Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
OT: Asian mobile phone trends:
China has built a substantial nation-wide telecommunications infrastructure wit fibre optic cable networks covering the country. Pushed along by government policy to find cost-effective communication solutions, China has become the world's biggest user of Voice over Internet Protocol (VoIP) services.
China is also the largest mobile communications market in the world. By mid-2005, China had around 350 million mobile subscribers or more than 30 for every 100 people. The remarkable growth in the mobile sector has been boosted by increased competition, lower terminal prices and the rapid rise of prepaid services. The popularity of the Personal Access System (PAS) known as Little Smart being offered by the fixed line operators has also boosted the market.
By early 2005, the number of Internet subscribers in China had grown to 100 million, or 12% of the world Internet user base. The Chinese government remains well aware of the enormous social and economic value of Internet and its importance in creating a prosperous nation. At the same time, however, it is concerned by the perceived risk to cultural heritage and to political stability.
China is also emerging as a broadband superpower, showing further strong growth coming into 2004. Though penetration remains comparatively low, in early 2005, broadband was growing in China at a rate of around 8% per month (or close to 100% per annum), with China Telecom being the largest supplier.
Hong Kong - Consistent with its status as one of the leading telecommunications economies in the world, Hong Kong has built itself world-class infrastructure. Digitalised since 1995, the Special Administrative Region (SAR) has been wired with almost 400,000km of optical fibre, with the vast majority of households covered by this extensive broadband network. Hong Kong is also a key regional telecommunications hub and as such is the landing point for a significant number of strategically important submarine cables.
Growth in Hong Kong's booming mobile phone market continued through 2004. By early 2005, penetration had reached 103% and Hong Kong was in top place in the Asian mobile. With an adult population of 5.9 million, the market has moved closer to saturation and the opportunities for further significant growth may finally be starting to shrink.
Hong Kong has also been experiencing rapid growth in its Internet market. The speed of its expansion was highlighted in the first half of 2001, when Hong Kong had the highest rate of growth in the world for household Internet penetration. There were an estimated 4 million Internet subscribers in the territory, gaining access using mainly broadband but also dial-up. There were around 190 ISPs by end-2004.
Japan - With its sophisticated infrastructure, Japan's telecommunications sector is one of the most active markets in the world. The development of local infrastructure in Japan has been dominated by the government's push to have incumbent NTT open up access to the 'last mile'. Although fixed-line services remain important, they have begun to decline.
By end-2004, Japan had more than 23 million broadband Internet services in place. Much of the success of broadband in Japan is owed to the stunning growth in ADSL broadband services. Japan is at last living up to earlier expectations of becoming a dominant player in broadband use.
Into 2005, Japan has the third largest number of Internet users after the USA and China, if mobile Internet users are included in the tally. (China passed Japan in 2004.) Fibre-to-the-Home (FTTH) Internet access has been making impressive progress in the Japanese market. Japan is also one of the world's hottest markets for IP telephony. It has been predicted that the country will have 28 million Internet phone lines operating by 2007.
Although Japan's 2G mobile telephone sector has entered a maturing market phase, the overall Japanese mobile market remains dynamic. By March 2005, Japan had almost 87 million mobile subscribers, with over 34 million subscribers signed up for 3G services. Wireless Internet and mobile services have helped to keep the mobile market stimulated. Into 2005, Japan continued to lead the world in wireless Internet users with 52 million in early 2005.
Macau, a Special Administrative Region (SAR) of China, remains very low profile compared with its bustling sister SAR, Hong Kong. The territory has quietly built itself a strong modern telecommunications infrastructure, equal in standard to that of any other country in the region, with significant penetration of telecom services. The fixed-line network reached a saturation point a few years ago. Now, the country's mobile market has been growing strongly. With 450,000 mobile subscribers or a penetration of 93%, the market is nearing saturation. Macau has been busy adopting Internet in its various forms and the administration appears keen to encourage this. Broadband Internet, using ADSL, has started to develop. By March 2005, more than half of all Internet subscriptions in Macau were broadband-based.
Mongolia is committed to developing a more efficient telecommunications network and is making solid progress. However, its telecommunications infrastructure still needs work. A more efficient telecom network is a key element in Mongolia's economic development. An explosion in the mobile market in the period since 2001 has seen subscriber numbers rise to over 400,000 or a 14% penetration by March 2005.
Mongolia has made early moves into broadband Internet. Mongolia Telecom quickly signed up several thousand subscribers, after entering into an agreement with Korea Telecom in 2001 to set up a pilot ADSL service. However, most broadband users reside in the capital Ulaanbaatar and are mostly government ministries and foreign companies.
North Korea - Telecommunications in North Korea is seriously impeded by a combination of its generally poor economic state and the government's widespread repression of communication. The number of fixed-lines and the volume of voice traffic in North Korea are minuscule compared with South Korea. Because of its mountainous landscape and the high cost of building fixed-line networks, a mobile telephone network is considered a much more viable option. The country established a joint venture with a Thailand-based company to set up a mobile service in a special economic zone in north eastern North Korea. North Korea remains the only country in the world that had yet to adopt the Internet for public usage.
South Korea - With its government adopting a very progressive approach to deregulation, liberalisation and privatisation of the local telecom industry, South Korea has become one of the world's major players in the market. The result has been willingness on the part of operators to invest in infrastructure and to be innovative, providing the basis for a booming telecommunications market.
The country's fixed-line telephone market in South Korea continues to be dominated by the incumbent KT, formerly known as Korea Telecom. This is despite the market being opened up to competition in 1997.
South Korea is the fourth largest mobile market in Asia, having 37.5 million subscribers by March 2005. (It was passed by India in 2004.) The market was reaching a point of saturation, with a penetration of 77%. With many value added services coming onto the market, South Korea continues to push the boundaries of mobile communications. South Korea's development as a leading mobile market has been boosted by low tariffs and terminal costs, the introduction of competition in 1996, the nationwide roll out of Code Division Multiple Access (CDMA) technology and the arrival of camera-equipped mobile phones. Third Generation (3G) phones and advanced mobile services such as mobile gaming, m-banking and m-commerce have also kept the mobile market invigorated.
South Korea has become the most penetrated broadband market in the world, with over 80% of all homes with Internet accessing the network via a high-speed connection. South Korea is also a world leader in the commercial application of broadband Internet technologies. The country's impressive broadband progress began in the late 1990s when the government issued a policy mandating that operators provide a 2Mb/s connection for every citizen. This broadband policy, combined with a competitive market and a densely populated and computer literate society, laid the foundations for Korea's burgeoning broadband market.
Taiwan has adopted a long term approach to significantly upgrading its telecommunications infrastructure, undergoing a series of network modernisation projects in the last decade or so. Consistent with the performance of Taiwan's impressive mobile sector - one of the highest penetrated mobile markets in the world - the country has been energetically moving into the 'next generation' of mobile services. (After hitting a peak penetration of over 110%, the country had slipped back to about 93% in early 2005.) Taiwan awarded five licences for Third Generation (3G) services in early 2002 and, in so doing, was the first market in Asia to hold a 3G auction in which there were more bidders than licences.
The Taiwanese government has been actively promoting broadband and has committed the country to being on a par with the US by 2010. As a result of this, Taiwan has rapidly become a significant player in broadband Internet access. By mid-2005, over 50% of households with Internet access had a high speed broadband connection.
For more information visit http://www.researchandmarkets.com/reports/c28257
Research and Markets Laura Wood Fax: +353 1 4100 980 press@researchandmarkets.com
11/25/2005 10:40 ET
RSA Conference, February 13, 2006
10:00AM - 1:00PM
Learn more about Trusted Computing, the industry's standard for enabling trustworthy computing throughout connected products. Technologists will discuss key concepts of the Trusted Computing architecture and its implementation across diverse products and technologies, including an overview of the Trusted Platforms, usage scenarios, Trusted Computing in wired and wireless environments, securing endpoints, and privacy and control options.
This session is open to all RSA Conference and Expo attendees for no additional cost. Space is limited, so please sign up in advance if you plan to attend at www.trustedcomputinggroup.org/events
barge, snackman, what's this sks fuss about?
I've been away all weekend in the California gold/wine country. If anyone is in agreement as to the ethics/passion/vision/ of SKS, I'd think it would be the three of us. Did I miss something? Give me a jump-start on my make-up reading.
FM
Next Week:
http://www.cartes.com/en/2005/A_salon/A5_exposants/A5_exposant.htm?exposantId=1880148587
005 exhibitors' list
WAVE SYSTEMS
Stand: 4 J 002
Infos
Address: 480, Pleasant Street
Postal code /City: 01238 Lee
Country: MA-USA.
Contact: Mr Bruno LECONTE, Vice-President, EMEA
Phone: +1 41 32 43 16 00
Fax: +1 41 32 43 00 45
Email:
Web: www.wave.com
Company
Presentation:
Consumers and businesses are demanding a computing environment that is more trusted, private, safe and secure. Wave is the leader in delivering trusted computing applications and services with advanced products, infrastructure and solutions across multiple trusted platforms from a variety of vendors. Wave holds a portfolio of significant fundamental patents in security and e-commerce applications and employs some of the world's leading security systems architects and engineers. For more information about Wave, visit http://www.wave.com
Products
Embedded software
Network management and control software
Secure application software
Windows Vista Section - The State of Windows Vista (November 2005)
http://www.activewin.com/winvista/thestateofvista.shtml
Two years ago, Microsoft intrigued Windows Hardware Engineering Conference (WinHEC) 2003 attendees with visions of dancing windows, an interface that cast off its ties to pixels and scaled to the highest resolution displays, and seamless integration of 2D, 3D, video and animation that would greatly enhance users' experiences without taxing their CPU. Later that year at the Professional Developer's Conference (PDC), Microsoft offered developers an updated view of Windows Vista and discussed its proposed featureset in great detail, asking the developer community for feedback that would help shape the new OS and directly contribute to the product's direction. This was the start of a long dialog that resulted in many changes to the original product roadmap. Previously Windows Vista-only technologies such as Avalon have made their way to down-level platforms due to direct feedback from the developer community. Likewise, WinFS has been separated from the Windows Vista roadmap so that customer-requested capabilities may be added without delaying the operating system's release. Several builds of the OS have since been distributed to developers, each build containing changes and improvements to Application Programming Interfaces (APIs), largely based on feedback.
With WinHEC 2004 came a new build, more details, and more enhancements to the codebase. The WinHEC 2004 build also offered (with minor tweaking) users the opportunity to personally experience the accelerated Window Manager and Compositor on their own hardware. Since WinHEC 2004, early versions of Avalon and Indigo were released via the WinFX SDK Community Technology Preview (CTP) for Windows XP/Server 2003, further extending the evaluation and feedback loop to the general public. The expanded availability of several Vista technologies to down-level platforms has prompted some people to contemplate just what Windows Vista will offer that makes it a compelling upgrade compared to current platforms when they are equipped with WinFX. The short answer is that while down-level platforms will receive WinFX, it will only be a subset of the WinFX APIs offered in Vista. Windows Vista will also include many new features and enhancements from the kernel up that will be exclusive to Vista. For those that remember, think of down-level WinFX as analogous to Win32s which allowed partial API compatibility between Windows NT and Windows 3.1. With Win32s, developers could create 32-bit applications that ran on both Windows 3.1 and NT. However, while Windows 3.1 received some application compatibility, it did not receive the platform or user interface enhancements contained within Windows NT or Windows 9x.
At WinHEC 2005, Microsoft announced the completion of the Windows Vista driver model. Beta 1 was released in July 2005 and contained roughly 1/3 of the features expected for the final release -- mostly developer-oriented. The release to manufacturing (RTM) is scheduled for 2006. In this article, we'll cover some of the features that make Windows Vista a worthwhile upgrade based upon currently known details about the platform. This is by no means a complete listing of expected Windows Vista features. Look to this section for future updates and to the ActiveWin.com homepage for the very latest in our continuing coverage of Windows Vista.
-- Jonathan Tigner
--------------------------------------------------------------------------------
C'mon US Government !!
U.S. Secret Service to Address Identity Theft and Crime in Healthcare / New Era of Compliance
NEW YORK, Nov. 10 /PRNewswire/ -- Deputy James Tomshack from the U.S. Secret
Service will be among the speaking faculty at an event geared for healthcare
professionals and Information Officers. With patient trust waning, James will
discuss how healthcare organizations can safeguard patient data from internal
abuses or identity theft.
Integrating new security standards and compliance into a long-established
system, which epitomizes patient-care, is a complex and challenging task for
many in the healthcare industry. For this reason the Strategic Research
Institute assembled a group of healthcare experts who will discuss how to
deploy effective security strategies that can safeguard data, without
undermining an organization's commitment to healthcare urgency and data
integrity.
HIPAA Compliance 2005 -- New Strategies That Safeguard Data Conference will
take place at the Loews Vanderbilt Hotel in Nashville, Tennessee, November 14,
2005. It is designed to meet the industry's evolving business needs in the
New Era of Compliance.
Featured speakers include, but are not limited to:
-- Mark M. Johnson, Chief Information Security Officer,
Vanderbilt University and Medical Center
-- The Honorable Senator Roy Herron, Member of the General Welfare,
Health and Human Resources Committee, General Assembly,
State of Tennessee
-- James F. Tomshack, Deputy, Office of Investigations, United States
Secret Service
-- Paul Connelly, Vice President & Chief Information Security Officer,
Healthcare Corporation of America
-- Hai Ngo, Chief Information Security Officer, NYU Medical Center
For complimentary passes please contact the conference producer, Karin
Wessely-Bechor, at 212-967-0095 ext. 224 or kbechor@srinstitute.com.
*
Wave Systems/Westergaard (worth a look)
Show Agenda:
http://www.netroadshow.com/conferences/westergaard/agenda.asp
Wave's description:
http://www.netroadshow.com/conferences/westergaard/downloads/Wave%20Systems.pdf
Northrop Grumman to Develop a Prototype for a Nationwide Health-Information Network Architecture
Northrop Grumman to Develop a Prototype for a Nationwide Health-Information
Network Architecture
MCLEAN, Va., Nov. 10, 2005 (PRIMEZONE) -- Northrop Grumman Corporation
(NYSE:NOC) has been awarded a contract by the U.S. Department of Health and
Human Services (HHS) to develop a prototype for a nationwide
health-information network architecture.
This architecture will enable nationwide exchange of electronic health-care
information among disparate systems, an important step in realizing President
Bush's vision for an interoperable electronic health record for every
American. The effort will proceed in conjunction with other recently awarded
HHS contracts designed to establish standards harmonization, compliance
certification, and privacy and security for the exchange of electronic health
records. The culmination of these related activities will be a health
information technology framework that promotes safer, more efficient, and
higher-quality health care across the nation.
"Our demonstrated expertise with large-scale health information technology
systems integration, health-information exchange, and electronic medical
records will provide the federal government with an interoperable,
self-sustaining, and cost-effective solution that will improve the quality and
efficiency of healthcare in America," said Michele Kang, vice president and
general manager of Health Solutions for Northrop Grumman's Information
Technology sector.
Northrop Grumman will develop a non-proprietary, standards-based open
architecture that will leverage and extend the functionality of existing local
and regional health information networks, providing a common, scalable
approach to national interoperability and information exchange. Northrop
Grumman will develop the prototype architecture during a one-year contract
that includes one option year. Work on the system will be done in Chantilly,
Va. and Washington, D.C.
Northrop Grumman leads a consortium that includes the following technology
teammates in the architecture-development effort: First Consulting Group, Long
Beach, Calif.; Axolotl, Mountain View, Calif.; Emdeon, Elmwood Park, N.J.;
Oracle, Redwood Shores, Calif.; Sun Microsystems (SeeBeyond Technology), Menlo
Park, Calif.; CSSS.net, Bellevue, Neb.; and SphereCom Enterprises, Manassas,
Va. Clinical partners include: University Hospital Health Systems; Cleveland
Clinic Health System; and MetroHealth System, Cleveland; Greater Cincinnati
HealthBridge, Cincinnati; Western Medical Associates, Santa Cruz County,
Calif.; Waterbury Health Access Program, Waterbury, Conn.; Swedish Health
System, Seattle; and Conemaugh Health System, Johnstown, Pa.
Northrop Grumman Information Technology, headquartered in McLean, Va., is a
trusted IT leader and premier provider of advanced IT solutions, engineering
and business services for government and commercial clients. The company's
technological leadership spans such areas as homeland security solutions,
health IT solutions, secure wireless, cyber and physical assurance, IT and
network infrastructure, managed services, knowledge management, modeling and
simulation and geospatial intelligence solutions.
-0-
Webby (not Weby) Awards
http://channels.netscape.com/news/story.jsp?id=2005110809584922272143&dt=20051108095800&w=PR...
Looking Back on Historic Ten Years, The 10th Annual Webby Awards Unveil 10 Web Moments That Changed the World
NEW YORK, Nov. 8 /PRNewswire/ -- Looking back on ten years that saw the web change the way the world lives and works, The 10th Annual Webby Awards today named the much-maligned "dotcom boom and bust" as the most influential web moment of the past ten years.
Launched by Netscape's IPO in 1995, the dotcom boom spurred trillions of dollars in private investments into the internet, marketing, and fiber optic cable and led to the development of new technologies and such landmark sites as Google. Though now often synonymous with failures like Pets.com and Boo.com, The Webby Awards placed the "dotcom boom and bust" at the top of its list in recognition of the critical role it played in fast-tracking the spread and popularity of the internet. In 1995, there were 16 million people online and today there are over 957 million.
"While this period was painful for some, the dotcom boom was responsible for catapulting the internet into the mainstream, wiring the world, and bringing hundreds of millions of people online in a very short period of time," said Tiffany Shlain, founder of The Webby Awards. "Such a massive investment into a new medium was unprecedented in history. The internet's explosive growth simply could not have happened without it."
Other defining moments making The Webby Awards list are: The Drudge Report breaking the Lewinsky scandal online (#2); Amazon's Jeff Bezos being named 1999's Man of the Year by Time (#3); and the 2001 shutdown of Napster (#7). (See full list of The Webby Awards' 10 Web Moments That Changed the World below and online at www.webbyawards.com/press/webby_top_10.php)
With everything from eBay to Amazon to the mp3 celebrating their 10th anniversaries this year, The Webby Awards are marking the milestone with a series of special events culminating with The 10th Annual Webby Awards ceremony in New York in June 2006. Since its birth ten years ago, The Webby Awards have chronicled the internet's growth from an underground medium to the driving force shaping popular culture, business, and society.
Proclaimed "the online equivalent of an Oscar" by the New York Times (June 21, 2005), The Webby Awards is the leading international honors for web sites and the innovators behind them. To compete in the landmark 10th Annual Webby Awards, companies, agencies, organizations, and individuals must enter online at www.webbyawards.com before December 16, 2005.
The Webby Awards is presented by the International Academy of Digital Arts & Sciences, a global organization with over 500 members including musician David Bowie, Virgin Group founder Richard Branson, The Body Shop president Anita Roddick, "Simpsons" creator Matt Groening, Real Networks CEO Rob Glaser, and fashion designer Max Azria.
The 9th Annual Webby Awards attracted worldwide attention with a star-studded New York City ceremony showcasing five-word speeches from Webby winners, including former Vice President Al Gore. (Gore's headline-grabbing speech: "Please don't recount this vote.") Winners were chosen from more than 4,400 entries from 40 countries and all 50 states. Reflecting the web's egalitarian spirit, winners ranged from powerhouses like Yahoo! and e*Trade to small, independents like BookCrossing and CafePress.
The 10th Annual Webby Awards' Ten Web Moments That Changed the World:
1. The Dotcom Boom and Bust (1995-2001)
Launched by Netscape's IPO in 1995, the dotcom boom spurred trillions of dollars in private investments into the internet, new technologies, marketing, and fiber optic cable and led to the development of such landmark sites as Google. Though now often synonymous with failures like Pets.com and Boo.com, the dotcom boom and bust was critical to fast-tracking the spread and popularity of the internet. In 1995, there were 16 million people online. Today, there are over 957 million.
2. The Drudge Report Breaks Lewinsky Scandal (1998)
The Drudge Report, a little-known, one-man news site, beat the mainstream media on one of the decade's biggest stories when it broke the Monica Lewinsky scandal online. The Drudge scoop paved the way for the blogging revolution and foreshadowed future online coups like the downfalls of Dan Rather and Trent Lott.
3. Amazon's Jeff Bezos Named Time's Man of the Year (December 1999)
The 1999 holiday shopping season marked the turning point when consumers put aside their misgivings and embraced online shopping in a big way. Online retailers ended the year with a 50% increase in holiday sales and one of their own, Amazon's Jeff Bezos, was named Time's Man of the Year.
4. Elections Worldwide (2004)
From Ukraine's Orange Revolution, where the internet and cell phones were used to circumvent state-run media and mobilize massive protests, to Howard Dean's groundbreaking use of the internet to engage voters and raise millions, the web decentralized the political process in 2004, giving democracy around the world a much-needed shot in the arm.
5. September 11th (2001)
Modern global conflicts are defined by the medium that documents them: WW2 through radio; Vietnam through TV; and the first Gulf War through 24-hour cable news. For the internet, it was September 11, 2001. In historic numbers, citizens worldwide turned to email and the web to reach loved ones, follow the unfolding crisis, grieve, mobilize, and monitor the world's reaction.
6. Asian Tsunami (2005)
With news agencies racing to reach the hardest hit areas, the first accounts of the disaster were largely provided by ordinary people armed only with digital cameras and internet access. The 7/7 London terror attacks and Hurricane Katrina, further spurred the ascension of "citizen journalism" which can sometimes be more immediate, passionate, and illuminating than professional reporting.
7. Napster Shut Down (July 2001)
Although the original services was shut down by the courts in 2001, Napster opened the file-sharing floodgates, turning the entertainment industry on its head, sparking innovations from BitTorrent to iTunes, and forever changing how we experience music and film.
8. Live 8 on AOL (July 2005)
AOL bested MTV at its game with its groundbreaking coverage of the worldwide Live 8 concerts. With more than 5 million people tuning into the online coverage, Live 8 represented the web's evolution from amusing novelty (Mahir's I Kiss You and The Dancing Baby) to a powerful entertainment medium.
9. Match.com Booms (2002)
From 2001 to 2002, Match.com experienced an over 175% increase in both members and revenue, proving that online dating had become an accepted fact of life for singles worldwide. With the 2002 launch of social networking communities like Friendster -- and later MySpace -- and the global expansion of Craigslist, the web became the primary means for making connections for everything from love and friendship to jobs and apartments.
10. SARS Virus Discovered Online (2003)
When the fatal new disease first broke and traveling was restricted, the World Health Organization (WHO) used the web to connect scientists from 14 countries, who worked in real-time to share data and test results, ultimately discovering the virus in one month. On a different scale, sites like Wikipedia and Flickr demonstrate how strangers around the world now use the web to collaborate on projects both big and small.
Vader, that is true
and about the most intelligent thing you've written in , ohhh , about two months.
Enhancing mobile security
http://istresults.cordis.lu/index.cfm/section/news/tpl/article/BrowsingType/Features/ID/79247
Security and privacy are increasingly an issue for mobile communications’ users. Two European projects assessed ways of improving security and their results have influenced international standards in wireless LAN, Bluetooth and public key infrastructure.
Under the IST project SHAMAN, researchers focused on security infrastructures for two increasingly important aspects of mobile communications. First, the ability of the mobile user to roam globally and to connect to the network and its services, using various access networks including wireless LAN and Bluetooth. Second, the development of mobile terminals featuring wireless components – some of which are worn – made up of dynamically configurable components.
“We looked beyond 3G, as future mobile communications will include a mix of networks, among them 2G, wireless LAN and other radio interfaces into the IP-based core network,” says project coordinator Nigel Jefferies. “Our goal was to secure this more complex network.”
The partners identified gaps in security architectures before developing concrete solutions using existing technology, rather than an end-to-end solution. The main gaps were user authentication and the wireless challenge of securing a device before it gets onto the network.
Authentication via imprinting
“One solution,” says the coordinator, “was a new method to set up a Personal Area Network (PAN), even when the devices involved are simple, such as headphones. Our imprinting method involves authenticating each device through software and user input such as passwords.”
Imprinting allows all necessary public keys to be created in the network and then communicated in the network without further input. Users can then set up a PAN around them and control how it connects to the network.
The project developed several imprinting protocols for components with a variety of different user interfaces, for both secret and public key-based security techniques. Also developed was a personal Public Key Infrastructure (PKI) to support PAN security mechanisms based on the use of certificates issued by a personal Certification Authority. All this work was fed into specifications used by the Bluetooth Group.
For mobile network services, the project explored security architectures for existing and new forms of payment. It developed non-subscription payment methods allowing users to roam between networks without having subscriptions to all of them.
“It’s a sort of automatic pay-as-you-go system via your own provider or by using a credit card or electronic purse,” says Jefferies. The project’s Authentication, Authorisation and Accounting (AAA) research was fed into the Internet Engineering Task Force’s Protocol for Carrying Authentication for Network Access work group.
Several SHAMAN partner companies are currently building on the earlier project's work on mobile security - such as the dynamic roaming system with automatic set-up - under the IST project Ambient Networks.
Nomadic security
Under the IST project UBISEC researchers assessed new business areas and technologies originating from the integration of public wide area networks, such as cellular and Internet, and private corporate and home/small business local area networks.
“SHAMAN looked at seamless mobility security and addressed security at network level. UBISEC focuses on the applications level, which is best suited for securing the nomadic mobility mode,” says UBISEC’s coordinator Dr Heinz-Josef Eikerling.
“Our goal was to enable secured ubiquitous computing – keeping user privacy and protecting such assets as computing devices, their software and data,” he adds. “So a mobile user can roam around and securely and conveniently get access to certain services and applications, as well as background information associated with those applications.”
To achieve the sort of advanced infrastructure envisaged by the project, the partners looked at large-scale mobility and security based on smartcard technologies. “These technologies can identify services available to the user,” says Eikerling. “They then securely authenticate the user to the services, check authorisation to use them and customise services to the user's needs.”
This process requires context information, such as the location of the user. It also needs some information attached to local content based on user profile information, for example on the mobile device or taken from the network infrastructure.
Services also need to be customised. For example, users wanting multimedia applications must choose a screen resolution to be rendered to the mobile device at a bandwidth of 100 Kb per second. But if they are close to a wireless LAN hotspot, they could select two Mb per second for full MPEG2 streaming.
Though it is not technically difficult to do all this, it is hard to get information from different sources. “Part of the profile information is on the local device, so we favour smartcards for identity,” adds the coordinator. “But we may need other (potentially less protected and critical) information residing on a network resource, for example for the specific device's capability in terms of display size and communication features.
The project-developed architecture allows distribution of profile information. At its core is the profile access manager, which handles requests to retrieve profile information and does authentication and authorisation. Because this is transparent to users, they need not worry about manual configuring.
The three steps involved in the process are service discovery, applying authentication schemes, and customisation. Service discovery is done with software and is protocol independent, thus working with wireless LAN, Bluetooth or cellular protocols. Two of the service discovery protocols can be downloaded as open-source software.
The project architecture’s specifications and design are being validated in home, car and office environments. In Spain, for example, the partners tested a gateway giving access to several networks. Says Eikerling: “Our software runs on top and the mobile device works through this gateway. So one can move around the home or office, or in between the two. The system keeps information about the context of the user. So if they have to leave home while watching a video, the stream is broken and later picked up where it left off, whenever it is possible to access a wireless connection.”
Security was identified as very important, because these issues are blocking wider dissemination of mobile networks and more advanced services running on them. Mobile security is tough to achieve at least for the application area addressed by the project, because something that is not always connected to a network resource has no trusted third parties, unlike fixed-line networks which rely on the continuous availability of centralised security infra-structure.
Yet Eikerling believes secured ubiquitous computing is feasible, thanks in part to work done under his project. That includes an enhanced PKI, involving key management for certificates localised to mobile devices.
“Our project’s work on mobile security, customisation management, and service discovery paves the way for more efficient mobile service development, a process involving many parties from applications development to billing and charging,” adds Eikerling.
SEC Public Service Announcement
www.sec.gov/investor/pubs/onlinebrokerage.htm
Online Brokerage Accounts: What You Can Do to Safeguard Your Money and Your Personal Information
Let's hope this never happens to you:
You have a few free minutes so you decide to go online to check your brokerage account information. Your account balance is much lower than you expect - and you know that, at least for today, neither the market nor any of your securities fell in value. You see that there were several wire transfers of money from your account to an outside checking account. But you never authorized those transactions - instead, an identify thief did, and that thief has now stolen your cash as well as your personal information.
Like many investors, you may enjoy some of the conveniences of an online brokerage account, like checking your brokerage account information at any time of day or night, buying and selling securities, or even transferring money between your brokerage account and another account. But if you don't take steps to protect your personal information when you go online, you could be telling your own story of identity theft.
How Online Identity Theft Can Happen
Many identity thieves use malicious software programs to attack vulnerable computers of online users. These software programs can monitor your computer activity and send information back to the thief's computer. Sometimes, these programs will log your key strokes, which allows identity thieves to easily obtain username and password information for any of your online accounts, including your brokerage account.
Other identity thieves "phish" for your personal information. "Phishing" involves the use of fraudulent emails and copy-cat websites to trick you into revealing valuable personal information - such as your account number, your social security number, and the username and password information you use when accessing your account. Sometimes fraudsters will use phishing scams to try to get you to download keystroke logging or other malicious software programs unsuspectingly.
But not all identity thieves have gone "high tech." Many still use less sophisticated ways of stealing your personal information, such as looking over your shoulder when you're typing sensitive information or searching through your trash for confidential account information.
How to Protect Yourself Online
You'll need to protect yourself against identity thieves, whether hackers, phishers, or snoops, when you use your online brokerage account. Here are a few suggestions on ways to keep your personal information and money more secure when you go online:
Beef Up Your Security. Personal firewalls and security software packages (with anti-virus, anti-spam, and spyware detection features) are a must-have for those who engage in online financial transactions. Make sure your computer has the latest security patches, and make sure that you access your online brokerage account only on a secure web page using encryption. The website address of a secure website connection starts with "https" instead of just "http" and has a key or closed padlock in the status bar (which typically appears in the lower right-hand corner of your screen).
Security Tip: Even if a web page starts with "https" and contains a key or closed padlock, it's still possible that it may not be secure. Some phishers, for example, make spoofed websites which appear to have padlocks. To double-check, click on the padlock icon on the status bar to see the security certificate for the site. Following the "Issued to" in the pop-up window you should see the name matching the site you think you're on. If the name differs, you are probably on a spoofed site.
Use a Security Token (if available). Using a security token can make it even harder for an identity thief to access your online brokerage account. That's because these small number-generating devices offer a second layer of security - a one-time pass-code that typically changes every 30 or 60 seconds. These unpredictable pass-codes can frustrate identity thieves. While fraudsters can use keystroke logging programs to obtain regular username and password information, they can't use these programs to obtain the security token pass-code. Ask your brokerage firm if you can protect your online account with a security token or similar security device.
Be Careful What You Download. When you download a program or file from an unknown source, you risk loading malicious software programs on your computer. Fraudsters often hide these programs within seemingly benign applications. Think twice before you click on a pop-up advertisement or download a "free" game or gadget.
Use Your Own Computer. It's generally safer to access your online brokerage account from your own computer than from other computers. If you use a computer other than your own, for example, you won't know if it contains viruses or spyware. If you do use another computer, be sure to delete all of the your "Temporary Internet Files" and clear all of your "History" after you log off your account.
Don't Respond to Emails Requesting Personal Information. Legitimate entities will not ask you to provide or verify sensitive information through a non-secure means, such as email. If you have reason to believe that your financial institution actually does need personal information from you, pick up the phone and call the company yourself - using the number in your rolodex, not the one the email provides!
Security Tip: Even though a web address in an email may look legitimate, fraudsters can mask the true destination. Rather than merely clicking on a link provided in an email, type the web address into your browser yourself (or use a bookmark you previously created).
Be Smart About Your Password. The best passwords are ones that are difficult to guess. Try using a password that consists of a combination of numbers, letters (both upper case and lower case), punctuation, and special characters. You should change your password regularly and use a different password for each of your accounts. Don't share your password with others and never reply to "phishing" emails with your password or other sensitive information. You also shouldn't store your password on your computer. If you need to write down your password, store it in a secure, private place.
Use Extra Caution with Wireless Connections. Wireless networks may not provide as much security as wired Internet connections. In fact, many "hotspots" - wireless networks in public areas like airports, hotels and restaurants - reduce their security so it's easier for individuals to access and use these wireless networks. Unless you use a security token, you may decide that accessing your online brokerage account through a wireless connection isn't worth the security risk. You can learn more about security issues relating to wireless networks on the website of the Wi-Fi Alliance.
Log Out Completely. Closing or minimizing your browser or typing in a new web address when you're done using your online account may not be enough to prevent others from gaining access to your account information. Instead, click on the "log out" button to terminate your online session. In addition, you shouldn't permit your browser to "remember" your username and password information. If this browser feature is active, anyone using your computer will have access to your brokerage account information.
How to Know if Your Identity Has Been Stolen
Sometimes, it can be extraordinarily difficult to determine whether someone has stolen your identity. If you take the steps below, you may be able to find out whether you've been victim of identity theft and protect yourself from further harm:
Read Your Statements. Don't toss aside your monthly account statements! Read them thoroughly as soon as they arrive to make sure that all transactions shown are ones that you actually made, and check to see whether all of the transactions that you thought you made appear as well. Be sure that your brokerage firm has current contact information for you, including your mailing address and email address. If you see a mistake on your statement or don't receive a statement, contact your brokerage firm immediately.
Monitor Your Credit Report. Reviewing your credit report may alert you to unauthorized activity, and, therefore, can be an effective way to fight identity theft. You can obtain a free credit report every 12 months from three different credit bureaus by contacting the Annual Credit Report Request Service.
Investor Tip: Read your brokerage account agreement carefully because many firms take the position that you are responsible for the security of your account information, such as your username, password, and account number. In addition, your brokerage account agreement may provide information about what specific steps you should take if you notice any unauthorized account activity.
What to Do if You Run into Trouble
Always act quickly when you come face to face with a potential fraud, especially if you've lost money or believe your identity has been stolen.
Identity Theft. If you think that your personal information has been stolen, visit the Federal Trade Commission's Identity Theft Resource Center at www.consumer.gov/idtheft/index.html for information on how to file a complaint and control the damage.
Securities Scams. Before you do business with any investment-related firm or individual, do your own independent research to check out their background and confirm whether they are legitimate. For step-by-step tips and links to helpful websites, please read Check Out Brokers and Advisers and SIPC Exposes Phony "Look-Alike" Web Site. Report investment-related scams to the SEC using our online Complaint Center.
Phishy Emails. If a phishing scam rolls into your email box, be sure to tell the company right away. You can also report the scam to the FBI's Internet Fraud Complaint Center at www.IFCCFBI.gov. If the email purports to come from a brokerage firm or mutual fund company, be sure to pass along that tip to the SEC's Enforcement Division by forwarding the email to enforcement@sec.gov.
Additional Resources
For more information, please read:
Internet Fraud: How to Avoid Internet Investment Scams
"Phishing" Fraud: How to Avoid Getting Fried by Phony Phishermen
NASD Investor Alert - Protect Your Online Brokerage Account: Safety Should Come First When Logging In and Out
NASD Investor Alert - Well-Traveled Fraud: Advance Fee-Scams Target Non-U.S. Investors Using Fake Regulator Web Sites and False Broker Identities
FDIC Consumer Alert - ID Theft: Strategies and Help for Fighting Back
http://www.sec.gov/investor/pubs/onlinebrokerage.htm
--------------------------------------------------------------------------------
Home | Previous Page Modified: 11/03/2005
JustMoreMoaning ....................................
or should I say buffetguy, sorosman, and race X trixie?
As trance used to say: "PUTZ !"
dig space, to set the record straight .....................
While you were trying to make a positive case for Wave's revenue, your post came across as though you didn't believe snackman.
Well, the chap at STMicro is their head of media relations. The investor was me. And, just to make things interesting, today I received an email from STMicro in Europe confirming that since the July press release they have shipped a "few million" TPM v1.2s.
Sounds like a million a month, and this should show up in the Q3 report next week...... if you believe me.
FM
Seagate Momentus 5400 news.............
Seagate Momentus 5400 RPM and 7200 RPM Hard Drives Power New High-Performance Alienware Notebook PC's
Wednesday November 2, 7:59 am ET
Up to 240GB Capacity Available in New Dual-Drive Notebooks, Providing Capacity, Speed and Strong Data Protection
SCOTTS VALLEY, Calif., Nov. 2 /PRNewswire-FirstCall/ -- Seagate Technology (NYSE: STX - News), the world's leading supplier of disc drives, today announced that Alienware, a leading maker of high-powered desktop and notebook PCs, has selected the Seagate Momentus 5400.2 120GB and Momentus 7200.1 100GB and 80GB hard drives for new Alienware notebooks. The 2.5-inch Momentus disc drives combine a fast, power-thrifty design with the largest capacities available in their class to enable high-performance Alienware notebooks for mainstream desktop PC applications and bandwidth-hungry environments such as 3D animation and post production.
Stock Picks based
on Insider Trading.
Users can order Alienware notebooks with either the 7200 RPM or 5400 RPM Momentus disc drives and add a second Momentus drive to the high-end models for greater performance, storage capacity (RAID 0) and robust data protection (RAID 1). In dual-drive configurations, the Momentus 7200.1 delivers 200GB of capacity and 240GB with the Momentus 5400.2 disc drive. Seagate Momentus drives will be offered with the Alienware MJ-12 m7700 workstation, Area-51 m7700 mobile desktop, and Sentia notebooks.
Seagate Momentus drives deliver the ruggedness, power-thrifty design and whisper-quiet operation that are redefining mobile computing and fueling growing demand for notebook computers that deliver desktop PC capabilities. Using the highest-performance hard drives, processors and video cards available for PCs, Alienware caters to multimedia professional, business users and video game enthusiasts who demand high-end systems made with state-of-the-art components.
"With its Momentus disc drives, its little wonder that Seagate quickly has become a powerhouse to reckon with in the notebook drive market," said Patrick Cooper, director of product management for Alienware Corporation. "Momentus is critical in delivering the horsepower Alienware notebooks need to deliver true desktop PC performance."
"More system builders like Alienware are turning to Seagate for notebook disc drives that enable mobile computers with the highest levels of capacity, performance, reliability, shock tolerance and power-efficiency," said Brian Dexheimer, Seagate executive vice president of Global Sales and Marketing. "For Alienware, Seagate's first-to-market leadership was also key in their selection of Momentus drives. Seagate is first to ship a 120GB 5400RPM notebook drive and remains the only company to ship a 100GB 7200-RPM notebook drive in volume."
Seagate is strengthening its position in the mobile computing market with the introduction of Momentus 5400.3, the world's first 2.5-inch notebook drive built on perpendicular recording technology to deliver 160GB of capacity. Seagate also announced the first disc drive -- Momentus 5400 FDE (Full Disc Encryption) -- with strong, transparent hardware-based data protection that prevents unauthorized access to notebook computer data. Robust notebook security is increasingly important as thefts of notebooks with sensitive personal and business information continue to rise, with companies incurring millions of dollars of losses in lost or stolen trade secrets and intellectual property and individuals facing the high cost of identify theft.
About Alienware
Alienware manufactures high-performance desktop, notebook, media center, server, and professional systems. Alienware offers unique and award-winning products that incorporate state-of-the-art components, innovative engineering and design, and unprecedented customer service. Alienware systems are available direct within the United States, Europe, Australia, and New Zealand, and will soon be offered in other locations around the Pacific Rim. For more information, please visit www.alienware.com or call 1-800-ALIENWARE (254- 3692).
About Seagate
Seagate is the worldwide leader in the design, manufacturing and marketing of hard disc drives, providing products for a wide-range of Enterprise, Desktop, Mobile Computing, and Consumer Electronics applications. Seagate's business model leverages technology leadership and world-class manufacturing to deliver industry-leading innovation and quality to its global customers, and to be the low cost producer in all markets in which it participates. The company is committed to providing award-winning products, customer support and reliability to meet the world's growing demand for information storage. Seagate can be found around the globe and at www.seagate.com.
Goodgerm, you wrote:
There HAS to be some serious validation and proof of concept via revenues to keep stock price, community and dream from continued erosion.
Your point is well-taken, but not original. SKS is aware and has admitted that at this price and market cap Wave cannot continually go to the well.
FM
Nice response, Rachelelise,
But I do believe that sks does have the present situation in his sights, too. My post relates more to where this company is going under his stewardship.
My opinion is that he is well-aware of the present-day dynamics and the challenges presented.
I really sense that he understands, that after all this time, he is hanging on that rung with us.
FM
barge,
Interestingly, there was some discussion of gaming and xBox, piracy, delivery, and security, but I was focused on some other points.
Sorry I can't add to the discussion.
FM
Weby, as in grid-computing? e/
Vader,
I am starting to wonder if you actually understand Wave's business plan. You understand part of their strategy in executing the plan, but I think you may not grasp totally their articulated model.
As some background, I've been through the days of the WaveMeter. I was around and watched that morph into the EMBASSY chip. We longtime wavoids were disappointed that EMBASSY, while providing an "elegant" solution, was too expensive to be adopted by the PC OEMs after the Y2K buying spree had exhausted most corporate budgets for years to come.
Then, the TCPA redefined itself and emerges as the Trusted Computing Group, where all memebers have an equal vote. It was around this time that SKS began to talk about Trusted Platform Modules.... long, long, long before anybody in the mainstream tech world had a clue as to what they were. I know... because I was at the lunch. Much of the discussion involved lofty projections about how these little TPMs would be produced cheaply, in volume, and find their way onto ANY DEVICE that touched the internet... and you know what those devices are and how ubiquitous they've become.
About 14 months ago, I again attended a meeting where sks was speaking. This was about the time when the first few articles about TPMs began to appear. SKS' remarks at this gathering went beyond the previous discussion of "how do I get TPMs on every device that connects to the internet?" He was already anticipating they would. This time, it was, "okay, I can reach out and touch a BILLION endpoints. What can I do with them? What is my business model going to look like?" Not long after, Dell made their famous announcement supporting TPMs and as SKS likes to say, "the book-ends were put around the discussion about the future of TPMs". TPMs were going to happen in a BIG way.
More recently, at yet another meeting, SKS made a rather dramatic statement by saying, "in my model, I have to assume that at some point the revenue to Wave from these TPM "deals" will be zero". That, Vader, is market saturation, and there are plenty of historical examples as to why this will happen.
So here will be Wave, no longer getting paid for bundling deals but sitting atop a vast universe of TPM-enabled PCs, notebooks, tablets, phones, gaming platforms, set-top boxes, hard-drives, etc. Which brings me back to SKS' question above, "what is my business model going to look like?"
I'm glad I was there to hear the answer. Once TPMs are as prevalent as the space bar on your keyboard, Wave will resemble a cable company. Think about it: a cable company has a satellite receiver and a bunch of wires going into a set top box. If you are a paying customer, you'll be able to receive some level of content. Where does the content come from?? The cable companies don't produce ANYTHING, but HBO does, MTV does, World Wide Wresting does, and they all come to the cable companies to distribute this "content".
So, for the moment, we need the bundling deals to get us to the next level. Wave, my friend, is all about providing content to a billion endpoints. It can be audio, video, software, text, whatever, but let me tell you something: SKS is living in the year 2009 and has a vision about how Wave can leverage this vast, yet developing, installed TPM base. I'm just glad he can come back to the present once in a while to share it.
Fullmoon
scorpio_esq
I'm glad you've revived your old handle! I couldn't pronounce that mukwangonango-thingey..... besides, it reminded me of malagulu!!
FM
jmm1112, how's the hunt for a new alias going? e/
Eamonn..............
They're not that much larger than Wave... LOL
As a company with quarterly sales of over $2.2 million
jmm1112, you have some 'splainin' to do ................
let's start with the multiple aliases
eamonn, eamonn, eamonn...........................
VH brings everything to light on this board.
I propose that Vacationhouse should change handles to LIGHTHOUSE !!!!!!!!!!
New yearly high / New yearly low
just an observation, nothing more
Lenovo @ $10 / Gateway @ $2.35
Product Watch: Speedy tech tools
http://www.zdnetasia.com/smb/news/0,39043754,39284865,00.htm
By Staff, ZDNet Asia
Wednesday, October 26 2005 07:46 AM
Time is of the essence and the following vendors clearly understand businesses' need for speed. Check out their latest products powered to run faster than before.
Stay mobile with Fujitsu
The new Lifebook P7120 sub-compact notebook is remarkably small and light. At just 25mm in width, the latest Fujitsu computer weighs only 1.38kg.
The notebook is based on the latest Sonoma platform and features a dual-layer DVD Super Multi drive that pops out from the side at the touch of a button. Connectivity is varied, with three USB 2.0 ports, FireWire and memory card support. The notebook is also packed with built-in 802.11a/b/g support and Bluetooth.
To keep data secure, the P7120 comes with biometric fingerprint sensor and Trusted Module Platform (TPM) security chip.
Prices are unavailable at press time.
Is security the next antitrust battle for Microsoft?
(edit: Maybe security vendors won't be subsumed)
http://www.itworldcanada.com/a/News/77968e12-a60a-4c78-8f89-ff33add56748.html
By: Jeremy Kirk
IDG News Service (London Bureau) (13 Oct 2005)
Microsoft Corp.'s moves into the security software market could be an agitator for more antitrust concerns over how it uses its market strength for other software offerings.
Last week, the Redmond, Washington, company announced a new product for businesses called Microsoft Client Protection, a beta version of which will be released before the end of the year. Also in the pipeline is Windows OneCare Live, an antivirus and spyware product for consumers due for a public beta release later this year.
The products are the fruit of Microsoft's commitment more than two years ago to offer antivirus products, which included acquiring antispyware technology and firms such as Sybari Software Inc. earlier this year and the Romanian antivirus software developer GeCAD Software SRL in 2003.
One European antitrust lawyer sees the move into security software as another attempt by Microsoft to take advantage of its strength in operating systems in order to extend that strength into neighbouring markets. "It's the classic issue of what is the end of the legitimate scope of Microsoft's dominance," said Anthony Woolich, head of the European Union competition team at Lawrence Graham LLP in London.
Microsoft's Windows Vista OS will have security features that help protect computers from viruses, worms and spyware, according to the company's Web site. But what security features will be in Vista and how those are tied to the operating system and interact with other products could be key.
The company plans to sell OneCare as an add-on annual subscription for Windows XP and Vista, said Rebecca Smith, spokeswoman, in an e-mail response to a query.
Complaints against Microsoft in the European Commission last year showed that if a product can be sourced independently, "that would suggest it is a separate market," Woolich said. It would mean that a potential argument that security features are an integral part of an operating system may not apply in an antitrust battle, Woolich said.
Symantec Corp. said last week that it has provided information to the European Commission. Jonathan Todd, spokesman European Union Competition Commissioner Neelie Kroes, said Friday that as a matter of practice he can't confirm ongoing investigations by the Commission.
Symantec Chief Executive Officer John Thompson on Tuesday confirmed documents were given to the Commission but sought to dampen speculation that a court fight was brewing. Symantec's relationship with Microsoft is one of "mutual dependency," he said, and that the company is not involved in a Commission investigation.
An earlier investigation into software bundling led, in May 2004, to the Commission ordering Microsoft to sell a version of Windows without its Media Player software and to offer licensing protocols used by its workgroup server software. The company was fined a record ၬ497 million (US$596 million).
The ruling found that Microsoft abused its dominant market position by bundling its Media Player software with its OS without a legitimate business justification. The decision is on appeal to the European Court of First Instance.
But the ruling by the Commission only applied to Microsoft's bundling of the Media Player software, said Davina Garrod, a competition and regulatory lawyer with McDermott Will and Emery in London.
"The decision is limited to the facts of the case and so does not prohibit Microsoft from bundling other products with its OS if it wants," Garrod said.
Investment bank Goldman Sachs issued a statement Friday saying Microsoft appears to be trying to stay away from antitrust problems as it increases its security efforts. The company has not announced its security intentions for Vista, so it is "clear that there is not even an issue here," the report said.
But Microsoft must be cognizant of the Commission, as the precedent set could require the company to unbundle features it doesn't want to, such as security, Goldman Sachs said. U.S. antitrust law tends to permit the integration of additional features that benefit consumers -- such as adding a radiator to a car -- as long as it is not done with monopolist intent, the report said.
Copyright 2005
ITworldcanada.com
jmm1112,
I really don't know what you mean by "assurances". It doesn't answer the question I posed to you, namely that the portion of your post to which I was refering is absolute jibberish.
California Highway Patrol Nabs Gateway's Convertible Notebooks
Gateway Selected for Its Unmatched Customer Service and Willingness to Meet the Organization's Unique Challenges
IRVINE, Calif., Oct 19, 2005 /PRNewswire-FirstCall via COMTEX/ -- Gateway, the
nation's third largest PC company, was selected by the California Highway Patrol
(CHP) to bring convertible notebook technology to one of the nation's most
renowned law enforcement agencies. The $1.7 million deal for Gateway's
convertible notebooks was secured based on the company's responsiveness and
sales service to the organization.
The deal with the CHP marks one of many that Gateway has secured since winning
approval as a select vendor of the California Strategic Sourcing Initiative
(CSSI). The initiative allows state agencies to consolidate their purchasing
power and create common computing environments for increased buying power.
Gateway was chosen to provide technology across three major categories --
desktops, notebooks and is the only vendor chosen to provide displays as a
stand-alone purchase to statewide and affiliated organizations.
"The California Highway Patrol realizes the importance of working with an
organization that is willing to meet its unique needs," said Vin Riera, vice
president of government sales, Gateway. "We are very excited that we were able
to address the challenge head on, with not only product innovation, but with the
standard way we do business."
The CHP plans to place 1,088 Gateway convertible notebooks in patrol vehicles to
assist officers in accessing the Department of Motor Vehicles (DMV) and Common
Law Enforcement Telecommunications Systems (CLETS) databases and to efficiently
communicate with dispatch centers alleviating large amounts of radio traffic.
The notebooks also allow officers to prepare and submit all of the necessary
reports required during their work shift. The device's form factor enables the
CHP to take advantage of the vehicle's existing notebook brackets for
cost-effective and faster installation. Additionally, Gateway will provide the
CHP with an extended 4-year warranty(1) on the systems.
Business Services
Gateway provides a comprehensive array of services specifically designed to meet
the needs of businesses and institutions including a Three-Year Parts and Labor,
Three-Year On-site, Next-Business-Day Limited Warranty (1). Gateway's optional
two or four-hour on-site response program provides a heightened level of support
for businesses needing maximum up-time.(2) Gateway offers a range of service
programs including 24x7 phone support through a dedicated team of MCSE, CNE and
Linux certified technicians. Gateway also provides end-to-end services for a
range of business needs, including hardware and software installation, network
configuration development, network and system integration, training, security,
and system maintenance.
Gateway Professional
From value-priced servers to ultra-reliable desktops to comprehensive services,
Gateway has served organizations for 20 years. Gateway makes technology
purchase, use and support simple through the programs developed for education,
government, business customers as well as the ProNet Partner Program bringing
channel-friendly benefits to help solution providers strengthen and grow their
businesses. Gateway customers include many of the world's leading organizations,
such as the U.S. Defense Logistics Agency, the University of Arizona, state of
California, state of New York and others. For more information on Gateway
Professional solutions, visit http://www.gateway.com/business.
Interesting TPM blog:
http://www.opensubscriber.com/message/muscle@lists.musclecard.com/2244289.html
Re: [Muscle] 7816 TPMs from China?
Peter Williams
Thu, 29 Sep 2005 07:35:02 -0700
The infamous ST micro TPM also has a "7816" feature. Various subtle signals suggested the SINOSUN design team was influenced by the ST architecture: or, there was OEMming involved.
its just not clear in either high-level spec (from the SinoSUn or ST) whether the 7816 is for connecting TO smartcards, or is an alternative to the LPC bus interface.
For the bio _reader_ market, where the TPM plays the role of the traditional Gemplus reader controller, it would make sense for the reader-TPM to have
(a) an USB SIE
(b) support for some TPM-specific USB class of endpoint support
(c) GPIO/SPI for interfacing to the finger sensor
(d) OUTBAND 7816 to interface, classically to a 7816 device in module form.
Whether the 7816 channel could be used to interface (on a staked die, perhaps) to an 7816 co-processor PERFORMING part of the TPM function is presumably a matter for the TPM firmware, on the 8bit controller.
We could see this category of reader chip as either:
(a) the TPM chip performs the role of a traditional reader + SAM(s)
(b) the TPM chip interfaces to another TPM on the _inserted_ card of a user, over 7816, in some way, supporting a partioned, Network-TCB architecture (c) (a) and (b) merge somehow, when core TPM functions "recognize" SAM modules.
I asked the govt sales rep from Wave Systems about this notion: shall a TPM talk unto a smartcard? I got a cagey answer; but he did admit that "work was ongoing". I asked the question: can motherboard TPM ever support authenticating a user id token, bound to the OS via CCID. I didnt ask about the SAM concept, tho, for PC readers or phones/PDAs.
I know one software company that is doing javacard + GPIO work, for a major chip manufacturer. In fact, they specifically mentioned the device was was "firmware + GPIO", PLUS javacard capability, rather than javacard shall drive the GPIO directly. That could reflect a "TPM + Javacard SAM" multiple die controller, if you think about it.
Interesting. Ill go digging some more, with a local expert in TPM + bio goings on.
From: Axel Heider <[EMAIL PROTECTED]>
Reply-To: MUSCLE <muscle@lists.musclecard.com>
To: MUSCLE <muscle@lists.musclecard.com>
Subject: Re: [Muscle] 7816 TPMs from China?
Date: Thu, 29 Sep 2005 14:50:29 +0200
Peter,
> Now, for the internal China market, we have (from a local
> China designer/manufacturer)
> https://www.trustedcomputinggroup.org/ShowcaseApp/sh_catalog_files/4b16e66a5d4ad26ea97bc62d52efc792095d0211/SSX35%20Product%20Description%20-%20Summary%20Mar.05.pdf
> So, do we now have a 7816 interface to TPMs?
> Presumably, there is a set of APDUs too? are they standardized in any
> forum?
That sounds really interesting. I've looked at their website
http://www.sinosun.com.cn , but it does not contain much more
information. Anyway, "serial interface in conformance to
ISO 7816 Standard" sounds a little bit strange to me without
giving further details. Does not say anything about APDUs - maybe
they refer only to electrical characteristics. This could mean,
that a modified smartcard reader firmware (which allows sending
not only APDUs, but also TPM commands according to the published
TCG specs) could be used to access the chip.
So far, I'm not aware of any APDU standards from TCG. On the other
side, putting TPM commands in ISO7816 APDUs could work. The question
remains, if (or in which scenario) a smartcard-TPM would really make
sense, because it is no longer fixed to a specific platform. In this
case, I can see no real advantage compared to existing smartcards.
If you get further information about this SSX35 chip, it would ne nice
if you post them here or notify me.
--
mfg Axel Heider
Civilization is just a temporary failure of entropy.
_______________________________________________
Muscle mailing list
Muscle@lists.musclecard.com
http://lists.drizzle.com/mailman/listinfo/muscle
j-hummmmm1112
Just what the heck were you trying to convey in this nonsensical statement?:
that said, who knows how shareholder value considerations factors in when considering how knowledge of contracts is "released".
Are you just trying to seem, well, intelligent?
Wavxmaster, that is no joke,
barge fully intends to infiltrate the meeting, but he is ill-prepared. If you look closely at the badge, it is registered to one "Howard B. Golden, Memeber, Trusted Computing Group".
The nose came from Maurice Chevallier, courtesy of the Hollywood Wax Museum !
trustco,
right, whatever. I still have the video..........
I need help from the iHub linguists..........
Would I be considered "dyslexic" in confusing jmm1112
with mjan112? One, I like, the other was born yesterday (really)
fm
trustco, this is news to you?
welcome to the IT world. This is a
situation that the TCG is attempting to overcome
day-by-day, inquiry-by-inquiry, case-by-case.....
Tell your "source" to contact the TCG, Dell, Envoy, Cubic, Maximus, Seagate, etc.
You might mention something to your GEEK-friend about VISTA logo-compliance.... .
Is your divorce final? Last time we met you were in such a bad mood!! .............
Windows Into the Future
http://abcnews.go.com/Technology/print?id=1206570
Find out what's in store for the next decaddand beyondof Windows computing. The possibilities may surprise you.
Michael J. Miller - PC Magazine
Oct. 12 -
As developers at Microsoft are busy readying Windows Vista for release in the second half of 2006, the company's top visionaries are already imagining how the operating system will evolve post-Vista. In early September, I met with several of Microsoft's top thinkers at the company's Redmond campus to see where Windows is headed over the next couple of decades. There is certainly no shortage of ideas, yet their overarching goal is to develop a stateless computing environment in which users can move freely among their home computer, work computer, smartphone, handheld, and other gadgets that will surely emerge. Their ideas may be dreams for now but offer a fascinating look into our digital future.
As Microsoft chairman and chief software architect Bill Gates describes stateless computing, "In the future, things are going to be far more user-centric. You'll have a computer at work, a computer at home, a phone, and other devices. And instead of your statdနyour documents, your contacts, your schedulebeing on a single computer, you'll really want everything to be available to you on every device." That's a tall order for an operating system created when our computing needs were much simpler. As Gates explains, "Windows was written to run on a single computer, and then networking was added to connect to other computers."
In theory, stateless computing will offer relief from many of today's frustrations. Says MSN chief Yusuf Mehdi, senior vice president, MSN Information Services, "It kills me that today I can provide users access to more than 5 billion documents, but I can't get the pictures off my home computer to show them to you right now."
A stateless computing environment offers many other advantages, but it will take at least a decade to get there. "The whole notion of stateless computing, where laptops and desktops are cached, and your state is something that's easy to annotate, mail around, back up, retrievdနthat's a ten-year proposition," says Chris Jones, corporate vice president of Windows Core Operating Systems Development. "That's when I can say, 'Back up all my stuff to there, shoot that laptop, plug in a new laptop' and get my state back."
Also driving the need for integration is the phenomenal surge in Internet usage. "We used to think about content and then about mobile desktop applications," says David Cole, senior vice president, MSN and Personal Services Group. "But take photos: Are they purely a desktop experience or are they a purely Internet experience? They're very much blended across the two." Yet the interfaces for working with images are different on a camera, phone, PC, and the Internet. One of Cole's objectives is a single "people-centric" user interface that's consistent across all these environments.
Effectively pulling together such an integrated system from a user-interface perspective is critical, says Joe Belifore, who heads Microsoft's eHome division. "I want consumers to see their PC as a device that really is the nerve center of their home and their digital existence." He imagines a scenario in which you're driving your car and you tell your hands-free cell phone to ask your PC to let you know the gate number of your arriving flight. "I think we will see that happen in the next ten years."
Of course, Microsoft needs to do a lot of work between now and then so that Windows can deal effectively with the latest hardware advances, such as 64-bit-capable processors, multicore processors, and hardware-based virtualization. The big challenge with the transition to 64-bit computing is writing new drivers so existing hardware continues to work. Workstations will go 64-bit first, followed by consumer desktops. Eventually, video editing, photo editing, music, and games will get there. "But it's not going to be overnight," says Cole. "The day that the real end-user value exceeds the cost is the day that people will move."
An even more fundamental shift is to multicore processors. As Jim Allchin, copresident, Microsoft Platforms and Services Division, points out, "We're moving from dual-core to multi-core to many-core systems, meaning more cores than you know what to do with." Multicore processors let you run several different processes at once. "That gives us an opportunity to do some new algorithms that may let us start to emulate human processing in a better way, because humans obviously are operating in a concurrent, parallel way all the time," he says.
Another technology we can look forward to is virtualization, essentially multiple virtual machines (VMs) running independently and communicating with each other. "Why isn't my office PC also my phone?" asks Jones. With virtualization, one of the VMs in your PC is the phone software, and it's completely isolated from the rest of the system.
WinFS: A Multitalented File System
Another major transition under way is the move to WinFS, an object-oriented file system originally slated to be part of Vista. "The dream is to have a common schema so that the data is not trapped inside the applications," says Allchin. With WinFS, applications can take advantage of one common schema set that they can manipulate, and contents can be joined with other types of business informatiomနanything from personnel records to purchase orders.
For this to happen, Microsoft needs great underlying database technology, object-relational mapping, developer tools, the right security model, and the right understanding of how to deal with older dat`not to mention compatibility with existing applications. "It's a wicked hard problem," says Allchin.
Windows also needs to keep up with the increasing demands for server power and storage requirements. "We use the Windows server to power our Internet platform, so our search system runs on Windows 64-bit. We think it has a competitive advantage over Google. We like the way it scales; we like the way it's easily managed and low-cost."
As for the future, Allchin thinks big. "I'd like to offer infinite storage for every person on the planet. And I'd like to make it easily indexable and bindable. I'd like to have multiple copies of the entire Internet on the server so we can do testing and applications."
A Different Kind of Application
Microsoft is also concentrating its efforts on tying together different machines and different kinds of information, connecting back-end information and productivity applications. "Business intelligence, work-flow, and document management are all part of what we call the new world of work. People want to communicate and collaborate across boundaries. They want to have access to information anytime, anywhere," says Jeff Raikes, president, Microsoft Business Division.
That's why Microsoft has made huge investments in real-time communications and collaboration. Microsoft's applications business knows a thing or two about converting analog processes into digital processes. Just think word processing, databases, and spreadsheets. Now the company is gearing up to do the same with telephony. "Today the whole world of telephony infrastructure is very analog," says Raikes. "It's going to become digital and a part of the overall productivity framework.
Meanwhile, MSN's Mehdi wants to see better ways to navigate. "Like in Minority Report. I'd like to be able to move through the data on the Internet with that kind of visualization. Maybe I can talk to the thing; maybe I can project 3D views and touch the data."
Such advances in user interfaces could dramatically change how we interact with our computers. Allchin imagines that with some significant breakthroughs, we'll have user interfaces that we'll control by moving our eyes, gesturing, or pointing. "Being able to point at things without even touching them seems huge. It would be nice to have a wall that you can point to in your room. We have some prototypes of this stuff around here now in research. I think they're within reach," says Allchin.
Microsoft research chief Rick Rashid spends most of his time thinking about where technology is headed and has some pretty far-out ideas for future user interfaces. "Any surface that you might have been using for interaction, like a whiteboard, can suddenly become a way of accessing your computer. Let's say I put PC Magazine down on the table. The system will recognize what magazine it is and what issue it is, and bring up articles and things related to it."
Ray Ozzie, Microsoft chief technology officer, would like applications and machines to connect more easily and securely. In the early days of the Internet, "I could open a session from a program on my computer to a program on your computer. You can't do that anymore. There are firewalls and all sorts of roadblocks, for good reason," he says. "There would be more innovation, arguably, if it was easier to write software that let peopldin a trusted, safe waxနinteract with one another directly. Everybody who does this cross-firewall thing has to do an immense amount of work to make it happen."
Automating Software...And Your Life
With research under way on several fronts, from stateless computing to in- novative user interfaces, Microsoft is exploring another frontier: automated pro- gramming tools that can prove whether a program works correctly. Ozzie recounts that when Microsoft bought Groove, the collaboration software he developed at Groove Networks, Microsoft had to bring it into compliance from a security standpoint with analysis tools that helped identify bugs in the code. The tools dramatically increased both the quality of the code and programmer productivity.
"Holy cow, did they have tools," Ozzie recalls. "It blew me away. I had no idea these things could be so good." While the next release of VisualStudio.Net is slated to include versions of these tools, the hope is that they'll be everywhere. They're based on work begun at Microsoft Research. Rashid considers the group's progress on proving various capabilities of programs as one of its big successes in recent years. For instance, the Vista Device Driver Kit includes a module that helps device drivers prove that their driver meets certain criteria. Now the group is working to prove properties of larger scale systems.
"We're still a ways away from being able to state every property and being able to write every specification that we need for all aspects of the systems," Rashid says. He hopes that ten years from now programmers will be able to make very strong statements about what application features will and will not do and then to prove those statements mathematically, rather than having to test the features.
The work in computer-generated programming promises to improve application development over the next few years. Says Allchin, "It's not going to be some dramatic thing, but if I look out 10 or 20 years, it's going to play a factor in how programs are written. Machines are going to help you, just like we're using machines to help build software now."
Further out, Rashid imagines a future in which everything you've ever typed, every picture you've ever taken, every word you've ever spoken, and every conversation you've ever held becomes a part of the permanent record of your life. "You can keep about a year's worth of what you see through your eyes in a terabyte disk. It won't be long now before you start to think of that as an archaically small amount of storage," Rashid says.
In pursuit of this vision, Microsoft Research has developed the SenseCam, which snaps a picture every time something changes in your environment, even the temperature. "You could have a complete record from the time you were born. If you want it, we're not that far," Rashid adds.
Perhaps that time frame is too optimistic, but one thing is more certain: The ideas bubbling up at Microsoft today promise a radically improved user experience for the future. As Mehdi puts it: "People think there's not a lot left to be done. I think there's a massive amount to be done.
Q3: Just a reminder ......................
"To-date, 2005 has been a period of important milestones for Wave as we have extended our market reach with some of the largest and most important companies in the industry. With the release of the new 1.2 Trusted Platform Module (TPM) specification and the commencement of initial shipments by some vendors, we believe the momentum for broad scale adoption of trusted computing solutions will now accelerate.
Importantly, our partners' shipping volumes for trusted computing products incorporating Wave technology have increased in the second quarter, and we believe they will continue to increase in the third quarter."
VH, that's my point
It's not working now. BTW, I was wondering, do you ever sleep. You snag all the good stories! Good sleuthing!
FM
VH,
Interesting to note that I just went to the new and improved TCG site, and under news there's a tab for the TNC Use Case stuff. Click on that and you'll get an error message.
Maybe the story was released pre-maturely?