Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Downandoutman - You are Upandcomingman - Theee Man!
Atmel is IBM' TPM supplier, correct?
So big blue is now on board? If so, CHA-CHING and KABOOM
Microsoft to step up pace of acquisitions, WSJ B4, 7/29/2005
"expects to acquire companies in the $300 to $500million and may buy some in the $1 to $2billion range" according to Steve Balmer at MSFT's annual meeting with financial analysts.
"We have dialed up the pace of acquisitions, Mr. Balmer said."
STMicro in competition with Infineon to be Europe's number 1 chip manufacturer. This could hinder our position with Infineon if they want to differentiate themselves from STM, however, if Waves software proves stronger and in demand Infineon may copy STM and invite Wave on board.
STMicro's main cellular customer is Nokia. Foot in the door to this market when the TPM cellular specs come out later this yesr.
STM TCG member
Nokia TCG member
STMicro earnings down 82% Q2. Ouch! Thus they are looking to diversify their product base. TPM 1.2 may help.
Per WSJ 7/28/2005, Section B
Afterhours - Up $.03 or 2.61% to $1.18
http://finance.yahoo.com/q/ecn?s=WAVX
Dory/Ramsey: HP
I also wonder what HP may have up there sleeve as they are proud to tout HP Security Manager is HP's IP. That may be ok if they had $$purchased the right to say that from Wave as developer for HPs ProtectTools. Wave has some real estate at HP but not on select models and at the checkout counter like Dell, or with mb for white boxes like Intel, or with TPM like STM unless STM supplies them to HPs mb vendor).
I also know HP is slow. A Wave sales rep also expressed his frustration with HP when I told him I ordered several HP DC5000s thinking they had TPMs per HPs "product specialist" (which it took several phone transfers to contact) but pcs did not have TPMs. This was less than 1 year ago and the "product specialist" had really only just heard the terms TPM and ProtectTools but had no understanding. I'm glad to see that has changed and hope HP employees learn TC by inhouse training and not from sitting on their couch watching tv ads.
By the way has HP mentioned anything about trusted printers, faxes, scanners?
Ootommy: They need either TPM 1.2 enabled card readers or revive the Embassy Chip and Finread reader.
Seriously, once deployment and acceptance in the banking industry TPM devices will be there at the edge/remote (card readers, ATMs, cell phones, routers, vpn hardware) in addition to internal pcs and servers.
OT BerthaB:
Too funny. Some consulation (maybe) to Helpfulbacteria, the old saying, "beauty is in the eye of the beholder".
Dory:
Too hard to find for my taste from the link in HP's WSJ ad today. However, for the moment DELL, INTEL, SEAGATE, MSFT (Media Center TVtonic) are a Sweeeet start. I have hopes HP, IBM, MSFT Vista, Redhat Linux come on board in a direct fashion like Dell and IBM in the near future.
Thank you.
1stnflight
NASA TV via the Internet
NASA would be a gorilla for Wave ETS and WaveExpress TVtonic. Manage TPMs for NASA LAN/WAN with secure access, communications, etc. for employees on earth and astronauts is space coupled with DVD quality coverage of missions and recoreded highlights. Lee can't be too far from Cambridge where Akamai is located. They and Yahoo have "streaming" rights to NASA TV. The streaming looks good. 22 minutes until launch.
For the STS-114 mission, NASA has signed partnership agreements with Akamai and Yahoo! to provide webcasting of NASA Television well beyond the agency's normal capacity. Yahoo! Inc., of Sunnyvale, Calif., will provide live streaming of NASA TV mission coverage in Windows Media format and be the only other official online host of NASA TV footage beyond the NASA website. Akamai, of Cambridge, Mass., will stream NASA TV for RealPlayer and deliver all other Web content during the mission.
With a 12-day mission that includes three spacewalks, NASA expects to deliver more data to users than it has for anything but the Mars Exploration Rovers, which are still going strong after 18 months on the mysterious red planet.
HP ProtectTools, full page A16, today's WSJ
HP nc6110 notebook
"Easy Access for you a dead end for anyone else."
"Help potect your sensitive business data at many levels with HP Protecttools, built-in software and hardware working together.
"No matter who tries to be you, your notebook is made for the real you. That's data security every road warrior will love."
No mention of ETS. However, it is positive confirmation of trusted computing's momentum. It could to lead purchases of ETS, however, when go to the ads link, hp.com/go/secure2, I did not find Wave ETS after several click thru links. HP Security Manager description says it "is HP IP". This still has Infineon written all over it although has similar features to both Wave's ETS and IBM's ESS.
I can see why SKS has stubbornly wanted to ride the coattails of the oems. They have the marketing $$$ and brand name. We have TC expertise. A win-win for both parties especially if Wave can get real estate on their web sites and ads.
Can find a decription of Protectools at the following pdf link: http://www.hp.com/sbso/security/hp_protecttools_lo.pdf
(Dell half page ad on A19. Still no TPM models.)
xpoint
You wrote PIM single sign on ids and passwords will be stored outside the TPM in "protected storage". So stored by the software on the hard drive. Would'nt that leave us where we have been for years with hackable software/hard drive storage even if a decent level of encyption. The info I have read leads me to think the ids and pw, or at a minimum the keys, are stored in the TPM.
Thank you in advance for your clarification.
Orda: FDIC
There was a post earlier today (tried to find but my eye are a blur this late in the day) from a Midwestern Wavoid who said he works in the same building as an FDIC office. He asked if they had heard of Wave and they said they had even though they were not techies and that their DC office is working with Wave. Also I'm sure you have seen the prominent FDIC study link on Wave's home page.
Also per you posted article, Bank of America Corp. and Wachovia Corp were noted by the FDIC as having exposed customer data. Those two banks have been involved in numerous acquisitions and mergers the past decades and have shamelessly grown careless with our private data many of us have entrusted in them.
They are headquarted in Charlotte, NC, considered by many as the banking center of the US. I met a Wave saleperson at a stop of the Microsoft Security Summit last year, in Charlotte, and learned he lives in NC. Also IBM has a large presence as does Redhat (headquarters)(Linux) in Research Triangle Park, NC. (The Summit was a big disappointment as only 20% or so of vendors listed were present, although on a positive note Wave brochures were in the mktg. propaganda goody bag freebies distributed.)
Although as much as he probably travels outside NC to trade shows he could live anywhere I wonder if being located so close to the NC companies above is a coincidence.
Orda: Yes it does.
How far is Cambridge, MA from Lee, MA? Surely you have emailed to Peter or Michael Sprague.
Do we have rights to any royalties other than formal licensing agreements, such as patent on content metering, content pay per view ransactions, etc. (from Embassy chip days) or is Wave confident enough to allow the open markets and competition pick the strongest brand?
promoting movies with full-screen, near-DVD-quality video viewed straight off a viewer's hard drive.
The tools created by Maven, a 3-year-old Cambridge, Mass., company, turn the online experience into something akin to a constantly updated DVD. Once a viewer downloads a piece of software to a computer, high-quality video and other content trickles down in the background, allowing viewing of trailers, movie clips and other features within minutes.
The software runs continuously in the background unless shut down, taking up about as much memory as a Web browser when the movie player is not open, or double that much if the movie trailers are being watched.
Producers are also testing the waters as to what it will take to build a major retail presence down the road," Ozguc said. "All the functionality for billing and content management is there. It gives (the studios) a way to flip the switch from promotion to sales overnight."
Upcoming Trade Shows for the TCG
https://www.trustedcomputinggroup.org/events
Intel Developer Forum 8/23/2005 San Fran.
Embedded Systems Conference 9/12/2005 Boston
CTIA Wireless, I.T., and Entertainment 9/27/2005 San Fran.
Wave not listed as exhibitor and not on Waves web site.
However, Wave has been a regular at IDF for years, and could be in stealth announcing IDF and demo partners until Vista beta is out, 8/3/2005, or some PR or Q2 is released. Atmel, Nokia, Seagate, NTRU will be speaking at ESS on TPMs, some Wave allies there.
Wave if not a individual exhibitor will certainly be at a partner or TCG member or the TCG's booth at these.
kantbleveit: TPM set up for more than 1 user:
Setting up a pc for more than 1 user for home or corporate use ought to be part of ETS or ESC if it is not. XP already allocates some different space on the harddrive for each user of a pc however whether or not it can be viewed by the other users depends on the how it is set up by the Admin. So the os software does some of this. However, with the TPM we are stiving to move away from software only protection because it is easily hacked.
The TPM should be able to be uniquely set up for each user of a pc to store their own banking, lan, vpn, ecommerce, documents, emails, in protected space with keys unique to that user unless more than one user needs rights or access to them. This will happen at home, or work.
Is there a ETS user on this board that knows the answer?
Thank you.
PS: IMO there are no dumb questions on this board. Some, GOFIGURE, act like they know it all, but in reality this is a complex, evolving technology that unless you are on the spec committee at the TCG, or in R&D at one of their members it is too much for one Ihub poster to totally grasp all details. This is why Wave needs to prove they have 1st mover advantage SKS mentions so often, then evolve their business strategy as trusted computing deploys. The end result may look nothing like ETS and TPMs today. Not all companies in it early on will survive the wild west growth the IDC is predicting.
SL: Single Sign On
So the human elelment is still present with TPMs. That is, an individual better not write down there PIN or USER id and password unless they puts it in Fort Knox, or a safe deposit box. However, with bank data breaches today I would not trust a sdb.
This is where biometrics is best. I saw a cool new take on it in yesterdays WJS, about a Asian company that has developed vascular scanning where the unique vein structure in your hand is scanned by a reader at ATMs and matched to the scan in the smart chip of your ATM card to gain access to the ATM and you account. Hope Diebold saw it.
The limitation on biometrics is, as seen on 24, and other tv/movies, a hard core criminal will cut you fingers or hand off to become you, or your eyeball, depending on the biometric scan required for access.
Thank you,
1st
TPM Case study
True or False - Biometric, PIN, Password multifactor boot and screensaver authentication is a necessity for TPMs to protect the pc/data owner.
See the following scenario:
Assume I just purchased a TPM equipped pc then load Wave ETS 4.3/5.0. Therefore, I have enabled and taken ownership of the TPM. I set up all my banking, ecommerce, corporate LAN/VPN user ids and passwords with Personal Information Manager for seamless sign on by them stored in the TPM's non volatile memory.
An associates pc bombs so he comes to use mine while I am away from my desk. He has lesser corporate data privileges than me and certainly none to my bank accounts. He boots my pc and PIM/TPM automatically sign him on locally to the pc and to the corporate LAN as me permitting hin to access data he should not be. He then opens IE and sees I recently browsed Bank of America and TD Waterhouse so he goes there and is automatically signed in as me viewing and stealing my life savings. It could be the janitor, or the thief that stole my laptop in a airport or mall. He will be fired, jailed, IF CAUGHT.
What prevents others from assuming a TPM device owners identity? Is is the same Win XP/2000 local pc or network domain user id and passwords as today except the are saved in the TPM?
Certainly Wave ETS ot the pc owner will not allow a TPM enabled pc to automatically log on to local pc.
Gofigure: Gaining traction. It was only recently a search of dell.com would yield nothing with keywords tpm, Wave, Wave Systems. It is easier to find Wave than ever since the Feb announcement of Dell Edition 1.0. TPM and Wave are indexed at Dell and gaining momentum, through curiosity and necessity from Dell and customers.
Dell direct mailing to SMB-no TPM/Wave, mail to gov't/enterprise-TPM/Wave???, Dell.com checkout-yes Wave
While Wave and TPMs are not mentioned in recent Dell direct mailings and major newspaper ads targeted to small and medium businesses, even one I received today targeting members of an association I belong to and featuring a total security solution with the Latitude D610 and Optiplex G520, if you go to purchase one of them upon checkout most of you know you will see Wave ETS as an option for a nominal $19.99. Thats ok, and as TPM deployment, demand, acceptance increases we will not be at the checkout counter we should become standard OEM installed software or even retail boxes (higher margin for Wave) for user who did not know that had a TPM until they were forced to look due to new ecommerce, LAN, etc policies that are sure to come.
When you call a dell sales person do they ask you if you want ETS with your TPM, a frosty with your burger and fries, butter on your popcorn?? Anyone tried?
Are any posters a government or larger enterprise employee that has received Dell mail targeted to them? If so, any mention of TPM 1.2 and Wave ETS?
Dell.com - Search and enjoy
Search for TPM 1.2 - enjoy
Search for Wave - nice
Search for "Wave Systems" = KABOOM!
Opposition to Trusted Computing and the next Internet
Mine: Funny read from an author weary of big brother gov't and MSFT. This author thinks trusted computing will stop open source development as all users must be TPM identified with their devices 2048 bit RSA certificate as paid up Microsoft OS users to get thru routers, etc. Funny, since I saw a post today and others recently about IBM working on TPM soluitons for Linux, open source. His website merits further browsing.
http://www.goingware.com/tips/future-internet.html
I Don't Know What This New Internet Will Look Like
... but I am as confident as I am that the Sun will rise tomorrow that it will be safe from terrorists. After all, we have the children to think about.
Michael D. Crawford
GoingWare Inc.
crawford@goingware.com
July 12, 2005
Copyright © 2005 Michael David Crawford.
This work is licensed under a Creative Commons Attribution-NoDerivs 2.5 License.
It seems that David Clark, who led the development of the Internet way back in the '70's - did you know there even was a '70's? - wants to create a whole new Internet that will fix many of the problems the current Internet is plagued with. The New Internet's engineers will be much more careful this time around to make sure it works better than the first one did.
I'm afraid, though, that the engineers are not the only ones who will be deciding how our New Internet will work.
If one is able to find any privacy or anonymity in this New Internet, it will be because of some undiscovered security hole, which will be quickly repaired, rather than any kind of conscious design decision. Probably one reason they are accepting proposals before rolling it out is to avoid the sort of accidental security holes that enable pr0n, peer-to-peer filesharing and left-wing political activism.
Microsoft, a leading contributor both to this nation's technology base and to the campaign coffers of its leaders, will embrace this new technology and extend it in such a way that the development and dissemination of Open Source software will be, if not mathematically and physically impossible, at least as intractible as factoring a 2048-bit public key.
Imagine, if you will, Trusted Computing implemented at the router level, in such a way that any packets that go farther than one hop are certified not only to support protocols whose patent licenses are fully paid-up and on file with the legal department in Redmond, but whose content is compliant with the Windows standard. The faintest whisp of a Public License, GNU or otherwise, will result in the dropping not only of the individual packet, not only in the cancellation of the entire file transmission, but, within microseconds, the reporting of the physical location of the offending server to responsible law enforcement personnel. The identities of its rogue administrators will be fetched instantly from the database maintained by the Department of Homeland Security. (You will have to submit fingerprints and DNA samples to obtain a Windows server license, as after all, Internet servers can be used to disseminate explosives recipes or the formulas for nerve gases.) The supercomputers that constantly monitor the cameras mounted on every lampost in the United States of ( God Bless It!) America will be ordered to recognize the criminals' faces, and when they are spotted trying to flee to the Amazon jungle, orbiting lasers will vaporize their bodies, leaving nary but a whisp of smoke.
When a close family friend tries to comfort one of the grieving mothers for the loss of her son, she will desperately proclaim "No, I have no children! You must have mistaken me for someone else. Please leave me alone!" as she scurries rapidly away.
National firewalls such as those employed by The People's Republic of China are expensive and difficult to maintain. They are notoriously leaky, and easy to circumvent by anyone determined enough to find out how. But worse, they impede the economic potential of emerging economies such as China, which necessarily bottleneck technical data and eCommerce in order to have a single chokepoint for their Four Horsemen of the Infocalypse (Taiwan, Tibet, Dissidents and Pornography).
Imagine, if you will, the potential of our New Internet: not only by technical design, but by international treaty (enforced by the threat of military intervention on the part of the UN Security Council), each nation will have a national firewall which is as transparent to the air to fully-licensed Windows Media Video files of Barney the Dinosaur and paid-up Wal-Mart orders, yet absolutely impenetrable to content not sanctioned by Homeland Security, the Republican Party, the 700 Club and the Boy Scouts.
I, for one, am weary of our present Internet, cesspool that it is of moral depravity and copyright infringement. I long for the days of yore, when men were men, women wore hoopskirts, and racial minorities were separate but equal. And so, I raise my right hand and shout with an enthusiastic "Heil!":
I welcome my new Internet overlords!
Call GoingWare: +1 (831) 401-3790, info@goingware.com
Net Pioneer Wants New Internet
See my bold below. TPMs would help with problems he points out on the 30 year old Internet.
http://www.wired.com/news/infostructure/0,1377,68004,00.html?tw=wn_6techhead
By Mark Baard / Also by this reporter
02:00 AM Jun. 29, 2005 PT
One of the fathers of the internet wants to be a daddy again.
David Clark, who led the development of the internet in the 1970s, is working with the National Science Foundation on a plan for a whole new infrastructure to replace today's global network.
The NSF aims to put out a request for proposals in the fall for plans and designs that could lead to what Clark called a "clean slate" internet architecture. Those designs, Clark said, could be tested on the National LambdaRail, the nationwide optical network that researchers are using to experiment with new networking technologies and applications.
Two NSF program directors in the agency's Networking Technology and Systems program refused to speak on the record about the $200,000 grant the agency gave Clark to explore his "clean slate" internet idea. Nor would they comment on a broader initiative taking shape at the NSF, of which Clark said his research is a component.
But Clark hinted that the agency is poised to take a leading role in developing new internet technologies.
"There are (program directors) at the NSF who are willing to rally the academic community," said Clark. "They are saying, 'Let's break some eggs.'"
Clark, who served as chief protocol architect for the government's internet development initiative in the 1980s, wants researchers to re-imagine the infrastructure that connects computer users around the world.
The problem with today's internet, according to Clark, is that its 30-year-old design, which allowed for the development of exciting new applications (the world wide web, e-commerce, file sharing, you name it), is now stifling further growth.
A new architecture could allow for ubiquitous embedded wireless communications devices and sensors. It could also provide for more secure and convenient forms of commerce. A super-high-speed internet could even allow people a world apart to collaborate inside elaborate 3-D virtual arenas, a process called tele-immersion.
As for today's internet, new applications and protocols meant to address security issues and wireless and ubiquitous devices may not be enough to solve its underlying problems.
"Systems rigidify over time," said Clark. "Each of those incremental changes has interactions with the others. And each is harder to add than the last one. After a while, the effort-to-success ratio (becomes untenable)."
Another internet founding father, however, questioned whether the academic community really needs to start talking about building a new internet from scratch.
"Anything you can do all at once, you could do with incremental changes," said Robert Kahn, who helped design the architecture for Arpanet, the precursor to the internet. (Kahn is now president of the Corporation for National Research Initiatives.)
Even Clark agrees with those who say the internet currently serves most of its users quite well. But he said applications and technologies introduced incrementally to the existing system, such as those springing from engineering working groups and the Internet2 research consortium, cannot solve the internet's fundamental architectural problems.
"The idea then was to build a cost-effective network 10 times faster than what we had at the time," said Clark. "But Internet2 is not architecturally different than the internet.”
Clark, a senior research scientist at MIT, said he will use his NSF grant to talk with other researchers this summer who could potentially submit proposals for new internet designs.
Clark, in the abstract that got him the grant, asks the question, "Can the research community devise a fresh, new design for an internet -- a design that takes into account both the wisdom in the original design and what has been learned since, a design that takes into account the requirements the network now faces and those we can predict in the future -- and demonstrate a network with sufficient appeal and merit that we might persuade the world to move to it?"
Clark said he would like to see two things addressed in any replacement for the current internet. The first is a coherent security architecture. The second is a healthy economic infrastructure for network service providers, who will need a bigger piece of the pie in the new internet than the one they are getting now if they are going to help pay for building it.
Clark is arranging a workshop this summer to bring together network architects and computer security specialists. He said he wants to encourage security specialists to think more about architecture, rather than simply their next anti-virus software upgrade.
"Look at phishing and spam, and zombies, and all this crap," said Clark. "Show me how six incremental changes are going to make them go away."
Ramsey: Agreed. Waveexpresses TVTonic is with XP Media Center and as its demand increases and convergence among home entertainment sources (TVs, pcs, broadband Internet content delivery, cable TV content delivery, traditional TV delivery, PDAS, cell phones, Xbox, TIVO) accelerates along with TPM deployment TVtonic will have a increasingly interesting product.
BerthaB see post 87714.
VH: SKS authored advertisement/infomercial comnews.com article has a link, www.rsleads.com/507cn-258, which goes to the wrong Wave Systems.
Go to www.comnews.com, page down to Opinion, Guest Column, Click on more. Article with photo of SKS. Bottom of article has bad link.
The bad link is also at rednova.com when click printer friendly to print. Although just looked again and has been corrected at rednova.
Emailed webmaster @ comnews.com and jcallahan@wavesys.com to correct.
The last thing Wave needs is to play hard to get/find.
Ramsey: Accrual accounting for revenue
Deferred revenues = Cash from STM or customer in bank plus Wave still owing the customer a service or product. Meaning Wave has not earned the cash/revenue. Revenue is booked in a future period(s) when it is earned.
Accrued Revenues - Wave has received the cash (terms Cash due upon receipt/shipment), or has not received cash and gives customer open credit terms of say Net 30 days. An Accounts Receivable is set up and revenue booked in same period because Wave has fullfilled its obligation (provided or shipped the service/product) thus has earned the revenue.
Like Eamonshute, I feel it is likely Wave is in the accrued revenue scenario thus what is shipped in Q2 is booked in Q2. This will not be true if Waves has not fullfilled its obligation in Q2. Payment is different and is independent of when the revenue is booked.
Without seeing the contract and or purchase orders with/from STM we are only guessing when revenues are earned then booked, and terms for payment.
Ramsey: STM Q2 Deferred revenues?
Why would they be deferred? Deferred means Wave received the cash and has not fullfilled an obligation to STM. Like if STM was prepaying Wave for a future service like you would to a publisher for a subscription. In that case some revenue would be recognized periodically over the service/subscription period.
If Wave has fullfilled it services/obligation, in this case providing a master cd and right to ship Waves ESC/CSP with STM TPM 1.2, revenue should be booked in Q2 or the actual date STM TPM 1.2 with Wave ships. As far as cash I do not know the payment terms so it may not be on the Balance Sheet @ Q2E 6/30/05.
Have the terms with STM been disclosed?
TVtonic: If we have any attendees of a function featuring Trippi on the speaking circuit they will get an update and share with us if JT is not able to. Agreed it would be helpful considering he was a customer of Wave giving global exposure to TVtonic.
I recently demo'd an XP Media Center pc and like the concept. TVtonic is on one of the main pages. XP has a remote control and was user friendly organizing content music, photos, etc., and recording live tv while watching it. The retailer said sales have been slow as users are concerned about replacing their tv, dvd player, sc player with a "pc" that can crash and be compromised far quicker and easier than the appliances it seeks to replace. I watched cable channels like CNN, listen to local radio, via tv card and radio and satellite antenna cards/connections. He said there is some quirk with changing channels with satellite, I think still need set top box or usable interface to it.
OT: Joe Trippi, Former Howard Dean Campaign Chairman to speak at Progressive Democrats Conference in August. From an brief note in the business section of a local newspaper. I must render a no comment regarding, "Progressive Democrats".
For newer Wavoids, Trippi, is a former koolaid Raging Bull user and is responsible for launching WaveExpresses TVTonic coverage of the Howard Dean Presidential Campaign. Hope he is on a winning campaign in the future so he can become a DC area regular and lobby Congress to mandate TPM usage in various industries, Financial, Healthcare (HIPPA), Homeland Security, Ecommerce, Entertainment, etc.
Racer: WSJ,7/18,Sec R, TCG Marketing team where are you?
What happenned to problem-solution research at WSJ? Not taught in journalism school. No mention of tne new deploying hardware technology is puzzling.
Earth to TCG, Dell, IBM, Intel, Dell. The consumer market, individuals, need trusted computing today and will embrace it. Why wait to roll out to non-enterprise users? IBM laptop ad by CDW without mention of ESS. Evidently not the target audience. Still looking to enterprise IT trade journals, shows, direct contacts.
Anybody seen any prominent ad campaigns by TCG, Dell, Intel, HP, metioning Wave other than HP ProtecTools CNN ads (HP no Wave mention)?
okpnv: A1 is where the hook/reminder is in Today's WSJ for Monday's report feature.
Easy. I'll settle for mention of TPM/TCG to increase momentum, even absent Wave. It all helps WAVX in the long run.
Read the WSJ Monday, 7/18/05.
Coming Monday in the Journal Report: Technology
THE LATEST IN INFORMATION SECURITY.
(Per todays WSJ on bottom of front page A1.)
I hope it explains and recommends TPMs and the TCG to their influential subscriber base. Furthermore, a mention of Wave and products, interview of SKS, Brian Berger, would be more than welcome.
A new Dell ad featuring Latitudes with TPMs and Wave software alternative would be timely.
Snackman: NEC Trusted Computing Document
Mention of NEC's Capssuite, Serverw@ll, and Infocage software to for intranet, server, and data platform authentication in NEC trusted pcs, and likely available in future for other brand trusted pcs, is interesting since they may compete with Wave ETS, ACM and KTM services and software.
Although no mention of Wave I recall back in the FINREAD, EMBASSY days Wave had a relationship with a NEC Packard Bell trusted pc or SCR launched in Europe. Is Wave involved but in stealth mode on this for NDA purposes, only the future will tell.
All in all whether competition or a complimentary product to Wave's once again we see confirmation and validation of trusted computing deployment, acceptance, and momentum.
VH: NEC TPM Notebook PCs
I do not see the Versa C250, M550, or P750 available 7/13/05 in NEC.com. Has anyone else spotted them?
Anyway, I will keep my eyes open and I like the confirmation of TPM, TCG acceptance and deployment.
Accuracy, Payment Terms of Wave bundling revenues
Since not all OEMs are going to release their quantity shipments to the press like STM, and if they do the numbers will likely be rough numbers, not exact ones, the following questions come to mind.
What is the common practice to notify software publishers like Wave of bundling usage for billing purposes. Take STM TPM shipments, is Wave notified by STM warehouse via EDI daily at time of shipment, or is there a software download/CD request made by the MB manufacturer upon TPM receipt. With Intel I assume Wave gives them master cds and each MB they make a copy to bundle with they notify Wave.
What controls are in place to verify accuracy of what is reported to Wave by STM, Intel, Dell?
What are the payment terms? Cash, Due upon receipt, Net 10, Net 30, prepaid/deposit in which case there would be deferred revenue liability (no revenue) in advance of STM, Intel, Dell shipments that would be reduced and booked as revenue once STM, etc. make shipments.
Correction - IBM ad on back of Section A
Dell ads in Wall Street Journal
Daily 3/4 page ad in Section B Technology.
Have not seen a Latitude ad so no mention of a TPM and ETS Dell Edition but am keeping my eyes open.
Even in Dells July 2005 and previous editions of direct mail catalog to small and medium businesses where Latitude and security and equipped pcs detailed, the TPM and related Dell software are not written mentioned.
With HP ProtectTools and secure hardware and adds on CNN, and IBM on TV and print Dell may soon follow.
IBM Tablet with ESS ad in Wall Street Journal
No mention of Wave ETS compatability but questionable statements by IBM, and also a direct link to Msft. See below.
WSJ, Thursday, 7/14/2005, Full page IBM ad on back of section B.
IBM Tablet Thinkpad PC with Embedded Security Subsystem (Requires software download), and optional biometric fingerprint reader. The ad states, "Noone offers more security as a standard feature".
False adverstising? Has IBM Ever heard of Dell, HP, Fujitsu?? I remember SKS saying that IBM's ESS will turn your system into a brick without recovery tools. User and readers beware.
Also says see tabletpc.com for a tour. Well, it takes you to Msft's XP Tablet PC Edition home page. Click on front and center Announcing Thinkpad X41 and go to IBM Tablet site. Click on take a tour then security to see fingerprint reader, embedded chip, and once again they claim the most secure notebook available today.
Go back to the X41 main page and scroll near bottom to TCG compliant ESS 2.0 software. Click on Client Security Software and download page not available. Might have to be using a Thinkpad to access this page.
Doma AD=Active Directory
A component of Windows 2000 and 2003 Server
Short restriction?
I am not a trader, I am a long term investor, and a lifelong learner.
Please define short restrictions, and explain the related recent new rule I remember mentioned on this board.
So why did the quote on WAVX show Short restrictions "No"
yesterday and "Yes" today?
Thank you professors.
1st