Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
"The most consistent thing we are seeing is CIOs looking to increase their spending on security," Redmond says.
cribbed from the very bottom of the article
http://www.pcadvisor.co.uk/index.cfm?go=news.view&news=4447
Will Longhorn boost computer security?
by Scarlet Pruitt, IDG News Service
Truly trustworthy computing is still a few years off, HP exec says
While the computing industry has been working to tighten up the security of its products amid increasing threats from viruses and hackers, a truly trustworthy infrastructure is still a few years off, HP's security head said in an interview this week.
"The old architecture is too open for today's open world. We need the hardware, operating systems and applications to all be tightened up and work together to give us true trustworthy computing," says Tony Redmond, vice president and CTO of HP Services and the HP Security Program Office.
But it will take time, not just due to the amount of cooperation it requires of the vendors, but also because the average three-year corporate buying cycle delays adoption of new products into the market, Redmond says.
There's at least one security product that HP hopes will immediately grab customers' attention, however – its much talked about Virus Throttler technology, which is designed to slow the propagation of viruses or worms by limiting the number of network destinations that an infected server can attempt to reach. While it doesn't completely stop the attack, it gives administrators time to identify and address the problem.
HP said late last year that the technology would be introduced in early 2005, but Redmond zoomed in on a launch date, saying that it would be available around the time of the RSA security conference, taking place in San Francisco, 14-18 February.
Because Virus Throttler will be available through a network driver, it serves as a "retrofit" to current technology and can be applied immediately, without waiting for an upgrade, he says.
HP is making the technology available for ProLiant servers with Windows Server 2003 and Windows Server 2000, as well as ProCurve switches. Administrators will be able to download the technology and manage it through ProLiant's Insight Manager.
"We are putting it at the first points of infection," Redmond says.
Microsoft has already certified the driver and HP is currently doing testing to make sure the throttler doesn't slow network traffic, he adds. The technology could also be used on PCs, Redmond says, but he indicates that it may be a while before the company tries to move the technology to the desktop.
Like many other security fixes, a lot seems to depend on Microsoft and what the next version of its operating system, Longhorn, due out in 2006, will support.
"I expect you'll see an acceleration of security work when Longhorn goes into beta at the end of this year," Redmond says.
One area HP plans to focus on once Longhorn goes live is further development on its embedded security hardware chip. The chip, which it calls Trusted Platform Module (TPM), is deployed on the motherboard and offers file and folder encryption, access control and other security functions. It's an option already available on some HP PCs and notebooks but requires the user to do the setup work because it is not supported by the operating system, Redmond says.
That could change with Longhorn.
"Our conversations with Microsoft have led us to believe that Longhorn will be much better able to take on trusted platforms," Redmond says.
HP is also looking to extend TPM to its Unix servers, but that may have to wait until Microsoft readies the server version of Longhorn, due out in 2007.
Microsoft isn't the only industry player guiding the future of secure computing, however, as governments around the world, particularly in China and Germany, are also seeking to get their seats at the table, Redmond says. They want to make sure that the technology isn't controlled by one group or government, not just for security reasons but as in the case of China, for commercial reasons as well.
"The Chinese government is very aware of the strength they have in this market. They have a huge market and want to have a strong voice," he says.
And while a dramatic leap in computing security provided by more tightly integrated hardware security, a ferociously patrolled perimeter and improved management functions, appear a ways off, Redmond was confident that progress was under way.
In the meantime, HP's security services business is booming.
"The most consistent thing we are seeing is CIOs looking to increase their spending on security," Redmond says.
Hacker Breaks Into T-Mobile Network
WASHINGTON - A hacker broke into a wireless carrier's network over at least seven months and read e-mails and personal computer files of hundreds of customers, including the Secret Service agent investigating the hacker, the government said Wednesday.
The hacker obtained an internal Secret Service memorandum and part of a mutual assistance legal treaty from Russia. The documents contained "highly sensitive information pertaining to ongoing ... criminal cases," according to court records.
The break-in targeted the network for Bellevue, Wash.-based T-Mobile USA, which has 16.3 million customers in the United States. It was discovered during a broad Secret Service investigation, "Operation Firewall," which targeted underground hacker organizations known as Shadowcrew, Carderplanet and Darkprofits.
Nicolas Lee Jacobsen, 21, of Santa Ana, Calif., a computer engineer, has been charged with the break-in in U.S. District Court in Los Angeles. Investigators said they traced the hacker's online activities to a hotel in Williamsport, N.Y., where Jacobsen was staying.
Jacobsen, who was arrested in October in California, has been released on a $25,000 bond posted by his uncle, who was ordered to keep his own personal computer locked up so Jacobsen couldn't use it.
The hacker was able to view the names and Social Security (news - web sites) numbers of 400 customers, all of whom were notified in writing about the break-in, T-Mobile said. It said customer credit card numbers and other financial information never were revealed.
"Safeguarding T-Mobile customer information is a top priority for the company," said a spokesman, Peter Dobrow. He said T-Mobile discovered the break-in late in 2003 and "immediately took steps that prevented any further access to this system."
Court records said the hacker had access to T-Mobile customer information from at least March through October last year.
An online offer in March 2004, traced to Jacobsen, claimed hackers could look up the name, Social Security number, birth date and passwords for voice mails and e-mails for T-Mobile customers, court records said.
The Secret Service (news - web sites) said its agent, Peter Cavicchia, should not have been using his personal handheld computer for government work. Cavicchia, a respected investigator who has specialized in tracking hackers, was a T-Mobile customer who coincidentally was investigating the T-Mobile break-in, according to court documents and a Secret Service spokesman, Jonathan Cherry.
Cavicchia, who won the Secret Service's medal of valor for his actions in the Sept. 11, 2001, terror attacks, resigned to work in the private sector. He told The Associated Press he was not asked to leave and said he was cleared during an internal investigation into whether he had improperly revealed sensitive information or violated agency rules.
The case against Jacobsen was first reported by the Web site Security Focus, which is owned by Symantec Corp.
Cherry, the Secret Service spokesman, said the agency's own e-mail servers were not affected by the T-Mobile break-in. "The account was a personal account of a Secret Service agent that was for a time compromised," Cherry said.
Cavicchia's T-Mobile handheld computer contained "very limited investigative material" that was obtained by the hacker, Cherry said, adding that no government investigations were compromised. Cherry said Secret Service policies prohibit agents from keeping work-related files on personal computers.
Cavicchia said Secret Service supervisors frequently e-mailed documents and other files to his wireless computer to review while he was traveling. "The only way for me to review documents while I was on the road was for them to send them to that address, which they knew wasn't an agency address," Cavicchia said.
John Frazzini, a former Secret Service agent, praised Cavicchia, who worked on some of the government's most sensational hacker cases. "His record is one of the most impressive that I have seen in the area of cybercrime investigations," Frazzini said.
Kant..........
I did not mean this post in a negative way at all. Quite to the contrary, I feel like the cat who ate the canary.
mymoneybgone
I have made my last purchase of Wave.
I now have the amount of shares that I wanted when I first bought this equity. Certainly not as big as many here, a modest amount I am sure to most. Enough for me to sleep well at night should this go south. And these shares were the best of all, bought with the house's money thanks to Sirius. No more buying opportunities let's get this thing started.
Mymoneybgone
Larry Q4 115K. Your twins should be fine. Neo-natal care has come a long way. My twins were 10 weeks early and have really blossomed in the 8+ years since. Hard to believe that these 8 year old 4 feet 6 inch girls were early. It feels like an incredible burden to bear at times and can be an emotional rollercoaster. However, you will all look back at this and realize how much stronger it makes everyone. The bond that is being created in the days that have passed and the weeks that will come will carry on in full for many, many years.
Best to you and yours Larry,
Dave
As 2005 begins to arrive, Wave Systems in perched in a position that I feel is crucial for them. You can almost feel it, the palpability of it all. We have arrived at a divided road and, as of today I believe there are only two paths this company takes. One, leads to more false starts, missed time lines and the death knell. I think this company can ill afford any more of these. The time for this company to deliver is on the near horizon. Sure they are so very dependant on other companies to open the pathway for them, but the boys and girls with the investment cash can only here these stories so often. The other path leads down the road that those who have followed the company for so long believe they are headed. Deal, deployment and dollars. The tenor of the news, the uptick in volumes seem to suggest that. Notice the tune of some very vocal detractors of this company now changing. And I don't mean CPA. Many may not like it but I think the one thing he has been is above board on many issues in his mind regarding this company. Sure we have some new names arriving playing the same worn out tune, but some of the old guard aren't singing with them. Interesting. 2005 is the year that makes or breaks this company and I will go on record today by saying this: It will be apparent by what transpires this summer and by the 2nd qt. numbers and how the news and contracts if and when they are disclosed are presented to us that will give us a picture of what is to come. Take heart in this as well, we as a group know the nuances of the PR releases we have seen over the past 5 or 6 years and it will be VERY apparent to us far ahead of the rest of the Wall Street herd.
Things are looking great..........
Dave
WAVE SYSTEMS CORP.
5,484,790 SHARES
CLASS A COMMON STOCK
--------------------------------------------------------------------------------
Wave Systems Corp. is offering certain purchasers (the "Purchasers") 5,484,790 shares of its Class A common stock pursuant to this prospectus supplement and the accompanying prospectus. The Class A common stock will be purchased at the negotiated price of $1.05 per share.
Our Class A common stock is traded on the Nasdaq National Market under the ticker symbol "WAVX." The last reported sales price of our Class A common stock on December 15, 2004, was $1.28 per share.
In connection with this offering, we will pay fees to JPC Capital Partners, Inc. (formerly known as Corpfin.com, Inc.) (the "placement agents"). See "Plan of Distribution" beginning on page S-6 of this prospectus supplement for more information regarding these arrangements.
--------------------------------------------------------------------------------
Per Common Share
--------------------------------------------------------------------------------
Total Offering
--------------------------------------------------------------------------------
Offering Price $ 1.05 $ 5,759,030
Placement Agent Fees $ 0.042 $ 230,361
Proceeds before expenses to us $ 1.008 $ 5,528,668
We estimate the total expenses of this offering, excluding the placement agents' fees will be approximately $65,000. The first delivery of the shares of Class A common stock being offered under this prospectus supplement was made to the Purchasers on December 17, 2004.
--------------------------------------------------------------------------------
Investing in our common stock involves risks. See "Risk Factors" beginning on page S-1.
--------------------------------------------------------------------------------
Neither the Securities and Exchange Commission nor any state securities commission has approved or disapproved of these securities or determined if this prospectus supplement is truthful or complete. Any representation to the contrary is a criminal offense.
--------------------------------------------------------------------------------
The date of this prospectus supplement is December 21, 2004.
--------------------------------------------------------------------------------
TABLE OF CONTENTS
ABOUT THIS PROSPECTUS S-1
RISK FACTORS
S-1
SPECIAL NOTE REGARDING FORWARD-LOOKING STATEMENTS
S-3
MARKET PRICE AND DIVIDENDS ON OUR STOCK
S-4
THE OFFERING
S-5
USE OF PROCEEDS
S-5
PLAN OF DISTRIBUTION
S-6
LEGAL MATTERS
S-6
S-i
--------------------------------------------------------------------------------
ABOUT THIS PROSPECTUS
Unless otherwise mentioned or unless the context requires otherwise, all references in this prospectus supplement and the accompanying prospectus to "the company," "we," "us," "our," or similar references mean Wave Systems Corp.
The first part, which is this prospectus supplement, describes the specific terms of this offering and other matters relating to us and our Class A common stock. The second part, which is the accompanying prospectus, gives more general information about securities we may offer from time to time, some of which may not apply to the Class A common stock offered by this prospectus supplement. To the extent there is a conflict between the information contained in this prospectus supplement, on the one hand, and the information contained in the accompanying prospectus or any document incorporated by reference therein, on the other hand, the information in this prospectus supplement shall control.
We have not authorized any dealer, salesman or other person to give any information or to make any representation other than those contained or incorporated by reference in this prospectus supplement and the accompanying prospectus. You must not rely upon any information or representation not contained or incorporated by reference in this prospectus supplement or the accompanying prospectus. This prospectus supplement and the accompanying prospectus do not constitute an offer to sell or the solicitation of an offer to buy common stock, nor do this prospectus supplement and the accompanying prospectus constitute an offer to sell or the solicitation of an offer to buy common stock in any jurisdiction to any person to whom it is unlawful to make such offer or solicitation in such jurisdiction. You should not assume that the information contained in this prospectus supplement and the accompanying prospectus is accurate on any date subsequent to the date set forth on the front of the document or that any information we have incorporated by reference is correct on any date subsequent to the date of the document incorporated by reference, even though this prospectus supplement and any accompanying prospectus is delivered or Class A common stock is sold on a later date.
Information that we file with the SEC subsequent to the date on the cover will automatically update and supersede the information contained in this prospectus supplement and the accompanying prospectus. We incorporate by reference the documents listed in the accompanying prospectus and any future filings made with the SEC under Sections 13(a), 13(c), 14 or 15(d) of the Securities Exchange Act of 1934, as amended, until we issue all of the common stock offered pursuant to this prospectus supplement and the accompanying prospectus.
RISK FACTORS
AN INVESTMENT IN OUR CLASS A COMMON STOCK INVOLVES VARIOUS RISKS. YOU SHOULD CAREFULLY CONSIDER THE RISK FACTORS DESCRIBED ON PAGES 2 TO 9 OF THE PROSPECTUS ACCOMPANYING THIS PROSPECTUS SUPPLEMENT, TOGETHER WITH THE OTHER INFORMATION CONTAINED AND INCORPORATED BY REFERENCE IN THIS PROSPECTUS SUPPLEMENT AND THE ACCOMPANYING PROSPECTUS, BEFORE PURCHASING OUR CLASS A COMMON STOCK. IF ANY OF THE RISKS DISCUSSED IN THE ACCOMPANYING PROSPECTUS ACTUALLY OCCUR, OUR BUSINESS, OPERATING RESULTS, PROSPECTS OR FINANCIAL CONDITION COULD BE HARMED. THIS COULD CAUSE THE MARKET PRICE OF OUR CLASS A COMMON STOCK TO DECLINE AND COULD CAUSE YOU TO LOSE ALL OR PART OF YOUR INVESTMENT.
S-1
--------------------------------------------------------------------------------
This prospectus supplement hereby amends the first three risk factors in the prospectus to read in their entirety as follows:
We have a history of net losses and expect net losses will continue. If we continue to operate at a loss, our business will not be financially viable.
We have experienced significant losses and negative cash flow from operations since our inception. We have not realized a net operating profit in any quarter since we began our operations, nor have we generated any significant operating revenue, as our products have not yet attained commercial acceptance. This is due primarily to the early stage nature of the digital security industry in which we operate. As of September 30, 2004, we had a deficit accumulated during the development stage of approximately $264.2 million and working capital of approximately $2 million. Given the lack of significant sales of our products and services, there is little basis for evaluating the financial viability of our business and our long-term prospects. You should consider our prospects in light of the risks, expenses and difficulties that companies in their early stage of development encounter, particularly companies in new and rapidly evolving markets, such as digital security and online commerce.
To achieve profitability we must, among other things:
•
Convince personal computer manufacturers and distributors of movies, games, financial information and other digital data and electronic content over the Internet to modify their offerings to be used with our products and services;
•
Convince consumers to choose to order, purchase and accept products using our products and services;
•
Continue to maintain the necessary resources, especially talented software programmers;
•
Develop relationships with personal computer manufacturers and computer systems integrators to facilitate and to maximize acceptance of our products and services; and
•
Generate substantial revenue, complete one or more commercial or strategic transactions or raise additional capital to support our operations until we can generate sufficient revenues and cash flows.
If we do not succeed in these objectives, we will not generate revenues; hence, our business will not be sustainable.
We may not be able to fund our operations and continue as a going concern.
Since we began our operations, we have incurred net losses and experienced significant negative cash flow from operations. This is due to the early stage nature of market development for our products and services and the digital security industry as a whole. Wave expects to continue to incur substantial additional expenses associated with continued research and development and business development activities that will be necessary to commercialize our technology. This will likely result in significant losses for the foreseeable future. Considering our current cash balance and Wave's projected operating cash requirements, we anticipate that our existing capital resources, including the proceeds from the sale of 5,484,790 shares of common stock from this offering will be adequate to satisfy our cash flow requirements into the second quarter of 2005. In order to fund our business through the second quarter of 2005 and beyond, it will be necessary for us to generate substantial revenue, complete one or more commercial or strategic transactions or raise additional capital. Wave is uncertain as to the availability of financing from other sources to fund any cash deficiencies. Even if we are successful in raising additional capital, uncertainty with respect to Wave's viability will continue until we are successful in achieving our objectives. Furthermore, although we may be successful at achieving our business objectives, a positive cash flow from operations may not ultimately be realized
S-2
--------------------------------------------------------------------------------
unless we are able to sell our products and services at a profit. Given the early stage nature of the markets for our products and services, considerable uncertainty exists at to whether or not Wave's business model is viable.
We may be unable to raise the $11.5 million of additional cash flow, which is necessary to continue as a going concern for the next twelve months.
Based upon our current expense forecast, we estimate that our current available capital, including the proceeds from the sale of 5,484,790 shares of common stock from this offering, is sufficient to fund Wave into April, 2005. In addition to our efforts to begin to generate revenue sufficient to fund our operations, or complete one or more commercial or strategic transactions, Wave is evaluating additional financing options to generate additional capital in order to continue as a going concern, to capitalize on business opportunities and market conditions and to insure the continued development of our technology, products and services. Furthermore, in May of 2003, we significantly reduced our cash burn rate, and although we have since had to increase expenditures to meet specific market demand, we may have to further reduce our cash burn rate if we are unable to generate sufficient cash flow to fund our current and forecasted operations. If we are unable to generate sufficient cash flow from revenue and other sources, we will likely pursue additional capital through equity or debt financings. We do not know if additional financing will be available or that, if available, it will be available on favorable terms. If we issue additional shares of our stock, our stockholders' ownership will be diluted, or the shares issued may have rights, preferences or privileges senior to those of our common stock. In addition, if we pursue debt financing, we may be required to pay interest costs. If we are not successful generating sufficient cash flow or obtaining additional funding, we will be unable to continue our operations, develop or enhance our products, take advantage of future opportunities, respond to competitive pressures and continue as a going concern.
SPECIAL NOTE REGARDING FORWARD-LOOKING STATEMENTS
This prospectus supplement contains forward-looking statements within the meaning of the federal securities laws. Forward-looking statements are statements that predict or describe future events or trends and that do not relate solely to historical matters. You can generally identify forward-looking statements as statements containing the words "may," "will," "expect," "believe," "estimate," "anticipate," "intend," "continue" and other similar expressions or the negative of these terms. You should be aware that the matters described in our forward-looking statements are subject to known and unknown risks, uncertainties and other unpredictable factors, many of which are beyond our control. Statements regarding the following subjects are forward-looking by their nature:
•
our business strategies;
•
market trends and risks;
•
assumptions regarding economic conditions;
•
circumstances affecting anticipated revenues and costs; and
•
legislative, regulatory and competitive developments.
These forward-looking statements are subject to various risks and uncertainties, including those related to:
•
our ability to successfully develop products;
•
rapid technological change in our markets;
•
anticipated sources of future revenues;
•
changes in demand for our future products;
S-3
--------------------------------------------------------------------------------
•
our ability to raise capital in the future; and
•
the adequacy of our capital resources to fund our operations.
Other risks, uncertainties and factors, including those discussed under "Risk Factors" in the prospectus accompanying this prospectus supplement or described in reports that we file from time to time with the Securities and Exchange Commission, such as our quarterly and annual reports, could cause our actual results to differ materially from those projected in any forward-looking statements we make. We are not obligated to publicly update or revise any forward-looking statements, whether as a result of new information, future events or otherwise.
MARKET PRICE AND DIVIDENDS ON OUR STOCK
Recent Market Prices
The high and low bid prices for our Class A common stock as reported by Nasdaq for the periods indicated are as follows. Such prices are inter-dealer prices without retail markups, markdowns or commissions and may not necessarily represent actual transactions.
High
--------------------------------------------------------------------------------
Low
--------------------------------------------------------------------------------
Year Ended December 31, 2002:
First Quarter $ 3.20 $ 1.55
Second Quarter 2.55 1.10
Third Quarter 2.49 1.10
Fourth Quarter 1.99 1.12
Year Ended December 31, 2003:
First Quarter 1.63 0.75
Second Quarter 1.29 0.76
Third Quarter 5.24 0.80
Fourth Quarter 3.16 1.28
Year Ended December 31, 2004:
First Quarter 2.34 1.03
Second Quarter 2.29 1.02
Third Quarter (through July 30, 2004) 1.37 0.71
Fourth Quarter (through December 16, 2004) 1.72 0.78
On December 15, 2004, there were approximately 39,000 owners of record of our Class A common stock and approximately 16 owners of record of our Class B common stock.
Dividend Policy
We have never declared nor paid any cash dividends on our capital stock. We currently anticipate that we will retain all future earnings, if any, to fund the development and growth of our business and do not anticipate paying any cash dividends on our capital stock in the foreseeable future.
S-4
--------------------------------------------------------------------------------
THE OFFERING
Class A common stock offered 5,484,790 shares
Class A common stock to be outstanding after this offering
76,177,617 shares
Use of Proceeds
We intend to use the net proceeds from the sale of the securities offered by this prospectus supplement and the related accompanying prospectus to provide working capital for our business.
Nasdaq National Market symbol
WAVX
The information above is based on 70,692,287 shares of Class A common stock and 205,725 shares of Class B common stock outstanding as of October 31, 2004, and excludes:
•
11,522,357 shares of Class A common stock reserved for issuance upon the exercise of employee and director options outstanding.
•
6,715,596 shares of Class A common stock reserved for issuance under existing option plans.
•
184,365 shares of Class A common stock reserved for the exercise of warrants issued to consultants.
•
65,789 shares of Class A common stock reserved for the exercise of warrants issued to the holders of Wave's Series H Convertible Preferred Stock.
•
931,309 shares of Class A common stock reserved for the exercise of warrants issued in November 2003.
•
161,595 shares of Class A common stock reserved for the exercise of warrants issued to placement agents.
•
4,411,765 shares of Class A common stock reserved for the exercise of warrants issued on July 30, 2004.
To the extent that any of outstanding options are exercised, new options are issued under our stock incentive plans or we issue additional shares of common stock in the future, there will be further dilution to new investors.
--------------------------------------------------------------------------------
Our address is 480 Pleasant Street, Lee, Massachusetts 01238, and our telephone number is (413) 243-1600.
USE OF PROCEEDS
We estimate that the net proceeds we will receive from this offering will be approximately $5,528,603, after deducting the estimated offering expenses. We will retain broad discretion over the use of the net proceeds from the sale of our Class A common stock offered hereby. We currently anticipate using the net proceeds from the sale of our Class A common stock hereby primarily for working capital.
We may also use a portion of the net proceeds to acquire or invest in businesses complementary to Wave's business, products and technologies. Although we have no specific arrangements with respect to acquisitions, we evaluate acquisition opportunities and engage in related discussions from time to time.
S-5
--------------------------------------------------------------------------------
PLAN OF DISTRIBUTION
We have entered into a securities purchase agreement dated as of December 15, 2004 with certain purchasers (the "Purchasers") pursuant to which, subject to certain conditions, we have sold to the Purchasers, and the Purchasers purchased from us, 5,484,790 shares of Class A common stock offered hereby at $1.05 per share.
JPC Capital Partners, Inc. (formerly known as Corpfin.com, Inc.), referred to as the placement agents, has entered into a placement agency agreement with us in which they have agreed to act as placement agent in connection with the offering. The placement agent is using its best efforts to introduce us to selected institutional investors who will purchase the shares. The placement agent has no obligation to buy any of the shares from us.
The placement agency will be entitled to a fee of 4% of the gross subscription proceeds of this offering. We may not sell the entire amount of our Class A common stock offered pursuant to this prospectus supplement.
We negotiated the price for the Class A common stock offered in this offering with the Purchasers. The factors considered in determining the price included the recent market price of our Class A common stock, the general condition of the securities market at the time of this offering, the history of, and the prospects, for the industry in which we compete, our past and present operations, and our prospects for future revenues.
The placement agent may be deemed to be an underwriter within the meaning of Section 2(a)(11) of the Securities Act of 1933, as amended, or the Securities Act, and any fees or commissions received by it and any profit realized on the resale of the securities sold by it while acting as principal might be deemed to be underwriting discounts or commissions under the Securities Act. As underwriter, the placement agent would be required to comply with the requirements of the Securities Act and the Securities Exchange Act of 1934, as amended, or the Exchange Act, including, without limitation, Rule 415(a)(4) under the Securities Act and Rule 10b-5 and Regulation M under the Exchange Act. These rules and regulations may limit the timing of purchases and sales of shares of Class A common stock by the placement agent. Under these rules and regulations, the placement agent:
•
may not engage in any stabilization activity in connection with our securities; and
•
may not bid for or purchase any of our securities or attempt to induce any person to purchase any of our securities, other than as permitted under the Exchange Act, until it has completed its participation in the distribution.
The placement agency agreement with JPC Capital Partners, Inc. was included as an exhibit to our Current Report on Form 8-K that was filed with the Securities and Exchange Commission on August 2, 2004.
The transfer agent for our Class A common stock is American Stock Transfer Corporation.
LEGAL MATTERS
The validity of our securities offered in this prospectus supplement and accompanying prospectus has been passed upon for us by Bingham McCutchen LLP, New York, New York.
S-6
--------------------------------------------------------------------------------
Filed pursuant to Rule 424(b)(1) under the Securities Act of 1933
Registration Number 333-114476
PROSPECTUS
$25,000,000
WAVE SYSTEMS CORP.
Class A Common Stock
Warrants
--------------------------------------------------------------------------------
By this prospectus, we may offer, from time to time:
•
shares of our Class A common stock;
•
warrants to purchase shares of our Class A common stock; or
•
a combination of the foregoing.
We will provide specific terms of each issuance of these securities in supplements to this prospectus. You should read this prospectus and any supplement carefully before you decide to invest.
This prospectus may not be used to consummate sales of these securities unless it is accompanied by a prospectus supplement.
Our Class A common stock is traded on the Nasdaq National Market under the symbol "WAVX." On April 13, 2004, the last reported sale price of our Class A common stock was $2.14 per share.
We may sell these securities to or through underwriters, dealers or agents, or we may sell the securities directly to investors on our own behalf.
--------------------------------------------------------------------------------
Investing in our Class A common stock involves a high degree of risk. See "Risk Factors" beginning on page 2
--------------------------------------------------------------------------------
Neither the Securities and Exchange Commission nor any state securities commission has approved of these securities or determined if this prospectus is accurate or complete. Any representation to the contrary is a criminal offense.
--------------------------------------------------------------------------------
The date of this prospectus is May 10, 2004.
--------------------------------------------------------------------------------
YOU SHOULD RELY ONLY ON THE INFORMATION CONTAINED IN OR INCORPORATED BY REFERENCE INTO THIS PROSPECTUS. WE HAVE NOT AUTHORIZED ANY OTHER PERSON TO PROVIDE YOU WITH DIFFERENT INFORMATION. IF ANYONE PROVIDES YOU WITH DIFFERENT OR INCONSISTENT INFORMATION, YOU SHOULD NOT RELY ON IT. THE INFORMATION IN THIS PROSPECTUS IS CURRENT AS OF THE DATE OF THIS PROSPECTUS. OUR BUSINESS, FINANCIAL CONDITION, RESULTS OF OPERATIONS AND PROSPECTS MAY HAVE CHANGED SINCE THAT DATE.
TABLE OF CONTENTS
Page
--------------------------------------------------------------------------------
ABOUT THIS PROSPECTUS 1
OUR COMPANY
1
RISK FACTORS
2
STATEMENTS REGARDING FORWARD-LOOKING INFORMATION
9
USE OF PROCEEDS
10
DESCRIPTION OF CAPITAL STOCK
10
DESCRIPTION OF WARRANTS
11
PLAN OF DISTRIBUTION
12
LEGAL MATTERS
14
EXPERTS
14
WHERE YOU CAN FIND MORE INFORMATION
14
INCORPORATION OF CERTAIN DOCUMENTS BY REFERENCE
14
i
--------------------------------------------------------------------------------
ABOUT THIS PROSPECTUS
This prospectus is part of a registration statement that we filed with the Securities and Exchange Commission, or SEC, using a "shelf" registration process. Under this process, we may offer and sell Class A common stock, warrants to purchase our Class A common stock or a combination of both in one or more offerings for total proceeds of up to $25,000,000. This prospectus provides you with a general description of the securities we may offer. Each time we offer to sell securities, we will provide a supplement to this prospectus that will contain specific information about the terms of that offering. The prospectus supplement may also add, update or change information contained in this prospectus. It is important for you to consider the information contained in this prospectus and any prospectus supplement together with additional information described under the heading "Where You Can Find More Information."
OUR COMPANY
Wave Systems Corp. develops, produces and markets hardware-and software-based digital security products for hardware-based trusted computing platforms, including trusted computing applications and services that are compliant with the specifications of the Trusted Computing Group ("TCG"). TCG is an industry standards body, comprised of computer and device manufacturers, software vendors and others whose purpose is to develop, define and promote open industry standard specifications for embedded hardware-enabled trusted computing and security technologies, across multiple platforms, peripherals and devices. A hardware-based trusted computing platform is one that uses a semiconductor device, known as a Trusted Platform Module (a "TPM"). A TPM is a hardware chip that is separate from the platform's main CPU(s) that enables secure storage of files and other digital secrets, and performs critical security functions such as generating and protecting "cryptographic keys," which are secret codes used to decipher encrypted or coded data.
We began our operations on August 12, 1988, with the concept of developing a means to securely meter digital content and report usage data back to a centralized processing and clearing house that tracks the usage, charges the user and distributes royalties to the publishers of that content; a process known as digital rights management. Prior to the formation of the TCG, we expanded and modified our technology from a single purpose security chip to our patented, open and programmable digital security infrastructure known as the EMBASSY ( EMB edded A pplication S ecurity SY stem) Trust System, a complete end-to-end suite of products and services that supports hardware-based security and creates a trusted computing environment when implemented exclusively, or in conjunction with traditional security. More recently, Wave has begun developing a set of trusted applications known as the EMBASSY Trust Suite to work with various other chip manufacturers' TCG-compliant TPMs. An EMBASSY chip or TPM can be used to securely store the user's personal information, such as usernames, passwords, personal identification numbers, credit card information and personal information, such as social security number, name and address and perform other security functions in a computer platform. In addition, we have added to our product offerings a broadband solution for the delivery of rich content such as video and computer games using an Internet multicasting model; and digital document signing and storage software that enable legally binding digital signatures to be embedded onto digital documents with secure storage and management capabilities of those digitally signed documents. These additional product offerings are currently in development. We expect our current products to remain our primary business focus. Wave currently holds eleven patents involving methods for securing digitally stored information and content.
Since our inception in February of 1988, we have devoted substantially all of our efforts and resources to research, feasibility studies, design, development and market testing of our products and technology. As our research and development activities matured, we have been able to devote increased resources to market development and the application of our technology to end-user products and services. To date, a viable market for our products and technology has yet to fully develop, although we
1
--------------------------------------------------------------------------------
began to introduce our first commercial products into the market during 2003. Wave Systems Corp. is a development stage company. We have not realized any significant revenues in any quarter since we began our operations in 1988. While Wave signed distribution contracts for its EMBASSY Trust Suite software with two major semiconductor manufacturers in 2003, we do not expect to realize material revenues until the latter part of 2004. Revenues have been nominal in relation to our expenditures due to the highly complex nature of the technology that we are developing and the early stage nature of the market for products that utilize this technology. As a result, we have experienced a slow pattern of corporate development. You should carefully consider the factors set forth under the caption "Risk Factors."
Wave was incorporated in Delaware on August 12, 1988 and was known previously as Indata Corp. Wave changed its name to Cryptologics International, Inc., on December 4, 1989; and to Wave Systems Corp. in January 1993. The principal executive offices are located at 480 Pleasant Street, Lee, Massachusetts 01238, and the telephone number is (413) 243-1600.
RISK FACTORS
We have a history of net losses and expect net losses will continue. If we continue to operate at a loss, our business will not be financially viable.
We have experienced significant losses and negative cash flow from operations since our inception. We have not realized a net operating profit in any quarter since we began our operations, nor have we generated any significant operating revenue, as our products have not yet attained commercial acceptance. This is due primarily to the early stage nature of the digital security industry in which we operate. As of December 31, 2003, we had a deficit accumulated during the development stage of approximately $252.7 million and working capital of approximately $12.4 million. Given the lack of significant sales of our products and services, there is little basis for evaluating the financial viability of our business and our long-term prospects. You should consider our prospects in light of the risks, expenses and difficulties that companies in their early stage of development encounter, particularly companies in new and rapidly evolving markets, such as digital security and online commerce.
To achieve profitability we must, among other things:
•
Convince personal computer manufacturers and distributors of movies, games, financial information and other digital data and electronic content over the Internet to modify their offerings to be used with our products and services;
•
Convince consumers to choose to order, purchase and accept products using our products and services;
•
Continue to maintain the necessary resources, especially talented software programmers;
•
Develop relationships with personal computer manufacturers and computer systems integrators to facilitate and to maximize acceptance of our products and services; and
•
Generate substantial revenue, sell some or all of our $6.3 million in marketable securities, complete one or more commercial or strategic transactions or raise additional capital to support our operations until we can generate sufficient revenues and cash flows.
If we do not succeed in these objectives, we will not generate revenues; hence, our business will not be sustainable.
We may not be able to fund our operations and continue as a going concern.
Since we began our operations, we have incurred net losses and experienced significant negative cash flow from operations. This is due to the early stage nature of market development for our
2
--------------------------------------------------------------------------------
products and services and the digital security industry as a whole. Wave expects to continue to incur substantial additional expenses associated with continued research and development and business development activities that will be necessary to commercialize our technology. This will likely result in significant losses for the foreseeable future. Considering our current cash balance and Wave's projected operating cash requirements, we anticipate that our existing capital resources will be adequate to satisfy our cash flow requirements into the third quarter of 2004. In order to fund our business through the third quarter of 2004 and beyond, it will be necessary for us to generate substantial revenue, sell some or all of our marketable securities valued at $6.3 million as of December 31, 2003, complete one or more commercial or strategic transactions or raise additional capital. Wave is uncertain as to the availability of financing from other sources to fund any cash deficiencies. Even if we are successful in raising additional capital, uncertainty with respect to Wave's viability will continue until we are successful in achieving our objectives. Furthermore, although we may be successful at achieving our business objectives, a positive cash flow from operations may not ultimately be realized unless we are able to sell our products and services at a profit. Given the early stage nature of the markets for our products and services, considerable uncertainty exists as to whether or not Wave's business model is viable.
We may be unable to raise the $8.5 million of additional cash flow, which is necessary to continue as a going concern for the next twelve months.
Based upon our current expense forecast, we estimate that our current available capital is sufficient to fund Wave into July, 2004. In addition to our efforts to begin to generate revenue sufficient to fund our operations, sell some or all of our marketable securities valued at $6.3 million as of December 31, 2003, or complete one or more commercial or strategic transactions, Wave is evaluating additional financing options to generate additional capital in order to continue as a going concern, to capitalize on business opportunities and market conditions and to insure the continued development of our technology, products and services. Furthermore, in May of 2003, we significantly reduced our cash burn rate, and although we have since had to increase expenditures to meet specific market demand, we may have to further reduce our cash burn rate, if we are unable to generate sufficient cash flow to fund our current and forecasted operations. If we are unable to generate sufficient cash flow from revenue and other sources, we will likely pursue additional capital through equity or debt financings. We do not know if additional financing will be available or that, if available, it will be available on favorable terms. If we issue additional shares of our stock, our stockholders' ownership will be diluted, or the shares issued may have rights, preferences or privileges senior to those of our common stock. In addition, if we pursue debt financing we may be required to pay interest costs. If we are not successful generating sufficient cash flow or obtaining additional funding, we will be unable to continue our operations, develop or enhance our products, take advantage of future opportunities, respond to competitive pressures and continue as a going concern.
Our market is in the early stage of development so we are unable to accurately ascertain the size and growth potential for revenue in such a market.
The market for our products and services is still developing and is continually evolving. As a result, substantial uncertainty exists with respect to the size of the market for these products and the level of capital that will be required to meet the evolving technical requirements of the marketplace.
Wave's business model relies on an assumed market of tens of millions of units shipping with built-in security hardware. Because this market remains in the early stage of development, there is significant uncertainty with respect to the validity of the future size of the market. If the market for computer systems that utilize our products and services does not grow to the extent necessary for us to realize our business plan, we may not be successful.
3
--------------------------------------------------------------------------------
As this early stage market develops and evolves, significant capital will likely be required to fund the resources needed to meet the changing technological demands of the marketplace. There is uncertainty with respect to the level of capital that may be required to meet these changing technological demands. If the amount of capital resources needed exceeds our ability to obtain such capital, we may not be a viable enterprise.
Wave is not established in the industry so we may not be accepted as a supplier or service provider to the market.
Wave's offering represents a highly complex architecture designed to solve many of the security issues currently present with e-commerce and with computer systems in general such as identity theft, fraudulent transactions, virus attacks, unauthorized access to restricted networks and other security problems that users of computer systems generally encounter. We are uncertain as to whether the marketplace will accept our solution to these security problems. We will not be successful if the market does not accept the value proposition that we perceive to be present in our products and services.
Although Wave has expended considerable resources in developing technology and products that utilize our technology and in business development activities in an attempt to drive the development of the hardware security market, we do not have a track record as a substantial supplier or service provider to consumers of computer systems. Therefore, uncertainty remains as to whether we will be accepted as a supplier to the marketplace.
Our products have not been accepted as industry standards, which may slow their sales growth.
We believe platforms adopting integrated hardware security into the PC will become the next significant standard in the overall PC marketplace. However, our technologies have not been accepted as industry standards. Standards for trusted computing are still evolving. To be successful, we must obtain acceptance of our technologies as industry standards, modify our products and services to meet whatever industry standards ultimately develop, or adapt our products to be complementary to whatever these standards become. If we fail to do any of these, we will not be successful in commercializing our technology; and therefore, we will not generate sales to fund our operations and develop into a self-sustaining, profitable business.
If we do not keep up with technological changes, our product development and business growth will suffer.
Because the market in which we operate is characterized by rapidly changing technology, changes in customer requirements, frequent new products, service introductions and enhancements, and emerging industry standards, our success will depend, among other things, upon our ability to improve our products, develop and introduce new products and services that keep pace with technological developments, remain compatible with changing computer system platforms, respond to evolving customer requirements and achieve market acceptance on a timely and cost effective basis. If we do not identify, develop, manufacture, market and support new products and deploy new services effectively and timely, our business will not grow, our financial results will suffer, and we may not have the ability to remain in business.
We encounter risks relating to security, system disruptions and computer infrastructure that could compromise our digital content.
Although we have implemented in our products various security mechanisms, our products and services may nevertheless be vulnerable to break-ins, piracy and similar disruptive problems caused by Internet users. Any of these disruptions would harm our business. Advances in computer capabilities, new discoveries in the field of security, or other developments may result in a compromise or breach of
4
--------------------------------------------------------------------------------
the technology we use to protect products and information in electronic form. Computer break-ins and other disruptions would jeopardize the security of information stored in and transmitted through the computer systems of users of our products, which may result in significant liability to us and may also deter potential customers.
A party who is able to circumvent our security measures could misappropriate proprietary electronic content or cause interruptions in our operations and those of our strategic partners. We may be required to expend significant capital and other resources to protect against security breaches or to alleviate problems caused by breaches. Our attempts to implement contracts that limit our liability to our customers, including liability arising from a failure of security features contained in our products and services, may not be enforceable. We currently do not have product liability insurance to protect against these risks.
Competition and competing technologies may render some or all of our products non-competitive or obsolete.
An increasing number of market entrants have introduced or are developing products and services that compete with Wave's. Our competitors may be able to develop products and services that are more attractive to customers than our products and services. Many of our competitors and potential competitors have substantially greater financial, technical and marketing resources than we have. Also, many current and potential competitors have greater name recognition and larger customer bases that could be leveraged to enable them to gain market share or product acceptance to our detriment. Wave's potential competitors include security solutions providers such as RSA Security, Inc., Symantec, Computer Associates, Verisign, Inc., Entrust, Inc., Ultimaco, Safenet and major systems integrators such as IBM, HP and EDS.
Other companies have developed or are developing technologies that are, or may become, the basis for competitive products in the field of security and electronic content distribution. Some of those technologies may have an approach or means of processing that is entirely different from ours. Existing or new competitors may develop products that are superior to ours or that otherwise achieve greater market acceptance than ours. Due to Wave's early stage, and lower relative name recognition compared to many of our competitors and potential competitors, our competitive position in the marketplace is vulnerable.
We have a high dependence on relationships with strategic partners that must continue or our ability to successfully produce and market our products will be impaired.
Due in large part to Wave's early stage and lower name recognition, we depend upon strategic partners such as large, well established personal computer and semiconductor manufacturers and computer systems' integrators to adopt our products and services within the Trusted Computing marketplace. These companies may choose not to use our products and could develop or market products or technologies that compete directly with us. We cannot predict whether these third parties will commit the resources necessary to achieve broad-based commercial acceptance of our technology. Any delay in the use of our technology by these partners could impede or prohibit the commercial acceptance of our products. Although we have established some binding commitments from some of our strategic partners, there can be no assurance that we will be able to enter into additional definitive agreements or that the terms of such agreements will be satisfactory. It will be necessary for Wave to expand upon our current business relationships with our partners, or form new ones, in order to sell more products and services for Wave to become a viable, self-sufficient enterprise.
5
--------------------------------------------------------------------------------
Product defects or development delays may limit our ability to sell our products.
We may experience delays in the development of our new products and services and the added features and functionality to our existing products and services that our customers and prospective customers are demanding. If we are unable to successfully develop products that contain the features and functionality being demanded by these customers and prospective customers in a timely manner, we may lose business to our competitors. In addition, despite testing by us and potential customers, it is possible that our products may nevertheless contain defects. Development delays or defects could have a material adverse effect on our business, if such defects and delays result in our inability to meet the market's demand.
If we lose our key personnel, or fail to attract and retain additional personnel, we will be unable to continue to develop our products and technology.
We believe that our future success depends upon the continued service of our key technical and management personnel and on our ability to attract and retain highly skilled technical, management, sales and marketing personnel. Our industry is characterized by a high level of employee mobility and aggressive recruiting of skilled personnel. There can be no assurance that our current employees will continue to work for us or that we will be able to hire any additional personnel necessary for our growth. Our future success also depends on our continuing ability to identify, hire, train and retain other highly qualified technical and managerial personnel. Competition for these employees can be intense. We may not be able to attract, assimilate or retain qualified technical and managerial personnel in the future, and the failure of us to do so would have a material adverse effect on our business.
We have a limited ability to protect our intellectual property rights and others could infringe on or misappropriate our proprietary rights.
Our success depends, in part, on our ability to enjoy or obtain protection for our products and technologies under United States and foreign patent laws, copyright laws and other intellectual property laws and to preserve our trade secrets. We cannot assure you that any patent owned or licensed by us will provide us with adequate protection or will not be challenged, invalidated, infringed or circumvented.
We rely on trade secrets and proprietary know-how, which we protect, in part, by confidentiality agreements with our employees and contract partners. However, our confidentiality agreements may be breached, and we may not have adequate remedies for these breaches. Our trade secrets may also otherwise become known or be independently discovered by competitors. We also rely on intellectual property laws to prevent the unauthorized duplication of our software and hardware products. While we have and will continue to protect our software and our patented technology, intellectual property laws may not adequately protect our technology. We have registered trademark and service mark registrations with the United States Patent and Trademark Office for the marks WaveMeter and WaveNet, EMBASSY, Second Shift (the Wave juggler logo), WaveDirect and Charity Wave. Wave intends to apply for additional name and logo marks in the United States and foreign jurisdictions, as appropriate, but we cannot assure you that federal registration of any of these trademarks will be granted.
Regulation of international transactions may limit our ability to sell our products in foreign markets.
Most of our software products and many components of the EMBASSY Trust System are controlled under various United States export control laws and regulations and may require export licenses for certain exports of the products and components outside of the United States and Canada.
6
--------------------------------------------------------------------------------
We have received export licenses from the U.S. Department of Commerce's Bureau of Export Administration (the "BXA") for the sale and export of our EMBASSY chip and related products and technology to any end-user in any country throughout the world with the exception of Cuba, Iran, Iraq, Libya, North Korea, Sudan and Syria, subject to certain restrictions and in some cases, certain reporting requirements. With respect to our EMBASSY Trust Suite software applications, we have applied for and received export classifications that allow us to export our products, without a license and with no restrictions, to any country throughout the world with the exception of Cuba, Iran, Iraq, Libya, North Korea, Sudan and Syria.
We believe the export classifications that we have received for our software products allow us to sell our products internationally in an effective, competitively advantageous manner. Enhancements to existing products may, and new products, including the EMBASSY Trust Server applications will, be subject to reviews by the BXA to determine what export classification they will receive. Some of our partners demand that our products be allowed to be exported without restrictions and/or reporting requirements. Current export regulations have, in part, allowed us to receive the desired classification without undue cost or effort. However, the export regulations may be modified at any time. Currently, we are allowed to export the products for which we've received classification, in an unrestricted manner without a license. However, modifications to the export regulations could prevent us from exporting our existing and future products in an unrestricted manner without a license. Such modifications could also make it more difficult to receive the desired classification. If export regulations were to be modified in such a way, we may be put at a competitive disadvantage with respect to selling our products internationally.
In addition, import and export regulations of encryption/decryption technology vary from country to country. We may be subject to different statutory or regulatory controls in different foreign jurisdictions, and as such, our technology may not be permitted in these foreign jurisdictions. Violations of foreign regulations or regulation of international transactions could prevent us from being able to sell our products in international markets. Our success depends in large part to having access to international markets.
Our stock price is volatile.
The price of our Class A common stock has been and likely will continue to be subject to wide fluctuations in response to a number of events and factors, such as:
•
quarterly variations in operating results;
•
announcements of technological innovations, new products, acquisitions, capital commitments or strategic alliances by us or our competitors;
•
the operating and stock price performance of other companies that investors may deem comparable to us; and
•
news reports relating to trends in our markets.
In addition, the stock market in general, and the market prices for technology-related companies in particular, have experienced significant price and volume fluctuations. These broad market fluctuations may adversely affect the market price of our Class A common stock, regardless of our operating performance. Securities Class action litigation has often been instituted against companies that have experienced periods of volatility in the market price for their securities. If we were to become the target of this kind of litigation, the cost in dollars and management attention could be substantial, and the diversion of management's attention and resources could have a material adverse affect on our business.
7
--------------------------------------------------------------------------------
We may be subject to conflicts of interest that could adversely slow our corporate governance process.
Our Board of Directors does not include any representatives of our strategic partners. However, our Board of Directors has included in the past, and may include in the future, representatives of our strategic partners. It is possible that those corporations may be competing against us, or each other, directly or indirectly. A director who also represents another company may voluntarily abstain from voting on matters, where there could be conflicts of interest. Even if such a director does abstain, his presence on the Board could affect the process or the results of the Board's deliberations. We have adopted no policies or procedures to reduce or avoid such conflicts. If such conflicts of interest arise, they may have a materially adverse effect on our business.
Governmental regulation may slow our growth and decrease our profitability.
There are currently few laws or regulations that apply directly to the Internet. Because our business is dependent in significant respect on the Internet, the adoption of new local, state, national or international laws or regulations may decrease the growth of Internet usage or the acceptance of Internet commerce, which could, in turn, decrease the demand for our products and services and increase our costs or otherwise have a material adverse effect on our business.
Tax authorities in a number of states are currently reviewing the appropriate tax treatment of companies engaged in Internet commerce. New state tax regulations may subject us to additional state sales, use and income taxes.
If we make any acquisitions, we will incur a variety of costs and may never realize the anticipated benefits.
If appropriate opportunities become available, we may attempt to acquire businesses, technologies, services or products that we believe are a strategic fit with our business. We currently have no commitments or agreements with respect to any material acquisitions. If we do undertake any transaction of this sort, the process of integrating an acquired business, technology, service or product may result in operating difficulties and expenditures and may absorb significant management attention that would otherwise be available for ongoing development of our business. Moreover, we may never realize the anticipated benefits of any acquisition. Future acquisitions could result in potentially dilutive issuances of equity securities, the incurrence of debt, contingent liabilities and/or amortization expenses related to certain intangible assets and increased operating expenses, which could adversely affect our results of operations and financial condition.
A formal investigation by the Securities and Exchange Commission could affect our operations.
The SEC has commenced a formal investigation into certain matters relating to Wave. The SEC investigative order relates to certain public statements made by Wave during and around August 2003, as well as certain trading in Wave's securities during such time. The SEC has not concluded that there has been any wrongdoing and Wave is cooperating fully with the SEC on this matter. An adverse resolution of the investigation may have a negative effect on our financial condition and operating results.
Class action lawsuits could affect our operations.
Several (9 known) similar purported class action complaints have been filed between January 23, 2004 and February 23, 2004 in the United States District Court for the District of Massachusetts. Seven (7) of which name Wave, its Chief Executive Officer and its Chief Financial Officer and two (2) of which also name Wave's Chairman, as defendants. The purported class action complaints have been filed by alleged purchasers of Wave's Class A common stock during the purported class period July 31,
8
--------------------------------------------------------------------------------
2003 through February 2, 2004. The complaints claim that Wave and the named individuals violated the federal securities laws by publicly disseminating materially false and misleading statements regarding Wave, relating to Intel and IBM agreements, resulting in the artificial inflation of Wave's Class A common stock price during the purported class periods. The complaints do not specify the amount of alleged damages plaintiffs seek to recover.
Wave has learned of three (3) other complaints filed in the United States District Court for the District of Massachusetts. Wave believes that the complaints name all of its directors as defendants and allege claims for breach of fiduciary duties and other claims. The allegations are very similar to the allegations made in the purported securities class actions because the allegations concern the very same alleged statements alleged in the purported class actions. Wave is also named as a nominal defendant, although the actions are derivative in nature and purportedly asserted on behalf of Wave.
At this time, Wave is unable to predict the outcome of these actions.
We own or have rights to trademarks or tradenames that we use in conjunction with the offering of our products. Embassy®, WaveMeter®, WaveNet®, Great Stuff Network™, Second Shift® (the Wave juggler logo), WaveCommerce™, Wave Interactive Network™, WINPublish™, WINPurchase™, CablePC™, WaveDirect®, MyPublish™, CharityWave®, SmartSignature™, SmartSafe™, SignOnLine™ and N*Click™ are trademarks or registered trademarks used by us. All other trademarks and tradenames referred to in this prospectus are the property of their respective owners.
STATEMENTS REGARDING FORWARD-LOOKING INFORMATION
Various statements made in this prospectus under the captions "OUR COMPANY" and "RISK FACTORS," and made elsewhere in this prospectus are forward-looking statements. Forward-looking statements provide our current expectations or forecasts of future events. This prospectus includes, without limitation, forward-looking information about the following:
•
the development of the markets and demand for our products and services;
•
our product development plans, including the introduction of new products, and anticipated activities designed to pursue these plans, including collaborations and other corporate partnering arrangements;
•
our ability to generate revenues from sales of products;
•
the ability of our products to affect the market and become an industry standard;
•
our ability to generate license and other fee revenue in the future;
•
the amounts we invest in research and development activities in the future;
•
future levels of operating expenses associated with our business;
•
operating results of joint ventures and other corporate partnering arrangements;
•
competition that we may face;
•
the protection afforded to us by intellectual property law;
•
our future revenues and results of operations;
•
our future exposure to market risk; and
•
our future capital needs and our ability to fund those needs.
When used in this prospectus, the words "may," "will," "expect," "anticipate," "intend," "plan," "believe," "seek," "estimate," "future," "could," "should," "would," "expect," "envision," "potentially"
9
--------------------------------------------------------------------------------
and similar expressions are generally intended to identify forward-looking statements, but are not the exclusive expressions of forward-looking statements. Because forward-looking statements involve risks and uncertainties, there are important factors that could cause actual results to differ materially from those expressed or implied by these forward-looking statements, including those risks discussed in this prospectus and the documents incorporated herein by reference.
In addition, our performance and financial results could differ materially from those reflected in these forward-looking statements due to general financial, economic, regulatory and political conditions affecting our industry. Given these risks and uncertainties, any or all of these forward-looking statements may prove to be incorrect. Therefore, you are cautioned not to place undue reliance on these forward-looking statements, which speak only as of the date made. Furthermore, we undertake no obligation to publicly update any forward-looking statements. We claim the protections afforded by the Private Securities Litigation Reform Act of 1995, as amended, for our forward-looking statements.
USE OF PROCEEDS
Except as may be otherwise set forth in the prospectus supplement accompanying this prospectus, we will use the net proceeds we receive from sales of the securities offered hereby for general corporate purposes, including the development and support of our sales and marketing organization, support for our continuing research and development efforts and the funding of acquired related businesses and technologies.
DESCRIPTION OF CAPITAL STOCK
Following is a summary of the material terms of our capital stock, including our Class A common stock. The summary is not complete and should be read in conjunction with our Restated Certificate of Incorporation, filed as Exhibit 3.1 to our Registration Statement on Form S-1 (SEC File No. 33-75286).
Authorized and Outstanding Shares
Our authorized capital stock consists of 120,000,000 shares of Class A common stock, $.01 par value per share; 13,000,000 shares of Class B common stock, $.01 par value per share; and 2,000,000 shares of preferred stock, $.01 par value.
As of March 1, 2004, a total of 67,133,415 shares of our Class A common stock and 205,725 shares of our Class B common stock were issued and outstanding.
Common Stock
Wave's Class A common stock and Class B common stock are equal in all respects except for voting rights, conversion rights and restrictions on transferability, as discussed more fully below.
Voting Rights
The voting powers, preferences and relative rights of the Class A common stock and the Class B common stock are identical in all respects, subject to the following provisions. Holders of Class A common stock have one vote per share on all matters submitted to a vote of the stockholders of Wave. Holders of Class B common stock have one vote per share on all matters submitted to a vote of the stockholders, except that holders of Class B common stock will have five votes per share on the following matters: (i) any election of directors where one or more directors has been nominated by any person or persons other than Wave's Board of Directors or in the event of an "Election Contest" (as described in Rule 14a-11 promulgated under the Securities Exchange Act of 1934, as amended) or other solicitation of proxies or consents by or on behalf of any person or persons other than Wave's Board of Directors for the purpose of electing directors; and (ii) any vote on a merger, consolidation
10
--------------------------------------------------------------------------------
or reorganization of Wave or similar business combination or transaction, or any sale, lease, exchange or other disposition of all or substantially all of the assets of Wave to or with any other person, if the particular business combination or other transaction has not been recommended by Wave's Board of Directors. In addition, holders of Class B common stock will have five votes per share on all matters submitted to a vote of the stockholders of Wave in the event that any person or group (within the meaning of Section 13(d)(3) of the Securities Exchange Act of 1934, as amended) acquires beneficial ownership of 20% or more of the outstanding voting securities of Wave (provided that this provision will not apply to any person who beneficially owns 3% or more of the outstanding voting securities at the time of the closing of this offering or any group including any such person). No class of outstanding common stock alone is entitled to elect any directors. There is no cumulative voting with respect to the election of directors.
Under Wave's Restated Certificate of Incorporation and the Delaware General Corporation Law, the holders of Class A common stock and Class B common stock are entitled to vote as separate classes with respect to any amendment to Wave's Restated Certificate of Incorporation that would increase or decrease the aggregate number of authorized shares of any class, increase or decrease the par value of the shares of any class, or modify or change the powers, preferences or special rights of the shares of any class so as to affect such class adversely.
Dividends
Holders of the Class A common stock and Class B common stock are entitled to receive ratably such dividends, if any, as are declared by Wave's Board of Directors out of funds legally available for that purpose, provided, that dividends paid in shares of Class A common stock or Class B common stock shall be paid only as follows: shares of Class A common stock shall be paid only to holders of Class A common stock and shares of Class B common stock shall be paid only to holders of Class B common stock. Wave's Restated Certificate of Incorporation provides that if there is any dividend, subdivision, combination or reclassification of either class of common stock, a proportionate dividend, subdivision, combination or reclassification of the other class of common stock shall simultaneously be made.
Conversion
The Class A common stock has no conversion rights. At the option of the holder, each share of Class B common stock is convertible at any time, and from time to time, into one share of Class A common stock.
Other Rights
Stockholders of both classes of common stock of Wave have no preemptive or other rights to subscribe for additional shares. In the event of the liquidation, dissolution or winding up of Wave, holders of Class A common stock and Class B common stock are entitled to share ratably in all assets available for distribution to holders of common stock after payment in full of creditors. No shares of any class of common stock are subject to a redemption or a sinking fund. All outstanding shares are, and all shares offered by this prospectus will be, when sold, validly issued, fully paid and nonassessable.
DESCRIPTION OF WARRANTS
We have warrants to purchase 1,318,058 shares of our Class A common stock outstanding. We may in the future issue warrants for the purchase of our Class A common stock. Warrants may be issued independently, together with any other securities offered by any prospectus supplement or through a dividend or other distribution to our stockholders and may be attached to or separate from the related securities. Warrants may be issued under a warrant agreement to be entered into between us and a
11
--------------------------------------------------------------------------------
warrant agent specified in the applicable prospectus supplement. The warrant agent will act solely as our agent in connection with the warrants of a particular series and will not assume any obligation or relationship of agency or trust for or with any holders or beneficial owners of warrants. The following sets forth certain general terms and provisions of the warrants that may be offered under this prospectus. The applicable warrant agreement and form of warrant certificate will be filed as exhibits to or incorporated by reference in the registration statement. Further terms of the warrants and the applicable warrant agreement will be set forth in the applicable prospectus supplement.
The applicable prospectus supplement will describe the terms of the warrants in respect of which this prospectus is being delivered, including, where applicable, the following: (a) the title of the warrants; (b) the aggregate number of the warrants; (c) the price or prices at which the warrants will be issued; (d) the designation, number and terms of the shares of our Class A common stock purchasable upon exercise of the warrants; (e) the designation and terms of the other securities, if any, with which the warrants are issued and the number of the warrants issued with each security; (f) the date, if any, on and after which the warrants and the related Class A common stock, if any, will be separately transferable; (g) the price at which each share of Class A common stock purchasable upon exercise of the warrants may be purchased; (h) the date on which the right to exercise the warrants will commence and the date on which that right will expire; (i) the minimum or maximum amount of the warrants which may be exercised at any one time; (j) information with respect to book-entry procedures, if any; (k) a discussion of federal income tax considerations; and (l) any other terms of the warrants, including terms, procedures and limitations relating to the transferability, exchange and exercise of the warrants.
PLAN OF DISTRIBUTION
We may sell the securities offered pursuant to this prospectus and any accompanying prospectus supplements to or through one or more underwriters or dealers or we may sell the securities to investors directly or through agents. Each prospectus supplement will describe the number and terms of the securities to which such prospectus supplement relates, the name or names of any underwriters or agents with whom we have entered into arrangements with respect to the sale of such securities, the public offering or purchase price of such securities and the net proceeds we will receive from such sale. Any underwriter or agent involved in the offer and sale of the securities will be named in the applicable prospectus supplement. We may sell securities directly to investors on our own behalf in those jurisdictions where we are authorized to do so.
Underwriters may offer and sell the securities at a fixed price or prices, which may be changed, at market prices prevailing at the time of sale, at prices related to the prevailing market prices or at negotiated prices. We also may, from time to time, authorize dealers or agents to offer and sell these securities upon such terms and conditions as may be set forth in the applicable prospectus supplement. In connection with the sale of any of these securities, underwriters may receive compensation from us in the form of underwriting discounts or commissions and may also receive commissions from purchasers of the securities for whom they may act as agent. Underwriters may sell the securities to or through dealers, and such dealers may receive compensation in the form of discounts, concessions or commissions from the underwriters or commissions from the purchasers for which they may act as agents. The maximum compensation or discount to be received by any member of the National Association of Securities Dealers or any independent broker-dealer will not be greater than 8% for the sale of any securities registered pursuant Rule 415 under the Securities Act of 1933.
Shares may also be sold in one or more of the following transactions: (a) block transactions (which may involve crosses) in which a broker-dealer may sell all or a portion of the shares as agent but may position and resell all or a portion of the block as principal to facilitate the transaction; (b) purchases by a broker-dealer as principal and resale by the broker-dealer for its own account pursuant to a prospectus supplement; (c) a special offering, an exchange distribution or a secondary distribution in
12
--------------------------------------------------------------------------------
accordance with applicable Nasdaq National Market or other stock exchange rules; (d) ordinary brokerage transactions and transactions in which a broker-dealer solicits purchasers; (e) sales "at the market" to or through a market maker or into an existing trading market, on an exchange or otherwise, for shares; and (f) sales in other ways not involving market makers or established trading markets, including direct sales to purchasers. Broker-dealers may also receive compensation from purchasers of the shares, which is not expected to exceed that which is customary in the types of transactions involved.
Any underwriting compensation paid by us to underwriters or agents in connection with the offering of these securities, and any discounts or concessions or commissions allowed by underwriters to participating dealers, will be set forth in the applicable prospectus supplement. Dealers and agents participating in the distribution of the securities may be deemed to be underwriters, and any discounts and commissions received by them and any profit realized by them on resale of the securities may be deemed to be underwriting discounts and commissions.
Underwriters, dealers and agents may be entitled, under agreements entered into with us, to indemnification against and contribution toward certain civil liabilities, including liabilities under the Securities Act of 1933. Unless otherwise set forth in the accompanying prospectus supplement, the obligations of any underwriters to purchase any of these securities will be subject to certain conditions precedent, and the underwriters will be obligated to purchase all of the series of securities, if any are purchased.
Underwriters, dealers and agents may engage in transactions with, or perform services for, us and our affiliates in the ordinary course of business.
In connection with offering securities pursuant to this prospectus, certain underwriters, and selling group members and their respective affiliates, may engage in transactions that stabilize, maintain or otherwise affect the market price of the applicable securities. These transactions may include stabilization transactions effected in accordance with Rule 104 of Regulation M promulgated by the SEC pursuant to which these persons may bid for or purchase securities for the purpose of stabilizing their market price.
The underwriters in an offering of securities may also create a "short position" for their account by selling more securities in connection with the offering than they are committed to purchase from us. In that case, the underwriters could cover all or a portion of the short position by either purchasing securities in the open market following completion of the offering of these securities or by exercising any over-allotment option granted to them by us. In addition, the managing underwriter may impose "penalty bids" under contractual arrangements with other underwriters, which means that they can reclaim from an underwriter (or any selling group member participating in the offering) for the account of the other underwriters, the selling concession for the securities that are distributed in the offering but subsequently purchased for the account of the underwriters in the open market. Any of the transactions described in this paragraph or comparable transactions that are described in any accompanying prospectus supplement may result in the maintenance of the price of the securities at a level above that which might otherwise prevail in the open market. None of the transactions described in this paragraph or in an accompanying prospectus supplement are required to be taken by any underwriters and, if they are undertaken, may be discontinued at any time.
The Class A Common stock is listed on the Nasdaq National Market under the symbol "WAVX". Any underwriters or agents to or through which securities are sold by us may make a market in the securities, but these underwriters or agents will not be obligated to do so and any of them may discontinue any market making at any time without notice. No assurance can be given as to the liquidity of or trading market for any securities sold by us.
13
--------------------------------------------------------------------------------
LEGAL MATTERS
The validity of the securities offered hereby will be passed upon for Wave by Bingham McCutchen LLP, New York, New York.
EXPERTS
The consolidated financial statements of Wave Systems Corp. and Subsidiaries (a development stage corporation) as of December 31, 2003 and 2002, and for each of the years in the three-year period ended December 31, 2003 and for the period from February 12, 1988 (inception) through December 31, 2003 have been incorporated herein by reference and in the registration statement in reliance upon the report of KPMG LLP, independent certified public accountants, incorporated herein by reference, and upon the authority of said firm as experts in accounting and auditing.
The audit report covering the December 31, 2003 consolidated financial statements contains an explanatory paragraph that states that Wave's recurring losses from operations and accumulated deficit raise substantial doubt about the entity's ability to continue as a going concern. The consolidated financial statements do not include any adjustments that might result from the outcome of the uncertainty.
WHERE YOU CAN FIND MORE INFORMATION
We are subject to the periodic filing requirements of the Securities Exchange Act of 1934. Further to our obligations under the Exchange Act, we file reports, proxy and information statements and other information with the Securities and Exchange Commission. These reports, proxy and information statements and other information may be inspected and copied at the public reference facilities of the Securities and Exchange Commission at Room 1024, Judiciary Plaza, 450 Fifth Street, N.W., Washington, D.C. 20549. Copies of these materials also can be obtained from the Public Reference Section of the Securities and Exchange Commission at 450 Fifth Street, N.W., Washington, D.C. 20549, upon payment of prescribed fees. The Securities and Exchange Commission also maintains a site on the World Wide Web that contains reports, proxy and information statements and other information regarding registrants that file electronically with the Securities and Exchange Commission (including Wave). The address of this site is http://www.sec.gov.
We have filed a registration statement on Form S-3 with the Securities and Exchange Commission to register under the Securities Act of 1933 the securities that this prospectus offers. In accordance with the rules and regulations of the Securities and Exchange Commission, portions of the registration statement have been omitted from this prospectus. Therefore, this prospectus contains only some of the information in the registration statement. If you would like more information about Wave and the securities this prospectus offers, please refer to the registration statement, which is on file at the offices of the Commission. You may obtain copies of these documents upon payment of the fee, or you may examine them without charge at the offices or via the website. When we discuss other documents in this prospectus, we may not provide all of the information about or contained in those other documents. You should not rely upon this prospectus to provide a complete discussion of the contents of other documents. You should refer to those other documents yourself. Whenever we discuss the contents of other documents, we qualify our statements in all respects by reference to the applicable documents on file with the Commission.
INCORPORATION OF CERTAIN DOCUMENTS BY REFERENCE
The SEC allows us to incorporate into this prospectus information we file with the SEC in other documents. The information incorporated by reference is considered to be part of this prospectus and information we later file with the SEC will automatically update and supersede this information. We incorporate by reference the documents listed below and any future filings made with the SEC under
14
--------------------------------------------------------------------------------
Sections 13(a), 13(c), 14 and 15(d) of the Securities Exchange Act of 1934 until all of the shares of common stock that are part of this offering have been sold. The documents we have incorporated by reference are:
our Annual Report on Form 10-K for the year ended December 31, 2003; and
the description of our common stock contained in our Registration Statement on Form 8-A.
You may request a copy of these filings at no cost by writing or telephoning Wave Systems Corp., 480 Pleasant Street, Lee, Massachusetts 01238, (413) 243-1600.
15
--------------------------------------------------------------------------------
QuickLinks
TABLE OF CONTENTS
ABOUT THIS PROSPECTUS
RISK FACTORS
SPECIAL NOTE REGARDING FORWARD-LOOKING STATEMENTS
MARKET PRICE AND DIVIDENDS ON OUR STOCK
THE OFFERING
USE OF PROCEEDS
PLAN OF DISTRIBUTION
LEGAL MATTERS
TABLE OF CONTENTS
ABOUT THIS PROSPECTUS
OUR COMPANY
RISK FACTORS
STATEMENTS REGARDING FORWARD-LOOKING INFORMATION
USE OF PROCEEDS
DESCRIPTION OF CAPITAL STOCK
DESCRIPTION OF WARRANTS
PLAN OF DISTRIBUTION
LEGAL MATTERS
EXPERTS
WHERE YOU CAN FIND MORE INFORMATION
INCORPORATION OF CERTAIN DOCUMENTS BY REFERENCE
--------------------------------------------------------------------------------
End of Filing
© 2004 / EDGAR Online, Inc.
Wave has had news my last two days off. I am off today. Let's see if we can keep the streak intact. 1st week Dell, 2nd week Gov. contract, this week............?
Dave
Tumbleweed Licenses Email Firewall Patents to IronPort
REDWOOD CITY, Calif.--(BUSINESS WIRE)--Dec. 3, 2004--Tumbleweed(R) Communications Corp. (Nasdaq:TMWD), a leading provider of email security, file transfer security, and identity validation solutions, today announced the licensing of two technology patents to IronPort(TM) Systems, Inc.
IronPort Systems, a leading email security company, has licensed Tumbleweed U.S. Patent No. 6,609,196 titled "Email Firewall with Stored Key Encryption/Decryption" and Patent No. 6,393,568 titled "Encryption and Decryption Method with Content Analysis Provision," and has obtained an option to license additional Tumbleweed patents.
"We're pleased to assist IronPort Systems in bringing a broader choice of features through our licensed technology," said Jeffrey C. Smith, Tumbleweed's CEO and chairman. "We will always continue to develop and innovate for the industry."
Terms of the agreement were not disclosed.
At least you saw it before it got pulled!!
Hopefully when the curtain is lifted we will see the trades fly out like they have been on SIRI the last 3 weeks, and a nice steady climb too.
Dave
Cubic Team Wins Contract to Develop U.S. Army's Battle Command Knowledge System
Thursday December 2, 7:00 am ET
Information-Sharing Network Designed to Make Knowledge Available to Soldiers on the Battlefield in near Real Time
SAN DIEGO--(BUSINESS WIRE)--Dec. 2, 2004-- The defense segment of Cubic Corporation (AMEX:CUB - News) has been competitively awarded a U.S. Army contract to design, develop and implement the Battle Command Knowledge System, a global information-sharing system that will increase the ability of soldiers to tap into the Army's accumulated knowledge in near real time to adapt more quickly and effectively in training and fighting. The contract is for one-year and one option year, for a total value of $6.2 million.
Under the contract, Cubic's Training and Education Division, based in Leavenworth, Kansas, will join with Triple-i Corp., headquartered in Overland Park, Kansas, to establish and operate the Battle Command Knowledge System (BCKS). As conceptualized, the BCKS will be a system of interactive networks that will include web-based repositories of meta data, subject matter experts and web services that can be accessed globally through standard web browsers. Soldiers will use BCKS to quickly leverage knowledge to solve real-world operational problems. This will be done by having direct access to a wide range of experts and knowledge residing within specific units, staff organizations, education and training institutions, like the U.S. Military Academy at West Point and TRADOC Army Schools, and professional communities of practice, including the Center for Army Lessons Learned, as well as unit commanders and battle captains.
"The Battle Command Knowledge System facilitates the collection of knowledge from across the organization so that new knowledge can be quickly accessed and applied to improve the performance of people and systems within the Army," said John P. Lewis, Cubic's director for Education and Training. "This will provide the Army with a state of the art knowledge management system that will accelerate 'reachback learning,' resulting in improved organizational performance."
Cubic's Training & Education Division is part of the Cubic Defense Applications group (CDA), the defense segment of Cubic Corporation. CDA provides realistic combat training systems for military forces, as well as mission support services for training and exercises, modeling and simulation, force modernization, leadership development, curriculum design and development, web-based learning solutions and operations and maintenance services. The group also supplies products and systems for C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance) applications, search and rescue avionics, and radio communications for military and civil markets. Cubic Corporation's other major segment, Cubic Transportation Systems, designs and manufactures automatic fare collection systems for public mass transit authorities. For more information about Cubic, see the company's Web site at www.cubic.com.
Betrusted, TruSecure Complete Merger to Form Cybertrust
New Company Blends Deep Expertise in Security Intelligence, Services and Technology From Betrusted, TruSecure and Ubizen
HERNDON, VA and NEW YORK, NY -- (MARKET WIRE) -- 11/08/2004 -- Betrusted Holdings, Inc. and TruSecure Corporation today announced the completion of the merger previously announced on September 21, 2004.
The new company, known as Cybertrust (http://www.cybertrust.com), is the world's largest privately held information security firm. Cybertrust combines the in-depth operational security expertise, knowledge, and technology of Betrusted, TruSecure and Ubizen (a majority-owned subsidiary of Betrusted) to assist large enterprises and governments with today's critical information security and compliance issues.
With 1,000 employees, 4,000 clients worldwide and $160,000,000 in annual revenue, Cybertrust was conceived and built as a global information security leader able to respond to today's security challenges and assist organizations in creating pervasive trust for all their transactions and interactions. Betrusted brings industry-leading identity management solutions that secure access to mission-critical information assets and manage the digital identities of users accessing those assets. TruSecure's expertise in intelligent risk management and compliance products and services ensure good security processes, effective security practices and metric-driven risk management. Ubizen's focus on the detection and prevention of security threats and vulnerabilities, as well as expertise in security policies and infrastructures, significantly improve an organization's security posture. Cybertrust delivers its capabilities from 41 offices and 10 Trustcenters to customers in 58 countries, and is uniquely positioned to create a level of trust for clients that addresses their vulnerability issues, evolving regulatory compliance requirements and identity management needs.
About Betrusted Inc.
Betrusted is a global provider of security and trust services to the world's leading organizations and government agencies. Through its identity management solutions, expert professional services and managed security services, Betrusted offers clients a comprehensive portfolio of security solutions to help reduce costs, increase revenues and comply with government and industry regulations. Betrusted is wholly owned by One Equity Partners, a private equity arm of JPMorganChase. For more information, please visit http://www.betrusted.com.
About TruSecure Corp.
TruSecure is the leading provider of intelligent risk management and compliance products and services. TruSecure dramatically improves security and reduces risk by helping organizations make better security decisions and maximizing the effectiveness of existing security people, processes and technology. Leveraging TruSecure's security knowledge and intelligence gathering resources -- including ICSA Labs®, the global leader in information security product certification -- as well as innovative technology and time-tested processes, our customers can predict which vulnerabilities present real risk, prioritize remediation efforts, quickly adapt to changes in the security threatscape, measure progress in improving their security posture, and document compliance with applicable security policies, standards and regulations. For more information, please visit http://www.trusecure.com.
About Ubizen
Ubizen is the principal provider of Managed Security Solutions for global businesses. Companies rely on Ubizen OnlineGuardian® services to manage, monitor and support security devices 24x7x365. Ubizen's Professional Services complement Ubizen OnlineGuardian services by helping enterprises plan and implement security policies and infrastructures. Ubizen also protects Web servers against application-level attacks with Ubizen DMZ/Shield™ Enterprise. For more information visit http://www.ubizen.com.
--------------------------------------------------------------------------------
MEDIA CONTACTS
Global:
Diganta Majumder
GlobalFluency
212 213 5400 x 206
European:
Irene Dehaene
Cybertrust
+1 353 87 292 3333
Asia Pacific:
Wendy Hill
Bird & Hill PR
+61 2 9954 0555
SOURCE: Cybertrust
--------------------------------------------------------------------------------
I take a few days over $1.00 on 15 shares rather than this.
Dave
I think this is where everybody is missing the point. These TPM's and this technology are going to sneak up on the public and all of a sudden be in the marketplace in a huge way. Just . One day it will be there and people will be like "Oh". And if Wave is still here, we will be like "Yes!!" Ask the majority of IT people at any large corporations, most PC retailers etc.. and they still don't have a clue. We have a clue because we are following what is happening very closely. Most people could care less wether the PC they buy has a TPM in it or not. Sure they want a secure PC but, .......This is what the whole industry is trying to overcome, 67% of all pc user's do not have a firewall installed and how many of those are uising one only because it's on the pc they use at work and not because they installed it themselves? Major companies are sending people to Tony's web site because it seems to have the most comprehensive overview out there and ask him to provide links?!!? These are multi-million dollar companies with IT people and web sites and yet they give the info to Tony because he understands it and presents it in a way better than those in the middle of it? The fact of the matter is that this thing is still off on the horizon, and yes there will be a party some day with or without this company around, but most of the shareholders here have been ready for the party to begin before others knew they even had to plan one.
Dave
My impression on price action.
Just by reading these boards you know we have a good deal of long term support for this stock. I also believe we have plenty of long term lurking support. I also think we have just as many short players, known and unknown, as longs. And why not. I took a random look at the share prices today dating back to 2001 and look to see how the price has reacted at the end of a 3 week period after a substantial news release-EDS, Samsung, IBM and the like-anything WE might consider newsworthy, a validation of the dots if you will. The number of times the stock price was lower at the end of the three weeks following news was far greater than what I had expected will the drop in price far outweighing the gains made when it rose in a 3 week period.
I think what we are/have been seeing is many long termers loading up/ adding to for the big score not wanting to miss the big pay out. When we don't have any follow through other long termers, and maybe the ones that just bought sell some of the position to limit the losses. This stock has been a shorts dream for the last 4 years. The only real scare they had was the Intel announcement last year and even then it failed to hold much more than that 3 week period. The shorts realize that there is still plenty of buying on perceived significant announcements, folllowed by the sell off on no follow through. This game continues until revenues accompany news.
Dave
Wave Mention......................
National Semi Throws a Padlock on PCs
By Michael Singer
National Semiconductor (Quote, Chart) took the wraps off a pair of I/O devices it said could help protect a computer from hackers and viruses.
The Santa Clara, Calif.-based chipmaker said its new SafeKeeper brand PC8374T Desktop device in a PQFP-128 package is ready now and its PC8392T Notebook Trusted I/O device will be available before the end of the year. In discount volumes of 1,000 units, the company said the devices are priced at $5 and $7 respectively.
Both devices are based on National's embedded 16-bit CompactRISC core technology and meet standards agreed upon by industry consortium Trusted Computing Group's TPM 1.1b specification. The units are also lead-free and have a low pin-count, which the company said would make them perfect for existing systems because they sit at the intersection of input devices to the PC.
National's Trusted I/O takes a different approach to security than Microsoft's (Quote, Chart) hardware/software partnerships with other chipmakers like Intel, (Quote, Chart) AMD, (Quote, Chart) and Transmeta (Quote, Chart). That collective looks to prevent buffer overflow (define) problems with the help of silicon-based security and Microsoft's latest Windows XP service pack.
In contrast, National said its devices integrate a Trusted Platform Module (TPM), Super I/O and embedded firmware to store the computer's identity in silicon, making it virtually impossible for outsiders to locate key information. TPMs are microcontrollers that securely store passwords, digital certificates and encryption keys for PCs and other systems. These devices, which comply with Trusted Computing Group (TCG) specifications, protect computer software, such as BIOS, operating systems and applications, from unauthorized or malicious attacks.
National also said its use of standard interfaces let it partner with security software developers such as IBM and Wave Systems to offer multiple security options. And working with National's hardware, the company said system engineers could create a dual-system design that can accept either part. For example, manufacturers could design "TPM-ready" systems without designing in an additional empty socket.
IBM (Quote, Chart) has used TPMs since 1999 and this time is no exception. The Armonk, N.Y.-based computer giant said it is the first manufacturer to equip selected models of its desktop computers with National Semi's I/O devices.
"IBM has led the industry in developing secure, manageable systems since pioneering embedded PC security in 1999," Clain Anderson, program director of wireless and security solutions at IBM, said in a statement.
Anderson said IBM would use National's Trusted I/O chip for its newly launched desktop IBM ThinkCentre models featuring the IBM Embedded Security Subsystem.
Densitron Commences Shipping of Single Board Computer Which Is First Embedded Application To Include Atmel's Trusted Platform Module (TPM)
Densitron's DPX-114 and DPX-115 Include the Atmel AT97SC3201 TPM
Embedded Systems Conference, BOSTON, Sept. 13 /PRNewswire-FirstCall/ --
Densitron, a leader in embedded PC products, has chosen Atmel Corporation's
(Nasdaq: ATML) Trusted Platform Module (TPM) for increased hardware security
in their new line of products. Like the PC market, embedded computing
applications, including gaming, require higher levels of security. For this
reason, the new DPX-114 and DPX-115 products will use the Atmel AT97SC3201 TPM
chip. This security module provides a hardware solution for such functions as
RSA encryption/decryption, secure key storage, and SHA (secure hash
algorithm). These functions can be used for a variety of security related
tasks, including locking down the software to the hardware platform, combating
software tampering and piracy, managing digital copyright and licensing, and
safeguarding data transactions both internally or over networks.
Although the DPX-114 and DPX-115 are the first embedded single board
computers to come with an integrated TPM, the TPM and associated security
architecture are fast becoming a standard in the mainstream PC and embedded
markets. The Trusted Computing Group (TCG), whose members include most of the
major companies in the PC and electronics industries, has established the
security architecture as an industry standard for application across four
broad areas: risk management, e-commerce, asset management, and security
monitoring and emergency response.
Densitron's products are used in a wide variety of embedded computing
applications but the company's main success and focus have been in gaming,
particularly in video slot machines. The casino gaming industry, a fast
growing industry in excess of $200 billion worldwide, has always been a
security conscious industry, and has employed many methods to ensure the
security and random outcome of the games.
The gaming industry uses standard encryption and hashing methods in
software to ensure the integrity of the game code and to safeguard against
tampering, hacking or duplication of the games. With the TPM, these methods
can be greatly strengthened and enhanced, and some of the software overhead
reduced by using the TPM hardware solution. In addition, TPMs provide system
developers access to an affordable hardware module delivering a level of
security that has been audited to international standards by independent and
government laboratories. This level of security is impractical to achieve
with proprietary solutions whether they be implemented in hardware or
software. The TPM's random number generator is also very useful in gaming
applications. The high quality random number generator in the TPM
incorporates several sophisticated hardware circuits along with internal
firmware to ensure that random numbers can never be guessed; a significant
improvement over the software pseudo-random number generators typically used
in the past.
According to Craig Stapleton, Densitron's Product Manager for computer
products, "The enhanced performance and security capabilities available with
Atmel's TPM on our new boards give embedded developers the features they need
to help keep control of their intellectual property and safeguard operation
and data. For the gaming industry we see huge benefits in using the TPM
architecture both for standalone games and also for the growing markets for
networked gambling, downloadable games and client-server based games for Class
II tribal gaming. Atmel has provided us with excellent support including
software drivers and API to make integration of the TPM into our customers'
applications straightforward."
Atmel's Product Manager for secure products, Kevin Schutz comments, "It's
exciting to work with innovative companies such as Densitron who are willing
to embrace industry standards like TCG. Extensive engineering has gone into
making the TPM easy to use while still offering world-class data and
communications protection. Incorporating this turnkey chip into a wide
variety of embedded systems is a natural answer for embedded systems
designers."
About Densitron Corporation
Densitron Corporation is a leader in flat-panel display technologies and
embedded PC products. Densitron designs, manufactures and sells industrial
computers, flat-panel industrial monitors, graphic and alphanumeric LCDs,
touch screen display assemblies, and public information display systems.
Densitron specializes in engineering the most cost-effective solution to meet
its customers needs, and has the ability to design and manufacture turnkey
solutions for the handheld, medical, instrumentation, and industrial OEM
markets in America, Asia and Europe. Visit us at http://www.densitron.com and
http://www.gamingboards.com for more information on our products and services.
Densitron Corporation is a wholly owned subsidiary of Densitron Technologies
PLC (LSE: DSN), which is a publicly held company, traded on the London Stock
Exchange.
About Atmel
Founded in 1984, Atmel Corporation is headquartered in San Jose,
California with manufacturing facilities in North America and Europe. Atmel
designs, manufactures and markets worldwide, advanced logic, mixed-signal,
nonvolatile memory and RF semiconductors. Atmel is also a leading provider of
system-level integration semiconductor solutions using CMOS, BiCMOS, SiGe, and
high-voltage BCDMOS process technologies.
About Trusted Computing Group
The Trusted Computing Group (TCG) is an open, industry standards
organization formed to develop, define, and promote open standards for
hardware-enabled trusted computing and security technologies, including
hardware building blocks and software interfaces, across multiple platforms,
peripherals, and devices. TCG specifications enable more secure computing
environments without compromising functional integrity, privacy, or individual
rights. The primary goal is to help users protect their information assets
(data, passwords, keys, etc.) from compromise due to external software attack
and physical theft. For more information, go to
http://www.trustedcomputinggroup.org.
NOTE: Atmel(R), logo and combinations thereof, are registered trademarks,
and Everywhere You Are is a trademark of Atmel Corporation or its
subsidiaries. Other terms and product names may be trademarks of others.
Information:
Densitron's product information may be retrieved at:
http://www.densitron.com/computer
Atmel's product information may be retrieved at:
http://www.atmel.com/products/Embedded/
Press Contact Densitron:
Craig Stapleton
Tel: +1-562-236-1805, Email: marketing@densitron.com
Press Contacts Atmel:
Vicki McCann, Director Marketing Communications - USA,
Tel: +1-719-540-1724, Email: vmccann@cso.atmel.com
Veronique Sablereau, Corporate Communications Manager - Europe,
Tel: +33 1 30 60 70 68, Email: veronique.sablereau@atmel.com
SOURCE Atmel Corporation
Web Site: http://www.atmel.com
Big Blue installs Safekeeper TPM
Rusted computing
By Nick Farrell: Friday 17 September 2004, 07:57
IBM IS jacking in security hardware from National Semiconductor into its desktop PCs.
SafeKeeper Trusted I/O devices have a trusted platform module (TPM), which stores passwords, digital certificates, and encryption keys.
The big idea is that data stored in a PC's firmware is less vulnerable to attack than data protected only by software.
TPM-stored data can authenticate a computer on a network, providing identity information in a way that's harder to forge.
IBM said the devices are being used in ThinkCentre models featuring its IBM Embedded Security Subsystem and they should hit the shops soon.
Big Blue has used truster platform modules since 1999, starting with its Thinkpads. But those modules were from a NatSemi competitor. It appears that Dell and HP are to follow suit
STMicroelectronics does not license software from Wave if the company was going under in a few months.
Samsung Cell Phones to Get Tiny Hard Drive
At some point this downloaded data will need to be secured!
By MAY WONG, AP Technology Writer
SAN JOSE, Calif. - Samsung Electronics Co. Ltd. has announced the world's first mobile phone to sport a tiny hard drive. With the built-in 1-inch, 1.5-gigabyte hard disk, the SPH-V5400 could store about 15 times more data than conventional handsets — everything from digital music files and photos to video, Samsung said.
Missed Tech Tuesday?
We rank the best PDAs, share some synching tips, and show how PDAs will only get better.
The phone is equipped with a mega-pixel camera, camcorder, MP3 player, a high-resolution 2.2-inch display, a microphone and dual speakers. It will be available in South Korea (news - web sites) later this month. Samsung did not disclose a price or any plans to sell it in the United States or elsewhere.
Hard drives are becoming an increasingly popular component in consumer electronics to accommodate the need for more digital data storage, and makers of the mini drives have worked to squeeze more and more capacity out of the coin-sized disks.
Seagate Technologies LLC has a 1-inch drive that holds 5 gigabytes of data, while Toshiba Corp. has developed an even tinier drive — at 0.85 inches in diameter — to store 2 to 3 gigabytes of data.
Although we haven't seen some of these highly anticipated, revenue generating announcements some have been so anxious to see, we have to feel a quiet confidence building in this space. True we have not seen any hard revenues, however we have not seen anything indicating more shares entering the market, or any hat in handing trolling for cash either. What we have seen is more of the same announcements about where Wave will be presenting and other things along these lines. We see some positions looking to befilled within the company that they had no need for prior to now. We see them on a government vendor list. Some say not significant. I disagree. We had product before but were not on that list as far as we know. We are now. The Yes network deal could prove very rewarding as well. As other teams see the revenue that can be generated in this area they too could possible work to emulate what the Yankees are doing. I saw a clip here in Cleveland that the Indians were looking to do something along the lines of what the Yankees have with the Yes network. Apple just sold it's 100 millionth tune for it's IPOD application since April of 03. This revenue model for content works. $99M in 15 months on a platform that appeals to a small segment of the PC community-based on sales figures, not the tech- content providers and creators have got to take notice of this. We should have a clear vision of what awaits this company within the coming weeks and months ahead. The buzzwords we have known for many months now have entered into the lexicon of the article writers in magazines other than those aimed at the tech folk. The race is on now. I think it's safe to say if we are still subject to the same sort of mystery that permeates the quarterly CC's today, this time next year, a truly exceptional opportunity has been wasted by this company with many loyal shareholders in tow.
On a lighter note, although I haven't posted much here lately I still peruse the board daily. I recently sold my house-on the market and sold in 2 days- and need to finish my packing. It wasn't too bad when there was 2 of us moving from a 1 bedroom apartment to this house, but I think it'll be a little more involved this time around.
Keep the faith,
Dave
Wave Systems Trusted Platform Module Cryptographic Service Provider Allows Developers to Address Broader Trusted Platform Module Market
6/30/2004 6:30:00 AM
LEE, Mass., Jun 30, 2004 (BUSINESS WIRE) -- Addressing the need for independent software vendors to more productively deal with the trusted computing market, Wave Systems Corp. (WAVX)(www.wave.com) today announced the availability of a Cryptographic Service Provider (CSP) that provides access to Trusted Computing Group (TCG)-compliant PC platforms.
Millions of PCs have been shipped by the computer industry with a TCG-standard chip, called the Trusted Platform Module (TPM), installed. TPMs serve as a platform for secure services and applications - offered by companies such as Wave Systems. Wave has introduced the EMBASSY(R) Trust Suite, secure business productivity software that is designed to work with all TCG-compliant TPMs commercially available. The hallmark of EMBASSY Trust Suite solutions is usability - designed to be easy to enable, easy to use and easy to manage by IT administrators.
"TPM-equipped PCs can provide secure network authentication and strong user credentials, greatly reducing the security exposures associated with passwords alone," said Martin Reynolds, vice president and Gartner Fellow, Gartner, Inc. "The industry's challenge is make TPM capabilities accessible to users."
"More and more systems with enhanced security based on TPMs are in the hands of users, which means that the development of applications and services that take full advantage of the TPM has become a priority," said Nancy Sumrall, chairman, TCG marketing work group. "Tools such as Wave's CSP can help speed development of these important applications."
Wave's new Cryptographic Service Provider is designed to help other independent software developers address this growing secure services and applications market.
Wave's new CSP is designed to allow software developers to provide TPM-based cryptographic functions through the Microsoft Crypto Application Library (MSCAPI or CryptoAPI). While other companies have made CSP functionality available, the functionality has been tied to a specific vendor's TPM. Wave's CSP solution, in contrast, is designed to allow a software developer to write a hardware-based cryptographic program that will run on any TCG-compliant trusted platform module. This would allow the growing market from multiple TPM vendors to be addressed more productively.
"Thousands of independent software developers have created PC security products that use the standard Microsoft Crypto Application Library. Now these developers can potentially be made more productive by addressing the emerging Trusted Computing Market using Wave's new Cryptographic Service Provider," said Brian Berger, executive vice president, marketing and sales, Wave Systems.
"While other CSPs may target one particular trusted platform module product, the Wave CSP is designed to allow developers the ability to write to a standard interface (MSCAPI) using one CSP without worrying about which underlying security hardware is in the personal computer," he said.
Developers may learn more information about the Wave Cryptographic Service Provider by linking to http://www.wave.com/products/csp.html
The Trusted Computing Group is an open industry standards organization whose specifications help vendors build products that let users protect critical data and information.
About Wave Systems
Consumers and businesses are demanding a computing environment that is more trusted, private, safe and secure. Wave is the leader in delivering trusted computing applications and services with advanced products, infrastructure and solutions across multiple trusted platforms from a variety of vendors. Wave holds a portfolio of significant fundamental patents in security and e-commerce applications and employs some of the world's leading security systems architects and engineers. For more information about Wave, visit http://www.wave.com.
Safe Harbor for Forward-Looking Statements
Except for the statements of historical fact, the information presented herein constitutes forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Such forward-looking statements involve known and unknown risks, uncertainties and other factors which may cause the actual results, performance or achievements of the company to be materially different from any future results, performance or achievements expressed or implied by such forward-looking statements. Such factors include general economic and business conditions, the ability to fund operations, the ability to forge partnerships required for deployment, changes in consumer and corporate buying habits, chip development and production, the rapid pace of change in the technology industry and other factors over which Wave Systems Corp. has little or no control. Wave Systems assumes no obligation to publicly update or revise any forward-looking statements.
SOURCE: Wave Systems Corp.
Wave Systems Corp.
John Callahan, 413-243-7029
jcallahan@wavesys.com
or
Jaffoni & Collins
David Collins, Richard Land, 212-835-8500
wavx@jcir.com
R-r-revolutionary Intel 915/925 Express Family for Socket 775
http://www.digit-life.com/articles2/roundupmobo/i915-i925-chipsets.html
We lifted the veil of secrecy off the future last week when we issued the first test results of DDR2, a new memory type. (The same article also contains a description of basic differences between DDR2 and its predecessor.) However, this pales before an official announcement of a new Intel platform (June, 21) which will surely bring a lot of changes into our lives. Well, let me introduce you the i925/915 Express family supporting Socket 775, DDR2, and PCI Express.
Intel 925X/915P/915G Express
The schematic below contains key features of the new chipsets:
There are no differences between i925X and i915P in terms of architecture, and i915G is, in fact, the same i915P with integrated graphics. The release of the i865/875 and i848P lines was obviously aimed at supporting new Pentium 4 CPUs with an 800-MHz FSB and also at implementing the dual-channel memory mode. The situation with i915/925 is somewhat more complicated. It doesn't just provide a ground for systems based on Pentium 4 with the new LGA775 socket, it also supports multiple new technologies which suddenly appeared all together and will stay for long in our lives. Well, let's take them one by one.
Support of CPUs with a 533/800MHz bus frequency. First of all, it is only the i915 series that supports 533 MHz, while the top i925X doesn't condescend to old-time Pentium 4 models or new Celeron D ones. In fact, this is exactly what we saw when i875P was announced: in contrast to i865x, that particular chipset didn't support 400-MHz buses. Second, it is sort of implied that the new chipsets will only work with new CPUs made for Socket 775. But that is not true: because the bus interface hasn't changed, it is possible to make i9xx-based boards for Socket 478. However, they will hardly become widespread. As for the details of the new socket, you can find them in this article. All new chipsets support Hyper-Threading, and that actually brings us to the end of the processor part.
Dual-channel DDR333/400 and DDR2-400/533 memory controller. Here, it's all about market positioning too. Officially, i925X won't work with DDR (no compomises with the past). When you select memory frequency, you'll see no lowering multipliers, such as DDR400/DDR2-400/533 at FSB 800 MHz (1:1 and 4:3) or DDR333/400 at FSB 533 MHz (5:4 and 3:2). And you can use DDR2 only with CPUs on 800-MHz buses (although there is contradicting information on that account, so we'd better wait for real boards). The qualitative parameters of the memory subsystem haven't changed: up to 4 modules/4 GB; i925X support ECC, i915 do not.
Since i865/875 times, the organisation of the dual-channel mode has become more handy for users. The so-called Flex Memory technology enables to install three DIMMs preserving dual-channelness if both channels have the same total memory size. For example, stepwise upgrade with no performance loss can now look as follows: 256/256 MB —> 256+256/512 MB —> 256+512/256+512 MB. The system can surely cope with an asymmetrical slot filling in different channels, but then performance will fall (as is the case with i865/875).
One of the burning issues about i915x is if they can juggle DDR and DDR2 simultaneously. Problems are likely to arise with onboard layout of connectors for both memory types. At least, Intel has no Design Guide for a case like this. There are samples with DDR and DDR2 slots, but their stability is dubious. And of course, only one-type DIMMs can function simultaneously (there is a set of pins, common for both types, that is responsible for interaction with memory in the chipset, and an external onboard commutation is needed). Thus, you won't be able to make incorporating memory upgrade and therefore, such hybrids will hardly be of any use. On the other hand, you can install your current (or newly-bought) DDR modules into a future board that has soldered connectors of this type. It is an essential point, as DDR2 gives no real performance gain in today's and tomorrow's computers, such modules cost much more, and reduced heat-emission can only be interesting in the case of small-size (SFF) systems.
To increase performance, Intel chipsets use a number of memory controller optimisations which are supposed to make them superior to rival chipsets. There are two noteworthy innovations here. First, the memory arbiter tries to perform packet refresh of the memory pages according to the current access algorithm. It takes up to 15 percent of operating time to regenerate dynamic memory, so it is essential that it is refreshed within interaccess periods. Evidently, an i9xx arbiter uses a sort of a smart analysis of the current frequency and access character and can also employ specific DDR2 features. The other innovation consists in an advanced data rearrangement in the memory. Obviously, the memory controller divides the linear address space into banks according to DIMM configuration and access mode. Thus, it can provide more open pages for integrated video if display resolution and refresh rate are increased.
And certainly, Intel didn't forget about the legend for i925X: it can't be considered a top chipset just because it has minimal support of older componentry, and ECC support can hardly be regarded as a marketing advantage too. i925X performance exceeds i915 insignificantly and only due to PAT which now has no special name, though sometimes you can come across the word «Turbo» in the documentation. The fact that many board manufacturers enable PAT on i865x chipsets has definitely compromised this term. As for acceleration, it results, as usual, from a faster data pass through the chipset due to less matching buffers on intrachipset ways (the so-called trajectories) which are used for certain combinations of FSB/memory frequencies. Naturally, the question arises if PAT can be enabled on i915. Well, time will tell, but we have reason to believe that it can't. (Our permanent readers may remember Intel's patient for a technology that allows to block overclocking on the manufacturer's chips.)
PCI Express x16 bus for external videoaccelerators. Intel sees no ground for compromises in this respect, and the company has rejected AGP altogether. Indeed, it is too difficult for a chipset to juggle both interfaces due to a great difference in electric parameters, while a separate pinout unit for AGP 8x is too much, considering MCH has over 1200 pins as it is (see our latest article with comparative results for more details). Alternative ways include VIA chipsets (though we have seen no real working boards with two graphic interfaces) and a PCI/AGP slot transformation (some manufacturers have come up with this idea but realisation details are yet unknown). And again, time will show how stable, productive and hence attractive such boards will be.
Integrated i915G graphics. The third generation of Intel's modern integrated graphics is officially named GMA (Graphics Media Accelerator) 900. GMA 900 differs from its i865G predecessor in an increased core frequency (333 vs. 266 MHz), more pipelines (4 vs. 1), hardware support of DirectX 9 (vs. 7.1) and OpenGL 1.4 (vs. 1.3), as well as in some minor details. We don't think it's really interesting to take a closer look at each of the points considering it is a low-end accelerator. But Intel officials also stress an almost twofold excellence over Intel Extreme Graphics 2 (i865G) in a number of tests, and that is what we'll check as soon as we get a corresponding motherboard. Until then, we can only mention that despite a formal support of DirectX 9, GMA 900 is only suitable for old games. Those willing to buy an i915G-based board will probably be more interested in the support of higher display refresh rates (up to 85 Hz in QXGA (2048x1536)) and two separate images (vs. one in previous generations of integrated Intel graphics).
ICH6(/R/W/RW) south bridge and a connection to the north one via a DMI bus. We'll dwell on the functionality of the new south bridge family a bit later. For now, we'll note that the bridges in i915/925 are connected via a special DMI (Direct Media Interface) bus which is an electrically modified version of PCI Express x4 (~2 GB/s). Why so low one may ask. Well, Intel's interbridge (interhub) bus has never set records in bandwidth (e.g. it was 266 MB/s in i865/875 vs. ~1 GB/s in SiS chipsets). However, Intel system logic sets have never seen fixed falls in periphery interaction performance. Evidently, the company's engineers are competent in assessing the real need for bandwidth. As for ICH6 variants, there are 4 of them: minimal, with a RAID function, with a wireless network (Wi-Fi) organisation function, and a combination of the latter two. All the details are given below.
4 PCI Express x1 ports. It is certainly no accident that the full name of the new chipsets is Intel 9xxx Express. The use of PCIE instead of PCI is a more important event than a transition to DDR2, to say nothing of a socket replacement. A single-channel PCI Express variant is designed for work with standard desktop periphery, so new boards will have several PCIEx1 slots (500MB/s bandwidth) and probably soldered controllers connected to the south bridge via this interface. Theoretical aspects can be read in our presentation of PCI Express, and practical ones are soon to come as the industry has already embarked on a transition to this bus.
Matrix Storage: support of Serial ATA devices with RAID and AHCI (RAID only in versions ICH6R/RW). Now there is support of 4 SATA ports for 4 devices with a possible RAID 0 or 1 organisation from any two discs and a separate RAID 0 or 1 organisation from any other two discs. But it's not only quantitative aspects that have changed since ICH5 times. In the spring of 2003, HDDs with full-spec SATA controllers were practically absent from the market, and normally, interface bridges on the HDD control board were used. Thus, there was no realising such functions as NCQ (Native Command Queuing) and others from the SATA AHCI (Advanced Host Controller Interface) set. In 2004, HDDs that realise this basic functionality have become available, so the new generation of Intel south bridges offers AHCI support.
For users, the most important results of the SATA disc working via the ICH6 SATA controller are acceleration of RAID and even a separate disc, as well as Hot Plug support. But an AHCI-aware driver (Intel Application Accelerator 4.0 and higher) is needed for this, as the SATA driver integrated in Windows XP has no such support. The difference in this case can reach 10 percent in tasks that are sensible to the disc subsystem speed. Hot Plug itself is not so important for users (you don't often remove the HDD on the run, do you?), but now you can fully realise RAID 1 (mirroring). RAID 1 is mainly used to detect a fault, disable the fault disc, install a new one, and continue working (information is doubled automatically). In ICH5R times, one had to switch off the computer and restore RAID in BIOS.
RAID Migration and Matrix RAID are two other interesting ICH6R functions. The former enables a transparent extension of the current one-disc system to RAID 0 or 1 straight from Windows, and you don't have to digress from your PC activity during array organisation. Matrix RAID forms RAID 0 and RAID 1 on two discs simultaneously. For this, each disc is divided into two parts that are then combined into different arrays one by one. As a result, we can get a small but fast disc (RAID 0) for storing the swap file and frequently used applications and a safe one (RAID 1) for documents, archives, etc.
High Definition Audio: a new standard for integrated sound. The basis of the future standard (and HDA is very likely to become one) is a support of 24-bit 8-channel sound at the sampling frequency of 192 kHz. As we remember, the AC'97 specification mentioned 20-bit 6-channel sound at 96 kHz. HDA's advantages are obvious especially considering that it supports all actual audio formats (including Dolby, DTS, and DVD-Audio). The functioning scheme has undergone no fundamental changes since AC'97 times, only a clock oscillator of the south bridge is now suggested to use instead of an oscillator integrated into the codec. In theory, it increases sound processing quality due to a stable and accurate oscillator frequency.
All AC'97 codec manufacturers have easily shifted to the new-standard products, so there is no shortage of componentry. By the way, ICH6 not only supports HDA, but can also work with AC'97 codecs (though not simultaneously as the board must realise only one type of integrated sound). Thus, we may occasionally come across a new model with old music. A single universal Microsoft driver is regarded as HDA's strength, but in practice, proprietary drivers are unlikely to be rejected, as each codecs has its own particularities and extended functionality features, and a software interface (mixer, equaliser, etc.) is already written for the codec's own hardware.
Jack Retasking is a curious feature of the HDA standard. It retasks an audio connector according to the device plugged into it. The current version of AC'97 specification (v2.3) mentions Jack Sensing which identifies the type of the connected device (due to cardinally different impendance of, say, a microphone, headphones, and active speakers). Sounds good, but in reality, it is not so useful to have a program telling you that you have connected speakers to the Line In. You can sooner find it out without software assistance, just by hearing no sound from the speakers. And in general, the best thing to do is to consult the user manual. But it's quite another thing if a smart computer can receive (and preamplify) the microphone signal with the help of a new module codec scheme and output the sound to the headphones irrespective of the connector their plug has been fitted into. Thus, we'll no longer have to reach for the back panel of the PCM trying to see what is wrong through layers of cables and dust.
Wireless Connect, an organisation of a wireless network. Here we have the most complicated situation. In principle, a non-supplied extension card together with the ICH6W south bridge realise the functionality of a wireless LAN controller standard IEEE 802.11b/g (Wi-Fi). However, it is unclear what ICH6W is charged with in this liason (we only know that it stores firmware and is responsible for ACPI modes). The format of the extension card is uncertain too: it seems to be a PCI, but there is information that it is a PCIEx1. Its reference design is ready, but again, we know nothing about the shipment time. Considering the fact that you pay a little too much for ICH6W (compared to ICH6) and will have to buy the only variant of the extension card (made by Intel, that is, not inexpensive either), we think it's better to choose a complete solution of some other manufacturer. The advantages of Intel's variant might only include convenient software that enables even a beginner to organise a wireless network using the mainboard controlller as the access point.
South bridge supporting other peripherals. The term USB 2.0 wasn't so popular a short time ago. Now a support of 8 ports of this standard is taken for granted and is not regarded as something new. The expansion of PCI Express and Serial ATA hasn't caused (and won't cause in the nearest future) a full rejection of old peripheral interfaces, so up to six PCI Bus Master devices can work with ICH6, whereas the number of Parallel ATA channels has been reduced to one (for two devices). It is strange that Intel hasn't delivered a proportionate reaction to the spread of Gigabit Ethernet, but anyway, the only noteworthy thing about the company's new south bridge is a Fast Ethernet (10/100 Mbit/s) MAC controller. And may we not mention other legacy and low-speed peripherals, such as SMBus and LPC buses.
We've done with the chipset's functionality, but ther is one more important thing about i915/925-based mainboards, namely, the power scheme and the form factor. Well, Q3 and serial products of the new BTX form factor are soon to come, but there seems to be no fever in this connection. In general, the transition to BTX won't be obligatory and across-the-board, as the standard is mostly important for small-size systems. Concerning the market of desktop products, ATX is still reckoned with and will retain its position if it introduces timely modifications.
The current one is power-related once again. Because actual norms allow to make graphic cards for PCIEx16 with an over-75W heat emission, +12V is necessary to be supplied to the board via an additional conductor (6 A). The power connector has been specially enlarged for motherboards: the old 2x10-pin socket has been made into a 2x12 one, and four new pins (+3.3, +5, +12 V, ground) are placed on the side, so an ATX 2.03 PSU connector can be used. But certainly, it will only work if you don't use too power-consuming components. However, manufacturers can quite resort to the already-used solution of soldering a socket for the HDD power connector (in fact, the socket will move from AGP graphic cards onto motherboards with PCIEx16).
We decided not to compare potential rivals theoretically as only SiS had officially released the specs of its first PCI Express supporting chipset (SiS656) by the moment the article was written. And as for a practical comparison, it will come much later than that as retail stores sell no DDR2 memory, or PCIE videoaccelerators, or PCIEx1 extension cards for the moment. Due to these reasons, it was the first time we suffered acute shortage of hardware not of time when carrying out our tests.
Performance tests
Testbed:
CPUs:
Intel Pentium 4 3.4E GHz (Prescott), Socket 478
Intel Pentium 4 550 (3.4 GHz, Prescott), Socket 775
Mainboards:
ASUS P4C800 Deluxe (version BIOS 1016) on Intel 875P
ABIT AA8 DuraMAX (version BIOS AA8_13.b00) on Intel 925X
ECS PF4 Extreme (version BIOS 1.0Pb) on Intel 915P
Memory:
2x512 MB PC3200(DDR400) DDR SDRAM DIMM Corsair, 2-2-2-5
2x512 MB PC2-4300(DDR2-533) DDR2 SDRAM DIMM Samsung, 4-4-4-11
Graphic cards:
GeForce FX 5900 (400/700MHz) 128 MB (for tests on i875P)
GeForce PCX 5900 (400/700MHz) 128 MB (for tests on i915P)
ATI Radeon X600XT (for tests on i925X)
HDD: Western Digital WD360 (SATA), 10000rpm
Software:
OSs and drivers:
Windows XP Professional SP1
DirectX 9.0b
Intel Chipset Software Installation Utility 6.0.1.1002
ATI Catalyst 4.7 beta (6458)
NVIDIA ForceWare 61.40
Test applications:
CacheBurst32 0.91.07
7-Zip 3.13
WinRAR 3.30
Canopus ProCoder (Demo v1.25)
Adobe Photoshop 7.0
Gray Matter Studios & Nerve Software Return to Castle Wolfenstein v1.1
Croteam/GodGames Serious Sam: The Second Encounter v1.07
Digital Extremes/Epic Games/Atari Unreal Tournament 2003 v2225
The table below contains brief characteristics of the tested boards.
Board ASUS P4C800 Deluxe ABIT AA8 DuraMAX ECS PF4 Extreme
Board ASUS P4C800 Deluxe ABIT AA8 DuraMAX ECS PF4 Extreme
Chipset Intel 875P (RG82004MC + FW82801EB) Intel 925X (NG82925X + FW82801FR) Intel 915P (NG82GDP + FW82801FW)
CPU support Socket 478, Intel Pentium 4 (HT support), Intel Celeron Socket 775, Intel Pentium 4 Socket 775, Intel Pentium 4, Intel Celeron D
Memory slots 4 DDR 4 DDR2 4 DDR2
Extension slots AGP Pro/ 5 PCI PCIEx16/ 3 PCIEx1/ 2 PCI PCIEx16/ 2 PCIEx1/ 3 PCI
I/O ports 1 FDD, 2 COM (1 on bracket), 1 LPT, 2 PS/2 1 FDD, 2 COM, 1 LPT, 2 PS/2 1 FDD, 1 LPT (on bracket), 1 COM, 2 PS/2
USB 4 USB 2.0 + 2 connectors for 2 USB 2.0 4 USB 2.0 + 2 connectors for 2 USB 2.0 4 USB 2.0 + 2 connectors for 2 USB 2.0
FireWire 1 + 1 connector for one port (VIA VT6307) 1 + 2 on bracket (TI TSB43AB23) 1 + 1 on one of two brackets (VIA VT6307)
Integrated ATA controller ATA100 + SATA ATA100 + SATA RAID ATA100 + SATA
External ATA controller Promise PDC20378 (ATA133+SATA RAID) — SiS180 (SATA/ATA133 RAID)
Sound AC'97 codec Analog Devices AD1985, Coaxial S/PDIF-Out HDA codec Avance Logic ALC880, Toslink S/PDIF-In/Out HDA codec C-Media CMI9880, Toslink S/PDIF-In/Out
LAN controller 3Com Marvell 940-MV00 (Gigabit Ethernet) Realtek RTL8110S-32 (Gigabit Ethernet) Marvell 88E8001-LKJ (Gigabit Ethernet) + Realtek RTL8100C (Fast Ethernet)
I/O controller Winbond W83627THF-A Winbond W83627HF-AW Winbond W83627THF
BIOS 4 Mbit AMI BIOS v2.51 4 Mbit Phoenix AwardBIOS v6.00PG 4 Mbit Phoenix AwardBIOS v6.00PG
Form factor, dimensions ATX, 30.5x24.5 cm ATX, 30.5x24.5 cm ATX, 30.5x24.5 cm
Test results
The GeForce PCX 5900 (PCIEx16) card that opened our testing couldn't make it to the end due to certain reasons, and we had to replace it with an ATI's middle-level PCI card (Radeon X600XT). As a result, the systems' readings can't be directly compared in the games and i925X has to skip the game tests.
We will start with the low-level memory test and use RightMark Memory Analyzer. Interestingly, in read without data prefetch, i875P shows much higher performance than modern i915/925 with DDR2 that has higher bandwidth. If we use prefetch, both new systems are limited by FSB bandwidth (6.4 GB/s; the nominal FSB frequency of i915P-based boards is overstated by about one percent). i875P is two percent slower, probably because 6.4 GB/s limit this chipset too.
Chipsets with DDR2 have a higher memory write speed, and i925X takes the first place here. The test of maximal memory write speed with the influence of the CPU cache excluded (forward data save) shows that all the chipsets are roughly equal.
We're measuring memory latency using pseudo-random access as it prevents the hardware prefetcher to overstate the result and doesn't allow the results to lower due to D-TLB misses (that take place in the case of truly random access). However, the algorithm is not effective enough if you're working with a Pentium 4 as the CPU reads two 64-byte lines to the cache at each memory address. The solution is to increase the step size at read to make it larger than the standard size set by RMMA.
Now it's fair. These results have an absolute value and can serve for platform comparisons. However, the "relation of forces" hasn't changed. i925X/i915P-based boards show very close results (i925X is a little better), while i875P confirms the well-known fact that DDR has smaller latencies.
Archivers are the most sensitive applications to memory latencies. The results matched our expectations: i875P is the leader, i9xx are roughly equal and lose about 5-10 percent to Canterwood.
Video coding speed measured according to our methodology, depends little on memory performance and mainly responds to CPU architecture and frequency. We're only giving you the results of MPEG2 coding carried out with the help of Mainconcept MPEG Encoder, one of the best programs of its class. The difference between the rivals was just one percent, so we don't think any comment is needed here.
Chipsets usually have a minor influence on performance of rendering programs (just like video coding). And because we haven't yet seen visible performance differences between the rivals, we can't expect to find them here. The maximum we have is three precent in Lightwave.
When we nearly lost all hope to see an intrigue in today's competition, Photoshop results suddenly gave it to us. We made several repetitions of the test only to find that the i875P platform really loses much to its rivals. Its setback can only be accounted for by the interference of some dark forces. Or else, PCI Express accelerates Photoshop no worse than Pentium III used to do with the Internet some time ago.
It should be borne in mind that the difference between videoaccelerators can have an impact on game test results, even if the former are only different in the interface bridge. Anyway, our testing revealed a certain difference between them. But on the whole, we saw no sensations and i915P didn't look faster.
Conclusions
Because our today's testing was somewhat limited, the article proved to be a more theoretical one. Thus, we won't be trying to estimate percentages or declare winners. New technologies are infiltrating into desktop systems, and we should definitely take notice of them. Well, we hope our presentation of the first Intel PCI chipset family was helpful to you. In the future, we'll test many other boards, estimate stability and convenience of mixed solutions, reveal the real difference between the chipsets using some of them with well-tuned BIOS versions… For now, we can only note that the new systems were generally not worse than the fastest Socket 478 which had ideal conditions. So, if you want to feel the progress course on yourself, you won't at least have to sacrifice performance for it, like it was in the times of Pentium 4 with Socket 423.
Serguey Pikalov (peek@ixbt.com)
Dmitry Mayorov (destrax@ixbt.com)
24.05.2004
Group makes hardware security Job 1
By Ellen Messmer
Network World, 04/26/04
The Trusted Computing Group is a collection of 55 vendors including HP, Intel and Microsoft that formed a year ago to develop specifications for chip-based security. Nancy Sumrall, marketing chair for the group and manager of the safer computing initiative within Intel's desktop platforms group, recently gave Network World Senior Editor Ellen Messmer an update on the TCG.
What was the impetus for forming the Trusted Computing Group?
Advertisement:
Prior to April of last year, the group had loosely gotten together. Intel, Microsoft, HP and IBM started working on a specification for a trusted platform module [TPM]. As more companies wanted to be involved, we incorporated as a nonprofit, industry standards body worldwide.
What is a TPM?
It's a chip on the motherboard, a microcontroller that allows you to have secure operations for encrypted e-mail, digital signatures, file and folder encryption, platform authentication and storage. It stores the private keys for the encryption. The TPM is a discrete component, and it's manufactured by Atmel, National Semiconductor, Infineon and, most recently, Renaissance.
What's TPM's status?
The first specification was adopted from the work of the loosely held organization. It's TPM 1.1b, a revision to earlier work out since September 2001. The TPM 1.2 spec released last November fixed some of the problems in 1.1b and added new features. Among new features, there was one added for what's called "direct anonymous attestation."
What is direct anonymous attestation?
It's a way of internally - through mathematical calculations - being able to provide certificates and credentials. Certificate usage hasn't really taken off in the industry due to the cost, so this is an alternative way to do it. An IT department can 'trust' without the use of a trusted third party. It was developed by Intel and HP.
Are the Microsoft crypto APIs used with the TPM?
The TPM can utilize Microsoft [CryptoAPI] or PKCS #11 or the TCG software stack, a standard you can write to as well. Many software application vendors, such as Wave Systems, are using that.
What's the significance of supporting trusted computing technology in hardware?
Software alone may not be the proper solution for security or preventing viruses or attacks. . . . The TPM is soldered down to the motherboard so if anyone tries to pry that off everything gets erased. You can't pry that TPM off and put it on another platform and know someone else's key.
Advertisement:
Does the TPM use specific key lengths?
It's 2,048-bit based on Advanced Encryption Standard and SHA-1. IBM has its ThinkPad series, RXT, where TPM is an option on the motherboard. It's also an opt-in device, which means you have to turn it on. HP has also come out with a desktop that includes TPM. Fujitsu just announced its Lifebook, and Intel has a motherboard we sell with the TPM. So right now the current applications are the desktop and mobile. You can do encrypted e-mail and send it to someone who also may have TPM and they can decrypt that.
What constitutes conformance to the specs?
There's functionality testing for 1.1 and 1.2, which is easy, and TCG has also worked on a set of protection profiles which are published. When manufacturers make a PC, they know they have to conform to these profiles. We have a conformance workgroup and test labs, and we're working on these issues. You can buy 1.1 products and use them until the 1.2s are available. It's backward-compatible.
What role, if any, does Microsoft play here?
At TCG, we write building blocks. With my Intel hat on, we have a product that we talk about in our latest Intel Developer Forum called LaGrand that utilizes the TPM. It allows you to do protected execution in a secure spot on the processor. Microsoft has its secure operating system. So you'll have the secure TPM, software that's written by application vendors that adhere to the TCG software stack or CAPI or PKCS #11. Microsoft has its own initiative, Next-Generation Secure Computing Base. All of this will work together.
What's next for the group?
All the TPM vendors are working on their prototypes now. Atmel said its TPM 1.2 hardware would be available in the April timeframe. We've been talking about things that are PC-centric, but we have many new workgroups: storage, server, peripherals and mobile devices. We're looking at putting TPM in cell phones. We also have our infrastructure workgroup looking at different usage cases, such as VoIP.
Fujitsu Releases LifeBook E8000 Series Business Notebook (pics, specs)
submitted Jun 17, 2004 by abaxter email article
Fujitsu Computer Systems Corporation has unveiled the next generation of its powerful and versatile LifeBook E Series family, the LifeBook E8000 notebook. This corporate desktop replacement is rich with new features and the latest technologies for the serious business professional.
Fujitsu LifeBook E8000 Front View
"Enabled with the latest in Intel(R) Centrino(TM) mobile technology, the LifeBook E8000 notebook could be compared to a high-performance car with incredible gas mileage," said Paul Moore, director of product marketing for Fujitsu Computer Systems. "The adoption of a new processor allows the LifeBook E8000 notebook to deliver extraordinary computing power and extended battery life. Fujitsu has also equipped the notebook with an advanced security system and flexible communications options to make it one of the smartest mobile computing solutions on the market today."
Fujitsu LifeBook E8000 Series Left View
Powered by an Intel(R) Pentium(R) M Processor, the LifeBook E8000 notebook allows users to customize their notebook with different configurations. They can experience brilliant image quality from either a 15-inch XGA TFT display for efficient business use or a 15-inch SXGA+ high-resolution display for a sharper image. In addition, users can choose between the Intel EXTREME graphics chipset with 64 MB UMA memory for traditional computing needs or the latest ATI(TM) Mobility RADEON(TM) 9700 chipset with 64 MB of dedicated video RAM for the ultimate in handling the most graphics-intense applications. An integrated bay enables mobile professionals to support their notebook with a variety of options, such as an extra battery, a variety of optical drives or a weight saver, which can reduce the notebook's weight by approximately half a pound. One of the optical drive options available to LifeBook E8000 notebook users is the Super-Multi DVD drive. This innovative drive can read or write onto virtually any DVD and CD format.
Fujitsu E8000 Series Right View from Behind
The LifeBook E8000 notebook offers multiple security features including an optional Trusted Platform Module (TPM) with advanced password protection and hard drive encryption functionality. The Fujitsu TPM is a powerful, embedded security system that protects sensitive data from unauthorized users and enables secure authentication. The module is compliant with the Trusted Computing Group standard.
Users can easily connect their LifeBook E8000 notebook to their office network or the Internet at home with its integrated modem, Gigabit Ethernet and wireless LAN (802.11b/g or 802.11a+b/g). For users wanting to connect to a Bluetooth-enabled cellular phone or PDA, the notebook features an optional integrated Bluetooth wireless solution to synchronize data and swap images.
This stylish, high-end desktop replacement is complete with a SecureDigital (SD)/MMC slot, four USB 2.0 ports and an IEEE 1394 port for fast downloading capability and direct data transfer.
LifeBook E8000 Notebook Specs
Processor: Intel Pentium M 1.60 GHz (1 MB L2 cache, 400 MHz
system bus);
Intel Pentium M 735 (1.70 GHz, 2 MB L2 cache, 400
MHz system bus); or
Intel Pentium M 745 (1.80 GHz, 2 MB L2 cache, 400
MHz system bus)
Display: 15" XGA TFT or 15" SXGA+ TFT
Memory: DDR333; Two DIMM slots, 2 GB maximum
Hard Drive: Choice of 80 GB, 60 GB, 40 GB or 30 GB
hard drive(2)
Floppy Disk Drive: Optional external USB
Communications: Gigabit Ethernet, modem and Intel(R) PRO/Wireless
Network Connection 802.11b/g or optional Atheros
SUPER AG (802.11a+b/g), Optional Bluetooth
wireless
Media Drive: CD-ROM drive, DVD/CD-RW combo drive or Super-Multi
DVD Drive
Media Slot: SecureDigital (SD)/MMC slot
Ports: Four USB 2.0, IEEE 1394, S-video out, infrared
(IrDA-compatible, 4 Mbps), serial, parallel, PS/2,
external monitor, modem (RJ-11), Ethernet (RJ-45),
and headphone/SPDIF and microphone jacks
Operating System: Microsoft Windows XP Home, Windows XP Professional
Dimensions: 13.1"(w) x 11.2"(d) x 1.49"(h)
Weight: 6.99 lbs with DVD/CD-RW drive; 6.49 lbs with
weight saver
The Fujitsu LifeBook E Series notebook comes preinstalled with Microsoft Windows XP Home Edition or Microsoft Windows XP Professional. Users can choose among the recommended configurations or customize their notebook using the Fujitsu Configure To Order (CTO) program. All Fujitsu notebooks can be purchased through the company's retail and reseller channels as well as at us.fujitsu.com/computers or 877-372-3473. Pricing for the Fujitsu LifeBook E8000 notebook starts at $1,549.
Service and Support
The LifeBook E Series notebook is backed by a three-year or one-year International Limited Warranty for U.S. and Canadian customers(4). In addition, users can add Fujitsu Premium Care Service Plans, which include an on-site service or a screen protection plan.
Lots of TPM mentions here.......
sorry about the paste job, linking to the article is below, notice the date on the article as well
Road-Ready Notebooks
By Konstantinos Karagiannis
July 13, 2004
http://www.eweek.com/article2/0,1759,1613867,00.asp
Not long ago, having a notebook assigned to you at work depended on how much traveling you did. Buying trends have shifted, however, as more companies are choosing notebooks for everyone—both travelers and the desk-bound. No matter which group you fall into, work is no longer just for the office. More people are multitasking on their commutes home, after dinner, and on weekends.
Deciding on which portable will fill such an important role is no easy task. First, there's a difference between corporate notebooks and business notebooks. Both kinds typically have the same hardware, but corporate notebooks appeal to big companies that buy fleets of notebooks, because they come with special software that helps admins manage them (discussed in Better Corporate PCs). Equally important is compatibility: Ideally, docking stations and AC adapters should work with old and new notebooks. Corporate notebooks come from the likes of Dell, Gateway, HP, IBM, MPC, and Toshiba.
Business notebooks, the focus of this story, have less refined compatibility and no management software and are typically aimed at individual buyers and smaller businesses. Manufacturers here include the aforementioned companies and Acer, Fujitsu, Velocity Micro, and WinBook.
Buyers can choose between mainstream machines and ultraportables. Mainstream models are often more robust, while the main goal of ultraportables is to lighten the load in your briefcase significantly.
We've seen the Pentium M prevail and a quick adoption of wireless 802.11g solutions in both notebook types. In late 2004, we can expect more significant improvements. The forthcoming Intel Alviso chipset will take even better advantage of the latest Pentium M chips, with support for faster DDR2 memory, the PCI Express bus (which is faster than PCI), Serial ATA drive interfaces, and better graphics and audio. Also, the Centrino platform will finally support 802.11a/g.
With these technological advances, especially the increase in wireless usage, security is a growing concern. Smart cards, already popular in Europe, are slowly beginning to catch on in the U.S. Companies like Fujitsu, HP, and IBM have also added the Trusted Platform Module (TPM) chip to their notebooks. Built into the motherboard, this part creates an authentication key that is stored in silicon. Running algorithms within itself, the TPM chip off-loads encryption and authentication tasks from the CPU, enabling powerful ways of verifying your machine's identity to networks and protected resources, particularly when used in tandem with fingerprint sensors and smart cards.
TPM and smart cards are already available in business notebooks, though some buyers may be waiting for the Alviso chipset to receive all the new features. But for those who can't wait, here are 16 road-ready notebooks on the market now.
Road warriors demand fast, reliable systems that have full-size keyboards, crisp screens, and embedded wireless capabilities. Mainstream business notebooks are up for the challenge, offering an appealing balance of power, productivity, and portability.
Selecting an Editors' Choice in the business mainstream category was a difficult task, but at the end of the day (literally), we chose the HP Compaq nc6000. Aside from its good design, the nc6000's components, like a 1.8-GHz Pentium M processor and an eight-cell battery, helped it garner excellent performance test scores and show outstanding battery life—two things every road warrior craves. Honorable mention goes to the IBM ThinkPad T42, also a sturdy system with solid components. It is less expensive than the nc6000 but lacks some of the components that place the HP model above the other notebooks in our roundup. We'd be remiss not to mention IBM's five-star management utilities. As we recently reported (Better Corporate PCs), IBM continues to go the extra step in providing tools to ease IT pain.
The Acer TravelMate 8000 is a little heavy, but if you don't travel often, it's hard to beat this 6.6-pound portable. It comes loaded with a 15-inch display; an ATI Mobility Radeon 9700 graphics chip; a fast 60GB, 7,200-rpm hard drive; Bluetooth connectivity; 802.11g wireless; and even a dual-format DVD-RW burner.
The TravelMate has a full set of ports: four USB 2.0, one FireWire, one VGA, and one S-Video, plus an audio line-in jack. It's also the only notebook in our roundup with DVI-I. Security-conscious organizations will like the smart-card feature, which limits access to the system. We're not completely sold on Acer's ergonomic keyboard: The keys are arranged in a slight curve, resembling a smile, and it takes some getting used to.
Thanks to its high-end components, the TravelMate turned in the best Business Winstone score (22.2). Its BatteryMark score was also impressive, at 5 hours 12 minutes.
Acer doesn't have many options for fleet buyers, but it does offer a port replicator ($99) that works with most of the TravelMate line, including the tablet. The AC adapter is compatible with fewer models in the line. Acer also offers the same OS image across all its products.
The TravelMate may not be ideal for some big IT programs that want lots of choices, but for small businesses and individuals, it's a robust bargain
At 5.7 pounds and with a 15.2-inch screen, the Apple PowerBook G4 is a good size for most commuters. Though it has a large footprint, it's very thin.
This is Apple's most powerful notebook; its components include a 1.5-GHz PowerPC G4 CPU, an 80GB hard drive, 512MB of RAM, and the ATI Mobility Radeon 9700 GPU. (The 17-inch model can also have the same powerful specs.) Apple's AirPort Extreme gives you 802.11g wireless and Bluetooth connectivity. Our test unit came with a SuperDrive, which can burn DVD-R but unfortunately not DVD-RW media.
Apple's software has been upgraded to Mac OS X Panther v.10.3, which makes network setups a breeze for corporate users. Even setting up a wireless network with WEP enabled is easy.
The PowerBook's auto-sensor light control works well, using a sensor to dim your screen and fiber optics to backlight your keyboard. The grills on the sides of the keyboard hide three impressive speakers. Though the aluminum case looks sleek, it has a drawback: It conducts heat. Apparently the design uses the bottom of the case to dissipate the CPU's heat—not ideal when the unit is on your lap.
This 15-inch model will appeal to the bulk of PowerBook buyers. The added CPU speed and Panther OS offer a good balance of power and usability. If Apple could just solve the heat problem, this model would be ideal for Mac lovers.
The Dell Latitude D600 is a solid business system with good features and components: a 1.8-GHz Pentium M 745, 512MB of RAM, 802.11g wireless, a DVD burner, and an 80GB hard drive. But when we matched it up against the competition, we found that other notebooks here offer more performance for less money.
The 5.4-pound D600 has a clean design with a comfortable full-size keyboard, both a pointing stick and a touch pad, and a crisp 14.1-inch SXGA+ display. It also includes two USB ports, a PC Card slot, and, surprisingly, a DVD+RW drive. Located right below the PC Card slot is a smart-card reader for added security.
The D600 performed worse than expected on our tests: 17.6 on Business Winstone and 21.3 on Multimedia Content Creation Winstone. Though these scores are below par for this kind of notebook, they are adequate for typical users. What's more disappointing is the D600's score of 3:03 on BatteryMark—second to last in this category.
Dell offers several docking stations and port replicators that are compatible across the entire D line, as is the AC adapter. The OS image is not common across the D line, though many of the drivers (like modem and wireless) are common.
As a corporate notebook, the Dell Latitude D600 has the features to please. But to get better bang for the buck—and double the battery life—look to the HP Compaq nc6000.
Targeted at frequent travelers, the sleek 4.3-pound Fujitsu LifeBook S7010 is the lightest mainstream notebook in this roundup. To hit that weight, though, you have to give up some niceties (a memory card reader and legacy I/O ports).
The full-size keyboard feels a bit flimsy, and the single set of mouse buttons, located below the touch pad, is hard to reach when using the pointing stick. Though it lacks parallel and serial ports, the S7010 has three USB 2.0 ports. The Intel 855GME graphics solution is mediocre, and the 14.1-inch XGA screen has a low resolution compared with other models. Surprisingly, the unit has a DVD±RW drive.
The S7010 received middle-of-the-road scores on Business Winstone (19.5) and Multimedia Content Creation Winstone (21.6), but it did better on BatteryMark, yielding 3 hours 44 minutes. Its 802.11g wireless throughput was a little below average for the group.
The S7010 has a port replicator ($199) which, like the AC adapter, will be compatible with some future notebooks, but it can't be used with older LifeBook S– series notebooks. The OS image also can't be used on other models, but it will be stable for one year. In addition, the S7010 has Fujitsu's Trusted Platform Module (TPM), a form of security built into a system's motherboard that enables simple file and folder encryption.
If you value the balance between features and portability and won't miss the legacy ports, the S7010 is an option.
The Gateway 450XL accomplishes the typical mobile tasks business users require. But for the price, we would have liked to see more in overall performance and features.
The 6.3-pound system holds a 15-inch display, bigger than the typical 14.1 inches, but images on it seemed washed out. We did like the solid feel of the full-size keyboard and the added security of the built-in fingerprint reader.
The 450XL has two USB ports, a FireWire port, and a PC Card slot. It also has VGA, S-Video, and composite video ports. The 60GB hard drive is adequate for a mainstream system, and the DVD-RW drive is a plus. Connectivity is via either Gigabit Ethernet or 802.11b wireless—not the stronger 802.11g (which is a $59 upgrade).
Performance on Business Winstone 2004 and Multimedia Content Creation Winstone 2004 was toward the bottom of our test group (19.2 and 20.1, respectively). But the 450XL's battery life was very good, at 4 hours 37 minutes.
Gateway offers an optional docking station ($139) compatible with the M405 and previous 450 and 600 models. The AC adapter works with the M405, the M305, and the M275. OS image stability is 10 to 12 months.
In the end, the 450XL doesn't compare well with other notebooks in this price class. For the same money or even a little less, you can find a better-equipped model, such as the HP Compaq nc6000.
The HP Compaq nc6000, our Editors' Choice, is a wonderfully well-balanced system that melds portability with great features, like a 1.8-GHz Pentium M processor for power, 802.11a/g for wireless connectivity, TPM for security, and outstanding battery life.
The solid, 5.7-pound nc6000 houses a 14.1-inch display, a full-size keyboard, and both a pointing stick and a touch pad. There's a hardware on/off switch for the Bluetooth and 802.11a/g connections. I/O ports include a Secure Digital media slot, two USB 2.0 ports, and an S-Video port. HP has chosen to increase security by adding TPM, which will please many IT managers.
In terms of performance, the nc6000 did not disappoint: It placed second on Business Winstone 2004 (scoring 21.4) and came in third on Multimedia Content Creation Winstone 2004 (22.4). Its 802.11g throughput was strong, and its battery life was most impressive, at 6 hours 37 minutes—the best in this roundup.
Two types of port replicators are available. Both, like the AC adapter, are compatible with previous nc6000 models, as well as others in the nc and nx lines. The OS image is stable for 12 to 18 months and is compatible with all models except the nw8000.
The nc6000 gives you a strong balance of portability, performance, security, and features. It is an excellent choice for individuals and corporations alike.
The IBM ThinkPad family has always been highly regarded for its reliability and manageability, and its keyboard has long been unmatched by its peers. The IBM ThinkPad T42 keeps up with those traditions while starting one of its own—a low price.
The T42's thin profile and system weight of 5 pounds make it a good choice for travel. The one thing we would change is to upgrade its 40GB hard drive—which can fill up fast.
IBM has for a long time added self-help touches to increase users' satisfaction and ease the pain of busy IT staff. One such feature is the Access IBM collection of utilities. The blue button on the keyboard launches a self-serve help wizard, which assists you in downloading OS updates, drivers, and more. Like Fujitsu and HP, IBM has TPM security on all its motherboards.
Though it's not a performance standout, the T42 does a decent job: It scored in the middle of the pack on Business Winstone 2004 (19.7) and near the bottom on Multimedia Content Creation Winstone 2004 (20.4). The T42's BatteryMark score (3 hours 59 minutes) was good.
The docking station is the same used on the T40, the T41 and the R series, and IBM places the same OS image across the entire ThinkPad family.
The T42 comes with all the basics business users need. Both end users and corporate buyers will be satisfied with such a purchase.
The MPC TransPort T2200 is a competent system for business use, and if it were priced about $1,000 less, we might recommend it. But for the price, its performance was disappointing, as were some of the components.
The 5.9-pound T2200 has a 15-inch screen and a comfortable full-size keyboard. A two-button touch pad with a two-way scroll button is included, but there's no pointing stick. It also has a fingerprint reader, similar to that of the Gateway 450XL, for extra security.
For ports, the T2200 has two USB 2.0, one FireWire, one VGA, and one S-Video. It has a three-in-one memory card reader (for Memory Stick, MMC, and Secure Digital) and a DVD/CD-RW combo drive.
The T2200 has a useful modular hot-swappable expansion bay. Unfortunately, the AC adapter can be used only with this system, and the OS image can't be applied to other models in this line.
Performance is not the T2200's strong suit. Its scores were the lowest in the group on Business Winstone 2004 (16.8), Multimedia Content Creation Winstone 2004 (19.6), and BatteryMark (2:42). But its 802.11g solution surprised us, giving the best throughput in the roundup at 160 feet.
Overall, the T2200 is a decent notebook, but in view of its shortcomings in performance and features and its steep price tag, it simply can't compete against systems like the HP Compaq nc6000 or the IBM ThinkPad T42
The well-rounded Toshiba Tecra M2 is a good choice if you need a versatile two-drive notebook for business use. This mainstream model delivers good wireless throughput and lots of battery and optical drive options—all in the least expensive mainstream model in our roundup.
Weighing 4.9 pounds, the unit is easy to tote. The Tecra M2's I/O offerings are average: two USB ports, a FireWire port, a parallel port, wired and wireless Ethernet, Bluetooth, two PC Card slots, and a Secure Digital slot.
The Tecra M2's performance (20.2 on Business Winstone 2004 and 22.3 on Multimedia Content Creation Winstone 2004) was reasonable for a business-class portable. Its battery life of 3 hours 32 minutes was toward the lower end of the spectrum. Wireless performance was good for both 802.11b and 802.11g, maintaining a consistent signal.
The notebook is suitable for businesses of all sizes, with a port replicator available ($199) that is compatible with many models in the Tecra line and the Satellite Pro line, and a few in the Portégé line. The AC adapter is also compatible across those lines. The OS image on the Tecra M2 will be stable for one year.
For a business-class portable, the low-priced Tecra M2 is a solid, well-rounded system that can compete well with systems from Dell, HP, and IBM.
The Velocity Micro NoteMagix B50 Ultra is sleek, powerful, and perfect for those who work mostly with multimedia. But for straightforward Excel and e-mail business types, this is way too much machine.
For entertainment-minded users, there's a DVD/CD-RW drive, bundled DVD player software, and Ulead DVD MovieFactory 3 Suite. Unfortunately, our test unit didn't include a DVD burner (a $165 option) to complete the package. There are three USB ports and a Secure Digital slot.
The B50 Ultra's 802.11g performance was not stellar. The system fared much better on Business Winstone 2004 (21.0) and was impressive on Multimedia Content Creation Winstone 2004 (25.1), thanks to top components such as a 2-GHz Pentium M, a hefty 1GB of RAM, a speedy 7,200-rpm hard drive, and an ATI Mobility Radeon 9700 graphics card.
Velocity Micro has a unique warranty program that includes custom upgrades and fixes. A port replicator, available for $139, is compatible with other models in the line, as is the AC adapter.
The B50 Ultra notebook is not for your buttoned-up business types. But its bundled software and brawny components make it a good choice for graphics professionals.
Product: WinBook W360
Price: $2,578 direct
Spec Data: 1.7-GHz Pentium M 735, 512MB DDR SDRAM, 80GB hard drive, 15.4-inch WUXGA display, 802.11g wireless
Company Info: WinBook Computer Corp., www.winbook.com
The best thing about the WinBook W360 is its gorgeous 15.4-inch WUXGA (2,048-by-1,536) wide-screen display. Many of the components, however, are mediocre, making the W360's price seem a bit steep.
In spite of the large wide-screen display, the 6.3-pound system is reasonably light. The polished silver chassis looks decidedly like an Apple PowerBook. And though the keyboard is comfortable, we found the touch pad a bit unresponsive at first.
The display had a crisp image, and we liked the DVD-RW drive and the 80GB hard drive. The W360 has FireWire, VGA, S-Video, and three USB ports but no parallel or serial ports.
As expected, the unit's 1.7-GHz Pentium M 735 didn't deliver the best Business Winstone 2004 score (it scored 18.7), but it redeemed itself on our Multimedia Content Creation Winstone 2004 tests, scoring second-best in the group (23.3).
The W360's wireless 802.11g performance was poor; it finished dead last. As for battery life, its score of 3 hours 22 minutes was not stellar but decent for a large-screen notebook.
WinBook offers a port replicator for $99 that is universal across the W line, as are the AC adapter and the OS image.
Though the W360 is not an ideal notebook for business, those who want a notebook with a high-resolution wide-screen display and good multimedia performance might consider this a decent choice.
Ultraportable business notebooks answer the demand for ever-lighter systems. Although typically sacrifices are made to keep the weight down, ultraportables continue to impress us by adding features and increasing performance, all in such small cases.
UK Government backs Comodo Secure Computing initiatives
Comodo awarded with an Exceptional Development Grant by the UK Government to help in the capture of a significant share of the Trusted Platform Module market..
London UK,10th June 2004 Comodo, recognized globally as a provider of innovative security products and services, specifically for the areas of cryptography, digital certification and advanced ASIC design, has been awarded an Exceptional Grant Award by the UK Government. Comodo along with IBM, HP, Fujitsu, Microsoft, Intel, AMD and others form the Trusted Computing Group, a consortium which exists to develop and promote open standards for hardware-enabled trusted computing and security technologies. Comodo chairs the Trusted Input work group within TCG focusing on setting the future architecture and standards for trusted Input Devices. Following this award the knowledge and expertise of the Comodo research group will now be channeled into the development of the next generation of Trusted Platform Module (TPM) providing a multifunctional device aimed specifically at the notebook market. This new device will feature a fully patented AntiTheft protection system together with many other security features demanded by the mobile PC market. TPMs are already shipping in volume from IBM, HP and Fujitsu, with adoption rates increasing fast to meet the demand for secure computing.
"The UK Government recognises that Research & Development investment is critical to the future success of the e-economy. With the award of this exceptional grant to Comodo, it clearly emphasises the importance of security." commented Stephen Timms, the UK Minister of State for E-Commerce.
"Government acknowledgement of the expertise that we have in security innovation and integration is extremely welcome at a time when security is such a frontline topic across all sectors of the market," commented Steve Roylance, Technical marketing Director for Comodo, "The need for enterprises to provide a trusted computing platform to employees has increased dramatically in recent months as the existing software only solutions are proven to be vulnerable to physical and software attack. In providing an innovative integrated solution for the portable PC sector of the market we will be able to service the most critical enterprise user - the mobile user".
The growing use of mobile phones, PCs and portable computing devices for private and e-commerce transactions presents an increased risk in the protection and management of personal and commercial data. Allied to this is the increased reuse of stolen equipment through reprogramming techniques. New ways have been developed to break the current range of security systems to the extent that no barriers exist to those dedicated criminals who will then use the data to perpetrate fraud, misuse of the data or reuse of the stolen equipment. Building upon the foundation of the work done by the Trusted Computing Group and version 1.2 of the TPM specification Comodo will focus R&D effort to create a hybrid multifunctional device using best of breed hardware and software components together with their own patented security technology to provide a world class differentiator for the OEM mobile PC market. The TPM concept is expected to be used in the majority of new computers within the next few years, based on TCG specifications; it allows validation of both the computer and its user, and provides secure storage for critical data and passwords. It can verify that a 'trusted process' should run, and establish 'trusted relationships' with other computers to reduce opportunities for viruses and other attacks.
About Comodo
Comodo is an industry leading provider of information security, management and communication technologies- creating innovative and practical solutions for the SMB, enterprise, home, e-commerce, education, healthcare and governmental markets. Through its Infrastructure Solutions product line, the company endows its customers with a competitive advantage with a superior suite of enterprise security, networking and productivity solutions covering perimeter security, VPN, Mail and LAN. Other core technologies include intrusion detection, SSL certificates, content filtering, end-point security and access management - completing a portfolio of solutions that comprise the industry's best combination of security, performance, intuitive interface and value.
Comodo is the world's fastest growing provider of critical infrastructure solutions and can be reached at (US) +1 800 772 5185 (Europe) +44 (0) 161 874 7070
www.comodogroup.com www.trustix.com
About the Trusted Computing Group
The Trusted Computing Group (TCG) is a not-for-profit organization - of which Comodo is one of the initial members - which exists to develop and promote open standards for hardware-enabled trusted computing and security technologies, including hardware building blocks and software interfaces, across multiple platforms, peripherals and devices. Its primary goal is to help users protect their information assets such as data, passwords and keys from compromise due to software attack and physical theft.
The Group was formed as a successor to the Trusted Computing Platform Alliance (TCPA), which was founded in 1999 by Compaq, HP, IBM, Intel and Microsoft. TCG has adopted the existing TCPA specifications, including the Main (TPM 1.1) specification, and PC Specific Implementation specification. A TSS (TCG Software Stack) specification was announced on September 15, 2003, and the TPM 1.2 specification on November 5, 2003. Work groups have been formed for server, PDA, Trusted Input and digital phone implementation specifications.
Further information is available at www.trustedcomputinggroup.org
remember this?
Comodo, Wave Systems Announce Parntership
March 6, 2003 -- (WEB HOST INDUSTRY REVIEW) -- Internet security company Comodo (ComodoGroup.com) announced on Wednesday that it has formed a partnership with secure hardware and software solutions provider Wave Systems Corp. to introduce the SignOnline eSign Transaction Management Suite.
According to Comodo, eSign Transaction Management (eTM) allows organizations to manage business processes and transactions online, without the need for ink signatures and paper storage, overnight mail or traditional delivery systems. Using the eTM Suite, says Comodo, organizations can create, sign, store access and manage the lifecycle of legally-binding electronic records.
Comodo will offer Wave's eTM Suite portfolio as part of its range of products and services. The company says it has released a number of standards-based products and solutions for privacy, security, trust and confidence, recognizing that trust and security are fundamental to successful online business.
"Partnering our outsourced PKI services and more specifically our ePKI certificate platform with WAVE builds a complete signing solution for enterprises worldwide," says Comodo Director Jim Whiffin. "The depth of this application in meeting the legal requirements of online commerce is fantastic. Coupled with our outsourced certificate platform, enterprises can today transform their business process and start realizing huge cost savings."
YES dips a toe in the MOAT.
Barge says Wave = Ubiquity. Mymoneybgone agrees because Wave
has the moat.
The Moat is many things....... Mother Of All Technology . Yes.
EMBassy will be to trusted computing what Dolby was/is to the listening experience. Think on this for a minute. Dolby, what does it do? Hmm.. there must be how many electronic manufacturers since say the 1950's? Tons. yet here is Dolby. Still around. None of these guys has chased them out of the market after all these years. They don't market their own brand of listening devices. They make the listening devices better.
The moat is like 3M, General Electric, and DuPont, making other things work better.
The Moat is a brand name like Coca-Cola, Starbucks, Microsft, IBM, Intel, Levi Strauss,Wrigley's, McDonalds and Wal-Mart.
The Moat is first to market, patents, working relationships, ease of use, upgradabillity, flexabillity, invisibillity, compatabillity, affordabillty, the range of uses in many different appliances. Did we say patents??
I can't stress enough the vision of clarity when this hit me. Why is it that Intel and IBM want Wave integrated in/with/on the systems that they are running? Intel is the mother of all processing coimpanies. Marketshare bears this out. Why in the world do they even look to Wave????
IBM has been involved in computing for so long they have pretty much written the book on it. I can see the old grainy black and white shots of those IBM room size computers we use to see in elementary school years ago. Yet with all the years and years of computer knowledge and technology they have created they have embraced Wave. Why? IBM should have no business using our technology right? Billions in dollars spent over decades. Yet,here they are. Along with Intel, NSM, NEC, Infineon, AMD, Maximus among others. These are unarguably giants in their repsective industries. And Wave walks among them. The patents protect, and given the substantial lead in this area, maybe have even prevented other companies from understanding, let alone trying to improve on what Wave is about to unleash on the computing world shortly. If this is the case, the posibillity remains such that the company may be able to patent other processes for applications they see in the forseeable future that others may have not considered, guarenteeing a longevity in this swathy path that they have carved out for themselves for many, many years to come.
This is my new Mantra
Barge says Wave with be Ubiquitous.
I agree because of the moat.
BELIEVE IN THE MOAT............................
Dave
Wave will be successful because they have built a proverbial moat around their business. They have the product. They have patents that I believe are comparable to those that you see in pharmaceuticals where non-compete is the rule. They have companies far larger than Wave, in business far longer coming to them for the solution. The huge lead in the market creating the barrier to entry. They won't be bogged down by excessive inventories or upgrading of the manufacturing process, that should be bared by the companies manufacturing our product. The cost of the product isn't excessive. Compatabillity and the fact that the product isn't only limited to the PC market is the reason the Moat will work for Wave.
The Moat is many things....... Mother Of All Technology .
Found this post that I made on Raging Bull back in April of 2003 and found it be as true today to myself as when I wrote it. Just thought I would post it again for some of those that might not have seen it, and hopefully it's not taken as too magnanimous on my part.
Dave
The MOAT = Ubiquity
Dave
OT Anybody on OSIP? Maybe we can get a move like they did today here in the not so distance future with the right combination of news and revenues.
Dave
Barge....through its Intel Wireless Trusted Platform to provide services such as trusted boot, secure storage of private information and cryptographic keys, and support for common security protocols.
see Ihub #37509
Dave
Intel Corporation today announced a new family of processors based on Intel XScale® technology that can handle multiple forms of wireless broadband access with enough computing power to provide cell phones with full motion video conferencing capabilities and PDAs with DVD-quality video playback.
The processors include a set of new technologies designed to meet the multimedia, low power and security requirements of advanced cell phones and wireless PDAs. Intel is also providing key technologies in addition to processing power including the next-generation of stacked packaging for added flash memory, a new multimedia accelerator for 3D rendering, optimized software and reference concept designs that allow cell phone and PDA makers to bring Intel-based mobile devices to market faster.
"Advances in wireless broadband demand a new kind of wireless device," said Sean Maloney, Intel executive vice president and general manager, Intel Communications Group. "As various forms of wireless broadband access become increasingly available -3G, Wi-Fi or WiMAX - mobile devices must have plenty of performance balanced with low power capabilities to be able to handle all that the Internet has to offer."
Designed for Cell Phones, Wireless PDAs
The Intel® PXA27x family of processors, formerly code-named "Bulverde," adds a number of new technologies to address the needs of cell phone and PDA users. It is the first product to integrate the Intel Wireless MMX™ technology, providing additional performance for 3-D games and advanced video while improving battery-life. The new chip also utilizes Wireless Intel SpeedStep® technology, enabling significant power savings by intelligently managing voltage and frequency changes similar to the technology used in the company's notebook processors.
Also for the first time, Intel has integrated important security features through its Intel Wireless Trusted Platform to provide services such as trusted boot, secure storage of private information and cryptographic keys, and support for common security protocols. To help increase camera phone capabilities and quality, Intel has also incorporated Intel Quick Capture technology to support cameras delivering up to four or more megapixels of image quality.
The Intel PXA27x processor family will be offered in multiple configurations of clock speeds running from 312 up to 624 MHz, and with as much as 64 megabytes of stacked Intel StrataFlash® memory.
Multimedia Accelerator Delivers Added Mobile Multimedia Performance
Optimized to complement the Intel PXA27x processor family, the new Intel 2700G multimedia accelerator delivers advanced video and graphic capabilities to enable full screen video at full frame rates without sacrificing battery life. The Intel 2700G multimedia accelerator delivers DVD-quality video playback on VGA displays and supports a wide range of video formats such as MPEG-2, MPEG-4 and Microsoft* Windows Media Video9.
The Intel 2700G enables crisp graphics and the high resolution (up to SXVGA) dual display features enable business users to view two independent images simultaneously. This allows for a variety of business activities, such as video conferencing or running presentations directly from a PDA or other wireless device. For entertainment purposes, the Intel 2700G delivers an outstanding mobile gaming experience, giving users exciting, 3D content on their mobile device.
Solutions Beyond Silicon
To help device makers develop and deliver next-generation communication and computing devices, Intel is also providing a number of the key technologies and platforms in addition to processing power.
The Intel cell phone concept design provides customers and developers with an example of how to utilize many of the application and communications technologies needed to build an advanced smart phone with multi-operating system (OS) support. The platform is the first design from Intel to support a number of wireless networks, or "modes" including cellular GSM/GPRS, Wi-Fi (802.11b) and Bluetooth technologies. The phone platform supports full-featured operating systems from companies like Microsoft*, PalmSource*, Symbian* as well as MontaVista* Linux and Java* environments.
Developed in conjunction with system integrator Intrinsyc*, the handheld concept design utilizes Intel's new processor along with the Intel 2700G multimedia accelerator and 64MB of Wireless Intel StrataFlash memory to bring new levels of performance and capabilities to PDAs.
Intel also developed the Intel Mobile Scaleable Link, a high-speed interface that helps speed the data delivery process from wireless networks to the processor. By moving data at speeds of up to 416 megabits per second, the technology results in more responsive applications and overall performance improvements. Intel is extending its leading flash and processor stacking technology to the next generation of stacked packaging to enable more memory and higher performance in less than half the space of typical memory packaging.
To provide system and application engineers the ability to fully utilize the features of the Intel PXA27x processor family, Intel is providing the Intel® Compiler and Intel® Integrated Performance Primitives, as well as optimized board support packages with drivers and power management software. Key OS vendors and ISVs like Sony Music Entertainment* have utilized these tools to create a comprehensive library of applications optimized for the new processors.
Pricing and Availability
The Intel PXA27x processor family is available today in sample quantities, with volume production this quarter. The Intel PXA270 processor at 312 MHz has a suggested list price of $32 (USD) in 10,000 unit quantities. The Intel 2700G Multimedia Accelerator has a suggested list price of $17 (USD) in 10,000 unit quantities.
http://www.3g.co.uk/PR/April2004/6932.htm
2.00....................eom
Is this what is going to happen when we get coverage initiated?
http://quotes.fool.com/custom/fool/html-news.asp?Symbols=cvm&page=%2fnews%2fsymbolnews.asp
if that dosent't work find a quote checker and pop in CVM
mymoneybgone
And there you have it..................
mymoneybgone
Trustco.. I don't think so. With the naked shorting rules changing in 5 days we might get pushed down sure, but for a very short period. Everything here that I have read seems to point to this benefiting Wave's share price not hurting it. Given the size of the position, surely you could find a way to hold on to the stock just a little while longer, what's a couple of weeks. Again I say it is nothing more than am disgruntled shareholder trying to cause concern among others to justify the action. Nothing more.
mymoneybgone
The rantings of another disappointed , over-extended, emotional investor past the comfort level selling at or near the bottom venting his frustrations in a non-cohesive, semi coherent psychobabble trying to incite others to follow his lead so he can justify his actions to himself.
mymoneybgone