Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
The picture that is being painted right now has never been any clearer. What we are seeing is a true shaking loose of some of the long time die hards that was predicted would happen. Probably the first wave we will see. The irony and true shame in all of this is that many who have spent time and money-lots of it- won't see the fruits of the struggle. New investors late to the game, unaware of the years of undying belief in the company by those fallen to the wayside, will scoop up these shares probably at far lower prices than those departing paid. If this takes off, those entering now are probably less than 18 months away tops from realizing what some of those invested for 5 years or more have been waiting for.
mymoneuybgone
Doma.........clues
Pissed off shareholder sells too soon and decides to fabricate some phony crap and sits back to watch the fallout, all to make himself feel a little better about his bad decision coming and more recently going. Does it have to be any deeper than this?
mymoneybgone
Posted by: howardjoel
In reply to: wavehello who wrote msg# 34909 Date:3/23/2004 5:00:22 PM
Post #of 35043
For the very LAST TIME. I reacted with emotion based on what lawyer told me. Every member of this board is safe unless he/she has not been honest. I flipped to an unforseen personal issues simple as that. I have wasted the better part of a lovely afternoon trying to correct any misivings that may have come across. I am out except for a small holding and i wish everyone well. I don't know how to express it any clearer than that.
can't be a sell warning
mymoneybgone
Snackman in all fairness.......
You can say that it is the frustration coming through and to give it a break. I can understand the frustration, hell I think anybody invested in this stock since 2000 or longer feels it. It's palpable. A turn of fortune for the worse should not give anyone the right to carte blanche fabricate anything to stir the masses up to make themselves feel better. 2 days this has been going on with him. To use a favorite word of your, disingenuous indeed! He has stated for 2 days he was selling and was out of the stock and wished all his good friends he made here well. Then he proceedes to post very cryptic, extremely negative rhetoric, which looks to serve no other purpose than to incite other posters for his own enjoyment. 2 days of this. He's on his own. As far as I am concerned, his rope ran out.
mymoneybgone
Howard, your gracious reply is most appreciated, I just wish it could have been left up for all to read an appreciate.
Yours in spirit,
mymoneybgone
Tll tomorrow............
Why is anyone reading anything into what this jackass is posting. Take a step back. Here's a guy that was way in over his head, probably bought on what he read on these boards-NEVER a good thing, and had to bail because he could not take it any more. Probably not the only one. He's pissed that he sold after holding for so long, and even more pissed that the price moved higher from his selling point. Now he wants to take it out on the board and bash. HJ hit the bricks baby, cut the BS go into the corner and lick your wounds. You controlled your entry points, and if you ain't bullshitting about how many shares you owned you had plenty of entry points, and you also controlled your exit point. Tough lessons learned, you paid well for them, don't forget them. Apply these lessons learned to other investments. To turn around and post dillusional rants just shows to what warped depths you have plummeted to.
mymoneybgone
Again, you are all insane.......
28,000 shareholders and 63.5 Milion shares oustanding
around the end of 2003. Works out to an average holding of about 2300 per shareholder. Where do you fit in this equation?
mymoneybgone
You are all insane.
The dramatic exits and entries. Cryptic messages. Name calling. The GOD DAMN one upsmanship the oozes from here is unbelievable. The soap opera has overtaken the masses. There is a decision one makes to invest in a stock for solid reasons, and if trhat has changed in your mind, why are you still here? Many here saw this as their ticket to the moon, and bought enough shares with enough money that probably could have filled the rocket. Pigs get fat, hogs get slaughtered. How true. Ain't nothing happening here until we get deploy,ment and numbers. In the past we had the AMD rocket ride, and then the Intel and IBM ride. We might not be in the spotlight but that last partner related bump put us on the radar. We won't be as fortunate again to get the push on news alone. The planes loaded and on the tarmac. It takes off or the flight gets cancelled. Nothing more.
mymoneybgone
Good luck to Howard. Chances are he is not the only one bailing. The market is a very emotional place and after many years of the downward drift it is easy to see how/why this is taking place. There gets to be an uneasy feeling in your gut watching this, especially if you find your position is far great than your original comfort level was. You know, given all the buying oppurtunities this stock has seen. Buy the dips is what you always hear, and this stock has probably had almost 3 buying opportunites a week since late 2000. Couple that with the kick yourself when your down feeling knowing that you could have sold last week for more cash and this is not a surprise. Frankly I can't believe more of it is not happening. When we hit below a dollar by the end of the week we will see more throwing the towel in. There is no good reason for this stock to be above a dollar. The street dosen't care about partnerships and cool technology. That being said, I think those that bail will be sorry in the long run and will probably be adding at far higher prices than they will be selling at. That seems to be the nature of the markets. Investor sentiment is a funny thing. Since the 1930's I believe, the S & P has returned an average of 10 to 11% a year. Returns for the same period for individual investors was around 2 or 3% , and that might have been a negative figure. Emotions are a funny thing in the markets, causing many to buy at the top and sell at the bottom. Now if we could just cut the emotion out of the equation we might be all right. Best of luck to all.
mymoneybgone
Something else to consider and find out where you fit in. If you take the number of shareholders and divide it by the number of outstanding shares according to S&P at the end of last year, the average holding is approx. 2200 shares per shareholder. Where do you fit in that equation?
This figure is probably from 12/03. On the not so pleasant front, $10,000 invested 5 years ago has been parlayed in $910 of cold hard cash.
Dave
Yaya...63,580,000 as reported by Standard and Poors with 28,000(I am sure this is a rounded figure) shareholders of record.
mymoneybgone
Cebit 2004--
found a link with pictures and reviews by somebody who attended.
http://www.teamhardware.com/
mymoneybgone
Snackman, don't be so fast. I also think the folks that bought in after the Intel and IBM announcement thought they were going to be making a profit as well. I am sure there were some that did, but probably fewer than those who came out on the short end. Remember, around the time of the last round of financing we were publically being told of an expected break even point sometime this year. By all accounts this looks to have changed. It stands to reason that what may have been told to those investors could have changed as well.
mymoneybgone
Rachel, I think that is the most frustrating and telling part of this whole situation. When yourrevenue stream is solely dependant-and we have to figure this is entirely accurate- on other companies bring your products and services to the fore, you need to cover ever avenue of chance. The ball has been squarely dropped here, no excuses. This thing has changed so many time in the last 5 years, the company has been twisting like a flag in the wind most of that time. If there was money left on the table, then a true disservice has been done to the company and the shareholders. The only reason this company should have needed to go back and get money again this soon was if deployment was pushed further back than planned. They knew the terms they got in the last round were not the most favorable, nor should they have been, given where the company was at that time. SOMEBODY had to have the foresight to project out 6 to 9 months and see what the situation was going to be if the money flow had not started by then. And have the abillity to see just how crappy the terms were going to be should that come to pass.
At least the Intel and IBM announcements were still buzzing in the air during the last round, now what, a low key SKS, a recent SEC investigation, and a baker's dozen of lawsuits targeting the company, rightly or wrongly, will influence the next round of financing.
Many people are looking forward towards the end of the year, but the numbers had better start showing up in some fashion in Quarter 1/04 with some forward guidance going ahead, or we will start seeing this company getting carved up. There have been plenty of miscalculations over the last few years, but this could quite possibly be the biggest one yet. If next quarter is a repeat of the last one, I have to believe this company is on the ropes. The time just isn't there anymore.
mymoneybgone
Any truth to the rumor that Wave has issued shares of stock to Milton Bradley for the right to use the likeness of the guy on the Monopoly board pulling his pockets inside out as a replacement for the juggler
TIA,
Mymoneybgone
Now that's funny!
Larry, your new poll
How many people made more than Wave last quarter........
Tampa, you are probably not the only one here!!
Dave
Gates Predicting Death of the Password"
Bill Gates spoke at the RSA Security conference and said "There is no doubt that over time, people are going to rely less and less on passwords. People use the same password on different systems, they write them down and they just don't meet the challenge for anything you really want to secure."
A password is only as good as the password used with it and secret holders reliability of remembering it. The problem with passwords is users create what they think are good passwords but are actually weak passwords. RSA is working closely with Microsoft to develop "SecurID" technology specifically for Windows.
SecurID generates a constantly changing sequence of numbers that a user has to type in alongside with their password or a PIN.
Microsoft also demonstrated "tamper resistant" biometric ID-card software, developed by its own research arm, that can be used by both small and large companies to create ID cards using a digital camera, an inkjet printer and a business-card scanner.
Gavin Janche, development manager at Microsoft Research, who demonstrated the software, said one of the key aspects of the system is that it does not require a database because all the information is already stored on the card.
"The authenticity ID is stored in the printed information in the card itself. There are no user privacy issues because we know that what is stored on this card is stuff that they can actually see," he said.
"This system is also extensible, so we can include other biometric information, such as iris or fingerprint. It will still maintain the same tamper resistance on ordinary paper or plastic printed media," he said.
OASIS SAML Interoperability Lab Demonstrates Single Sign-On for GSA E-Gov's E-Authentication Initiative
RSA Conference 2004
SAN FRANCISCO--(BUSINESS WIRE)--Feb. 25, 2004--2004 RSA Conference-- Computer Associates, DataPower Technology, Entrust, Hewlett-Packard, Oblix, OpenNetwork, RSA Security, Sun Microsystems, and Others Showcase Authentication and Authorization Standard at RSA Conference
Eleven vendors teamed with the U.S. General Service Administration (GSA) E-Gov E-Authentication Initiative to demonstrate interoperability of the Security Assertion Markup Language (SAML), an OASIS Standard for the exchange of authentication and authorization information. For the first time ever, members of the OASIS Security Services Technical Committee demonstrated both types of SAML version 1.1 Single Sign-On, along with additional scenarios that highlight SAML's flexibility.
The OASIS SAML Interoperability Lab, sponsored by GSA, hosted by RSA Security, and co-sponsored by Sun Microsystems, used three separate scenarios to simulate interaction between a government or enterprise portal and sites from typical content or service providers.
The GSA E-Authentication Initiative is committed to delivering open standards-based authentication solutions to U.S. government agencies. Currently, E-Authentication is working with products that are interoperable using the SAML 1.0 protocol. According to Steve Timchak, E-Authentication Program Manager, "Interoperability among products is a key to the federated approach adopted by the E-Authentication Initiative. Additional protocols will emerge and become viable standards in the E-Authentication environment as federated authentication evolves. Sponsoring the SAML 1.1 Interoperability Lab is part of E-Authentication's commitment to this evolution."
"We have validated SAML's strong traction in the marketplace in several reports this year and in work with our client base, estimating it is in use at between 100 and 200 organizations worldwide," said Dan Blum, Senior Vice President and Research Director, Burton Group. "SAML is a proven standard offering implementers opportunities for productivity gains, cost savings, risk transference, or competitive advantage. Additional work on nailing down interoperability will enhance SAML's value to customers, and we are pleased to see 11 vendors participate in the RSA Conference interoperability event."
"SAML 1.1 succeeds in establishing a basis for federated identity, an environment where attention to interoperability is imperative," said Robert Philpott of RSA Security, co-chair of the OASIS Security Services Technical Committee. Philpott, together with fellow co-chair, Prateek Mishra of Netegrity, pointed to SAML adoption by Liberty Alliance, the Internet2/MACE Shibboleth project, and OASIS WS-Security, as signs of widespread implementation in the industry.
Vendors Collaborate on SAML Interoperability
Computer Associates
"As organizations continue to move more business transactions online, the importance of the SAML standard grows exponentially. Computer Associates embraces open standards, and we are fully committed to delivering security management solutions built upon these standards to empower secure federated identity management. New standards such as SAML, Liberty, and SPML allow organizations to securely provision, validate, and pass identity and authorization information, thereby reducing end-user management costs while enhancing the support and deployment of Web services," said Gavenraj Sodhi, product manager for eTrust Security Management solutions at CA.
Entrust
"Our participation in the OASIS SAML Interoperability Lab showcases our ongoing commitment to the advancement of open standards as well as our support for the US Federal Government E-Authentication initiative," said Chris Voice, vice-president, Secure Identity Management Solutions, Entrust, Inc. "SAML interoperability is key to enabling business and government to extend application architectures and leverage the efficiencies of broad single sign-on in a federated environment."
Oblix
"Oblix is completely dedicated to interoperability between systems," said Prakash Ramamurthy, vice president of products & technology, Oblix. "Oblix has both endorsed and invested in open standards such as SPML and SAML, and drove the industry's first and most robust deployment using the SAML specification. Customers benefit the most from products that adhere to open standards, and we support that model as the only cost-effective way to connect people, resources and systems."
OpenNetwork
"This event validates the value of industry standards such as SAML and their importance to achieving better interoperability among disparate platforms and across company borders. We're able to show with more clarity than ever before how an enterprise can extend its reach safely, quickly and cost-effectively without having to abandon its existing infrastructure investments," said Bob Worner, vice president of engineering at OpenNetwork.
RSA Security
"The new business opportunities and cost savings that SAML enables are driving its rapid acceptance as a standard among software vendors and enterprise customers," said Jason Lewis, vice president of product management and marketing at RSA Security. "Having contributed technology to the initial SAML effort and being one of the first to offer a solution that supports the current version, SAML 1.1, RSA Security is pleased to be a part of the value that it is creating."
About OASIS
OASIS (Organization for the Advancement of Structured Information Standards) is a not-for-profit, global consortium that drives the development, convergence, and adoption of e-business standards. Members themselves set the OASIS technical agenda, using a lightweight, open process expressly designed to promote industry consensus and unite disparate efforts. OASIS produces worldwide standards for security, Web services, conformance, business transactions, electronic publishing, topic maps and interoperability within and between marketplaces. Founded in 1993, OASIS has more than 2,500 participants representing over 600 organizations and individual members in 100 countries. http://www.oasis-open.org
Additional information:
OASIS Security Services Technical Committee
http://www.oasis-open.org/committees/security
GSA eAuthentication Program
http://cio.gov/eauthentication
Over 5 Million Notebook Computers Have Shipped with Atmel TPMs
Atmel(R) Corporation announced today that it has shipped over five million Trusted Platform Module (TPM) ICs in the world's most popular notebook computers. Much of the popularity is due to the computer's hardware-based encryption, which eliminates the need for hardware tokens and reduces administration efforts and the cost of providing security. The secure storage of encryption keys, passwords and digital certificates provided by TPMs permit secure wireless data transfer and a "single sign-on" password manager.
TPMs are single-chip security sub-systems that protect the end-user's privacy by providing tamper-proof storage and management of the user's identity, passwords, and encryption keys. Computers without TPMs store passwords, digital certificates, and encryption keys on the system hard drive, which is relatively vulnerable to unauthorised access. When installed in personal computers, TPMs can help to prevent identity theft crimes, such as email-born viruses and the scams perpetrated on Best Buy(TM) and PayPal(R) customers, last summer. The ability of TPMs to record and store measurements of the "state" of the system at boot up can be used to thwart hackers by limiting data access to specific stages of the boot process and can help detect viruses or worms that affect the boot up process.
TPM security is based on an industry standard developed by the Trusted Computing Group (TCG). According to Kerry Maletsky, Business Unit Director at Atmel, "When you consider that Internet fraud, including things like worms and viruses, cost billions of dollars each year, it is not surprising that TPM-enabled computers are selling like hotcakes. TPMs protect people's identities and identity is the real issue in Internet crime," Maletsky noted. "Internet crime often takes advantage of a victim's misplaced trust in the identity of a person sending an email or other transmission. The question is, can the sender and the recipient of an email be sure that nobody has stolen the sender's identity? In most computing environments the answer is no. With trusted computing platforms, the answer is yes.
"For example, last summer's Best Buy and PayPal Internet scams used 'spoofed' emails and 'hijacked' web sites that pretended to be Best Buy and PayPal in order to elicit sensitive financial information from victims. TPMs could have protected the victims from these scams because the TPM can ensure the authenticity of the email source and detect if the message (or data) has been fraudulently changed. If all parties had had TPMs, the victims could have known that the bogus emails were not really from Best Buy or PayPal. Any information that was submitted to their web sites could have been encrypted in such a way that only PayPal or Best Buy could have read. It would have been useless to the perpetrators."
"Viruses that propagate by sending copies to everyone in your address book fail in a TPM environment because the TPM can prevent the virus from signing the message. When the target gets the virus-generated email, it can be automatically deleted since it is not properly signed," Maletsky added. "There is no other means of protection as secure as TPMs. As more people discover this and as more software and hardware vendors support it, sales of TPM-enabled computer can be expected to accelerate," Maletsky concluded.
Atmel's AT97SC3201 TPM ICs provide a complete, turnkey, TCG 1.1b-compliant, hardware security solution that integrates a high-performance low-power processor, 500 ms 2048-bit RSA crypto accelerator, true random number generator, secure EEPROM storage for public/private keys, SRAM, timer, real-time clock, LPC interface to Intel and AMD processors, and tamper prevention circuitry that disables the chip if someone tries to read its contents. Atmel's AT97SC3201 TPMs include drivers for Windows(R) 98, 2 K, XP, and NT 4.0 operating systems; as well as MAD and MPD BIOS drivers.
In addition to PCs, the Atmel TPM is also finding its way into embedded applications such as PDAs, cell phones, POS terminals, set top boxes, and sensitive eCommerce applications.
Atmel's AT97SC3201 TPM complies with Trusted Computing Group (TCG) Standard 1.1b. They are available now and are priced at $4.00 in volume.
Atmel supports the newest TCG standard, TCG 1.2. Samples conforming to the new standard will be available in Q3, 2004.
About TCG
The Trusted Computing Group (TCG) is an open, industry standards organisation formed to develop, define, and promote open standards for hardware-enabled trusted computing and security technologies, including hardware building blocks and software interfaces, across multiple platforms, peripherals, and devices. TCG specifications enable more secure computing environments without compromising functional integrity, privacy, or individual rights. The primary goal is to help users protect their information assets (data, passwords, keys, etc.) from compromise due to external software attack and physical theft. For more information, go to www.trustedcomputinggroup.org.
About Atmel
Founded in 1984, Atmel Corporation is headquartered in San Jose, California with manufacturing facilities in North America and Europe. Atmel designs, manufactures and markets worldwide, advanced logic, mixed-signal, nonvolatile memory and RF semiconductors. Atmel is also a leading provider of system-level integration semiconductor solutions using CMOS, BiCMOS, SiGe, and high-voltage BCDMOS process technologies.
NOTE: Atmel(R) is a registered trademark of Atmel Corporation. Best Buy is a trademark of Best Buy Co., Inc. PayPal is a registered trademark of PayPal, an eBay Company. Windows, Windows 98, 2000, XP, and NT 4.0 are either registered trademark or trademarks of Microsoft Corporation. Other terms and product names may be the trademarks of others.
Information:
Atmel's AT97SC3201 product information may be retrieved at: http://www.atmel.com/products/Embedded/ Press Contacts: Vicki McCann, Marketing Communications Manager - USA, Tel: +1-719-540-1724, Email: vmccann@cso.atmel.com Veronique Sablereau, Corporate Communications Manager - Europe, Tel: +33-1-30-60-70-68, Email: veronique.sablereau@atmel.com Web site: http://www.trustedcomputinggroup.org Web site: http://www.atmel.com
Atmel Corporation
Today's announcement validated something............
Wave ain't going anywhere. What we are seeing is a slow but sure shift in the comouting world. What was cloaked is now coming out. Yes another suit was filed today. Big deal. Remember all the negative artricles less than a year ago debunking a trusted computing initiative. Did we not also see a name change from the TCPA to the TCG with basically the same players. I have to believe there is still a very skeptical eye being cast towards this paradigm shift. Every company in this undertaking needs to be above board. This is a very critical juncture here and one slip up could derail or delay acceptance of the trusted computing initiative. Yet, here is a Wave/NTRU announcement today. Don't think for a minute if there was anything fishy that NTRU wouldn't have pulled away from Wave. Truth be told, the company from what we know since we can't see or know what is in the pipeline is in a very precarious position, if all we have to go in is what is public knowledge. The easy play wouuld be for these companies to cut bait, wait till the shop closes and then deal with whomever buys the IP. But it's not happening. The companies know more of what's going on than we do. Sure we have our money at risk, but the business have something else besides money and time risked. It's reputation. Time and money can be written off, but your reputation is a whole nother ball of wax. Let the ambulance chasers make there noise. Just follow the trail being laid out by our partners. The true tale is being told here.
Dave
This card could change your life
Contactless technology will make e-commerce a breeze
By Wong Kim Hoh
YOU walk past a poster advertising the latest album by your favourite artist.
You whip out your PDA and flash it near the poster. Your handheld computer downloads information about the album from a smart chip in the poster.
You like what you read and push a few buttons to buy - with your credit card - the rights to listen to the album. Your payment is instantly verified.
You go home and transfer the album rights from your PDA to an Internet radio. The album starts playing.
Far-fetched? Not quite. Such a scenario may happen sooner than you think.
Last month at the Consumer Electronics Fair in Las Vegas, Philips Electronics and Visa International showed how they had joined forces to change the way digital content and services will be distributed, paid for and accessed by consumers.
Using the latest contactless chip technology, the duo hope to hop into bed with various partners - especially manufacturers of mobile phones and other handheld devices - in the fields of gaming, music, entertainment, ticketing and shopping.
They have already roped in Universal Music in France to look at new ways for the public to access the record company's music portal on the Internet.
The ramifications are multi-fold. Content providers and digital merchants such as music and movie companies will get new customers and increase their revenues while the public will have easier access to new shopping and other consumer experiences.
Credit card companies and banks will also have new business models.
'It's more evolutionary than revolutionary,' said Mr Gaylon Howe, executive vice-president, Consumer Platforms, Visa International. Lifestyles, he added, are changing, and it is only natural that Visa - which has a 60 per cent share of the credit card market with over one billion cards in use, accounting for US$1.7 trillion (S$2.9 trillion) in sales of goods and services worldwide - should be looking at options tailored to suit the changing needs of banks, merchants and cardholders.
The terms being bandied about by the duo at the fair this year were Philips' Near Field Communication (NFC) technology and Visa's Verified by Visa.
Near Field Communication is an interface technology which allows electronic devices, such as PCs and mobile phones, to exchange data at a distance of 10cm.
For instance, when a camera and a TV set equipped with the technology are brought together, they can have a 'conversation' which enables image transfers.
Verified by Visa is a payment authentication service.
The alliance is in line with Philips' vision of 'universal commerce' - where transactions can take place at any time, anywhere and through any device.
It is also part of Philips' vision for the Connected Planet, a world where televisions, PCs and other home electronics devices are connected and communicate with one another using wireless and Internet technologies.
Mr Scott McGregor, president and CEO of Philips Semiconductors, declined to be specific but said the company had invested 'tens of millions of euros' to develop the new technology.
Embedding the smart chip into devices such as posters or handheld devices, however, would only cost 'tens of cents'.
He is convinced mobile commerce will take off. The facts and figures certainly back him up.
There are 1.2 billion mobile phones in use worldwide today as well as millions of PDAs, gaming devices and portable computers. The demand for digital content - music video, gaming, ring tones, etc - which is already hot, is set to explode.
Mr Y.M. Wong, 41, is not surprised by the developments. The engineer, who banks and shops on the Internet, said: 'You can already use your mobile phone to buy drinks from kiosks. This is just a logical extension. It will make life a lot more convenient.'
--------------------------------------------------------------------------------
Ticket to ride
Ticketing: Mobile phone users pay for concert or movie tickets simply by holding their phone next to the payment terminal. The contactless chip in the phone transfers Visa payment data to the terminal.
Once payment is verified, the tickets are sent to the phone. The phone user can then transfer a ticket using NFC to his companion's mobile phone. At the venue, both ticket-holders can use their phones to gain access.
Travel: A traveller books airfare and accommodation using his home PC, an NFC- enabled mouse and a contactless Visa payment card. The ticket and airline information are transferred from the PC to the Visa card using NFC.
The card is then used for airline check-in, flight boarding and hotel check-in. The hotel room key can be transferred to the mobile phone using NFC and the phone can be used to access the room.
On checking out, the hotel can transfer a receipt to the phone, and at home, the traveller can yet again transfer the receipt from phone to PC.
Something I haven't seen mentioned yet.........
I'll get to that in a minute. First, I'd like to thank all those who have been digging and contributing for many years at SI, RB and here. We all come in from different walks of life, different social circles, levels of education and financial wherewithall. Yet, we can all join into a discourse on this company, technology, where it is now, where it could be headed. Fascinating. Some frequent, bombastic, always heavy hitting, and some acerbic. Never boring. Hell I know I rarely bring anything of DD substance to the bored, more social commentary and observation. I don't even know if anybody reads these!!
Most importantly, the Toshiba find this weekend dated 2/17. Funny........ You'd think that a company that is shortly removed from an SEC investigation and approaching a baker's dozen of IMO bogus charges would not be found with a download available from Toshiba. Hmmm...... wasn't I reading about the naysayers commenting on the "big brother" argument of a trusted computing initiative? My, to read those lawsuits and an SEC investigation Wave must be teeming with all sorts of unsavory types, running shell games and five card monte in alleyways. Obviously Toshiba dosen't think so. I think we will quickly find out the others don't either. Common sense tells me the last thing this initiative needs is any, and I mean the tiniest, minutest shadow of doubt cast it way. Trusted Computing. If it isn't percieved as above board, all the monies and time leading up to where we are today would be for naught. It would be far easier for them to wait 6 months to a year for the Company from Lee to fade away. Yet they haven't cancelled any off the big shows have they? Wave was at IDF, and in conjunction with many many players at RSA shortly who have plenty of time and money riding on this, and I might add a hell of a lot more to lose, credibillity anyone. And Wave is still shoulder to shoulder with every one of the big boys. This tells me all I need to know. It speaks volumes.
Last year, we all want to see at least a sign of progress. I think the availabillity of product last year, continuing into this year through different channels is light years ahead of where we were in 200, although you can't tell it from the stock price. You need to have product in the marketplace before revenues arrive. Products just started arriving in the marketplace toward the end of last year. Don't let a misplaced expectation of revenue bring you down. Baby steps. All I want to see is more revenue this quarter than last. I don't care if it's .01. Nothing more should be expected. Unless I missed the great paradigm changed hearalded in the ensuing print and media campaign showing the flashy new products available. Baby steps. Despite the high, unrealistic expectations, the marketplace was not there. Up until last year, the whole industry had yto shift. Thank you music downloading, credit card fraud, identity theft, among others. The whole industry had to be convinced that Joe blow dosen't need anything faster to work than he has now. 120 gig hard drives are amazing. Hell I do a lot on my pc and still have plenty of room on my 40 gig. As the cry for security became louder the shift began. And here we are today.
From what we have read, it looks like the slow flow has started, from the trickle at the end of '03. Things should only pick up from here. When I see who we are working with, the interoperabillity and, although it may have set us back, the abillity to recognize a changing market and adapt to it have provided Wave with the tools it needs to manuver, survive and prosper in the years ahead.
Atmel Chips Can Thwart MyDoom, Other Viruses and Internet Fraud
SAN JOSE, California, February 2 /PRNewswire/ -- - US$4 TPM Chips Provide Hardware-based, Secure Protection
Atmel(R) Corporation executives said today that the company's Trusted Platform Module (TPM) ICs could help prevent identity theft, such as those perpetrated on Best Buy(TM) and PayPal(R) customers last summer, as well as viruses and worms, such as MyDoom, Sobig.F and Blaster. In just one week, Blaster infected 500,000 computers and caused and estimated US$1.3 billion in financial losses. Last week's MyDoom virus is reported to be the fastest spreading ever, infecting one in 12 PCs. Atmel's TPM chips provide secure hardware-based, storage and management of the user's identity, passwords, and encryption keys, unlike most software-only security solutions.
According to Kerry Maletsky, Business Unit Director, North American ASIC/ASSP products at Atmel, "The real issue with viruses, worms and other Internet crime is identity. Can the identity of the data sender be reliably authenticated? Can the user or operating system determine that a program is safe to run, prior to its execution? With trusted computing platforms, the answer to both questions is yes because the authentication and integrity of both the programs and machines can be absolutely verified. The only way to cheat the system would be to copy the contents of the TPM or physically remove the chip and put it in another system - activities that cause the chip to disable the system.
"The concept of authenticated identity can be extended to the BIOS, operating system and the catalog of registered programs to protect from worms and viruses such as MyDoom, Sobig.F or Blaster. In this context, registration is the process by which software is measured and said measurements are stored in a catalog of known measurements. Worms and viruses are computer programs," Maletsky explained. "If a computer's BIOS and OS only allow execution of programs whose measurements match the values found in the measurement catalog protected by and authenticated by the TPM neither worms nor viruses could ever execute. Since the catalog of program measurement data is protected by the TPM IC, hackers could not alter it and go undetected. This capability could be particularly useful in preventing worms that invade servers through security holes and are difficult to detect until they have done a lot of damage. Unlike anti-virus software that can only be available after the virus has done some damage, TPMs offer the potential to prevent the outbreak before it happens.
"TPMs can help prevent phishing and spoofing scams as well," Maletsky continued. "Last summer's Best Buy and PayPal Internet scams used 'spoofed' emails to elicit sensitive financial information from victims. Since TPM ICs can be used to ensure that emails are accepted only from 'authenticated' sources, including identification of the actual hardware generating the email, they could have prevented these crimes. If Best Buy, PayPal and the victims had used Atmel TPM enabled computers and servers, the thieves could have been foiled because the 'spoofs' that did not come from authenticated Best Buy or PayPal machines would have been recognized by the TPM hardware."
Atmel's AT97SC3201 ICs provide a complete, turnkey, Trusted Computing Group (TCG) 1.1b-compliant, hardware security solution that integrates a high-performance low-power, RISC processor, 500 ms 2048-bit RSA crypto accelerator, true random number generator, secure EEPROM storage for 20 public/private keys, SRAM, timer, real-time clock, LPC interface to Intel processors, and tamper prevention circuitry that disables the chip if someone tries to read its contents. Atmel's TPMs have unique, inaccessible ID codes that are used to authenticate the origination of data sent from the system. Atmel's TPMs include drivers for Windows 98, 2 K, XP, and NT 4.0 operating systems; as well as MAD and MPD BIOS drivers.
In addition to PCs, the Atmel TPM is also finding its way into embedded applications such as PDAs, cell phones, POS terminals and set top boxes to secure content as well as sensitive eCommerce applications.
Atmel's AT97SC3201 TPM ICs are part of a family of products known as SiliconCITY(TM). Atmel's SiliconCITY products are based on re-useable and validated intellectual property and architectures from Atmel's broad line of standard products, ASSPs and system-on-chip portfolio.
Atmel's AT97SC3201 TPMs that comply with TCG Standard 1.1b are available now, and are priced to OEMs at US$4.00 in volume.
About TCG
The Trusted Computing Group (TCG) is an open, industry standards organisation formed to develop, define, and promote open standards for hardware-enabled trusted computing and security technologies, including hardware building blocks and software interfaces, across multiple platforms, peripherals, and devices. TCG specifications enable more secure computing environments without compromising functional integrity, privacy, or individual rights. The primary goal is to help users protect their information assets (data, passwords, keys, etc.) from compromise due to external software attack and physical theft. For more information, go to www.trustedcomputinggroup.org.
About SiliconCITY
SiliconCITY is the creative foundation for Atmel's ASIC/ASSP product strategy. It is built on re-useable and validated IP and architectures from Atmel's broad line of standard products and ASSPs within its System-on-Chip portfolio. Atmel has SiliconCITY platforms available now to give customers a significant time-to-market advantage. In addition, the common design infrastructure allows customers to seamlessly migrate from standard products to custom ASICs with confidence in first pass success. SiliconCITY from Atmel ... Your System Foundation.
About Atmel
Founded in 1984, Atmel Corporation is headquartered in San Jose, California with manufacturing facilities in North America and Europe. Atmel designs, manufactures and markets worldwide, advanced logic, mixed-signal, nonvolatile memory and RF semiconductors. Atmel is also a leading provider of system-level integration semiconductor solutions using CMOS, BiCMOS, SiGe, and high-voltage BCDMOS process technologies.
NOTE: Atmel(R) is a registered trademark of Atmel Corporation. Best Buy is a trademark of Best Buy Co., Inc. PayPal is a registered trademark of PayPal, an eBay Company. Other terms and product names may be the trademarks of others
Acer Veriton GT range: a first look
Charles McLellan February 12, 2004
Acer's new range of business PCs features an appealing design, useful management and security tools, and an eye-catching entry-level price.
Acer, already a major force in the notebook market, is now making a play for a greater share of the business desktop market with launch of its new Veriton GT range. Acer is hoping to attract the attention of buyers in small/medium-sized businesses, government departments and the education sector with a combination of appealing design, attractive pricing and a suite of management and security tools.
Acer Veriton 7600GT.
Available in tower, mini-tower or traditional desktop formats, the Veriton GT is an Intel-only range. Northwood-core Pentium 4 CPUs will be used initially, but Acer describes the platform as 'Prescott-ready'. The basic specifications include an attractive two-tone (black and silver) tool-free-access case, Pentium 4 processor, Intel's 865G chipset with integrated graphics, up to 4GB of DDR400 RAM and on-board gigabit Ethernet networking. The motherboards (MSI-made and Acer-branded) all have AGP slots, so you can upgrade the graphics if necessary.
Acer Veriton 3600GT.
No fewer than 8 USB 2.0 ports are present on all models, divided between front and rear -- the 7600GT tower model has a neat spring-up panel containing 4 ports at the top. Selected USB ports can be locked to prevent unauthorised data transfer -- the USBLock function is part of Acer's LANScope application, which additionally supports remote BIOS refresh and hardware monitoring.
Other elements of Acer's desktop management solution include OBR 2.0, which can restore a PC to its factory settings or load a backup image either from a hidden partition on the machine or from the network. To make things even simpler, the Veriton GT systems have a tiny hardware button (like those seen on optical drives) that kicks off the on-board recovery process. Desktop Manager provides IT staff with remote access to system information, BIOS settings and asset numbers; a tool is also provided to transfer users' personal settings (wallpaper, favourites, contacts and so on) between PCs.
Acer's security solution includes TPM (Trusted Platform Module) 1.1, which provides hardware-based protection for encryption and digital signature keys. Intrusion alarms activate when the chassis is opened, and when the system is disconnected from the LAN (even when it's turned off).
All this should be of interest to business buyers – especially in companies without large IT departments. But the clincher could be the pricing: full details aren't available yet, but Acer says that an entry-level model featuring a 2.66GHz Pentium 4, 256MB of RAM, a 40GB hard disk and a DVD-ROM drive will be available for as little as £350.
Utimaco Enables the Use of Trusted Hardware Platforms for Secure Mobile Computing
Posted on 17 February 2004
At this year's Intel Developer Forum and RSA Conference Utimaco Safeware, the Trusted Computing Group Member, will present basic protection for next- generation laptops using TPM and IBM ESS
Utimaco enables the Use of Trusted Hardware Platforms for Secure Mobile Computing San Francisco, February 17, 2004 - At this year's IDF (Intel Developer Forum, 17th to 19th February 2004, San Francisco, CA) and RSA Conference (23rd to 27th February 2004, San Francisco) Utimaco Safeware will exhibit security solutions from its SafeGuard product family for the new generation of PCs and laptops with an integrated TPM (trusted platform module) security chip.
Utimaco's security solutions for encrypting data saved locally, or on a network, uses the TPM chip, and also IBM's ESS (Embedded Security Subsystem) which has been developed for this platform. This combination of integrated security hardware and data encryption provides customers in enterprise environments with basic protection for PCs and laptops, which also allows these devices to be used in insecure environments such as mobile computing. Even if the devices are lost or stolen, the saved data cannot be accessed by unauthorised users, since it is protected by encryption. The security chip prevents the keys by hardware from being read, and ensures that the saved data can only be read on an authorised device. This means that in-house staff cannot copy hard disks and then read their contents on other devices, even if they know the password.
Utimaco's product portfolio can be used to encrypt virtual disks (SafeGuard PrivateDisk), files and folders locally and on the network (SafeGuard LAN Crypt) or entire hard disks (SafeGuard Easy), depending on the needs of the security concept.
At the IDF and RSA Conference, Utimaco Safeware's product portfolio for secure mobile computing will be presented at the TCG Areas by Utimaco and IBM.
The market research firm IDC expects that the market share of laptops in the global PC market will increase from 27.5% in 2003 to 44.3% in 2006. The accelerators for this development are Intel's new Pentium? M energy- saving mobile processors, and integrated WLAN functions, as used by Intel in its Intel? Centrino mobile technology design. Another important factor that increases the acceptance of mobile devices in enterprise environments is the ability to protect data saved on those devices from unauthorised access, since mobile devices are easily lost or stolen. According to a study by CSI, the american Computer Security Institute, in collaboration with the FBI, laptop theft was the second most common computer crime in 2003. The company most affected by this kind of theft suffered damages equalling 5 million dollars.
In a statement, Intel's David Grawrock, Senior Security Architect, said "Mobile computing needs security concepts which ensures that data is not only encrypted during transmission over a network, but also when stored on mobile devices, which are getting smaller and smaller as time goes on."
"Services and applications based on the Trusted Platform Module give users more choices in security and allow them to travel and use their mobile PCs with confidence," noted Jim Ward, chairman, Trusted Computing Group.
The TPM security chip is the core of a new security architecture intended to improve computer security through trusted hardware. IBM, the leading hardware manufacturer, supplies this security chip as a standard element of the ESS Embedded Security Subsystem in most of its models, especially in its laptop ranges. Like an "internal smart card" TPM makes it possible to protectingly save and process particularly critical information such as keys and passwords. For the first time, machines can also be uniquely identified on networks, when TPM is in use.
Utimaco Safeware AG is one of the leading European manufacturers of professional IT security solutions. The security technology and solutions developed by Utimaco Safeware protect the electronic data of companies and government bodies against unauthorised access and guarantee that business processes and administrative procedures in the electronic world are binding and confidential. Utimaco Safeware's Personal Device Security division supplies technologies and solutions for mobile security in the areas of high-level authentication including biometric techniques, encryption and integrity checks. Its products and solutions secure data in terminal server and Citrix environments, on the PC, laptop and PDA at the workplace, and on the move.
*Intel and Intel Centrino are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
Chips to ease Microsoft's security nightmare
CHIP makers are planning a new generation of microprocessors that should plug the gaps that led Microsoft to issue a "critical security alert" last week.
The alert was sparked by the discovery that a raft of Microsoft programs were vulnerable to a problem called "buffer overflow", which hackers can exploit to extract private information from a PC. And the risk of such attacks only worsened when, two days after the alert was issued, critical Windows "source code" was leaked onto the internet- letting hackers see how it works.
A buffer is a section of computer memory that can store a set amount of data. Sometimes, usually because of a software bug, the processor sends more data to the buffer than it can hold, causing it to overflow into the next chunk of buffer memory. This makes computers vulnerable to hackers, because by deliberately making a buffer overflow they can force the computer to execute their malicious code.
The problem is hard to detect, as popular programming languages, like C and C++ do not make it easy to track when programs are vulnerable to overflow. But now chip makers Advanced Micro Devices (AMD) and Intel are developing processor chips that will deal with the problem. AMD's Athlon-64 (for PCs) and Opteron (for servers) will protect against buffer overflows when used with a new version of Windows XP. Intel plans similar features on next generation Pentium chips.
Until now, Intel-compatible processors have not been able to distinguish between sections of memory that contain data and those that contain program instructions. This has allowed hackers to insert malicious program instructions in sections of memory that are supposed to contain data only, and use buffer overflow to overwrite the "pointer" data that tells the processor which instruction to execute next. Hackers use this to force the computer to start executing their own code (see Graphic).
The new AMD chips prevent this. They separate memory into instruction-only and data-only sections. If hackers attempt to execute code from the data section of memory, they will fail. Windows will then detect the attempt and close the application.
"Buffer overflows are the largest class of software vulnerabilities that lead to security flaws," says Crispin Cowan, of computer security company Immunix in Portland, Oregon. Buffer overflow was behind the devastating Slammer and Blaster worm attacks on Windows PCs in 2003, and the Slapper worm used it to infect thousands of Linux-based web servers in 2002.
The buffer overflow problem that triggered last week's alert was discovered by engineers at eEye Digital Security in Aliso Viejo, California. It appears in a commonly used component of 20 Microsoft packages, including the Outlook emailer. "It's a most critical vulnerability," says Firas Raouf of eEye. Hackers could exploit the flaw to write email worms that could give them full remote access to a PC. This could happen without the user of the target PC opening an attachment or reading the email that carried it.
The new chips will block this kind of attack. But Cowan believes hackers will find other ways to insert malicious code: for example, by making a program jump to a subsection of its own code at the wrong time, perhaps to open a data port, to a hacker. "There's nothing to prevent that kind of attack," Cowan says.
Intel Foresees Smaller PC Form Factors, Integrated Access Points
February 18, 2004 (2:15 p.m. EST)
By Edward F. Moltzen, CRN
Intel on Wednesday spelled out its vision for the digital office, which rests heavily on its upcoming Grantsdale and Prescott desktop platforms as well as hardware-based security features--all of which are slated to be available later this year.
Bill Siu, vice president and general manager in Intel's Desktop Platforms Group, said smaller, sleeker desktop BTX form factors will hit the market this year. The hardware also will come with integrated access points for wireless networking.
"I think this is a real breakthrough," Siu said of the new 6.9 liter form factor. "These actually use standard chassis and standard components," he said, adding that the new hardware will be available from "multiple sources this year."
Siu made his remarks during a speech at the Intel Developer Forum in San Francisco. In a demonstration, Siu showed the new BTX desktop with the built-in access point, designed to provide wireless networking and synchronization inside a digital office.
Intel also expects to ship additional computing security features directly on its hardware later this year, Siu added. The features will be based on Intel's still-in-development La Grande technology, which company executives began discussing publicly last year.
Siu noted that Intel is intent on bringing into the digital office the same high-profile technology that it's been showing off for digital homes. "We focus on creating value for the line of business and improving collaboration and mobility. At the same time, we deliver value to it by improving security and manageability," he said.
Siu also reiterated earlier Intel statements that the company plans to provide a number of performance improvements in its Grantsdale and Prescott processing platforms for the desktop, which are slated to ship in the first half of this year.
"We're going to provide even better improvements to media processing, coding and encoding," Siu said. Intel eventually plans to transition from its current Hyper-Threading technology to dual-core CPUs that provide better performance in multitasking and in using digital media, he added.
Intel Unveils Next-Gen Notebooks
Edward F. Moltzen, CRN, 19-Feb-2004
With an eye toward expanding notebook form factors and functions, Intel on Wednesday demonstrated next-generation mobile PCs, code-named Florence, that will include more connectivity options and models.
At the Intel Developer Forum in the U.S., Anand Chandrasekher, vice president and general manager of Intel's Mobile Platforms Group, demonstrated three "concept PCs" designed to bring the notebook form factor to different users.
The notebooks included a 12-inch model with EMA functionality that converts to a tablet PC; a 15.4-inch model with built-in fingerprint and smart-card security plus array microphones and a built-in camera for collaboration applications; and a 17-inch, high-end mobile "entertainment PC" that combines audio/video communication, high-definition audio, a wireless Bluetooth keyboard and an IP phone in a "luggable" design.
Intel also unveiled a logo program for ISVs that develop applications optimized for its Centrino mobile platform. The "Runs Great On Centrino" logo will be available to developers whose applications meet a series of tests, including compatibility with Intel's longer-battery-life technology and mobile connectivity.
"Clearly, as we optimize the software, these devices just get better together and accelerate growth for all of us," Chandrasekher said.
The long-awaited Dothan mobile processor, which was expected this quarter, has been pushed back to the second quarter, Chandrasekher added. "We were disappointed [about the delay]," he said. However, Intel is "expecting a very quick ramp [up]," he added.
In the second half, Intel also plans to begin shipping a full Centrino upgrade, code-named Sonoma, that will tie together updates to the processor, power management and Wi-Fi capabilities.
In addition to a new Pentium M processor and support for 802.11a/b/g, the upgrade will include a new chipset, code-named Alviso, that will support third-generation graphics and support for TV-out, high-definition audio, eight USB ports and up to 2 Gbytes of DDR2 memory, according to Intel
Intel, seven other launch Wireless USB Promoter Group
Feb. 18, 2004
Intel announced the formation of the Wireless USB Promoter Group, with an eye toward delivering the first "high-speed personal wireless interconnect." Intel claims Wireless USB personal connectivity will bring the convenience and mobility of wireless communications to high-speed interconnects for multimedia consumer electronics, PC peripherals, and mobile devices.
The Wireless USB promoter group has already begun defining the Wireless USB specification, according to Intel, with a targeted bandwidth of 480 Mbps that maintains the same usage and architecture as wired USB as a high-speed host-to-device connection. This is intended to enable an easy migration path for today's wired USB solutions, Intel says.
The spec will be based on Ultra-Wideband (UWB) radio efforts by the MultiBand OFDM Alliance (MBOA) and WiMedia Alliance, both open industry associations that promote personal-area range wireless connectivity and interoperability among multimedia devices in a networked environment.
The 480 Mbps initial target bandwidth of Wireless USB is comparable to the current wired USB 2.0 standard, and will feature wireless high-data throughput with low power consumption for distances under 10 meters. The Wireless USB interface will deliver the benefits of high-speed wireless connectivity, security, ease-of-use and backward compatibility to customers.
Intel led the formation of the Wireless USB Promoter Group with the understanding that the USB Implementers Forum (USB-IF) would act as the trade association for the Wireless USB specification. Additionally, Intel says it will continue to drive this initiative into the marketplace as the first commercial application to run on top of the Common UWB Radio platform.
A completed Wireless USB spec is expected by year's end, and the first Wireless USB implementations are expected to be in the form of discrete silicon that will be introduced in a number of form-factors including add-in cards and dongles along with embedded solutions to support the technology's introduction and subsequent rapid ramp-up.
"The Wireless USB Promoter Group is committed to preserving the existing USB device and class driver infrastructure and investment, look-and-feel and ease-of-use of wired USB," noted Jeff Ravencraft, Intel technology strategist and USB-IF chairman. "Wireless USB will preserve the functionality of wired USB while also unwiring the cable connection and providing enhanced support for streaming media CE devices and peripherals."
In addition to Intel, other members include Agere Systems, HP, Microsoft, NEC, Philips Semiconductors and Samsung Electronics.
http://www.linuxdevices.com/news/NS6576610114.html
Dell has no plans to use AMD chips in its products
Wednesday February 18, 6:46 pm ET
CHICAGO, Feb 18 (Reuters) - Dell Inc. (NasdaqNM:DELL - News), the world's No. 2 personal computer maker, said on Wednesday it had no plans to use Advanced Micro Devices Inc. (NYSE:AMD - News) chips in its products as corporate customers are not asking for that.
Dell will stick to using chips made by Intel Corp. (NasdaqNM:INTC - News) in its desktop, laptop computers and servers, Dell President and Chief Operating Officer Kevin Rollins told students at the University of Chicago's Graduate School of Business.
"If you look at the corporate market, which is where 85 percent of our business is today, the corporate user has not yet found confidence in AMD and so most of the corporations use Intel," he said. "Where AMD has gained a good foothold is in the consumer space. That has not been the primary focus of Dell strategically."
He added, however, that Dell tests every AMD chip, including its new 64-bit Opteron processor, in its labs.
"The most recent run of both Athlon and Opteron chips have been better than anything we've seen them do before so we would never say never," Rollins said of Sunnyvale, California-based AMD.
International Business Machines Corp. (NYSE:IBM - News) and Sun Microsystems Inc. (NasdaqNM:SUNW - News) already sell servers using AMD's Opteron chip. Hewlett-Packard Co. (NYSE:HPQ - News) will begin using the chips in server computers, Reuters reported in January, citing sources familiar with the matter. Analysts have waited to see if Dell would follow suit.
Opteron, like Intel's far more expensive 64-bit Itanium chip, crunches 64 bits of data at a time compared with the 32-bits processed at once in the ubiquitous Intel-standard, or x86 chips. Opteron and Itanium are faster at data-intensive computer uses than the 32-bit variety that Intel's Xeon server chips represent.
Opteron, which launched in April 2003, has been adopted not only by major vendors such as IBM, but also by a wide range of second-tier, or "white box" server makers.
Intel, Movielink co-star in Web movie push
Last modified: February 17, 2004, 4:32 PM PST
By Stefanie Olsen
Staff Writer, CNET News.com
Video-on-demand service Movielink and chipmaker Intel signed a deal on Tuesday to promote the digital distribution of films to multiple devices in the home.
Movielink, a venture backed by five Hollywood film studios, lets people pay to download and watch feature-length films on a PC. Its partnership with Intel will give it more muscle in promoting the service, and it will give it a inside edge on emerging technologies designed to let people transfer films wirelessly from the PC to the TV.
Financial terms of the deal were not disclosed.
"We are committed to making digital entertainment part of the fabric of daily living, and Intel makes this possible by supporting today’s home networked environment," said Jim Ramo, chief executive of Movielink.
Broadband entertainment is becoming more and more popular with consumers. More than 20 million people in the United States connect to the Internet via broadband, and they're increasingly looking to the PC for entertainment. The PC screen is still widely seen as limited for watching movies, but companies like Movielink are exploring ways to allow people to point and click and then watch films on the TV.
Last year, Microsoft released Windows XP Media Center Edition 2004, a version of the operating system designed for entertainment PCs. The software makes it easier for people to rent movies from Movielink, or rival CinemaNow, download them to their PC and then watch them on their TV set.
As part of the Intel-Movielink deal, the companies will explore various content-protection technologies to be used in the wireless transfer of films from a home PC to a television set. They said that they will look for content protection that works seamlessly with digital media adapters (DMAs), or connectors that allow the transfer of data among various electronic devices.
Intel is developing a prototype of an Internet Protocol-enabled DMA. Movielink will support the Intel project with technical information, such as user scenarios.
Marketing plays a large role in the deal, too. Intel will sponsor and promote Movielink's college Web site, which gives college students lower rental rates for online films. In addition, the chipmaker will promote Movielink at major retail outlets that sell PCs based on the Intel Pentium 4 processor with HT Technology. The companies plan to advertise jointly in print and in online media.
Intel has been a sponsor of the AOL and Movielink "Winter Movie Special." The five-week program, which runs through Feb. 26, lets AOL for Broadband members download and rent movies for 99 cents. Movielink is backed by MGM, Paramount, Sony Pictures, Warner Bros. Pictures and Universal Studios.
Intel Confirms 64-Bit Technology For Xeon Chip
(By Mark Boslet
Of DOW JONES NEWSWIRES
SAN FRANCISCO (Dow Jones)--Intel Corp. (INTC) took a cue from rival Advanced Micro Devices Inc. (AMD) on Tuesday and said it would begin shipping 64-bit Xeon server chips beginning next quarter.
Craig Barrett, the Santa Clara, Calif., chip giant's chief excutive, made the announcement at a company-sponsored forum for microprocessor developers in San Francisco.
Barrett said the first Xeon with 64-bit technology will be the code-named Nocona chip design, expected in the second quarter.
Chips with 64-bit technology, or extensions, can provide greater performance by accessing more computer memory, a feature especially useful with large databases. Most desktop PCs use 32-bit chips.
Intel's second chip with 64-bit extensions will be the so-called Prescott Pentium 4 for servers and workstations and will be available at mid-year. Next year, the Potomac, which will have multiple chip cores on a single processor, will also have 64-bit extensions.
The new chips help Intel keep pace with AMD, which introduced 64-bit technology in its Athlon and Opteron chips last year. In also represents a significant reversal for a company that has created the processor designs that AMD then cloned.
"In the past, we've been the one who's been compatible," says Martin Seyer, an AMD vice president. "We're taking a leadership role here."
Intel now will have 64-bit extensions to its 32-bit Xeon chips to compete with AMD, but "I'm sure it must have been a hard thing for them to swallow," says Nathan Brookwood, an analyst at Insight 64.
Intel saw the attention AMD was getting as computer vendors such as International Business Machines Corp. (IBM) and Sun Microsystems Inc. (SUNW) began to use the Opteron chip and decided it had to act, Brookwood said. "This is definitely a man bites dog story."
The decision to use the 64-bit extensions also creates a delicate balancing act for the company. Intel has attempted to market 64-bit chips in recent years with its slow-selling Itanium line. Now it has the challenge of nurturing both chip families.
"What are we going to do with Itanium going forward?" Intel CEO Barrett asked rhetorically during a keynote address. He said the company would add new features such as multiple computing cores to a chip that should appeal to larger, high-end computing tasks than Xeon.
Intel hopes that Itanium will have double the performance of Xeon by 2007.
-By Mark Boslet, Dow Jones Newswires; 650-496-1366
Shareholder Class Action Filed Against Wave Systems Corporation by the Law Firm of Schiffrin & Barroway, LLP
2/11/2004 10:05:00 AM
BALA CYNWYD, Pa., Feb 11, 2004 /PRNewswire via COMTEX/ -- The following statement was issued today by the law firm of Schiffrin & Barroway, LLP:
Notice is hereby given that a class action lawsuit was filed in the United States District Court for the District of Massachusetts on behalf of all purchasers of the common stock of Wave Systems Corporation (WAVX) ("Wave Systems" or the "Company") from July 31, 2003 through December 18, 2003, inclusive (the "Class Period").
If you wish to discuss this action or have any questions concerning this notice or your rights or interests with respect to these matters, please contact Schiffrin & Barroway, LLP (Marc A. Topaz, Esq. or Stuart L. Berman, Esq.) toll free at 1-888-299-7706 or 1-610-667-7706, or via e-mail at info@sbclasslaw.com.
The complaint charges Wave Systems, Steven Sprague and Gerard T. Feeney with violations of Sections 10(b) and 20(a) of the Securities Exchange Act of 1934, and Rule 10b-5 promulgated thereunder. More specifically, the complaint alleges that throughout the Class Period, the defendants issued a series of material misrepresentations to the market concerning the Company's business agreements with Intel Corporation ("Intel") and IBM. In truth and in fact, however, unbeknownst to investors, the defendants' statements during the Class Period were materially false and misleading because they failed to disclose and/or misrepresented the following adverse facts, among others: (1) that Intel would not be entering into a revenue producing licensing agreement with the Company; (2) that the Intel contract did not require Intel to purchase any software; and (3) that IBM was not embedding Wave Systems' software into IBM computers; and (4) that the IBM transaction would provide no direct revenue to the Company.
On December 18, 2003, Wave Systems reported that the SEC had commenced a formal investigation into certain matters relating to Wave Systems. The SEC's investigative order, received by Wave Systems on December 17, 2003, related to certain public statements made by Wave Systems during and around August 2003, as well as certain trading in Wave Systems' securities during such time. News of this shocked the financial market. Shares of Wave Systems fell 17.13%, or $0.31 per share, to close at $1.50 per share on extremely high volume on December 19, 2003.
Plaintiff seeks to recover damages on behalf of class members and is represented by the law firm of Schiffrin & Barroway, which prosecutes class actions in both state and federal courts throughout the country. Schiffrin & Barroway is a driving force behind corporate governance reform, and has recovered in excess of a billion dollars on behalf of institutional and high net worth individual investors. For more information about Schiffrin & Barroway, or to sign up to participate in this action online, please visit http://www.sbclasslaw.com.
If you are a member of the class described above, you may, not later than 60 days from the date of the first-issued notice move the Court to serve as lead plaintiff of the class, if you so choose. In order to serve as lead plaintiff, however, you must meet certain legal requirements. You may retain Schiffrin & Barroway, LLP, or other counsel of your choice, to serve as your counsel in this action.
CONTACT: Schiffrin & Barroway, LLP
Marc A. Topaz, Esq.
Stuart L. Berman, Esq.
Three Bala Plaza East, Suite 400, Bala Cynwyd, PA 19004
1-888-299-7706 (toll free) or 1-610-667-7706
Or by e-mail at info@sbclasslaw.com
SOURCE Schiffrin & Barroway, LLP
Marc A. Topaz, Esq. or Stuart L. Berman, Esq., Schiffrin &
Barroway, LLP, +1-888-299-7706 or +1-610-667-7706, info@sbclasslaw.com
http://www.sbclasslaw.com
Copyright (C) 2004 PR Newswire. All rights reserved.
Barge..........
snipped from my post at RB last night......
I disappear before the holidays and all hell breaks lose in the last 2 weeks. I must say I gotta agree with you. I ain't moving to another board. I don't mind the dissenting opinion, I think it helps speed along the discourse. However, the name calling and other sniping is the same old crap for at least the last five years. I am beginning to think the move has more to do with the need for reassurance, and far to many people in way over their collective heads than escaping a few bashers. C'mon folks if your confidence level is where it really needs to be you don't need to be on the board every day. Wave will push on without your clock watching.
Piece of mind is a great thing.
Dave
HP to Present Live Audio Webcast of Dec. 9 Security Analyst Meeting
PALO ALTO, Calif.--(BUSINESS WIRE)--Dec. 3, 2003--HP (NYSE:HPQ - News)
What: HP (NYSE:HPQ - News) plans a live audio Webcast of its upcoming
Security Analyst Meeting.
Who: The audio Webcast will be hosted by Carly Fiorina, HP chairman
and chief executive officer, and will include presentations by
members of the HP executive team.
When: Tuesday, Dec. 9, 8 a.m.-12:30 p.m. EST/5 a.m.-9:30 a.m. PST
HP plans to post speakers' slides to the Web at approximately the same time the presentations take place.
A replay of the audio Webcast will be posted after 5 p.m. EST/2 p.m. PST on Dec. 10 and will be available for approximately two weeks.
The information contained herein is subject to change without notice. HP shall not be liable for technical or editorial errors or omissions contained herein.
--------------------------------------------------------------------------------
Contact:
HP
Brian Humphries, 650-857-3342
brian.j.humphries@hp.com
--------------------------------------------------------------------------------
Source: HP
Tampa I beg to differ. Everytime any single company event happens- and this has been going on for years-even you have to have read these- the speculation comes about revenues we "might"see announced. Or how much is the stock going to be worth in two months. Then the disappointment and outrage when these speculations, and I mind you, none of which originate from the company. Then the howling begins. This has been perpetrated here time and time again for years. And the reaction is always the same. Always. Why? Until there are revenues we've got nothing. Don't anybody take this as a personal affront, but to call my post wrong period is a bad call by you. I know you have been here a long time, longer than most. The fact remains that the traders have made money and the buy and holders have gotten killed for the most part, depending on your entry point. Nobody needs me to belabor this point. But truly, what else can explain the mentality of somebody that owns very many shares, well more than one can need, buying into the dropping in price every time? To support the price and company? Come on. It's wanting the big payday that everybody thinks is on the horizon. Everybody is here for that reason. The problem is that there are a lot of people that have gone overboard and sadly misjudged the arrival of this company by taking too much advice from some folks on this board.
I am here for the same reason everbody else is. I want this company to succeed in the wildest way. But if you step away and look at the track record as purely an investment anything other than where we are today is laughable. And this is no knock against the company, we are valued exactly as we should be. And in my opinion will be. There is no reason for this company to be above 2 or 3 dollars until we see a revenue stream, not product shipping in the marketplace, a revenue stream. This should still be treated as the highly speculative, high risk investment that it is and will be for the next few years. Anybody that thinks anything less is setting themselves up for a huge disappointment