Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Tsunami07.
Dell Medical records. Nice article, ties in with this:
Posted by: Countryboy Date: Sunday, January 17, 2010 8:22:04 PM
HIMSS10: Pavilion Product Sessions by Wave Systems Corp.
Looks like Wave will be presenting in the Dell Perot Systems booth as well.
Built-in Security Ensures Compliance
Monday, March 01, 2010
1:30 PM - 2:15 PM
Room/Booth #3348 Electronic Health Record/Electronic Medical Record
Abstract: Safe guarding electronic health and medical records is the cornerstone of HIPAA data protection regulations. Did you know that leading computer brands now come with hardware-based multi-factor authentication and full disk encryption built-in? Come learn more about these exciting new technologies that everyone is talking about.
HIMSS10: Pavilion Product Sessions by Dell Perot Systems
Comprehensive EHR Solutions for Physician Groups and Hospitals.
Wednesday, March 03, 2010
3:15 PM - 4:00 PM
Electronic Health Record/Electronic Medical Record , Room/Booth #3348
Abstract: The advantages of a comprehensive EHR solution are numerous, however the complexities and implementation costs are challenging for most healthcare providers. Attend a discussion of solutions to help providers meet the myriad of new regulatory guidelines, take advantage of significant incentives, and deal with financial and operational ramifications.
Primary Presenter: Roger Davis
Physician Services
Dell Perot Systems
Roger Davis’s Experience
Vice President
Dell
(Information Technology and Services industry)
2009 — Present (1 year )
Senior VP - Physician Services
Perot Systems
(Public Company; PER; Information Technology and Services industry)
December 2008 — Present (1 year 2 months)
Working within the Perot Systems Healthcare organization, I am responsible for a portfolio of physician IT and services solutions.
http://www.linkedin.com/pub/roger-davis/5/705/63
L-3 Communications.
Another customer on the slide>
Welcome from the Chairman, President and Chief Executive Officer -Michael T. Strianese
I would like to take this opportunity to thank you for your interest in L-3 and I invite you to take a look at the contents of our website for any information you may need in understanding our company.
L-3 Communications has grown very quickly into the sixth largest defense company in the United States, and is a leader and prime defense contractor in Intelligence, Surveillance and Reconnaissance (ISR), secure communications, government services, training and simulation and aircraft modernization and maintenance. The company also is a leading merchant supplier of guidance and navigation products and systems, sensors, scanners, fuzes, data links, propulsion systems, avionics, electro optics, satellite communications, electrical power equipment, encryption products, signal intelligence, antennas and microwave products.
In homeland security, L-3 has leadership products in aviation, port, maritime and cargo security as well as solutions for mass transportation. In addition, L-3 offers other key homeland security products and services for crisis management, intrusion detection, law enforcement and vehicles for first responders. On our website, you will find materials on our products and services and the divisions that have produced them. You will also be able to access corporate and financial information as well as our annual reports. All in all, we have put together a wealth of information on the company that may be of interest to you. Our hope is that this site offers you the information you need for a comprehensive and detailed look at what we believe is one of the great defense companies in the United States.
Customers.
Also, has logo's for Dick's Sports and Boston Medical Center.
HIMSS10: Pavilion Product Sessions by Wave Systems Corp.
Looks like Wave will be presenting in the Dell Perot Systems booth as well.
Built-in Security Ensures Compliance
Monday, March 01, 2010
1:30 PM - 2:15 PM
Room/Booth #3348 Electronic Health Record/Electronic Medical Record
Abstract: Safe guarding electronic health and medical records is the cornerstone of HIPAA data protection regulations. Did you know that leading computer brands now come with hardware-based multi-factor authentication and full disk encryption built-in? Come learn more about these exciting new technologies that everyone is talking about.
HIMSS10: Pavilion Product Sessions by Dell Perot Systems
Comprehensive EHR Solutions for Physician Groups and Hospitals.
Wednesday, March 03, 2010
3:15 PM - 4:00 PM
Electronic Health Record/Electronic Medical Record , Room/Booth #3348
Abstract: The advantages of a comprehensive EHR solution are numerous, however the complexities and implementation costs are challenging for most healthcare providers. Attend a discussion of solutions to help providers meet the myriad of new regulatory guidelines, take advantage of significant incentives, and deal with financial and operational ramifications.
Primary Presenter: Roger Davis
Physician Services
Dell Perot Systems
Roger Davis’s Experience
Vice President
Dell
(Information Technology and Services industry)
2009 — Present (1 year )
Senior VP - Physician Services
Perot Systems
(Public Company; PER; Information Technology and Services industry)
December 2008 — Present (1 year 2 months)
Working within the Perot Systems Healthcare organization, I am responsible for a portfolio of physician IT and services solutions.
http://www.linkedin.com/pub/roger-davis/5/705/63
HIMSS 2010 — Atlanta, GA
Site states that this is the first time Wave is presenting at this show. Wave list both HP and DELL as business partners. Looks like Wave has their own booth #8854.
Wave Systems Corp. Booth #8854
March 1-4, 2010
http://www.wave.com/news/tradeshows.asp
Wave Systems Corp. (NASDAQ: WAVX) is a leading provider of client and server software for hardware-based digital security, which enables organizations to know who is connecting to their IT infrastructure, protect corporate data and strengthen the boundaries of their networks. Waves core products manage the Trusted Platform Module (TPM), a security chip that is included as standard equipment on most enterprise-class PCs and has shipped on an estimated 300 million PCs to date. Wave also offers management capabilities for the new generation of self-encrypting hard drives from Seagate, Samsung, Hitachi and Toshiba, enabling pre-boot access control, password management and secure erase. For a distributed network of self-encrypting drives, Wave's EMBASSY Remote Administration Server provides robust policy management of users, credentials and access rights from a central location.
HIMSS10 Contact: Mr. Spencer CobbProduct/Service Categories
Electronic Medical Records
Business Partners
Dell
HP
HP/Wave Systems.
Wave hired a HP Director of Sales in September 2009. Also, an Enterprise Sale Manager in October 2009. Both came from Absolute Software.
Andrew Avery - HP Director of Sales - Wave Systems
(Public Company; WAVX; Computer Software industry)
September 2009 — Present (5 months)
Experience (partial)
Director, Business / Channel Development
Absolute Software
(Public Company; TSX:ABT; Computer Software industry)
January 2006 — February 2009 (3 years 2 months)
Responsible for the development, management, and expansion of the Hewlett Packard, Verizon Wireless, CDW, and Qualcomm strategic partnerships .
• Diversified distribution networks by establishing relationships with national and international business units within each partner.
• Achieved 103% YOY revenue growth each year from 2006-2009.
• Direct a department of four Channel Development Managers with focus on product diversity, revenue growth and strategic positioning.
• Channel Development Manager Of The Year-2007
http://www.linkedin.com/in/amavery
Jeff Walker - Enterprise Sales Manager - Wave Systems
(Public Company; WAVX; Computer Software industry)
October 2009 — Present (4 months)
Wave Systems helps organizations better protect information by managing hardware-based data encryption.
Experience (Partial)
Account Director
Absolute Software
(Public Company; 51-200 employees; TSX:ABT; Computer Software industry)
August 2006 — October 2009 (3 years 3 months)
http://www.linkedin.com/pub/jeff-walker/7/163/129
Absolute stock jumps on software deal with HP
Wed Jul 11, 2007
Wave, Eskimos and the Goverment.
AFCEA West 2010 — San Diego, CA
Wave Systems Corp. to partner with TKC Integration Services Booth #1803
February 2-4, 2010
http://www.wave.com/news/tradeshows.asp
TechNet Asia Pacific November 2-9 2009
TKC Integration Services, LLC Booth # T11
Profile:
Wave Systems, TKCIS partner and a leading provider of client and server software for hardware-based digital security, enabling organizations to know who is connecting to their critical IT infrastructure, protect corporate data, and strengthen the boundaries of their networks. Comprehensive suite of client and server tools leverage and manage these capabilities, trusted computer systems
Categories:
• Computer Hardware and Software
• Information Management, Security, Systems, Technology
• Multi-Level Security
• Network Intrusion
• Secure Solutions
http://events.jspargo.com/tnap09/public/booth.aspx?BoothID=153625
Germany, July 20 to July 31, 2009: Wave Systems/ICT and TKCIS show cases its leading edge technology of hardware based full disk encryption at seven facilities of the U.S. military in Germany to more than 1500 attendees.
Embassy Trusted Drive Manager and Embassy Remote Administration Server is the industry-leading application for management of self-encrypting hard drives.
TKCIS through its dedicated worldwide team can provide the right procurement vehicles from SEWP, SeaPort-e and GSA Schedule to maximize every organization's requirement support objectives.
http://www.ict-economic-impact.com/layer2/news%20and%20events.htm
Profile:
TKCIS, LLC is a small disadvantaged Alaska Native Corporation (ANC), providing a broad spectrum of IT enterprise products and solution services to federal government and DoD clientele worldwide. Come see the latest in unique technical product and hardware offerings from WAVE, Tipping Point, Blade Networks and MACH 1.
Categories:
• Computer Hardware and Software
• Computer Network Defense
• Information Assurance
• Network Enterprise Management
• Networks (LAN/MAN/WAN)
http://events.jspargo.com/West10/public/booth.aspx?BoothID=156013
TKC Integration Services, LLC (“TKCIS”) is a small disadvantaged, tribally owned Native American and Alaska Native Corporation. Led by a senior management team possessing an extensive background in government contracting and technology product sales, TKCIS has won over 100 Federal government contracts. Our dedicated staff includes knowledgeable sales representatives located in eight U.S. regional offices. TKCIS focuses on responsiveness as evidenced by our strategic partnerships with professional consultants, systems integrators and a wide spectrum of technology manufacturers. We have preferred distribution agreements and tailored service programs with industry leaders like Oracle, Dell, Apple and Juniper Networks. Working in conjunction with government executives, program managers and contracting officers, TKCIS helps Federal customers realize their strategic vision through efficient, timely attainment of program milestones. With a thorough understanding of IT requirements and intricacies of Federal procurement, we are a trusted advisor who will clarify investment options and help deliver the most cost effective solution. TKCIS’ SEWP IV offering includes hardware and software products that are easily coupled with supplementary implementation, training and maintenance services.
http://washingtontechnology.com/microsites/reports/sewp-contract-guide/sewp-industry-insights.aspx
Wave/Dell/ Gitex
http://www.wave.com/news/tradeshows.asp
GITEX 2009 — Dubai, United Arab Emirates
Wave Systems Corp. has a Pod in the Client Solutions section of Dell’s Booth —
Hall 3, Stand C3-2
October 18-22, 2009
Dell Middle East is making final preparations for it biggest Gitex presence yet in partnership with Intel by adding final touches to a 150 square meter stand, featuring Intel and strategic alliance partner branded areas, demonstrating its continued confidence in the U.A.E., wider Gulf region and Middle East.
This year for the first time, Dell will test its PowerEdge servers live against benchmarks that will illustrate enhanced performance, ease of management and energy efficiency of Dell's enterprise technologies.
Dell's high performance clustered computing (HPCC) offerings will be demonstrated at Dell's stand, HPC computing is credited with tackling some of the most challenging computational-intensive tasks facing large organizations, particularly the oil and gas industry in the region. By integrating the latest advances in standards-based hardware, high-speed interconnectivity and leading open source and commercial software, Dell's HPC solutions deliver results with the simplicity and value of standards-based computing.
Throughout the week, Dell will host a series of forums and roundtables that will focus on helping public and private sector customers build efficient enterprises through technologies such as virtualization, cloud computing, IT-as-a-service and software-as-a-service.
On Oct. 19, Stephen Murdoch, vice president and general manager of Dell's Large Enterprise business unit in Europe Middle East and Africa region, will also address attendees of the Gitex Technology Week conference, highlighting how IT can give organizations a competitive advantage.
John Coulston, head of marketing Dell Middle East, commented, "We have put together our most comprehensive presence at Gitex ever and look forward to meeting with our customers and partners. We're thrilled to have so many industry partners on the stand with us, showing the power and value of industry-standard products and services."
Coulston added,
"Dell subject matter experts and executives will be flying into Dubai this week to bring the full value of their experience to bear for those who are looking to optimize their IT infrastructures, particularly as budgets are tight this year. With an anticipated 2010 refresh cycle on the horizon, Gitex promises to be a week of planning and assessment and the Dell team will be on hand to help in any way we can."
Khaldoun Aboul-Saoud, Intel market development manager for the GCC commented, "The collaboration between Intel and Dell at Gitex this year brings the latest Dell innovations based on the revolutionary Intel Atom, Intel Core and Intel Xeon family of processors. Intel Core processors are the newest, smartest, and fastest processors from Intel, delivering outstanding intelligent performance. The culmination of 40 years of technology leadership."
A number of leading industry alliance partners, including EMC, VMware, Juniper Networks, Microsoft, Wave Technologies, QLogic, and SunGard Higher Education, will join Dell's stand to showcase their solutions and technologies.
Dell spreads enterprise message
Hardware giant Dell is out to make an impression on enterprise customers during GITEX Technology Week by launching a number of new high-end products and services
By ITP.net Staff Writer Published September 23, 2009
Hardware giant Dell is out to make an impression on enterprise customers during GITEX Technology Week by launching a number of new high-end products and services.Dell believes it has the technology to answer the needs of CIOs and IT managers after launching a fresh line-up of storage systems and modular services that have been designed with enterprise challenges in mind.
"The Efficient Enterprise range is one that we will be keen to showcase during the week-long event as it addresses many of the issues which we feel are most relevant today to CIOs and their teams," explains John Coulston, Head of Marketing at Dell Middle East.
"Designed to cut costs and complexity, the range offers innovative design with features created to simplify the tasks IT managers face every day," he adds.
The company will also be talking up its new modular services at the show. As with the Efficient Enterprise range, the services are geared towards simplifying IT management by enabling resources to be better spent on other, more pressing, business concerns.
"The services require little effort to set up, are easily adjustable to individual needs, and are offered through cloud computing providing greater efficiency and manageability," reveals Coulston.
Aside from showcasing its products and services to audiences at GITEX, Dell regards the exhibition as an ideal arena to build and form business relationships. It will have a number of senior executives from inside and outside the region on hand during the course of the week to meet with partners and customers.
"The Middle East is a hugely important market for Dell," insists Coulston. "Over the past decade the region has seen significant development and increasing levels of sophistication in both national and IT infrastructure, and as such it continues to hold its position as an important area of focus. Some of the issues that customers in the Middle East are grappling with now are setting the global best practice, so this is a leading market, not just a fast follower."
Seagate singles out GITEX Shopper
Storage manufacturer Seagate will have a dedicated booth of its own at GITEX Shopper for the first time this year. The stand will be focusing on Seagate consumer products, like the FreeAgent desktop and portable external drives, and will be selling direct to show visitors from the stand.
By ITP.net Staff Writer Published September 23, 2009
Storage manufacturer Seagate will have a dedicated booth of its own at GITEX Shopper for the first time this year. The stand will be focusing on Seagate consumer products, like the FreeAgent desktop and portable external drives, and will be selling direct to show visitors from the stand.
The company will also be taking part in the main GITEX event, and regards the GCC as one of its most important markets worldwide.
"The Middle East is one of the most important markets in what we call BRICME. We have been investing for the past several years in resources and special programs tailored especially to meet the requirements of the region. Moreover, Middle East market is still one of the few markets growing and it contributes around 20% of Seagate's EMEA sales," says Christian Assaf, Channel Manager for the Middle East and Africa at Seagate.
Assaf says that the company has one of the largest ranges of consumer and enterprise storage solutions available, catering to a wide range of functions.
Seagate will be meeting leading retailers, integrators and partners at the show to discuss their unique requirements, and how to best to serve them in the current economic climate. The firm will also be unveiling its new Middle East strategy at the event.
"We expect to see high volumes of channel customers attending GITEX from all over the region. We have been successful in Middle East and we aim to drive this success by penetrating new markets with our wide range of products," says Assaf.
Dell Bigger and Better for Gitex Technology Week 2009
Wednesday, October 14, 2009 6:55 AM
(Source: Middle East Company News) Dell Middle East is making final preparations for it biggest Gitex presence yet in partnership with Intel by adding final touches to a 150 square meter stand, featuring Intel and strategic alliance partner branded areas, demonstrating its continued confidence in the U.A.E., wider Gulf region and Middle East.
About DellDell Inc. (NASDAQ: DELL) listens to customers and delivers innovative technology and services they trust and value.About IntelIntel (NASDAQ: INTC), the world leader in silicon innovation, develops technologies, products and initiatives to continually advance how people work and live. Additional information about Intel is available at www.intel.com/pressroom and blogs.intel.com.
About Our Gitex Partners EMC at Gitex Through its presence on partner Dell's stand, EMC will highlight its latest technology on unified storage with its innovative CLARiiON & Celerra product ranges by showing companies in the Middle East how they can use these systems to increase the efficiency of their IT infrastructure. Storage is a key focus for EMC and customers seeking further information can visit the EMC professional team who will be on hand to demonstrate the enhancements in EMC's unified storage systems for different size organizations. EMC's team will demonstrate to visitors how to lower the cost of ownership and optimize the efficiency of their physical or virtual IT infrastructures through new technologies such as De-Duplication or through new solutions for Storage, email archiving [SourceOne] and back up [Avamar].About EMCEMC Corporation (NYSE: EMC) is the world's leading developer and provider of information infrastructure technology and solutions that enable organizations of all sizes to transform the way they compete and create value from their information. Information about EMC's products and services can be found at www.EMC.com.
About Juniper NetworksJuniper Networks, Inc. is the leader in high-performance networking. Juniper offers a high- performance network infrastructure that creates a responsive and trusted environment for accelerating the deployment of services and applications over a single network. This fuels high-performance businesses. Additional information can be found at www.juniper.net.About SunGard Higher EducationSunGard Higher Education serves colleges and universities worldwide, helping them build the resources they need to support new communities of learners. Every day customers rely on a broad portfolio of solutions and expert guidance to find better ways to teach, learn, manage and connect. To learn more, please visit www.sungardhe.com.
About Wave Systems Corp.Wave provides software to help solve critical enterprise PC security challenges such as strong authentication, data protection, network access control and the management of these enterprise functions. Wave is a pioneer in hardware-based PC security and a founding member of the Trusted Computing Group (TCG), a consortium of more than 100 companies that forged open standards for hardware security. Wave's EMBASSY(R) line of client- and server- side software leverages and manages the security functions of the TCG's industry standard hardware security chip, the Trusted Platform Module (TPM) and supports the TCG's "Opal" self-encrypting drive standard. Self-encrypting drives are a growing segment of the data protection market, offering increased security and better performance than many existing software-based encryption solutions. TPMs are included on an estimated 300m PCs and are standard equipment on many enterprise-class PCs shipping today. Using TPMs and Wave software, enterprises can substantially and cost- effectively strengthen their current security solutions.
Media Contact Information for Dell:Jordana Tasker C&W UAE +971 501594987Wael Karbala C&W UAE +971 502732766
Security Research Associates Growth Stock Conference – New York.
FWIW, Their site lists Steven Sprague.
When:
October 18/19, 2009
Sunday, October 18, 2009
6:00pm - 8:00pm preconference Cocktail Reception in the Carnegie Salon
Monday, October 19, 2009
7:30am to 5:00pm. Registration/continental breakfast begins at 7:30am
Company presentations begin at 8:00am. A buffet lunch will also be provided.
Cocktail reception begins at 5:00 pm., following the presentations.
Format:
A select group of up to 36 companies will give 25 minute presentations
(including 5 minutes of Q&A). This will be followed by a 25 minute
breakout session, and then 1-on-1 meeting opportunities.
Location:
Berkshire Place, 21 East 52nd Street, New York, New York 10022
(212) 753-5800 (www.omniberkshire.com)
To register for the conference:
Please contact Devon Wygaerts
devon@sracap.com 415-925-0346
Presentation Webcasting:
SRA has arranged for webcasting of company presentations during this
event. For the webcast lobby page please go to:
http://www.wsw.com/webcast/sra9/
Security Research Associates Growth Stock Conference – New York
Preliminary Conference Schedule
Monday, October 18/19, 2009
Presentations: Metropolitan Room Breakout: Rockefeller Room 1-on-1: Juilliard Ballroom
Time Company Ticker Presenter Title
2:30 PM Wave Systems
WAVX Steven Sprague CEO
http://www.sracap.com/events.html
Wave and Xerox Going Electronic Together.
Date: Wednesday, December 10 2008
LEE, MA -- Earlier in the year, Wave Systems here and Xerox Mortgage Services partnered to make it easy for lenders to start with electronic disclosures and move gradually toward full electronic mortgages. Now Wave has launched SmartClose to make that transition even more friction-free.
Specifically,
SureClose includes integration with MERS for electronically tracking mortgage ownership, servicing rights and electronic notary functionality for critical documents. SmartClose adds administration, notification, management and reporting tools to the application surrounding MERS transactions.
Users can pre-configure profiles to allow for the automation of transactions and notification responses. In addition, users can set up MERS profiles for themselves or delegates. The system is more than a transaction engine, it is designed to provide key reporting and auditing mechanisms on MERS history via the SmartSAFE or Web services. SmartSAFE is a Web-based e-vaulting and lifecycle management system of signed and unsigned documents.
In discussing why lenders should care about this enhancement, Kelly Purcell, executive vice president of Wave Systems' e-sign division,told NMN, "We have built a scalable MERS integration that allows forboth e-transfer and e-delivery. We can physically transfer a note from one vault to another. That's unique when it comes to the usual MERS integrations done today. This is about forming a complete e-mortgage roadmap. We're ready when the lender is ready."
Now Xerox clients can use this technology to make the step to e-mortgages. In discussing why the partnership with Wave is so significant to lenders, Greg Smith, vice president and general manager at Xerox, said, "You can't have fully developed partnerships with everyone. You have to pick a few partners that you want to hitch your boat to. We want BlitzDocs to include a number of different partners like Wave and others.
"We have always wanted BlitzDocs to offer real value once lenders turn it on, but we also wanted to provide a path to the e-mortgage aswell. What we're doing with Wave is delivering solutions with our partners and not just marketing agreements."
Xerox touts that BlitzDocs is one of the mortgage industry's most widely used solutions for electronic document collaboration helping lenders, brokers and investors manage the process needed to underwrite, audit, collaborate, deliver and archive loan documents electronically. The integration with Wave allows BlitzDocs lenders to take the next step and now go fully electronic and not just paperless.
"You have to pick trusted partners," added Ms. Purcell. "We won't integrate with everyone. Having said that, we will be bringing on several document partners, which will be a positive because Xerox doesn't provide documents. We won't limit this to an e-closing room either,it's an e-signing room where the lender and borrower can do a numberof things securely online."
"We're focused on taking our clients down an evolutionary path. They're familiar with BlitzDocs, we're now moving them to disclosures and from there we'll take them to e-closings," added Mr. Smith. "We'llcontinue to make progress around the e-mortgage in 2009. Xerox will be talking about having lenders doing e-closings on BlitzDocs in 2009for sure."
http://www.allbusiness.com/banking-finance/banking-lending-credit-services-mortgage/12110874-1.html
Would be nice to see the esign systems relationship expanded to some of ACS's lines of business.
ACS Company History
Affiliated Computer Services, Inc. (ACS) was founded by Darwin Deason in 1988. The foundation of ACS was built on Mr. Deason’s assembling a group of talented information technology professionals that shared a dedication to meeting client needs and exceeding client expectations. Initially created as a data services provider to the financial services industry, Mr. Deason led ACS’ steady and successful expansion into the communications, education, financial services, government, healthcare, insurance, manufacturing, retail, and travel and transportation industries.
ACS expanded beyond banking services when it signed a 10-year data processing outsourcing contract with Southland Corp. (7-Eleven). In 1995 ACS became a public company and divested bank data processing. By FY1996 ACS became the fourth largest commercial outsourcer in the U.S.
Today, ACS ranks #401 on the FORTUNE 500 list and employs about 74,000 people around the world who serve thousands of commercial and government clients.
Lines of Businesses
Government Solutions Group
ACS enables governments to improve operations to better serve their citizens. ACS provides flexible, reliable solutions wherever they’re needed—on highways and in hospitals, at the courthouse and the corner store, over the phone and on the Web. By working with ACS, government agencies can transform the way they serve individuals and their communities, now and in the future.
The American Recovery and Reinvestment Act signed by President Obama is the most sweeping financial legislation enacted in our nation’s history. The $787 billion stimulus package invests significantly in healthcare, transportation, and human services – areas where ACS’ expertise can be leveraged to help governments implement exciting new initiatives. ACS stands ready to help government customers respond to this rapidly changing environment and meet the challenges of transformation and economic recovery.
Medicaid
ACS provides a broad range of end-to-end healthcare administration solutions with deep subject matter expertise. In its 37 years of experience, ACS is a preferred MMIS (Medicaid Management Information Systems) provider, and has successfully developed, implemented and received Centers for Medicare & Medicaid Services Certification in 31 state Medicaid programs to date. This number continues to rise as does its experience in the healthcare sector. ACS supports the full healthcare continuum beyond member enrollment and claims processing into the realm of Total Population Health Management and eHealth solutions.
ACS creates a custom solution that provides a unique mix of services, including business process transformation, systems development and implementation, program and policy consulting, analytic and clinical consulting services, customer care operations, health information exchange solutions, and a host of other services like claims processing and mailroom operations.
Enterprise Solutions & Services Group
ACS Enterprise Solutions & Services Group (ESS) serves thousands of clients around the world in practically every major industry and represents a significant portion of its growth potential.
ESS is organized by service offerings that include Commercial Education & Financial Services, Finance and Accounting (F&A) and Human Capital Management Solutions (HCMS).
With more than 45,000 employees in more than 400 locations worldwide, ESS maximizes ACS’ BPO and ITO capabilities and delivers competitive solutions to clients in markets such as communications, education, energy, financial services, government, healthcare, insurance, manufacturing, retail, and transportation and travel.
Transportation Solutions Group
ACS' Transportation Solutions Group (TSG) offers a wide range of intelligent transportation services. Its electronic payment and toll collection services give motorists and transit users the ability to pay fees electronically without stopping. ACS also offers commercial trucking services that automate the weigh station process and give trucking companies the ability to bypass weigh stations. ACS’ motor vehicle services offer Departments of Motor Vehicles and commercial fleet owners the ability to improve processing of registrations, permits, licenses, and taxes. The transportation services also help a variety of cities manage their parking systems, implement and operate photo safety enforcement systems, and manage information and billing for emergency medical services.
ACS helps transportation system operators improve their productivity, situational awareness, and client satisfaction by delivering comprehensive, client-specific solutions based on leading-edge technologies. ACS’ efficient systems combine proven state-of-the-art technology with a wealth of experience, permanent innovation, and all-encompassing service.
Healthcare, Finance & Insurance Group
The Healthcare, Finance & Insurance Group (HFI) at ACS delivers expertise in high-volume transaction processing and customer care through a single operating group. Serving clients in most key industries, HFI has grown to represent a quarter of ACS’ revenues.
With approximately 24,000 employees in the division, 9,500 in offshore locations, our expertise has made ACS the industry’s leader in low cost, high-quality administration and customer care services for the past 30 years.
Information Technology Outsourcing
In following this approach, ACS’ Information Technology Outsourcing (ITO) group provides global service offerings that enable its clients to focus on their core competencies.
ITO specializes in designing, developing, and delivering effective IT solutions to help clients streamline their IT functions and improve their competitive position.
ACS offers a variety of services, including remote infrastructure management outsourcing (RIMO), traditional IT data center outsourcing, migration consulting expertise, SAP system migration and utility computing.
Xerox - Wave's eSign Systems.
Xerox To Buy Affiliated Computer For $6.4B
Xerox Inc. (XRX) agreed to buy business services provider Affiliated Computer Services Inc. (ACS) in a deal initially valued at $6.4 billion, as the copier company follows other tech giants in increasing its services revenue.
Xerox, Norwalk, Conn., has suffered from declining sales of copiers and printers, and the accompanying diminishing uses of ink, toner and paper. The deal for Dallas-based ACS is expected to triple Xerox's service revenue to an estimated $10 billion next year from 2008's $3.5 billion.
The move also represents the first bold move by Xerox Chief Executive Ursula Burns, who took over on July 1. Burns, who become the first African-American woman to head a Fortune 500 company, called the deal "a game-changer" for her company.
Xerox's agreement comes a week after Dell Inc. (DELL) agreed to buy information-technology service provider Perot Systems Corp. (PER) for $3.9 billion. The sector's recent merger activity - which includes Hewlett-Packard Co.'s (HPQ) purchase last year of Electronic Data Services - leaves Accenture PLC (ACN), Computer Sciences Corp. (CSC) and Unisys Corp. (UIS) as some of the larger services companies still independent.
Based on the closing prices Friday, Xerox's deal values ACS shares at $63.11 each, a 34% premium to Friday's closing price and 55 cents below the stock's all-time high set in February 2006. Holders would get $18.60 and 4.935 shares of Xerox for each ACS share. Xerox will also assume $2 billion of ACS debt and issue $300 million of convertible preferred stock.
The companies expect the cash portion to be financed with $1 billion from combined company cash and existing revolving credit agreements, along with $3 billion to be raised in the capital markets.
Xerox shares recently fell 17% to $7.44, reducing the deal's value to $55.31 an ACS share. ACS shares rose 14% to $53.60. Shares of Accenture rose 4.6% to $37.77 and Computer Sciences rose 4.6% to $53.15.
ACS' purchase prices is similar to the $6.2 billion offer made two years ago by Cerberus Capital Management. Some investors objected early to the proposal, reasoning that the board could get a more lucrative offer. But such a bid never materialized, and Cerberus pulled its offer, citing turmoil in credit markets. ACS eventually requested the resignations of five independent directors.
The combined Xerox-ACS company would have $22 billion of annual revenue, $17 billion of which coming in on a recurring basis. Up to $400 million in synergies are projected to be realized in the first three years after the deal's closing, slated for the first quarter, including $50 million to $75 million from restructuring.
Much of the cost savings will come from ACS actually performing services for Xerox that it normally provides for its other clients, executives said in a conference call Monday.
They highlighted the cross-selling opportunities and international expansion for the combined businesses as only 20% of their customers overlap.
"The lines between business process and document management are blurring," Ursula Burns, who stressed the revenue growth that could result from the combination, which is "significantly higher" than the cost savings.
ACS has a broad product pipeline that has insulated it from a broad downturn in information-technology spending, allowing the company to snap up smaller companies and hire new employees. It serves the commercial and government sectors through long-term contracts.
About a quarter of ACS' revenue comes from the healthcare sector, which includes commercial and government contracts. At an investor day earlier this month, ACS was confident that it could grow its Medicaid contracts as well as benefit from a push for more electronic health records, according to a J.P. Morgan research note.
Burns said that the healthcare presence of ACS was one of the major factors in making the deal.
Lynn Blodgett, chief executive of ACS, said the company retains a large amount of healthcare records, which can benefit from Xerox technology that helps analyze unstructured data and thus help clients move toward "outcome-based healthcare solutions."
"People in healthcare are very concerned about administrative costs...We can make that more efficient," Blodgett said.
Xerox Simplifies Loan Process with Electronic Signature; Supports Industry's Drive toward E-Mortgages
ROCHESTER, N.Y., June 12, 2008 -- In a move to help the mortgage industry process loans faster and enhance customer service, Xerox Mortgage Services has added e-signature - a secure and convenient way to complete mortgage loans without having to sign hardcopy documents. This enhancement builds upon Xerox's (NYSE: XRX) current Web-based BlitzDocs™ Collaboration Suite that uniquely supports paper, imaged and electronic loan documents.
Mortgage participants can now sign new or re-financed home loans online by simply pointing their mouse to, and clicking on, the document's signature line. Electronically signed documents are then securely managed and stored in a repository, known as an electronic vault. Audit tracking detects where the documents travel throughout the system to keep tabs on any transactions made during the loan lifecycle.
E-mortgage solutions allow mortgage lenders to turn loans around quicker with greater control, reduce printing and mailing costs, and make a positive impact on the environment.
"Mortgage lenders who embrace electronic signatures have a competitive advantage in today's complex marketplace," said Greg Smith, vice president, Xerox Mortgage Services. "Xerox's enhanced e-mortgage functions offer our customers the most comprehensive solution for paperless mortgage transactions in the industry."
Licensed through eSign Systems, a division of Wave Systems Corp. (NASDAQ: WAVX), the electronic signature capabilities will help expand the BlitzDocs' network of mortgage participants - giving users access to a larger pool of financial lending institutions and other service providers.
"For the mortgage industry to thrive it must drive down costs while improving customer service," said Jeanne Capachin, research vice president, IDC/Financial Insights. "Vendors that can arm their customers with a total package - the right combination of technology and services, will help the industry weather a challenging time."
For Dell and Perot Systems, old family friendship lead to $3.9 billion deal
Perot Systems founder expresses admiration for Michael Dell.
By Doron Levin, Connie Guglielmo
BLOOMBERG NEWS
Wednesday, September 23, 2009
SOUTHFIELD, Mich. — Ross Perot Jr. said he began talking "chairman to chairman" with Michael Dell two years ago, relying on an old family friendship, before agreeing to Dell Inc.'s $3.9 billion buyout offer for Perot Systems Corp., which was annouced Monday.
Perot and his father, company founder Ross Perot Sr., initially declined Dell's suggestion that the companies merge, Perot Jr. said in an interview. Dell, the world's second-largest maker of personal computers, and Perot Systems, a provider of computer services, seemed too different, he said.
"I went down to Austin to meet him on Saturday for breakfast a couple of years ago, thinking we were going to do some business together, and Michael broached it," said Perot Jr., chairman of the Plano-based company. "We really liked each other, but I said no. Dell is in the manufacturing business; we're in services. They're as different as football and basketball."
Perot Jr. said talks with Michael Dell, a family friend since the 1980s, "just evolved" over time. Dell convinced the Perot family that the acquisition would benefit both companies by expanding sales. Negotiations heated up in June, culminating this week in Dell's $30-a-share cash offer.
The acquisition vaults Dell into the health care information-technology business, giving the company access to customers such as hospitals and insurance companies.
The Perot family stands to make almost $400 million from the deal. About 25 percent of Perot Systems belongs to HWGA Ltd., which is the family's investment company. Perot Sr., 79, is HWGA's managing partner.
The two blocks of stock together are valued at $952 million at the $30-a-share acquisition price, which is 68 percent more than the family's $568 million stake on Sept. 18, before the deal was announced.
Perot Sr. has an estimated worth of about $5 billion and his son, 52, has a fortune of about $2.2 billion, according to Forbes magazine.
With Perot Systems, which the elder Perot founded in 1988, Dell can expand its services business and challenge IBM Corp. and Hewlett-Packard Co. The combined company stands to benefit from a U.S. economic stimulus package that will pour about $20 billion into health care information technology.
Dell and Perot Systems have been working together in the services market for the past two years. In April, they announced an alliance to create systems for health records.
"To have our company join with Michael Dell's company will make one more than twice as productive as on their own," Perot Sr. said in an interview. "Together, we have a lot more freedom and flexibility to do great work.
"I have watched Michael Dell with great admiration as Dell has grown and am absolutely comfortable as far as culture is concerned, or I wouldn't have done it," Perot Sr. said.
Perot Systems hired Goldman Sachs Group Inc. about a month ago to "give opinions and make sure best practices were observed," Perot Jr. said. Morgan Stanley advised Dell.
Once the acquisition is complete, Perot Systems will become Dell's services unit, headed by Perot's current CEO, Peter Altabef. Perot Jr. will join Dell's board.
MaynardG - Perot and Inman.
According to a book "R&D Collaboration on Trial"
Ross Perot and Bobby Inman have a personal relationship. Perot first became impressed by Admiral Inman when Perot served on the Presidential advisory committee on foregin itelligence. After Inman retired from the CIA Perot tried to hire him to succeed him as president of EDS.
http://books.google.com/books?id=wzpcOAPeabkC&pg=PA142&dq=%22Ross+perot%22+%22inman%22+mcc#v=onepage&q=%22Ross%20perot%22%20%22inman%22%20mcc&f=true
Bootkit bypasses hard disk encryption.
30 July 2009.
At the Black Hat security conference, Austrian IT security specialist Peter Kleissner presented a bootkit called Stoned which is capable of bypassing the TrueCrypt partition and system encryption. A bootkit combines a rootkit with the ability to modify a PC's Master Boot Record, enabling the malware to be activated even before the operating system is started.
Available as source code, Kleissner's bootkit can infect any currently available 32-bit variety of Windows from Windows 2000 to Windows Vista and the Windows 7 release candidate. Stoned injects itself into the Master Boot Record (MBR), a record which remains unencrypted even if the hard disk itself is fully encrypted. During startup, the BIOS first calls the bootkit, which in turn starts the TrueCrypt boot loader. Kleissner says that he neither modified any hooks, nor the boot loader, itself to bypass the TrueCrypt encryption mechanism. The bootkit rather uses a "double forward" to redirect I/O interrupt 13h, which allows it to insert itself between the Windows calls and TrueCrypt. Kleissner tailored the bootkit for TrueCrypt using the freely available TrueCrypt source code.
Once the operating system has been loaded, Stoned can get to work and install malware, such as a banking trojan, in the system. Peter Kleissner, who is only 18 years old, has also included several plug-ins, for example a boot password cracker and a routine for infecting the BIOS. The framework layout of Stoned allows other programmers to develop their own plug-ins for the bootkit. Kleissner thinks that Stoned could also be of interest to investigation agencies, for example for developing a federal trojan.
Once installed, Stoned cannot be detected with traditional anti-virus software because no modifications of Windows components take place in memory, says Kleissner. Stoned runs in parallel with the actual Windows kernel. Even an anti-virus function in the BIOS can't stop the bootkit, as modern Windows versions modify the MBR without referring to the BIOS.
However, administrator privileges or physical access to a system are required for an infection. At present, only machines running the traditional BIOS are vulnerable. The attack is unsuccessful when the BIOS successor the Extensible Firmware Interface (EFI)is at work on the motherboard. The most effective protection appears to be encrypting the entire hard disk with software that is based on the Trusted Platform Module (TPM).
For instance, using Windows' own BitLocker encryption mechanism is said to be a reliable antidote, because an infected MBR's hash value no longer corresponds to the hash value stored in the TPM, prompting the TPM to abort the boot process. Kleissner didn't have an answer to the question whether a hardware-encrypted hard disk is capable of preventing an infection.
Inman - Dell.
B.R. Inman Managing Director
Admiral Inman is one of Austin's most well-known and successful Angel investors who, throughout the past 16 years, has invested in over 30 start-up technology companies and taken an active role in their growth and development. His most noticeable successes were Dell and Oracle, where he served on their boards through their successful IPOs.
http://www.gefinorventures.com/team/brinman.html
Admiral Bobby Inman (first investor in Dell former NSA Director) http://www.lyngraft.com/?p=66
Banks and TPMs.
Hopefully the Diebold Case study will bring banks to the party.
steven sprague commented:
March 4th, 2009 at 2:43 pm
Come Join the Party.
The PC industry has taken the first step and now it is time for the banks to join the party.
The foundation of any identity is strong Authentication. Strong Authentication requires strong protection of a SECRET so that when we want to prove we are the person who was enrolled we can demonstrate we are in control of the secret. To secure the secret the best practice is to keep it in a hardware SAFE so the secret can only be used when we want it used. A SmartCard or a USB token is a good example of this type of security for authentication. The problem of course is how do we get hardware in everyone’s hands. This is where the PC industry comes in. Through the work of the Trusted Computing Group, an industry Standards body, 325 MILLION Trusted Platform Modules have been deployed world wide.
This is a hardware security chip that is on the motherboard of all business PCs and it is starting to appear in some consumer PC models as well. This chip is designed to store KEYs that are used for authentication to any and all services. As a user I can have one ID or many. The keys are held in tamper resistant hardware on the motherboard and can not be stolen by Software, Users, Viruses…. A key on a TPM can be made specific to a single user by adding a password to the TPM. This is not a password that goes over the network but is a password that will only work on that specific PC for a specific key. The password is checked by the TPM’s internal logic so that there are no risks introduced by the operating system. If the password matches then the KEY will be allowed to be used by the TPM to authenticate a USER to the service.
Most professional users or Power users that have laptops provided by their business have a TPM. This is now getting to be a big installed base even for BofA. The bank should make it possible to enroll the TPM with the existing BofA applications. This will dramatically reduce the authentication risks. BofA should use this TPM authentication in partnership with Visa 3D secure to eliminate credit card fraud for transactions that are done from the users own PC. BofA should allow federation of this credential to enable users to have secure authentication to other services as well. Finally BofA should use this Identity to enable electronic signing that will make for faster transactions with the bank and others.
The TPM does bind the user to their PC but a user can have keys on multiple computers and the user can carry device that will interoperate with the TPM technology. The point is that a single modification to the authentication systems at BofA can be compatible with hardware that 325 million users already own.
With 325 million TPMs deployed worldwide there is an opportunity to enable a worldwide brand and franchise for multifactor authentication that is a once in a market opportunity. Banks have a unique opportunity because of their bricks and mortar but it will not last for long. With myspac, facebook and google are interested in identity BofA would have to wake up and execute.
For Many TPMs are a new technology and their impact it’s not yet well understood. My company Wave Systems Corp has shipped more than 45 million copies of software to enable the TPM. It is a powerful piece of the identity puzzle and it is a global standard. As the applications take advantage of it perhaps we will be able to put the concept of a User ID and Password into the Science museum next to the floppy disk both cool technologies that are part of the history books.
Steven Sprague
CEO
Wave Systems Corp.
P.s. All internal computers at BofA have TPMs including all of their recently acquired banks as well. They will secure your VPN, Wireless, Core Network, Branch Banks……
http://futurebanking.bankofamerica.com/thinking-identity_632
Enabling Secure Identity and payments in a Mobile world
CTST 2009 New Orleans, LA
May 7-9
http://www.ctst.com/CTST09/participants.html
3:30 PM - 5:00 PM
D24: Cryptography
• The Movement Towards NSA's Suite B Cryptography
• Trusted Platform Module(TPM) in PKI and Non-PKI Environments
• Intellectual Property Issues Around ECC
• Applications Using ECC
Matt Campagna
Director, Research
Certicom
Santosh Chokhani
President
CygnaCom Solutions
Mike Epstein
Director, Standardization, Philips Intellectual Property & Standards
Philips Electronics N.A. Corp.
Steven Sprague
President & CEO
Wave Systems Corp
http://smconferences.com/CTST09/agenda.html
Obama announces e-health records for vets
The Department of Defense and the Department of Veterans Affairs are creating a joint electronic medical record system to allow the two departments to share administrative and medical information, President Obama announced Thursday.
The Joint Virtual Lifetime Electronic Record project will track soldiers' lifelong medical histories beginning the day they enter service.
"Currently there is no comprehensive system in place that allows for a streamlined transition," Obama said. "That results in extraordinary hardship for an awful lot of veterans," such as lost records or delays in processing disability claims.
The VA is currently grappling with a six-month backlog in disability claims.
"This would represent a huge step towards modernizing the way health care is delivered...for our veterans," Obama said, noting that the system would follow the "strictest and most rigorous standards of privacy and security."
The new system would also represent a shift in health care services the president has pushed for all Americans. The American Recovery and Reinvestment Act allocated about $19 billion for the digitization of medical records. Electronic medical records is a burgeoning business for technology companies as they eye the digitization requirements hospitals and doctors' offices will soon be expected to meet.
Both the VA and the DOD, it was also announced this week, will be participating in Connect, an open-source gateway between multiple federal organizations and the proposed national health information network.
Veramatrix.
Looks like software?
http://www.veramatrix.com/products/index.php
ZillionTV creates a new on-demand video option
New ad-supported service offers revenue sharing to ISP partners
ZillionTV, a new kind of on-demand video service that doesn’t require a subscription fee, is launching today, looking for ISPs who want to partner in delivering the advertising-supported video service.
ZillionTV is a partnership of major movie studios and Visa, and has assembled a team of talented individuals drawn from the technology, entertainment and finance industries to create what CEO and Founder Mitch Berman calls a new video entertainment ecosystem. The idea is to have all the content available on demand from within the network, and give consumers an option for renting, purchasing or seeing videos free with advertising chosen based on the consumers’ stated interests.
“This is a totally new ecosystem for delivering on-demand video - everything is on demand, there is no hardware purchase required, no subscription and no downloading,” Berman said in an interview. “We are real instant play with TV and quality movies delivered directly to your TV.”
The content is downloaded from a high-speed Internet connection of at least 3 megabits, which is where ISPs come in. Consumers use a ZillionTV device and a motion-sending remote control – which Berman acknowledged came from Hillcrest Labs – to access on-demand content at any time.
“We have intuitive smart technology for a VUI experience – Viewer User Interface – that has to be better,” Berman said. “We use a motion-sensing remote – think of a Wii. There are no TV channels in our universe, it’s all about content, all about destinations.”
Much of that content comes from ZillionTV’s initial partners and backers which include Disney, Fox Studios, NBC Universal, Sony Pictures Television and Warner Brothers. In addition, ZillionTV continues to negotiate with other content owners, including sports leagues and franchises, to build its on-demand library, Berman said. Veramatrix is providing the encryption, conditional access, digital watermarking and fingerprinting.
“At the end of this year, we’ll have 15,000 titles up on the service,” Berman said. “It doesn’t have everything day one. That is a nit compared to all that is really out there. If you can imagine the daunting task of going round the world, building the largest content ingest system ever built. We won’t have everything Day 1 – we’ll have a real nice subset Day One.”
Where ZillionTV breaks from all other video services is in its business model and the way it plans to use advertising.
“There are three ways a consumer can watch a program on Zillion TV.” Berman said. “They can do the same-old rent, like Netflix or Blockbuster or Apple TV, at prices from 99 cents up to $3.99; also, certain content will be available for purchase. We create a digital locker – so your content ready for you to start and stop whenever you want. There’s no recording, no hard drive, it’s all in the cloud.”
But in addition to rent and buy options, consumers can get advertising-video on demand, which Berman believes will be the biggest of the three categories. Consumers will be able to watch for free, as long as they select the ads. “And it’s a pull model not a push,” Berman said. “When you set up the service, you can choose the genre of ads or brands that matter most to you. You opt in to tell us and the more you tell us, the more personalized your service becomes. Also, the more you use the service, we are watching and collecting data on your household behavior and will send you ads based on that.”
User privacy is completely protected and no user information is collected, stored and sold, Berman stressed. By partnering with Visa, Zillion TV also is creating a platform for “T-commerce,” enabling advertisers to do direct sales for an additional revenue source.
For ISPs, partnering with Zillion TV represents a way to reduce churn and build customer loyalty, Berman said.
Content creators like the service because it is a secure way to create another channel for their content and revenue, particularly as DVD sales fall off and advertising models crumble due to Digital Video Recorders and other technology that lets consumers skip ads, Berman said. Advertisers like the service because it gives them a chance to get relevant ads in front of consumers and to break out of the 30-second or 60-second spot mold and be more creative, he added.
TV Strategies analyst Steven Hawley believes the partnerships with content creators and with Visa are strong pluses for ZillionTV, but is concerned that the box required in the home “becomes another box solution, which is something consumers don’t want.” Since there is no option currently for live TV service, for things such as sporting events, Hawley believes ZillionTV will be seen as augmenting other options.
ZillionTV has one major ISP ready to go as a customer and has worked with 16 others in its ramp-up, assessing the viability of their existing networks to deliver the service. Based on those assessments, ZillionTV believes it can deliver a high-quality standard definition service at 3 Meg, and is prioritizing ISPs and their customer segments that can receive that level of service, Berman said.
“We are following along by targeting households day one that have that capability,” Berman said. “We are creating a groundswell for those who do not to upgrade. They get a terrific personalized entertainment service to go with it. ZillionTV will be used as a tool for purposes like that. The idea here is that ISP wants to touch the customer. We believe that ZillionTV is plug and play, but the ISPs are saying they’d like to come out to your house and install Zillion TV for you. They don’t have to – we are plug and play. They think touching the customer is a good thing.”
Given that many mid-sized telecom service providers haven’t jumped to develop their own IPTV offerings, something like Zillion or Sezmi, another startup that is trying to partner with broadband service providers in a very different way, may make IPTV less urgent, analyst Hawley said. “If they can partner with a satellite company for live TV and offer this for on-demand, it might be enough,” he said.
Vaenco has a clear focus - connect consumers to content owners using the internet via the infrastructure of existing content providers generating new revenue opportunities while being simple to use, at reasonable cost and convenient to the consumer.
1. Content owners have unprecedented control of their product and can connect directly to the consumer.
2. Content is digitally secured end-to-end through the system and content owners/providers may opt for on-premises servers to retain physical control of their products.
3. Consumers have new unbridled access to television shows, movies, and music and independent productions from around the world delivered to their entertainment systems in (up to) HD quality.
4. Consumer choice of opt-in advertising to offset content purchase costs.
5. The ability to blend the traditional “push/semi-push” distribution model and “pull” model of the internet into a profit generator for Telco’s that will facilitate rapid deployment along current consumer lines to dramatically increase barriers to competition.
6. A turnkey technical and billing solution for Telco’s to allow them to offer the Vaenco service, substantially increasing consumer value.
7. A store and forward system that does not demand the high performance network requirements of streaming video.
http://www.vaenco.com/news.htm
August 2008 —
Vaenco Inc. has received a Motorola prototype DSTB (Digital Set Top Box) for future integration[\b]
Doma,
We have read that TVTonic is shutting down. This will reduce the Wavexpress burn rate. I don't believe we have seen anything concrete which states Wavexpress is closing. It maybe premature to draw that conclusion. So, they may still be employed by Wavexpress.
I tried to get some clarification and I was told: The Olympics service went very well and we have had continued interest from third parties in Wavexpress, at the same time we have reduced their burn rate in the meantime, in order to conserve resources. All of our current interest is from licensing and running their own service, we are reducing cost by shutting down the service and focusing on supporting customers.
That doesn't sound like Wavexpress is totally shelved.
Rick5.
I share the same thought.
The answer I received was all of current interest is in licensing and running their own service. The company is reducing cost by shutting down the service and focusing on supporting customers.
TvTonic/Wavexpress.
Just TvTonic is shutdown not Wavexpress, correct?
If, Wavexpress is still licensing tech to others to run their own services and focusing on supporting these customers, and just shutting down Tvtonic to save costs, Wavexpress would still be an operational business, correct?
Seagate in Full-Disk Encryption Push
Seagate has launched a major push to increase the uptake of its Full Disk Encryption (FDE) laptop and PC drives, with higher capacities, competitive prices, and a partnership with Dell.
From this month, purchasers of a wide range of Dell laptops will be offered an upgrade to Seagate's latest Momentus FDE drives, with capacities between 160GB and 320GB at platter speeds of 5400rpm and 7200rpm, depending on model. Drives of 500GB will be available by the end of the year, Seagate indicated.
According to Dell, laptops with the standard 5,400rpm 120GB drive added would add around US$139 to the price compared to the same machine with a non-encrypting drive of the same capacity, with the 160GB 7,200rpm model adding $149. Price premiums for the higher-capacity drives were unavailable.
Dell systems on which FDE technology can be bought cover the Latitude E6400/6500, E4300, E5400/ E5500, ATG and XFR, the Mobile Precision M6400, M4400, M2400, and Optiplex 960.
The new family of FDE drives marks the culmination of a slow-burning effort by Seagate to get corporate to start buying FDE encryption drives in greater numbers. After announcing the drives in 2005, it took the company until last year to turn the Momentus FDE into a commercially-shipping product inside laptops from ASI.
Unlike rival software technologies, the FDE drives themselves incorporate the technology in its entirety at firmware level, and require no user intervention beyond entering a passphrase each time the system is booted. From that point onwards encryption and decryption is transparent.
Until now, laptops with encryption integrated at drive level have tended to be seen by businesses as more secure and better-performing than software-only alternatives but without solving the issue of key management complexity. Two years of serious data loss incidents later, and the orthodoxy has started to budge, not least as data security mandates have started to spread in the US.
To that end, the drives now integrate with McAfee's ePolicy Orchestrator (ePO) management software in addition to a similar system from Wave Systems, Embassy Trust Suite which has supported the drives from launch.
McAfee's ePO has the added advantage that it will also manage machines encrypted with software-only encryption, and fits into a wider endpoint security system. This is licensed separately and requires a client on each machine.
"It has taken a while for this to take off," admitted Seagate's product marketing manager, Joni Clarke. "People were fearful of software encryption," she said.
The company wanted to turn full-disk encryption into a mainstream option for technology buyers. "Encryption should be core to data. Our mission is that someday all drives should have encryption," she said.
Drives could also be purchased on a stand-alone basis, and retrofitted to older laptops, she confirmed. Other system vendors using the drives now included Lenovo, Fujitsu and NEC.
Geopling.
I asked IR on the 21st about the market cap issue. This was the reponse.
Market cap test: There's one test that relates to the size of the market cap in the public float (i.e., market cap available for general trading and not owned by insiders or control persons, etc.) That is not the test at issue. The test affecting Wave is the total market cap.
TinyPineTree.
IR stated this morning regarding today's review - not sure when we'll have a formal outcome but Nasdaq tends to be prompt and requires immediate disclosure.
sciwag.
Than there is this:
More business requiring Trusted Platforms.
Sony's latest lightweights will have SSDs, play and burn Blu-ray
September 23, 2008, 3:40 PM
The smallest Sony devices to show Blu-ray movies on big and small screens aren't PlayStations. They're super-small, lightweight Vaio computers, and like a certain banned iPhone app, they have "I Am Rich" written all over them.
There have been, and continue to be, two classes of customers for small computer devices. One class is interested in making functionality portable enough to achieve true data mobility, and it's that class to which the latest rounds of MID and netbook form factor computers are being pitched. The other is interested in seeing how much hardware can be shrunken down to a minimum form factor -- oftentimes without regard to cost -- and it's that second class to whom Sony is playing today, with its latest miniaturized Vaio notebooks, slated to roll off the assembly lines this fall.
Let's start with the part that usually goes at the end of the story: Sony's new top-of-the-line miniature Vaio TT will sell for $2,750. Very well, shock over. What it will feature is a 1366 x 768 display (yes, that sounds unusual, but there's a reason) that enables the playback of Blu-ray videos at a 16:9 aspect ratio, with very minimal letterboxing. Naturally, playback on the display won't be 1080p, though an HDMI connector enables it to connect to any modern HDTV, where the drive can play back at 1080p resolution.
There are two new TT models with two buildouts per model, with the higher-end TT198 being skewed toward high-end consumers with a slightly faster processor and Blu-ray burner drive. That said, both the TT198 and the lower-priced TT160 actually pass the test for trusted business platforms. They both have biometric fingerprint touch sensors, and are compliant with the Trusted Computing Group's version 1.2 specification. That enables both to serve as "Trusted" platforms, which more businesses are requiring -- especially those that are mandating their hard drive contents be encrypted.
Sony's classy Vaio TT, one option for which is this attractive, pearl-gold tint finish.
The $2,750 TT198 buildout comes with a 128 GB solid-state drive (SSD), though one spec sheet Sony showed BetaNews clearly says it can be decked out with two SSDs, for a total of 256 GB of flash storage. That model could probably send the price over the $3,000 mark. Both TT160s come standard with a 160 GB HDD, though if the form factor is essentially the same, there's a chance that could be paired as well. The TT160 starts at $2,000.
Driving both systems will be Intel's latest Centrino 2 platform processors; and the TT198 could be the critical test of their effectiveness. The TT160 features Intel's Core 2 Duo SU9300 at 1.2 GHz; the TT198 cranks it up a notch with the SU9400 at 1.4 GHz. Both CPUs utilize 3 MB of on-board cache and an 800 MHz front-side bus. Both Vaios will stick with the optimum Centrino 2 buildouts from Intel rather than adding ATI or Nvidia chips. So the chipsets will be Mobile Intel GS45 Express with Intel's 4500MHD GMA integrated graphics, and integrated sound. There's an argument here that, if Sony had tried to go with discrete graphics at this form factor, it could have had problems with overheating...and in recent months, when Sony mixes with overheating, that typically causes something else to overheat: customers' patience.
The TT198 will come pre-installed with 32-bit Windows Vista Ultimate. But perhaps taking a cue from Dell, the 160 will come pre-installed with 32-bit Vista Business standard, but with an option to downgrade to Windows XP Professional.
Elsewhere in the goodies bags for both models, you'll find the "Motion Eye" camera that's on all the other modern Vaio models -- the one that follows your face -- along with built-in microphone, stereo Bluetooth, and an option for Sprint Mobile Broadband. The new chasses are particularly eye-catching, made of lightweight carbon fiber and driving down total weight to 2.87 pounds on average.
This business-ready Vaio TT also has all the gear an enterprise needs for a Trusted Platform.
Let's be honest: These are "show-off systems," designed with the principal purpose of appealing to people who don't own them yet. While manufacturers including Sony have tried to find a formula for any kind of small system that appeals to a mass market -- especially in this economy -- their mixed results have not always been a good kind of mix. Sony's gamble is that there's still a premium buyer out there, and the inclusion of the TCG platform and the XP downgrade option seems to indicate Sony feels that buyer is an executive, not a gamer, who may be looking for just a little of a business-related excuse to push him over the line and make the purchase. Hopefully, that executive wasn't over-invested in stocks last week.
Barge.
Seems I recall Wave having some PR with Sonic Solutions some years back?
September 16, 2008 07:02 PM
Dell (Dell) has partnered with Sonic Solutions on a device that lets people take a movie downloaded to a PC from CinemaNow and burn it onto a DVD for playback on most standard players.
The Qflix external DVD burner is available in the United States as an option with most Dell Inspiron, Studio, and XPS notebooks. The device, released Monday, is also available separately through Dell's online store and will be available soon as an option on select consumer desktops. The drive is priced at $120.
Qflix is the name of Sonic's patented technology platform for burning DVD titles with the company's digital rights management software to prevent duplication. Most DVD players support the platform, which includes Sonic's Roxio Venue recording software.
The Qflix DVD burner includes two recordable DVD discs, the Roxio Venue application, CinemaNow software, and a USB cable. Movies must first be downloaded to a PC through CinemaNow and then burned to a DVD through Qflix.
The device only records on its own recordable DVDs. Roxio Venue and CinemaNow software must be installed on the PC.
http://www.informationweek.com/news/hardware/peripherals/showArticle.jhtml?articleID=210602020
Barge.
Perhaps this is related to CinemaNow?
http://support.dell.com/support/topics/global.aspx/support/dsn/en/document?c=us&cs=19&dl=false&l=en&s=dhs&docid=58232C443AB8638DE040AE0AB7E161CF&doclang=en
Acer knocks HP off top spot for EMEA PC sales
15 Oct 2008
HP has been toppled from the top spot in the Europe, Middle East and Africa PC-selling league by Acer, partly as a result of Acer's success in the booming netbook market.
Although HP retained its leading position in the global stakes, according to Gartner's preliminary results for the third quarter of this year, Acer moved up from second place in the EMEA region. Globally, Acer remained in third place, with Dell in second place. Gartner's report came out on Tuesday.
According to the report, HP "was impacted by a slower entry into the mini-notebook market, losing the top position in EMEA". The report identified Acer and Asus as two manufacturers that have particularly benefited from sales of netbooks, or low-cost subnotebooks.
The PC market in EMEA was largely dictated by vendors that shipped mini-notebooks and those that did not, resulting in significant movements in the top five vendor rankings," said Ranjit Atwal, a principal analyst for client computing markets. "HP delayed its introduction of mini-notebooks into the market, potentially fearing cannibalisation of its existing notebook markets, but did not anticipate that Acer would be able to ramp up its channels so quickly."
Wave/Dell latitude E series and precision Mobile Workstation.
Some interesting PDF's. Finger print roaming listed with the Embassy Authenication Server. Looks like they have a sales rep for almost every country.
http://www.ict-economic-impact.com/material200808/A4-UK-03-000211.1.03_ESeries.pdf
http://www.ict-economic-impact.com/material200808/A4-UK-03-000212.1.02_ETSPBA.PDF
http://www.dell.com/downloads/global/power/ps2q08-20080269-Wave.pdf
Acer Security Suite.
Click on the pdf in the following link.
http://193.0.238.132/products/desktop/BusinessCenter/Security.htm
http://193.0.238.132/products/desktop/BusinessCenter/pdf/veriton%20flyer-AcerSecuritySuite.pdf
Acer Security Suite powered by Wave's Embassy Suite.
Finger print roaming for use on a server network.
TPM comes default on Veriton 6 series computers and a TPM daughter board is available for Veriton 2 and 4 series.
Or...
as Fullmoon posted.
Acer is moving to TPM on everything. Acer wanted to ship the same applications across all their platforms from a single vendor. Since not all the platforms currently have a TPM, Wave created a version of ETS applications which uses the Windows security functions (MS Crypto API Software) to do things like generate encryption keys, etc. So while functions are not as secure as hardware, the applicatons are consistent between the two platforms and Wave get’s the same price.
Massachusetts Law Regarding Security Breaches – How It Will Affect Your Business
September 25, 2008
Now is the time for businesses to focus on their data security measures to ensure compliance with the law and regulations and to develop an action plan in the event of a breach
Almost daily, the news headlines include security breaches at major companies. The issue of secure data protection should be a top priority for companies in every industry. Businesses regularly receive and store personal information about their employees and customers, and an inadvertent breach in the security of this personal information can lead to significant liability under one or more of the state laws designed to deal with this exact problem.
Massachusetts became the 39th state to enact comprehensive legislation targeted at protecting its residents’ personal information from identity fraud when Governor Patrick signed into law “An Act Relative to Security Freezes and Notification of Data Breaches” on August 2, 2007. For more information, visit http://www.mass.gov/legis/laws/seslaw07/sl070082.htm. Final regulations promulgated under the act were released this month and will go into effect on January 1, 2009. In the 10 months since the act took effect, the Office of Consumer Affairs and Business Regulation reports that there have been 320 security breaches affecting more than 600,000 residents of the Commonwealth. The majority involved criminal acts, with thefts of laptops and hard drives topping the list. Now is the time for businesses to focus on their data security measures to ensure compliance with the law and regulations and to develop an action plan in the event of a breach.
Massachusetts Law
The Massachusetts law focuses on three main areas: (1) consumer rights and procedures for placing a “security freeze” on a credit report, (2) mandatory notice requirements following a security breach and (3) data disposal requirements. This article focuses on the latter two components and their impact on business operations. In brief, the law requires that businesses owning or storing personal information follow certain procedures for the storage and disposal of this information and provide notice of any potential breach of the security of this information.
To Whom Does the Act Apply?
The act applies to any person or business that owns, licenses, stores or maintains “personal information about a resident of the Commonwealth.” This covers virtually every workplace, because even the smallest of businesses likely maintains personnel records with “personal information” pertaining to one or more residents of the Commonwealth. The act’s effect is not limited to Massachusetts-based businesses—it provides that any business storing personal information about one or more Massachusetts residents must abide by the new legal requirements. In other words, even wholly out-of-state businesses are potentially subject to this law if they store or maintain personal information about Massachusetts residents, such as customers or employees who live and work in the Commonwealth.
What Is “Personal Information”?
The Massachusetts law uses a slightly more inclusive definition of “personal information” than found in other states. Under the act, “personal information” includes a person’s first and last name or first initial and last name in combination with one or more of the following:
• Social security number
• Driver’s license number or state-issued identification card number
• Bank or other financial account number, including a credit or debit card number, with or without any required security code or password
The law covers data stored in either paper or electronic format. With such a liberal definition of personal information, the law affects a broad spectrum of public and private businesses. Businesses regularly keep this type of information about their employees (for example, in I-9 documentation or direct deposit systems), and companies doing business with consumers handle their customers’ credit or debit card information every day.
What Does the Law Require?
The purpose of the act is to safeguard the security and confidentiality of personal information and to protect against unauthorized use of this information through identity fraud or theft. The obligations imposed by the act are designed to achieve that purpose.
Notice
First and foremost, the act requires that owners or holders of a resident’s personal information must provide timely notice any time they know or have reason to know of a security breach. A security breach is any unauthorized access to or use of the personal information, and would encompass such situations as the theft of an employee’s laptop that contains personal information or a hacker’s infiltration of a company’s computer files containing personal information. The specific content and procedures for the notice vary for holders of data versus owners or licensors of the data. Generally, the entity must provide notice to the Attorney General and the Director of Consumer Affairs and Business Regulation that describes the nature of the breach, the number of Massachusetts residents affected, and any steps planned or taken relating to the incident. Additionally, the company must provide all residents who are affected by the breach with notice of the existence of a possible breach, the right to obtain a police report, directions as to how to request a security freeze and any fees to be paid for the security freeze. The notice to residents should not include the nature of the breach or the number of residents affected by the breach. Notice should be made as soon as possible, but may be delayed if it might impede an ongoing criminal investigation. Alternate notice provisions are available in the event the cost of providing written notice will exceed $250,000, the number of Massachusetts residents affected exceeds 500,000 or the organization lacks sufficient information to provide notice.
Disposal
Additionally, the law details minimum standards for the proper disposal of paper documents and electronic media containing personal information. Fundamentally, the documents or media should be destroyed in such a way that personal data cannot be read or reconstructed prior to disposal. Generally, this means shredding or burning paper documents and completely erasing or otherwise destroying electronic media so that the information cannot be reconstructed.
Security Program
The Office of Consumer Affairs and Business Regulation proposed “Standards for the Protection of Personal Information of Residents of the Commonwealth,” which were approved on September 22, 2008, and will take effect on January 1, 2009. The regulations impose significant additional obligations on persons or businesses holding or owning personal information.
Under these new standards, businesses are required to develop and implement a “comprehensive, written information security program” applicable to any records that contain personal information. This written program should contain administrative, technical and physical safeguards to ensure the security and confidentiality of such records. The standards delineate 12 features that must be included in every information security program. Among others, some of the key features include: (1) upgrading information systems; (2) implementing regular training programs for employees; (3) developing security policies and written procedures that account for employee access to records; (4) imposing discipline for violation of the security program rules; (5) monitoring and auditing employee access to personal information, including foreclosing access to records by terminated employees by deactivating their passwords; and (6) conducting annual reviews of data security measures. Furthermore, for computer systems that store or transmit personal information, the standards establish certain minimum requirements, including secure user authentication protocols, secure access controls, encryption of data containing personal information, firewall and virus protections, monitoring programs and employee training.
What Are the Penalties for Non-Compliance?
The penalties for non-compliance with this law can be significant. The Attorney General is authorized to pursue violations of its provisions under Chapter 93A, the Massachusetts Unfair and Deceptive Acts and Practices statute. In certain circumstances, Chapter 93A authorizes consumers to seek up to three times the amount of actual damages, plus costs and attorneys’ fees. In addition, under the portion of the law concerning data disposal, businesses can be subject to a fine of up to $50,000 for each instance of improper disposal.
Conclusion
In short, the act and associated standards impose a multitude of new data security obligations upon businesses and individuals alike. In light of this legislation, companies must establish programs before a breach occurs in order to be ready to act quickly in the event of a data breach. Companies can prepare by taking inventory of the personal information they currently store and evaluating how best to maintain, protect and dispose of the information.
http://www.mwe.com/index.cfm/fuseaction/publications.nldetail/object_id/1a82a263-6f8c-4935-bb6b-0474a2b38712.cfm
Massachusetts, Nevada mandate encryption for consumer data.
September 24, 2008, 11:23 AM
New regulations will tighten security measures around residents' personal data, but the impact of these regulations will affect businesses beyond the two states' borders.
Massachusetts' Office of Consumer Affairs and Business Regulation issued new regulations, called the Standards for The Protection of Personal Information of Residents of the Commonwealth, set to take effect on January 1, 2009. The state already has what are considered by some to be the most far-reaching information security requirements of any US state (see this PDF client advisory from a Mass. law firm for more).
Now, these new regulations will add to existing guidelines by requiring any "portable" personal data about Massachusetts residents to be encrypted. This means any data transmitted over public networks, that's stored on laptops or removable memory such as flash drives, must comply.
The rule will affect any company doing business in Massachusetts, or one that holds personal data of Mass. residents. Worldwide law firm Morrison & Foerster LLP warns, "Even organizations that have no facilities or personnel in Massachusetts should anticipate that they will be subject to the regulations if they maintain information of any Massachusetts residents."
The new regulations also call for mandatory security measures, including updated user authentication control and permissions restriction.
Nevada's own encryption law will go into effect in just one week. Its brief clause reads, "A business in this State shall not transfer any personal information of a customer through an electronic transmission other than a facsimile to a person outside of the secure system of the business unless the business uses encryption to ensure the security of electronic transmission."
Nevada's regulation is decidedly less comprehensive than Massachusetts', and a comparison of the two states' definitions of "encryption" could lead to differing opinions on what is considered effective security. This matter could be problematic if a breach of data security took place in an exchange between the two states.
For Nevada:
"Encryption" means the use of any protective or disruptive measure, including, without limitation, cryptography, enciphering, encoding or a computer contaminant, to:
1. Prevent, impede, delay or disrupt access to any data, information, image, program, signal or sound;
2. Cause or make any data, information, image, program, signal or sound unintelligible or unusable; or
3. Prevent, impede, delay or disrupt the normal operation or use of any component, device, equipment, system or network.
For Massachusetts: "Encrypted," the transformation of data through the use of an algorithmic process, or an alternative method at least as secure, into a form in which meaning cannot be assigned without the use of a confidential process or key, unless further defined by regulation by the office of consumer affairs and business regulation.
Nevada's failure to include the word "algorithmic" has caused some Nevada residents to question if a password-protected document sent within an e-mail could be argued as compliant.
http://www.betanews.com/article/print/Massachusetts_Nevada_mandate_encryption_for_consumer_data/1222269008
More business requiring Trusted Platforms.
Sony's latest lightweights will have SSDs, play and burn Blu-ray
September 23, 2008, 3:40 PM
The smallest Sony devices to show Blu-ray movies on big and small screens aren't PlayStations. They're super-small, lightweight Vaio computers, and like a certain banned iPhone app, they have "I Am Rich" written all over them.
There have been, and continue to be, two classes of customers for small computer devices. One class is interested in making functionality portable enough to achieve true data mobility, and it's that class to which the latest rounds of MID and netbook form factor computers are being pitched. The other is interested in seeing how much hardware can be shrunken down to a minimum form factor -- oftentimes without regard to cost -- and it's that second class to whom Sony is playing today, with its latest miniaturized Vaio notebooks, slated to roll off the assembly lines this fall.
Let's start with the part that usually goes at the end of the story: Sony's new top-of-the-line miniature Vaio TT will sell for $2,750. Very well, shock over. What it will feature is a 1366 x 768 display (yes, that sounds unusual, but there's a reason) that enables the playback of Blu-ray videos at a 16:9 aspect ratio, with very minimal letterboxing. Naturally, playback on the display won't be 1080p, though an HDMI connector enables it to connect to any modern HDTV, where the drive can play back at 1080p resolution.
There are two new TT models with two buildouts per model, with the higher-end TT198 being skewed toward high-end consumers with a slightly faster processor and Blu-ray burner drive. That said, both the TT198 and the lower-priced TT160 actually pass the test for trusted business platforms. They both have biometric fingerprint touch sensors, and are compliant with the Trusted Computing Group's version 1.2 specification. That enables both to serve as "Trusted" platforms, which more businesses are requiring -- especially those that are mandating their hard drive contents be encrypted.
Sony's classy Vaio TT, one option for which is this attractive, pearl-gold tint finish.
The $2,750 TT198 buildout comes with a 128 GB solid-state drive (SSD), though one spec sheet Sony showed BetaNews clearly says it can be decked out with two SSDs, for a total of 256 GB of flash storage. That model could probably send the price over the $3,000 mark. Both TT160s come standard with a 160 GB HDD, though if the form factor is essentially the same, there's a chance that could be paired as well. The TT160 starts at $2,000.
Driving both systems will be Intel's latest Centrino 2 platform processors; and the TT198 could be the critical test of their effectiveness. The TT160 features Intel's Core 2 Duo SU9300 at 1.2 GHz; the TT198 cranks it up a notch with the SU9400 at 1.4 GHz. Both CPUs utilize 3 MB of on-board cache and an 800 MHz front-side bus. Both Vaios will stick with the optimum Centrino 2 buildouts from Intel rather than adding ATI or Nvidia chips. So the chipsets will be Mobile Intel GS45 Express with Intel's 4500MHD GMA integrated graphics, and integrated sound. There's an argument here that, if Sony had tried to go with discrete graphics at this form factor, it could have had problems with overheating...and in recent months, when Sony mixes with overheating, that typically causes something else to overheat: customers' patience.
The TT198 will come pre-installed with 32-bit Windows Vista Ultimate. But perhaps taking a cue from Dell, the 160 will come pre-installed with 32-bit Vista Business standard, but with an option to downgrade to Windows XP Professional.
Elsewhere in the goodies bags for both models, you'll find the "Motion Eye" camera that's on all the other modern Vaio models -- the one that follows your face -- along with built-in microphone, stereo Bluetooth, and an option for Sprint Mobile Broadband. The new chasses are particularly eye-catching, made of lightweight carbon fiber and driving down total weight to 2.87 pounds on average.
This business-ready Vaio TT also has all the gear an enterprise needs for a Trusted Platform.
Let's be honest: These are "show-off systems," designed with the principal purpose of appealing to people who don't own them yet. While manufacturers including Sony have tried to find a formula for any kind of small system that appeals to a mass market -- especially in this economy -- their mixed results have not always been a good kind of mix. Sony's gamble is that there's still a premium buyer out there, and the inclusion of the TCG platform and the XP downgrade option seems to indicate Sony feels that buyer is an executive, not a gamer, who may be looking for just a little of a business-related excuse to push him over the line and make the purchase. Hopefully, that executive wasn't over-invested in stocks last week.
From storage visions site:
Some of Our Sponsors
Dr. Tom Coughlin is the Distinguished Author of the New Book "Digital Storage in Consumer Electronics" and the Founder and Chairman of the Storage Visions™ Conferences.
Home Storage Virtualization
•Things won’t look like they do now
•Everything will be connected
•Content and storage will be shared and there will be many copies—storage is cheap and capacities are large
•Content is managed, indexed and automatically backed up
The Storage Visions™ 2009 Conference Theme:
GET THE AGENDA HERE!
Don't go to the 2009 CES until you know about the convergence of technologies that are revolutionizing the creation of digital content, its distribution and consumer electronics. The pre-CES 2009 Storage Visions Conference brings together technologists, vendors, retailers and users to explore the pod-, web-, life-casting consumer revolution and how you will preserve, protect, and search your life on Digital Storage. Conference sessions explore key infrastructure supporting the growth of richer media experiences including storage technologies, privacy protection, power creation and management, search and indexing technologies, home and mobile storage, next generation user needs and business opportunities.
Join CEO's, industry leaders, manufacturers, and end users at Storage Visions 2009, where Digital Storage converges with Content Creation, Delivery and Reception. The Storage VisionsTM 2009 Conference gives you a preview of the latest storage trends in a relaxed and informative environment. Meet the folks that matter in the entertainment value chain and find out how current and coming trends can benefit your company
What industry leaders say...
"The Conference paid for itself 5 times over!" —David Kreft, NSA
“Storage Visions is a great opportunity to hear from industry leaders on market trends, speak with customers about their needs, and meet potential partners for targeted solutions, all in a setting that fosters one on one business conversations. We were delighted with Storage Visions 2008 and look forward to Storage Visions 2009.”
— Dean Neumann, Director, Product Marketing, Bycast Inc.
"Storage Visions brought together key decision makers in storage, computing and IT and offered a number of valuable and timely presentations. Armed with knowledge from the sessions and the many great demo's and exhibits, attendees can return to their organizations to investigate and deploy effective storage solutions."
— Brian Berger, Chair, Trusted Computing Group, Marketing Work Group and Executive Vice President, Wave Systems.
“Across the show floor, attendees can see the increasing array of consumer electronics products that incorporate digital storage. Storage Visions will help our attendees and the consumer electronics industry at large better understand and take advantage of this trend and the overall content value chain”
—Gary Shapiro, President and CEO of the Consumer Electronics Association
"Storage Visions is the only conference that brings together consumer electronics companies, storage technology and system suppliers, content creation companies, system integrators and VAR's, and market analysts to explore and create tomorrow's visions of the role of digital storage in entertainment."
—Pat O’Malley, Seagate Senior Vice President of Consumer Electronics Business Development
“Storage Visions is a valuable source of information on current status and future trends in magnetic and optical storage, and on applications that harness (and will harness) storage capabilities. I make it a point to attend each year while I'm in Las Vegas for CES."
—Brian Dipert, Senior Technical Editor: Mass Storage, Multimedia, PC's and Peripherals, Electronic Design News (EDN)
2009 STORAGE VISIONS CONFERENCE ANNOUNCES KEYNOTE TALKS BY WARNER BROTHERS AND PANASONIC
Interesting Trusted Computing Group. Maybe Wavexpress will fit in here???
For more info visit: http://www.storagevisions.com
The 2009 Storage Visions Conference announces two keynote talks and open registration.
Submitted to HomeToys.com on: 10/03/2008, 9:43 am
The Entertainment Storage Alliance (www.EntertainmentStorage.Org) announces two exciting keynote speakers for the Eighth Annual Storage Visions Conference to be held at the Flamingo Hotel in Las Vegas, Nevada January 6 & 7, 2009. Wendy Alysworth, Senior Vice President of Technology for Warner Bros. Technical Operations will give a keynote titled “2X Storage + 2X Bandwidth = 3D Production” which discusses requirements and technologies for 3D production and their impact on digital storage. Dr. Paul Liao of Panasonic will give a keynote talk titled “The Future of Content Storage” and will include discussion of the transition from DVD to Blu-ray and trends in SD flash memory for CE products.
Wendy Aylsworth oversees the establishment of new technologies for Warner Brothers production divisions and assesses the impact of emerging technologies on content creation and distribution. Her department participates in national and international technical standards and trade organizations to promote commonality for the benefit of the entertainment sector. She is currently the elected engineering vice president of SMPTE and acted as chair of SMPTE DC28 for four years, which generated the initial d-cinema standards created for the industry. Wendy joined Warner Bros. in 1994, establishing technology operations for the new feature animation division. Previously she spent five years at Disney overseeing animation technology and theme park ride software development, and had spent fifteen years in the aerospace industry.
Dr. Liao is Vice President and Chief Technology Officer for the Panasonic Corporation of North America. He is responsible for Panasonic’s technology direction and R&D in North America and is also a member of the Boards of the Panasonic Foundation and the Panasonic Display Laboratory of America. Dr. Liao has served on the Board of the Internet Home Alliance, the Information Technology Industry Council, the Consumer Electronics Association Board of Industry Leaders, and as a member of the FCC Technological Advisory Council. He is a past President of the IEEE Lasers and Electro-Optics Society and is a recipient of the IEEE Millennium Medal.
Corporate sponsors and exhibitors for the 2009 Storage Visions include Denali, Fujitsu, SanDisk, STMicroelectronics, Toshiba America Information Systems and Trusted Computing Group,. Organization and media sponsors include Burn World, Content Delivery and Storage Association, Compact Flash Association, Computer Outlook, Davis Consultants Asia, Digital Media Net, DVDA, Flash Memory Summit, Fibre Channel Industry Association, IDEMA, IEEE Consumer Electronics Society, InfoStor, MediaTech Association, OCModshop, Parks Associates, PC World, Portable Design, Reseller Advocate News, Reverse Logistics Association, Saint Petersburg State University of Film and Television, SCSI Trade Association, Storagesearch.com, The Entertainment Storage Alliance and Veritas et Visus.
Conference registration is now open: http://www.StorageVisions.com/2009Register.htm. Conference hotel reservation information is also on the web site at http://www.storagevisions.com/2009Travel.htm.
Storage Visions is the place to participate in digital storage enabling the digital content revolution (www.storagevisions.com). For information on sponsorship and exhibit opportunities at the 2009 conference visit www.StorageVisions.com/2009SponsorsEx.htm, call us at 408-871-8808 or email us at info@StorageVisions.com.