Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
VPro - Managed Services.
What Intel has done with vPro is created margin opportunities for the channel.
vPro has given them quick entry to the managed services business -- and the promise of strong margins in the near future.
Coastline Micro has a GSA contract. Proactive technologies list the Central Intelligence Agency as a satisfied customer.
Partners Applaud Intel's vPro, VBI Plans
CMP Channel
Mar. 22, 2007
Intel this year plans to roll out its next-generation vPro and Verified by Intel (VBI) offerings, which support new form factors and platforms, including the upcoming "Santa Rosa" Centrino Duo mobile chip and quad-core processors.
System builders gave a big thumbs-up to the chip giant's plans, saying it will invigorate their business in whitebooks and other systems.
At the Intel Solutions Summit in San Diego, company executives detailed for channel partners the next vPro desktop management platform, code-named Weybridge, which will be available in the third quarter.
Weybridge, based on the Intel Core 2 Duo E6x50 processor and Q35 Express chipset, is the first platform to incorporate Intel's Trusted Execution Technology, a security technology formerly code-named LaGrande, according to an Intel-authorized supplement distributed at the summit. Weybridge also will support the new management specifications DMWG 1.0 and WS-MAN and Intel Virtualization Technology for Directed I/O (VT-d), the supplement said.
Intel also told partners it will extend vPro to the "Santa Rosa" Centrino Duo chipset, based on the company's Core 2 architecture. The Santa Rosa platform consists of a faster Centrino Duo processor, support for 802.11n Wi-Fi, the new "Crestine" graphics chipset, vPro, and the new "Robson" non-volatile memory technology, designed to boost performance.
The Santa Rosa platform is expected to make its debut in May, with the related vPro offering coming out soon thereafter.
Quad-core processor support for vPro also is due to be available next quarter with the release of Intel's Q35/33 chipset, code-named Bearlake, according to the supplement.
vPro, unveiled last summer, enables solution providers to quickly create a managed services business.
At a summit roundtable hosted by Intel and CRN, executives from solution providers and system builders Columbus Micro, Proactive Technologies, Coastline Micro and Paragon Development Systems said vPro has given them quick entry to the managed services business -- and the promise of strong margins in the near future.
The Intel partners declined to comment on Weybridge or the planned Santa Rosa vPro version. Still, many summit attendees said they're committed to supporting vPro as a way to get into managed services.
"What Intel has done with vPro is created margin opportunities for the channel," said Pat Taylor, president of Proactive Technologies. "Because the local [IT services] guy who manages all the law offices in town or takes care of the dentists in his area, those people trust him because he's local and knowledgeable and has some sense of control. Now he can take care of them quicker. He can be more proactive, if you will, as far as taking care of problems on-site increases his value to them.
"You can't shop this kind of service, the way you would a machine. There's mystery in that. And, of course, there is margin in mystery," he noted.
What's more, advancing the vPro technology on the server and mobile platforms will be "critical" to the value-add that solution providers bring their customers, Taylor explained.
"We are perceived as white-box builders; we are competing on price alone. When we can get into the storage side of things, the servers, the networking and then, of course, the periphery, we own these accounts," he said. "The value-add is obvious, and our value to the customer goes up, as does our margin. It's critical to the long-term success of the channel."
Another Intel partner at the summit, who didn't participate in the roundtable, said the vPro platform for Centrino will be big.
"I am very excited about Santa Rosa -- performance, 800Mhz FSB, 4MB cache, 802.11n, Intel Turbo Memory. The vPro aspects for Santa Rosa are important due to the ability to be able to support a client remotely in the field," said Jeff DiBella, vice president of sales at AOpen Center. "This is key for us being able to sell and support whitebooks.This gives us the ability to provide support for a customer, no matter where they are in the world."
NEXT: Intel details the next VBI Intel also detailed its next-gen VBI initiative, including plans to support Santa Rosa and more form factors and platforms, including blade servers and ultra-mobile PCs.
VBI is a barebones notebook program that enables system builders to buy, customize and sell whitebooks or channel-built notebooks, a fast-growing market that is now owned almost exclusively by larger OEMs. The new VBI form factors are intended to help drive more business for whitebook makers in 2007 and 2008, Intel executives said.
The current VBI offerings are for 14.1-inch and 15.4-inch form factors, but Intel is slated to unveil 12-, 13- and 17-inch form factors plus announce a new aggregator that can respond to partners' time-to-market requirements. In addition, Intel is preparing new VBI chipsets based on the Santa Rosa platform to simplify the development of whitebooks.
VBI is critical to all system builders because mobile PCs remain the biggest growth segment in the PC industry, said roundtable participant Steve Bohman, vice president of operations at Columbus Micro. "If you're not selling your own notebooks, you're running the very distinct risk of losing your customers," he said.
Bohman knows that for a fact, explaining that Columbus Micro experienced such a situation. "We have a customer that we used to do all of their desktop, mobile and server [systems]. Unfortunately, we were not able to fulfill their mobile needs, lost that business and with it went their desktop business -- not because we fell down, but because they don't buy desktops anymore. So we completely lost their client business," Bohman said.
"Fortunately for us, we still have their server business. Mobile led the way to us losing all their client business. So if you get into the game, you've take the first step toward winning."
http://www.coastlinemicro.com/gsa/gsapricelist.asp
http://www.proactivetechnologies.com/customers.html
http://www.columbusmicro.com/index.php?page=pg_34
http://www.pdspc.com/companyhistory.aspx
vPro Cisco and support.
This generation of Intel vPro processor technology arrives with new security and management capabilities along with support from every leading PC manufacturer and software solution vendor in the world.
Next Generation Product Offers New Features and Broader Vendor Support
SANTA CLARA, Calif.--(BUSINESS WIRE)--Intel Corporation (http://www.intel.com) today further reinforced desktop PC security by unveiling the newest generation of Intel®
vPro (http://www.intel.com/vpro) processor technology for businesses and IT with new innovations that add
better protection against hacking, viruses and other threats.
Intel vPro processor technology packages a powerful new Intel®
Core 2 Duo (http://www.intel.com/greatcomputing/index.htm)
processor, Intel® Q35 Express chipset and several technology innovations offering a host of security and management capabilities for desktop PCs, including some that were
previously impossible, such as the ability to wake and repair a computer with an inoperative operating system or hard drive. As a result, businesses can reduce costs by limiting expensive and time-consuming deskside visits, and by improving power savings through the ability to turn off PCs and securely wake them when required.
Security features included in this latest Intel vPro processor
technology (formerly codenamed Weybridge) are designed to protect against software-based attacks and also filter and defend against viruses and other threats.
Today, the business desktop PC just got more secure, said Robert B. Crooke(http://www.intel.com/pressroom/kits/bios/crooke.htm), vice president and general manager of Intels Business Client Group. This generation of Intel vPro processor technology arrives with new security and management capabilities along with support from every leading PC manufacturer and software solution vendor in the world.
New in this product is Intel® Trusted Execution Technology (http://www.intel.com/technology/security/) (Intel® TXT, formerly codenamed LaGrande (http://www.intel.com/technology/security/)). Intel TXT protects data within virtualized computing environments, an
important feature as IT managers are considering the adoption of new virtualization-enabled computer uses. Used in conjunction with a new generation of the companys virtualization technology Intel® Virtualization Technology for Directed I/O (http://www.intel.com/ technology/magazine/45nm/vtd-0507.htm?iid=search) (Due to its length, this URL may need to be copied/pasted into your Internet browser's address field. Remove the extra space if one exists.) Intel TXT ensures that virtual machine monitors are less vulnerable to attacks that cannot be detected by todays conventional software-security solutions. By isolating assigned memory through this hardware-based protection, it keeps data in each virtual partition protected from unauthorized access from software in another partition.
In addition, Intel enhanced its Intel vPro processor technology with improved System Defense Filters. These filters can identify greater numbers and varieties of threats in the network traffic flow.
The latest version of Intel vPro processor technology also offers an embedded trust agent, the first certified by Cisco, providing the industrys only 802.1x compatible
manageability solution not dependent on OS-availability. This trust agent offers Ciscos IT customers the ability
to manage systems, even if powered off or the OS is down, without lowering the security on 802.1x networks and Cisco(1) Self-Defending Network products.
Further boosting PC manageability is the newest generation of Intel Active Management Technology (http://www.intel.com/technology/ platform-technology/intel-amt/index.htm) (Due to its length, this
URL may need to be copied/pasted into your Internet browser's address field. Remove the extra space if one exists.) (Intel®
AMT). Intel® AMT allows for inventory and
repair PCs out of band meaning even if the OS has crashed or the PC is turned off. Enhancements include convenient remote configuration tools and compliance with the latest industry standards. The company expects that PCs with this version of Intel vPro processor technology will be among the first to comply with the Distributed Management Task Forces DASH 1.0 draft interoperability specification and Web Services Management (WS-MAN).
The new Intel® Core
2 Duo processor and Intel® Q35 Express
chipset together will deliver improvements in energy-efficiency through a combination of performance increases and reductions in power consumption, thereby helping businesses support their own Green IT objectives and Energy
Star(1) (http://www.intel.com/cd/channel/reseller/
asmo-na/eng/products/337748.htm) (Due to its length, this URL may need to be copied/pasted into your Internet browser's address field. Remove the extra space if one exists.) requirements. For the highest-volume processor, the 2007 Intel vPro processor technology delivers 30 percent greater performance than the previous-generation product, while significantly reducing power consumption.
Major computer makers and channel resellers around the world are now selling desktop PCs with Intel vPro processor technology. Currently, more than 350 companies are deploying this technology worldwide ranging from the thousands to tens of thousands of PCs per business.
Customers tell us that they want a partner
that will help them simplify IT, said Vivek
Mohindra, vice president, Dell Product Group. The
OptiPlex 755 has the most flexible systems management capabilities, including Intel vPro processor technology, to drive more efficiency so IT professionals can focus on innovation rather than system maintenance.
Security and client management are top concerns for our customers business, said Kevin Frost, Worldwide Vice President, HP Business PCs. To address these customer demands, HP remains committed to supporting Intel vPro processor technology. Through providing its innovative capabilities on the industrys broadest portfolio of desktops and notebooks, HP is the leader in delivering secure and manageable vPro-enabled desktops.
The new ThinkCentre M57 desktop combines Lenovos innovative ThinkVantage Technologies with Intel vPro technology to provide a secure and manageable desktop that reduces the total cost of ownership, said Dilip Bhatia, executive director of Global Desktop Marketing, Lenovo. Customers looking for a stable,
secure and manageable PC will find our best-engineered desktop and notebook PCs simplify fleet management in any computing environment.
Businesses can also enjoy energy-efficient performance, PC security and manageability along with wireless mobility on notebook PCs with Intel® Centrino® Pro(http://www.intel.com/performance/mobile/centrinopro/)
processor technology which started shipping in May.
Intel, the world leader in silicon innovation, develops technologies, products and initiatives to continually advance how people work and live. Additional information about Intel is available at www.intel.com/pressroom.
Intel, the Intel logo, Intel. Leap ahead., Intel vPro and Intel Centrino are trademarks of Intel Corporation in the United States and other countries.
(1) Other names and brands may be claimed as the property of others.
No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology (Intel®
TXT) requires a computer system with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset,
BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). The MLE could consist of a virtual machine monitor, an OS or an application. In addition, Intel TXT requires the system to contain a TPM v1.2, as defined by the Trusted Computing Group and specific software for some uses. Local laws and regulations may limit Intel TXTs availability in certain countries. For more information, see http://www.intel.com/technology/security.
Intel® Active Management Technology requires the computer system to have an Intel(R) AMT-enabled chipset, network
hardware and software, as well as connection with a power source and a corporate network connection. With regard to notebooks, Intel AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power, sleeping,
hibernating or powered off. For more information, see http://www.intel.com/technology/manage/iamt/.
ENERGY STAR denotes a system level energy specification, defined by the US Environmental Protection Agency, that relies upon all of the system's components, including processor,chipset, power supply, HDD, graphics controller and memory to meet the specification. For more information,
see http://www.energystar.gov/index.cfm?fuseaction=
find_a_product.showProductGroup&pgw_code=CO. (Due to its length, this URL may need to be copied/pasted into your Internet browser's address field. Remove the extra space if one exists.)
Performance tests and ratings are measured using specific computer systems and/or components and reflect the approximate performance of Intel products as measured by those tests. Any difference in system hardware or software design or configuration may affect actual performance. Buyers should consult other sources of information to
evaluate the performance of systems or components they are considering purchasing. For more information on performance tests and on the performance of Intel products, visit Intel
Performance Benchmark Limitations (http://www.intel.com/performance/resources/limits.htm).
vPro, TET and HAP.
Intel Emphasizes Security with New Platform
August 25, 2007
Intel is preparing to release a new version of its vPro platform Aug. 27, which will include an emphasis on security that the chip maker hopes will expand the reach of its desktop management technology.
The new version of vPro platform, which Intel had called "Weybridge," will sport three different Core 2 Duo processors, along with the company's Q35 Express chip set and its 82566DM gigabit network interface connector.
While the first version of vPro, which came to market in April 2006, focused mainly on technology that would make it easier for IT administrators to remotely manage desktops and have better control of a large fleet of corporate PCs, the 2007 update to the platform will add new security features as well as virtualization capabilities.
"We are trying to be a little more innovative and proactive by driving security capabilities right into the platform itself," said Gregory Bryant, vice president for Intel's Digital Platform Division.
After the initial introduction, Intel, based in Santa Clara, Calif., and several PC vendors began introducing the first desktop models with vPro technology in Sept. 2006 and then announced that its new Centrino Pro mobile platform would include vPro in May 2007. Since that time, Intel executives have said that the company has shipped more than four million units with more than 350 enterprises deploying vPro-based clients.
Intel and AMD are setting their sites on the high-end of the market.
Roger Kay, an analyst with Endpoint Technologies, said a company would need to have vPro technology installed in about 25 percent of its PC fleet before it was reasonable to deploy all the management and security features included in the platform.
Kay estimates that most companies are now hitting the 20 percent mark and with the addition of vPro technology in the Centrino platform, he suspects that more companies will now begin deploying the full range of vPro features.
"Right now, it [vPro] is still pretty sparse and it's been a slow adoption, but Intel has been pleased with the uptake and some of the IT guys who see the potential really want to get their hands on the vPro stuff," Kay said.
"After Intel added Centrino, a company can have the entire client based management under this heading and that makes for a better justification for investing in it. That is also a recent development and I think it's still in its early stages."
One of the most significant updates to the vPro platform is the next generation of Intel's AMT (Active Management Technology), which provides a hardware and software management engine that allows a number of on-board capabilities, such as monitoring the PC's hardware and software configuration to give a more holistic view of the system. The latest version of AMT will also feature embedded filtering technology built into the firmware of the silicon itself.
This filter technology will help protect a PC from common malware problems and offer a level of protection to the desktop both before and after third-party security software is installed. The technology also alerts the IT administration of the problems and can isolate a single machine from the network. The filters work by logging all outbound packets. The filter then analyzes these logs for specific, malicious patterns, such as excessive attempts to connect through a single port.
Click here to read more about Intel's development of silicon photonics.
Intel is also offering what it calls an embedded trust agent in the platform, which will not only support the IEEE 802.1x standards, but is also certified by Cisco for its Network Admission Control. The agent is not dependent on operating system availability and will continue to work and manage the PC whether the desktop is shutdown or the OS has been disabled, without lowering the network security.
This vPro development will allow for greater out-of-band management abilities, such as remote power control and diagnostic testing, even if the operating system has failed while maintaining network authentication.
The fact that Cisco is now on board with vPro shows what Intel is trying to do with the brand. Specifically, the company is trying to get third-party vendors and ISVs to build on top of its platform instead of Intel trying to develop proprietary standards on its own, Kay said. In addition to Cisco, Symantec is developing security features for vPro, while Altiris was tapped to offer a management agent.
Page 2: Intel Emphasizes Security with New Platform
(Just before the vPro launch this week, a spokesperson for Symantec admitted that its Virtual Security Solution for vPro, which integrates the company's NIPS (Network Intrusion Prevention Security) engine with Intel's virtualization technology, does not yet have an official shipping date.)
"From Intel's perspective, they don't want to get into the application side of it," Kay said. "They want to get the application vendors to come in and let them work on top of the platform … Security is a layered concept."
In a demonstration for journalists and analysts, Bryant said part of the purpose of vPro is to provide the hardware hooks for third-party vendors and ISVs to build applications for a host of issues, such as security and enterprise-wide PC management.
In addition to the other security features, Intel is offering what it calls TXT or Trusted Execution Technology in the updated vPro platform. Those who have followed Intel's technology developments will recognize TXT as the final realization of its "LaGrande" initiative.
TXT works with TPMs (Trusted Platform Modules) 1.2 and performs several different functions. One of these is to allow software to boot into a known, trusted state. With the help of virtualization, TXT can also isolate applications within a memory partition and isolate that application within the hardware.
This feature means that no additional hardware or software can access a particular application. TXT will also remove data from the cache when the virtual machine shuts down, which ensures an additional defense against snooping software.
Besides TXT, Intel has also included a new virtualization feature dubbed Virtualization Technology for Directed I/O, which will help reinforce the isolation between virtual machines on the desktop by restricting memory access.
At the same demonstration where Bryant spoke, representatives with General Dynamics, one of the country's largest defense contractors, showed off a workstation running the Microsoft Windows operating system in two separate virtual environments within the same machine.
The hardening between the partitions was strong enough for government workers to run applications using classified and unclassified data on the same machine, said Mike Maschino, a security architect with General Dynamics.
executives are touting the additional performance of the new vPro platform, specifically a 30 percent boost with the addition of the Core 2 Duo E6550 processor compared to the older Core 2 Duo E6300 chip. The E6550 is clocked at 2.33GHz and has 4MB of L2 cache and a 1333MHz FSB (front side bus). Intel is also offering two other processors with even faster clock speeds, the E6750, which has a clock speed of 2.66GHz and the E6850, which runs at 3GHz.
By next year, Intel plans to introduce several quad-core processors for the vPro platform as well.
In terms of power, the processor being used with the vPro platform use the same 65-watt TDP—an Intel term that refers to how much heat a chip has to dissipate—as the older platform.
One of the drawbacks to vPro is that all the new features are hardware-based and users will have to buy new PCs to take advantage of the platform and its updated capabilities.
At least three of the larger PC vendors will be offering new systems that support vPro right away. Dell will roll out a new desktop, the Optiplex 755, which will offer the vPro platform as well as several other Intel-based options, including just the use of Intel's latest AMT. The Round Rock, Texas, PC vendor had previously offered the vPro platform in its Optiplex 745c desktop.
In addition, Hewlett-Packard will include the new version of vPro when the company refreshes its Compaq dc7000 line of high-end, enterprise desktops in the next few months. Finally, Lenovo will offer the 2007 version of vPro with its ThinkCenter M57P desktop, which will eventually replace the M55P, a desktop that used the original vPro platform. Lenovo is now also offering the vPro platform with its ThinkPad T61 laptop, which uses the Centrino Platform.
Intel TET and the technology enabling platform:
http://www.iaik.tugraz.at/teaching/04_trustedcomputing/slides/VPTS003_ForPublication.pdf.
High Assurance Platform Workstation:
http://www.gdc4s.com/documents/D-HAPWS-6-0207_p1.pdf.
Sutter Health - Case Study.
Intel Boosts Security With Revamped vPro
Newest version of automated management programs ships Monday.
PC World
Monday, August 27, 2007; 12:19 AM
Intel is releasing an upgraded version of its vPro bundle of automated PC management features on Monday, saying the new package delivers better IT security than the original product launched last year.
IT administrators who manage computers containing the new "Weybridge" bundle of processor and chipset can improve security by automatically sending software patches to thousands of corporate PCs, Intel said. They can also save money on the electric bill by instructing those PCs to enter a sleep state or save time by diagnosing a broken computer remotely.
PC vendors Hewlett-Packard Co., Dell Inc. and Lenovo Group Ltd. all announced new desktops based on vPro in conjunction with Intel's announcement, officially called Intel vPro Processor Technology for 2007.
To qualify for the vPro label, a desktop must use Intel's Core 2 Duo processor of the E6550 level or better, a Q35 Express chipset, and other hardware-based networking and virtualization technologies from Intel, said Greg Bryant, general manager of Intel's digital office platform division, during a briefing in Boston.
Although Intel is launching the new vPro bundle in a desktop configuration, it plans to launch a version for notebooks by the first half of 2008, when it upgrades its current "Santa Rosa" Centrino Pro product to a new version called "Montevina."
Compared to the original "Averill" vPro platformlaunched in September 2006, those upgraded components will make it easier for administrators to manage large fleets of computers. But perhaps the biggest improvement will be in security, Bryant said.
The new vPro system uses virtualization to run certain security software in a protected section of the hard drive, uses time-based filters to detect the patterns of an attack by a virus or hacker, and uses on-chip memory to store network security credentials in hardware instead of vulnerable software.
Those features will not replace conventional software security applications, but are designed to work alongside products from Symantec Corp and other providers. As security threats have grown more sophisticated, administrators need a combination of software and hardware to defeat them, he said.
"Much security today is based on threats running in software on the OS, which has to be working for them to be effective," Bryant said. "Some things, like how memory is accessed, is controlled by the chipset. So if we don't do it, who is going to do it?"
Compared to the existing vPro product, Weybridge includes enough improvements to attract new corporate buyers, though it will be less useful for small and medium-sized businesses, one analyst said.
"You're not going to see SMBs using this, with one guy reviewing the management console each night. But in the enterprise environment, this kind of thing is pretty critical to keeping costs down," said Dean McCarron, an analyst with Mercury Research. "The last thing you want to do is go out and visit the desktops when you've got 5000 of them."
Reducing physical desktop visits was one of the primary reasons that Sutter Health, a nonprofit network of health-care providers in northern California, adopted desktops with vPro 2006.
The task of managing the group's 7500 desktops and several thousand laptops is complicated since their five hospitals and 40 clinics are spread across a 100 mile radius, said Tim Hearing, regional vice president and chief information officer for Sutter's Sacramento Sierra region.
The organization recently finished a test of the 2006 vPro and now plans to purchase several thousand HP desktops using the new vPro. "We have a few hundred of the 2006 model, just to do a pilot and play around and see if it's worth paying the few extra bucks. And at least for us, the answer was 'yes' since we have such a decentralized environment," Hearing said.
"Even if we had vPro for just 10 percent of our units, that's still 700 PCs. You need quite a bit of windshield time when you have to go out and touch 700 devices."
HP will offer vPro on its new HP Compaq dc7800 desktop PC, which will be available in three chassis shapes, including an ultra-small form factor that can hang from the back of a flat panel monitor.
Dell will deploy the 2007 vPro technology in its OptiPlex 755 PC, offering users a choice of five processor speeds, hard-drive storage up to 250GB, including a minitower, desktop, small form factor and ultra-small form factor.
Lenovo will offer vPro on its ThinkCentre M57p desktop and in the future on its ThinkPad T61 notebook. None of the companies provided shipping dates or prices.
http://www.washingtonpost.com/wp-dyn/content/article/2007/08/27/AR2007082700025_pf.html
Intel® Solution Services Offers
Sutter Health Sacramento Sierra
Region a New Prescription for
Efficient PC Support
http://www.intel.com/cd/services/intelsolutionservices/asmo-na/eng/success/casestudies/338447.htm
Intel 'LaGrande' Chipset Ships, First Test of New vPro Trusted Platform
August 27, 2007, 2:07 PM
One of the most ambitious new features ever to be built into an x86 motherboard is now publicly available: a hypervisor-based computer that runs both the operating system and its underlying BIOS under the control of a virtual machine monitor.
Underneath these physical and virtual layers is Intel's latest and boldest implementation of the Trusted Computing platform - the highly anticipated, and in some circles dreaded, LaGrande platform, now called Trusted Execution Technology (TXT). It is quite literally a computer that provides the entire universe for another computer, replacing the BIOS with a radically advanced underlying system capable of detecting incursion at the deepest levels.
A careful read of Intel's newly revised documentation (PDF available here) shows what the company has been concentrating on since LaGrande's initial unveiling in March 2006: a completely virtualized computing environment called the Measured Launch Environment (MLE), where every component of what an operating system typically considers as "the PC" is rendered in software. What Windows or Linux - or, perhaps at some future date, Mac OS - perceives as the computer, is actually code that's executed here.
It's the "measured" part that characterizes the road Intel has traveled to get here. The whole point of the underlying TXT platform is to monitor the MLE to detect any sign of corruption, from outside or inside. In order that TXT can trust itself to make that judgment -- to ensure the base platform is also free from corruption -- it establishes a root of trust, which is an inviolable region of code that is closed to the network above.
That code is used to authenticate and validate the integrity of the TXT. With the TXT's validation being maintained, it can continue to use cryptographic hash routines supplied by the root of trust to ensure that system services running in the MLE are not compromised. These services don't even have to know the TXT exists.
It seems logical enough...and if that were the original message Intel sent to customers when it first thought of the idea, we might actually be here sooner than we are. But back even before it was dubbed LaGrande - when Intel and Microsoft were working on it together, and it was called Palladium - word spread that its Trusted platform could conceivably be leveraged by services for validating and ensuring the presence of digital rights management schemes. By 2005, security experts such as the respected cryptography expert Bruce Schneier sounded the alarm.
"It's very much a baby/bathwater thing going on," Schneier told me in October 2005. "In their zeal to stamp out piracy, the media companies might actually stamp out computing. They don't want you to have computers; they want you to have Internet entertainment platforms. To the extent that you have a fully programmable computer, that's a danger, because you could do things that are unauthorized by whoever wants to start giving out authorization...It's not like a television, where you do what we tell you to do."
Fear grew among Intel's customer base of a future where underlying system services were constantly verifying every process the user undertakes, making certain it has nothing to do with piracy, unauthorized copying, unpermitted use of services, use of unlicensed software, or anything else that some agency at some future date may see fit to un-authorize.
But ever since then, Intel's engineers have stated that, although it's technically feasible for Trusted Platform code to be leveraged by DRM schemes, that is not what its vPro technology is designed to do. Nevertheless, Intel did make a decision last year not to sell vPro as a consumer technology, at least not at first, partly due to the negative publicity surrounding it. This is why vPro is billed as a business technology. Notice also notice, that Microsoft is no longer a direct participant in this project.
TXT makes its vPro premiere in Intel's Q35 Express chipset, which appears on Intel's DQ35JO and DQ35MP micro-ATX motherboards.
Today, Intel spoke of a new feature called "system defense filters," which is not something outlined in the new TXT specifications, at least not by that name. As this morning's press release describes them, "These filters can identify greater numbers and varieties of threats in the network traffic flow."
This seems to indicate Intel's intention to run the TXT layer as a true networked computer unto itself, with Internet access and perhaps networked system monitoring capabilities. What this means is nothing less than the official entry of the world's leading PC hardware manufacturer into the system security business.
While Intel characterized today's announcement as a formal unveiling, which typically precedes either a product's release from factories or its premiere on store shelves, BetaNews discovered at least one Fry's Electronics customer who seems to have purchased a DQ35JO several days early, for a curiously low bargain price of $130.
Perhaps this store put it on the shelf not really knowing what it was. Our check of Amazon.com this afternoon shows four DQ35JO boards available at over ten times that price.
The fellow asked fellow members of CompatDB.org whether it was worth his time to build a server out of this thing, or should he take it back to Fry's and get his money back. Hopefully he's reading this now: You might want to hang on to it.
http://www.betanews.com/article/Intel_LaGrande_Chipset_Ships_First_Test_of_New_vPro_Trusted_Platform....
Lenovo Seagate FDE.
So basically the story is The T61 and R61 are coming with planned availability dates of the following:
May 2007 for initial rollout of the widescreen 14.1" versions
Models with NVIDIA graphics and Microsoft Vista 64-bit or XP Pro will be available July 2007.
Models with 160 GB (5400 rpm) FDE hard drives will be available July 2007.
Models with Blu-ray DVD burner will be available July 2007.
So the rollout will be gradually over a couple of months for various configurations
http://www.notebookreview.com/default.asp?newsID=3657
Keeping Notebooks Off the Front Page -- Federal agencies are clamoring for full disk encryption. It's an easy sell-if you can move fast enough.
(VarBusiness Via Thomson Dialog NewsEdge) May 3, 2006 has proven to be a major turning point in the federal government's treatment of information security. As most people know, burglars broke into a house in Aspen Hill, Md., and stole a notebook computer and external hard drive that contained an unencrypted database holding the names, dates of birth, and Social Security numbers of millions of veterans and active duty military personnel. The equipment in question belonged to the Department of Veterans Affairs and was issued to an analyst named Wayne Johnson, who had been bringing home the laptop loaded with confidential data for months.
Despite reports indicating that the data was not accessed, the scandal that followed cost several high-ranking VA officials their jobs and prompted the Office of Management and Budget (OMB) to issue a new policy mandating that all federal departments and agencies implement safeguards to prevent such a security breach. Suddenly, every office in the executive branch needed to find a way to keep all of the data on their notebooks and other mobile devices encrypted all the time.
The Basics
As its name implies, full disk encryption (FDE) software encrypts the entirety of a hard drive, including the boot partition and all system files. Without a working password, the drive in question is both indecipherable and unbootable. While with most current FDE solutions the drive itself retains some value, any data on it is effectively out of reach.
The vast majority of current FDE solutions are implemented entirely in software. During initial deployment of such solutions, the software in question encrypts each affected hard drive, sector by sector, and installs a stripped-down custom OS known as the "preboot environment" designed solely to authenticate the user and begin decrypting the drive. At no point is any unencrypted data saved to the hard drive; data is only decrypted when needed in active memory, and immediately re-encrypted when written to storage.
Both Seagate and Hitachi Data Systems have recently begun shipping 2.5-inch hard drives with onboard hardware-based encryption; Lenovo now offers the ThinkPad T61 with the Seagate drive as a factory-installed option. While these two drives are based on slightly different architectures, they both offer a performance advantage over their software-based alternatives in that they keep constant encryption and decryption from eating up processing cycles on the main CPU. Seagate's drives also offer more security by making part of the drive inaccessible to the user.
In the short term, however, limited centralized management options make large-scale deployments of hardware-based FDE solutions difficult, though both manufacturers are working closely with existing FDE software developers. Moreover, in the federal context neither has gone through the lengthy Federal Information Processing Standard (FIPS) certification process required of encryption tools used by federal agencies.
The Market
The value of these technologies to federal agencies is clear, and they are moving quickly to implement them-meaning big opportunities for VARs who can move fast as well.
"It's hard not to know the value of encryption now, because every time you pick up [the paper], there's some story about some laptop," says Rick Marcotte, president and CEO of Herndon, Va.-based government solution provider DLT Solutions. "You don't even need to sell the concept anymore."
"The mandate forced a solution on the agencies," notes Prabhat Agarwal, manager of federal information security analysis at government market analysis firm Input. "They're pushed to do it, and they will do it-the risk of not doing it is too high."
Agarwal projects that the size of the federal "data at rest" market-which includes FDE as well as other encryption solutions and approaches to protecting data stored on notebooks, desktops and servers-will reach $620 million in 2007, and $780 million by 2012.
The question, then, is not whether there's a demand in the federal market for FDE solutions, but how much of that demand is already being met. That's not entirely clear.
For example, more than 90 percent of all Department of Commerce mobile devices have had FDE in place as of June 25, according to the Department of Commerce CIO Barry West. "Keep in mind that this OMB memorandum came out a year ago, so most departments should be well down the road," he says.
On the other hand, according to Josh Wolfe, director of federal sales for encryption vendor Utimaco, the Commerce Department's progress is not representative of the federal government as a whole. "There's a lot left to do. When you talk to end user customers, the mandate has been out there for a year or so, but unfunded; so you've got a lot of folks working with OMB to get a pass or a waiver. The government is by no means done."
It's significant to note that on June 18 the OMB, Defense Department and General Services Administration (GSA) awarded blanket purchase agreements to 11 primary contractors working with 10 FDE software developers as part of the federal SmartBUY program (see "And The Winners Are...," left) As the SmartBUY system is designed to simplify the procurement and contract negotiation processes, these recent awards suggest that there may be a significant number of FDE projects still up for grabs.
The Requirements
As with any area of federal IT, there are a host of different requirements. If you're going to get the contract, it's crucial to understand all of these and how they fit together.
With FDE projects, the place to start is OMB Memorandum M-06-16, which was the primary response to the VA incident. In it, the OMB lays out a four-part mandate, which includes forced time-outs and two-factor authentication for remote access, logging of all access to sensitive data, and the encryption of "all data on mobile computers/devices which carry agency data unless the data is determined to be nonsensitive, in writing," by a designated official. Technically, this last requirement can be met without FDE, but the alternatives are impractical.
"It just gets too difficult to manage," West notes. "It's much safer just to do a full disk encryption."
Every federal office will require that any FDE product be certified under FIPS 140-2. For software products, this shouldn't be a problem; FIPS 140-2 certification is simply a checkbox that all major vendors have checked from the VAR's perspective. Hardware-based encryption is another story. The FIPS certification process takes considerably longer than the product life of a hard drive, making the process inherently impractical for the drive manufacturers. Seagate is currently working with the government on developing a new certification mechanism more suitable to COTS hardware.
"What the NSA has said in public is that [hardware-based encryption] is a really good idea," says Dave Anderson, director for strategic planning for storage solutions at Seagate. "We're the first guinea pig for this new process."
While the SmartBUY selection is not technically a certification, it does carry with it an official "stamp of approval" that the products meet FIPS 140-2, interoperability and other requirements. As such, it may prove a de facto requirement in many cases.
"It's going to be very difficult for any government agencies to buy anything that's not on that particular list, says Andy Solterbeck, vice president and general manager for commercial enterprise business at FDE software developer SafeNet. "Just purely from an audit perspective, it just makes it simpler for the agencies, because they can say they bought the product based on that assessment."
And the Winners are...
The SmartBUY teams include one vendor and one solution provider
Vendors: SafeNet, SPYRUS/WinMagic, Information Security, CREDANT Technologies, Encryption Solutions, PointSec, GuardianEdge Technologies, Mobile Armor and Safeboot Mobile Data Security
Solution Providers: Autonomic Resources, Carahsoft Technology, GovBuys, Hi Tech Service, immix Technologies, Intelligent Decisions, Merlin Int'l., MTM Technologies, Rocky Mountain Ram and Spectrum Systems
http://www.tmcnet.com/scripts/print-page.aspx?PagePrint=http%3a%2f%2fwww.tmcnet.com%2fusubmit%2f2007...
Seagate registration.
http://fde.seagatestorage.com/
Fujitsu Segate FDE.
The FMV-B8230, with a choice of a RAM hard disk or a standard hard disk with internal encryption (Seagate Momentus 5400 FDE). It is a BTO computer with a 12.1” display and a Celeron M 423
http://www.akihabaranews.com/en/news-12599-Fujitsu+notebook+with+Flash+hard+disk+or+standard+hard+di...
Dell USB TPM?
Did not see this before. Photo looks like it says Dell 256?
USB Smart Card.
http://www.deepnettechnologies.com/downloads2/Deepnet%20SmartID.PDF
SmartID
is a 3-in-1 solution that combines virtual smart card, plug-and-play USB flash drive and onboard TPM (Trusted Platform Module) security chip, providing the same advanced security functionality as conventional plastic smart cards. SmartID is designed to support public key infrastructure (PKI) for authentication, digital signatures and file encryption as well as securely storing Windows credentials for authentications but at the fraction of the cost of the conventional smart cards
Wave Systems and Deepnet Security Sign Licensing Agreement;for Hardware-Based Security for Virtual Smart Cards
Next-Generation Security Chip Equips Cards with Strong Key Encryption
London, UK and Lee, MA – January 3, 2007 – Wave Systems Corp. (NASDAQ: WAVX) today announced that it has signed a licensing agreement with Deepnet Security, a leading provider of strong, two-factor authentication solutions, to permit Deepnet to arm Deepnet's Smart ID™ virtual smart cards with Wave's hardware-based security technology designed to protect users' digital identities.
Wave's technology is designed to enable the encryption keys used for and by Deepnet's Smart ID virtual smart cards to be automatically generated and protected by the unique standards-based Trusted Platform Module (TPM) hardware security chip. This new level of security supports the advanced functionality of the Smart ID, which can hold users' personal credentials, such as private encryption keys, passwords, digital certificates and biometrics, inside the protected environment of the internal file system.
Using Wave's Trusted Computing Group-Enabled Cryptographic Service Provider (CSP) , Deepnet can deploy its Smart ID virtual smart card application with hardware-generated and stored cryptographic keys. Traditionally, these keys are vulnerable to attack; one solution is to store the keys in a Trusted Platform Module vault.
“This agreement allows us to offer a higher level of security to enterprise customers,” said Yurong Lin, CEO of Deepnet Security. “We are very pleased to have signed the agreement that will benefit our customers. We value the TPM technology Wave Systems has developed and see it as a good complement to our virtual Smart Card.”
The TPM chip, embedded directly on the motherboard of new business PCs, performs a variety of business security features when combined with Wave Systems' EMBASSY™ Trust Suite software — such as, security policy management, data protection, password management and strong pre-boot authentication. The solution can substantially improve protection against password, data and personal information theft, and is designed to provide enhanced application security, strong wireless authentication, secure email and more — all while increasing productivity.
“TPM technology has not only shipped in tens of millions of PC platforms, but it's also beginning to saturate additional markets as trusted computing dramatically improves the security of technologies such as virtual smart cards,” says Steven Sprague, president and CEO of Wave Systems. “By collaborating with the innovators at Deepnet Security, we are enabling Smart ID to leverage the security features of the Trusted Platform Module, which is backed by an industry standards body of over 150 technology vendors collaborating to mitigate the risks of unauthorized user access or hacking theft. We believe that this collaboration significantly raises the bar on security for mobile device tokens.”
Under the agreement, Wave is to receive a per-unit royalty based on Deepnet's distribution of products equipped with Wave's technology. The agreement does not provide for minimum royalties or distribution volumes.
Trusted Computing Solutions for the Enterprise
In addition to the EMBASSY Trust Suite, Wave also offers four enterprise solutions which deliver improved trusted computing features for government and enterprise markets. Wave's EMBASSY® Key Management Server (EKMS) and EMBASSY® Authentication Server (EAS) provide trusted computing solutions for network policy management, data protection and strong authentication using biometrics, smart cards and TPMs.
Wave's EMBASSY ® Network Access Control (ENAC) leverages existing network infrastructure and open industry standards for IT control over PC client access to the network, designed to lock down the network from unauthorized access to thwart many common and damaging network attacks. EMBASSY ® Endpoint Enforcer (EEE) is Wave's open, standards-based network security solution designed to work with any network access control solution. It is also designed to capture, report and validate platform integrity metrics on PCs equipped with TPM security chips and to enable third-party applications and services to make informed network access decisions.
Wave and WidePoint's ORC.
Wave and Orc site: http://wave.orc.com/
Past news:
WidePoint Subsidiary ORC’s Strategic Partner Wave to Demonstrate Security Solutions at DoD Public Key Enabling Forum
Representatives from ORC and Wave to explain software and hardware security chip that is capable of generating and protecting private keys for ACES and ECA certificates issued by ORC
LEE, Mass., October 23, 2006--Wave Systems Corp. (NASDAQ:WAVX www.wave.com ) announced today that it will conduct demonstrations of its EMBASSY line of software at the Department of Defense (DoD) Public Key Enabling (PKE) forum at the Atlanta Sheraton, Atlanta, Georgia, Oct. 24-25.
At the conference, Wave will show how its software can offer added security for digital certificates, such as those ordered from strategic partner Operational Research Consultants (ORC). Representatives from both companies will be on hand to explain how Wave's EMBASSY software, in conjunction with a hardware security chip called a trusted platform module (TPM), is capable of generating and protecting private keys for ACES and ECA certificates issued by ORC. This solution is designed to reduce the certificates' susceptibility to theft or misuse because it ties the certificate to the TPM from which it was created.
Recently, the Trusted Computing Group's industry-standard hardware chips (TPMs) have caught the attention of the federal government, which is rapidly requiring their presence on many new platforms. Both the Army and Air Force recently published acquisition requirements specifying this chip on all new PCs.
Wave CEO Steven Sprague to Present on TPMs in PKI Environment
Steven Sprague, Wave's president and CEO, has been invited to present at the forum tomorrow afternoon from 3:30-4:30 p.m. in the North Capitol Ball Room. In his presentation "Trusted Computing: TPMs in the Mobile PKI Environment" he will discuss how TPMs harden existing PKI certificates. Sprague will also discuss how to leverage trusted computing solutions beyond the DoD PKI environment, showing how they are designed to solve the real-world authentication and identity management problems facing federal, state and local government agencies.
About WidePoint and ORC
WidePoint is a technology-based provider of products and services to the government sector and commercial markets. WidePoint specializes in providing systems engineering, integration and information technology services. WidePoint's wholly-owned subsidiary, ORC, is at the forefront of implementing government-compliant eAuthentication identity management managed services and associated systems engineering/integration. ORC has earned several major U.S. federal government certifications offering the highest levels of assurance for transactions over the Internet. ORC's GSA IT Schedule FSS # GS-35F-0164J and associated SINs are available through www.gsaadvantage.gov.
An investment profile about WidePoint may be found at www.hawkassociates.com/wyyprofile.aspx .
For investor relations information regarding WidePoint, contact Frank Hawkins or Cale Smith, Hawk Associates, at (305) 451-1888, e-mail: info@hawkassociates.com.
About Wave Systems Corp.
Wave Systems solves the most critical security problems for enterprises and government with software solutions that are trustworthy, reliable, easy to use, and offer a speedy return on investment. Wave's trusted computing software solutions include strong authentication, data protection, advanced password management and enterprise-wide trust management services. For more information about Wave, visit www.wave.com.
Safe Harbor for Forward Looking Statements: Except for the statements of historical fact, the information presented herein constitutes forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Such forward-looking statements involve known and unknown risks, uncertainties and other factors which may cause the actual results, performance or achievements of the company to be materially different from any future results, performance or achievements expressed or implied by such forward-looking statements. Such factors include general economic and business conditions, the ability to fund operations, the ability to forge partnerships required for deployment, changes in consumer and corporate buying habits, chip development and production, the rapid pace of change in the technology industry and other factors over which Wave Systems Corp. has little or no control. Wave Systems assumes no obligation to publicly update or revise any forward-looking statements.
Hefty PC.
http://www.heftypc.com/legal.htm
States: Here is a listing of owners and their trademarks found on this site.
Wave Systems - Embassy.
I have not found Wave listed anywhere on the site yet.
CIARATECH.
Ciaratech is a world-class technology provider in the business of designing, developing, manufacturing, marketing, servicing, and supporting a variety of computer systems. Computer systems include desktop and mobile computers, graphic workstations, rack-mounted and tower servers, networked storage, the newly acclaimed VXRACK™ Cluster Technology, VXSTOR™ iSCSI storage systems and the revolutionary CIARATECH Thin Client.
The company's state-of-the-art servers, supercomputer clusters and iSCSI storage solution are primarily based on the Intel IA32 or IA64 architecture and utilize Microsoft Enterprise Operating Systems as well as Linux Operating Systems, today's fastest growing segment of the server market. We are proud to be recognized by Intel as an "Channel Partner Premier Member".
CIARATECH also provides end-to-end manufacturing solutions, delivering world-class quality and support to medium and large OEMs primarily in the communications, computing, defence and industrial markets. CIARATECH is at the forefront of the computing industry due to its commitment to leading or bleeding-edge technology, cost-effective manufacturing and unparalleled customer service.
Incorporated in 1984, CIARATECH has achieved its 23rd year in business in the Information Technology field. CIARATECH products are UL, CE, DOC, EPA certified and built under the ISO 9001 standards and regulations. The growth of CIARATECH enabled a move in February 2003, to an ultra-modern plant of 576,000 sq ft, with the capability of producing more than 1,000,000 units per year. CIARATECH is now one of the largest Canadian manufacturers of Intel based computers.
http://www.ciara-tech.com/html_en/partners.asp Intel, Microsoft, Seagate, Sony, Samsung, Falconstor.
Computer Dealer News certifies that Hypertec Group ramked as the No. 7 Solution Provider in the 2006,Computer Dealer News top 100 solution provider survey.
Located in Saint-Laurent, Quebec, HyperTec Systems is part of a privately held group of vertically integrated companies with over 240 employees and regional offices in Ottawa, Quebec City, Chicoutimi, Mississauga, and Calgary. We offer design, development, distribution of brand-name computer products, after-sales service, technical support, integration and the development of solutions.
Leadership
HyperTec consistently make its mark among the leaders in the Solution Integrators and Value Added Resellers (VAR) market. The Company has attained its status as a prominent computer enterprise with commercial, industrial and financial corporations through its strategic alliances with manufacturers, software houses and consulting firms. HyperTec is known for its expertise in state-of-the-art technology, and our reputation is based on offering the most economical, effective, and reliable solutions at the best available price in the industry. Evans Research Corporation's last Report on October 2003 on the Canadian IT world put Hypertec among the top ten largest VAR's.
We Understand our Clientele Needs
Customer satisfaction is our top corporate commitment. Hypertec is valued for the deep trust and understanding of its clientele needs. Conscious of the high-tech evolutionary computer marketplace, the company prides itself in its ability to analyze customer's needs and to offer unique and reliable solutions.
As the saying goes: " Behind every successful company, there is the people". HyperTec is proud to offer you only professional, tech-savvy, customer-oriented Associates and Service staff Therefore, we place much emphasis on the technical training and relationship skills built up among our people. HyperTec is known for its Experienced, Reliable, Honest and Highly trained professionals who are committed to serve its customers. Our people are focused on finding you the technology you want, or helping you find the solution that best meets your needs through our wide sourcing relationships.
Quality Assurance Policy ISO 9001:2000
Our customer satisfaction stems from our commitment to high-quality standards and serves as the foundation of our Quality Management System. HyperTec strives to provide the Clientele with the best possible customer experience. We submit our continuous Quality Process to two required Audits, one yearly one and a re-certification process every three years. This on going effort allows us to obtain the ISO 9001:2000 certification award, thus strengthening our leadership in the Canadian IT field.
HyperTec Quality Management System is applied to all services related to Consulting, Development, Sales, Integration, Installation and Servicing of Computer products and Business Continuity.
Superior Vendor Alliances
HyperTec is a leading provider of technology solutions for government, education, and business. Our success stems from our ability to ensure we can source virtually any product for you at competitive pricing. HyperTec is your principal source of technology products and services. We have access to a wide product selection from such leading manufacturers as Toshiba, Hewlett Packard, Microsoft, 3Com, Cisco, Philips, ViewSonic, Symantec, Epson, Lexmark, IBM, NEC, Samsung, Sony...
Not only do we offer more choices, better value and more product availability for our Clientele, we service them with our full-time qualified staff including certified technicians from Cisco, Microsoft Solutions Provider, Novell, Citrix, HP, and so on... In terms of support, we provide telephone service support, complete custom installation and repairs at our facility configuration center.
Our Expertise
HyperTec serves public and private sector clients across the country, delivering products and services to a variety of industry sectors including federal, provincial and municipal governments, school boards, health care, financial, legal and professional institutions, and export...
HyperTec delivers innovative and adaptive IM/IT solutions including:
• Infrastructure: Combines solutions for networking & security, network monitoring, storage (DAS, NAS, SAN), server technology, HPC blade servers, ...
• Personal Computing: Offers a complete range of desktops, workstations, notebooks, handhelds, wireless devices, displays, and printers.
• Professional Services: Includes technology deployment, data protection and recovery, business continuity, high-availability and disaster recovery planning for your infrastructure and business solution.
Another PC w/Wave Embassy.
Discovery / Enterprise TP (D945TP)
http://www.ciara-tech.com/html_en/products.asp?product=pcdetp§ion=specification
Motherboard
Intel® D945GTP (µATX form factor)
Chip set
Intel® 945G Express
Processor
Single Intel® processor with LGA775 connection
Intel® Celeron® D 2.53 GHz to 3.26 GHz
Intel® Pentium® 4 with HT technology, 2.8 to 3.8 GHz
Intel® Pentium® D 2.8 to 3.2 GHz
Front Side Bus Speed
533, 800 and 1066 MHz
Cache
2 X 1 MB level 2 for Pentium® D
1 or 2 MB level 2 cache for Pentium® 4
256 KB for Celeron® D
Memory
Dual channel memory controller supporting a maximum of 4 GB DDR2 memory PC400, PC533 or PC667 non-ecc. Four DIMM connectors organized in two banks of two 240 pins sockets. For optimal performance, the DIMM’s must be paired identically in each of the banks.
Hard Disk Drive
1 parallel ATA interfaces supporting 2 IDE ATA100 units (PATA)
4 serial ATA interfaces supporting one unit each (SATA)
ICH7-R hub for RAID support on SATA interface (on TPLR + TPLKR)
Expansion
1 PCI Express x1 slots and 2 PCI slots
One PCI Express x16 video slot
Video
Intel® Graphics Media Accelerator 950 video controller, DPMS compliant, up to 224 MB DVMT 3.0 video memory
Integrated audio
Intel® High Definition Audio controller with Sigmatel STAC9223 codec,
Flexible 6-channel audio with jack sensing
Integrated Network Interface
Intel® 82562GX/82562GZ 10/100 Mbit/s 100 BaseTX or Intel® 82573E/82573V/82574V Gigabit 10/100/1000 Mbit/sec solution with RJ45 and Wake on LAN (WOL).
Interfaces
USB 2.0 (4+4), serial, keyboard, mouse, parallel (EPP et ECP), video port, RJ45, audio ports (3+2).
Casing
Any Intel® Pentium 4 approved casing, µATX or ATX form factor
Discovery is built in a desktop casing and Enterprise uses tower casing.
Available in black or beige (platinium)
Power Supply
Adapted to Pentium® 4 technology
Floppy Drive
Internal 1.44 MB
Optical Drive
Wide choice of optical drives and writers available.
Software included
Intel® Express Installer
Intel® Desktop Utilities
Intel® Audio Studio
Yahoo!® Toolbar with Anti-Spy
Norton Internet Security™ 2005
Jasc® Paint Shop Photo Album 5 Starter Edition
Musicmatch® Jukebox (TPL + TPLR)
InterVideo® Home Theater™ Silver (TPL + TPLR)
InterVideo® MediaOne® Silver
Farstone® RestoreIT!® Lite (TPL) and Gold (TPLR + TPLKR)
NTI® CD-Marker (TPLR)
Norton® Antivirus (TPLR)
Farstone® GameDrive (TPLR)
Farstone® VirtualDrive (TPLKR)
LANDesk System Manager® (TPLR +TPLKR)
Wave Systems® EMBASSY® Trust Suite (TPLKR)
Security Features
TPM provides hardware-based protection that secure your data's confidentiality. (on TPLKR model)
Casing intrusion switch installed and functional
Security loop to prevent case opening and to secure PC.
Password protected CMOS utility program
BIOS default boot device option protected by password
Management Tools
DMI LanDesk Client Manager Browser
Updatable BIOS from either floppy drive, hard drive or network
CIM, SMBIOS, DEN, WBEM and ASF standards compliant, latest versions
DMI 2.0 compliant Hardware Management System
Intel® Active Management Technology (on TPLKR model)
Environmental Features
CPU fan speed adjusted depending on CPU temperature
Overheat protection and shut down
APM 2.0 and ACPI 2.0 compliant Power Management
Power cosumption depending on system load (EIST)
EPA Energy Star standard compliant
Warranty
One year, parts and labour, return to Ciara Technologies
Awk.
Do you think this will have any impact on the following also from last September?
September 14, 2006
i2 Telecom Ready to Ink Deal With Wave Systems
i2Telecom International Inc. is reportedly considering a deal with Wave Systems Corp. which will bring added security and a more seamless calling experience to users of its VoIP service. The proposed deal, which was announced Tuesday, is subject to completion of integration and development work, as well as the associated documentation.
If the deal happens, current and future customers of i2 Telecom will have a much easier time using the VoIP service via their PCs, because they will no longer have to enter passwords for authentication. Instead, authentication will occur automatically via a Trusted Platform Module (TPM), a security chip installed on the motherboard of the user’s PC (new PCs shipping today would have the chip installed).
As per the deal, Wave Systems would promote i2Telecom’s VoIP service as part of its third-party services program for the EMBASSY Trust Suite software (ETS), which assists users in managing the Trusted Platform Modules on their PCs. The suite enables features such as automatic storage and recall of passwords and logon information.
Providing the letter of intent between the two companies is signed, i2Telecom will become the first VoIP service to take advantage of the added convenience and security of integrating its service with a TPM. In addition to being able make calls without the intrusion of entering passwords or login information, users will also gain added assurances against account theft and security breaches.
“For the power user of integrated VoIP telephony, we plan to make accessing landline phones, or making calls to another PC more seamless and secure,” said Paul Arena, Chairman and CEO of i2Telecom, in a press release “We’re excited about the prospect of bringing the i2Telecom voice platform to corporations and consumers alike by leveraging the benefits of the TPM and the expanding services platform enabled by Wave’s EMBASSY Trust Suite.”
Wave’s subsidiary Wavexpress, Inc. will provide the back-office systems for enabling new subscribers of this product. Details of the project remain subject to the negotiation and execution of a definitive development agreement.
Wave’s EMBASSY software leverages the open standards specified by the Trusted Computing Group (TCG), an industry standards body. The computer industry has already shipped tens of millions of PCs embedded with TPM chips.
AuthenTec to Showcase Biometric Cell Phone Applications During TCG ''Security and Mobile Devices'' Seminar at CTIA Wireless Conference; Company joins Nokia, VeriSign and Wave Systems
Sept 22, 2005
AuthenTec, the world leader in fingerprint sensor innovation and sales for more than five years, will demonstrate the benefits of biometric security in mobile commerce, wireless gaming and other cell phone applications during the Trusted Computing Group's seminar September 27 at the CTIA Wireless I.T. & Entertainment Conference.
AuthenTec Vice President Art Stewart will present with representatives from Nokia, VeriSign and Wave Systems during the "Security and Mobile Devices" seminar, scheduled from 1-5 p.m. at the Moscone West Convention Center in San Francisco, California.
AuthenTec sensors are used in nearly 4 million cell phones -- combining security with a broad range of features and functions that are controlled at the simple touch or swipe of a finger. In security, the sensor replaces passwords and authenticates the phone's user - protecting buddy lists and stored photos, and providing additional security for m-commerce and mobile banking services that are gaining popularity worldwide. The same sensors enable users to easily personalize and operate their cell phones with multi-finger speed dial, instant buddy list access, and other functions. In addition, the sensors provide easy full navigation for wireless gaming.
During the seminar, TCG Working Group members will discuss the role of industry standards, next steps to ensure that data and transactions are safe, authentication in mobile systems, mobile phone integration and other topics related to mobile security.
Wave/MTM.
From last September.
Wave Systems Wave to Support Trusted Computing Group's Security Specifications for Mobile Phones; Pledges to Extend EMBASSY(R) Trust Suite
Wave Systems Corp. (NASDAQ: WAVX; www.wave.com), a leading supplier of security software products and services for Trusted Computing and a founding member of the Trusted Computing Group (TCG) (www.trustedcomputinggroup.org), announced plans to extend its EMBASSY(R) Trust Suite software in support of the newly published TCG security specifications for mobile phones. The announcement of the open, non-proprietary security specifications called Mobile Trusted Module (MTM) came this week at the Cellular Telecommunications & Internet Association Conference in Los Angeles.
Once implemented, the industry-endorsed standards will enable users to strongly authenticate their mobile devices to their PCs in order to replicate sensitive personal information, such as address books and digital wallets, as well as to determine the "trustworthiness" of a given mobile phone. The specifications also call for the use of a common key management infrastructure for the protection and backup of passwords and important data.
"As mobile phones have evolved into multi-function communications devices with robust connectivity to voice, e-mail, corporate networks and the Internet, the requirement for stronger security has never been greater," noted Lark Allen, Executive Vice President, Wave Systems.
"The TCG mobile phone specifications represent an industry-wide effort to define an open security standard that will bring benefits to many involved with mobile devices, from the end-user to the network provider to the device manufacturer." "Wave looks forward to working with our industry partners to deliver TCG-based support for mobile devices in addition to currently supported TPM-based PCs and trusted encrypting disk drives," he added.
With its endorsement of the mobile phone specifications, Wave has signaled its intention to adapt its EMBASSY Trust Suite (ETS) PC and server software to work with the TCG standards developed for the mobile phone arena. Wave's ETS is now designed to help users manage the Trusted Platform Modules (TPMs) on their PCs, with functionality that includes storing and recalling passwords and logon information, document protection, digital signatures and robust key management. The MTM operates in a similar fashion as a TPM, but has been adapted for mobile phones.
About the TCG's Mobile Trusted Module (MTM) Specifications:
The MTM specification represents a first step towards a stronger security solution for enhanced user privacy and reduced risk of handset theft. Moreover, the specification should enable the development of advanced applications and services within the mobile industry environment.
MTM is an open specification for common TCG security building block functions which can be used in a mobile phone security solution.
A phone that employs this technology would typically contain multiple MTMs, all of which provide similar functionality to existing TPMs and some of which have additional functionality to boot parts of a phone into a preset state, as described below. The MTM includes many of the same requirements as TCG specifications for TPMs for personal computers. However, the MTM specifications also provide new functions which have been developed specifically for mobile devices. Some adaptations are a response to restrictions inherent in today's phone technologies.
MTMs built using the TCG specification are called Mobile Local-owner Trusted Modules (MLTMs). Additionally, a second type of MTM implementation enables the phone to boot into preset states. These MTMs are called Mobile Remote-owner Trusted Modules (MRTMs), since they enable remote entities (such as the phone manufacturer and the cellular network provider) to preset the operation of some parts of the phone (such as access to the 15-character International Mobile Equipment Identity -IMEI and the cellular network).
The TCG aim has been to develop safer mobile platforms and establish an open industry standard for the increasingly sophisticated mobile phone ecosystem that offers added value to private users, businesses, IT companies and networks. In a nutshell, the Mobile Trusted Module is a verifiable security component that enables a trusted computing framework for mobile devices in the environment in which they are used.
Copies of the TCG Mobile Phone specification can be found at www.trustedcomputinggroup.org
Santa Rosa.
Santa Clara (CA) – Intel today launched four new Core 2 Duo processors as part of the much anticipated “Santa Rosa” platform, which not only enhances the Centrino platform core components, but offers completely new features such as optional flash cache as well as wireless broadband capability.
New in the ICH8M enhanced version is the activation of Intel’s the firm's La Grande technology, now called “Trusted Execution Technology” (TXT), which will be available in business-targeted “Centrino Pro” versions of Santa Rosa. TXT follows the specifications of the Trusted Computing Group (TCG) via a trusted platform module (TPM) and will allow customers to better safeguard the information that is stored on their systems.
http://www.tgdaily.com/content/view/31958/135/
EMBASSY/LINUX.
So, the new Sahara Slate PCS (according to manual) feature an Icon for Launching the ESC and it appears all feature TPMs. There is a choice of operating systems. So, will ESC be a feature on the openSUSE linux PCs?
The new Sahara Slate PCs come preloaded with your choice of Operating System, including the new Microsoft® Windows Vista™, Windows XP Professional, or openSUSE Linux 10.2.
http://www.tabletkiosk.com/products/sahara/i400s_pp.asp
Principal Software Engineer - Solutions Team - Cupertino, CA (job open 10/02/06)
Job description:
Candidate is responsible for the architecture, core design, and development of pre-boot authentication applications for Wave EMBASSY Trust Suite. Candidate must be able to help define, analyze, design and document architectural solutions based on a variety of platforms and technologies including biometrics, smart cards, hard disk drives, distributed systems management, and service oriented architectures for Linux based security applications. Candidate must be able to lead software development, integration and testing.
Job requirements:
• BS in Computer Science or Engineering.
• 7-10 years of relevant experience.
• Strong technical knowledge and hands on C/C++ development experience on Embedded Linux platforms, Linux kernel configuration and installation, Linux device drivers.
• Preferably, both Linux and Windows development experience.
• PC BIOS architecture knowledge is a plus.
• Excellent OO design, development and debugging skills.
• Experience in designing GUI and multithreaded applications.
• Knowledge or experience developing of security applications utilizing PKI, X.509 and RSA PKCS standards.
Interested candidates may mail, fax or email their resume to:
Recruiting
Wave Systems Corp.
19925 Stevens Creek Blvd.
Suite 220
Cupertino, CA 95014
Fax: 800-542-3220
Email: jobs@wavesys.com
Intel® Desktop Board Software Provides Advanced Security, Multimedia, Integration.
Overview: Designing for the Digital Home and Office
Implementing and managing PCs just got simpler for integrators of both home and office desktops. Intel® Desktop Boards now come with a comprehensive and robust set of software applications that give integrators and end users everything from enhanced video and sound, to real-time collaboration between geographic locations, to security and trusted systems. These applications were selected to align with Intel's vision of the digital home and digital office, in which computers are more usable, more connected, and more secure at all times.
Intel is offering integrators three types of software with every Intel Desktop Board:
• Software for the digital home
• Software for the digital office
• Software tools for integrators
Software for the Digital Office
Intel Desktop Boards give you several powerful solutions focused on the digital office, from an advanced BIOS and specialized hardware, to desktop health and management tools, plus security for online sessions and personal information. Intel's unique features and value-added software make Intel Desktop Boards stand out from the competition, with tools that users demand in today's digital office and online, Internet-centric world.
EMBASSY* Trust Suite
From big businesses to individuals and across industry lines, one of the highest-priority concerns of users remains the security of their systems. Trusted Computing Group (TCG)-compliant solutions are increasingly in demand.
EMBASSY* Trust Suite (ETS) is a robust and practical set of services, applications, and utilities for a trusted computing environment. The suite makes it easy to enable the enhanced hardware-based security features of the Trusted Platform Module (TPM) security chip included on Intel Desktop Boards.
With ETS Document Manager, you can easily create separate vaults of sensitive files that remain protected by the TPM's security. In a business environment, users can share one or more vaults with other users having TPM-enabled systems without compromising the protection of the vaults. Private Information Manager works behind the scenes to keep application and Web site passwords truly secure and in one place. When needed, this tool automatically retrieves data for email or Web site logins, shopping orders, banking, and other online activities, adding convenience without relying on insecure software. The TPM also supports uses such as secure digital signatures, which users can try out using SmartSignature*.
Underlying all of these applications is the Wave* TCG-Enabled cryptographic service provider (CSP). Requests for applications or certificates can use the Wave TCG-Enabled CSP to add hardware-based security to email, virtual private network (VPN) access, wireless network access, and more. To ensure recovery of the protected data, the Key Transfer Manager automatically backs up the appropriate TPM keys, which keep data safe. Finally, Launch Pad places all TPM-aware security applications in a single convenient location.
http://www.intel.com/technology/magazine/computing/desktop-board-software-0305.htm
About TabletKiosk
TabletKiosk was founded in 2003 to offer the latest in mobile computing and kiosk hardware solutions.
Our partnership with application providers throughout the world has allowed us to identify and distribute world-class mobile solutions that are best suited for our targeted vertical markets including Education, Medical/Healthcare, Local/Federal Government Sector, Home Automation, Control Systems and Hospitality / Gaming. To provide the highest level of service possible, we work closely with our customers to identify potential challenges, stay informed about industry trends and provide solutions that affect the current marketplace.
Together, the TabletKiosk team has over 80 years of combined industry experience to assist our customers with their mobile computing needs. For custom requests, the TabletKiosk team can also design, prototype and deliver the right solution to suit individual project needs. By working closely with various manufacturing partners for system consulting, product design, manufacturing, packaging and assembly, we are able to deliver the desired results to ensure our customers ultimate satisfaction.
Establishing targeted strategic partnerships has played a vital role in the company’s growth. By working closely with industry leaders, including Microsoft, Intel and VIA, TabletKiosk has established itself as a company that strives to innovate.
TabletKiosk is headquartered in Torrance, CA and operates an engineering facility in Taiwan.
TableKiosk Featuring Embassy Security Center.
User Guide Sahara Slate PC i440
http://www.tabletkiosk.com/support/files/Sahara_i400/TK_Sahara_i400_User_Guide_en01.pdf.
SecuringYour Sahara Slate PC
Your Sahara Slate PC is equipped with a Trusted Platform Module and a biometric fingerprint reader that can better secure your data from intruders. This chapter will get you started with the included Wave Systems Embassy Security Center (ESC) and the VitaKey Fingerprint Security Application. For more information and additional features of the ESC software, read the included Online Help located in your START Menu in“All Programs > Wave System Corp”.
Chapter 04: UsingYour Sahara Slate PC with Windows XP
Taking Ownership of the TPM
After initializing theTPM functionality in the BIOS, the next step to securing your Sahara Slate PC is to establish yourself as the tablet’s owner.
1. Launch the ESC software by double tapping on the short-cut icon located on your desktop. If there is no short-cut icon on your desktop, go to the START Menu and tap on “All Programs > Wave Systems Corp > EMBASSY Security Center”.
2. In the far left column, select “ESC Manager” and then tap on “Owner”in the menu bar.
3. Under the section entitled“Own”, tap on“Establish”. Enter your user name and password when prompted.Tap the “OK”button to accept the ownership information.
For more information on using the ESC to secure your data, please see the Embassy Security Center Online Help included with the software.
http://www.tabletkiosk.com/products/sahara/i400s_pp.asp
Shipping May 31st (June 15th with Windows Vista)
http://www.tabletkiosk.com/mediaroom/collateral/sahara/TK_Sahara_i400_v01.pdf
General Dynamics-Telos-Wave.
General Dynamics and Telos Enter Agreement to Provide Mobile Rugged Computing Equipment for Army Program
SPOKANE, Wash. — April 10, 2007 — General Dynamics Itronix® today announced a reseller agreement with Ashburn, Va.-based Telos Corporation for provision of rugged computing equipment for Army customers in office environments. The agreement includes rugged handhelds and laptops, including the Duo-Touch™ Rugged Tablet PC, GoBook® VR-1 semi-rugged notebook and the award-winning GoBook XR-1 fully rugged notebook.
Telos is a prime contractor under the Army Desktop and Mobile Computing-2 (ADMC-2) program. As part of the Army’s Small Computer Program, ADMC-2 focuses on leases and purchases of personal computers, notebooks, ruggedized notebooks, tablets and personal digital assistants as well as printers, digital cameras, video teleconferencing equipment, projectors, displays and high-definition television units. All military services and the Department of Defense agencies may also use the contract, if desired.
Vendors have a 10-year period of performance—a three-year base period, three two-year options and a one-year option — with a maximum ceiling of $5 billion under the ADMC-2 contract which is managed by the Program Executive Office-Enterprise Information Systems’ (PEO-EIS) of the Army Small Computer Program.
“Our business partner agreement with Telos is a great development for Army customers as it provides them with the best choice in rugged mobile computing, featuring enhanced processing performance and advanced capabilities in wireless and security in all our products,” said Vince Menzione, vice president of defense markets for General Dynamics Itronix. “The Army is leveraging their buying power for the best prices from hardware vendors, and we look forward to serving those customers during procurement through Telos and beyond.
“We’re proud to offer the General Dynamics family of rugged laptops and handhelds as part of the ADMC-2 procurement contract,” said Warren Jones, vice president of Marketing at Telos. “This is an important addition to our product offerings and we look forward to working with Itronix.”
General Dynamics Itronix is a world-class developer of wireless, rugged computing systems, applications and technology for mobile workers in a variety of commercial field service markets, the government and military, Itronix exemplifies the computing technologies capabilities of General Dynamics, offering a full range of wireless field computing systems, from handhelds to notebooks to tablet PCs, mobile servers and thin clients. General Dynamics Itronix is based in Spokane Valley, Wash. with European operations in Coventry, UK. General Dynamics Itronix is a part of General Dynamics C4 Systems, a leading integrator of secure communication and information systems and technology. Additional information about products and services is available at www.gd-computing.com.
http://www.gdc4s.com/news/newsprint.cfm?prid=248
US Army Awards Desktop and Mobile Computing Purchase Agreement to Telos
ASHBURN, Va. -- May 11, 2006 -- The U.S. Army has awarded Telos® one of nine Army Desktop and Mobile Computing-2 (ADMC-2) contracts designed to standardize desktop and notebook computer purchases. The agreements allow the Army and the rest of the federal government to enter sole-source purchasing agreements with the nine vendors. The contracts cover a three-year base period with three two-year options and a one-year option, during which purchases can be made directly from vendor catalogs without the need for issuing requests for proposals (RFPs) or open competition. A $5 billion ceiling covers the base period plus the options.
The government may purchase a variety of hardware from Telos’ catalog, as well as services such as technical support, installation, integration and help desk support. According to Ralph Buona, vice president of business development, Telos, commodity purchase agreements like ADMC-2 provide many benefits to the Government.
“These agreements allow the government to save time by getting many of its needs fulfilled in one place,” said Buona. “They decrease the need to purchase from multiple vendors while minimizing administrative and accounting costs and enhancing user productivity by allowing users to contact one company for service and support.”
http://www.telos.com/company/news/default.cfm?contentID=118
Setting a new standard for high-performance rugged notebooks
Project "Titan"
Itronix, a General Dynamics company, has released the successor to its venerable and successful GoBook III rugged notebook computer. In this article, we're taking a detailed look at the remarkable new GoBook XR-1. .....
Security
Security is becoming an ever more important issue, and that includes both protection from various nasties that find their way into our computers as well as access control and data protection. The latter two are especially important in corporate and government applications where many XR-1s will be doing duty. It's therefore no surprise that Ironix paid special attention to security. That starts with common password protection, including pre-boot passwords, and goes on to "SuperPasswords" that can be used to selectively disable I/O devices. The XR-1 uses TPM v1.2 where a
STMicroelectronics "Trusted Platform Module" security chip generates cryptographic keys that can be used in a variety of ways to preserve software and data integrity. Many corporate users rely on Smart Cards for access security and identification, and so an optional Smart Card reader is available. Fingerprint scanning and authentication is another technology that is increasingly integrated into notebook computers. A fingerprint scanner is also optionally available for the XR-1. On the software side, Wave Systems' Embassy Security Center handles all of the TPM functions, including password management and other authentication. For fingerprint biometrics the machine uses OmniPass software, by Softex Inc.
http://www.ruggedpcreview.com/3_notebooks_itronix_xr1.html
Shareholder advisory committees.
US firms may give shareholders more say on board nominees
Apr 13, 2007
In an effort to tame activist investors' increasingly aggressive bids for board seats, some companies are exploring ways to give shareholders more say when new directors are nominated.
If shareholders could influence the choice of board nominees, the theory goes, they would be less likely to wage war against their elections down the road. Such thinking has emerged as fights for board seats have become more frequent and more heated, and as shareholders agitate for the right to list competing candidates on company voting materials.
"There are some very detailed discussions going on about how to find the middle ground," said C. Warren Neel, a director at public companies including Saks Inc.
Boards are looking for ways to balance investors' growing appetite for board representation while still preserving their ability to have final say on who gets nominated, said Neel, who is also executive director of the University of Tennessee's Corporate Governance Center in Knoxville.
Strategies - still in their infancy - include posting "help-wanted" ads on companies' Web sites when board seats open up and disclosing what became of shareholders' recommendations.
One of the more daring options that boards are exploring, according to some shareholders and governance professionals, involves establishing advisory committees that would give large, long-term shareholders a formal platform for vetting candidates and raising issues with boards' nominating committees.
UnitedHealth Group Inc. formed such a committee late last year as part of a broader effort to regain shareholders' trust following a stock-options backdating scandal. The committee, consisting of four shareholder representatives and one medical expert, will help the board search for five new directors over the next three years.
"It's an opportunity to more tightly align the board's interests with (those of) long-term shareholders," said John Penshorn, senior vice president of investor relations at UnitedHealth. Penshorn wouldn't say which investors are serving on the committee, as they have asked to remain anonymous.
Home Depot Inc.'s board, still recovering from a raucous battle with shareholders over former Chief Executive Robert Nardelli's huge pay packages, is in talks with investors to do something similar, according to people familiar with the situation.
Home Depot officials wouldn't say whether such discussions are going on. "Listening to our shareholders and maintaining an ongoing dialogue with them is a top priority for the Home Depot," the company said in a written statement.
Even if Home Depot doesn't create an advisory committee or other formal channel, the board's nominating committee has been meeting actively with large investors - including unions and public pension funds - to hear their concerns as it searches for candidates to fill four seats before next year's annual meeting. The company promised in February that the board would seek input from shareholders in identifying candidates.
Most boards have some formal method in place for gathering shareholder input on director candidates. But the current processes are ineffective, say shareholders and governance experts. The most common method - usually described in a paragraph in companies' proxy materials - is for shareholders to mail nominations to the company's corporate secretary by a certain date.
"It's a letter that gets summarily rejected, usually," said Richard Ferlauto, director of pension and benefit policy for union shareholder American Federation of State, County & Municipal Employees. And for good reason, too, as shareholders are forced to make recommendations without a clue as to the qualifications the board is seeking, said Ferlauto.
A number of improvements to existing procedures are being discussed. Peter Gleason, director of research at nonprofit group National Association of Corporate Directors, thinks boards should disclose in their proxy materials how they have handled the requests they receive.
Shareholders are reluctant to submit recommendations under the current process because they don't know if they will be taken seriously, said Gleason, who has been talking with boards about adopting changes. "You're always skeptical of something that doesn't tell you what happens next."
Some companies are also considering posting information on their Web sites to inform shareholders about the characteristics and qualifications they are looking for when board seats open up, said Neel. This could result in more usable suggestions. Also, it allows boards to reject candidates who don't meet their needs without seeming to dismiss shareholders' nominees out of hand, said Neel, who will be talking about this with directors from 15 companies next week.
House bill gives shareholders advisory vote on executive pay
04/20/2007 09:26:52 AM PDT
WASHINGTON - The House voted Friday to give shareholders at public corporations a voice in executive pay packages that typically equal 500 times the salaries of workers at those companies.
The shareholder vote under the bill would be advisory only. But Democratic backers of this provision said that investors need a say when companies losing money or laying off workers are paying executives eight- and nine-figure salaries and retirement packages.
"This is not an aberration, and there is a hue and a cry from the American people across the American landscape that is saying something must be done," said Rep. David Scott, D-Ga.
The bill, which passed 269-134 and now goes to the Senate, was opposed by the White House and most Republicans. They argued that the Securities and Exchange Commission has recently taken steps to make corporate pay packages more transparent and that Congress should stay out of corporate affairs.
President Bush earlier this year questioned the extravagant pay of some company managers and directors, but said it was not a matter for government involvement.
"There is no justification for many of these pay packages," said Rep. Spencer Bachus, R-Ala., top Republican on the House Financial Services Committee. But "this is Congress beginning to intrude on corporations."
The bill, sponsored by committee chairman Barney Frank, D-Mass., establishes an annual nonbinding vote on executive pay packages and calls for an advisory vote if a company awards a new golden parachute package while simultaneously negotiating the purchase or sale of the company.
Frank noted that the SEC had recently required corporations to include a chart of compensation for top officials but had said it did not have the power to compel a vote on executive pay. He said the bill requires corporations "simply to add to that a box that says 'I approve/I disapprove."'
Investor advocates, union pension funds and shareholder groups have supported the legislation, but GOP opponents expressed concerns it would give such groups an inroad to change a company's policies.
"It greatly worries me that this bill could set a precedent of giving activist institutional investors, who may have their own political and social agendas unrelated to the financial wealth of the companies, more influence," said Rep. Mike Castle, R-Del.
Republicans unsuccessfully offered amendments requiring pension funds and other shareholder groups to reveal their spending or their votes on compensation issues. Also defeated was a proposal by Rep. Scott Garrett, R-N.J., that would have eliminated the shareholder vote when compensation packages do not exceed averages at comparable companies by more than 10 percent.
Democrats, while stressing that the bill makes no judgment on what is excessive pay, cited studies that the average CEO of a Standard and Poor's 500 company receives $14.78 million in compensation.
Rep. Brad Miller, D-N.C., said that 15 years ago the average CEO made 140 times what a worker at his company earned but that now the difference is 500 times. He said the aggregate compensation of the top five executives is now 10.3 percent of the corporate profits of public corporations.
Shareholder votes on pay have been adopted in Britain, Australia and Sweden, and advocates say that, while pay packages are rarely rejected, the votes help to keep executive compensation in check.
The bill is H.R. 1257
Frederic W. Cook & Company.
Enter Mr. Cook. In 1988, he came up with a new type of stock option — the reload — that put him and his firm on the map.
http://donmihaihai.wordpress.com/2006/10/16/agency-problem-at-its-darkest/
Reload stock options - The first ten Years.
http://www.fwcook.com/rso/
Patent 6,618,806.
Looks like an important patent. Any implications with Wave's work going back to SSP Lironic - Saflink?
In addition to the software products acquired, IdentiPHI received a royalty-free, non-exclusive license right of use for Saflink's Patent No. 6,618,806, or 806 Patent, issued September 9, 2003. The terms of the agreement include provisions for IdentiPHI to jointly enforce and seek remedies from infringers of this patent with Saflink. Many existing biometric solution providers use a matching process similar to the one outlined in the 806 patent. The 806 Patent is a process for controlling access to a computer network using biometric authentication. The patent primarily addresses a critical step in biometric authentication -- the policy system. The invention provides the flexibility administrators need to tailor biometric security for users within their organization. This patent describes how to control access in a computer network environment with a policy-based biometric authentication solution. For instance, it applies to systems that obtain a user's ID, determines which biometric to use for authentication (using either a user-specific policy or a system default policy), captures the user's biometric, compares the live sample to a record on file, and allows the user to log on if matched. http://www.prnewswire.com/cgi-bin/stories.pl?ACCT=104&STORY=/www/story/03-20-2007/0004549868&...
Patent 6,618,806:
System and Method for Authenticating Users in a Computer Network issued September 9, 2003, describes what we consider a fundamental process for controlling access to a computer network using biometric authentication. The patent primarily governs what we believe is a critical step in biometric authentication—the policy system. The invention, currently outlined by 10 claims, provides the flexibility administrators need to tailor biometric security for users within their organization. This patent describes how to control access in a computer network environment with a policy-based biometric authentication solution. It applies to any system that obtains a user’s ID, determines which biometric to use for authentication (using either a user-specific policy or a system default policy), captures the user’s biometric, compares the live sample to a record on file, and allows the user to log on if matched. http://www.saflink.com/leadership/saflink-patents.html
Saflink and Digital Persona Announce Settlement of Patent Infringement Lawsuit
BELLEVUE, WA – (March 14, 2006) – Saflink® Corporation (NASDAQ: SFLK) and Digital Persona, Inc., today announced the parties have reached an amicable settlement of Saflink’s patent infringement lawsuit against Digital Persona under U.S. Patent 6,618,806, that establishes a method for authenticating users to a computer network. Under the terms of the settlement, Saflink has agreed to dismiss all pending legal claims against Digital Persona, and to grant a royalty-bearing, non-exclusive license to the ‘806 patent family to Digital Persona. In addition, Digital Persona has agreed to grant a royalty-free, non-exclusive license to its U.S. Patent 6,125,192 patent family for a fingerprint recognition system. Other terms of the settlement are confidential and were not disclosed.
“We are very pleased to reach a favorable settlement with Digital Persona regarding our patent rights," said Glenn Argenbright, President and CEO of Saflink. “This settlement demonstrates the relevance of our intellectual property portfolio to the challenges faced everywhere today to secure computer networks against intrusion and loss. We believe that our patents and intellectual property are valuable assets, and we will continue to vigorously protect our rights.”
Wave's EMBASSY Trust Suite to Support DigitalPersona Pro Fingerprint Authentication Server Endpoint Security Enhanced by the Combination of User and Machine Authentication
LEE, Mass.--(BUSINESS WIRE)--Wave Systems Corp. (NASDAQ: WAVX - News) announced today that it has entered into a license agreement with DigitalPersona, Inc. permitting Wave to incorporate the DigitalPersona® Pro Fingerprint Authentication technology into the EMBASSY Trust Suite® (ETS) Enterprise Edition product family.
Wave's Embassy Trust Suite is a collection of practical, easy-to-use applications that can allow enterprises to enhance PC security by utilizing the Trusted Platform Module (TPM) security chip. The DigitalPersona Pro Server leverages Microsoft® Active Directory to provide secure, centrally managed fingerprint authentication services to an enterprise network.
At the endpoints of all networks sit two distinct entities - the platform, such as a notebook or desktop PC, and the user. Each of these entities could pose security risks. The platform may be corrupted with malware and users may not securely protect their passwords. Most anti-virus software and complex password policies only put a bandage on these problems. To address this, many PC makers are now incorporating platform security solutions such as TPMs and fingerprint readers. Today's announcement brings together Wave, a leader in secure enterprise software solutions and management for TPM's, and DigitalPersona, a leader in enterprise software for fingerprint authentication.
"This support will allow enterprises using Wave's ETS Enterprise products to use the DigitalPersona Pro Server to centrally manage fingerprint authentication policies and credentials via Active Directory. The synergy of DigitalPersona products with Wave Systems' TPM remote management, key recovery, escrow and migration products for Active Directory provide important security back-office components for the enterprise customer," commented Brian Berger, executive vice president of marketing and sales for Wave Systems.
Peter McCoy, vice president of business development for DigitalPersona added, "Enterprises are beginning to take a holistic approach to security, combining the authentication of both the machine and the user. DigitalPersona is excited to work with Wave Systems to provide the power and flexibility of our DigitalPersona Pro fingerprint authentication server component. We believe this combined offering provides a valuable asset to enterprise IT."
The EMBASSY Trust Suite with DigitalPersona Pro Server support is expected to be available in 2007 as part of Wave's ETS Enterprise Edition Software.
IdentiPHI.
Acquisition broadens IdentiPHI's product base to provide enterprise-grade security to its customers.
AUSTIN, Texas, March 13 /PRNewswire/ -- IdentiPHI LLC, announces the purchase of SAFsolution and SAFmodule software from Saflink(R) Corporation and received certain rights under Saflink's patent portfolio. The terms of the agreement were composed of an up-front cash investment as well as ongoing royalties for three years. As part of this agreement, IdentiPHI will assume responsibility for all SAFsolution and SAFmodule customers and resellers.
SAFsolution and SAFmodule are market-leading biometric authentication products that provide enterprise-level security solutions for corporate and government users. Strong authentication methods such as smart cards and fingerprints as well as other biometric methods such as facial recognition, iris, and retina pattern may be used to authenticate users to corporate resources. SAFsolution integrates Microsoft(R) Windows(R) Active Directory to boost network and workstation authentication security and simplify or eliminate password management. SAFmodule brings biometric authentication to Novell(R) eDirectory(TM) networks.
IdentiPHI has been in the authentication and identity management market as an OEM provider of integrated third party products for many years. This acquisition allows IdentiPHI to manage and develop its own intellectual property. IdentiPHI will continue to maintain and grow the existing partnership with Bio-Key International to provide the biometric middleware which will allow IdentiPHI to maintain a hardware-agnostic approach to support biometric hardware.
IdentiPHI will be releasing a major update of the SAFsolution code in summer 2007 to support Microsoft Vista as well as 64-bit versions of Server 2003 and Longhorn. Subsequent releases in late 2007 will incorporate additional security features such as Trusted Platform Module support for key management applications and file / folder encryption. IdentiPHI will further expand on the software offerings of other partners to enhance biometric support to our IdentiPHI Single Sign-On product which is an OEM from ActivIdentity.
"The acquisition of an industry leading brand combined with ourexisting market experience will clearly place IdentiPHI at the top position in this marketplace. The biometric market has been expanding recently as more and more computer manufacturers are imbedding sensors into their notebook platforms. This is the sign that biometrics have made the mainstream and we see exponential growth from here." says Peter Gilbert, CEO of IdentiPHI.
In addition to the software products acquired, IdentiPHI received a royalty-free, non-exclusive license right of use for Saflink's Patent No. 6,618,806, or 806 Patent, issued September 9, 2003. The terms of the agreement include provisions for IdentiPHI to jointly enforce and seek remedies from infringers of this patent with Saflink. Many existing biometric solution providers use a matching process similar to the one outlined in the 806 patent. The 806 Patent is a process for controlling access to a computer network using biometric authentication. The patent primarily addresses a critical step in biometric authentication – the policy system. The invention provides the flexibility administrators need to tailor biometric security for users within their organization. This
patent describes how to control access in a computer network environment with a policy-based biometric authentication solution. For instance, it applies to systems that obtain a user's ID, determines which biometric to use for authentication (using either a user-specific policy or a system default policy), captures the user's biometric, compares the live sample to a record on file, and allows the user to log on if matched
IdentiPHI has partnered with Dell for FOSE 2007 in Washington DC. Stop by to see SAFsolution as well as encryption solutions for US Federal government and the Dell HSPD-12 order ready package.
Wave sold 200,000 shares of Saflink common stock for total proceeds of $289,003, during the quarter ended September 30, 2005, at an average selling price of $1.45 per share, realizing an aggregate gain from the sales of $92,340. Wave did not hold any marketable securities during the quarter ended September 30, 2006.
http://google.brand.edgar-online.com/EFX_dll/EDGARpro.dll?FetchFilingHTML1?SessionID=aaIrjmmKL9rjv2z...
An additional source of cash to fund operations for the twelve-month period ending September 30, 2006 will likely come from the sales of its marketable securities, valued as of September 30, 2005 at approximately $69,216, which consist of 59,670 shares of Saflink's common stock. Wave may sell some or all of its holdings in Saflink, as needed to fund its operations for the twelve-month period ending September 30, 2006.
http://sec.edgar-online.com/2005/11/09/0001104659-05-054091/Section8.asp
Saflink finishes acquisition of SSP-Litronic
Saflink Corp., a provider of biometric security solutions, has completed its $50 million acquisition of SSP-Litronic Inc., a provider of identity management and information assurance products, the company announced today. The purchase was announced March 22. SSP-Litronic of Irvine, Calf. will now operate as a wholly owned subsidiary of Saflink of Bellevue, Wash., the company said.
The purchase will boost Saflink’s authentication offerings through the integration of SSP-Litronic’s identity management products with Saflink’s biometric software. It also will position Saflink for large-scale government security projects, the company said.
The acquisition will let Saflink offer government agencies and commercial enterprises a scaleable and secure framework for identity and assurance management that covers network and application security, physical security, time and attendance, and regulatory compliance for automated manufacturing systems.
The two companies have provided solutions to the National Security Agency, FBI, CIA, Army Corps of Engineers, Environmental Protection Agency, House of Representatives and the departments of Defense, Homeland Security, State, Treasury and Transportation.
June 25, 2001
The World's First, Secure, Real-Time Environment Establishes New
Revenue Channels for Digital Distribution and Safeguards
Intellectual Property Rights
SSP Solutions, supplier of Internet security solutions for finance, health care, business, e-commerce, and entertainment, today announced EDS (NYSE:EDS), the leading global services company, has completed successful testing of the SSP Solution Suite Core Technologies. This successful testing continues to advance SSP as the Trusted Symbol of the Digital Economy. SSP, in conjunction with Wave Systems (Nasdaq:WAVX), offers the first open embedded security architecture simultaneously supporting public key infrastructure (PKI) and multiple standards of digital rights management (DRM).
"EDS' successful testing represents a significant step in market leadership for the SSP Solution Suite of hardware, software, and embedded security products," said Mark McGovern, senior technical director of EDS' Information Assurance Group.
"With no single competitor able to match the elegance of the open, embedded SSP Solution Suite -- its ability to move data without compromise, its focus on protecting revenue streams, and its directive for mass deployment, we are in an enviable market position," said Marvin Winkler, chairman and chief executive officer SSP Solutions.
"With the SSP Solution Suite, SSP is providing a continuously encrypted and controlled mechanism for point-to-point digital communication -- safeguarding intellectual property and establishing new revenue channels in the digital distribution process," said Rob Gorman, president of SSP Solutions. "Historically, open systems for effective digital rights management and practical compensation models have been notably absent. SSP's development represents an important shift in the security arena."
"Wave and SSP have dedicated significant resources to delivering the industry's first comprehensive trust infrastructure, tools, and device components required to create, deploy, and manage Trusted Client hardware devices which are open, shared, and programmable," said Steven Sprague, president and CEO, Wave Systems. "The breakthrough architecture achieved with the SSP EMBASSY(R) Trust System provides the capability for multiple entities, such as service providers, content owners, and individuals, to share a single device while trusting that their individual interests are strongly protected from both local and network sources of attack."
SSP technology, designed to create a secure Internet environment from server to user -- or from the Core to the Edge(TM) of the Internet, delivers a secure, real-time revenue producing environment for content developers and distributors, and brings seamless security and ease of use to the consumer. SSP provides the means for manufacturers of set-top boxes, PCs, PDAs (personal digital assistants), satellite receivers, and other Internet Edge appliances to operate in a secure and trusted environment.
About SSP Solutions
SSP Solutions develops and distributes the SSP(TM) Solution Suite of hardware, software, and embedded security products designed to create a secure Internet environment from server to user -- or from the Core to the Edge(TM) of the Internet. SSP products embed security and trust throughout the transaction chain, protecting electronic communications and financial transactions, network access, and the exchange of copyrighted digital content.
By combining a range of partners, technologies, and intellectual properties, SSP products represent the first, open embedded security architecture simultaneously supporting public key infrastructure (PKI) and multiple standards of digital rights management. SSP's custom-made enterprise security solutions address digital rights management, financial services, government, entertainment, health care, and education -- and form the heart of a 10-year alliance with EDS, the nation's second largest systems integrator and a global leader in information assurance.
SSP Solutions includes XNS (eXtensible Name Service) an open platform using trusted web agents to manage transactions across the information exchange layer of the Internet. This fosters a new level of trusted electronic commerce and redefines the ways people and businesses share information.
SSP Solutions recently announced its intent to merge with Litronic Inc. (Nasdaq:LTNX), a leading provider of authentication and encryption security technology, and form a new entity called SSP Solutions Inc., named for the flagship SSP product line. For additional company information, visit http://www.bizssp.com or call949/655-4500.
About Wave Systems Corp.
Wave Systems' goal is to build a worldwide network of users based on trusted electronic relationships. Trust @ the Edge defines a new architectural model for the Internet, which embeds trust and security in every user device. Wave Systems is developing, deploying, and licensing its EMBASSY Trusted Client technology for the mass adoption of this revolutionary model.
Wave is integrating industry standard functions from a wide range of partners that enable reliable, secure digital exchange, and commerce. Wave Systems and third parties are building the services that will take advantage of this open model.
Safe Harbor Statement Under the Private Securities Litigation Reform Act of 1995
With the exception of historical information, the matters discussed in this news release relating to (i) future business opportunities, (ii) future revenues, (iii) market demand and penetration, (iv) product development and future product releases and product performance, (v) hiring goals, (vi) SSP's ability to expand into new markets, (vii) commercial demand for products, and (viii) the completion of the merger and timing of the closing are forward-looking statements that involve a number of risks and uncertainties. These risks and uncertainties include (i) competition from companies with greater financial and technical resources than Litronic or SSP, (ii) the difficulty in continuing technical innovation and the acceptance of SSP's products in the government and commercial marketplace, and (iii) completion of the merger which is dependent on the execution of a definitive reorganization agreement, approval of the stockholders of each company, and other material conditions. In addition, the success of SSP depends on, among other things, the ability to integrate Litronic products with those of other SSP business partners, the smooth integration of Litronic and SSP personnel, the ability to attract and retain qualified personnel (particularly in light of the competitive market for technical personnel), and receipt of significant orders from commercial customers. Other risks inherent in Litronic's business are described in Securities and Exchange Commission filings. Litronic undertakes no obligation to revise or update any forward-looking statements to reflect events or circumstances after the date of this release.
Re: Defense.
Looks like a lot going in April with Defense. It would be nice if we received some news.
From Wave's site:
DoD IPM (Identity Protection & Management Conference)
April 16 - 20, 2007
Adam's Mark Hotel & Resort
Dallas, TX
http://www.nsa.gov/ia/events/conferences/index.cfm?ConferenceID=42
I checked and Wave will be adding this soon:
Security and Defense on-line forum.
sponsored by the American Stock Exchange.
April 10th, 2007. 9:30am. Wave systems.
http://www.informedinvestors.com/IIF/IIF_Forum.asp?ForumID=111825
Security and Defense on-line forum.
April 10th, 2007. 9:30am. Wave systems.
http://www.informedinvestors.com/IIF/IIF_Forum.asp?ForumID=111825
Is this new?
Re: Encompass.
Ellie Mae Announces Encompass Banker Edition
Highly acclaimed broker origination system to also serve bankers and brokers-turned-bankers
DUBLIN, CA—March 27, 2006—Ellie Mae, an award-winning provider of innovative software and services for the mortgage industry, has announced the development of Encompass Banker Edition, a banker-focused version of its acclaimed Encompass Mortgage Automation System.
The development of Encompass Banker Edition supports Ellie Mae's original strategy for Encompass. "Four years ago, the vision behind Encompass was to set a new standard and create a mortgage solution that would meet the needs of all sizes and kinds of originators, and all user types," explains Jonathan Corr, chief strategic officer at Ellie Mae. "The goal was to take the traditional desktop loan origination system to a new level that would better serve the business needs of today's brokers and bankers. Our broker solution has become the new standard in loan software adopted by small and large brokers. With Encompass Banker Edition, we're now taking the next step and meeting the needs of bankers, too."
Encompass Banker Edition will respond to growing customer demand. "Our success has been driven by our ability to listen and respond to our customers' needs," states Corr. "Our customers and prospects have asked for an Encompass product tailored to bankers, and before the end of the year we'll be delivering just that."
"The introduction of Encompass Banker Edition will also prove very useful for the many brokers making-or wishing to make-the transition to banker," adds Corr. "We expect very positive response from brokers and bankers alike."
"We switched to Encompass from Calyx® Point® last year because of the greater management control it afforded, giving us complete visibility of current information on every loan in the company's pipeline," says Mark Klein, president of Pacific Coast Lending in Agoura Hills, California. "We have now grown to become a banking operation, so we plan to switch to the Encompass Banker Edition when it becomes available. Our business has benefited tremendously from the switch to Encompass, so we are anticipating Encompass Banker Edition with enthusiasm."
Encompass Banker Edition is scheduled for delivery in the fourth quarter of 2006. The Encompass Mortgage Automation System is the foundation of Encompass Banker Edition, and incorporates Ellie Mae's 20+ years of experience with Genesis 2000® and Contour customers, one third of which are mortgage bankers, community lenders and credit unions. Many Encompass customers are also mortgage bankers.
Encompass Banker Edition is tailored for bankers, small and medium-sized lenders, community lenders, and credit unions.
In addition to having Encompass' distinct interfaces for origination, processing and closing staff, the system will include interfaces for banking personas such as underwriter, secondary and funding, as well as custom personas. The system will cover the entire banking workflow and will be configurable to adapt to a company's desired business process.
Since its launch two years ago, the response to Encompass has been very strong:
Over 11,000 companies have licensed Encompass, totaling over 100,000 users
Over half of the top 200 brokers use Encompass, including three of the top five in the nation
Over 200 companies are switching to Encompass per month
About Ellie Mae, Inc.
Ellie Mae is an award-winning provider of software and services for the mortgage industry, which was recently named to the Inc. 500 list of America's fastest growing private companies. Ellie Mae provides a comprehensive line of products and services including the company's flagship Encompass® mortgage automation system, Contour™ and Genesis 2000® loan origination software, Encompass Websites™ for mortgage brokers, and Ellie Mae Docs™ services for document processing. Ellie Mae's ePASS® Network is the mortgage industry's online transaction platform enabling all mortgage companies in the United States to easily do business online with dozens of leading lenders and thousands of settlement service providers. Ellie Mae is based in Dublin, California. To learn more about Ellie Mae, visit www.elliemae.com or call (888) 955-9100.
Re: GTSI
DOD sends GTSI back to school
10/16/06
To meet the needs of 98 Defense Department dependents’ schools in Europe and the Middle East, GTSI Corp. will deliver and install more than 8,000 notebook, tablet and desktop computers over the next five years.
GTSI won three blanket purchase agreements, worth potentially $12.7 million, from the Defense Department Dependents Schools-Europe, which runs schools for children of military and defense employees stationed overseas.
In addition to the hardware and software, GTSI also will offer a range of services stateside to the Defense Educational Activity, including asset tagging and imaging.
GTSI partnered with Gateway Inc. and Prism Point Technologies to develop a service solution to meet the needs of students, faculty and executives. Gateway is supplying the laptops, tablets and desktops. GTSI also recently teamed with Gateway to provide its computing solutions to Air Force Academy cadets.
GTSI Corp.
provides information technology (IT) solutions primarily to federal government customers worldwide.
It provides various hardware solutions, such as workstations, desktops, laptops, notebooks, servers, facsimile products, and Internet and extranet products; peripherals, including disk drives, CD-ROM and DVD drives, printers, monitors, scanners, modems and related products; and networking products, such as local area networks, wide area networks, metropolitan area networks, and personal area networks.
GTSI also offers supplementary services, which include assisting customers in selecting, configuring, installing, and maintaining networks.
The company sells its products and services primarily to federal, state, and local government agencies, as well as to systems integrators, prime contractors, and other companies reselling information technology to various government agencies.
It has strategic relationships with Sun Microsystems, HP, Panasonic, Cisco Systems, Network Appliance, IBM, Dell, Gateway, Apple, APC, and SGI.
As of December 31, 2004, GTSI offered access to approximately 350,000 IT products from approximately 1,380 manufacturers.
The company, formerly known as Government Technology Services, Inc., was founded in 1983 and is headquartered in Chantilly, Virginia.
Corp. Headquarters.
http://www.berkshirehousing.com/bh/lee_corporate_center.html
Rent sounds cheap.
Price: Warehouse: $6.00 - $6.25 / sq. ft. gross . Office: $7.50 - $10.00 /sq. ft. gross
Looks like the location worked for these guys:
@utoRevenue Moves Headquarters; Company to Expand Operations with New Offices in Lee MA
GREAT BARRINGTON , Mass.----March 16,
2005--@utoRevenue(TM), the nation's leader in permission based
marketing services for the automotive industry, announced today thatthe company is moving its headquarters to the Lee Corporate Center in Lee, Ma. @utoRevenue, currently based in Great Barrington, Ma., will relocate to its new office space in early April, according to John M.Miller, @utoRevenue CEO.
"Because of the phenomenal growth our company has had in recent years, we have outgrown our current offices in Great Barrington," Miller said. "While we needed more room to grow our business, we did not want to leave the Berkshires, which has been our home since we started the company in 2001," he said. "By relocating to the Lee Corporate Center, we can expand our operations and still remain in the
area."
"We expect to double the size of our operations and staff during 2005, and this new space is just what we need to make that growth happen. Not only will we have room to expand our operations, but we will be able to expand the services we offer our automotive customers," added Miller.
Located at 480 Pleasant Street in Lee, the new facility will house @utoRevenue's executive team, marketing, accounting and software departments, according to @utoRevenue's Vice President of Operations Gaye Weinberger. @utoRevenue moved into their current Great Barrington offices four years ago when the company was originally started. Since that time, the privately-held company has experienced triple digit growth eachyear.In 2004 , @utoRevenue grew by more than 120%, acquired two companies, expanded its office space in Great Barrington , opened sales operations in major cities throughout the United States, and more than
doubled its number of employees and its number of customers.
"We estimate that auto dealers using @utoRevenue's permission
based products earned some $20 million in additional revenues in 2004 and over $40 million since our company started operations," said Miller. "With our new headquarters, we can offer our customers even more benefits and services and definitely help our customers increase their revenues even more."
Lee Corporate Center, the site of @utoRevenue 's new office, islocated in Berkshire County and is 40 miles from Albany, N.Y., and an hour from Hartford, Ct. @utoRevenue Sets Major Milestones in 2006
Sends over 35 million permission based messages, generates over $120 million in revenues for auto dealership customers, and drives 30,000 lost customers back to their dealerships
LEE, Mass., Jan. 17 /PRNewswire/ -- @utoRevenue(TM), setting several customer and corporate milestones, continues to maintain its leadership position in 2006 as the leading permission based marketing service provider for automotive dealerships.
In 2006, the company recorded another year of double digit growth and set major customer records, according to John M. Miller, @utoRevenue General Manager. "Although we are exceedingly pleased with the way our company is growing, what makes us exceptionally proud is how our permission based services are making dealers so much money," says Miller. "We estimate that we have sent over 35 million permission based messages for service campaigns which generated over $120 million in extra revenues for our auto
dealer clients."
"What is even more exciting is that in 2006 our permission-based email services alone helped our clients recapture over 80,000 'lost' customers who had not been to the dealership in a year or more," says Miller. "Even better is that those returning customers generated $30 million in incremental revenue in 2006 for our clients. That kind of return on investment, combined with our customer service, is why @utoRevenue is growing much faster than most other companies in our industry."
Other major milestones during 2006 include @utoRevenue's further expanding its operations across the country by opening four additional offices and expanding into another 3500 square feet to accommodate the company's personnel growth. @utoRevenue also introduced @utoScheduler, an online service appointment scheduling system that lets customers schedule their own service appointments integrated with the dealers DMS.
Miller expects @utoRevenue's impressive growth to continue: "Now that we are part of Dominion Enterprises, we have all the financial resources we need to offer even more personalized service to dealerships and grow our company." Dominion Enterprises, which purchased @utoRevenue in late 2005, is one of the nation's largest print and Internet media companies.
@utoRevenue(TM), founded in 2001 and based in Lee, Ma., is a Dominion Enterprises Company. John M. Miller, Founder and General Manager, has over 24 years experience in the auto industry as an executive for COIN Financial Systems, Ultimate Prospecting Systems, Reynolds and Reynolds and KeyTrak. @utoRevenue, which has 12 offices throughout the U.S., offers a complete line of marketing services including email, email collection, direct mail, voice messaging, e-newsletters and online real-time appointment scheduling.@utoRevenue products include @utoEmail(TM), @utoMatch(TM), @utoDirect(TM), @utoVoice(TM), @utoEnews(TM), and @utoScheduler(TM).
Dominion Enterprises, headquartered in Norfolk, Va., is a leading media and information services company serving employment, real estate, recreation, and industrial markets in the United States. The company has 503 paid and free magazine titles such as For Rent, Harmon Homes, The Employment Guide, Boat Trader, Cycle Trader and RV Trader with a combined weekly circulation of nearly 6 million; over 40 market-leading websites such as ForRent.com, Homes.com, and Traderonline.com reaching over 8 million monthly visitors; data capture and distribution businesses such as Dealer Specialties; and web services businesses across all the company's industry categories. The company has 6,600 employees nationwide and estimated 2006 annual revenue of $850 million. For more information on Dominion Enterprises, visit www.dominionenterprises.com
Interesting Comparison.
http://www.full-disc-encryption.com/biometrics_and_encryption.htm
Data Protection Summit.
Seagate.
http://www.dataprotectionsummit.com/
ASI - Compal.
Interesting.
ASI To Offer Seagate's Encrypting Hard Drive In Notebooks
ASI, based in Markham, Ontario, plans to offer the Momentus 5400 FDE.2 hard drive in the non-branded ASI C8015 notebook, which would include Wave Systems Corp.'s security management software for corporate deployments.
http://www.informationweek.com/hardware/showArticle.jhtml?articleID=197802066
ASI Whitebox Notebooks - Custom Configured Notebooks
Quickly and easily customize notebooks to your exact specifications. ASI currently offers the highest quality notebooks available from two of the top Taiwanese ODMs (Original Design Manufacturer), ASUS and Compal, along with a full range of notebook products including the latest Centrino technology from Intel. http://www.asipartner.com/products/whitebox.asp
Compal C8015 - http://www.asimobile.com/nb_comp_sheet.htm
HYMEDIX -
Sheng-Hsiung Hsu, Director. Mr. Hsu has served as a Director of HYMEDIX since the Acquisition Merger. Mr. Hsu joined HYMEDIX International as a Director in 1993. Mr. Hsu is the Chairman of First Taiwan Venture Capital Inc. In 1973, he founded Cal-Comp Electronics, Inc. which is now the world's largest electronic calculator manufacturer. He currently serves as the Chairman and the President of Cal-Comp Electronics, Inc. He is also the founder and Executive Director of Compal Electronics, Inc., a major monitor and notebook PC manufacturer in Taiwan. Mr. Hsu also holds various positions in a number of corporations and entities, including Baotek Industrial Materials Ltd., Electric Appliance Manufactures' Association, and Electric & Electronic Production Development Association.
John E. Bagalay, Jr., Ph.D., J.D., Director. Dr. Bagalay has served as a Director of HYMEDIX since the Acquisition Merger. Dr. Bagalay joined HYMEDIX International as a Director in 1993. Dr. Bagalay is Managing Director of Community Technology Fund, the venture capital affiliate of Boston University. Dr. Bagalay was formerly General Counsel of Lower Colorado River Authority, a regulated electric utility in Austin Texas; General Counsel of Houston FirstFinancial Group; and General Counsel of Texas Commerce Bancshares, Inc. He has over thirty years' experience in the financing of private and publicly held companies. He is a Director and member of the Executive Committee of Seragen, Inc., Wave Systems Corp. and of Cellcor, Inc., each of which is a publicly held company. He is a Director of several privately held companies in the medical and high technology business sectors.
ASI Whitebox Notebooks - Custom Configured Notebooks
Quickly and easily customize notebooks to your exact specifications. ASI currently offers the highest quality notebooks available from two of the top Taiwanese ODMs (Original Design Manufacturer), ASUS and Compal, along with a full range of notebook products including the latest Centrino technology from Intel.
http://www.asipartner.com/products/whitebox.asp
WavxAlmiman,
Good question since these are non-branded ASI C8015 notebooks.
IEI – EMBASSY.
IEI site with image of Winbond TPM with EMBASSY
http://www.ieiworld.com/en/news_content.asp?id=erbium/projectOBJ00244201&news_cate=News&news...
http://www.ieiworld.com/files/refFile/datasheet/TPM_datasheet.pdf
ONE Unified Technology platform and C2OS.
Not sure if previously posted. Any thoughts on wether TPMs or EMBASSY may be involved???
MDI Security Systems
"Dell has established a reputation of stability and reliability.When we deliver our unified security solutions on Dell servers and equipment, our customers associate us with that same level of technical trust. Dell and MDI–it’s a win-win partnership." Michael Garcia, Vice President of Marketing, MDI Security Systems
Challenge: Provide a turnkey platform for business-critical software from a leading provider of open architecture security systems; provide 24/7 support to customers with sensitive security needs at multi-site facilities around the globe
Solution: A bundled suite of Dell products and services,including Dell PowerEdgeTM 2850 servers with 3 GHz Intel® Xeon® processors running Microsoft® Windows ServerTM 2003, Dell OptiPlexTM GX620 mini-towers, Dell LatitudeTM D610 notebooks, and Dell mobile wireless computing products
Benefit: Reliable Dell hardware helps MDI Security Systems deliver a trusted platform for hosting top-secret security systems; MDI reduces internal development and integration costs by eliminating the need to build their own computing hardware; Dell’s global support infrastructure helps ensure high availability for large enterprise-class organizations with disparate facilities worldwide
http://www1.euro.dell.com/content/topics/global.aspx/casestudies/en/2006_mdi?c=it&l=it&s=cor...
The secret sauce
In order to implement the Dell-based security solution, employees at the Papa Gino's corporate office and store locations were provisioned with Dell OptiPlex GX280 and OptiPlex GX620 desktops as well as Dell Latitude D610 and Latitude D810 notebooks. To facilitate the out-of-the-box implementation, the Dell equipment arrived at Papa Gino's locations with TPM devices pre-installed. Cahalin then installed Wave Systems EMBASSY Trust Suite software to provide end-user applications that work with the TPM technology to help solve and simplify security challenges.
http://productfinder.infoworld.com/infoworld/search/viewabstract/85759/index.jsp
MDI Announces ONE UNIFIED TECHNOLOGYT - the Security Industry's Only Open Architecture Command and Control Operating System
MDI also to Present Dell Case Study Titled "Mission Possible" at ISC West Security Conference Booth #22087
SAN ANTONIO, TEXAS – April 4, 2006 - MDI, Inc. (NASDAQ: MDII) today announced that MDI Security Systems will formally launch its ONE UNIFIED TECHNOLOGY™ platform at the ISC West Security Product Show in Las Vegas, NV on April 5th. ONE™ is the only open architecture command and control operating system available on the market today.
A Revolutionary Open Architecture Security Operating System -
The ONE platform is the framework that unifies security point products, systems and subsystems into a common management platform. Far beyond the capabilities of the integrated security management software promoted by industry competitors, the ONE platform delivers an open architecture environment that adapts each individual application and device into its structure - promoting global collaboration as a single system.
Revolutionary Adaptive Intelligence –
As the only open architecture command and control operating system for the security industry, ONE™ standardizes the functionality and user interface of applications and devices that are hosted on its platform. In a virtual “plug-and-play” adaptive environment, ONE™ learns over time and grows more intelligent as additional capabilities are added to it.
Automatically Scaleable -
When challenged by complex high-security integration environments, traditional second generation integrated security systems become overwhelmed and impossible to manage. According to leading security industry analysts, the second generation integration systems available on the market today have failed to provide the framework needed for true unification. The ONE platform automatically adapts to the entire enterprise security infrastructure under its control and delivers the ability to seamlessly add modules and scale to larger or smaller systems as required.
Besides its ability to unify systems, ONE™ delivers unprecedented situational awareness, visualization, storage and redundancy - while empowering security teams to prioritize and manage critical events in real-time.
The Development of ONE -
For over two decades, MDI has developed customized security management solutions for many of the nation’s highest security organizations and largest commercial enterprises. MDI created the ONE platform by recognizing the advantages of a unified operating system and by incorporating the technical advances learned from some of the highest security organizations in the world. The ONE platform allows organizations to develop software code that meets their needs by using the ONE development SDK, using a concept similar to the Linux platform. The ONE platform allows MDI to customize applications faster and more efficiently than any other security company.
Auto Adaptive™ Driver Technology –
New Auto Adaptive™ driver technology allows MDI to unify any required technology into the ONE platform seamlessly and with less effort than any of its competitors. This Auto Adaptive driver technology is used to synthesize data and communicate with classified government systems and other legacy systems that cannot otherwise be handled without costly customization and integration.
“Based on market research, analyst feedback and customer interviews, we intend to use the capabilities of our ONE platform to revolutionize the security industry as we know it,” stated J. Collier Sparks, President and CEO of MDI. “The industry has been in constant search of an enabling technology, similar to a computer operating system, which can unify and control their entire global security infrastructure while protecting their security investments from obsolescence. They have been searching for a system where everything functions as one; the glue that brings and holds together the entire enterprise. I am exited to state that after two long years of development, we have accomplished our product goals and delivered a solution that is capable of taking MDI to a market leadership position. I would like to invite everyone in the industry to visit us at ISC West this year for a preview of our team’s groundbreaking accomplishment,” he concluded.
More Information on ONE –
For more information on ONE, including interactive demonstrations and diagrams, please visit the MDI home page at www.mdisecure.com.
MDI has submitted its new commercial dealer product, the ASL video appliance built on the ONE platform, for a new product award at ISC West. It will be competing against over 15 new products for the award. Results will be announced at a later date.
MDI to Highlight Dell Case Study -
Dell has announced a new case study based on the ONE platform and MDI’s open architecture operating system C2OS™. Dell representatives will be at the MDI booth at the ISC West show to speak about the Dell hardware solutions incorporated into the ONE platform and C2OS. To access this case study online, please visit www.mdisecure.com, or you may visit the Dell website at www.dell.com/casestudies.
About MDI Security Systems
For over 25 years, MDI (NASDAQ: MDII) has been protecting its clients’ people, facilities and assets by manufacturing unified security software and video surveillance solutions that can be comprehensively managed across an enterprise from a central point of command and control. The MDI product family currently protects over 8 million alarm points across the globe for many of the world’s most recognized organizations including Microsoft, MBNA Worldwide, John Deere, Pepsi, FBI, Fidelity Investments, Bureau of Engraving & Printing, Southwestern Bell, Department of Defense, IRS, NASA, Disney, Smithsonian Institution and MIT to name a few. For more information on MDI Security Systems including its award-winning SAFEnet, iTRUST, ViewPoint and nTEGRITY product lines, please visit www.mdisecure.com
http://www.mdisecure.com/pr_2006_04_04.html
http://www.mdisecure.com/literature/MDI_Dell_CaseStudy.pdf
General Dynamics, TPM.
http://www.gdcanada.com/content/detail.cfm?acronym=PC3000SBC&page=2