Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Sorta OT----------Sheldon, Awk, Kite,....., -I'm nowhere near as technically savvy as y'all so any help appreciated. With respect to Diebold's Opteva they use Trusted Security Solution's A98 for remote rekey.
Would we play into this? I'm as convinced as ever about Wave's prospects but I'm also trying to find situations where our technology would be disruptive to the point of creating shorting opportunities in other companies Thanks in advance for any feedback. Best, Vickers2
http://www.trustedsecurity.com/remoterekey.htm
With the introduction of its new "Remote Re-Key Module", A98-R automates both the generation and distribution of cryptographic keys for ATMs. A98-R is compatible with ATMs that use RSA-enabled encrypting pin-pads (EPPs). The A98-R delivers random master keys in full compliance with ANSI standards and with network mandates for Triple-DES and unique keys per ATM.
The A98-R implements both Diebold's Certificate Based Protocol (CBP) and NCR's Signature Based Protocol (SBP) that are defined in the emerging ANS X9.24-2. Standard on Retail Cryptographic Key Management. The Diebold approach uses X.509 certificates and PKCS message formats to transport key data. NCR's method relies on digital signatures to ensure data integrity. Both processes require the ATM's EPP to be loaded at the factory with signed Public Keys or Certificates. In addition, an A98 public key must be signed by a Certificate Authority (i.e. Diebold or NCR) and imported back into the A98 during system intialization.
The remote re-key process requires the A98 to be authenticated by the ATM. In this step either the signed A98 public key or its certificate is sent from the A98 to the ATM. Once verified, the ATM will send its EPP public key to the A98. (In the case of Diebold, both an encryption and verification EPP public key is sent.) The A98 stores the EPP data and then generates a new DES key, encrypts it with the EPP's public key, prepares the required message format, and sends this new master key to the ATM. When the EPP responds that it successfully loaded the key, A98 sends a cryptogram of this new key to the host for loading into the terminal data base.
In the initial release of the A98 Remote Re-Key module, the interface to the ATM will be implemented through the terminal handler or device driver. Trusted Security Solutions has defined an XML data structure that will be used to communicate with the driver over a TCP/IP link. This approach confines modifications to the ATM device driver and eliminates any need to change the host security module or terminal driving application software. All the publice key cryptography, message formatting, database access, and user interface programming is provided in the A98 module.
By integrating the remote re-key module into the conventional A98 platform, Trusted Security Solutions continues to lead the industry by providing the most efficient, compliant, and cost-effective key establishment solution for all ATMs. The A98-R system not only fully automates key distribution for public key-enabled ATMs, but also continues to support single and triple-DES key loading for legacy ATMs.
Sheldon, I was trying to get a grip on that as well. This is old (from April)
http://download.microsoft.com/download/5/D/6/5D6EAF2B-7DDF-476B-93DC-7CF0072878E6/TPM.doc.
Microsoft Applications Using Longhorn TPM Services
The initial release of Longhorn will include three applications that take advantage of the TBS and the Microsoft TPM driver: Secure Startup, TPM Administration Tools, and the Key Storage Provider (KSP).
Secure Startup
Secure Startup is designed to utilize the TPM to protect the integrity of the Windows partition (and any other data, applications, DLLs, and files stored in that partition) and only release access to the protected data/partition after the veracity of the booting operating system has been established.
Secure Startup communicates with the TPM in the early phases of booting the operating system through a TCG-compliant BIOS and the TPM driver.
TPM Administration Tools
Microsoft is providing a Windows Management Instrumentation (WMI) interface that encapsulates the common TPM administration tasks. Using this interface, administrators can locally or remotely administer machines using provided scripts or develop custom scripts to suit the enterprise environment.
An important aspect of TPM administration is to enable the enterprise to opt-in to TPM technology in large deployments, yet give administrators the tools to control the exposure of personally identifying information (PII) with high granularity. Microsoft is providing a mechanism within Group Policy for administrators to curtail the use of TPM commands that might reveal privacy-related data about a user or workstation. The IT administrator will be able to disable certain PII-revealing commands or specify on a per-command basis which TPM operations are not allowed on workstations in a given organizational unit.
Key Storage Provider
The KSP is a plug-in for Microsoft’s Crypto Next-Generation (CNG) Key Storage Provider (KSP) Framework. The KSP is intended for applications that use the TPM to generate private keys and do basic encryption and signing. The KSP uses a single-level key hierarchy and stores keys in the application profile and user profile directories, to which access is appropriately controlled. Microsoft is evaluating methods through CNG extensions or system policy to turn on sealing to specific Platform Configuration Registers (PCRs) when using CNG to encrypt data. CNG strong key protection is supported by the TPM KSP, with the hash of the supplied password being used as the key usage authorization on the TPM key.
Implementing Applications that use Longhorn TPM Services
Software vendors who are developing new applications for TPM 1.2 in Longhorn can do either of the following:
• Write code using the Trusted Service Provider (TSP) layer of a v1.2-compliant TSS that has been built upon the TBS
• Access TPM functionality through the administration WMI interface or the KSP through the CNG interface....
Also appearing on Briefing dot com
http://finance.yahoo.com/mp#wavx
11:54AM Wave Systems and Atmel announce licensing of secure software for Trusted Computing Group v1.2 (WAVX) 1.13 -0.04:ATML and WAVX announce a licensing agreement providing secure software for the Atmel AT97SC32xx family of Trusted Platform Module ICs. The software package includes WAVX's Embassy Security Center and Trusted Computing Group-enabled Cryptographic Services Provider, as well as all necessary BIOS and Windows drivers.
Interesting Fall IDF presentation (By MSFT)
DGOS008
Session Title: Secure Startup: Hardware-enhanced Security (MSFT-taught class)
Session Abstract:
What you will learn from this session:
Microsoft Windows* "Longhorn" Secure Startup technology provides higher security through the use of a Trusted Platform Module (TPM).
• This session will discuss the OS use of TPM 1.2 to provide secure boot, full volume encryption, and TPM to improve platform security.
• The session will also detail the hardware and BIOS requirements for the Longhorn Secure Startup feature.
Track:
Your Digital Office - Intel Enables Real-Time Business
Target Audience:
Developers
Session Experience Level:
Intermediate - For Attendees With A Base Knowledge of the Topic
Technology Topics:
Desktop Platforms; Star Ts; Mobile Platforms; Manageability; Server Platforms; Security
Duration:
50
Room:
Rm 2006
Speakers:
Tom Quillin, intel; Steve Grobman, Intel
Is this old? From Dell-How do I re-activate my Trusted Platform Module (TPM) security feature after system board replacement?
Please forgive in advance as I just don't have much time to contribute and/or read the board frequently...
http://support.dell.com/support/topics/global.aspx/support/kb/en/document?dn=TT1092811
How do I re-activate my Trusted Platform Module (TPM) security feature after system board replacement?
Table Of Contents
A Broadcom Security Platform Personal Secure Drive error message appears if TPM is disabled in the System Setup (BIOS).
Enable the TPM Security Feature in the System Setup
Restore the encryption keys for the TPM Security Feature 1.2 on the Dell™ Optiplex™ GX520, GX620, and Precision Workstation 380.
A Broadcom Security Platform Personal Secure Drive error message appears if TPM is disabled in the System Setup (BIOS).
When the Trusted Platform Module (TPM) security feature software is installed but the TPM Security feature is disabled (set to Off) in the System Setup (BIOS), the following error messages may appear (Figures 1 and 2):
Figure 1 - Broadcom Security Platform Personal Secure Drive Error Message
Figure 2 - Broadcom Secure Foundation TPM Status Indication Error Message
The error messages may be seen when one of the following events has occurred:
The System Setup (BIOS) has been reset to factory defaults and the TPM Security option has defaulted to OFF.
A replacement system board has been installed and the TPM Security option in the System Setup has not been set to ON.
The TPM software is installed, but the integrated NIC is disabled, thus disabling the TPM security feature internal to the integrated NIC.
To remove the error message, enable the TPM Security Feature in the System Setup.
NOTE: For more information on TPM, refer to the Dell Knowledge Base Article:
"What is the Trusted Platform Module (TPM) security feature?"
Return to TOC
Enable the TPM Security Feature in the System Setup
To enable TPM security features in the System Setup (BIOS), perform the following steps:
Reboot the system.
When the message “Press <F2> to enter Setup” appears, press the <F2> key.
The System Setup screen will display.
Navigate to the Security group using the Down arrow key.
Press the <+> key to expand the group.
Verify that TPM Security is listed under Security.
Navigate to the TPM Security section using the Down arrow key.
Press the <Enter> key.
Press the Right Arrow key to change the setting to On.
The TPM is now enabled.
Press the <Esc> key.
Using the Down Arrow key, highlight Exit and press <Enter> key.
The system will reboot.
Return to TOC
Restore the encryption keys for the TPM Security Feature 1.2 on the Dell™ Optiplex™ GX520, GX620, and Precision Workstation 380.
Once the TPM Security Device 1.2 has been turned on in the System Setup, the user will be able to restore the keys previously used to encrypt. The Key Manager in the Embassy Security Center software is used to backup and restore credential data to or from other TPM 1.2 modules. This data consists of information regarding:
User-specific keys
User-specific certificates
NOTE: If the customer did not back up their keys held in the TPM Security Feature 1.2 from the previous system board, there will be no way to retrieve them or access the encrypted data.
To restore the user's keys using the Embassy Security Center Key Manager, perform the following steps:
Double-click the Embassy Security Center icon on the desktop.
Click the Key Manager.
Click the Restore button..
Browse for the folder where the archived file is saved.
Enter the key archive password.
The restore completes.
Return to TOC
Details
Document Number:
TT1092811
Release Date:
07/06/2005
Optimize for Printing
Feedback
This document...
helps resolve my question or problem.
does not apply for my question or problem.
is inaccurate for my question or problem.
Submit
Further Assistance
Home & Home Office Users - Need further help with your problem?
If this article did not solve your problem, click here to chat live with a product support agent.
Keywords for this Document:
Broadcom / PLATFORM / Security / TPM / Trusted
BACK TO: USA > Home & Home Office
The Home & Home Office site and offers contained herein valid only for end users and not for resellers and/or online auctions. Pricing, specifications, availability and terms of offers may change without notice. Taxes, fees and shipping and handling charges extra, and vary. U.S. Dell Home Systems Co. new purchases only. Limit of 5 systems per customer please. Dell cannot be responsible for pricing or other errors, and reserves the right to cancel orders arising from such errors.
Copyright 1999-2005 Dell Inc. For customers of the 50 United States and the District of Columbia only.
Site Terms / Terms and Conditions of Sale / Technical Support Policy / Privacy Policy / About Dell / Contact Us
Top
RWK, thanks. Missed the first one
I don't know Snackman. I read '06 but maybe it was changed and I've missed it. Thanks
I realize the exercise price has changed but I thought the warrants expire in '06...
On August 2, 2004, we sold 3,529,412 shares of Class A Common Stock for $0.85 per share, for which we received $2,777,897, after paying underwriter and other fees. In addition, a total of 3,529,412 shares were offered in connection with this sale and issuance of these shares, in the form of an additional investment right with an exercise price of $1.00 per share and warrants for 4,411,765 shares at exercise prices ranging from $1.15 to $1.30 per share. The additional investment right expired on November 2, 2004. The warrants are exercisable during the period January 30, 2005 through January 30, 2006, and if exercised, may yield approximately $5.0 million in proceeds, net of offering expenses.
Has the date been amended? Different warrants? TIA, vickers
Re: Warrant exercise. I know a lot of people will probably want to take exception to my opinion but I see no reason whatsoever for the warrants to be exercised. With a year to go on the warrant life I believe it most likely the owners hold until deeply in the money. If you think Wave is going belly up then you exercise and sell simultaneously but if you think the stock moves higher, considerably so as many here (myself included) believe then you let 'em run. Fwiw, Vickers
Another interesting PPT presentation from Bell Canada-
Identity & Access - The Cornerstone for Next Generation IP Services
enterprise.bell.ca/en/resources/ uploads/misc/Cornerstone.ppt
Trusted GPS (sorry if posted prev.)
The more one looks the more apps relying or partially relying on TPM's one finds--
Secure Tracking using Trusted GNSS Receivers and Galileo Authentication Services
...The concept behind this technology is to build a computer with trusted building blocks (TBB). In TBB, the core root of trust for measurement (CRTM) is the Basic Input/Output system (BIOS) of the computer. The CRTM uses the trusted platform module (TPM) for cryptography operations (storage of keys, encryption) in order to trust the system boot and verify the integrity of the subsequently executed applications. The whole “chain of trust” is based on public key infrastructure (PKI), RSA and 3DES algorithms....
We are currently involved in development of a next generation tracking device that will fulfill the security requirements of applications such as insurance tracking. The proposed tracking device will contain a trusted GNSS receiver, which will be developed by a consortium of research institutions and companies including Qascom in Europe...
http://64.233.161.104/search?q=cache:zLKH0-nXjAcJ:www.gmat.unsw.edu.au/wang/jgps/v3n12/v3n12p25.pdf+...
Ah Flyer, there's a word, Ubiquity. Such a nice ring:)
Barge, clarification, Opteva is their newest family of ATM's (7 models) originally intro'd in 2003. Obviously the newer ones have TPM's in them. The more digging into Diebold one does the more fascinating the possibilities become. They also manage ATM networks for anyone who'd prefer to outsource that function
Barge, more digging revealed that presentation to be for the new Diebold Opteva ATM. They're marketing an ATM with a TPM in it
http://www6.diebold.com/atmsecurity/
"Diebold has engineered security excellence into Opteva from the inside out. Not only have we integrated security into every hardware module, we've also secured the operating system and processor at the heart of the ATM."
Barge, thanks. That was my thought as well. When taken in light of the quote you provide from the May PR the Flash pres. suggests that things may be developing more rapidly than supposed on that front.
Shute, I know about the PR but I've been googling Diebold + TPM since and this is the first time I've seen this flash presentation with the bit about TPM's and secure transactions. I'm wondering if this presentation suggests that they are further along in the process than we all realize.
More from Diebold presentation...
"The motherboard also includes the new "Trusted Platform Module" chip. When implemented in the near future, strategic modules within the ATM, such as the cash dispenser, will be able to check the authenticity of the processor to reduce the potential of fraud from processor swapping, etc. Secure sessions between these devices ensures a protected exchange of transaction commands and information."
Is this new?? From a Diebold ATM flash presentation, note the 7th line down. Didn't realize they alreay had 'em with TPM's. Also if you click more it says "when implemented in the near future...."
http://www.diebold.com/atmsecurity/flash/diebold_10.swf
Norwegian Hacker Cracks Google Software
Wednesday June 29, 10:24 am ET
By Doug Mellgren, Associated Press Writer
Norwegian Hacker Hero Posts Crack for Google Software for Its New Video Viewer
http://biz.yahoo.com/ap/050629/norway_dvd_jon_google.html?.v=2
OSLO, Norway (AP) -- The Norwegian who became a hacker hero for developing software to unlock copy-protection codes on DVD movies said he needed only one day to crack Google Inc.'s new video viewer.
Jon Lech Johansen, also known as DVD Jon, posted software on his "So Sue Me" Web site that he says modifies the viewer so that it plays videos hosted on any server. The company's Google Video Viewer, in turn, was modified from the free VLC media player to restrict it to playing video hosted on Google's own servers......
Intel Completes 64-Bit Transition
http://biz.yahoo.com/bw/050627/275356.html?.v=1
Intel Completes 64-Bit Transition with Introduction of Intel(R) Celeron(R) D Processor for Value PCs
Monday June 27, 11:00 am ET
SANTA CLARA, Calif.--(BUSINESS WIRE)--June 27, 2005--With the introduction today of the Intel® Celeron® D processor 351, Intel Corporation now has Intel® Extended Memory 64 Technology (Intel EM64T), or 64-bit memory addressability, available throughout its entire desktop and server processor lines.
With appropriate 64-bit supporting hardware and software, PCs based on an Intel processor supporting Intel EM64T can enable the use of extended virtual and physical memory. For example, on digital media applications 64-bit desktop computing enables faster performance with its ability to process more in main memory, also referred to as RAM, due to less data caching to and from the hard drive. Also, Intel processors supporting Intel EM64T provide headroom for processing high-definition video by enabling improvements in both speed and quality of workflow with its ability to handle large amounts of data.
Support for Intel EM64T on the Intel Celeron D processor family is just one of several value-orientated features as Intel bolsters its value PC platform. The Intel Celeron D processor 351, when combined with an Intel® 915 or 910 Express chipset-based platform, delivers a balanced level of technology and value for desktop PCs while also expanding 64-bit support. With such features such as Intel® High Definition Audio supporting 7.1 surround sound and the Intel® Graphics Media Accelerator 900 (Intel GMA 900) for improved graphics capabilities, consumers can experience crisp pictures and theater-quality sound when doing such things as surfing the Web, playing basic games, doing e-mails, creating word-processing documents, tracking home finances and using education software.
Based on Intel's industry leading 90nm process technology, available in the LGA775 package, the Intel Celeron D processor 351 features a 256KB Level 2 cache, a 533 MHz system bus, a processor speed of 3.20 GHz, and support for the Execute Disable Bit.
Intel also announced that it is shipping the Intel Celeron D processors 346, 341, 336, 331 and 326 in the LGA775 package with support for Intel EM64T and the Execute Disable Bit. Intel communicated earlier this year it would be transitioning customers to the Intel Celeron D processor with Intel EM64T. By mid-2005, Intel had completed this transition.
Lastly, Intel announced the Intel Celeron D processor 350 today. The Intel Celeron D processor 350, available in the mPGA478 package, features a 256KB Level 2 cache, a 533 MHz system bus, supports Execute Disable Bit and has a processor speed of 3.20 GHz. This processor does not support Intel EM64T and is compatible with Intel 910 Express chipset-based platforms as well as Intel 845 and 865 chipset-based platforms.
The new Intel Celeron D processors 351 and 350, in addition to the new Intel Celeron D processors supporting Intel EM64T, are available now in prices that range from $73 to $127 for 1,000-unit quantities.
Intel, the world's largest chip maker, is also a leading manufacturer of computer, networking and communications products. Additional information about Intel is available at www.intel.com/pressroom.
Intel and Celeron are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
Intel® EM64T requires a computer system with a processor, chipset, BIOS, operating system, device drivers and applications enabled for Intel® EM64T. Processor will not operate (including 32-bit operation) without an Intel® EM64T-enabled BIOS. Performance will vary depending on your hardware and software configurations. See www.intel.com/info/em64t for more information including details on which processors support Intel® EM64T or consult with your system vendor for more information.
Performance and functionality of the Intel® 915 and 910 Express Chipset will vary depending on (i) the specific hardware and software you use and (ii) the feature enabling/system configuration by your system vendor.
Enabling Execute Disable Bit functionality requires a PC with a processor with Execute Disable Bit capability and a supporting operating system. Check with your PC manufacturer on whether your system delivers Execute Disable Bit functionality.
Good Intel News-
http://www.marketwatch.com/news/yhoo/story.asp?source=blq/yhoo&siteid=yhoo&dist=yhoo&gui...
SAN FRANCISCO (MarketWatch) -- Intel Corp., the world's largest chipmaker, lifted its second-quarter financial targets late Thursday because of strong demand for its chips used in laptop computers.
Intel lifts targets on strong demand for laptop chips
U.S. stocks end lower on new inflation concerns
Texas Instruments gains after boosting outlook
In its midquarter update, Intel said sales would be between $9.1 billion and $9.3 billion, compared with its prior forecast of $8.6 billion to $9.2 billion.
Analysts at Piper Jaffray said Friday that a shift to replace desktops with mobile computers, especially in the U.S., Europe and Japan, would work in Intel's favor as it heads into the seasonally stronger second half of 2005. Piper Jaffray reiterated an outperform rating and raised its target price on Intel shares to $32 from $30.
Preacherman, if you go to Seagate site you'll see that they use a logo that looks something like a wave. Different logo (not as kewl:)) from ours. Best, Vickers2
Re: insider buying..... But first, thanks all for the much appreciated notes on ASM.
I can already feel the arrows flying my way but I feel compelled to point out that with respect to insider buying they may be being misled. You can buy without worrying if you do it as part of a pre-planned, regular interval purchase plan. Thanks again VH, Knute, Awk & others!
best , vickers2
Microsoft Launches Online Video Service for Windows Mobile-Based Devices
http://biz.yahoo.com/prnews/050330/sfw047.html?.v=5
Wednesday March 30, 12:01 am ET
- MSN Video Downloads Delivers Food Network, FOX Sports, Children's Programming, News and More for Portable Media Centers and Select Smartphones and Pocket PCs
REDMOND, Wash., March 30 /PRNewswire-FirstCall/ -- Microsoft Corp. (Nasdaq: MSFT - News) today announced the launch of MSN® Video Downloads, which will provide daily television programming, including video content from MSNBC.com, Food Network, FOX Sports and IFILM Corp., for download to Windows Mobile(TM)-based devices such as Portable Media Centers and select Smartphones and Pocket PCs.
(Logo: http://www.newscom.com/cgi-bin/prnh/20000822/MSFTLOGO )
Since the launch of the Microsoft® Windows Mobile-based Portable Media Center last fall, more than 20 new content partners, including CinemaNow Inc., MLB.com, MSNBC.com, MSN Music, MTV Networks Music, Napster Inc., SnapStream Media Inc. and TiVo Inc., have agreed to make video available online specifically formatted for Windows Mobile-based multimedia devices.
"The launch of Portable Media Centers in 2004 began a new era of portable entertainment, and today's announcement solidifies the continued momentum we've seen for portable video," said John Pollard, director of Windows Mobile Applications and Services Marketing at Microsoft. "With content from some of the most recognized brands in entertainment, MSN Video Downloads helps bring this vision to life, allowing people to take their favorite television shows with them whether they are on the train, waiting for a doctor's appointment, or keeping the kids occupied in the back seat of the car."
"Readily available digital video content remains a key driver for the portable multimedia player market," said Josh Martin, associate research analyst at IDC. "The proliferation and growth of video service providers will serve to fill the existing video content void and increase adoption of portable multimedia players such as Windows Mobile-based devices."
MSN Video Downloads: Keeping People Informed and Entertained Anywhere
MSN Video Downloads is available in the United States today at http://www.msnvideodownloads.com . A one-year premium membership to the MSN Video Downloads service with access to all available videos is $19.95 (U.S.). In addition, people can access a limited amount of free content without a paid membership.
The MSN Video Downloads service is designed to keep people better entertained and informed, wherever and whenever they want. With great content provided daily, such as sports highlights, news headlines, children's programming, music videos, independent films and comedy shows, MSN Video Downloads is one of the first online video download services dedicated to portable entertainment. In its debut, the MSN Video Downloads service was previewed at the 2005 International Consumer Electronics Show in January.
People subscribing to the premium service will be able to select the content they want to receive from the Web site. Digital videos are downloaded daily to a Windows Media® Player 10 library, ready to be synchronized with Portable Media Centers and other devices. The video content is compliant with PlaysForSure(TM) devices that play video, and is optimized for Portable Media Centers and compatible with Smartphones and Pocket PCs that support Windows Media Player 10 Mobile.
New with the final launch of the service is the ability to select the specific content downloaded to the subscriber's Windows® XP-based PC each day. Subscribers can also activate a new automatic deleting feature that specifies how long video from the MSN Video Downloads directory will remain on their PC, thus avoiding a large backlog of clips.
Speaking of MSFT, some perspective from Gates..
(and a reminder of how much more Wave will be doing in the future)
http://yahoo.businessweek.com/technology/content/mar2005/tc20050322_7219.htm
The PC Era Is Just Beginning
Although critics claim the desktop is passé, its greatest potential and that of other computing devices is still ahead
Editor's note: In this column, the chairman and chief software architect of Microsoft (MSFT ) responds to "Requiem for the Corporate PC", the Jan. 19, 2005, Viewpoint by author Nicholas G. Carr
Back when IBM (IBM ) launched its first personal computer in 1981, business computing was a scarce resource. If a company was large enough even to afford computers, they were mostly so-called dumb terminals hooked up to large mainframe computers. Precious computing power was carefully rationed out for back-office tasks that needed a lot of number-crunching, such as accounting or inventory control.
Thanks to the PC, what once was a scarce and costly resource is now economical and ubiquitous. For a few hundred dollars per employee, companies can now empower their workers with raw processing power that would have been unfathomable just a few years ago. But the value companies get out of these investments isn't measured in megahertz -- it's measured by the quantum leaps in productivity, communication, and collaboration that PC technology has made possible. What we can do with the power and flexibility of the personal computer today is far from trivial, and we're still a long way from exhausting its potential.
MORE THAN A "COG." Personal computing today is a rich ecosystem encompassing massive PC-based data centers, notebook and Tablet PCs, handheld devices, and smart cell phones. It has expanded from the desktop and the data center to wherever people need it -- at their desks, in a meeting, on the road or even in the air.
Single-purpose applications like word processors and spreadsheets have evolved into rich collaborative tools that help teams share information and work together efficiently. Web services are enabling companies to unlock the knowledge of an organization, empowering individual workers to make more strategic decisions, and turning a company's most valuable asset into a strategic tool that drives competitive advantage.
The result is that the personal computer has become far more than a "cog" in the machine of corporate computing -- it's an essential tool for every individual in the organization. Take the personal out of computing, and most companies would grind to a halt.
OUT TO THE EDGE. From the perspective of an info-tech manager in the 1970s, many of the things people now routinely do with computers, such as writing a memo or creating slides for a presentation, might seem like a frivolous waste of valuable computer time. But the abundance of technology made possible by Moore's Law has forever changed this mentality, and companies are always finding new ways to get even greater value out of ever-increasing processing power, storage, and network bandwidth.
This abundance has enabled the software industry to create innovative new ways to leverage the power of computing at every scale. Centralized servers manage large amounts of information and make it available to a diverse array of devices, while the power and flexibility of connected PCs, mobile phones, and handheld devices give users a rich, powerful way to visualize, understand, and act on that information. The Web-services revolution blurs the distinction between information, applications, and services on PCs and mobile devices, on a company's intranet, or on the Internet -- offering customers seamless computing and communications wherever they are.
In technological terms, a lot of intelligence is moving to the edge of the network.
OPPORTUNITIES TO COME. This shift in how we organize our computing power brings with it new challenges. Managing a diverse ecosystem of connected servers, PCs, and mobile devices is a vastly different task than managing the relatively static and disconnected networks of the past, and software tools are evolving in turn to enable systems that increasingly manage themselves. The threats of cybercrime, viruses, and malware have sparked a new wave of innovation that's helping to make the computing ecosystem more secure. Each new advance in computing creates similar challenges, but the potential benefits far outweigh the effort it takes to solve them.
As processing power, network bandwidth, storage capacity, and advanced software continue to evolve at rates that meet or beat Moore's Law, there will be even more opportunities to empower workers and transform their productivity. In fact, I believe that computing will change our lives more in the next 10 years than it has in the past quarter-century -- and that the PC, in all its forms, will be the centerpiece of this new wave of innovation.
Doma, good find. Think it important to add, in light of a post or two saying "we're bundled" that the IdentiPHI Software Package is NOT bundled but merely an optional security package in which Wave's software is bundled. Still great news but don't want to give the morons over at you know where anymore to jump on.
JMHO
Go-kite, I was musing the same to myself. T
OT--Microsoft has after-sale Xbox revenue plan
, 03.10.05, 2:22 PM ET
http://www.forbes.com/technology/feeds/infoimaging/2005/03/10/infoimagingcomtex_2005_03_10_up_0000-1....
United Press International
SAN FRANCISCO, Mar 10, 2005 (United Press International via COMTEX) -- Microsoft says its next-generation Xbox video-game console will offer new ways for the company and game creators to make money from players.
The new console will offer an on-screen guide with a shopping marketplace in which players can buy new game levels, including weapons, cars or character outfits, Microsoft told a game developers' conference in San Francisco.
It said further it will set up a payment system so that even small-ticket items can be easily purchased, the Seattle Times said Thursday. Though there were few details mentioned, players may also have the ability to spend money on music.
Bringing in revenue long after games leave store shelves has long been a dream for developers. Until now, console gaming has mostly been a one-transaction business, in which there is little incentive or opportunity for players to buy anything after the initial game purchase.
Copyright 2005 by United Press International.
OT
SmartVideo Technologies Joins with Intel at CTIA to Showcase Mobile Video on Intel XScale Technology
Thursday March 10, 8:49 am ET
ATLANTA & SANTA CLARA, Calif.--(BUSINESS WIRE)--March 10, 2005--Intel Corporation (Nasdaq NM: INTC - News) has chosen SmartVideo Technologies Inc. (OTCBB: SMVD - News) to be a key presenter at Intel's exhibition stand (Booth 5831) at the 2005 CTIA convention, March 14-16 in New Orleans. SmartVideo, the world leader in delivering live and on-demand television to smartphones and PDAs, will demonstrate its news, entertainment and weather programming on Linux and Microsoft Windows Mobile devices based on Intel XScale® Technology with Intel® Wireless MMX(TM) Technology.
"With Intel XScale Technology, a whole new generation of revenue enhancing services can more easily be delivered to consumers, which increases ARPU," said Richard E. Bennett, Jr., president and CEO of SmartVideo. "As a service provider of advanced multimedia content, I'm confident that the value of Intel XScale Technology is widely recognized by handset producers, carriers, and the ultimate consumer. Intel has again demonstrated why they are the leader in performance and value."
"It's great seeing SmartVideo support streaming mobile video on both Linux and Microsoft Windows Mobile devices based on Intel XScale Technology," said Gary Forni, Director Software Enabling, Intel Cellular & Handheld Group. "SmartVideo's ability to easily stream their live TV service to different platforms clearly demonstrates their leadership in delivering advanced multimedia content."
Intel XScale Technology with Intel Wireless MMX Technology significantly expands the capabilities of mobile devices at a time when demand for more entertainment and information on the go is increasing dramatically: more than 50 million video-capable smartphones are in use currently around the world, with projections by the ARC Group market research firm that the number will grow four-fold in just the next three years. Poised to capitalize on increased smartphone consumer adoption, SmartVideo offers technology that enables fluid motion, fully synced live video and audio broadcasts, at an average of 15 frames per second, even on low bandwidth devices operating on today's existing 2.5g cellular networks, making it the only such service able to be called television in the true sense. On 3g and Wi-Fi networks, the video performance consistently exceeds 24 frames per second.
About Intel
Express News--Wavexpress Licenses TVTonic Direct-TM- Broadband Technology to Quadra Media LA for Spanish Language DVD-Quality Video Service to Spanish Speaking US Households
http://biz.yahoo.com/bw/050310/105064_1.html
Glimpse at new X-Box features shows growing interest in micro-transactions--
http://biz.yahoo.com/prnews/050309/sfw011a_1.html
Microsoft Reveals First Details of Next-Generation Xbox
....Micro-transactions. Breaking down barriers of small-ticket online commerce, micro-transactions will allow developers and the gaming community to charge as little as they like for content they create and publish on Marketplace. Imagine players slapping down $.99 to buy a one-of-a-kind, fully tricked-out racing car to be the envy of their buddies.....
I noticed same Doma. Sounds like the kind of guy I'd like to have working for me.
Looks like Craig Wehrhan may have left Wave to do missionary work in Costa Rica. (if it's the same person-but he was in Massachusetts)
http://www.fh.org/werhan
...Craig has 19 years of business experience, working in a variety of positions from computer programming to systems consulting to marketing. He holds degrees in Computer Information Systems and Accounting. In Costa Rica, Craig looks forward to applying his business skills as an advocate for Food for the Hungry and the poor. Craig is a soprano saxophonist and hopes to join a worship team in Costa Rica....
I can't keep up with all he great DD so this must have been posted but interesting nonetheless-- Intel Wireless Trusted Platform
http://www.intel.com/design/pca/applicationsprocessors/whitepapers/30086801.pdf
Thanks VH.
Notice now that not only are we making announcements but also now beginning to differentiate our products from any other potential offerings. PS wish someone over there would proof before releasing:)
"Wave's believes our ETS solution is differentiated in the trusted computing marketplace because its secure software is designed to be intuitive and easy to use, offers features such as strong authentication, data protection and VPN access based on stated customer requirements, has been demonstrated to be interoperable across all available platforms and security chip vendors, and offers server solution upgrades needed by enterprises and government users," said Steven Sprague, Wave's president and CEO.
Folks, with respect to Reg FD you might find the following site of interest. I used to be in IR and the link to the site below is the association site for investor relations professionals. This FAQ is referencing releasing "new" info during an earnings conference call. It would be the same for this "analyst forum" conference call since knowledge of the call was made "public" in a widely disseminated news release.
From their Reg FD FAQ's------
http://www.niri.org/irresource_pubs/faq.cfm#1g
Can I disclose new material information on the conference call?
Yes, if you've publicly announced that a call will take place, but it is strongly advisable (and required by the NYSE) that any new material information be included in your earnings press release or in a subsequent news release issued shortly after the call.
YaYa, we mourn your passing. You were always a gentleman and you shall be greatly missed. Save a place up there for the rest of us and know that our prayers and wishes are with your family. May God bless your wife and children.
Microsoft in Deal on Low-Cost Smartphones
from further down in article..Starkweather said the new phones will include cameras for both video and stills, a Windows media player that handles a broad range of formats and "seamless integration with Outlook (PC software) applications, calendar, e-mail, tasks, contacts -- all wirelessly."
The specifications can also be customized for clients' individual needs, he said -- including significant security improvements for the corporate market, such as the ability to erase the phone's memory by remote access.
"If someone was to lose that device they will be able to wipe all the data on it," Starkweather said.
ANNES, France (AP) -- Microsoft Corp. announced a partnership with Singapore-based Flextronics International Ltd. on Monday to market a new range of high-specification phones, running Windows Mobile, to handset makers and network operators worldwide.
The deal between the world's No.1 software company and the largest contract manufacturer of handsets comes as companies like Motorola Inc. and Samsung Electronics Ltd. are pushing to improve profits on high-tech 'smartphones' and wireless services.
Microsoft and Flextronics said the new "Peabody" phone platform -- a blueprint from which any number of new models can be designed to order -- would cut costs and production time.
"That's the significance of this partnership -- extremely high-volume, low-cost devices that don't have any concessions in terms of functionality,"
said John Starkweather, product manager at Microsoft's mobile devices division.
He declined to give any figure for the expected cost reductions.
The announcement came on the first day of the 3GSM World Congress, an annual mobile industry gathering in Cannes, in southern France.
Microsoft's Windows Mobile operating system for phones is battling for market share against rivals Palm OS and Symbian, which is the clear leader in Europe.
Starkweather said the new phones will include cameras for both video and stills, a Windows media player that handles a broad range of formats and "seamless integration with Outlook (PC software) applications, calendar, e-mail, tasks, contacts -- all wirelessly."
The specifications can also be customized for clients' individual needs, he said -- including significant security improvements for the corporate market, such as the ability to erase the phone's memory by remote access.
"If someone was to lose that device they will be able to wipe all the data on it," Starkweather said.
The Peabody platform runs on GSM networks -- the dominant standard in Europe and much of the world -- and slightly faster GPRS. Flextronics also said it is working on a new range of devices based on the next generation of Windows Mobile software to run on EDGE, the prevalent third-generation or "3G" standard in North America.
Redmond, Wash.-based Microsoft also unveiled a new software package designed to smooth wireless service delivery, overcoming interoperability problems between different network operators, service providers and handset types.
The U.S. software giant said the new "Connected Services Framework" will be launched by three mobile operators: Bell Canada, Celcom Malaysia and Britain's BT.
Ticker always crosses the tape on trades. You just have to be watching when it does. Hope that helps