Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Ispro, Agreed it's the low end and I would personally hope for a significantly higher percentage of server upgrades. After all, for enterprises many efficiencies, audit trails, etc. can't be had without central key management. On the other hand, if even the low estimate came through we would all have a lot more money!
Svenm
Ispro,
Thanks for this analysis (and all your efforts, btw). Taken one step further, what percentage of the 3M FDE Dell drives sold would result in server tools sold by Wave. A 33% rate, for example, would provide approximately $40M in additional revenue (all earnings above BE) or about $0.80/share. A P/E of 30 would provide a share price of $24. This, of course, would be ignoring income from ETSL and ETS (other than the Dell FDE's).
Svenm
Rachelelise, Thanks for your balanced and well-reasoned contributions! Your ability to see the forest for the trees is very helpful in maintaining perspective here. As investors we've been shielded from facts for so long, despite a huge and talented effort at due diligence on this board, that it is an uncomfortable truth that we're still really flying mainly on gut feelings and emotions.
JMHO,
Svenm
GoKite, Guvna: I believe that quote was attributed to David Collins, not Feeney. Can you support your reference, Guvna?
Svenm
Ispro,
Viele dank! Much appreciated!
Svenm
Vickers,
I agree with you on that one and I think most wavoids have been aware of it for quite some time. Personally I've just come to accept it as a price that has been paid in this speculation. For those who have ridden this stock up and then back down, there's not much that can be done other than just hang on and hope that management finally delivers. If I were a newcomer I doubt I'd be interested. So many undelivered promises despite the promise of a breakthrough and clearly needed technology.
JMHO,
Svenm
Maybe it's this:
rusted Computing Group (TCG) to Showcase Multi-Vendor Network Access Control Scenarios at Upcoming Interop Las Vegas 2007
TNC Co-Chair Steve Hanna to Discuss Open Standards and Address Questions at Interop's NAC Day Trusted Network Connect Supporters to Demonstrate a Number of Security Benefits of Industry-Standard NAC Architecture in TCG Booth #211 and at Interop Labs
Last Update: 1:00 PM ET May 7, 2007
PORTLAND, Ore., May 07, 2007 (BUSINESS WIRE) -- Networking industry companies with products supporting the Trusted Network Connect (TNC) specifications from the Trusted Computing Group (TCG) will demonstrate a number of interoperable network security implementations for endpoint integrity and network access control at Interop Las Vegas 2007, May 22-24, 2007.
Steve Hanna, distinguished engineer, Juniper Networks and co-chair of the TCG TNC work group, will address Interop attendees at the show's NAC Day on Monday, May 21, 8:30 a.m. - 4:30 p.m. Topics including various NAC architectures and NAC deployment will be addressed during this educational session, moderated by Joel Snyder of Opus One. For an agenda and more information, go to http://www.interop.com/lasvegas/education/nac-day.php.
Enterasys, Extreme Networks, Fujitsu, Juniper, FHH (open source implementation), Microsoft, Nortel, ProCurve Networking by HP, Q1 Labs, Patchlink, Symantec, Trapeze Networks and Wave Systems will participate in demonstrations in TCG's Interop Booth #211 in the show's Security Zone on Tuesday, May 22 through Thursday, May 24. Show hours are 10 a.m. - 5 p.m. local time on Tuesday and Wednesday and Thursday, 10 a.m. - 3 p.m.
Most of these companies, with the addition of libtnc, will show TNC in action in the show's Interop Labs network access control initiative. In this area, testing engineers independently will evaluate and test NAC frameworks, including TNC. The Labs will focus on an introduction to NAC, NAC infrastructure, problems related to devices, and problems related to users. Interop Labs is located on the show floor and includes educational sessions. More information is at http://www.interop.com/lasvegas/exhibition/interoplabs/nac.php.
TNC is an open, non-proprietary architecture and set of specifications, available free of charge to any interested party, to enable the application and enforcement of security requirements for endpoints connecting to the corporate network. The TNC architecture helps IT organizations enforce corporate configuration requirements and to prevent and detect malware outbreaks, as well as the resulting security breaches and downtime in multi-vendor networks. More information on TNC is at https:// www.trustedcomputinggroup.org.
About TCG
TCG is an industry standards body formed to develop, define, and promote open standards for trusted computing and security technologies, including hardware building blocks and software interfaces, across multiple platforms, peripherals, and devices. TCG specifications are designed to enable more secure computing environments without compromising functional integrity with the primary goal of helping users to protect their information assets from compromise due to external software attack and physical theft. More information and the organization's specifications are available at www.trustedcomputinggroup.org.
Brands and trademarks are the properties of their respective owners.
SOURCE: Trusted Computing Group
Trusted Computing Group Anne Price, 602-840-6495 Mobile: 602-330-6495 press@trustedcomputinggroup.org Copyright Business Wire 2007 End of Story
Comtex
EmailPrintRSSDigg it
1:42PM 5/7/2007
U.S. stocks rise on mergers, ahead of Fed
12:40PM 5/7/2007
Alcoa makes unsolicited bid for rival Alcan
10:47AM 5/7/2007
BAE to buy Armor Holdings for $88-share, or $4.1 billion
8:08PM 5/6/2007
How to get into the market when you're sure you've missed out
More news
SPONSORED LINKS
Get listed here
Quote.com - Free Resources for Investors
Analyst recommendations, portfolio manager, charts, news, futures.
www.quote.com
GFT Online Currency Trading: Free Demo
Trade Forex: easy account funding options, 24-hour support & FX tools!
www.gftforex.com
eSignal Trading Software: Free Trial
Stay on top of the latest market developments. Quotes, charts, news.
www.esignal.com
Forex.com – Free 50K Practice Account
Try forex trading risk-free for 30 days. Real time charts, research.
www.forex.com
Jim Cramer's Stock Move - Just $349.95
Find out what Cramer is buying for his $3MM portfolio. Special offer - $349.95 and get 30 days free. Learn more now.
www.thestreet.com
Most Popular
READ
E-MAILED
EDITOR'S PICK
* DVD-decoder fiasco shows lawyers are behind the times
* U.S. stocks rise on mergers, ahead of Fed
* U.S. stocks' rise reminiscent of ill-fated Nikkei boom: Gartman
* U.S. stock futures flatten out as rate jitters offset merger news
* France's Sarkozy planning market, crime reforms by summer
* Monday's biggest stock gainers and decliners
* China's irrrational exuberance
* Rumors grow like weeds
* Asian markets vault to record highs on U.S. rate-cut hopes
* Alcoa makes unsolicited bid for rival Alcan
* U.S. stocks' rise reminiscent of ill-fated Nikkei boom: Gartman
* A checklist for managing your will
* China's irrrational exuberance
* Asheville, N.C., tops America's 10 best places to live: survey
* How to get into the market when you're sure you've missed out
* DVD-decoder fiasco shows lawyers are behind the times
* BAE to buy Armor Holdings for $88-share, or $4.1 billion
* Emerging-markets fund managers see rebound for Russia, China
* Alcoa makes unsolicited bid for rival Alcan
* International small-cap ETFs star on the big stage
* U.S. stocks rise on mergers, ahead of Fed
* Alcoa makes unsolicited bid for rival Alcan
* BAE to buy Armor Holdings for $88-share, or $4.1 billion
* How to get into the market when you're sure you've missed out
Get the Latest MarketWatch News >>
TRADING CENTER
Svenm
Bluzboy, I don't seem to have your email address. Would you mind giving it to me?
Svenm
Nice find, Rooster! Finally there will be some real punishment for institutions losing customers' private data. This will impact the TC movement.
Svenm
Unclever,
Thanks for sharing that spreadsheet work! Very useful and interesting.
Svenm
Bigtim, If I may butt in: I gave a shortened version previously of my call with Steven. He made the same points he made with Ramsey re: historical reference points. My understanding was that the 1.5-2 M issued per year was not split adjusted. On the other hand, the float was smaller initially (he mentioned 20's), then up to near 40M (similar to today's #) which was part of the rational for the increase to the same levels. Does this mean that the folks receiving options going forwards sidestep the effects of the reverse split? I would say yes, clearly. I don't see anything wrong with that, personally. It just confirms what we already know. For buy and hold Wave longs (and I am in that category) Wave has been a terrible investment thus far. On the other hand, if one felt the company was successfully re-invented and was willing to purchase very cheap shares (60-80 cents, pre-split) it wasn't very expensive to increase one's position (I also fall into that category).
And yes, Tampa, that is all my private information, but in the context of the board's discussion, I don't agree that it is inappropriate. Personally, I'm finished with this discussion. Best of luck to all longs!
Svenm
Tel. call with Steven: I just spoke with Steven as well. Nothing new to add as far as additional info is concerned. However, for him to make himself available, patiently go through the data with me and review the historical record is enough for me to change my opinion and vote. ICBN (naive) and IBNB, but I now think it will serve shareholders best to approve the proxy.
Svenm
To change the subject for a while, News:
Network Access Control (NAC) Products Based on Trusted Network Connect (TNC) Open Architecture Prove Interoperability
Print
E-mail
Disable live quotes
RSS
Digg it
Del.icio.us
Last Update: 11:00 AM ET Apr 24, 2007
PORTLAND, Ore., Apr 24, 2007 (BUSINESS WIRE) -- Networking industry companies with products supporting the Trusted Network Connect (TNC) specifications from the Trusted Computing Group (TCG) for network security and endpoint integrity today announced results of interoperability testing hosted by the University of New Hampshire Interoperability Laboratory (UNH-IOL). This is the second such session TCG has hosted for the approximately 70 TNC work group member companies.
Colubris, Enterasys, Fujitsu, ProCurve Networking by HP, Juniper Networks, libtnc (an open source TNC implementation), PatchLink, Q1 Labs, Symantec, Trapeze Networks, and Wave Systems participated in the two-day event held last month. Vendors tested hardware and software supporting the TNC specifications in a simulated enterprise environment. The vendors successfully demonstrated complete interoperability across two TNC interfaces:
-- The integrity measurement verification (IF-IMV) and integrity measurement collector (IF-IMC) interfaces, which allow TNC clients and servers to load and use plug-in software components from different vendors, enabling easy integration of software from many vendors into a complete TNC implementation.
-- The policy enforcement point interface (IF-PEP), which enables network hardware from any vendor to serve as a policy enforcement point in a TNC system.
Explained Steve Hanna, co-chair of the TCG TNC work group and distinguished engineer at Juniper Networks, "The testing session at the UNH's efficient and well-equipped Interoperability Laboratory demonstrated that multiple implementations of the TNC specifications from vendors work easily together. The session also showed how network access control can be implemented using products from a variety of companies. As a result, the IT community has assurance that it can mix and match a variety of products supporting TNC."
TNC is an open, non-proprietary architecture and set of specifications, available free of charge to any interested party, that enables the application and enforcement of security requirements for endpoints connecting to the corporate network. The TNC architecture helps IT organizations enforce corporate configuration requirements and to prevent and detect malware outbreaks, as well as the resulting security breaches and downtime in multi-vendor networks. More information on TNC is at https:// www.trustedcomputinggroup.org.
About TCG
TCG is an industry standards body formed to develop, define, and promote open standards for trusted computing and security technologies, including hardware building blocks and software interfaces, across multiple platforms, peripherals, and devices. TCG specifications are designed to enable more secure computing environments without compromising functional integrity with the primary goal of helping users to protect their information assets from compromise due to external software attack and physical theft. More information and the organization's specifications are available at www.trustedcomputinggroup.org.
Brands and trademarks are the properties of their respective owners.
SOURCE: Trusted Computing Group
Trusted Co
Svenm
Bigtim, Thanks for weighing in here. You're able to provide an experienced, calm voice providing a balanced opinion which I think represents the thinking of most of us who are upset by the proposal. For me this matter is settled unless/until management offers a significant change in their proposal or until it is voted on at the SHM.
Svenm
Internet,
My broker has been instructed to wire my NO votes. It's egregious and mgment and the BOD need to know that a lot of reasonable people are against it.
Svenm
Internet,
I contacted Snackman with the same errand and I am appreciative of the fact that he took the bull by the horns and helped to resolve this question. Taking swipes at somebody trying to solve a difficult problem is unseemly, to put it mildly.
Thanks, Snacks.
Svenm
Snacks,
With all due respect (and I'm sure you know this), cursory reading of any analyst report worth its salt reports outstanding option overhangs and possible adverse effects this may cause on future price appreciation. It's a fool's errand to try to guess when those options will be exercised. The fact they are there will (rightfully so) depress price and slow price acceleration. As Warbil mentioned, why not wait until there are indications, as demonstrated by collected revenue, that this company will be successful enough to warrant this kind of dilution (even if it takes place over time). I have no problem with the employees and management profiting (even immensely) from the success of the company. In fact, I welcome it! But I do think their interests should be tied to those of the public shareholders: i.e., they should be rewarded commensurately with the success of the company and without harming those of us who have financed them these many years.
JMHO,
Svenm
CL, That Smith Barney position is really Legg Mason, who have been investors for a long time and continue to add to their position substantially (they have about a 5% stake in the company). Legg Mason is excellent company to keep, as you know. If they are longs we can't all be nuts!
JMHO,
Svenm
Vickers,
I fully agree. Wave's initial products are available now and have been for quite some time. Unless upgrades sell it will remain dead in the water, as it is now. Floating, but taking on water and will eventually sink. Hopefully the Seagate drives will change that picture, but it has been surprising and disappointing that ETS hasn't sold on a stand alone basis. After SKS's apparent miss on B/E, anything he says will be taken with a proverbial grain of salt until substantial revenues are booked and in the bank. This is the real world, after all.
Having said that, I still expect this company to enjoy success.
Svenm
I'm not sure if this older piece has been posted previously, and if so, I apologize for the repeat. Just a little anectote but a nice reminder from InfoWorld:
SECURITY ADVISER
« Huge, Easy Solaris Telnet exploit! | Security Adviser Home | Palm not fixing Treo security bypass vulnerability »
February 12, 2007
IBM puts a 1000 hypervisors on a computer and secures them
Filed under: None
The Register reported this week that IBM is announcing a platform capable of running a 1000 VMs.
Read their report here.
Hypervisors and VMs are exploding everywhere...at vendors, large and small, and at clients. These days I'm rarely at a client who isn't betting the bank on VMs and hypervisors.
What caught my eye on this article was IBM's work on moving the Trusted Computing Group's (TCG) Trusted Platform Module over to hypervisors (well, just Xen, right now). I'm delighted that IBM is leading the way with secure hypervisors and with porting TCG goals to VM environments. I'm not sure if any other vendors are working on similar projects, and if so, what stage they are in, but I want to congratulate IBM for its leadership in this arena.
Posted by Roger Grimes on February 12, 2007 04:10 AM
E-mail This | Print This | Digg This | Slashdot It! | Add to del.icio.us
Comments
During my recent trip to the RSA 2007 exhibition I became aware of a, I believe, very significant element of Trusted Computing. And it has to do with the pre-boot process in the secure platform.
There is a company by the name of Wave Systems Corp. ( http://www.wave.com ) which appears to be instrumental in Trusted Computing. I just learned that they apparently were a founding member of the TCG.
Wave recently presented to institutional investors during RSA at San Francisco. In a presentation ( http://www.wsw.com/webcast/agc5/wavx/ ) the CEO pointed to Wave's involvement in the preboot process (...starting at 13:50 into the presentation). In conjunction with the upcoming Seagate and Hitachi FDE hard drives this is, in my opinion, of the utmost importance. It really implies that, at this time, only Dell and Gateway can offer truly TCG secure platforms (Wave filed an 8K with the SEC) with hardware full disk encryption ( http://www.wave.com/news/press_archive/06/061208_8K.html ) .
I did some further search and found that Wave actually has been issued a patent ( http://tinyurl.com/2c6h6t ) which totally covers the mutual authentication of a main security processor (TPM) with secure peripherals (i.e. FDE hard drives) in the preboot environment. It further appears that Wave has built all the necessary, TPM interoperable, management tools (client and server).
Posted by: kw at February 17, 2007 10:38 AM
Svenm
Go-Kite, Nice initiative. My Citibank card was abruptly re-issued because of that so I'll be faxing a letter. I like your identity theft website. And, finally, a class action suit initiated because of identity theft!
Svenm
* in
* Portfolio
* Stocklist
* Charts
* Indexes
* Filters
* News
* Forex
* Help
Click Here
* Print
* E-mail
* Share this article
* minusText Sizeplus
* Widen this Page
Breaking News
Consumers of T.J. Maxx, Marshalls, HomeGoods, and A.J. Wright Bring Class Action Suit for Loss of Credit Card Data; Filed by Berger & Montague, PC and Stern Shapiro Weissberg & Garin, LLP
18:19 EST Monday, January 29, 2007
PHILADELPHIA, Jan. 29 /PRNewswire/ -- On January 29, 2007, the law firms of Berger & Montague, PC (http://www.bergermontague.com) and Stern Shapiro Weissberg & Garin, LLP (http://www.sswg.com) filed a class action suit in the U.S. District Court for the District of Massachusetts on behalf of all consumers in the United States who had personal and financial data stolen from the computer network of TJX Companies, Inc. (NYSE: TJX) (TJX), and who were damaged thereby.
The complaint charges that TJX was negligent for failing to maintain adequate computer data security of customer credit and debit card data, which was accessed and stolen by a computer hacker. As a result of TJX's actions, customer information was stolen from TJX's computer network that handles a wide range of financial information for millions of customers, including credit cards, debit cards linked to checking accounts, and transactions for returned merchandise. Although TJX discovered the data breach in mid- December, 2006, it did not publicly announce the intrusion until one month later when it issued a press release on January 17, 2007. The delay harmed class members in that it prevented them from taking appropriate measures to protect their accounts.
While TJX continues to investigate the security breach, it has thus far determined that consumers who patronized TJX stores in 2003 and from mid-May through December 2006 may be affected. Because of TJX's actions, hundreds of thousands or even millions of its customers have had their personal financial information compromised, have had their privacy rights violated, have been exposed to the risk of fraud and identity theft, and have otherwise suffered damages.
The law firm of Berger & Montague, PC consists of over 70 attorneys, all of whom represent plaintiffs in complex litigation. The Berger firm has extensive experience in consumer, securities, and antitrust class action litigation, and has played lead roles in major cases over the past 30 years, which have resulted in recoveries of several billion dollars for consumers and investors. The Stern Shapiro law firm has also been successfully involved in consumer and other class action litigation.
If you have been affected by the loss of credit card or other financial data, and have any questions regarding this matter, please contact:
Sherrie R. Savett Jonathan Shapiro
Michael T. Fantini Stern Shapiro Weissberg & Garin, LLP
Jon J. Lambiras 90 Canal Street
Berger & Montague, PC Boston, MA 02114-2022
1622 Locust Street Phone: 617-742-5800
Philadelphia, PA 19103 Fax: 617-742-5858
Phone: 888-891-2289 or Email: jshapiro@sswg.com
215-875-3000
Doma, Perhaps odd, but definitely part of the spec's. TPM 1.2 and this PC is designed for students throughout developing nations (India, China, Brazil--lots of kids there!). It also appears to me that it is indeed an Intel PC:
http://download.intel.com/intel/worldahead/pdf/classmatepc_productbrief.pdf?iid=worldahead+ac_cmpc_p...
Cheers,
Svenm
Unclever,
You're too much! Thanks for sharing that. I'll look forward to reading it tomorrow.
Svenm
Thanks, Unclever. Appreciate it and while there editing isn't up to yours, it'll do!
Svenm
Trust, Rachel: For many years it's always come down to this. First, acceptance of and deployment of the hardware. Then, the applications. It all goes back to Lark's prescient statement many years ago to just that effect. It's taken longer than any of us probably ever suspected, but the trusted drive is the application that will make this platform take off. Oh, and if it doesn't, don't worry about selling, Trust. There won't be anything to sell!
Cheers,
Svenm
Doma, No question! The FDE drive will be the killer app! IMO everything so far has been the "prep" work. The FDE drive will truly usher in the trusted digital era!
Svenm
Nice post, CM. I appreciate your input, always interesting. I don't know where you get the energy, but keep on truckin'!
Svenm
Countryboy, Looking at their website I would say "Nope, nothing to do with Wave." MDI's "One" technology appears (at first glance) to be a security technology designed to provide tailor-made surveillance systems of various kinds. I don't see any reference to hardware-based PC, digital security, etc. TPM's are not mentioned at all.
BTW, I've very much appreciated your posts over the years.
JMHO,
Svenm
Dr. Nick, Agreed!
Svenm
Wave not mentioned but solid mainstream article from today's WSJ Online on laptop security deployment.
Svenm
More Firms Ride Wave of Mobile Security
IT Managers Adopt Encryption Technologies,
Basic Tools to Safeguard Data on Laptops
By JIM CARLTON
February 27, 2007; Page B5
The proliferation of stolen and lost laptop computers has challenged corporate information-technology managers to find new ways to protect often-sensitive data on the mobile devices.
Accounting giant Ernst & Young LLP, banker Northern Trust Corp. and health provider Kaiser Permanente are among an increasing number of companies beefing up security around their mobile computers, cellphones and personal digital assistants. Many IT managers are turning to encryption technologies that convert data into a code requiring a key held by the authorized user to translate.
Others are focusing on altering employee behavior to reduce the chances of losing a laptop or hand-held device outside the office. More computer manufacturers are installing technologies such as fingerprint readers on devices to identify authorized users. And more-basic security tools such as antitheft cables and locks are being put to greater use to protect portable equipment.
The problem has created a boom in the computer-protection industry. Tech-service giants Electronic Data Systems Corp. and International Business Machines Corp. said security of laptops and other mobile devices is one of their busiest areas.
Smaller companies, such as Pointsec Mobile Technologies, a Lisle, Ill., maker of encryption software for laptops and hand-helds, are benefiting as well. The company said its 2006 sales more than doubled to $72 million. "What's driving all of this are headlines every other week about some [laptop] breach," said Marty Leamy, president of Pointsec, a unit of Sweden's Protect Data AB.
Cost of $182 a Record
The swell of corporate activity highlights how big the problem of portable-device security has increased. Since January 2005, about 100 million records containing sensitive personal information have been breached in laptop and other computer thefts at corporations and government agencies around the U.S., according to the Privacy Rights Clearinghouse, a nonprofit consumer group in San Diego.
An August study by the Ponemon Institute, an industry consulting firm in Elk Rapids, Mich., also found that 81% of nearly 500 companies surveyed lost one or more laptop computers containing sensitive information in the previous 12 months. Ponemon said the average cost of a data breach is $182 per record, or an average of $4.8 million per breach for companies affected.
Last year children's retailer Gymboree Corp. started encrypting data on all of its laptops because of what a spokesman said was the company's desire to "be a little ahead" in terms of securing the company's computer data.
But before the encryption could be completed, three laptops were stolen from Gymboree's San Francisco headquarters, including one containing a confidential list of employees. Those laptops had been password protected, but not encrypted, Gymboree officials said.
"The idea that that information was put out there was stressful, to say the least," said Gymboree spokesman Jamie Falkowski. The laptops haven't been recovered but the encryption program has since been completed, and the company now locks all laptops in desk drawers at night, he said.
At IBM, the Armonk, N.Y., computer giant about a year ago set up a business unit dedicated to security out of its global-servicing business for the first time. EDS officials said client concerns about data security have increased since the Sept. 11, 2001, terrorist attacks.
A Breach at the VA
One of the more publicized recent incidents involved the theft of a laptop containing confidential information on more than 25 million veterans and soldiers during a burglary in May at the home of a Department of Veterans Affairs employee in Aspen Hill, Md. The computer was later recovered on the black market, and two men and a juvenile were charged in the case. In August, the VA announced that all the agency's computers would be protected with encryption software.
VA officials weren't immediately available for comment, but in an August news release, VA Secretary R. James Nicholson said the encryption system "will be a tremendous step forward in improving the safety and security of sensitive veteran information."
Similarly, Ernst & Young, of New York, ordered encryption software and password protection installed on all computers for its 30,000 employees in the U.S. and Canada in May, following a theft in Texas of a car containing a company laptop. The laptop contained data for about 243,000 customers of Hotels.com, whose parent, Expedia Inc., was being audited by the accounting firm.
Officials of Ernst & Young declined to provide details on the incident. A spokesman for Hotels.com said at the time the company "deeply regrets" the incident, and together with Ernst & Young is "committed to providing assistance and credit monitoring services for customers" whose data was on the stolen computer.
Some Common-Sense Steps
Officials at EDS, Plano, Texas, said they also are helping corporate customers outfit themselves with more basic laptop security tools, such as cables to lock the notebooks in a hotel or office. EDS and other services companies also are showing companies how they can program some hand-helds, for instance, to erase their memory when stolen. Wireless-service provider Sprint Nextel Corp., for example, offers cellphones whose data can be wiped out by a remote signal if lost or stolen.
EDS also offers suggestions to its clients on ways to avoid theft of laptops and other devices containing confidential data , including common-sense steps like not leaving a laptop in a car. "Laptops are so portable, and people tend to go everywhere with them," said Dave Morrow, chief security and privacy officer for EDS.
The extra security has its downsides. One issue is privacy. Products are coming on the market that can tell an employer exactly where his or her employee is, due to tracking software.
Write to Jim Carlton at jim.carlton@wsj.com
Tsunami, Certicom's Security ETS appears to be a proprietary product-"Security Embedded Trust Services". Looking through their spec's on the product I couldn't find anything to indicate it had anything to do with Wave's ETS. ICBW, but I doubt it. Sorry, I didn't keep the link.
Svenm
From an article today in the NY Times:
Next on the technological horizon is electronic transaction management, a service that allows brokers and buyers to track and complete a sale electronically, from the moment a contract is signed until the deal’s closing. A broker essentially creates a Web site where all the parties involved in a sale — from the appraiser and surveyor to the termite inspector and lawyers for every party — can file their reports. So instead of having to send legal documents back and forth, buyers and sellers can scan their information and post it on the Web site.
The posted documents include the purchase agreement, disclosure forms, appraisals and inspection reports. Companies that provide the transaction service use a variety of security measures to make sure the information remains confidential.
Buyers and sellers would still have to schedule a closing to sign all the documents, but that could happen just a few days after an offer was accepted, not weeks later.
Mr. Lesswing said only a few hundred out of more than 20,000 real estate agencies across the country now use an electronic transaction system. “It’s really a consumer convenience, but there’s still huge reluctance on the part of consumers to putting their personal information online,” he said.
“But the reluctance is very generational,” he added. “The younger generation of people who were raised on computers would use it in an instant, and a lot of them are just about getting old enough to become home buyers.”
Svenm
Awk, Thanks for that clarification. Very simply put. Even I could follow it!
Svenm
VH, I read the transcript as well. I see references to Trustworthy Computing, but not Trusted Computing. The former is a Microsoft buzzword, not to confused with what the TCG and Wave are all about. I don't see any evidence yet that Gates has gotten religion and joined the congregation. Fortunately Wave continues to make progress in spite of MS. Don't count on any help from their quarter.
JMHO,
Svenm
xxxx, My interpretation was that the reporter made a mistake by a factor of 10. That SKS was referring to the 60M TPM's shipped in '06, rather than just the Wave bundled subset. I wouldn't revise revenue predictions based on those #'s.
JMHO,
Svenm
REM, Nice initiative. Thanks for posting!
Svenm
Weby, Noone knows what the next event will be, but I'll put my money on a Seagate/Wave announcement being the next one to trigger a big buy day. And that should come any time now.
JMHO,
Svenm
Ispro, Thanks for the reply and the whitepaper on VIA. It looks like the first hardware security alternative to the TPM! On the other hand, there is nothing mentioned of key management nor interoperability. It really sounds like a vertical solution to me at this point and if so, once again will show the importance of interoperability in Wave's solution.
Cheers,
Svenm
Awk or other technically inclined: Bill Gates introduced at the CES today a very small notebook computer, the 02, made by a company called VIA. The PR claimed a 1.2 TPM on board, but when I took a look at the specifications this company has a security processor based on technology they call VIA Padlock Hardware security. The spec's can be seen at: http://www.oqo.com/products/model02/specifications.html
Have you seen this before and would you characterize it as a TPM1.2 or is it an alternative?
TIA,
Svenm
Doma, Ramsey: Have you looked at the DART Industry Day Briefing power point proposal?
http://www.fbo.gov/spg/USAF/AFMC/ESC/FA8771-07-R-0001/Attachments.html
I did note on attendance (document dated 12/22, the meeting was 12/20) that Infineon was not present. Perhaps they won't be competition here?
I would call everyone's attention to the Briefing power point presentation. Some pretty interesting info there. Among others on Slide 9 it's stated that all DoD computers to be purchased shall be TPM equipped. Also, a special mention (albeit small) is made that hardware security solutions are to be examined (of course we knew that, but nice to see from the horse's mouth).
Svenm