Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Barge Re: Itronix custmers and volume.
Q. Who are Itronix's business and government customers?
Some of the enterprises and organizations that have deployed Itronix wireless, rugged mobile computing solutions include Sears (over 10,000 technicians equipped), FBI, Department of Defense, U.S. Army (3400 units deployed), U.S. Navy, U.S. Air Force, Honeywell, Federal Express, Transco, Florida Highway State Patrol, City of Denver, and nearly every major Telecommunications provider in North America, as well as Telecom South Africa and others in Europe.
http://www.hummerlaptops.com/faqs.htm
GoBook not just for the Military.
These notebooks are for real road warriors.
Itronix, a division of General Dynamics, updated its GoBook line of notebooks on Monday with the XR-1. The new notebook is the smallest "rugged" notebook yet built by the company, weighing in at 6.8 pounds.
The XR-1 isn't cheap, with a starting price of $4,330. But it is designed to withstand falls, spills and other hazards that would render an ordinary notebook useless, said Tom Turner, president and CEO of Itronix.
The Air Force uses Itronix GoBooks in flight-line operations around the world, and Sears sends its service technicians out into the field with GoBooks, Turner said. He declined to comment on potential customers for the XR-1, but noted that several other GoBooks have been deployed to the deserts of Iraq, where they are able to withstand the fine-grained sand that gets into absolutely everything.
In other news:
The XR-1 comes with loads of features that you won't find at Best Buy. The screen can be dimmed to a level that looks completely dark, but that can be read with night-vision goggles. The notebook can be fully submerged and is designed to survive a fire. If it's cold outside, the system warms up the hard drive before it fully boots. And it can find a wireless network almost anywhere in the world with built-in radios for multiple bands of both UMTS/GSM (Universal Mobile Telecommunications Service/Global System for Mobile Communication) and CDMA (Code Division Multiple Access) cellular networks, plus Wi-Fi, Bluetooth and GPS (Global Positioning System).
http://msn-cnet.com.com/Itronix+lightens+the+load+of+rugged+laptop/2100-1041_3-6104757.html
Sears Holding has used the Itronix GoBook 1 since 2002. Those models replaced the Itronix XC6000 notebooks.
Sears Holding's in-home technicians use GoBooks - dubbed the Sears Smart Toolbox (SST) - for service order dispatch, GPS mapping, messaging, parts look-up, parts inventory, estimate, credit card authorisations, computer-based training, timekeeping, and some third-party diagnostics applications. The company has more than 10,000 of the notebooks in service across the US.
For example, a Sears technician can go to a home to fix an appliance. While there, the technician can access information on parts and other diagnostics instantly and wirelessly. That, along with the GPS providing the best route to the home, helps the company boost productivity in the field and reduces the number of back-and-forth trips a technician must make. Because the laptops are always in motion, a rugged option is necessary.
Sears Holding is the US' largest provider of home services, averaging more than 13 million service calls per year. That means the laptops go in and out of a truck more than 13 million times; there are 13 million-plus chances for it to be dropped or suffer some other type of damage.
The GoBooks have not really been subjected to serious poundings so far, but SST program manager Daniel Bowman recalled a time with the XC6000s that confirmed the need for a laptop that was a bit more, well, rugged.
"Our former model, the XC6000, was caught in a tornado disaster which involved the technician and vehicle," Bowman said. "The laptop was later found in a farmer's field and returned to
Sears because of the customised 'Sears' label on the top cover. After removing the soil and a basic cleanup of the battery terminals, the laptop booted-up fine." The technician also made it through the tornado unharmed.
While the XC6000 was considered ultra-rugged, the GoBook 1 is one level below. According to Bowman, it can still withstand some harsh treatment, though testing its limits is not really recommended.
"Our technicians understand they are working with a laptop, and although rugged, it is still a laptop," he said. "The SST tends to be handled with a bit more care these days due to the pain of not having one for a day or two while replacement equipment is sent out."
"We have yet to have an incident that matches the tornado story," Bowman continued, "but most of our wear and tear today involves the LCD and touch-screen."
According to Itronix, the GoBook 1 is a rugged laptop capable of withstanding shock, vibration and spills. Recently, GoBook 1 has been replaced by newer models, the GoBook VR-1 and GoBook 3.
Along with Itronix, other rugged laptops include Panasonic ToughBooks, Ergo notebooks, and Terralogic laptops, tablets and handhelds. Typically, a rugged laptop is classified by its stronger outer casing. They are usually designed for exposure to extreme temperatures, between -10 and 140 degrees Fahrenheit; rain, snow, sleet and other liquids - some can handle up to four inches of rain an hour; dust and other particles, and hazardous materials. They are also designed to withstand shocks caused by drops, shakes or collisions with heavy equipment.
Rugged laptops are usually chosen by emergency response crews, industrial workers, mobile technicians, auto mechanics, military personnel or any profession that is predominantly outdoors or in turbulent or unpredictable conditions. Essentially, a rugged laptop needs to be able to withstand a high-speed chase, a blasting zone or a manufacturing plant mishap.
Sears Holding selected Itronix for a few simple reasons, Bowman said.
"Itronix is an industry leader in ruggedised mobile workforces," he said. "And coupled with their helpdesk, depot services, advanced exchange program, and overall client services organisation, the choice was [easy]."
Bowman added that a range of services, a strong warranty, maintenance and general repair were also huge selling points.
"Compared to their competitors, their services really do take Itronix to the upper level in the industry," he said. "As the culture here at Sears continues to be very customer focused, the fact that Itronix provides us with the same level of service that we love to provide for our customers creates much of the selling point."
Although Bowman is quick to sing the praises of GoBook, he said that there are some minor drawbacks, principally the weight.
"From a field usage perspective, it would be nice to have a laptop that was a bit lighter for the technician," he said. "Our technicians already carry tools and equipment other than the SST, so if it was possible with today's technology, I would prefer a fully ruggedised laptop under four pounds."
Though the laptops may be a little heavy to carry day in and day out, the good far outweighs the bad, Bowman said, adding that the GoBooks boost customer service and productivity.
"Nearly every one of our processes prior to implementing the system back in 1995 involved manual processing or required the technician to contact a series of different supporting associates to complete any given service call," he said. "Today, our technicians can offer the customer extremely accurate estimates from a parts, labour and protection-agreement standpoint, [and they can] repair merchandise using advanced diagnostics tools and parts look-up schematics."
Sears Holding has also added such features as split payment options to give customers flexibility in how to pay for collect call services. The company has added GPS mapping to help get the technicians to and from calls efficiently, cutting down the overall drive time. And estimate and billing screens automatically calculate service promotions, tax exemptions, discounts and other mathematical functions that help technicians build rapport with customers on a pricing structure.
"The technician is not spending extra time performing estimates and point-of-sale transactions manually with pencil and paper," Bowman said.
Overall, he said, using rugged laptops has changed the way Sears Holding does business.
"The SST provides our technicians with a suite of powerful tools for automating many of our manual processing activities in the field," he said. "One of the larger benefits, however, is the feedback from our customers on how much more professional[ly] our field service technicians present themselves while in millions of homes each year helping [people] to resolve their household appliance, lawn and garden, electronic, recreational, power tool and HVAC issues. We can make appliance problems go away much more efficiently, and our customers like that."
http://www.computerweekly.com/Articles/2006/08/09/217603/Ruggedised+laptops+boost+productivity+and+s...
Dell/Boeing.
Dell Inks Printer Management Deal With Boeing
Five-Year, Multi-Million Dollar Contract Expands Scope of Dell Infrastructure Services for Aerospace Leader
Round Rock, Texas, April 13, 2006
Dell today announced a contract with Boeing for the day-to-day management of thousands of printers spread across the aerospace company's North American operations.
The scope of the work is in addition to Dell managed service projects already under way at Boeing, including lifecycle management of the company's desktop and notebook computers.
As part of the five-year, multi-million dollar printer management agreement, Dell will provide Boeing with customized IT infrastructure services such as installation, repairs and asset optimization. Dell will also provide Boeing with printer consumables including toner, paper and fuser kits. Lexmark International Inc. (NYSE: LXK) will be a key partner to Dell in delivering the printer management solution to Boeing sites.
"We have been working with Dell for more than 10 years and this extension of managed services underscores the trust we have in Dell to deliver what we need when we need it," said Earl Beauvais, director of Boeing print and copy services. "It's important for us to have a partner who fully understands how we can get the most out of our IT infrastructure investment."
"We value our longstanding relationship with Boeing and we work hard every day to earn its trust," said Joe Marengi, senior vice president of Dell Americas. "Our goal is to continue delivering the best customer experience possible to companies like Boeing and be their choice to help build out their IT infrastructure."
In addition to delivering quality client support that is repeatable, predictable and efficient, Dell provides Boeing with desktop and notebook computers, workstations, displays, personal digital assistants, network printers and desktop peripherals worldwide. Dell is helping to ensure products are integrated into Boeing processes and systems from the purchasing system to the Boeing Help Desk.
Dell also offers Boeing employees an employee purchase plan that delivered 12,000 systems in 2005.
Boeing Awards Dell Five-Year Managed Services Contract
Dell to Provide Managed Services for Defense Arm's Desktop Infrastructure
Round Rock, Texas, October 20, 2003
Dell today announced that The Boeing Company (NYSE: BA) awarded Dell Services a five-year contract to provide managed services for desktop, notebook and workstations for the Boeing Integrated Defense Systems (IDS) business unit, one of the world's largest space and defense businesses.
Dell Services will provide complete product lifecycle services throughout the life of the individual computer systems. The agreement includes software distribution, systems installation, break-fix services, asset management and disposition across a variety of hardware devices and operating systems. Through the agreement, Dell will provide service in St. Louis, MO; El Segundo, Long Beach, Huntington Beach and Seal Beach, Calif.; and at smaller IDS sites across the country.
"Dell offered Boeing the best overall value in terms of high-quality, reliable, competitively-priced services," said Donald G. Imholz, vice president of Information Technology for Boeing Integrated Defense Systems.
"The Dell solution also provided a way to standardize desktop support services using a common infrastructure and toolset across Boeing," said Chris Kent, vice president of Information Technology Services in Boeing Shared Services Group, which manages the Boeing information technology infrastructure.
"Boeing is the leader in its industry, and we are pleased that it has selected Dell as a managed services provider to help drive its business to operate more efficiently than ever," said Gary Cotshott, vice president and general manager, Dell Services. "Dell's high quality, low-cost services model and technical expertise will help the defense arm of Boeing optimize the performance of its client systems and environment as our relationship continues to grow."
In addition to the managed services contract, Boeing uses Dell enterprise hardware including desktops, workstations, notebooks, servers, storage and high performance computing clusters (HPCC), one of which is ranked number 123 on the latest Top 500 list of Supercomputer Sites, which can be viewed at www.top500.org.
Boeing Chooses Dell
Worldwide Agreement Includes All Boeing Sites
Round Rock, Texas, June 28, 1999
Dell Computer Corporation (NASDAQ: DELL) announced today that The Boeing Company has selected Dell as its worldwide corporate standard for desktop and notebook personal computers, associated PC peripherals and selected services over the next three years.
In addition to Dell OptiPlexTM desktop PCs and LatitudeTM notebook PCs, Dell will provide Boeing with a suite of services associated with delivery, including asset tagging, custom software image loading through its DellPlus factory integration service, warranty and technical support, and installation services at selected Boeing locations - all on a global basis. The three-year agreement also allows Boeing to evaluate and incorporate additional Dell products and services on an ongoing basis.
Under terms of the relationship, Dell will provide Boeing with an open quantity of personal computers, as required by Boeing, over the next three years. Boeing currently has an installed base of approximately 175,000 personal computers.
"The combination of capability, flexibility and cost effectiveness offered by Dell will contribute significantly to the ability of Boeing to lower our total cost of ownership for desktop computing," said Terry Milholland, Chief Information Officer of The Boeing Company.
Dell previously was the standard supplier of desktop and notebook computers to Boeing in Puget Sound, Wichita, Philadelphia, and international locations.
"The direct relationship Dell has with Boeing allows us to customize an enterprise solution for their I/T needs," said Joe Marengi, senior vice president and general manager of Dell's Relationship Group. "Using Dell as a single source for standard desktops, laptops and services allows Boeing to simplify its maintenance program and technology platforms across the company."
Dell first worked with Boeing to develop and implement processes to streamline system purchases, ultimately leading to reduced costs and lead-time in delivering systems to users' desktops.
May be of some interest:
Gruber & McBain.
Gruber & McBain Capital Management, whose principal investors are Boeing, Lockheed Martin and by Polymedica, http://www.corporganics.org/
Oknpv.
FWIW,
Wellington is also amoung the largest investors in Microsoft and google.
http://moneycentral.msn.com/investor/invsub/ownership/ownership.asp?Symbol=MSFT
http://moneycentral.msn.com/investor/invsub/ownership/ownership.asp?Symbol=goog
Boeing,Lockeed martin?
http://www.corporganics.org/
Hearty & Natural veggie burgers is owned by Sunrich Food Group, which is owned by Stake Technologies, which is owned principally by Gruber & McBain Capital Management, whose principal investors are Boeing, Lockheed Martin and by Polymedica, whose principal investor is Safeco, whose principal investors are ExxonMobil, General Electric, and Citigroup.
Diebold Opteva.
From: Rodman & Renshaw Security
Biodefense & Connectivity Investor Conference in New York
June 19, 2006
We also have a customer up there in Diebold who we actually supply with Intel. Intel motherboards go in ATM machines. We provide the key management software for the Trusted Platform Modules for Diebold.
http://www.unclever.com/wavx/
Intel Trusted Platform Module Chip
Every Opteva ATM includes an Intel® Trusted Platform Module Chip. The chip verifies the authenticity of sources and commands, and ensures a protected exchange of instructions and information. http://www.diebold.com/atmsecurity/hackers.htm
Optimistic outlook
07 May 2004
It took 137 years for Diebold Incorporated to achieve its first $1 billion sales year. Seven years later, in 2003, the company's sales reached the $2 billion milestone.
Eric Evans, Diebold's new president and chief operating officer, said the company hopes to get to $3 billion in just three to four more years.
An ambitious goal -- but one that seems within reach based on the early reception for the Opteva, the company's new line of ATMs introduced in March of 2003, as well as growing opportunities in Diebold's security and election businesses.
Buoyed by Opteva, Diebold's self-service business grew 7.4 percent in 2003, Evans told attendees of the recent Partners in Information Xchange (PIX) conference in Canton, Ohio, an event attended by more than 30 EFT networks, switch providers and software companies.
Up with Opteva
Fifty percent of the ATMs Diebold shipped in the United States were Optevas. The company recently received its first orders for the machines from other parts of the world, including the Middle East, Russia and China, where production is slated to begin soon at Diebold's manufacturing facility in Shanghai.
Certification efforts are under way in Europe, the region that Evans said presents Diebold's toughest challenge.
According to Diebold's research, it is the overwhelming ATM leader in North America, commanding a 62 percent share of the banking market with NCR in a distant second place with 26 percent. In Europe, however, Diebold sells fewer ATMs than either NCR or Wincor Nixdorf.
Again according to Diebold research, NCR is the worldwide leader, with a 36 percent market share. Diebold trails with 32 percent, followed by Wincor Nixdorf at 16 percent. No other single manufacturer comes close to the top three in market share.
Evans hope Opteva can help change those numbers. In 2004's first quarter, orders for the Opteva line topped $60 million, according to the company's most recent earnings report.
Evans identified three market trends that promise continued strong ATM sales for Diebold: network mandates for Triple DES encryption; pending changes to the Americans with Disabilities Act that will require financial institutions to audio enable their ATMs; and Check 21, a piece of legislation recently signed into law that presents "huge cost savings opportunities" for FIs and may drive interest in incorporating check scanners into ATMs.
Dean Stewart, Diebold's director of Product Planning and Management, said that the Opteva drive-up models, the 740 through-the-wall and the 750 standalone island, were especially successful. Diebold sold 56 of the 750s before it started building them in December, he said. Diebold is planning new products for its Opteva line to address other market niches.
The company also anticipates increased interest in its Agilis software, introduced in late 2003. Danny O'Brien, Diebold's senior vice president of Global Product Management, Marketing and Development, called Opteva and Agilis "vitally important steps in making Diebold a self-service solutions provider versus just a provider of hardware or software."
Solid security
Diebold's security business grew 18 percent in 2003. While largely still a U.S. business, Evans said Diebold believes there are growth opportunities elsewhere. Diebold acquired two Australian security companies in 2003, as well as a New England-based integrator and installer of security equipment in the U.S.
Its EMEA division partnered with 3SI Security Systems, a provider of cash staining systems, to offer those security enhancements across its ATM product line.
Diebold.
Sorry if already posted. Is Diebold a potential $40-$50 per seat customer??? Opteva was introduced in 2003. Looks like they have had a number of sales.
Security Research Associates
2nd Annual Winter Technology Conference in San Francisco
February 15, 2006
The second phase of our business model is really around providing the enterprise support to the market. So this typically a 40 to 50 dollar per seat model. It’s classic enterprise software, both client software and server software. It provides the infrastructure to manage the devices in the marketplace.
We’ve got a couple of good reference customers. We’ve supplied Diebold with some interesting software. They’re a classic customer who won’t tell anybody what they’re doing with it. That’s perfectly fine. But they allowed us to use them as a customer.
http://www.unclever.com/wavx/
Intel Trusted Platform Module Chip
Every Opteva ATM includes an Intel® Trusted Platform Module Chip.[/B] The chip verifies the authenticity of sources and commands, and ensures a protected exchange of instructions and information. http://www.diebold.com/atmsecurity/hackers.htm
Manufacturing optimization
The process of realigning our global manufacturing operations, including the consultation process around the planned closure of the production facility in Cassis, France, continues to present a number of challenges. Production levels at this facility are significantly lower than expected, resulting in higher levels of exports to Europe from our manufacturing facilities in North America and Asia. The company anticipates this situation will continue, which will cause manufacturing costs to remain higher than usual. While management is fully engaged in completing this realignment as quickly as possible, the likelihood that it may not be completed until 2007 has increased. However, contingency plans are in place, if necessary, to meet the high customer demand for Opteva in Europe, as well as maintain customer delivery requirements. In addition, the planned production facility in Hungary is progressing well on its schedule to be operating by the fourth quarter 2006. http://www.diebold.com/news/newsdisp.asp?id=3268
New use for Visa Debit Card.
If this make cheating tougher, Embassy would sure kick it up a notch. Think of the exposure.
New Monopoly version uses debit card
Tue Jul 25,
If you're passing Go and want to collect $200, better bring a debit card.
A British version of the classic Monopoly board game released this week substitutes a Visa-imprinted debit card for the stacks of yellow, blue and purple play money long hoarded by children worldwide.
Cheating just got a little tougher.
"We started looking at what Monopoly would look like if we designed it today," said Chris Weatherhead, a Britain.-based spokesman for Hasbro Inc., which makes the best-selling board game. "We noticed consumers are using debit cards, carrying around cash a lot less."
British players might not be the only ones switching to plastic. Officials at Pawtucket-based Hasbro say they're considering a similar change for American versions.
First offered in 1935, Monopoly offered players a form of financial escapism during the country's worst financial depression. Players become pretend real estate magnates who compete for fictitious property named after real places in Atlantic City, N.J. A British version released that same year featured London neighborhoods.
In the new British version of Monopoly Here & Now, players type amounts into a palm-sized scanner and swipe their debit cards to seal the deal.
While the change may startle some Monopoly fans, the game has been revised several times before. Consumers can now buy Monopoly editions inspired by the Star Wars and Lord of the Rings movies, or even a version featuring SpongeBob SquarePants, an animated TV character.
An earlier version of Monopoly Here & Now was released last year in England and still included paper money, Weatherhead said.
But the game had been modernized in many other ways. Some addresses have changed — and the game now includes Kensington Palace Gardens, near Buckingham Palace, and Notting Hill Gate, the setting of a 1999 movie starring Julia Roberts.
Cards that once rewarded players for winning a beauty contest now compensate them for winning a reality TV show. Completing a full circuit around the board is worth two million English pounds, not 200.
"Quite a nice bonus," Weatherhead said.
Hasbro no longer sells English retailers the paper-money versions of Monopoly Here & Now, but fans can still purchase the classic edition, which includes fake cash.
At least one Monopoly devotee seemed ambivalent about the potential changes.
Krisi Lee of Antioch, Calif., owns 19 versions of the game, including the electronic one on her cell phone. She sometimes competes in a Monopoly tournament run by her mother, which usually attracts about 50 players.
She wants her young daughter to learn how to count Monopoly paper money before touching the real stuff, she said. But Lee, 28, isn't a purist.
"That is the here and now," she said. "That's what we do. For a $3 purchase, I use my debit card."
Wave-DoD.
Item 8.01. Other Events. Date of report (Date of earliest event reported) February 1, 2005
Wave Systems Corp. has been awarded a $319,000 contract by a United States Department of Defense agency. Under the contract, Wave will provide consulting services in connection with a study to evaluate the implementation of trusted computing solutions for the government. The term of the project is expected to be four months.http://www.wave.com/news/press_archive/06/060208_DoD8K.html
Wave Systems Salutes the U.S. Army’s New Security Requirements for Their Desktop and Mobile PC Purchases by Specifying Trusted Computing Security Chips
Lee, MA – February 6, 2006– Wave Systems Corp. (NASDAQ:WAVX www.wave.com) salutes the U.S. Army for its release on Feb. 3 of the new Consolidated Buy-2 (CB2) Desktop and Notebook minimum specifications for Army customers as published by the Army Small Computer Program. The specific publication link is https://ascp.monmouth.army.mil/scp/news/currentnews.jsp#2214 .
The new published Army specification details a requirement for desktop and laptop personal computers to be equipped with new open security chip hardware called the Trusted Platform Module (TPM). The TPM provides a very low cost hardware security solution that can be used to enhance the security and integrity of the computer.
“The Trusted Platform Module provides the U.S. Army with an important new tool to enhance the security of their network,” said Steven Sprague, president and CEO, Wave Systems. “Wave salutes the U.S. Army for requiring new PCs to be equipped with this readily available hardware security chip capability. By specifying TPMs in new laptops and desktops, the Army can now take advantage of this technology as part of their overall cyber-security architecture.
“The software to support broad deployment of the TPM is here today. Wave's Embassy® Trust Suite is designed from the ground up to bring important security applications and services to TPM-enabled PCs. The Embassy platform is designed to deliver network policy management, data protection, biometric authentication, smart card authentication, password authentication and machine authentication of a user's personal computer to a server,” he said. “These are just the type of applications and capabilities that the Army could use to secure their vital data networks and platforms, and we are hopeful that this development will present additional market opportunities for Wave's Embassy Trust Suite solutions.”
Wave's Embassy technology provides the administration tools that enable the management of a large deployment of TPM-enabled PCs. Wave has designed its Embassy technology to work with all commercially available TCG-compliant TPMs. Wave's Embassy platform is also designed to be compatible with the Microsoft Office® environment, including Windows Server products and Active Directory.
“Trusted computer users have available from Embassy technology a simplified yet enhanced level of security protection through the implementation of strong authentication capabilities that make available biometrics, smart cards, passwords or the TPM, all tailored to specific business needs,” Sprague said.
With a TPM-enabled PC, here are some capabilities to immediately improve data security in a network or on a single PC platform:
Embassy Security Center - for establishing security policy management to strengthen authentication to Microsoft Windows and other secure applications with multifactor authentication capabilities.
Document Manager Vault - for protecting files and folders in multiple, networked, sharable secure drives that are compatible with Microsoft Windows Explorer.
Private Information Manager - for secure storage and automation of user names, passwords and personal information.
SmartSignature - for digital signature capability of secure electronic contracts.
Key Transfer Manager - for backup and protection of hardware encryption keys.
Embassy Enterprise Authentication Server – for policy managed authentication requirements to the domain.
Wave is a member of the Trusted Computing Group (TCG), an industry organization dedicated to embedding trust and security more broadly into computing platforms and devices. More information on Wave's ETS software is available at www.wave.com. http://www.wave.com/news/press_archive/06/060206_WAVX.html
DOD and IT group craft identity network agreement
02/07/06
A federation that includes many IT companies has signed an agreement with the Defense Department to connect identity systems and establish an interoperable authentication network.
“Over the last two years the Department of Defense has worked aggressively on policies, processes, and technologies to substantively raise the bar on force protection,” said Mary Dixon, defense manpower deputy director.
To accomplish that goal the groups are moving toward federated agreements and solutions that allow members to trust each others’ credentials.
DMDC and all private sector federation members retain their own employees’ information for there is no central database. To ensure trust and interoperability, federation members adhere to a common set of operating rules and a uniform trust model.
The founding members are:
BearingPoint, Inc.
Data Systems Analysts Inc.
EDS Corp.
Lockheed Martin Corp.
NACHA - The Electronic Payments Association
Northrop Grumman Corp.
Saflink Corp.
SRA International Inc.
SRP Consulting Group, LLC
3Factor
Unlimited New Dimensions LLC
Wave Systems Corp.
http://www.washingtontechnology.com/news/1_1/security/27925-1.html
Consolidated Buy-2 (CB2) Desktop and Notebook Specifications Posted03-Feb-2006
Consolidated Buy-2 (CB2) Desktop and Notebook minimum specifications have been posted for Army customers. Vendor proposed items are expected to be posted during week of February 21. CB2 details are available at https://ascp.monmouth.army.mil/scp/cb/cb_index.jsp' https://ascp.monmouth.army.mil/scp/news/currentnews.jsp%232214%20.
Consolidated Buy-2 (CB2) Period for Desktops and Notebooks Extended03-Apr-2006
Consolidated Buy (CB) products and prices have been extended with CB2 vendors through 30 April. Customers may continue to order CB2 desktops, notebooks, monitors and their options/upgrades as described by ASCP website CB instructions.
Consolidated Buy-2 (CB2) for desktop and notebook computers has ended. 1-May-2006
Consolidated Buy-2 (CB2) for desktop and notebook computers has ended. The next CB buying period is scheduled from the second half of August through 30 September 2006. Customers with 'urgent' desktop and notebook requirements are directed to the CB Exception Process (link) instructions for procuring such items between Consolidated Buy periods.https://ascp.monmouth.army.mil/scp/news/currentnews.jsp#2394
NAC competition: Juniper's Infranet
Focuses on firewall, access control, with less emphasis on endpoint security.
Although it is possible to map the basic components in the Juniper Infranet to TCG's Trusted Network Connect architecture, the reality is that Juniper is trying to accomplish very different things, focusing on firewall and access control, with less emphasis on endpoint security.
Juniper breaks from other vendor's NAC architectures in the amount of control that it gives the network manager when building a NAC infrastructure. Juniper's strategy is very dependent on both authentication and on detailed access control using its firewalls. The result is that when someone enters a network under Juniper's NAC control, every connection goes through a stateful packet-filtering firewall, can be encrypted and is explicitly tied to an access-control policy based on a user's identity.
For example, when a system enters a network under Microsoft Network Access Protection with DHCP, the main concern is whether the user has the appropriate level of endpoint security. If so, the user is given unlimited access to the network. With Juniper's Infranet, the endpoint-security assessment of the user is optional, but the identity-based access-control policy is not.
This philosophical difference has one benefit: It makes it easier to decide whether the Juniper approach is right for you, and whether this level of authentication, security and access control is what you're looking for - or whether you mostly care about endpoint-security assessments.
On the client end, Juniper uses its Enterprise Infranet Agent as the focal point for client management. The Infranet Agent links to third-party TCG Integrity Measurement Collectors using its own JEDI API. Juniper also provides endpoint-security assessment tools - a feature of its SSL VPN called Host Checker - for checking endpoint status, such as open ports or running processes.
Because the user is assumed by Infranet's architecture to already have connected to the network, the Infranet Agent doesn't participate in Layer 2 authentication schemes, such as 802.1X. Instead, the Infranet Agent's role is to provide user authentication to the Policy Enforcement Point deeper in the network and the endpoint-security assessment information back to the Policy Decision Point, dubbed Infranet Controllers.
Juniper's firewall and SSL VPN products, called Infranet Enforcers, act as the Policy Enforcement Points and are typically located deep within the network.
The Infranet Agent also manages encryption between the end system and the Infranet Enforcer Policy Enforcement Point. By applying IPSec encryption between the client and the Infranet Enforcer, Juniper offers strong binding between the end station, its authentication and the applied policy. This security starts only at the Policy Enforcement Point; any misbehavior by the client before it reaches the Infranet Enforcer is uncontrolled in the Juniper Infranet model.
Juniper's Infranet Controllers, akin to the TCG's Policy Decision Points, are based closely on Juniper's SSL VPN product line, as both use the same policy engine.
Unlike other NAC architectures, Juniper's Policy Decision Points don't have a clear link between the Integrity Measurement Verifiers, which evaluate endpoint-security information from the Juniper Host Checker (acting as the Integrity Measurement Collector in the TCG scheme) and give a policy decision back to the Infranet Controller.
Instead, the Infranet architecture waves away the question of how Integrity Measurement Collectors can pass information to the Integrity Measurement Verifiers within the Policy Decision Point by pointing off to the JEDI specification. In reality, the JEDI specifications are mute on how this link will work. This is a weak point in the Infranet architecture, because management of desktop and roaming user policy has to be handled once in whatever enterprise console is used to control the third-party security tool and then a second time within the Infranet Controller environment.
Choosing a NAC architecture depends on your goals and your integration strategy. If you're an all-Cisco shop with modern hardware, you can hitch your horse to Cisco's architecture, which is as complete as anyone's.
For those interested in standards-based solutions, TCG's TNC is the only real option despite some risk. Microsoft's approach is most appropriate in smaller networks where you want to control the PCs you already own and are most concerned about viruses rather than authentication and access control.
Wave Systems to Demonstrate TNC Network Integrity Access Control with Juniper Networks
2/10/2006 Wave Systems Corp. (Nasdaq: WAVX, www.wave.com) announced that it will demonstrate network integrity access control capabilities using the industry standard Trusted Network Connect (TNC) architecture. TNC architecture is designed to deliver significantly strengthened network integrity. This demonstration, featuring Wave's Embassy(R) Trust Suite software products working with Juniper Networks L2 access control solution, will be conducted at the RSA Conference 2006, Booth 1407, Monday, Feb. 13 through Friday, Feb. 17 at the McEnery Convention Center, San Jose, CA.
TNC is a security architecture standard promoted by the Trusted Computing Group (TCG) designed to help improve the security and compliance integrity of clients during the network connection process. The TNC establishes a level of network access based on the configuration and integrity of the client. Network administrators implementing the TNC expect to have fewer security problems, lower support costs and less downtime caused by poorly configured or infected client systems.
The TNC standard was developed by a TCG subgroup of more than 60 networking and technology industry companies representing client and network security; switches, routers, and hubs; systems and systems management; and operating systems.
At RSA, Wave is demonstrating its Embassy secure software technology by delivering platform integrity services on a PC equipped with a Trusted Platform Module (TPM). The Embassy technology platform is designed to support hardware security features provided by TPM security chips currently shipping in millions of personal computers.
In the case of platform trust services, Embassy technology, using a TPM, enforces a set of policies to collect integrity information from the PC, such as the state of anti-virus software, whether the operating system has been tampered with, or whether all appropriate patches have been downloaded to the client. The Embassy platform provides these client functions in concert with IT department policies which can be set through network equipment and software from Juniper Networks. Clients not meeting the pre-determined policies, such as those for patch levels, can be quarantined for remediation, repaired, and then allowed access to the network.
"The TNC standard leverages existing network infrastructure to deliver secure and cost-effective, best-in-class access control solutions. Adding TPM support to the client component of the system is a natural extension of the solutions' ability to control use and protect enterprises from non-compliant or malware-infected machines," said Andrew Harding, director of product management at Juniper Networks, Inc. "Juniper Networks is showing the interaction between Wave's Embassy Trust Suite software products and Juniper Networks' Layer 2 access control technology, demonstrating how standards-based systems can provide complete, seamless trusted computing and access control."
"It is exciting to see Wave Systems releasing an implementation of the Platform Trust Services (PTS) standard from the TCG, since PTS is an essential piece of the trusted computing ecosystem," said Dr. Thomas Hardjono, co-chair of the TCG Infrastructure Working Group. "The PTS is designed to work on a broad range of platforms, including the PC-Client platform, Server platform, Mobile Phone platform, and the Network platform. Wave has clearly shown their leadership in the trusted computing technology space."
"The platform integrity feature available with Wave's Embassy technology is one of the industry's first solutions designed to provide TNC products with the strong authentication capabilities of a TPM," said Brian Berger, Wave's executive vice president, marketing and sales. "Embassy delivers key identity capabilities for the network authentication of users and machines as well as important integrity capabilities for the collection of data necessary to determine the health of a particular PC prior to network access."
The Embassy Trust Suite and the Embassy Enterprise Authentication Server deliver improved trusted computing features for enterprise and government markets. These features include network policy management, data protection, biometric authentication, smart card authentication, password authentication and machine authentication of a user's personal computer to a server.
For more information about Wave's products and services, please go to www.wave.com.
Juniper, Symantec join forces to secure remote machines
12/05/05 Juniper Networks is announcing an agreement with Symantec for software that makes sure remote machines meet security policies before they can access Juniper SSL VPNs.
Based on technology Symantec acquired when it bought WholeSecure earlier this year, the Advanced Endpoint Defense Module downloads a software agent to remote machines to scan them for malicious code such as Trojans, keystroke loggers and viruses. The software can also monitor remote machines during SSL sessions to make sure their profiles don't change to an unacceptable state.
Customers can use the software to create separate policies for separate groups. So it might be all right for IT staff to have key loggers on their machines, but not the marketing department.
The configuration software for the endpoint-protection software is tuned to check for certain specific security software running on the remote client. This feature is meant to save time. So if a customer wanted to check that a certain brand of anti-virus software was active and updated, they would just designate the software search for that brand. Before, customers would have to type in what specific registry checks to make to determine if the anti-virus is present, for instance, which called for more individual entries on the part of an administrator.
A 25-user Advanced Endpoint Defense Module ships standard with any of Juniper's SA model VPN gateways. If customers want more than 25, they can pay for more licenses. It costs $1,000 to cover 50 more simultaneous users and $30,000 for 2,500. The module is available now.
Intel chipsets add support for HDMI, TPM and NAND Flash-based BIOS in 2006
Chicago (IL) - When Intel launches its next-generation microprocessor architecture, the company will also introduce a new chipset platform as part of what the company calls a "refresh" to take advantage of new features. Users will see several features that enable and restrict the use of High Definition content, legacy removal and an effort to relocate the BIOS into NAND Flash memory, TG Daily has learned.
2006 will be an important year for Intel to set strategies and build the foundation for all microprocessor-related products in the next four to five years. The company already announced that it will launch a new architecture by mid of next year and we recently were able to provide our readers with a longer-term outlook
(http://www.tomshardware.com/2005/12/04/top_secret_intel_processor_plans_uncovered/) what is cooking in Intel's labs. But processors are only half the story, as they require chipsets to enable platform functions.
While our view on the Northbridge plans is somewhat cloudy, we recently got some insight in Intel's ideas for the Southbridge. The next-generation chipset platform, referred to as "Broadwater" will include the "ICH8" Southbridge as successor of the current "ICH7," which is part of Intel's 945, 955, 975 chipsets. ICH8, due in Q2 of 2006, will be built in a 90 nm process and bring a substantial amount of new features that, in part, are required to take advantage of High Definition content and in other parts to add components needed for Windows Vista and most likely also for Apple's transition to an Intel platform.
Most surprisingly, however, Intel apparently rethought the way how BIOS is implemented into the motherboard and how the system accesses it. While the BIOS today is stored in ROM or NOR Flash chips, the ICH8 will be able to connect to a BIOS stored in NAND Flash: In addition to simply holding the BIOS, the memory will be programmable and even be capable of holding applications and control more features of the motherboard. Think of it as much more functional core software that not only initializes hardware components, but takes over more system features. In this light, Intel's decision to create a NAND Flash joint venture with Micron begins to make sense - as Intel said that it intends to use the NAND Flash not only to supply Apple, but also for its own devices.
ICH8 will also remove support for some aging technologies such as PATA in favor of SATA. While the current ICH7 (http://www.tomshardware.com/2005/12/28/intels_65_nm_process_breathes_fire_into_double_core_extreme_e... integrates 4 SATA ports, ICH8 will come with 6 on the desktop platform. PATA support will be completely removed from the desktop chipset version and only be available in the mobile ICH8. Intel also increases the number of USB connects from 8 to 10 and integrates an additional EHCI controller to improve USB bandwidth on the desktop version. AC'97, which was touted (http://www.tgdaily.com/2005/03/02/lakeport_chipsets_945/) in ICH7 as enabler for 7.1 channel audio will be gone in ICH8. Instead, the new Southbridge will bring real-time HD audio processing with support for the High-Definition Multimedia Interface (HDMI) via an additional SDI link.
But High Definition does not only bring new features, but restrictions as well. ICH8 will be the first Intel Southbridge to support the firm's La Grande technology (LT), a hardware-based security and digital rights management approach that is based on the specifications developed by the Trusted Computing Group (TCG). A key part of the technology will be integrated into a "Trusted Platform Module" (TPM) that will be located on the motherboard.
This TPM is believed to be essential for Apple, as it is expected to restrict the installation of Windows software on Apple devices. For Windows users, the TPM is tied to Microsoft's Windows Vista on an operating system level: Vista will include Microsoft's "NGSCB" (Next Generation Secure Computing Base), which promises to provide an added level of protection, for example from phishing attacks, but also has all the capabilities to provide an extensive digital rights (DRM) system. It is powerful enough to let content providers determine how we will be able to use digital content such as audio, video and software.
For the second quarter of 2007, Intel plans to release ICH9 to support the desktop processors Conroe, Ridgefield, Allendale and Millville (see our article on Intel's next-gen processors (http://www.tomshardware.com/2005/12/04/top_secret_intel_processor_plans_uncovered/)) as well as upcoming versions of the Xeon DP and MP. ICH9 will also serve as initial platform for Intel's first 45 nm processor generation, which will be based on the mobile "Penryn" CPU that is scheduled to be launched in the second quarter of 2008. As of now, ICH9 appears to be a slight update for ICH8 that, however, will continue legacy removal with PATA also disappearing from the mobile version, added USB support (12 ports) and a reduced power consumption of less than 3.5W.
http://www.tgdaily.com/2005/12/29/intel_ich8_ic9_preview/
Broadwater.
http://x86-secret.com/?option=newsd&nid=805
Intel sealing storage, CPU chips and chipsets to defeat hackers
Intel's Broadwater to include trusted memory and storage access
Chris Mellor, Techworld
03 November 2004
Memtest86, a French technical web site, claims that it has acquired details of Intel's 2006/7 Broadwater platform.
Processors such as Allendale - available at the end of 2006 - and Millville - available early in 2007 - use the Broadwater chipset platform to access DDDR2 and DDR3 memory through one or two channels. The processors have several I/O channels at their service: up to eight PCI EXpress slots; Gigabit Ethernet, 802.11, 10/100 LAN MAC; serial flash; six SATA ports; high definition audio; TPM and Trusted Memory and Trusted USB2 (8 ports). LaGrande secure computing technology is also present in Broadwater.
LaGrande technology is about delivering a foundation for trusted computing, according to Intel COO Paul Otellini. It will feature protected execution of programs, the use of protected memory and access to protected storage. It effectively is a gatekeeper on CPUs and chipsets that decides whether or not to let O/Ss and applications run on the hardware.
The LaGrande scheme describes chip and chipset attributes needed to facilitate secure computing. An example of one such is Microsoft's NGSCB or Next Generation Secure Computing Base. (This was once code-named Palladium.) It is expected that enterprise Linux/Unix vendors are also working with Intel to use Broadwater. Intel presents LaGrande in a software-agnostic fashion.
TPM, meaning trusted platform module, is a chip which holds individual Broadwater platform data and encryption keys, plus a random number generator for keys.
In Broadwater, storage would become a fortified vault, instead of being openly available to any application run under any operating system, as with today's situation.
The situation in the future will be worse because the use of web services will mean that code fragments will be dynamically assembled from multiple locations across a network. These will work together to provide application functions. Broadwater, with LaGrande and TPM, should help ensure that only web service code fragements that have already been validated will be used.
Intel is concerned that x86 take advantage of its coming technology to best provide the performance and security users want. Put simply, such secured hardware won't let hackers take over servers and workstations with malicious code because it won't be authorised by the LaGrand'ised systems to run on them.
LaGrande Technology (LT)
LaGrande Technology (LT) is a new security technology that will be available on Intel’s next generation CPUs (Merom, Conroe and Woodcrest) to be released in 2006. In this tutorial we will explain its main features and how they work.
http://www.hardwaresecrets.com/article/264/1
Coming Sooner Than You Think: Intel Next–Generation Enterprise Platforms
Architectural Innovation through Powerful and Energy–Efficient Multi–core Platforms
INTEL DEVELOPER FORUM, San Francisco, March 7, 2006 – Pat Gelsinger, Intel senior vice president and general manager of the Digital Enterprise Group, today showed how Intel will deliver superior computing performance and energy efficiency this year while reducing the total cost of IT ownership.
“2006 marks a year of transitions for Intel –– a transition to a new process technology and a powerful new microarchitecture, along with the delivery of new platforms solving tough problems for our customers,” said Gelsinger. “This year we have a line–up of enterprise platforms and technologies that will inspire developers with opportunities and excite IT managers with critical capabilities to manage costs and run their business.”
At the center of Intel’s efforts is a commitment to energy–efficient performance based on a next–generation microarchitecture reviewed earlier in the day by Intel Chief Technology Officer Justin Rattner. These multi–core products designed with the Intel® Core™ microarchitecture will enable unique designs and fuel the industry’s most sophisticated office PCs. It will also help IT managers increase responsiveness and productivity while at the same time reducing real–estate and electricity burdens companies face as server data centers grow.
By the end of 2006, Intel Core microarchitecture will be at the heart of PC and server platforms. Noting its remarkable gains in performance for desktop PCs, Gelsinger showcased Conroe, a dual–core processor that can reduce power consumption by 40 percent while delivering greater than 40 percent improvements in computing performance¹.
Additionally, Gelsinger announced that Conroe will now also be a part of Intel’s Professional Business Platform –– codenamed Averill –– available in the second–half of 2006. Averill will deliver world–class IT security and manageability capabilities for businesses through the Conroe dual–core processor along with a new chipset codenamed Broadwater, Intel® Virtualization Technology and the second generation of Intel® Active Management Technology.
For dual–processor servers and workstations, Intel will ship three new processors in 2006. Sossaman, an ultra–low–power processor, is scheduled to ship next week and is designed for server blades, storage devices and telecommunications equipment. Dempsey is scheduled to ship by the end of the month and is the first processor for a new Intel® Xeon®–based platform, codenamed Bensley. With the majority of its volume shipping below 100 watts, Bensley will deliver performance–per–watt leadership.
In the third quarter of 2006, Intel will update the Bensley platform with the Woodcrest processor, which will further reduce power consumption by 35 percent while delivering greater than 80 percent improvement in computing performance². Joining Gelsinger onstage was Gary Campbell, vice president and chief technology officer of Enterprise Storage and Servers for HP*. Campbell outlined HP’s support for the Bensley/Woodcrest platform offering its server and workstation customers leading performance and performance per watt.
Further reinforcing Intel’s near–term portfolio of leading multicore products, Gelsinger also gave developers their first public view of a running quad–core processor, codenamed Clovertown, for dual–processor servers. Clovertown is socket–compatible with the Bensley platform and is slated to ship in early 2007. It will deliver increased processing capacity and is well–suited for multi–threaded applications, such as those used in databases, financial services and supply–chain management. Additionally, the company also plans to ship a quad–core processor –– codenamed Kentsfield –– for high–end desktop PCs in early 2007.
Intel provided a look at the next generation of Intel® Virtualization Technology (Intel® VT) for enterprise servers. Server virtualization helps IT organizations streamline their infrastructure, optimize utilization, reduce total costs and improve business agility. Intel began to ship processors with Intel® VT last year. Intel’s next generation of virtualization, Intel Virtualization for Directed I/O (Intel® VT–d), will include I/O virtualization to assign I/O devices to virtual machines, providing a more robust, higher performance platform for virtualized systems.
The company also announced the immediate availability of a specification for developers to evaluate and design future Intel® VT–d supported products. Supporting this development, both Microsoft* and VMware* executives appeared during the keynote and announced support and collaboration on the Intel® VT–d specification.
VMware CEO Diane Greene outlined plans to support Intel® VT in all of its enterprise virtualization products, including ESX Server, in 2006. Today VMware supports Intel® VT in its Workstation 5.5 and VMware Server products, and plans to have production support for Intel VT in the second half of 2006. The two companies are beginning broad co–marketing program to drive the adoption of server virtualization. VMware will also support Intel’s latest Virtualization Technology, VT–d in 2007.
Microsoft’s Bob Muglia, senior vice president, Server & Tools Business, also joined Gelsinger on stage and discussed Microsoft’s collaboration with Intel on the specification for Intel® VT–d and how this technology provides a hardware foundation for the Windows* virtualization architecture. Additionally, Muglia discussed how the two companies are collaborating to advance PC manageability capabilities for IT. Intel Active Management Technology (Intel® AMT) combined with Microsoft’s Systems Management Server product will provide IT managers with the ability to manage PCs on their networks even when these devices are turned off or have inoperable hard drives or operating systems.
Intel® AMT allows IT managers to remotely manage and maintain those systems without disrupting the end–user. In addition, Gelsinger reviewed Intel’s next generation of Intel® AMT and a new feature codenamed Circuit Breaker. This feature proactively protects against such incoming threats as viruses, isolating infected PCs before they impact the network, and alerting IT when threats are removed.
Further advancing the security capabilities of future PC platforms, Gelsinger announced that a preliminary specification for LaGrande Technology (LT) is now available for developers. LT consists of hardware extensions to Intel silicon that enable the platform to protect against software–based attacks and protect the confidentiality and integrity of data on the PC. Intel will also make LT hardware available this year on select business desktop PC platforms, including platforms based on Averill, to encourage innovation of new PC security capabilities and help developers identify enhancements to LT in preparation for growing customer adoption of these new applications.
“Platform evolutions for PCs and servers are only part of the story,” said Gelsinger. “We are seeing tremendous growth in services over IP, and this means more opportunities for developers to design and configure the networks required to deliver them.” Gelsinger pointed to the roadmap of Intel Core microarchitecture products addressing the equipment needs of service providers while at the same time improving server density and manageability in these new network data center environments.
http://appzone.intel.com/pressroom/PrintPressRelease.asp?file=http://www.intel.com/pressroom/archive...
Aurelius Consulting.
http://www.runonideas.com/files/clients/WAVX/WAVXProfile.pdf
Happy Holidays everyone!
Smart Identity Certificate.
In green on screen just above step 2. There is a $15 fee for a Smart Identy Certificate from Wave.
http://www.alamode.com/tech/manuals/mortgagexsites/step3createandinstallyourdigitalcertificate.htm
2. Now, click the link to access the Wave Systems Smart Identity page. Read and accept the license agreement, then complete the application form and click Continue.
http://www.alamode.com/tech/manuals/mortgagexsites/usingdigitalsignatures.htm
XSites users to get benefit of digital signature technology once reserved for biggest brokerages, lenders.
Featured news & tips — posted November 3, 2004
A lot of buzz in the media and in the halls came out of our booth at the 91st annual Mortgage Bankers Association (MBA) Conference & Expo in San Francisco October 24-26 with our announcement that in conjunction with Wave Systems, we're bringing digital signature technology to small and medium sized mortgage brokers and lenders in December.
"It's the same kind of digital technology once available only to the largest brokerages and originators. We're driving electronic mortgages — and ultimately electronic real estate transactions — by 'seeding the market' from the ground up by putting the same technology in your hands as an XSite owner," said Brad Eaton, a la mode's Mortgage Products Manager.
Although commonly referred to as an "e-signature," a digital signature uses a PKI encrypted certificate to sign a document and protect it from fraud. The term "e-signature" is much broader and can mean anything from the technology our XSite users will soon be getting to the digital pad you sign when you use a credit card to make purchases at Target or Home Depot.
To help push the market towards electronic mortgages, our entire customer base of tens of thousands of real estate agents, mortgage brokers, inspectors, loan officers and appraisers who use our XSites will receive the digital signing capability — which is legally-binding and standards-compliant — as a free upgrade to their Site. The target date for releasing this service inside Mortgage XSites is Dec. 20.
"This is a significant step for the entire real estate industry," said Frank Cook, Publisher of Real Estate Intelligence Report, a respected industry newsletter. "What's different here is that technology that was once only available to the largest firms and mortgage originators is now available to small businesses and individual brokers and agents," Cook added.
We think so too. We've been serving brokers and loan officers for years with our free, fast Mercury Network, which connected our lender customers to their appraisers for efficient ordering, statusing and delivery of appraisal work product.
As we look more towards the future of real estate, we decided to give the Mercury Network a new name — XSites Network — new solutions and a strategic direction. It reflects our commitment to the XSite’s platform which provides the communications hub between lenders, appraisers, real estate agents, and the vendors who service them.
With digital signature technology, your Mortgage XSite saves you money and allows you to close loans faster by giving you the same electronic order management, review rules, and automatic status updates used by the largest EVNs and management companies. Plus, full blown Internet-based marketing presence with online 1003, automatic borrower status updates, and online rate sheets makes your Mortgage XSite, as we like to put it: “The public side of your LOS®."
We’ve even expanded our network of appraisers and equipped them with an even more powerful set of tools to meet your needs. The XSites Network is still connected to appraiser desktops in every county of every state in the nation. So doing business with your appraisers is easier than ever through your XSite or otherwise.
Observers have often chided us as a company for putting resources into things — like digital signature capability for small businesses — that the market wasn't clamoring for. But we've never considered ourselves as primarily responding to market demand, but rather creating it. Years ago, the big players were wrangling over Electronic Data Interchange (EDI) and how to profit from vendors being able to send paperless mortgage documents securely and electronically. We developed a free, secure EDI solution that was instantly adopted by our tens of thousands of appraisers, our customers. Today, pay-for-play models don't fly.
We're going to revolutionize digital signatures the way we did EDI. XSites users are now on a level playing field with the big players when it comes to the efficiency and security of e-closings.
http://news.alamode.com/04/11m1.htm
Real Estate Lenders in Arizona.
These Lenders in Arizona are the cream of the crop, using XSites technology to provide you with interactive, personalized, and responsive service via the web. These Lenders can also be found on the XSites Network real estate search engine, by clicking here. (If you're a Lender, click here to find out more about XSites and how they help your business.)
Wave Systems Corp.
11301 N Twin Spur Ct
Tucson, AZ 85737-7239
Phone: (520) 797-3339
E-mail: jkearns@wavesys.com
WebSite: http://www.waveetms.com
http://www.alamode.com/DirectoryGenerator/Lender_Arizona.htm
Website.
Is this new? http://www.waveetms.com
Registered March 29, 2005.
Wave Systems and a la mode Sign Agreement to Provide ESIGN Solutions to the Real Estate and Mortgage Industry
Lee, MA – October 18, 2004 – Wave Systems Corp. (NASDAQ:WAVX) today announced it has signed an agreement with a la mode, inc., the nation's largest developer of valuation workflow software, for a la mode to offer a comprehensive solution for securely managing real estate and mortgage transactions online.
As a result of the contract, a la mode will offer legally-binding and standards-compliant digital signing capability from Wave to all its real estate agents, mortgage brokers and appraisers using a la mode's XSites network. Currently a la mode has thousands of real estate professionals, most of them small businesses, connected to its network of Appraiser XSites, Mortgage XSites, Agent XSites and Inspector XSites products. The software will be distributed to the entire network with the digital signing toolkit and e-signature included. Wave believes this places a la mode's customers at the forefront of digital signing in the real estate and mortgage sector.
Financial terms of the agreement were not disclosed.
“Digital signatures will be a reality on all of a la mode's network XSites for mortgage professionals, real estate agents, inspectors and appraisers,” said Scott Kinnaird, EVP of a la mode. “Critical mortgage and home buying and selling documents that currently take days and weeks to execute, can now be signed real time, online, using technology once only available to the largest brokerages and mortgage originators. This can result in significant small business cost savings through the elimination of document transportation, processing and delays in closings,” Kinnaird said.
a la mode will use Wave's eSign Transaction Management Suite (eTMS), which is designed to allow organizations to manage business processes and transactions entirely online, without the need for time-consuming and costly ink signatures and paper storage, overnight mail or expensive traditional delivery services. eTMS is designed to be flexible, with modular components that can be easily customized to suit a la mode's specific requirements. By using eTMS, the real estate and mortgage industry can create, sign, store, access and manage the lifecycle of legally-binding electronic records, all within the framework of federal and state laws governing e-signature and e-records, including ESIGN, UETA, Revised Article 9 of the UCC, and industry association standards such as SPeRS and USPAP.
a la mode's flagship product, WinTOTAL, is used by more than 50 percent of the nation's appraisers, according to a la mode estimates, to analyze properties and create the required appraisal forms as electronic documents. a la mode's XSite Order Manager software manages the delivery and workflow of those documents over the Web, with secure delivery directly to the client.
According to company data, a la mode's servers delivered more than 17.3 million electronic mortgage transactions in the past 12 months, making it the highest volume electronic document management system in the mortgage industry. “With tens of thousands of WinTOTAL users in the appraisal industry, we believe that adoption by the majority of appraisers in the United States will be almost automatic,” Kinnaird said. “And by distributing easy-to-use signing and workflow tools, even to non-clients, street level, small business real estate professionals – the ones without the resources and IT departments of the biggest brokerages and originators – are now on an even playing field.”
Kelly Purcell, vice president of Wave's eSign Systems Group, said, "We believe that a la mode's success with electronic documents in this market is remarkable. This joint offering layers on top of that what we have designed to be a complete, end-to-end solution for customers and represents what we believe is a large potential market for both companies. Wave's eTM Suite is an emerging leader in e-vault, e-sign, PKI-based identity and integration services, and we believe that a la mode is the established leader in valuation workflow technology products and services. Together it is our plan to form a unique solution in the marketplace."
Built on a la mode's net.X™ data backbone technology, the XSites Network (formerly the Mercury Network) connects appraisers, loan officers, and management companies. It is designed to be a simple and elegant solution to workflow problems, particularly XML data access and compliance reviewing, which have be an issue with generic internet portals and legacy report-conversion products. XSites Network appraisers are available and connected in every county in the United States.
Wave's eTM Suite consists of SmartSignature™, SmartSAFE™, SmartIdentity™ Services, SmartConnect™, the SMARTDoc™ Mortgage Banking Module and the EMBASSY® Trust Suite of software solutions.
The SmartSignature application uses digital certificates in a point and click signing process. SmartSAFE stores digitally-signed, legally-binding contracts in a document repository. SmartIdentity Services validates the identity of parties involved through a PKI-based identity application using an Equifax® patented process and automated digital certificate issuance. The eTM Suite SmartConnect solution offers web services for integration with other applications such as workflow, legacy systems and CRM.
“SmartSignature also supports the use of a Trusted Platform Module security chip, compliant with the specifications defined by the Trusted Computing Group – giving Xsite-users the option of using hardware based authentication to increase security,” said Scott Schrader, president of Wave's eSign Systems Group. The eTM Suite is also enhanced with modular functionality addressing industry specific opportunities, including banking, mortgage, insurance and government processes. For more information on these solutions, please link to www.esignsystems.com or www.wave.com/signonline/signonline.html.
About a la mode
a la mode, founded in 1985, develops desktop, mobile, and Web tools for real estate appraisers, agents, inspectors and mortgage lenders. Each year, over half of the nation's home appraisals are created with a la mode's WinTOTAL software and delivered electronically through its server network, which handles nearly a million and a half paperless mortgage transactions a month. a la mode XSites allow real estate professionals to deploy a professional Web presence that manages transactions and communications with their clients and provide an integrated platform for their own day to day processes. Learn more at http://www.alamode.com.
Limelight Networks.
Interesting, both Phantom and now xbox are using Limelight networks for their gaming service. theplatform is listed as a technology partner on the Limelight networks site.
Limelight Networks Chosen to Deliver Xbox Live
High-performance network will provide content to gamers.
May 02, 2005 - Limelight Networks today announced it has been selected by Microsoft® as the Content Delivery Network for Microsoft's Xbox&153; Live, the online gaming service for the Xbox® video game system from Microsoft. With full implementation of Xbox Live on Limelight Networks' powerful delivery network, the synergy of Xbox Live and the Limelight Networks platform will provide millions of gamers unprecedented online access to games, content and downloads from Microsoft and leading game developers directly via Xbox Live.
Xbox Live will utilize Limelight Networks' technology and high-performance distributed network to provide on-demand games and other multimedia content to its full network of online subscribers. "Limelight has an unmatched track record of fast, reliable delivery of rich digital content, ensuring that our customers will continue to have a superior online entertainment experience," said Xbox Live Operations Manager Eric Neustadter. "The Limelight Networks platform has demonstrated it can support the needs of Xbox Live subscribers today, and can scale with Xbox Live as we continue our rapid growth."
"Leveraging our powerful content delivery infrastructure, the enhanced Microsoft Xbox Live online service is sure to prove a big win for Xbox users accessing the Internet," said Nathan Raciborski, chief network architect for Limelight Networks. "Microsoft's planned content and audience size presented massive performance and scalability requirements for this project. Our technology, distributed infrastructure, and proven delivery performance made Limelight the clear choice for delivery of high-speed downloads of Xbox Live content to a large and growing community of subscribers."
http://wire.ign.com/articles/609/609420p1.html
INFINIUM LABS, LIMELIGHT NETWORKS JOIN FORCES TO CREATE DIGITAL CONTENT DELIVERY NETWORK FOR GAMES-ON-DEMAND
High-Performance Network Augments Content Delivery Infrastructure To Power Phantom Game Service
SARASOTA, Fla. and TEMPE, Ariz. – Nov. 15, 2004 – Infinium Labs (OTC BB: IFLB) and Limelight Networks, a leading Digital Delivery Network provider, have formed a strategic alliance to deliver content for Infinium’s flagship Phantom Game Service™ rapidly and seamlessly, via broadband. To expand the service’s content delivery infrastructure, Limelight will provide high-performance, high-integrity back-end technology and local high-speed distribution points for Phantom, the first end-to-end, subscription-based on-demand game service.
Infinium Labs will utilize Limelight Networks’ ContentEdge delivery platform and will leverage the company’s globally distributed data and network operation centers, which feature multiple modes of redundancy, real-time traffic monitoring and advanced control systems.
“We’re confident that Limelight’s track record of fast, reliable and scalable delivery of rich digital content will allow us to give our customers the best possible user experience,” Kevin Bachus, president and COO, Infinium Labs, said. “We need a network provider that can stream game files to large audiences quickly and, at the same time, help us manage the costs associated with heavy file delivery.”
Limelight will also manage traffic spikes to prevent service interruptions and provide other managed services for the Phantom Game Service.
The relationship between the two companies was born out of a mutual goal to bring high-quality rich media content to end-users in a reliable, efficient and entertaining manner.
“We share the vision of Infinium and its game publishing partners of making games readily available over the Internet so they can be accessed anytime, anywhere,” said Limelight Networks president and CEO Bill Rinehart. “We’re proud of our relationships with other digital entertainment companies, such as MusicMatch, Akimbo and Virgin Digital, and now we want to help Infinium deliver a flawless, technologically sophisticated experience to the video game market.” Infinium Labs has announced it will launch its Phantom Game Service in 2005.
http://www.limelightnetworks.com/news/infinium111504.html
thePlatform and Limelight Networks Partner to Deliver Gospel Network.coms' Premiere Gospel Music Pay-Per-View and Subscriptions Service
Longest running gospel webcast attracts global audience
Seattle, WA - September 3, 2003 - thePlatform for media, inc.™, a leading provider of software for rich media content management, publishing, and reporting software, and Limelight Networks, a leading provider of content delivery services, and GNet Media Group today announced the successful launch of the Gospel Network.coms' on-line subscription video channel GMWATV.org.
GMWATV, the longest running live gospel music webcast event in history, aired live from August 9th through August 15th this year. GMWA-TV allows the faithful - and fans of gospel music - from around the world and all walks of life to see and hear daily sermons from inspiring speakers, as well as interviews and live performances by some of gospel music's top artists - both during the live events, and afterwards on-demand. The event was a tremendous success, attracting audiences from as far away as Africa, Japan, and Thailand.
GNet Media Group, which produced the event, wanted to provide a flexible and cost-effective way for people to tune-in, so they turned to Limelight Networks and thePlatform for assistance. The solution combined cost effective high-quality Internet streaming from Limelight Networks, with a flexible integrated content publishing and commerce solution from thePlatform.
thePlatform's software publishing system allows media producers to easily upload and manage on-demand media, as well as live events. thePlatform's turnkey secure portal technology and integrated commerce engine allows users to register on-line and gain immediate access to packages of both live and on-demand content they have purchased. Once users have logged in, they are able to view all media currently available to them from Limelight Networks distributed streaming servers.
"Limelight Networks and thePlatform are the perfect solution for content providers seeking to manage and distribute rich media content to a targeted audience." said A. Leon Burnette, CEO and Executive Producer of GNet Media Group's Gospel Network.com.
GolfSpan.com Adopts thePlatform and Wavexpress Integrated Solution for DVD-Quality Internet Video
SEATTLE, WA. - July 27, 2004 - thePlatform for media, inc., a leading provider of software for broadcast and broadband rich media content management, publishing, commerce and reporting, today announced the integration of Wavexpress' WX broadband video technology and thePlatform media publishing system™. Wavexpress is majority-owned by Wave Systems Corp. (NASDAQ: WAVX), a leader in trusted computing.
The integration of Wavexpress and thePlatform allows customers to publish media files to both streaming and cached video applications, with full-screen, DVD-quality video, automated program delivery and expiration, and instant, on-demand access to programming. thePlatform media publishing system provides intelligent media objects that enable content owners to manage their broadband media assets in multiple formats and across various distribution paths. With the integration of Wavexpress and thePlatform, customers can now publish both to traditional streaming content delivery networks (CDNs) and to secure channels of cached media. Wavexpress supports both IP unicast and IP Multicast delivery, providing a "cable-ready" broadband solution. Wavexpress delivers and stores content in the background, notifying the user when new content has been received. Users can instantly launch a viewing experience that is better than full-screen, TV-quality. The solution will be marketed to both media companies and corporate enterprises.
Xbox 360: multiple versions planned, WebTV to ship on premium edition?
Two different Xbox 360 bundles to hit retail in time for Christmas
Microsoft's is still planning to ship two different versions of its Xbox 360 console at launch, according to sources close to the company - while reports suggest that the high-end version may feature the firm's WebTV system.
It's long been thought that Microsoft plans to ship two different Xbox 360 bundles, one with a hard drive and one without, and give users the option of upgrading the low-end system with a hard drive accessory.
Sources close to the firm have confirmed this week that there's much talk of two distinct price points, which seems to indicate that this is still the plan for launch - while a report on well-connected gaming blog Kotaku gives an indication of how the two different models will be differentiated.
The site reports that the basic edition of Xbox 360 - the version without the hard drive - will not have backwards compatibility, while the "premium" version with the hard drive will ship with Microsoft's WebTV functionality built-in.
WebTV is Microsoft's effort at bringing internet communication and media functionality to the living room, and includes basic functionality such as web, e-mail and IM access along with the ability to stream music and video channels from the 'net or from local PCs.
Integrating the system with Xbox 360 would be a logical move, and a major land-grab for Microsoft in this space - which is tipped to become more important in the coming years as increasing amounts of content are broadcast over the Internet as opposed to over traditional TV networks.
A major question mark over the possibility of a the two-tier Xbox launch, however, lies with the question of customised content - one of J Allard's most vaunted goals for the new system - and how that would tie in with a low-end Xbox 360 without a mass storage device.
One part of the answer to that question is the inclusion of a high-capacity solid state memory device with the system, which wouldn't be large enough to store music or movies in any significant volume - or to act as a cache for Xbox games, as the existing Xbox' hard drive does - but would be able to act as a cache customised game assets.
Indeed, last year Israeli flash memory specialist M-Systems confirmed that it is working on a memory solution for Xbox 2, with CEO Dov Moran stating that "when users want to save their e-mail messages, copy music, or anything like that, the only storage they’ll have is what we give them."
Another part of the answer to that question may come from Kotaku's sources, who indicated to the site that around 80 per cent of the systems produced for launch would be the "premium" version - suggesting that the lower-end model is, more than anything else, a concession to launching a competitively priced "games only" system.
Sony is also widely expected to launch multiple versions of the PlayStation 3 console, which is due to arrive in 2006, with both "home media server" and stripped down "basic console" versions believed to be on the cards.
Analysts: 3 million Xbox 360s shipped by Xmas
Goldman Sachs says it expects Microsoft's next-gen console to arrive in force this year--perhaps as early as October--for under $300.
With the unveiling of the next-generation Xbox on the horizon, doubts that the console will not arrive this year are steadily evaporating. Any lingering uncertainty was further dispelled today when the online edition of Forbes reported that top-flight investment firm Goldman Sachs "expects" the console to arrive in time for the 2005 holiday season.
According to Forbes, Goldman Sachs is predicting that the next-gen Xbox, now increasingly referred to as the Xbox 360, will "be available for retail sale in October or November at a retail price of about $249 to $299." Goldman says it "expects" Microsoft to have shipped around 3 million units by year's end and reiterated its "outperform" rating for Microsoft Corp. stock, which closed at $25.32 today.
Goldman Sachs' predictions were backed up by another high-profile analyst's report. "We expect Microsoft to announce a release date for the next-gen Xbox in the October/November 2005 period," said Boris Markovich of TerraNova Institutional.
In the same report, Goldman Sachs said it does not see the PlayStation 3 appearing on US store shelves until mid-2006. The company predicted that an earlier launch--sometime in the first calendar quarter of 2006--in Japan is likely.
XBOX 360 massive level of downloadable on-demand content?
Xbox 360: Downloadable Demos From Day One, Wireless and more
Revealed – massive 'try before you buy' program readied in Redmond.
360 will see an unprecedented downloadable demo offering from day one, with Xbox Live being shaped to deliver massive levels of on-demand content.
Microsoft is expected to announce plans for the system at its pre-E3 event in Los Angeles next month, highlighting what was described to SPOnG as way of highlighting “key titles” to users, as well as offering further added value to the groundbreaking Live service.
“It will mean more work for developers,” our source told us, “though it will offer what is essentially hype-free evaluation options to the consumer.”
Microsoft’s decision to include demo software in downloadable form is far from good news for the magazine sector, which to date has seen Official sales propped up on the back of the demo discs included on their covers.
This news could also be seen as a shot across the bows of traditional retail, with console gamers being further conditioned to look for kicks online through Live rather than in-store. Currently around half of the price paid for any game goes straight into the retailer's pocket. Offering direct sales to gamers would cut out this expense and may be seen as a way of combatting escalating development costs which will inevitably have to be passed on to the consumer. Some estimates have talked of next-generation software titles hitting £70 or more at retail. Downloadable content would enable Microsoft to offer next-gen gaming without the hefty price tag.
Should the demo program prove successful, it would make sense for Microsoft to offer full in time, though the viability of this still rests with the as-yet unknown possibility of hard disc inclusion for 360.
However, Xbox lead J Allard recently hinted that the new Xbox may well come in different forms to suit preferences on a per-region basis, saying “I think we need to have a global foundation, and then personalise within region.”
Interestingly, SPOnG has had it confirmed by several senior sources that the Xbox 360 will feature wireless connectivity out of the box. Furthermore, data storage via PC will be featured, though information seen to date makes reference to this being used solely for media storage. However, downloadable Xbox content could, in theory, be stored too, though we should make it clear that the possibility of such content being stored in this way is mere speculation at this point.
http://spong.com/detail/news.asp?prid=8509&ngb2=oxy
_
Seagate.
I wonder who will make the optional hard drive for Xbox 360?
Our same reliable source who delivered the goods for us a few weeks back with the inside dirt that the name for the next Xbox is indeed the Xbox 360 has just hit us up with a couple of other nibblets: One, that the Xbox 360 is definitely going to come with wireless controllers; and two, that it’s going to have an optional hard drive that attaches to the top of Xbox 360 “in a really slick way, almost like the hood scoop on a muscle car.” Better still, “You’ll be able to add the hard drive afterwards without having to take the box apart if you didn’t buy the hard drive version of the Xbox 360.” Yeah, that means there are going to be (at least) two versions of the Xbox 360 available when it goes on sale, one with a hard drive, and one without.
http://www.engadget.com/entry/1234000100032808/
MICROSOFT PICKS SEAGATE AS HARD DRIVE SUPPLIER FOR XBOX VIDEO GAME CONSOLE
Video Game market offers new growth opportunity for leading Consumer Electronics storage provider
SCOTTS VALLEY, Calif.—07 November 2000—Entering another new segment in the growing Consumer Electronics market, Seagate Technology has been chosen as a strategic supplier of hard drives for Microsoft's future-generation Xbox video game console, due to hit retail stores in fall 2001. Employing a built-in hard drive, Xbox heralds a new growth opportunity for Seagate and ensures that deeper, richer games will be developed with its technology. As the number-one storage supplier for the Consumer Electronics market, Seagate is well-positioned to provide technology and expertise for the Xbox. Seagate's consumer disc drives, including the U Series 5, offer the best combination of performance, ruggedness and value, and will enable game developers to create breakthrough game experiences.
Microsoft awarded Seagate a multi-year contract to provide hard drives for the Xbox, beginning in June 2001 and continuing through mid-year 2003.
"As a leader in disc drives optimized for consumer electronics applications, Seagate is a logical choice to help Microsoft bring inventive technology to the lucrative game console market," said Todd Holmdahl, general manager of Xbox Hardware at Microsoft. "Seagate's innovative Consumer Electronics storage technology enhances the superior experiences that will be brought to life on Xbox."
"Because of its Seagate hard drive and other advanced technologies, Xbox will deliver imaginative and exhilarating game experiences with lifelike graphics, and faster, deeper Internet gameplay," said Duane Pemberton, editor-in-chief of CNET affiliate GamersDepot.com, a leading video game publication. "Xbox offers more than three times the graphics performance of any other game console. The Seagate hard drive will give Xbox gamers more flexibility, which will provide for a more realistic and richer game experience."
"This Seagate-Microsoft agreement is a clear boost to Seagate in maintaining its position as the number one storage supplier for Consumer Electronics," said Mark Geenen, president of leading data storage market research firm TrendFocus. "Seagate has invested significant time and resources in its consumer strategy, leading to unmatched shipments of more than one million hard drives for the CE market. While the market will be hotly contested in the coming years, Seagate's investments in both design and implementation of HDD technology in the CE market should pay dividends down the road."
"Seagate continues to build upon its leadership position within the consumer electronics market with a multi-year contract to supply its hard drives for the Microsoft Xbox," said Dave Reinsel, IDC senior analyst. "Given the success of its low-cost U Series drives, Seagate has a proven design to meet both the performance and pricing requirements related to the consumer electronics market."
"This is an important design win for Seagate as we work to increase our Consumer Electronics leadership," said Brian Dexheimer, Seagate executive vice president of Worldwide Sales, Marketing and Customer Service. "The popularity of video games as entertainment is undeniable. Currently, there are about 29 million game console players. Eighty-six percent of U.S. families with teens have one or more game consoles. As a category, games represent 50 percent of consumer PC software sales. This is an opportunity for volume growth in disc drive shipments as the Xbox attracts a large portion of this audience."
"The Xbox is a strategic product for Microsoft. As a long-time partner, Microsoft knows that Seagate provides advanced technical and operational capabilities," said Dexheimer. "Seagate has the most extensive experience helping the world's leading CE device makers innovate during product design and integration. Once again, we're working with an industry leader to help develop a new market and utilize disc drives a new and exciting way."
http://www.seagate.com/cda/newsinfo/newsroom/releases/article/0,1121,815,00.html
New Data Protection Technology Demonstrated at Intel Developer Forum by Seagate Technology and Wave Systems
San Francisco, CA – March 1, 2005 – Seagate Technology (NYSE: STX– www.seagate.com ) and Wave Systems Corp. (NASDAQ:WAVX) are demonstrating new hardware-based data protection capabilities in trusted computing platforms as part of the Intel Digital Office Community at the Intel Developers Forum, March 1-3, Moscone Center, San Francisco, California.
The technology demonstration shows the benefits of linking the security of a Trusted Platform Module (TPM), based on the open standards specifications of the Trusted Computing Group, to a Seagate-trusted disc drive. This demonstration solution is designed to provide stronger data protection, enhancing regulatory compliance (SOX, HIPAA), along with greater storage capacity for the user's sensitive data. This demonstration includes both physical drive security, as well as user authentication for accessing the information. Wave System's EMBASSY® Trust Suite applications and trusted computing management tools are used to demonstrate both the TPM and the security features of the Seagate disk drives at Booth 741 at IDF.
Seagate and Wave are working together to explore market opportunities, technical requirements, and enterprise benefits which can be achieved by extending the trust capabilities of TPMs and disk drives.
Many analysts consider data the most valuable resource within the enterprise networking environment and adding new, innovative security and trust features to the data storage devices provides additional benefits to corporate and government IT environments. Ensuring that data can only be accessed by authorized computing platforms, and by authenticated users, is a key focus of IDF demonstrations.
“Wave is working with its technology partners to develop new security specifications for a wide range of components and platforms, such as disc drives, as part of its participation in the Trusted Computing Group” said Lark Allen, executive vice president, Corporate Development, Wave Systems. “Working with Seagate gives us the opportunity to accelerate the development and adoption of Trusted Computing in advanced platform configurations.”
http://www.wave.com/news/press_archive/05/050301_Seagate.html
Nantucket Conference.
Nice place for a conference.
http://www.nantucketconference.com/audience.html
Homeland Security Presidential Directive(HSPD)12.
Feds dread ID deadline
Topic Homeland Security
Dec. 16, 2004
Federal agency officials say they will be hard pressed to meet deadlines for issuing interoperable identification cards to comply with Homeland Security Presidential Directive (HSPD) 12.
Speaking today in Bethesda, Md., at a breakfast meeting sponsored by AFCEA International, officials at the National Institute of Standards and Technology said they face substantial requests for revisions to the draft standard they issued Nov. 8 as a first step in complying with the presidential order.
HSPD 12 calls for all federal employees and contractors to use a standard smart card to verify their identity for secure access to federal buildings and information systems. The directive set October 2005 as the deadline for complying with the order.
The draft standard, known as Federal Information Processing Standard (FIPS) 201, has elicited many requests for revisions by agency officials and contractors who say its interoperability specifications may be too costly for some federal agencies and vendors to meet by the deadlines set in the directive.
To ease the burden on agency officials and contractors, NIST officials have worked out an agreement with Office and Management and Budget Officials to make October 2005 the deadline for agencies to partially meet the standard by aligning their identity proofing processes with those in the new standard. Agency officials must submit their plans to OMB by June 27, Judith Spencer, chairwoman of the General Services Administration's Federal Identity Credentialing Committee, said at the meeting.
Agency officials will have some additional time to procure and issue interoperable smart cards to their employees and selected contractors. OMB officials plan to issue further implementation guidelines immediately after the Commerce Secretary signs the FIPS 201 document, officials said. The directive requires that the document be signed by Feb. 23, 2005.
Defense Department officials, who have issued more than 6 million personal identity verification cards to DOD employees and contractors, have the most to lose from new specifications that veer too far from those they adopted for their Common Access Card.
DOD officials also are well-acquainted with the problems that arise in issuing smart cards that are legibly printed and that employees will use, said Mike Butler, director of DOD's Access Card Office . He said DOD officials are seeking a new source of printers to correct printer problems that have caused about 10 percent of CAC cards to be unusable at the time they were issued.
Agency officials involved in smart card projects also reported unexpected problems in working with building security officers on issuing personal identity cards that can be used both for access to federal buildings and to federal computer systems.
"We're learning about physical security things we didn't know about," Spencer said.
http://www.all-hands.net/pn/news_index1536.html
WidePoint's "ORC" Subsidiary Announces Strategic Partnership Agreement with SETECS
Partnership Provides Ability to Deliver “First Smart Card Issuing Workstation” for the Federal Government Consistent with Presidential Directive.
Washington, D.C. – November 30, 2004 –WidePoint Corporation’s ( OTC BB: WDPT) wholly-owned subsidiary Operational Research Consultants, Inc. (“ORC”) today announced a strategic partnership agreement with SETECS, Inc., a noted specialist in end-to-end internet security software products.
This partnership agreement combines ORC’s ACES and DoD ECA Certificate Authorities with SETECS OneMANä solution to create the first common “Smart Card Issuing Workstation” integrated with Federal Compliant Public Key Infrastructures (“PKIs”). The Workstation, which provides backward compatibility with existing CAC smart cards which protects the investment of over 4 million CAC smart cards already issued, utilizes existing Government approved PKI digital certificates, creates smart cards compatible with Microsoft Windowsä security protocols, supports multiple smart card manufacturers, is available on ORC’s GSA Contracts.
Dan Turissini, ORC’s Chief Executive Officer commented, "ORC is thrilled to add SETECS to its Common IA Enabling Infrastructure (CIEI)ã offering. Together, we have an exceptional opportunity to take advantage of our leveraged technologies and Government relationships to exclusively deliver these best-in-class solutions, soon to be required for virtually all Federal agencies, government employees and in-house government contractors in response to Homeland Security Presidential Directive HSPD-12.”
Sead Muftic, President and Chief Executive Officer of SETECS said, “This agreement represents an important step forward for both Companies’ customers and shareholders. The combined offering may be installed locally or extended to a mobile smart card issuing workstation. It provides ORC and SETECS with a powerful competitive edge in the market. Not only are DOD CAC smart card owners beneficiaries, but other GSA and Contractor communities will also benefit from this GSC-compliant solution.”
Mark Fuller, Chief Executive Officer of WidePoint’s Government Division, stated, "This partnership helps to accelerate the WidePoint business plan by joining two leading technology solutions providers and solidifying ORC’s leadership role in the areas of Information Assurance and Security.”
ORC is the only vendor certified by the Department of Defense to issue all 6 types of certificates with a validity of UP TO 3 YEARS. ORC is focused on medium to high assurance levels and has the expertise and the full service attention you need to securely interface with the DoD.
"ORC is pleased to be joining forces with Wave Systems in making available trusted computing solutions embedded with ECA digital certificate capabilities to all branches of government, and beyond," stated Daniel E. Turissini, president and CEO of ORC. "This combination of Wave's EMBASSY(R) Trust Suite technology integrated with our Trusted Third Party services provides another element to furthering the availability of the highest levels of Information Assurance technologies in the ongoing efforts to protect personal information and in support of Homeland Defense endeavors."
Army Acquisition Corps.
From the prior post:
“Much of the research is funded by the National Security Agency (NSA) under the direction of the NSA Visiting Professor, Dr. Aaron J. Ferguson, and the ITOC Director, MAJ Ronald Dodge.”
Lieutenant Colonel Ronald Dodge, JR., Ph.D., has served for over 17 years as an Aviation officerand is a member of the Army Acquisition Corps. His military assignments range from duties in an attack helicopter battalion during Operation Just Cause in the Republic of Panama to the United States Military Academy. Currently he is an Academy Professor and Director of the Information Technology and Operations Center (ITOC) at the US Military Academy. His current research focuses are information warfare, security protocols, internet technologies, and performance planning and capacity management. He is a frequent speaker at national and international IA conferences and he has published many papers and articles on IA topics. http://www.itoc.usma.edu/dodge/bio.htm
Army Acquisition Corps.
Mission
Support soldiers by continually improving our Army's combat capability and by developing the critical systems and services that enable our Army to meet its non-negotiable contract to fight and win our Nation's wars
Vision:
The premier developer of a strategically responsive force armed with the combat capabilities to dominate across the full spectrum of operations.
http://asc.army.mil/public/overview/mission/default.cfm
SKDMARCS.
October 15, 2004 Seminar
Duty, Honor, Country, and Security:
What's Going on at West Point in Information Assurance
The Information Assurance Research center of gravity at West Point is in the Information Technology and Operations Center (ITOC), which is housed in the Department of Electrical Engineering and Computer Science (EECS). Much of the research is funded by the National Security Agency (NSA) under the direction of the NSA Visiting Professor, Dr. Aaron J. Ferguson, and the ITOC Director, MAJ(P) Ronald Dodge. All project teams include cadets. Projects that will be discussed include the PKI-XML Allied Coalition Information System (ACIS); the XML Commercial Digital Signature Testing, Analysis Tool (XSTATIC); Web Distributed Authoring and Versioning (WebDAV), Secure Content Dissemination Analysis and Retrieval Computer System (SKDMARCS), and the West Point Carronade.
PKI-XML ACIS is an identity management system for cross-security domain information sharing. This prototype used PKI (digital signatures) to bind meta-tags to XML documents.
XSTATIC is a XML Digital Signature benchmarking tool that will allow XML application developers to test commercial XML digital signature tools for compliance with the XML Digital Signature Standard. A compliance grid will allow DoD Information Technology decision-makers to make informed public-key technology integration decisions.
The WebDAV team will design and build a prototype network that will allow the research team to evaluate he various WebDAV features and inherent security risks. WebDAV is the IETF standard mechanism for distributed authoring and versioning in collaborative environments. Although widely implemented in DoD, a detailed security analysis of this mechanism has not been performed, leaving many DOD servers vulnerable to attack.
SKDMARCS is a Constructive Key Management-based technology used in conjunction with PKI that will facilitate development of a smart card-enabled content dissemination system. This system that will allow members in allied-coalition enterprise environments to access information based on role and "cneed-to-know". Cadets will write smart card reader "trustlets" (written in C) that will allow smart card readers to authenticate multiple smartcards/tokens into the enterprise.
The West Point Carronade was an email security aware exercise conducted at West Point. The results will surprise you!
Speaker:
Dr. Aaron Ferguson, Department of Defense and West Point US
Military Academy.
The meeting took place in room 8005 of the DePaul Center , in the Loop Campus, 6.00 pm.
http://cinsc.cti.depaul.edu/Seminar.html
Wave gets U.S. pact for data security.
From todays Berkshire Eagle.
Wave gets U.S. pact for data security.
Saturday, December 18, 2004 - LEE -- Wave Systems Corp. has landed an order from the United States Military Academy's Infor-mation Technology Operations Center at West Point to provide software and hardware for secure information sharing.
The project involves creating better ways of authenticating users of access cards and of encrypting information like passwords, credit card numbers and other senstive data so it cannot be tapped in computer files by unauthorized users.
"Wave has invested heavily in trusted computing and identity management hardware and software solutions," said Brian Ber-ger, Wave's executive vice president, marketing and sales. "We believe these technologies could play an important role in making government personal computers more trusted and secure while making the PC applications more secure and easy to manage."
John Callahan, vice president for communications, said he could not disclose the amount of the contract or its impact on Wave's work force.
He did say Wave has been "aggressively going after the government market" in the last few years and this contract marks the first significant breakthrough.
In another development, Wave announced that it was completing the issuance to investors yesterday of approximately $5.8 million of Class A common stock to fund on-going operations and general corporate overhead.
The shares are part of a $25 million stock-offering proposal ap-proved by the Securities and Ex-change Commission last spring. About $3 million has already been purchased by investors, Callahan said.
Wave had 70,692,827 shares of stock outstanding as of yesterday, Callahan said. The new purchases add about 5.4 million more.
Wave holds a portfolio of pa-tents in security and e-commerce applications.
GIG.
From today's PR:
"We are very excited about this project and we believe it will
give our cadets a first hand appreciation for the challenge of getting information securely into, out of, and across the Department of Defense's Global Information Grid," said Dr. Aaron Ferguson
http://ges.dod.mil/
http://www.nsa.gov/ia/industry/gig.cfm?MenuID=10.3.2.2
Re: IA events.
ABOUT THE CONFERENCE
In partnership, the Defense Information Systems Agency, the National Security Agency, the Joint Chiefs of Staff, and the United States Strategic Command are pleased to announce the Ninth Annual Information Assurance Workshop, a forum for the Information Assurance (IA) community to not only provide updates on current programs and initiatives, but to also provide a hands-on environment for the community to work IA-relevant issues. The goal of the workshop is to merge representatives from IA, operations, and intelligence organizations who work IA issues on a daily basis and who impact the success of IA projects with representatives from various Combatant Commands, Services and DoD Agencies.
This year's theme is "GIG IA: Enabling the Global Battlefield" and the Keynote Speaker slated to address attendees during the workshop's general session will be General James E. Cartwright, USMC, Commander, US Strategic Command.
Tracks will again mirror the five main goals of the Department of Defense IA Strategy. Working session discussions within each track will focus on current and future.
Initiatives being worked to achieve each goal. Introductory Sessions will be held at the beginning of the workshop to provide background material for each of the tracks. Additionally, there will be guest speakers from many different facets and components of the IA community.
Register today and join us for this dynamic workshop February 7-10, 2005 in Philadelphia, PA!
Track Descriptions
Track 1
The Track 1 focus is on transforming the Global Information Grid (GIG) to protect information in a net-centric environment. Join us in meeting the leads and technical experts and provide your input on IA Strategy Goal 1: Protect Information. Our objective this year is to frame discussions around the four cornerstones of the IA component to the GIG Architecture as it relates to "Enabling the Global Battlefield." We will focus on some of the latest GIG-IA policies, products, and programs that impact the warfighter, such as NCES, JTRS, PKI, HAIPE, Crypto Modernization, Transformational Communications, and Cross Domain Solutions to name just a few. When we are done, you will have a better understanding of how "GIG-IA is Enabling The Global Battlefield."
Track 2
Track 2 is focused on Goal 2: Defend Systems and Networks of the IA Strategy. It will address the capabilities needed to defend the systems and networks on the Global Information Grid (GIG) and help the Department of Defense achieve the strategic vision of information superiority, net-centric operations and assured information sharing. In the Track 2 sessions, you will meet and interact with subject matter experts and discuss Goal 2 initiatives and capabilities that will transform the way we operate, communicate, and defend our networks. These initiatives include information assurance vulnerability management (IAVM) and remediation tools, computer network defense (CND) architecture for the GIG IA, updated CND strategy, and various policy changes. Learn how these capabilities will help the DoD achieve its missions through information superiority and how GIG IA will be the foundation for "Enabling the Global Battlefield."
Track 3
Track 3 is focused on Goal 3: Provide Integrated IA Situational Awareness/IA Command and Control (C2). Special emphasis will be placed on the detection, alert, and action mechanisms necessary for realistic Situational Awareness (SA) on the Global Information Grid (GIG) for both network operators and policy makers. Through interactive discussions and briefings from Subject Matter Experts, we will examine where we are today, and where we need to go in relation to the Enterprise Sensor Grid architecture, effective Indications and Warning (I&W), User Defined Operational Picture (UDOP), Command and Control Issues, and Network Operations synchronization. We look forward to your participation at the Track 3 sessions. Additionally, if you would like to submit your #1 concern regarding SA on the GIG for discussion consideration at the upcoming Information Assurance Work Shop, please send your input to tcraine@nsa.gov and Roberta.Stempfley@disa.mil.
Track 4
The focus of Track 4 is on Innovation & Transformation: Connecting Emerging IA Capabilities to Warfighters Needs. Meet and interact with the key players, leadership and subject matter experts engaged in operationalizing IA Strategy Goal 4: Transform & Enable IA Capabilities. This is the first year that we will have a significant research presence. Our objective is to focus on how IA Research & Development is being conducted across the DoD and how components can best work together to bring new and improved capabilities to the warfighter more quickly and economically. We will examine how DoD manages R&D resources; how we bridge the gap between R&D and the Capabilities process; and how DoD mechanisms transfer technology from labs to the battlefield. We will also have a special presentation by Dr. Eric Haseltine, Director, NSA Research and Development.
Track 5
Creating an IA-empowered workforce demands Enterprise-wide training and certification for the entire DoD IA technical and management workforce. DoD Directive 8570.1 is making a drastic change in how DoD's military, civilian and contractor workforce will be trained and certified. Join us in Track 5 for open discussion and hands-on learning on implementation of this Directive by Combatant Commands, Services and DoD Agencies; identification of the IA workforce; and the IA skill standards and knowledge management initiatives underway. The target audience is the IA technical and managerial workforce, training personnel, and other personnel who supervise or implement IA programs for DoD systems. Do your part to train and certify the IA workforce, in order to "Enable the Global Battlefield."
Wave/TecSec Event.
15 - 19 November 2004
DoD Public Key Enabling (PKE) Technical Forum
https://www.iaevents.com/pke04fall/InfoAlert.cfm
Under Agenda:
Security Recommendation for Your DesktopWave/TecSec
Options for Adding Secure Componets Wave/TecSec
Evolution, Secure Content Dissemination and Retrieval Computer System (SKDMARCS) Dr. Aaron Ferguson, USMA
Nomadik processors.
STMicroelectronics adapts for Nokia Series 60
4 November 2004
STMicroelectronics has adapted and optimized its Nomadik family of multimedia processors for use in Nokia's Series 60 Platform for 3G handsets and PDA.
The Nomadik processors support a range of data-intensive applications, such as imaging, music, video recording and video streaming. They use a "smart accelerator" architecture that can achieve video at 30 frame/s.
The processors are compatible with the Symbian operating system, which is employed by the Series 60 Platform. This platform is currently used in a number of Nokia handsets and is licensed to several other handset makers, including Siemens, LG Electronics and Panasonic.
http://wireless.iop.org/articles/news/5/11/6/1
ST has declared the Nomadik multi-media co-processor the most important project within the company with an addressable market of c $1.5bn in 2005/2006.
http://www.borsaitalia.it/media/star/db/pdf/17890.pdf
AWK Trustzone.
Any idea who ST has a head start over?
ST claims multimedia lead, plans Nomadik move to ARM11
Oct 20, 2004
LONDON — STMicroelectronics NV said Wednesday (Oct. 20) that close cooperation with processor licensor ARM Holdings NV has given ST a head start in rolling out third-generation mobile multimedia terminals.
STMicroelectronics Extends Cooperation With ARM to Enhance Security Features of Nomadik Mobile Multimedia Processors
Latest ultra-low-power Nomadik multimedia processors embedding ST's leading security framework are the industry's first to include ARM1176JZF-S PrimeXsys Platform with TrustZone technology
GENEVA, Oct. 20 STMicroelectronics today announced that it will incorporate the ARM1176JZF-S(TM) PrimeXsys® Platform with TrustZone(TM) technology into its Nomadik(TM) family of multimedia application processors. The result of a close cooperation with ARM and early access to advanced ARM® technology gives ST and its customers a head start in rolling out third-generation mobile multimedia terminals. The development also takes advantage of ST's advanced low-power 65-nm integrated- circuit (IC) fabrication technology* to boost performance and cut the power consumption of mobile multimedia consumer products.
Building on more than a decade of Smartcard system expertise, ST's leading-edge security framework ensures a reliable, secure environment for mobile transactions. As part of ST's global roadmap to secure the next generation of innovative multimedia terminals, this latest Nomadik open platform adds ARM TrustZone(TM) technology, a key element of the ARM1176JZF-S PrimeXsys Platform.
"Because ST was the lead partner with ARM on its ARM11(TM) PrimeXsys Platform, we had the advantage of making early use of ARM TrustZone technology in the ARM1176JZF-S core-based platform," said Guy Lauvergeon, general manager of STMicroelectronics' Multimedia Platform Unit. "As a result, and thanks to our own security features and state-of-the-art 65-nm process technology, our customers will enjoy a significant market advantage in rolling out high- performance, low-power, and secure third-generation mobile multimedia handsets."
ST's leading security and mobile multimedia expertise, combined with ARM TrustZone technology raises the standard for security performance in handheld devices. The trusted Nomadik platform lets mobile operators, consumers, content providers, and terminal manufacturers address evolving security threats, thus stimulating the growth of mobile transactions that carry sensitive multimedia content. In particular, the security level is more than adequate to maintain system integrity by, for example, protecting phone identity and preventing illegal upgrades and malicious or unauthorized attacks.
"This close cooperation between two technology leaders in the mobile handset market has been a natural and mutually beneficial move," said Mike Inglis, executive vice president of marketing for ARM. "Adding the ARM1176JZF-S PrimeXsys Platform with TrustZone technology to ST's family of Nomadik multimedia application processors brings to the market computationally powerful, low power-consumption devices that deliver high security and fast design roll outs."
TrustZone technology is a key enabling technology targeted specifically at securing consumer products such as mobile phones, portable digital assistants, and other systems running an open operating system. As a result, the marriage of TrustZone technology to Nomadik's existing security features, which benefit from STMicroelectronics' long experience with Smartcards, ensures a reliable secure environment for transactions.
TrustZone technology's high security prevents access to proprietary applications and circuitry, as well as protects passwords and copyrighted content. Because TrustZone technology is implemented within the ARM processor core, protection is an inherent feature at the heart of every device, including peripherals on and off chip, and is gained without adversely affecting core size or performance.
ARM1176JZ-S PrimeXsys Platform With AXI Technology Delivers Performance, Power Effieciency, and Security
Cambridge, UK, Oct. 20, 2004
Key message points for journalists and analysts:
The ARM1176JZF-S PrimeXsys Platform has already been licensed by ARM lead Partner, STMicroelectronics.
The PrimeXsys Platform is the first implementation of the AMBA 3 AXI Backplane, to unleash the performance of the ARM1176JZF-S processor.
The PrimeXsys Platform enables designers to develop a complete, high-performance ARM1176JZF-S processor-based SoC rapidly and with low risk.
The product is a pre-verified scalable platform leveraging the benefits of TrustZone technology, Intelligent Energy Manager (IEM) technology, CoreSight technology, and AMBA 3 AXI technology.
ARM1176JZ-S PRIMEXSYS PLATFORM WITH AXI TECHNOLOGY DELIVERS PERFORMANCE, POWER EFFIECIENCY, AND SECURITY
New version of PrimeXsys Platform using AMBA 3 AXI technology delivered to lead Partner, ST
CAMBRIDGE, UK - Oct. 20, 2004 - ARM announced today, at the first ARM(R) Developers' Conference in Santa Clara, Calif., that it has released the latest PrimeXsys(R) Platform based on the ARM1176JZF-STM 32-bit processor core to their lead Partner, STMicroelectronics. This latest ARM PrimeXsys Platform technology is being designed into STMicroelectronics NomadikTM family of multimedia application processors.
``As an integral part of ST's NomadikTM family of application processors' evolution, the ARM1176JZF-S PrimeXsys Platform with TrustZone technology will help ST to continue to offer the highest level of performance and security,'' said Richard Chesson, director of Marketing, Multimedia Platform Unit in ST. ``By combining Nomadik's world-leading multimedia performance with the ARM1176JZF-S processor's computing power and security features, we can better deliver the rich multimedia content and experience, as well as application performance that customers of new mobile services and operators will demand.''
The new PrimeXsys Platform has been developed using the AXITM Backplane, which provides a data-efficient, highly-optimized link from the processor, through the Level-2 cache and memory controller, to external memory. The platform also implements ARM TrustZone technology for enhanced security, ARM Intelligent Energy Manager (IEM) technology for power efficiency, and CoreSightTM technology for easier system debug and faster time-to-market.
The platform is the first reference design for ARM TrustZone technology; a solution designed to support and meet the needs for enhanced security in next-generation consumer and wireless devices. TrustZone technology includes the ARM TrustZone architecture extensions as well as the recently announced TrustZone software. In the ARM1176JZF-S PrimeXsys Platform, security is treated as a system-level concern where tight integration of hardware with trusted software delivers significant benefits in terms of time-to-market and reduced risk. ARM TrustZone technology helps to protect the operating system, the protocol stack and the network against attack as well as securing users' mobile data and downloadable applications, games and media content.
Ongoing consumer demand for increased performance in applications such as mobile multimedia and digital TV has led to more complex systems and the need for significant in-system performance gains. Due to these demands, developers have become far more aware of the power consumption of the processor. The ARM1176JZF-S processor within the PrimeXsys Platform is the first ARM processor to integrate support for ARM Intelligent Energy Manager technology, which increases the battery life of handheld portable devices by optimally balancing processor workload and power consumption. This enables end users to take advantage of the latest mobile applications for significantly longer intervals before their device requires re-charging.
In addition to improved performance, the inclusion of CoreSight technology for system level debug and trace, equips Partners with system-wide monitoring and profiling capabilities in one package, reducing system integration time by up to 40 percent. The technology is ideal for engineers looking to develop high-performance SoC designs for multimedia, wireless and set-top box applications.
Verification is one of the biggest investments when developing a SoC and the PrimeXsys Platform delivers a fully configurable verification environment. This verification environment provides a mechanism to run concurrent tests to establish data flow interactions in the PrimeXsys Platform-based SoC system enabling system designers to complete their high-performance ARM1176JZF-S processor-based SoC rapidly and with low risk.
``A tightly integrated subsystem around the CPU core fundamentally determines overall system performance, security and power efficiency,'' said Bryan Lawrence, product marketing manager, PrimeXsys Platforms, ARM. ``The ARM1176JZF-S PrimeXsys Platform significantly enhances design productivity while enabling design teams to customize and differentiate the design for their specific application and market requirements.''
About AMBA 3 AXI Backplane
The AXI backplane provides a data-efficient, highly-optimized link from the processor, through the Level-2 cache and memory controller, to external memory. The L220 AXI Level-2 Cache Controller unleashes the full performance of the ARM 32-bit processor family and typically increases the system performance by between 50 percent to more than 100 percent. This maximizes the performance of ARM11TM family-class processors even when used with slower, low-power SDRAM memory.
AMBATM 3 technology is the latest revision of a de-facto industry standard which since 1995 has been adopted by a large part of the industry, including more than 90 percent of ARM Partners. The technology was created by ARM in close cooperation with over 30 ARM Partners and provides features which enable the design of tomorrow's high performance systems through efficient implementation, and with the cost savings of IP reuse. AMBA 3 technology is the only IP interface which is designed to support all the advanced features provided by the ARM architecture. The specifications are provided openly by ARM and are free of charge.
About Intelligent Energy Manager (IEM) Technology
As devices become more complex and are required to perform multiple tasks, achieving low-power consumption is now a critical requirement in most designs. In addition to affecting battery-life for portable designs, power is an important determinant in system cost and reliability. IEM technology is a combination of hardware and software components, which can apply both clock and voltage scaling techniques to help minimize power consumption while the chip is active. The ARM1176JZF-S PrimeXsys Platform integrates support for ARM Intelligent Energy Manager technology which reduces processor energy usage by up to 75 percent. This enables end users to take advantage of the latest mobile applications for significantly longer intervals before their device requires re-charging.
About TrustZone Technology
TrustZone technology provides a secure foundation for systems running open Operating Systems (OS), such as Linux, Palm OS(R), Symbian OS and Windows CE. In addition, TrustZone technology complements secure application environments such as Sun Microsystems' JavaTM technology by making security implementation on devices more efficient. ARM TrustZone technology is implemented within the microprocessor core itself and extended into the system design, enabling the protection of on-chip memory and peripherals. Since the security elements of the system are designed into the core hardware, security issues surrounding proprietary, non-portable solutions outside the core are removed. In this way, security is maintained as an intrinsic feature at the heart of every device, with minimal impact to the core area or performance, while enabling developers to build any additional security, for example cryptography, onto the secure hardware foundation.
About CoreSight Technology
The ability to provide effective debug capability is crucial in ensuring that application software design proceeds to budget and within timescale. The integration of CoreSight technology significantly reduces time-to-market for developers. CoreSight technology builds on the ARM Embedded Trace MacrocellTM (ETM) real-time trace module, which is capable of instruction and data tracing inside a core, which enables information on the processor's activity to be captured both before and after a specific instruction, whilst allowing the core to continue to run at full speed.
For silicon manufacturers, the higher compression rates of ARM CoreSight technology provide a solution that extends debug and trace capabilities into new, higher frequency processor technologies. By using CoreSight technology, manufacturers can lower product cost by reducing the number of pins needed for debug, as well as the silicon area needed for on-chip trace buffers.
Pricing and Availability
The ARM1176JZF-S PrimeXsys Platform is available for license today. The platform will also be implemented in test silicon and made available on the next generation of ARM RealView(R) Versatile Platform Baseboards. ARM will provide OS ports for the baseboard, including embedded LINUX, Symbian OS and Windows CE. The baseboard and software will be available in the second half of 2005. TrustZone software is licensed separately from ARM and will be available in Q1 2005.
http://biz.yahoo.com/pz/041020/65884.html
Orda.
Looks like a few changes. The Monday seminar was moved from the Pine room to the Fir. The Fir looks a bit smaller but may have more equipment.
Spruce and Fir rooms overlook the golf course and feature floor-to-ceiling windows, built in audio/visual equipment, CD players and TVs
http://www.omnihotels.com/hotels/default.asp?topic=meeting&h_id=48
TRUSTED COMPUTING GROUP HOSTS SEMINAR AT 3 RD ANNUAL DIGITAL ID WORLD CONFERENCE PORTLAND, Ore., Oct. 13, 2004 – The Trusted Computing Group (TCG), whose specifications have been developed to help vendors build products that protect critical data and information, will host a Trusting Computing seminar in conjunction with the Digital ID World Conference being held October 25-28, at the Omni Interlocken Resort Hotel in Denver, Colorado. Trusted Computing implementation helps protect PCs from malicious attack, data theft, fraud and other computer security problems. Hardware authentication enabled by Trusted Computing can further strengthen identity management processes. Millions of systems worldwide have Trusted Computing capabilities, and more applications and products have been announced the past year. “As companies seek stronger security and more effective ways to manage identity issues, Trusted Computing is emerging as a ‘must-have’ for platforms,” noted Phil Becker, editor, Digital ID World magazine, sponsor of the conference. The Digital ID World Trusted Computing seminar, which is free of charge, will be held on Monday, October 25, 1:00 p.m. - 5:00 p.m., in the Pine Room. Lark Allen, executive vice president, Wave Systems Corp., and Kevin Schutz, product manager, Atmel Corporation, will give an overview of the TCG and Trusted Computing solutions and applications. Trusted Computing applications and implementation scenarios also will be demonstrated during the discussion. Refreshments will be provided. The seminar will also will highlight Trusted Platform Module (TPM) implementation. TPMs are used in PCs and other systems to store passwords, digital certificates and encryption keys, enabling systems that are more secure than those with software-only solutions. To register, interested attendees should visit the Digital ID World Conference 2004 Registration Page at http://conference.digitalidworld.com/2004/Page.do?id=7. In addition, at the Digital ID World Conference, the Trusted Computing Group will participate in a panel discussion on Trusted Computing on Wednesday, October 27, 2:30 pm – 3:30 pm along with Microsoft and RSA Security. About TCG TCG is an industry standards body formed to develop, define, and promote open standards for trusted computing and security technologies, including hardware building blocks and software interfaces, across multiple platforms, peripherals, and devices. TCG specifications are designed to enable more secure computing environments without compromising functional
Envoy Data - Dell.
Dell Account Rep?
Envoy Data Corporation is a leading technical distributor focused on the integration of strong user authentication including smart card and biometrics, PKI and encryption. As an end-to-end security provider, we offer our clients a full breadth of products and services. EDC supports the government, healthcare and corporate verticals.
Jeff Ciraulo
Division Manager
(480) 829-6565 X13
jeffc@envoydata.com
Tony Giallella
Sales Manager
(480) 829-6565 X20
tonyg@envoydata.com
Mark Norwalk
Professional Service Director
(480) 829-6565
mnorwalk@envoydata.com
Peter Gilbert
Dell Account Rep
(860) 295-9192
pgilbert@envoydata.com
http://www.smart-cardsys.com
http:// www.itsecuritymall.com (e-commerce)
Re: Techscaler.
The Techscaler site is registered to a Chris Allman. A long shot but maybe related to Former BOSC Unit Pacific Information Systems?
It is satisfying to us see our customers gain tangible benefits in such a short period of time," said Chris Allman Vice President of Sales for Pacific InfoSystems.
http://www.prweb.com/releases/2001/2/prweb22869.htm
B.O.S. Better On-line Solutions Announces Decision to Sell Pacific Information Systems, Inc. Business Unit
May 23, 2002
B.O.S. Better On-line Solutions announced that it has decided to sell its wholly owned US subsidiary Pacific Information Systems, Inc. (Pacinfo) or its operations.
http://news.moneycentral.msn.com/ticker/sigdev.asp?Symbol=BOSC
Better On-Line Solutions Subsidiary, Pacific Information Systems, Acquires Dean Tech Technologies Associates.
April 15, 2001
PORTLAND, Ore. April 15, 2001
Extends Capability in Delivering UNIX/AIX Software and Systems
Better On-line Solutions Ltd. ("BOS", NASDAQ: BOSC) announced today that its wholly owned subsidiary, Pacific Information Systems, Inc. ("Pacinfo") acquired Dean Tech Technologies Associates, L.L.C. ("Dean Tech"), of Grapevine, Texas. Dean Tech delivers UNIX/AIX-based business solutions on IBM RS/6000 and Storage Area Network (SAN) platforms.
"PacInfo is already an IBM Premier Business Partner for AS/400 products and services. With the acquisition of Dean Tech, an IBM Premier Business Partner for RS/6000, we now cover the spectrum of professional services for business applications," stated Israel Gal, CEO of BOS. "The synergy created by the acquisition will allow us to provide programming, networking, installation, operation, monitoring and management services for both the UNIX/AIX and AS/400 environments, in step with our plan to expand and enrich our professional services activities."
About Dean Tech Associates
Dean Tech was founded in 1996 by former IBM consultants with expertise in systems, software and project management/integration. The company is a member of the SAP Program for IBM Solution Providers, and has offices in Grapevine, Texas; Austin, Texas; and Phoenix, Arizona, complementing the existing network of PacInfo offices in Portland; Seattle; Los Angeles; Spokane, Washington; and Fort Lee, New Jersey. Dean Tech will form the Open Systems Division of PacInfo.
About BOS Better On-Line Solutions
BOS, through its TeleLynk IP Telephony products, specializes in delivering solutions optimized for small and medium enterprises, and click-to-talk capability for web sites and call centers. The Company also develops, produces and markets solutions for IBM mid-range-to-PC and LAN connectivity, including Internet/intranet, emulation gateways, and GUI, as well as printing solutions that are operating-system independent.
Pacific Information Systems, a fully owned subsidiary, is an award-winning commercial VAR and e-commerce system solutions provider selling a wide range of network related products, and specializing in enterprise IT solutions.
Surf Communication Solutions, an affiliated company, is the leading supplier of embedded network convergence software that lends flexibility and scalability to network products handling data modem, fax, and voice transmissions. Its open system software is integrated into equipment developed by original equipment manufacturers in the telecommunications, telephony, and electronic consumer goods industries.
TeleLynk is a trademark of Better On-line Solutions, IBM, RS/6000, AIX, AS/400 are trademarks of IBM
Barge.
I'm intrigued by the fact AMD's Athlon 64 and Opteron contained dormant security features that will work with Windows XP Service Pack 2's Data Execution Prevention feature to prevent buffer overrun exploits. It's definitely a great feature since even trusted applications are not safe from attacks against bad coding like buffer overruns. To me it highlights the importance of Wave's key back up and recovery solution - Key Transfer Manager.
I would love to hear of some dormant chip feature or Windows XP Service Pack 2, which would work in concert with Wave's EMBASSY Trust Suite. However, it's not NX.
Dots?
"AuthenTec is working with Texas Instruments on integrating its Entre-Pad AES3500 sensor with TI's OMAP (Open Multimedia Applications Platform) processor architecture, which many major cell phone manufacturers plan to incorporate in their next-generation handsets. Mansfield predicts that handsets and other devices using AuthenTec's technology will be out next year.
Texas Instruments has also licensed technology from NTRU for its OMAP processors. NTRU makes public-key cryptography solutions that can fit into small-footprint devices like mobile phones and RFID (radio frequency identification) tags that can identify baggage at airports. "The big things about NTRU's technology are the speed and the size," says Guy Singh, director of wireless for NTRU. "It's specifically designed for constrained environments. In a wireless environment, you have hardly any bandwidth. The technology is going to be used within applications that require high-strength security, and any application that involves a payment." The company expects to have its security solutions available once cell phone manufacturers begin selling OMAP-based handsets, probably later this year." http://www.findarticles.com/cf_dls/m0DXS/4_8/84800203/p3/article.jhtml?term=
NTRU Professional Services Team and Microsoft to Develop Next-Generation Computing Solutions
July 21, 2003--
NTRU Launches Professional Services Unit in Collaboration With World's Leading Software Vendor
http://www.businesswire.com/webbox/bw.072103/232025004.htm
SAFLINK JOINS MICROSOFT® IN WORLDWIDE LAUNCH OF WINDOWS® SERVER 2003 AND VISUAL STUDIO .NET
SAFsolution® Enterprise Edition delivers tight integration and enhanced security features for Windows® Server 2003
SAN FRANCISCO - April 24, 2003 - SAFLINK® Corporation (OTC Bulletin Board: SFLK), a leading developer, marketer, and integrator of biometric security solutions, announced today the availability of SAFsolution® Enterprise Edition biometric security software for Microsoft® Windows® Server 2003. The company is among a selected group of Microsoft partners demonstrating their solutions at today's worldwide launch of Microsoft Windows Server 2003 and Visual Studio .NET™ 2003 in San Francisco. Industry leaders such as HP, Intel, and IBM will also be exhibiting their products at the launch.
"We are honored to be a part of this launch. We believe it validates the work that our people have done and the strength of our technology," said Glenn Argenbright, President and CEO of SAFLINK. "Microsoft is the world's leading software company and we sincerely look forward to working with them on future deployments."
SAFsolution Enterprise Edition is one of the first biometric security solutions designed and tested specifically for mid- to large-size organizations using Microsoft Active Directory® service, a foundation for managing identities and relationships within the Windows 2003 environment. SAFsolution helps enterprises improve security and ease network administration by replacing text-based passwords with a variety of unique physical characteristics, including fingerprint, voice, iris, and facial recognition.
"SAFLINK software offers customers an authentication security solution that is tightly coupled with Windows Server 2003 Active Directory," said Vic Gundotra, General Manager Platform Evangelism of Microsoft. "As companies migrate to Windows Server 2003, the security of their network environment will be a critical consideration. SAFLINK's integration with Windows Server 2003 will be an attractive option for our customers to increase that security."
SAFsolution utilizes the new features of Windows Server 2003 to deliver enhanced network security and performance, and is designed to integrate easily with Windows Server 2003. The software includes support for Windows Active Directory™ in Application Mode (AD/AM). SAFLINK believes that SAFsolution is the first multi-biometric security solution that includes support for AD/AM.
Companies who deploy Windows Server 2003 will benefit from greater application security, such as explicit Active Directory authorization checks and COM+ private components. Additional improvements include network load balancing and new features like COM+ application recycling. These features will help to strengthen the performance and reliability of SAFsolution, which provides strong user authentication through biometrics. SAFLINK plans to begin shipping the updated version of SAFsolution to new and existing customers by the end of the second quarter, 2003.
SAFLINK is scheduled to demonstrate SAFsolution Enterprise Edition at today's Microsoft Windows Server 2003 and Visual Studio .NET 2003 Worldwide Launch in the Microsoft Partner Pavilion at the Bill Graham Civic Auditorium in San Francisco from 8 a.m. to 6 p.m. For more information, please contact Tom Doggett of SAFLINK at tdoggett@saflink.com or 425-278-1202.
Microsoft's plug-and-play biometrics
April 28, 2003, 6:00 PM PDT
AuthenTec, a maker of fingerprint-recognition sensors, announced on Monday that it had signed a deal with Microsoft to integrate software support for biometrics into the Windows operating system.
AuthenTec will create a reference driver that will be the example for other biometric hardware makers to follow in designing their own driver software. In addition, a new application programming interface (API) will allow software to access new hardware features made available through the drivers, said Michael Stephenson, lead product manager for Microsoft's Windows server group.
"We can now make (biometrics) plug-and-play compatible," Stephenson said. "Once the device is plugged in, it will automatically load the driver."
Although fingerprint-recognition security packages are currently available for Microsoft Windows, integrating the common software into the operating system will make such solutions easier to install and offer more features for customers, Stephenson said.
"Our goal is to make it as easy as possible and as secure as possible for our customer to implement this solution," Stephenson said.
Biometrics include any technology for identifying people by physical characteristics. Fingerprint, facial-feature, retina and handprint recognition are all common forms of biometric technology, but for PC sign-on applications, fingerprint recognition is by far the most popular.
AuthenTec will work with Microsoft to develop a driver that will be shipped with the Device Driver Kit (DDK) to other hardware makers as an example of how to code the driver.
"This collaborative effort will accelerate the acceptance and application of biometrics in computing," Scott Moody, president and CEO of AuthenTec, said in a statement.
AuthenTec and SAFLINK Announce Joint Marketing Initiative
Technology Remarketing Agreement Will Speed Adoption of FingerLoc-Based Biometric Solutions
July 13, 2000
In a move that emphasizes the increasing use of biometric security solutions in the enterprise network, PC and e-commerce markets, AuthenTec, Inc., the provider of patented FingerLoc sensor technology, and SAFLINK Corporation (NASDAQ: eSAF), a leading global biometric software provider, have signed a joint technology remarketing agreement that leverages the companies' combined strengths in biometric technologies to bring fingerprint authentication solutions to market more quickly.
Under the terms of the agreement, AuthenTec will offer SAFLINK's Secure Authentication Facility (SAF™) family of data and network security products to its growing list of original equipment manufacturing (OEM) partners that have agreed to integrate AuthenTec's FingerLoc sensor technology into their products. Several companies are committed to integrating AuthenTec's FingerLoc sensor technology into their PC hardware products that include keyboards, mice and stand-alone peripherals. SAFLINK will also offer support for AuthenTec's FingerLoc sensor technology to its own distribution channel customers, and will include AuthenTec's standards-based biometric service provider software interface module in its packaged multi-biometric software solutions, thereby making these products "AuthenTec Ready" for use with FingerLoc-based hardware devices.
"SAFLINK is very pleased to be working with AuthenTec to deliver convenient and reliable biometric security solutions to our combined customer base," said Walter Hamilton, Vice President of Sales and Marketing at SAFLINK Corporation. "The combination of our SAF Family of software products and AuthenTec's FingerLoc sensor technology will deliver a broader array of security options for all of our customers."
SAFLINK's SAF Family of software products offers an open-systems modular approach to client/server architecture that can be easily expanded from a single workstation to a large distributed network. AuthenTec's FingerLoc sensor incorporates patented TruePrint technology to read below the surface layer of the skin to the live layer, where the true fingerprint resides. Real-world skin surface conditions, such as dry, worn, callused, oily or dirty skin do not affect FingerLoc's ability to acquire clear and accurate fingerprint images. SAFLINK's SAF products complement FingerLoc to provide technically superior biometric identification and authentication products designed to replace passwords and PINs. As a result, SAFLINK and AuthenTec customers will have greater access to more convenient and cost-effective biometric options for enterprise network, e-commerce and PC environments.
"This agreement sends a powerful message to customers who need complete biometrics solutions for their IT environments," said Steve Mansfield, Vice President of Marketing at AuthenTec, Inc. "Customers who adopt AuthenTec's FingerLoc sensor technology can now use the full spectrum of SAFLINK' s products. AuthenTec is excited to be a part of SAFLINK's ‘Forget Your Password' business strategy and we look forward to the release of the new SAF products for the business-to-consumer and business-to-business market."