Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Vader,
I was told by one of the biggest stock market speculators of the last century (right, about 6 years ago!) that those who play the market should use play money. In other words, money that they can afford to lose.
The tenor of your posts suggests you've used something else.
FM
Go,
I think I just explained it ................
OTish: Secure Elements Joins Trusted Computing Group
http://www.prweb.com/releases/2005/9/prweb287394.htm
Leader in vulnerability and compliance management commits to advancing industry standards to protect heterogeneous mobile and fixed endpoints.
Herndon, VA (PRWEB via PR Web Direct) September 20, 2005 -- Secure Elements, Inc., a leader in enterprise vulnerability management and compliance risk reduction solutions, has joined Trusted Computing Group(TCG), a non-profit organization devoted to the creation of standards for strengthening computing platforms against software based attacks.
Traditional security approaches have left computing platforms vulnerable to malicious attacks, virtual or physical theft, and loss, said Brian Berger, TCG marketing work group chair.Secure Elements' expertise with active protection technologies for all classes of assets will be a valuable contribution in the development of future specifications and products in this area-ဝ
Secure Elements' C5 Enterprise Vulnerability Management Suite includes modules for asset, compliance, policy, and vulnerability management, and provides several policy enforcement points for endpoint access control. The company continues to drive innovation within the industry, and membership in TCG will help ensure those innovations will evolve in lockstep with security standards, minimizing barriers to adoption.
Secure Elements is excited about joining other industry leaders in driving standards for trusted computing and security technologies+ said Andrew Bove, vice president of development.Secure and trusted computing dictates a solution that synthesizes asset management with vulnerability and compliance enforcement before enabling a trusted network connection. Given the adoption of wireless technologies and its affect on the pervasiveness of computing platforms at risk, industry leaders agree that supporting and adopting standards such as TCG are in the best interest of the marketplace-ဝ
More than 110 companies are current TCG members, including industry leaders such as Citrix Systems, Dell, Hewlett-Packard, IBM, Intel Corporation, Foundstone (McAfee), Juniper Networks, MCI, Microsoft, Nokia, SafeNet, and Sun Microsystems and many leading mobile systems and services vendors. TCG has active groups for PCs, mobile devices, servers, the network, storage and peripherals.
About Trusted Computing Group
TCG is an industry standards body formed to develop, define, and promote open standards for trusted computing and security technologies, including hardware building blocks and software interfaces, across multiple platforms, peripherals, and devices. TCG specifications are designed to enable more secure computing environments without compromising functional integrity with the primary goal of helping users to protect their information assets from compromise due to external software attack and physical theft. More information and the organization's specifications are available at the Trusted Computing Group's website, www.trustedcomputinggroup.org.
About Secure Elements
Secure Elements is an enterprise vulnerability management and compliance risk reduction leader, automating security remediation strategies and tactics across the entire enterprise, reducing business risk and IT management costs while improving systems performance and maintaining business continuity. Protecting mission critical and network infrastructure assets from both known and unknown attacks without limiting operational performance, the company rapidly identifies and intelligently responds to complex and diverse security incidents. Using real-time threat intelligence data and analysis, Secure Elements provides administrators with optimal security control across the enterprise. For more information, please visit www.secure-elements.com or call 1-800-709-5011.
NoFigure, somehow I thought that, after
all the time you've spent reading (and picking apart) the many posts about Wave's technology, you would've learned just the basics. Well, that's what I get for being an optimist......
As you are probably not aware, smart cards and digital certificates, which are used for identification of users, have their own life cycle management processes which must be managed as part of the overall data base and access control software in servers such as MS Active Directory, and Internet Access Servers. In the post that snackman surfaced, and efs reiterated, it looks like Microsoft is enhancing their capabilities for managing these. Wave's latest version of EMBASSY Trust Suite's Security Center, which handles the multifactor authentication of the user's identity, supports both smart cards and TPM based digital certificates, along with biometrics and passwords for authentication. Wave integrates with Microsoft's various servers including Active Directory. So, in my opinion, Wave appears to be well-positioned for these directions.
Can you reference just one post where you've provided, well, something of value??
For our "wireless contingent" here on iHub:
From Motorola, recent, with a lot of TPM-mention:
http://www.cdg.org/news/events/CDMASeminar/050513_Tech_Forum/8%20LChen_Motorola.pdf
Interoperability Defined by Healthcare Community
Sound like any technology we know??
Alliance officials announced last week that a large segment of the healthcare community has reached a consensus on a definition of interoperability: "In healthcare, interoperability is the ability of different information technology systems and software applications to communicate, to exchange data accurately, effectively and consistently, and to use the information that has been exchanged."
http://www.bio-itworld.com/hitw/newsletters/2005/07/12/14168
Interoperability Defined by Healthcare Community
July 12, 2005 |
Some 40 entities across the healthcare sector have endorsed a definition of interoperability that is seen as an important building block for full regional and national health information exchange.
"It's a small step but it's a step that needs to be done early in the journey," explains Rod Piechowski, vice president for technology leadership at the National Alliance for Health Information Technology (NAHIT, or simply the Alliance), a Chicago-based partnership of organizations with an interest in health-IT.
Alliance officials announced last week that a large segment of the healthcare community has reached a consensus on a definition of interoperability: "In healthcare, interoperability is the ability of different information technology systems and software applications to communicate, to exchange data accurately, effectively and consistently, and to use the information that has been exchanged."
The single-paragraph definition is part of a two-page explanatory paper that is not yet posted on the Internet. In that paper, the Alliance cites the four levels of interoperability described by the Center for Information Technology Leadership (CITL).
CITL has reported that a nationwide infrastructure of fully interoperable, standardized health-IT could save Americans $77.8 billion a year. (See http://www.bio-itworld.com/newsletters/healthit/2005/02/01/20050201_11762?printer-friendly-view=1.)
According to Piechowski, "We wanted to come up with a definition that could be used by people who don't do IT for a living." including politicians, healthcare policy-makers, and the general public. "We didn't want it to be a mystery what we were bandying about," he says.
"This really was meant to be something that could be found in a glossary or dictionary," Piechowski says. Going beyond that, he explains, would move it into the realm of an implementation guide.
"The exercise here is to demonstrate that healthcare can work well across the spectrum of stakeholders to agree on something so basic," Piechowski says. "We're not constrained because we're not getting into many of the details you would if you were developing a standard."
Groups offering their endorsement of the definition include the American Hospital Association, the American Medical Association, the American Medical Informatics Association, the Blue Cross Blue Shield Association, plus consulting firms, technology vendors, and healthcare delivery networks in several regions.
Piechowski says that the Alliance will submit the definition to the Office of the National Coordinator for Health Information Technology this week and also will send copies to Health and Human Services Secretary Mike Leavitt and to members of Congress with an interest in health-IT issues.
The congressionally chartered Commission on Systemic Interoperability and the Certification Commission for Healthcare Information Technology also will receive copies. Alliance president and chief executive Scott Wallace chairs the interoperability commission.
CTIA WIRELESS/Wave Systems
I.T. & Entertainment 2005 event in San Francisco, CTIA-The Wireless
Association(TM) will team with Trusted Computing Group Members, AuthenTec,
Inc., Nokia, Wave Systems and others in the mobile market to host a seminar
addressing wireless security and the protection of user data and content.
"Security and Mobile Devices: What You Need to Know to Build Secure Systems
and to Protect User Data and Content" will be held on Tuesday, September 27
from 1:00 p.m. - 5:00 p.m.
The security of wireless devices and software remains a top priority of the
wireless industry. During this half-day seminar, security and wireless experts
will discuss the role of industry standards as well as next steps to ensure
wireless data and transactions are safe.
"The wireless industry takes seriously its responsibility to protect the
more than 195 million wireless devices in use today in the United States,"
said Steve Largent, President & CEO of CTIA. "Through discussions such as this
seminar, the industry is determining the steps necessary to stay ahead of
potential security developments. Although breaches are rare, we will continue
to proactively protect the integrity of wireless handsets and devices."
The challenges and opportunities for wireless security in content,
transactions and potential solutions will be addressed in the seminar, as will
the work currently being done by the Trusted Computing Group, an industry
organization developing open specifications for security. Wireless industry
representatives will be available during the session for questions and
discussion. This seminar is open to all CTIA event attendees.
CTIA WIRELESS I.T. & Entertainment 2005, September 27-29, 2005 at Moscone
West in San Francisco, CA, is a comprehensive wireless data event, which
represents both sides of the industry - Enterprise and Consumer. From the
Enterprise side the focus is on integrating wireless technologies into the
enterprise and vertical business markets, such as healthcare, government,
automotive, retail, etc. Additionally, the show reflects the explosive growth
in wireless entertainment - encompassing everything from mobile content to
digital cameras and interactive games. Registration and complete event details
are now available at www.CTIA.org.
Note: Qualified reporters and research analysts interested in attending CTIA
WIRELESS I.T. & Entertainment 2005 can register online for FREE MEDIA
CREDENTIALS at www.CTIA.org. For questions on registration, please contact
Erin McGee at emcgee@ctia.org or by phone at 202.736.2980.
CTIA is the international association for the wireless telecommunications
industry, representing carriers, manufacturers and wireless Internet
providers.
www.ctia.org
OT: Intel Tightens Third-Quarter Forecast
Thursday September 8, 4:29 pm ET
By Matthew Fordahl, AP Technology Writer
Citing Continued Demand for the Chips That Power Notebook Computers, Intel Corp. Tightens Forecast
SAN JOSE, Calif. (AP) -- Citing continued demand for the chips that power notebook computers, Intel Corp. tightened the range of its third-quarter revenue forecast Thursday but kept the midpoint unchanged at $9.9 billion.
The world's largest maker PC microprocessors said it now expects revenue to be between $9.8 billion and $10 billion, compared with its previous estimate of $9.6 billion to $10.2 billion.
Wall Street analysts expect the Santa Clara, Calif.-based company to earn 36 cents per share on sales of $9.92 billion, according to a survey by Thomson Financial.
As with previous quarters, the company reported strong demand for its Centrino chips designed for wireless-enabled laptop computers. The chips, like the computers, carry a price premium over those built for desktops.
Intel said it continues to see double-digit year-over-year growth driven by notebook demand.
But some analysts are concerned that while demand is strong, Intel may be struggling to meet demand, particularly with chipsets that control communication between the processor and the rest of the computer.
Apjit Walia, a semiconductor analyst at RBC Capital Markets, said it appears the company has made some progress in easing the supply issue.
"However, we don't expect Intel to post a big upside to consensus estimates this quarter as we don't believe the supply issues have been fully resolved yet," he said in a research note.
The update was released after markets ended trading. Intel shares closed at $26.09, up 43 cents, or 1.7 percent, on the Nasdaq Stock Market. In after-hours trading, they lost 15 cents.
Intel investor relations: http://www.intc.com
OT: Gates/ VISTA
The next year will see Microsoft finally release Longhorn (now called Windows Vista), the next-generation version of the Windows platform.
Battle for control of the desktop will also be fierce as Google dips into the stash of cash from its recent IPO to fund acquisitions and new innovations in search and browser technology.
Agenda Setters: Where are they now... Bill Gates
It's been a year of philanthropy rather than blazing software trails...
By silicon.com
Published: Thursday 8 September 2005
As the countdown begins to silicon.com's sixth annual Agenda Setters poll of tech's 50 most influential individuals, it is time to look back at those individuals who held top 10 positions in 2004. Today we see what Microsoft's chairman and chief software architect has been up to.
Bill Gates may still regularly top lists of the world's richest people but the founder, chairman and chief software architect of the world's biggest software company has never made it to the top of silicon.com's annual Agenda Setters list in the five years it has been running. He came closest in 2003, when he was edged out of the top spot by arch-rival Steve Jobs.
Gates has spent more time this year on his philanthropic activities with the donation of $436m to fund research into fighting diseases such as malaria and TB.
Will this year see Gates reassert himself at the top of the tech tree or will yet another of the 'old guard' software company founders, along with Oracle's Larry Ellison and Sun's Scott McNealy, continue to fall away and lose touch with those who are classed as the industry's true Agenda Setters?
The initial impression looking back over the past 12 months is that it has been more a year of 'taking care of business' than blazing any trails for Gates and Microsoft, with tough battles being fought on several fronts.
Security and the Trustworthy Computing programme continue to eat up Redmond's resources, and barely a month has gone by without some critical Windows exploit being discovered or another virus targeting users of Microsoft's platform. To that end, Gates has started to make more noise about Microsoft's entry into the antivirus and security market.
Then there is the ongoing antitrust battle in Europe, which has seen Microsoft forced into releasing a version of Windows that ships without its own Media Player bundled in.
Microsoft has also had to deal with savvy customers playing the open source migration card in an attempt to broker cheaper licensing. Despite the high-profile Munich open source switch, Microsoft has fought its corner well here - though again it has had to dig deep for a massive marketing programme aimed at educating businesses about the hidden costs of Linux.
On a more personal level, Gates has spent more time this year on his philanthropic activities with the donation of $436m to fund research into fighting diseases such as malaria and TB.
He lobbied the world's political leaders at the Davos economic summit and then shared the stage with U2 frontman Bono and other rock stars at the Live 8 concert in London's Hyde Park this summer, where the software billionaire addressed the crowd about 'making poverty history'.
But silicon.com's Agenda Setters is about looking forward and Microsoft is still involved in some of the key battles that will shape the future of both business and consumer technology.
The next year will see Microsoft finally release Longhorn (now called Windows Vista), the next-generation version of the Windows platform.
Battle for control of the desktop will also be fierce as Google dips into the stash of cash from its recent IPO to fund acquisitions and new innovations in search and browser technology. That, and Google poaching a key Microsoft employee, even drove Gates' sidekick Steve Ballmer to recently declare he wanted to 'kill' Google.
Gates also faces a battle on the consumer media front with his arch enemy Steve Jobs, as Apple continues to steal a march with iTunes and the iPod. So will it be another year of distractions or a year of setting the tech agenda for Gates?
He'll make the list - Gates is still synonymous with IT for so many - but with so much controversy and competition we're not betting on a top 10 finish.
silicon.com's Agenda Setters panel, made up again of CIOs, analysts, VCs, consultants, lawyers, academics and other experts, convenes in September at our London offices with the results revealed at the end of the month.
Tech Sector Lower Ahead of Apple, Microsoft Deals
By Matt Andrejczak
SAN FRANCISCO (Dow Jones)--Technology stocks edged lower early Wednesday
ahead of expected announcements from Apple Computer (AAPL) and Microsoft
(MSFT) about new business ventures.
The Nasdaq Composite Index gave up more than 3 points, largely in line with
the broader market, after a strong run in the previous session.
The Amex Computer Technology Index shed more than 3 points. The Philadelphia
Semiconductor Index fell more than 5 points as index component Altera Corp.
warned its gross margin will be lower than expected.
Among the gainers was Hewlett-Packard & Co. (HPQ), which rose 23 cents to
$27.48. UBS upgraded the printing and computer hardware giant to buy from
neutral, on hopes that restructuring will continue to bear fruit.
"Despite shares being up about 30% this year, we believe HP still may
actually be in the middle of its move under new CEO Mark Hurd," UBS said.
Apple fell 9 cents to $48.71, but clung near the all-time high reached in
trading Tuesday.
Apple and Motorola Inc. (MOT) are widely expected to unveil a mobile phone
that will include Apple's technology for downloading songs from the Internet
onto portable music players, and have scheduled a media event Wednesday in San
Francisco.
Microsoft dropped 10 cents to $27.90. Microsoft Chairman Bill Gates and
Chief Executive Steve Ballmer will address a conference at the company's
Redmond, Wash., headquarters later Wednesday to outline its new strategy for
its offerings to small and midsize businesses.
Meanwhile, Microsoft filed a new appeal with a European court related to the
European Commission's 2004 landmark antitrust ruling against the company. The
latest legal move by the world's biggest software company seeks to clear up
whether some of its software source code should be kept secret or whether it
must be made public.
Elsewhere, Altera (ALTR) fell more than 7% early Wednesday after the chip
manufacturer warned its gross margin will be lower than anticipated. The stock
fell $1.60 to $20.20.
McData Corp. (MCDTA) fell 4% to $5.08. Late Tuesday, the storage maker swung
to an unexpected second-quarter loss.
Electronics for Imaging Inc. (EFII) rose 18% to $24.30. The maker of servers
and controller devices for printers late Tuesday lifted its third-quarter
forecast.
Nokia/STM??
(Dow Jones) In an effort to keep costs down, Nokia (NOK) could change
the structure of its chip suppliers, potentially hurting its relationship with
Texas Instruments (TXN), Merrill suggests. Analyst Joseph Osha says NOK
doesn't want to be tied to one dominant chip supplier -- think Intel (INTC) in
the PC market -- so the company could move to use a chip from STMicro (STM),
which would represent a move away from TXN. What's more, Osha says NOK is
looking at giving a lower-end design to Infineon (IFX). Still, if the moves
happen, it won't hurt TXN's wireless revenue in the intermediate term, the
analyst says. STM up 2.8% to $17.18; TXN off 0.5% to $33.00; IFX up 1.2% to
$9.77. (DLF)
cslewis/eamonnshute, nice work...........
I hope they start a television campaign, too. Something like the goofy guys (in the colored body suits) meet the Juggler.
thanks for the posts
re: Utimaco/Lenovo/Wave
I had inquired whether Utimaco was competition or complementary, or something else. Here's the answer:
While Wave's ETS suite has an application called Document Manager which performs some similiar functions like file and folder encryption and virtual disk encryption, which could be considered to be competitive with Utimaco's application, the reality is that these are not really competitve in the market place. The Enterprise version of Utimaco's software is relatively expensive per seat and more extensive that our application. In addition, Doc Manager is just one of many applications and management software for TPMs which are included in the ETS Suite. As Wave is working with the PC OEMs we are not competing with Utimaco for TPM related products. The only exception is Lenovo/IBM, but only because the IBM PC guys originally developed a number of their own TPM applications, but did not have the equivalent of the Utimaco application so doing a deal with Utimaco made some sense, but even then only for high end, sophisticated data management applications, which ETS generally does not fit anyway. That situation does not exist in the rest of the PC OEMs.
Hello greg s
Chilihead, of course you are correct. When posting the work of others, there should always be an attribution. Those who have known me and my posting habits over the many, many years (longer than you've been around, I might add) can attest: I DEMAND LINKS! In my haste today to post, I did neglect the proper reference. So, here you are:
http://www.azcentral.com/news/articles/0829wsj-portals29-ON.html
Oh, and by the way....ya know that new cookbook coming out, South By SouthWest , the one authored authored by Mrs. greg s? .............
well, I sure hope it has the proper credits. TexMex and Asian? She sure sounds, well, creative.
Does she have her own channel on the FoodTV network?
"chow" for now
A little OT-ish
A SPECTER IS haunting the computer industry: the specter of competition.
With apologies to Marx and Engels for bastardizing their line on communism,
one can't help but notice that the technology industry has become considerably
more lively of late than anyone had a right to expect.
Not long ago, the conventional wisdom was that we would by now be in the
early stages of a 1,000-year reign of the Wintel duopoly. As far as the eye
could see, the computing ecosystem would be nothing but ever-more sprawling
and ill-behaved Windows operating systems running on successively bigger,
hotter and noisier Intel chips.
These days, though, both Intel and Microsoft are scrambling to pay the piper
for years of design entropy. Further, Bill Gates's company is dealing with a
list of subtle and not-so-subtle threats: Linux, naturally, but also Apple and
Google; each appears to have something up its sleeve. As a result, it's hard
to know what the tech world will look like 18 or so months from now. It's the
first time in a long time this has been the case.
Suddenly, the tech world has gotten interesting again.
IT IS STRIKING the manner in which both Intel and Microsoft are being forced
to detour off the more-is-more strategy that worked for them for so many
years. Intel knows now that it can't just keep designing faster, bigger chips
and then selling them to customers on their speed. For one, speed isn't
selling anymore. Worse, the chips were getting so hot they could serve
double-duty as welding torches.
Intel's new design direction, which it emphasized again last week, stresses
cool operation and low power consumption, especially for laptops. You hear the
same message from Intel rival AMD.
For its part, Microsoft has spent years making the Window operating system
bigger, absorbing into it -- and thus removing as a competitive threat -- any
new ideas that came down the pike. During the 1990s, that involved a very big
thing: Web browsers.
Now, though, Windows has become so large and unwieldy that it is a constant
target for spammers, hackers and other bad guys. As it moves to its new
operating system, called Vista, Microsoft is abandoning its doctrine of
featurism in favor of code that is stable and does what it is supposed to do.
In fact, Vista's one promised big new feature -- a revised file system for
storing information -- has been canned.
But if Microsoft is treading water on new features, that opens up the door
to others. Google engineers, freed from the imperative under which their
Microsoft counterparts must labor -- always needing to leverage Windows into
some new corner of the world -- have been running rings around Microsoft,
innovation-wise.
Thanks to Apple, next year promises to be an auspicious one. The company
will begin selling Macintoshes that are based on Intel chips. If Steve Jobs is
going to go through all the trouble of rewriting his operating system for the
Intel architecture, why wouldn't he go all the way and finally sell the Mac
operating system for the hundreds of millions of Intel-based PCs out there?
Now that would be a real dust-up: Bill Gates and Steve Jobs mano a mano for
the very heart of the modern computing experience, just like in the good old
primordial days of the industry. While Mr. Jobs says his company has no plans
to enter the operating-system market by selling shrink-wrapped Mac software,
he was making similar-sounding denials before he made the big switch to Intel
chips earlier this year.
ALTHOUGH THIS NEW liveliness brought by the likes of Apple or Google to the
tech world is heartening, they don't deserve all the moon-eyed swooning they
are getting from critics for their efforts.
A few weeks ago, Google introduced a mapping program that allowed users to
"fly" around a 3D-globe constructed from satellite images. Several
commentators were so thrilled by Google Maps they wondered if it might raise
the environmental awareness of the whole planet. We would, after all, be
reminded of how we all dwell on Spaceship Earth, the argument went.
Maybe, but far more likely is that it will be used by Wal-Mart to show
customers the stores nearest their homes.
Google, lest we forget, is an advertising company, not a software company.
It will offer a product if there is some way to turn it into search-based
advertising. If you get a Gmail message from a friend about his new mortgage,
you'll probably see refinancing ads somewhere on your screen.
This new frisky competitiveness also doesn't mean that the world's antitrust
police should put away their briefcases. (In the thick of the recent Microsoft
antitrust battle, the subtext of any commentary extolling competition in the
computer industry was the notion that regulators should leave well enough
alone.)
But Microsoft, Intel and the rest have a power in the modern economy that
the Dutch East India Company would have envied. A little competition among
regulators to keep the companies honest could hardly be a bad thing.
barge, now now
the final grade hasn't been posted ! ROTFLMAO !!
barge,
Not too long ago, I was told that Infineon had relegated their TPM-related efforts to their "Automotive Group." Did you happen to noticed whom was quoted in today's Infineon press release? (bolds are mine):
SAN JOSE, CA -- (MARKET WIRE) -- 08/29/05 --
Infineon Technologies AG (NYSE: IFX) (FSE: IFX) today announced that it
will supply three key components for the Microsoft Xbox 360(TM) video game and
entertainment system. Infineon will provide a removable solid-state memory
unit product, a single-chip application-specific integrated circuit (ASIC)
wirelessgame-pad controller that makes cables unnecessary for game play, and
an advanced security chip.
Xbox 360 consoles with Infineon-produced chips and components are expected
to be on the shelves in the fourth quarter of this year. Financial details of
the design collaboration and supply agreement were not disclosed.
"Collaboration with leading suppliers of semiconductors and electronic
components is essential to the realization of Microsoft's vision to deliver
entirely new capabilities in consumer entertainment," said Marc Whitten,
Director, Xbox Peripherals at Microsoft. "Infineon's broad and complementary
IP portfolio, system integration skill, manufacturing expertise and proven
track record were crucialfactors in our decision to work with the company on
these components."
Infineon is leveraging its IP in areas such as security, memory control
andembedded firmware into ASIC-based system solutions for the Xbox 360. For
the memory unit, the company designed an ASIC memory controller, created the
embedded software that runs on the chip and designed the system printed
circuit board. And the security chip is a custom implementation of Infineon's
proven authentication technology.
The chips were developed in Germany, Israel and Italy and will be
manufactured in France. Using the flexibility of Infineon fab clusters,
Infineon's ASIC components can be manufactured worldwide in multiple
locations, allowing customers additional supply-chain flexibility and
opportunity to expand. This is a very important value proposition in the
consumer electronics industry where security of supply and reliable
high-volume manufacturing are paramount.
"Today, customers require a system view to technology development in order
to achieve increased performance, lower cost and a higher level of
integration. Infineon is taking this system design approach to bring more
value to its key customers," stated Peter Bauer, Member of the Management
Board, Executive Vice President and Head of Automotive, Industrial and
Multimarket Business Group at Infineon Technologies.
hey barge,
I'm glad to see that your time away while enrolled in the UCLA-extension course for the ankle-bracelet-challenged, titled "HOW TO POST ON IHUB USING FIFTY UPPER-CASE LETTERS, OR LESS 101A," was time well-spent.
However, I was bored with your latest post. I do, however, take solace in the fact that you were in the tenth decile upon completion...............
welcome back
ks5
New Wave whitepaper:
http://www.wavesys.com/about/whitepapers/trustedcomputing050630.pdf
gee, e-sign, TPMs, Diebold ATMs, where does this lead us?
The pain level in the consumer sector related to ID-theft, etc, is INCREASING at a time when TPMs, as the only viable solution, are shipping in staggering volumes. Somebody is going to put the two together. It is called the "sweet spot".............
Government awareness of TPMs increasing??
From the FDIC; check out section 3:
http://www.fdic.gov/consumers/consumer/idtheftstudysupp/toc.html
Trusted Platform Module (TPM) Chip
What is it and how does it work?
The Trusted Platform Module (TPM) uses an embedded chip to securely store passwords, digital certificates, and encryption keys for PCs. This hardware-based system is designed to verify the authenticity of both the user and the device. The TPM acts as a virtual vault and uses PKI to decrypt, sign, encrypt, and verify both the machine and the application software. The system is designed so that only trusted applications that meet all integrity checks would be permitted. But since all checks and authentications will be performed automatically for the user, the login process will not be expanded or complicated in any way.
Capabilities
The tamper-resistant chip holds keys and certificates associated with the chip and the resident hardware device. The TPM verifies the connected device's integrity at boot-up, and the verification results in a chain of trust between machines. This process protects files from access by unauthorized applications or users. The two most commonly mentioned disadvantages of the TPM are its failure to recognize unlicensed or unrelated software (unrelated to the OS being used) and the cost of converting to another application once a product has been used for any length of time.
General Requirements
Although these chips are being installed on many PCs now distributed by major manufacturers, the chips are disabled. The concept holds promise, but operating system and application support is not wide spread. Plans call for future versions of existing operating systems to begin supporting TPM services
OT: Tribune Expands TV Information Deal With Microsoft
CHICAGO, March 22, 2005 /PRNewswire via COMTEX/ -- Tribune Media Services (TMS)
has expanded its licensing deal with Microsoft Corp. for TV program listings and
for movie show times for the U.S. and Canada.
The new multi-year agreement extends the long-time relationship between TMS and
Microsoft. Under the deal, TMS' industry-leading TV and movie listings databases
will be incorporated into a wide range of entertainment navigation products from
Microsoft, including Windows XP Media Center Edition, MSN.com and MSN TV.
TMS will continue to provide Microsoft with analog, digital and HDTV television
listings information, including local over-the-air, cable/satellite channel
line-ups and detailed program descriptions for the U.S. and Canada.
Microsoft will also have access to TMS' enhanced TV listings service, which
offers more frequent availability of updates to program schedules, providing
Microsoft's consumers with the best information available for making
entertainment decisions.
"As Microsoft continues to develop and deliver exciting technologies such as
Windows XP Media Center Edition, which enables high-quality digital
entertainment experiences, the electronic program guides play an important role
in enabling an integrated, easy-to-use TV-viewing experience," said Martin
Sacchi, Director of Business Development for the eHome Division at Microsoft.
"We are excited to be able to expand our relationship with TMS in order to offer
our customers the very best in digital entertainment."
Kathy Tolstrup, General Manager of Sales and Marketing for TMS Entertainment
Products said, "TMS continues to maintain its commitment to provide high-quality
service and accurate and comprehensive entertainment listings. We are delighted
to continue our relationship with Microsoft to meet their diverse needs for TV
and movie information. As our clients expand worldwide, TMS is growing its
databases to meet their international needs."
About Tribune Media Services Entertainment Products Division
Tribune Media Services (TMS) is a leading provider of print, online and
on-screen entertainment listings and editorial information to newspapers and
online media, cable and satellite operators, and consumer electronics companies.
Offering a full line of enhanced entertainment information products and
services, TMS' TV information clients include Time Warner Cable, Cablevision,
New York Times, USA Today, TiVo and Microsoft. TMS collects information from
more than 12,500 broadcast, cable and satellite sources worldwide. Its
newspaper, cable and satellite program magazines reach more than 30 million
households in over 50 major markets on a weekly and monthly basis. Additionally,
TMS' passive program guide (PPG) is available in 9 million homes worldwide.
OT:Weird Science:
New technology uses human body for broadband networking
http://www.taipeitimes.com/News/biz/archives/2005/03/20/2003247076
By sending data over the surface of the skin, it may soon be possible to trade music files by dancing cheek to cheek, or to swap phone numbers by kissing
By Paul Rubens
THE GUARDIAN , LONDON
Sunday, Mar 20, 2005,Page 12
Gordon Bell, a senior researcher at Microsoft's Bay Area Research Center in San Francisco
Your body could soon be the backbone of a broadband personal data network linking your mobile phone or MP3 player to a cordless headset, your digital camera to a PC or printer, and all the gadgets you carry around to each other.
These personal area networks are already possible using radio-based technologies, such as Wi-Fi or Bluetooth, or just plain old cables to connect devices. But NTT, the Japanese communications company, has developed a technology called RedTacton, which it claims can send data over the surface of the skin at speeds of up to 2Mbps -- equivalent to a fast broadband data connection.
Using RedTacton-enabled devices, music from an MP3 player in your pocket would pass through your clothing and shoot over your body to headphones in your ears. Instead of fiddling around with a cable to connect your digital camera to your computer, you could transfer pictures just by touching the PC while the camera is around your neck. And since data can pass from one body to another, you could also exchange electronic business cards by shaking hands, trade music files by dancing cheek to cheek, or swap phone numbers just by kissing.
NTT is not the first company to use the human body as a conduit for data: IBM pioneered the field in 1996 with a system that could transfer small amounts of data at very low speeds, and last June, Microsoft was granted a patent for "a method and apparatus for transmitting power and data using the human body."
But RedTacton is arguably the first practical system because, unlike IBM's or Microsoft's, it doesn't need transmitters to be in direct contact with the skin -- they can be built into gadgets, carried in pockets or bags, and will work within about 20cm of your body. RedTacton doesn't introduce an electric current into the body -- instead, it makes use of the minute electric field that occurs naturally on the surface of every human body. A transmitter attached to a device, such as an MP3 player, uses this field to send data by modulating the field minutely in the same way that a radio carrier wave is modulated to carry information.
Receiving data is more complicated because the strength of the electric field involved is so low. RedTacton gets around this using a technique called electric field photonics: A laser is passed though an electro-optic crystal, which deflects light differently according to the strength of the field across it. These deflections are measured and converted back into electrical signals to retrieve the transmitted data.
An obvious question, however, is why anyone would bother networking though their body when proven radio-based personal area networking technologies, such as Bluetooth, already exist? Tom Zimmerman, the inventor of the original IBM system, says body-based networking is more secure than broadcast systems, such as Bluetooth, which have a range of about 10m.
"With Bluetooth, it is difficult to rein in the signal and restrict it to the device you are trying to connect to," says Zimmerman. "You usually want to communicate with one particular thing, but in a busy place there could be hundreds of Bluetooth devices within range."
As human beings are ineffective aerials, it is very hard to pick up stray electronic signals radiating from the body, he says. "This is good for security because even if you encrypt data it is still possible that it could be decoded, but if you can't pick it up it can't be cracked."
Zimmerman also believes that, unlike infrared or Bluetooth phones and PDAs, which enable people to "beam" electronic business cards across a room without ever formally meeting, body-based networking allows for more natural interchanges of information between humans.
"If you are very close or touching someone, you are either in a busy subway train, or you are being intimate with them, or you want to communicate," he says. "I think it is good to be close to someone when you are exchanging information."
RedTacton transceivers can be treated as standard network devices, so software running over Ethernet or other TCP/IP protocol-based networks will run unmodified.
Gordon Bell, a senior researcher at Microsoft's Bay Area Research Center in San Francisco, says that while Bluetooth or other radio technologies may be perfectly suitable to link gadgets for many personal area networking purposes, there are certain applications for which RedTacton technology would be ideal.
"I recently acquired my own in-body device -- a pacemaker -- but it takes a special radio frequency connector to interface to it. As more and more implants go into bodies, the need for a good Internet Protocol connection increases," he says.
In the near future, the most important application for body-based networking may well be for communications within, rather than on the surface of, or outside, the body.
An intriguing possibility is that the technology will be used as a sort of secondary nervous system to link large numbers of tiny implanted components placed beneath the skin to create powerful onboard -- or in-body -- computers.
Interesting article. Maybe J&J needs Dell??
Johnson & Johnson tackles security pain
http://www.nwfusion.com/news/2005/031405-johnson-johnson.html
By Ellen Messmer
Network World, 03/14/05
For Johnson & Johnson, the healthcare giant with more than 200 separate companies operating in 54 countries, one of the biggest problems encountered in e-commerce was finding a way to quickly get business partners access to the network but enforce security.
The problem vexed the Brunswick, N.J., maker of pharmaceuticals and medical equipment because e-commerce partners, once given access, sometimes introduced worms and viruses into J&J's network. In addition, the process of reviewing business requests for network access between a J&J unit and its intended partner had become burdensome, delaying e-commerce transactions.
However, IT staff at J&J said since new security procedures put in place a year ago altered the equation, it has been much faster to process network-access requests. Through the uniform monitoring and documentation processes, security has improved, with worm and virus outbreaks emanating from business partners reduced to nil.
"The documentation is still a bit cumbersome, but now it's a repeatable process," says Thomas Bunt, director of worldwide information security at J&J, about the challenge of providing network access for business partners. "We're facing an increased demand for external connections, and it wasn't easy to do this."
When a business manager at J&J wants to have counterparts in outside firms gain access to internal applications for e-commerce, the IT department is summoned to assess risk.
First, the J&J unit and the outside firm have to fill out a detailed questionnaire about the nature of the connection request, says Denise Medd, information security senior analyst. In addition, J&J expects the intended e-commerce partner to submit to a security assessment and evaluation.
This vulnerability assessment may be done by a neutral third party, but the goal is to ensure that doing business via the network connection, which is typically opened up via J&J firewall, presents no unnecessary risks. The J&J operating company, officially known as "the sponsor," is held to the same standards, Medd emphasizes.
Occasionally, a request for network access is turned down, especially if the J&J side has servers lacking proper patch-update mechanisms or other shortcomings. "There is a final review, and we will not let an insecure connection go live," Medd says.
The IT and security professionals at J&J worked with the legal department to craft standard procedures for requests and evaluations. J&J and its partner also must complete a contract or memo of understanding regarding the network connection to be established.
"We'll look closely at what the connectivity is, and typically a limited number of people could have access," Bunt says, pointing out that J&J strives to accommodate requests for a range of VPN access methods.
J&J also includes an inspection process every six months to ascertain the security of the network connection. The risk management procedure has resulted in a dramatic drop in virus and worm outbreaks. Sometimes business project managers grumble about the assessment process, but management's solid backing of it has made it a uniformly enforced process that is in effect with hundreds of outside firms, Bunt says.
The IT department says it hopes to streamline the risk evaluation further by drawing up standardized interconnection security agreements and uniform set of questions to ask outside firms wanting access to J&J's internal network.
"We also need to better explain to our partners why they need to do this and how they benefit by getting a good look at our security posture," Bunt says.
Anybody seen the Dell/Wave "cartoon"?
http://www.dell.com/downloads/global/solutions/Wave_Systems_TPM_SW.pdf
C2, quick question
Do you belong to any associations related to your industry?
Maybe you could do a little evangelizing!
OT: German government develops eCard strategy
03/16/05 Germany wants to introduce chip cards which are compatible with each other and can be used as a healthcare card, ID, JobCard and for filing tax returns. The government recently decided on developing the needed strategy for this. "This will make e-government and e-business safer and more convenient," says Minister of the Interior Otto Schily (Social Democrat).
According to this strategy, an electronic healthcare card replacing the current cards will be introduced in 2006. Doctors and pharmacists will also be given electronic caregiver IDs in a step-by-step process. This will give them access to the patient data on the electronic healthcare card, allow them to sign electronic documents and encrypt them for sending. The digital personal ID - whose introduction date has not been decided on - will also contain authentication functions, in addition to the usual identification and travel document functions. Both cards should be made so that they can be used to digitally sign documents.
Germany is also planning a "JobCard". Certain data, e.g. that needed for social security or unemployment benefits, will be stored in a central location in the future. To prevent misuse of this data, government employees can only access the data via the signature card of the person seeking aid. In addition, starting in 2006, electronic tax returns will be supported using electronic authentication and a digital signature.
Source: Deutsche Bundesregierung, AP
eamonnshute, re:a la mode
fwiw, I've heard the number is 70,000+
knute, yep, at least that's what he said. e/
Wave Systems 4Q Losses 4c/Shr Vs 7c> e/
LEE, Mass.--(BUSINESS WIRE)--March 15, 2005--Wave Systems Corp. (NASDAQ:
WAVX; www.wave.com) today reviewed recent corporate progress and reported
results for its fourth quarter (Q4) and year ended December 31, 2004.
Wave's Q4 2004 net revenue related to technology licensing and related
support services was $108,000, compared to Q4 2003 net revenue of $59,000.
Reflecting ongoing management of sales, marketing, administrative and R&D
expenses, Wave reported a net loss to common stockholders of $3.0 million, or
$0.04 per basic share, for the fourth quarter of 2004, compared to a net loss
to common stockholders of $4.3 million, or $0.07 per basic share, in Q4 2003.
The weighted average number of basic shares outstanding in the fourth quarters
of 2004 and 2003, was 71,793,000 and 65,203,000, respectively.
For the year ended December 31, 2004, Wave Systems reported net revenue of
$209,000, compared to revenue of $189,000 in the prior year. Wave reported a
net loss to common stockholders of $14.5 million, or $0.21 per basic share,
for the full 2004 year, compared to a net loss to common stockholders of $25.3
million, or $0.45 per basic share, in 2003. The weighted average number of
basic shares outstanding in 2004 and 2003, was 69,041,000 and 55,887,000,
respectively.
As of December 31, 2004, Wave had total current assets of $6.8 million,
working capital of $3.5 million and no long-term debt.
Steven Sprague, Wave's president and CEO, said, "During 2004 and into this
year, Wave made significant progress as a leader in the development and
delivery of software and services to enable trusted computing. This occurred
in an environment where many PC brands made the commitment to offer trusted
computers and the Trusted Computing Group grew to more than 90 members
globally.
"As trusted PCs become more mainstream, Wave believes there will be a
significant business opportunity in delivering trusted computing products that
address the typical challenges facing businesses and governments today -
implementing secure solutions that fit into existing infrastructure, that
reduce costs and that improve communications and customer service.
"As we evaluate our progress, Wave continues to establish itself as an
important member of the trusted computing ecosystem: Our software ships with
the global leader of PC motherboards; our software is available for sale on
the web site of one of the global leaders in PC sales; we have contracts to
have our products bundled with two other leading silicon suppliers, and our
reseller partners continue to grow.
"Given the challenges and opportunities inherent in our market, we remain
optimistic that trusted computing will continue to grow and generate demand
for our EMBASSY(R) Trust Suite secure software client and server solutions."
Summary of 2004 and year-to-date developments:
(for more details, please visit www.wave.com):
-- Dell: On February 1, 2005, Wave's ETS Enterprise Security Dell
Edition 1.0 was made available for purchase on www.Dell.com.
-- Intel: Wave's EMBASSY(R) Trust Suite 3.1 began shipping with
Intel desktop board models D915GEV and D915GUX in June 2004,
targeting business users of next generation PCs.
-- Microsoft: In January 2005, Wavexpress commenced offering its
TVTonic video service to Media Center PC users via Microsoft's
Online Spotlight. Online Spotlight is a selection of featured
services within Microsoft Windows XP Media Center Edition 2005
that offers users a fast, simple way to access compatible
services directly from the main navigation screen.
-- Seagate Technology: In March 2005, at the Intel Developers
Forum, Wave and Seagate conducted a technology demonstration
showing the data protection benefits of linking the security
of a Trusted Platform Module (TPM) to a Seagate-trusted disc
drive.
-- a la mode, inc. In October, Wave and a la mode agreed to
incorporating Wave's eSign Transaction Management Suite in a
la mode's comprehensive solution for securely managing real
estate and mortgage transactions online.
-- U.S. Military Academy: In December, Wave received an order
from the United States Military Academy's Information
Technology Operations Center for Wave to provide trusted
computing products associated with the academy's Secure
Content Dissemination and Data Retrieval Computer System
project.
-- Operational Research Consultants (ORC): In January, 2005, Wave
and ORC forged a strategic partnership to jointly market
trusted computing and certified credentialing to provide
identity management solutions to federal, state and local
governments.
-- Groupement des Cartes Bancaires (CB): In January 2005, Wave
announced that CB, the French banking authority for payment
systems involving bank cards and terminals, will use Wave's
secure software development tools to evaluate the potential of
TCG-compliant computing solutions.
-- Sonex ISG: In February 2005, Sonex Infrastructure Solutions
Group (Sonex ISG) agreed to distribute Wave's ETS software and
infrastructure to enterprises. Sonex's distribution will
encompass the Eastern European countries of Lithuania, Latvia
and Estonia.
-- Giesecke & Devrient (G&D): In March 2005, Wave demonstrated
its ETS software with G&D at the CeBIT 2005 trade show. G&D is
a leading global supplier of smart cards.
-- Quadra Media LA: In March 2005, Quadra Media licensed TVTonic
Direct from Wave's Wavexpress subsidiary for use in the
delivery of Spanish language content to Spanish speaking
households in the U.S.
Auditor's Opinion Letter - Disclosure:
Pursuant to Rule 4350 of the NASD Marketplace Rules, Wave is also announcing
that its auditors' opinion letter (dated March 15, 2005 and which will be
contained in Wave's Form-10-K for the year ended December 31, 2004) raises
"substantial doubt" about Wave's ability to continue as a going concern given
its recurring losses from operations, working capital position and its
accumulated deficit.
About Wave Systems
Consumers and businesses are demanding a computing environment that is more
trusted, private, safe and secure. Wave is a leader in delivering trusted
computing applications and services with advanced products, infrastructure and
solutions across multiple trusted platforms from a variety of vendors. Wave
holds a portfolio of significant fundamental patents in security and
e-commerce applications and employs some of the world's leading security
systems architects and engineers. For more information about Wave, visit
http://www.wave.com.
Safe Harbor for Forward-Looking Statements
Except for the statements of historical fact, the information presented
herein constitutes forward-looking statements within the meaning of the
Private Securities Litigation Reform Act of 1995. Such forward-looking
statements involve known and unknown risks, uncertainties and other factors
which may cause the actual results, performance or achievements of the company
to be materially different from any future results, performance or
achievements expressed or implied by such forward-looking statements. Such
factors include general economic and business conditions, the ability to fund
operations, the ability to forge partnerships required for deployment, changes
in consumer and corporate buying habits, chip development and production, the
rapid pace of change in the technology industry and other factors over which
Wave Systems Corp. has little or no control. Wave Systems assumes no
obligation to publicly update or revise any forward-looking statements.
All brands are the property of their respective owners.
This press release shall not constitute an offer to sell or a solicitation
of an offer to buy any securities. No securities are being offered at this
time.
Conference call: Today, Tuesday, March 15, 2005 at 4:30 P.M. E.S.T.
Webcast / Replay URL: http://www.wave.com
Dial-in numbers: 212-271-4563 or 415-537-1870
Wave Systems Corp. and Subsidiaries
(a development stage company)
Consolidated Balance Sheets
(in thousands)
(Unaudited)
December 31, December 31,
2004 2003
------------- -------------
Assets
Current Assets:
Cash and cash equivalents $5,806 $8,818
Cash collected on behalf of charities - 212
Marketable securities 722 6,325
Prepaid expenses and other receivables 272 205
------------- -------------
Total current assets 6,800 15,560
Property & equipment, net 1,435 2,287
Other assets 219 313
------------- -------------
Total assets 8,454 18,160
Liabilities and Stockholders' Equity
Current Liabilities:
Accounts payable and accrued expenses 2,900 2,837
Due to charities - 243
Deferred revenue 351 74
------------- -------------
Total current liabilities 3,251 3,154
Liability for warrants containing cash
settlement provisions 493 992
------------- -------------
(MORE)
Show Headlines
« »
( BW ) 03/15 04:03PM Wave Systems Reports Improved Q4 Results and -2-
Total liabilities 3,744 4,146
Total stockholders' equity 4,710 14,014
------------- -------------
Total Liabilities and Stockholders'
Equity $8,454 $18,160
Wave Systems Corp. and Subsidiaries
(a development stage corporation)
Consolidated Statements of Operations
(in thousands, except per share amounts)
(Unaudited)
Three Months Ended Year Ended
December 31, December 31,
--------------- ---------------
2004 2003 2004 2003
------ ------ ------ ------
Revenues $108 $59 $209 $189
Cost of Sales 86 15 151 55
------ ------ ------ ------
Gross Margin 22 44 58 134
Operating Expenses:
Selling, general and
administrative 2,560 3,164 12,255 12,699
Research and
development 1,724 1,546 6,853 7,385
Inventory provision -- -- -- 1,114
Write-off of impaired
assets -- -- 302 --
------ ------ ------ ------
4,284 4,710 19,410 21,198
Net Interest income 6 9 25 75
Gain on sale of
marketable securities 1,423 240 4,330 235
Liquidated damages -- (156) -- (156)
Unrealized gain (loss)
in value of warrant
liability (135) 263 499 263
Recovery of officer
note receivable -- -- -- 1,000
Other income -- -- -- 52
------ ------ ------ ------
1,294 356 4,854 1,469
Net loss (2,968) (4,310) (14,498) (19,595)
Accrued dividends on
preferred stock
(including $5,485
accretion of discount
in 2003) -- 1 -- 5,697
Net loss to common
stockholders (2,968) (4,311) (14,498) (25,292)
====== ====== ====== =======
Net loss per share -
basic ($0.04) ($0.07) ($0.21) ($0.45)
====== ====== ====== =======
Weighted average shares
outstanding
- basic 71,793 65,203 69,041 55,887
CONTACT: Wave Systems Corp.
Gerard T. Feeney, 413/243-1600
info@wavesys.com
or
Jaffoni & Collins
David Collins
or
Richard Land, 212/835-8500
wavx@jcir.com
KEYWORD: MASSACHUSETTS
INDUSTRY KEYWORD: HARDWARE GOVERNMENT SOFTWARE INTERNET E-COMMERCE
EARNINGS
SOURCE: Wave Systems Corp.
Copyright Business Wire 2005
(END)
WAVX I/SOF I/XDJGI N/BW N/PREL N/CAC N/CNW N/ERN N/NET M/MMR M/TEC R/NME R/NY R/US R/USE
Sho
Wave Systems Reports Improved Q4 Results and Highlights Progress in Addressing Growing Trusted Computing Marketplace
LEE, Mass.--(BUSINESS WIRE)--March 15, 2005--Wave Systems Corp. (NASDAQ:
WAVX; www.wave.com) today reviewed recent corporate progress and reported
results for its fourth quarter (Q4) and year ended December 31, 2004.
Wave's Q4 2004 net revenue related to technology licensing and related
support services was $108,000, compared to Q4 2003 net revenue of $59,000.
Reflecting ongoing management of sales, marketing, administrative and R&D
expenses, Wave reported a net loss to common stockholders of $3.0 million, or
$0.04 per basic share, for the fourth quarter of 2004, compared to a net loss
to common stockholders of $4.3 million, or $0.07 per basic share, in Q4 2003.
The weighted average number of basic shares outstanding in the fourth quarters
of 2004 and 2003, was 71,793,000 and 65,203,000, respectively.
For the year ended December 31, 2004, Wave Systems reported net revenue of
$209,000, compared to revenue of $189,000 in the prior year. Wave reported a
net loss to common stockholders of $14.5 million, or $0.21 per basic share,
for the full 2004 year, compared to a net loss to common stockholders of $25.3
million, or $0.45 per basic share, in 2003. The weighted average number of
basic shares outstanding in 2004 and 2003, was 69,041,000 and 55,887,000,
respectively.
As of December 31, 2004, Wave had total current assets of $6.8 million,
working capital of $3.5 million and no long-term debt.
Steven Sprague, Wave's president and CEO, said, "During 2004 and into this
year, Wave made significant progress as a leader in the development and
delivery of software and services to enable trusted computing. This occurred
in an environment where many PC brands made the commitment to offer trusted
computers and the Trusted Computing Group grew to more than 90 members
globally.
"As trusted PCs become more mainstream, Wave believes there will be a
significant business opportunity in delivering trusted computing products that
address the typical challenges facing businesses and governments today -
implementing secure solutions that fit into existing infrastructure, that
reduce costs and that improve communications and customer service.
"As we evaluate our progress, Wave continues to establish itself as an
important member of the trusted computing ecosystem: Our software ships with
the global leader of PC motherboards; our software is available for sale on
the web site of one of the global leaders in PC sales; we have contracts to
have our products bundled with two other leading silicon suppliers, and our
reseller partners continue to grow.
"Given the challenges and opportunities inherent in our market, we remain
optimistic that trusted computing will continue to grow and generate demand
for our EMBASSY(R) Trust Suite secure software client and server solutions."
Summary of 2004 and year-to-date developments:
(for more details, please visit www.wave.com):
-- Dell: On February 1, 2005, Wave's ETS Enterprise Security Dell
Edition 1.0 was made available for purchase on www.Dell.com.
-- Intel: Wave's EMBASSY(R) Trust Suite 3.1 began shipping with
Intel desktop board models D915GEV and D915GUX in June 2004,
targeting business users of next generation PCs.
-- Microsoft: In January 2005, Wavexpress commenced offering its
TVTonic video service to Media Center PC users via Microsoft's
Online Spotlight. Online Spotlight is a selection of featured
services within Microsoft Windows XP Media Center Edition 2005
that offers users a fast, simple way to access compatible
services directly from the main navigation screen.
-- Seagate Technology: In March 2005, at the Intel Developers
Forum, Wave and Seagate conducted a technology demonstration
showing the data protection benefits of linking the security
of a Trusted Platform Module (TPM) to a Seagate-trusted disc
drive.
-- a la mode, inc. In October, Wave and a la mode agreed to
incorporating Wave's eSign Transaction Management Suite in a
la mode's comprehensive solution for securely managing real
estate and mortgage transactions online.
-- U.S. Military Academy: In December, Wave received an order
from the United States Military Academy's Information
Technology Operations Center for Wave to provide trusted
computing products associated with the academy's Secure
Content Dissemination and Data Retrieval Computer System
project.
-- Operational Research Consultants (ORC): In January, 2005, Wave
and ORC forged a strategic partnership to jointly market
trusted computing and certified credentialing to provide
identity management solutions to federal, state and local
governments.
-- Groupement des Cartes Bancaires (CB): In January 2005, Wave
announced that CB, the French banking authority for payment
systems involving bank cards and terminals, will use Wave's
secure software development tools to evaluate the potential of
TCG-compliant computing solutions.
-- Sonex ISG: In February 2005, Sonex Infrastructure Solutions
Group (Sonex ISG) agreed to distribute Wave's ETS software and
infrastructure to enterprises. Sonex's distribution will
encompass the Eastern European countries of Lithuania, Latvia
and Estonia.
-- Giesecke & Devrient (G&D): In March 2005, Wave demonstrated
its ETS software with G&D at the CeBIT 2005 trade show. G&D is
a leading global supplier of smart cards.
-- Quadra Media LA: In March 2005, Quadra Media licensed TVTonic
Direct from Wave's Wavexpress subsidiary for use in the
delivery of Spanish language content to Spanish speaking
households in the U.S.
Auditor's Opinion Letter - Disclosure:
Pursuant to Rule 4350 of the NASD Marketplace Rules, Wave is also announcing
that its auditors' opinion letter (dated March 15, 2005 and which will be
contained in Wave's Form-10-K for the year ended December 31, 2004) raises
"substantial doubt" about Wave's ability to continue as a going concern given
its recurring losses from operations, working capital position and its
accumulated deficit.
About Wave Systems
Consumers and businesses are demanding a computing environment that is more
trusted, private, safe and secure. Wave is a leader in delivering trusted
computing applications and services with advanced products, infrastructure and
solutions across multiple trusted platforms from a variety of vendors. Wave
holds a portfolio of significant fundamental patents in security and
e-commerce applications and employs some of the world's leading security
systems architects and engineers. For more information about Wave, visit
http://www.wave.com.
Safe Harbor for Forward-Looking Statements
Except for the statements of historical fact, the information presented
herein constitutes forward-looking statements within the meaning of the
Private Securities Litigation Reform Act of 1995. Such forward-looking
statements involve known and unknown risks, uncertainties and other factors
which may cause the actual results, performance or achievements of the company
to be materially different from any future results, performance or
achievements expressed or implied by such forward-looking statements. Such
factors include general economic and business conditions, the ability to fund
operations, the ability to forge partnerships required for deployment, changes
in consumer and corporate buying habits, chip development and production, the
rapid pace of change in the technology industry and other factors over which
Wave Systems Corp. has little or no control. Wave Systems assumes no
obligation to publicly update or revise any forward-looking statements.
All brands are the property of their respective owners.
This press release shall not constitute an offer to sell or a solicitation
of an offer to buy any securities. No securities are being offered at this
Banks 'wasting millions' on two-factor authentication
http://www.snpx.com/cgi-bin/news55.cgi?target=88449101?-11434
By John Leyden
Published Tuesday 15th March 2005 10:38 GMT
"But it won't work for remote authentication over the Internet," (gee, what does??)
Banks are spending millions on two-factor authentication for their customers but the approach no longer provides adequate protection against fraud or identity theft, according to Bruce Schneier, the encryption guru.
"Two-factor authentication was invented a couple of decades ago against the threats of the time. Now, the threats have changed - and two-factor authentication doesn't defend against them. It's a waste of money," Schneier told El Reg. His comments are controversial because they attack a technology touted as a gold standard for net security - but that doesn't necessarily mean he's wrong.
In an essay in the April issue of Communications of the ACM - published 15 March - Schneier notes that two-factor authentication tokens have been around for nearly 20 years, but are only just receiving mass-market attention with AOL and some banks issuing them to customers. Passwords alone do not provide adequate security, everyone now acknowledges. Supplementing passwords with hardware tokens, which dynamically generate authentication key codes that change every minute, guards against eavesdropping and offline password guessing (types of passive attack). All well and good but this approach fails to protect against modern active attack techniques such as man-in-the-middle attacks or Trojans, according to Schneier.
Too Little, Too Late
In a man-in-the-middle attack, an attacker puts up a fake bank web site and entices a user to that site. The user types in his password, and the attacker uses this data to access the bank's real site. An attacker could pass along a user's banking transactions while making his own transactions at the same time. "Done correctly, the user will never realize that he isn't at the bank's web site," Schneier writes. In a Trojan scenario, an attacker would be able to piggyback on a user's session whenever he logs into his bank's website and make any fraudulent transactions he wants.
Schneier argues two factor authentication fails to protect against either of these scenarios. "In the first case [man-in-the middle], the attacker can pass the ever-changing part of the password to the bank along with the never-changing part. And in the second case, the attacker is relying on the user to log in," he writes. "The real threat is fraud due to impersonation, and the tactics of impersonation will change in response to the defences. Two-factor authentication will force criminals to modify their tactics, that's all."
Early adopters of the technology may enjoy a significant drop in fraud, as crooks move onto easier targets, acknowledges Schneier. But he predicts that the approach is ultimately doomed. Despite his criticisms, he reckons two factor authentication still has a role in enterprise security. "It works for local log-in, and it works within some corporate networks. But it won't work for remote authentication over the Internet," he concludes. ®
keV/cartoon, re: the 212 number
they booth work.
jman:
(212)271-4563 or (415) 537-1870
MoneyGone... look closely
The transaction type says this was a BUY. It was something that was widely discussed on this board when disclosed.
Money, what are you looking at?
I see two pages, most of which is OFI
unix, it is a publicly-traded company: OFI e/
Sanyo Electric Selects RSA Security to Provide Protection for Digital Television Broadcasts
BEDFORD, Mass., March 14 /PRNewswire-FirstCall/ -- RSA Security Inc.
(Nasdaq: RSAS) announced today that Sanyo Electric Co. Ltd. has licensed its
RSA BSAFE(R) Secure Sockets Layer (SSL)products for use in its VIZON series
of digital televisions for the Japanese market. These products allow Sanyo to
provide a secure broadcast environment for standard digital and
high-definition digital programming. It allows Sanyo to offer the latest
interactive digital television services on a platform that broadcasters,
content developers, and consumers can trust.
To enable interactive digital television, receivers send requests to the
Internet sites, which offer interactive services for particular programming.
Industry-adopted guidelines require manufacturers to utilize proven security
technologies -- such as the Secure Sockets Layer (SSL) protocol -- to protect
the exchange of information between the device and public Internet sites. This
secure link between the device and the interactive service protects not only
the content provided, but also the identities and personal information of the
consumers using it. These capabilities give service providers and developers
a trusted platform to deliver engaging interactive content -- and consumers
the confidence that services will be safe and confidential.
"Sanyo's use of our RSA BSAFE technology in its digital television
receivers is a great endorsement of our leadership in providing the security
components manufacturers need to offer protection for digital entertainment
assets and a trusted interactive environment for their customers," says Rick
Welch, Vice President of Developer Solutions and Professional Services at RSA
Security. "We are known for providing highly customizable and standards-based
security components that meet the constrained resource requirements of
consumer devices."
"Our continued innovation in providing technology for protecting digital
assets, further realized in the upcoming release of our RSA BSAFE Mobile
Rights Management product, makes us the trusted security partner that consumer
electronics manufacturers can rely on to deliver the security components they
need for their next-generation devices," continued Welch.
RSA Security's 20 years of experience developing security standards and
technologies, including critical security protocols such as SSL -- one of the
backbones of Internet electronic commerce -- is brought to bear in the
development of the core technologies needed for effective asset protection for
digital entertainment devices and services. The company is also a recognized
leader in providing encryption, public key infrastructure, and other embedded
security products and services for a broad range of electronic devices.
Foam, did you note page 36?! e/
Taxi, nice find, great read! e/