that "there's no excuse any more for organizations to overlook it." The largest obstacle in the implementation of hardware security solutions is the corporate IT department, that is less aware of the benefits hardware security can bring to computing.
The most important argument for using hardware protection systems is the fact that hardware cannot be hacked in. No matter how skilled, malware writers won't be able to fake a legit user. The hardware system is simple: either you physically type the password, or you are held at the computer's "gates". The IT industry could take significant advantage in using the TPM chips.
Looks like you're not the only one. Here's the last 8 minutes:
1.6798 1000 NDD 15:59:22
1.67 400 NGS 15:58:13
1.67 400 NGS 15:57:42
1.6799 3025 NDD 15:55:29
1.6799 154 NDD 15:55:10
1.68 5700 NDD 15:52:26
1.68 9700 NGS 15:52:25
1.68 200 NGS 15:52:25
1.68 100 NGS 15:52:25
1.68 300 NGS 15:52:25
Title: Senior Product Manager - Enterprise Server Software Specialty
Skills: software security technology, sales support, business development, marketing
Date: 2-6-2008
Location: Cupertino, CA
Area code: 408
Tax term: FULLTIME
Length: Full time
Dice ID: WAVESYS
Job description: Wave Systems Corp. is an equal opportunity employer.
Job description: We currently have an opening for a Senior Product Manager- Enterprise Server Software Specialty, located at our office inCupertino, CA. This position is responsible for activities associated with the development and marketing of new products and services with a focus on enterprise management of trusted platforms. Activities include developing marketing requirements documents, managing engineering project deliverables, SOWs, PRDs, MRDs, marketing brochures, whitepapers, competitive analyses, presentations and the like to establish, enhance or distinguish product placement within the competitive arena. This position performs market research, monitors competitive activity and identifies customer needs, implementing product specifications and deliverables to the sales team. This position interfaces heavily with Engineering, Technology Partners, Sales, Marketing and partners/customers and, at times, performs product demonstrations and training.
To perform this job successfully, an individual must meet the following minimum qualifications:
- Six or more years of experience in product management and marketing or related field with the proven ability to develop quality products on time
- Four or more years of experience with the high technology industry, specifically enterprise client management
- Understanding of the product lifecycle and engineering lifecycle processes
- Knowledge of technical softwaredevelopment is required for collaboration with engineering throughout the product lifecycle
Proven ability to lead cross-functional teams in a matrix management style
- Proven capability in creating and delivering business presentations
- A Bachelor's degree is required (preferably technical)
The following qualifications are not required, but will be instrumental in evaluating a candidate for this position:
- Knowledge or experience with software security technology
Sales support, business development, marketing, or software engineering experience
- Industry experience in finance, healthcare, government, or other major industry
- An MBA degree
Personal Profile:
- Excellent verbal and written communication skills
- Customer service orientation
- Strong technical aptitude and ability to grasp technical concepts quickly
- Excellent organizational skills
- Solid business sense combined with ability to think strategically and execute tactically
- Good coaching and counseling skills
- Ability to develop organizational talents
- Ability to work as part of a team or independently, whichever the situation requires
- Proven self-starter, who takes the initiative to solve problems and execute tasks
Travel required:
25%
Telecommute:
no
http://seeker.dice.com/jobsearch/servlet/JobSearch?op=101&dockey=xml/4/8/4804e5eb15e626114d5a3311eada7ed7@endecaindex&c=1&source=2021
Still haven't filled this position? or is this a new one? Apologies if this was already posted.
cooler
Employee Count
According to wave's site they currently have 110 employees. Does anyone have the historical number count of employees for the last ten years?
cooler
Chemical & Engineering News (Jan. 21 issue) for the third week in a row sports "The World's Most Secure Notebook" ad, however this time it is on the first page opposing the table of contents. Greater visibility and higher probability that readers will cross this page.
cooler
Institutional ownership updated at nasdaq site. Moved down a freckle to 15.99%. I wonder how current this info is? If the info is current then this is good news when one considers the recent market environment. JMHO
cooler
Stoc
My wife was impressed after seeing the Wave software on the D820. She's seen the Wave System ads but seeing it installed on her computer was the tipping point. She is now comfortable with our investment in wavx. The best purchase I've ever made!
cooler
Intel, AMD Don't See Demand Falling Off Cliff
http://www.tmcnet.com/usubmit/2008/01/22/3222589.htm
ETS version 2.0.0.39
cooler
Embassy security center came installed on my Latitude D820. I ordered it last Monday and it arrived today. I didn't expect to see Wave's software since I order it through the Dell small business devision. In the program folder is a "Security by Wave Systems" folder. In this folder are
1) Advanced Folder
2) Embassy Security Center
3) Embassy Security Center Help
4) Getting Started with Embassy Trust Suite
5)Security Setup Wizard
I don't have an FDE.2 drive or the biometric fingerprint reader -- however, wave is installed! cool.
When I call up the Embassy Security Center, a window boots up with the Dell logo in large at the top of the window next to the "Embassy Security Center" title! I was able to set my system password and hard drive password. The software look really sharp! Still playing around with it.
cooler
my luck, I ordered a D820 for my wife last Monday. Too late to upgrade to the D830, it shipped on Friday.
cooler
And again another spotting of "The World Most Secure Notebook" ad full page front inside cover of Chemical and Engineering News, Jan. 14th issue. It cost $14,040 to run this full page ad which reaches out to chemical industry and academics.
cooler
Another spotting of "The World Most Secure Notebook" ad full page front inside cover of Chemical and Engineering News magazine, Jan. 7th issue.
cooler
Another spotting of "The World Most Secure Notebook" ad full page front inside cover of Chemical and Engineering News magazine, Jan. 7th issue.
cooler
Elmer,
Better make that an extra large! I hear there is going to be a lot of dancing especially during the questioning session at the end of the cc.
cooler
The popcorn isn't ready yet. I want to wait till the CC so it'll be nice and hot!
njoy the fruits of your employer's combative pricing policy, after all it's the one ALL you guys favored, kill AMD and worry about the share price later
"Kill" is not a nice word. "Quell" is more appropriate with "extinguish" as near future possibility.
cooler
Business Users Get Into the Vista Adoption Curve
http://www.pcworld.com/businesscenter/article/141396/business_users_get_into_the_vista_adoption_curve.html
cooler
picked up 500 shares at $19.42
cooler
Kiwitaxi
I owe you an apology. I took your message as being rhetorical, however, after rereading it clearly I was wrong.
cooler
Were you expecting 1 million volume today? The way you phrased this sounded to me as if you might have been expecting this. Anything happening?
Why did you wait to ask this near the end of the trading day? Hedging?
Based on recent trades in the past several week a 1 million day in not highly unlikely.
cooler
Another Dell support page regarding ETS:
http://support.dell.com/support/topics/global.aspx/support/dsn/en/document?c=us&cs=19&dl=false&l=en&s=dhs&docid=275769E468C7694AE040A68F5B28690F&doclang=en
Uninstall EMBASSY® Trust Suite Before Running the Microsoft® Windows Vista® Express Upgrade
Journal ID: 080129R2TB
Article ID: 315139
Date Published: 1/10/2008
Last Revised: 1/10/2008
Dell recommends that you uninstall EMBASSY® Trust Suite before upgrading to Microsoft® Windows Vista®. Once you upgrade to Windows Vista®, then you can download and install the latest version of Trust Suite.
The EMBASSY Trust Suite by Wave Systems is a collection of practical, easy-to-use applications that support several security hardware components including Dell's integrated Smart Card readers, Trusted Platform Modules (TPM) and biometric readers offered on select models.
cooler
Sure looks like dell/wave are keeping on top of things regarding support for ETS!
http://support.dell.com/support/topics/global.aspx/support/dsn/en/document?c=us&cs=19&dl=false&l=en&s=dhs&docid=2196C56F0EBB9E61E0401E0A55175F32&doclang=en#1
Journal ID: 080129R2TB
Article ID: 312611
Date Published: 1/3/2008
Last Revised: 1/3/2008
After Installing Microsoft Internet Explorer Version 7.x, Wave Embassy Trust Suite will hang when trying to load at its splash screen (Figure 1).
This error occurs on Wave Embassy Trust Suite versions released before version A09.
Download and Install the Latest Version of the Wave Embassy Trust Suite . . .
cooler
Weby/Lincoln, fantastic! At the dinner table tonight I'm going to pull out the Wall Street Journal with the ad eclipsing my wife's face -- "hmmm I wonder what is in the news today..."
cooler
Oh, I know. I just bought a whole bunch more under 23. Had to sell other stuff. But I think the market is wildly wrong on this drop.</I>
I am with you on this one. I sold my entire position back in August at $23.74 only to watch intc go up to $28. I just got back in today at $22.50
Regardless which way it goes, I feel very comfortable at this price. Time will tell.
cooler
bf
It's amazing what happens you open your eyes (and "see" what you are seeing). Back in the 70's I worked at Disneyland as a sweeper. I cannot tell you how many times someone would ask me where the bathroom was only to find themselves standing right in front of it. LOL
Interesting to note that the after hour quotes from the above link do not match those at the nasdaq. I must be having seeing issues again.
cooler
wavedoctor, go to www.nasdaq.com and follow "after hours quotes" link in column on the right side of the page (see link below)
http://www.nasdaq.com/aspxcontent/ExtendedTradingTrades.aspx?mode=frameset&kind=&symbol=wavx&symbol=&symbol=&symbol=&symbol=&symbol=&symbol=&symbol=&symbol=&symbol=&selected=wavx&FormType=&mkttype=AFTER&pathname=&page=afterhours
Nice to finally see some after hour activity today
17:09, $1.60 1,406
16:09, $1.5722 2,800
16:04, $1.56 200
16:04, $1.55 594
Augmentix, XTG630 Fully Rugged Notebook notebook which is loaded with Embassy Trust Suite has forty different configurations at the Dell site.
http://search.dell.com/results.aspx?s=gen&c=us&l=en&cs=&k=Augmentix&cat=prod
Putting this together with the following facts (which have been posted here by others) demonstrates the potential for wave systems.
* * * * * *
"Augmentix solutions are ruggedized to meet Military Standards (MIL-STD-810F) for reliable operation in the harshest environments."
AND
"Select Augmentix products are available through the United States General Services Administration (GSA). The GSA catalog can be accessed online through www.gsaadvantage.gov."
http://www.augmentix.com/
* * * * * *
August 20, 2007 - Augmentix Redefines Fully-Rugged Computing with New XTG630 Notebook
...
Key Product features of the XTG630 include:
...
* Maximized security to protect the system, secure data and prevent unauthorized access: SmartSecurity Suite with Multi-Factor Authentication including integrated smart card reader, biometrics fingerprint reader and multi-level password. Trusted Platform Module (TPM) 1.2 secure microcontroller provides added cryptographic functionality and Wave Embassy® Trust Suite by Wave Systems provides robust security software.
...
http://www.augmentix.com/about/press_070820
* * * * * * *
Finding New Channels With Dell
Perhaps the most original use of Dell (NSDQ:Dell) as a channel is from systems builder Augmentix. True to its name, the Houston-based company uses off-the-shelf Dell PowerEdge servers as its supply source for building custom, high-reliability systems for its telecom and military customers. Many of its servers are found in lights-out data centers or on-board nuclear submarines, where environmental conditions are challenging and downtime isn't tolerated. Until now, vendors in this space have built very specialized systems that have cost tens of thousands of dollars, using custom components and management services to enable remote reboots and other services.
Augmentix has a different strategy. It literally takes Dell's servers apart, then adds its own components, sheet metal cabinetry and specialized management components. From there, it sells the resulting hybrid server as its own for about $25,000. (Augmentix's initial product is based on a Dell PowerEdge 1750.) Its customized gear and applications monitor the status of a server and can detect when an application fails, if an operating system is hung or if a system is heating up beyond certain levels because of adverse environmental conditions. ...
http://www.crn.com/white-box/22102786
* * * * * * * * * *
I know this has been brought up before (I am unable to search this BB) but thought it was worth rementioning.
cooler