Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
OT Internet at every TV may make for a gated Web
Media hubs will change the way most Americans navigate the Web, but what role will vendors play?
http://www.infoworld.com/article/06/03/01/75880_10OPcurve_1.html?source=NLC-CURVE2006-03-02
By Tom Yager
March 01, 2006
Within the next two weeks, I’ll be getting in deep with the Mac and PC technology that will take us into the next decade of Internet with every TV. This time, I’m certain it’ll catch. Intel’s Viiv Internet media hub initiative isn’t just a brand, but an orgy of partnerships among system component makers, broadband providers, content owners and electronics giants. Apple, as is its tradition, is partnering with itself, making access to iTunes Music Store and .Mac an infrared-remote click away through Mac systems and its ingenious Front Row iPod-like GUI.
Having computers sink roots in stores’ consumer electronics departments is not only a turning point for technology, but a turning point in the perceived structure of the Web, as well. These little boxes won’t change the Web per se, but they will change the way the gross majority of Americans navigate the Web and choose the content they consume. Without being an alarmist about it, I consider it entirely likely that Internet via remote control will give us what we desperately need: zero-effort, zero-thought access to the Internet’s massive content grid — at the risk of what some desperately fear: Corporate gatekeepers will decide where most Americans enter the grid and the paths they’ll take to trip about inside it.
I have good reasons for not freaking out about this. First, Internet at every TV means that millions of businesspeople who now wake to Headline News, Bloomberg, or the Wall Street Journal will now be peering over their morning coffee at channels they created. They’re more likely to carry information about the business you’re in.
The other reason I’m not ringing alarm bells is that a gated Web will be, whether vendors intend it or not, eminently hackable. People who generate non-commercial content but can’t get it seen will get together to hot-wire into vendors’ gloriously easy remote-control interfaces to add channels of their own. Genuinely independent music and visual content will pop up as thumbnails alongside commercial offerings. Non-commercial podcasts, photocasts, and all kinds of casts will get grafted into appliances’ menu hierarchies and be heard and seen by millions who never knew that awesome content was there.
If they’re smart, vendors will make this easy. I feel confident that Apple will maintain OS X as an accessible underlayer on its home-theater appliances; they’ll always be Macs, therefore they’ll always be able jump the iTunes Music Store and .Mac tracks to deliver rich content and applications created by the imaginative people who make up the fast-growing Mac community. Likewise, I’m hopeful that most Viiv-based appliances will open themselves to custom applications, although my expectations for customization of embedded Viiv hardware inside cable boxes and TVs are understandably low.
Making access to the Web’s massive content grid as simple as running a DVD player or iPod is a welcome mat for people who don’t have the time or interest to scour the Web and pluck out the good stuff that’s already there. Like it or not, that describes most people. Concerns about gatekeepers’ limits on what can be seen and heard, and the paths that users can take, are reasonable but addressable. Vendors must make concern about lock-in a non-issue by keeping their platforms open. If they don’t, consumers can just wait awhile. The locks will be picked for them.
awk I agree 100% It creates a buzz around here that has become very loud lately !!!
Best Regards,
C2
weets- Kama Sutra Spoofs Digital Certificates
Another twist has been discovered with the newest worm making the rounds: Kama Sutra can fool Windows into accepting a malicious ActiveX control by spoofing a digital signature.
By Gregg Keizer
TechWeb News
Jan 24, 2006 01:40 PM
The Kama Sutra worm can fool Windows into accepting a malicious ActiveX control by spoofing a digital signature, a security company said Tuesday.
Sunnyvale, Calif.-based Fortinet said the worm -- which also goes by names such as Nyxem.e, MyWife.d, Grew.a, and Blackmal.e -- adds 18 entries to the Windows Registry to slip the ActiveX control by the operating system's defenses. "By creating the following entries, the control is considered 'safe' and digitally signed," said the Fortinet advisory.
The ActiveX control, added Fortinet, is used by the worm to automatically run its code each time the PC is turned on and Windows boots.
"The threat of worms like this will make them much more dangerous in the future," said Bojan Zdrnja, an analyst for the Internet Storm Center, on the group's site. "If a worm puts a fake certificate on an infected machine, MITM [Man-In-The-Middle] attacks become extremely easy. Of course, we all know that once the machine is infected you can't trust it, but this looks like another (big) problem for the average user."
As of late Monday, the Kama Sutra worm had infected more than 630,000 systems, said the Internet Storm Center.
The worm is considered particularly dangerous because it contains code that triggers an overwrite of all .doc, .xls, .mdb, .mde, .ppt, .pps, .zip, .rar, .pdf, .psd, and .dmp files on the third of each month.
Gowave, cpa how about HP/Intuit ?
http://www.hp.com/hpinfo/newsroom/press_kits/2004/smb/na_solutions_fact_sheet.pdf
It's not as uncommon as you'd have folks believe imho.
C2
ot Hello Kantbleveit! I kantbleve they have a video lol... what a nutty world...
Regards,
C2
ot dig space. Thank you for the context! The words do get a bit confusing and easy to mix it all up.. I do it all the time and so I truly appreciate it when folks like you add some clarity. I believe that IBM and HP are looking for lock in.. maybe the strategy is to tell the customer "sorry you should have bought HP/IBM" when they call to complain their CFO's TPM enabled Fujitsu or CEO's new TPM enabled Dell are not going to be able to participate in the trusted centrally managed party. Not a good idea.. I can see the expressions on the IT Managers faces now as he realizes he purchased an expensive and proprietary solution... definitely not a good idea. So what's the solution ? Neither IBM nor HP offer clients more "wow" through their client side TPM management utilities. Neither IBM nor HP offer more features or control on the server side for managing all those TPM's. HP/IBM are a liability on the server side because you instantly fall out of SOX compliance the moment you can no longer protect the sensitive data on the on CFO's or CEO purchased device from the above example. Sorry for the long response... I just find it impossible to believe any decision maker is going to knowingly get locked in... and the repercussion from not telling people about the lock in wouldn't be a good thing for those OEM's.
Regards,
C2
ot Putter.. litterally takes less than 30 seconds because wavx's implementation is so elegant...
regards,
C2
orda lol.. what in the world is Utimaco doing? They could use everyone's CSP to talk to everyone's proprietary TPM implementation I suppose or they could use TCG's CSP to talk to everyone's TPM I suppose.
In any event it's a niche play and good luck to them. I don't blame IBM or anyone else for trying to piece together a total solution. Why would any enterprise ever knowingly limit their oem choices down the road? They would not. Both IBM and HP are going to have solutions for their existing customer base with 100% HP or IBM equipment.. that's good for them..
How about new customers? How about customers with mixed OEM environemnts... I understand the appeal of Lenovo's utimaco relationship...
ultimately NOT competition to wavx in my humble opinion. An enterprise will not like the "lock in" of HP's and IBM's solutions.
2006 will see the emergence of elegance in the trusted computing space in my opinion... there is no other way to pull it off without open standards.. that includes TCG's CSP.
regards,
C2
dig space thank you! Poor Utimaco is limited to ibm machines.. how sad for them.. secure startup renders them redundant in any event.. not a lot of time to build a strong following for Lenovo.. what will the Chinese government do for $$$
p.s.
Yes I do need a seeing eye dog.. thank you for your patience and guidance
Regards,
C2
Hi wavxmaster - I'm not arguing that they are TPM compliant lol.. Just because the thinkpad has a security sub system doesn't mean Utimaco is utilizing it. There are very few TPM aware applications in my opinion. However, if they utilize a CSP that is TPM aware then they can benefit from that. Who said Utimaco uses the TPM? If there is some blurb on it that would be great to see. Who's CSP are they using? IBM and kludge seem like a more appt description in my opinion...
Regards,
C2
Jaybeaux... it's the finest desktop you'll ever own... all the latest technology at the best price point.. no one comes close.. HP doesn't offer BTX for instance as one simple example.. you will not be disappointed..
Regards,
C2
Putter - have you secured your email yet using the launch pad module ? I have an alternative for you when it comes to selecting a CA.
Regards,
C2
wavxmaster I'm with you. My eyes are tired from trying to find a link to TPM. I think the confusion for some is that if an application utilizes a CSP that is TPM aware then they can make use of it. If I were a thinking man I would say that using the TCG's CSP is what I would do if I wanted to make sure my product was going to work across all TPM's available today... just my opinion...
Regards
C2
River City Wave - do you have a TPM enabled desktop or notebook? With ETS you can easily use Document Manager to seamlessly cryptographically wrap the data utilizing the devices TPM. Your USB files will always be readable to you but not anyone else. Find a USB biopod device and you'll have TPM enabled multifactor authenticated access to your cryptographically wrapped data...
All very easy and seamless... takes longer to describe it then do it...
How secure did you want to get anyway...
If you lost the usb no one could ever access your data... cool huh?
Regards,
C2
ot fixit lol.. amazing! That's a great story. when all is said and done folks like you will have the most amazing story's to tell.. I'm an add-on from Jan 1998 and wait patiently... I told my wife 2006 is when she could start to ask me questions about it until then it was "in the works".... I really thought by 2003 but gave myself some freedom... whew.. looks like I just made it lol... I have no idea what the breadth and scope of the solutions offered may actually be... but I can wait some more... why not.. the hard waiting is all done.. now tpm's are being delivered.. tpm solutions will have to be delivered too.. I have no evidence that anyone has a solution that even comes close to wavx... and so.. we wait.
Regards,
C2
Hi fixit - quick thoughts on your link
checking in for the first time in a while and always figure the latest posts are the topic at hand so..
1 - I didn't see any mention of TPM
2 - having experience with IBM's inferior solution and THIER direct warning NOT to encrypt folders with their technology it is NO SURPRISE to me that they found someone that could do this encryption for them.
3 - what happens with secure startup around the corner? Does this kludge called ThinkVantage that IBM offers really any advantage at all? Will it work across a Network or just locally like HP's solution...
my opinion only here... you have been blessed to find yourself where you are... however you arrived here isn't important... my opinion only that as trusted pc's emerge we might be able to have some fun around here... congratulations on being here so early in the game... however.. you're that much closer to the finish line.. slow and steady .. slow and steady.. not much else to offer...
Regards,
C2
Hi Ramsey2 re:Seagate
We would benefit certainly. Others would benefit more. There are very large companies with many more mobile users than us.
I can easily envision companies that are SCREAMING for this technology I believe because their sales people are carrying proprietary information around with them and the employer is freaking out about them disappearing..
Have no fear - it is all coming in my opinion... dollars to follow...
Regards,
C2
ot Hi barge I hope so!!! The plane trip you once described (which makes me laugh out loud at the imagery you created and I will poorly reproduce) this investment as being... traveling through the grand canyon in a small Cessna heading towards walls only to jerk away at the last second snapping necks dangerously from side to side all the while the nay sayers are cackling like maniacal hyenas in the back is hopefully soon to be over... I hope the airstrip is in sight and we land safely at Ubiquitous International. YOU DESERVE THAT!! You have EARNED that right! Let's hope all longs find a happy ending to this very long and winding road... so far things look fabulous imho
Best Regards,
C2
dig space lol.. that is funny re: "but I have no idea why I think that."
Maybe because you understand Microsoft better than you realize lol? In my own personal opinion I feel Wave is so stupendously well positioned in the trusted sweet spot as to almost make my eyes water. What Wave is appearing to make look so simple is really proving to be a bugaboo for others.
My opinion is the same as always... as trusted computing starts to lift off so will wave.. tidal wave or natural ebb and flow... hard to gauge.
One thing remains constant in my opinion only.. everyone with advanced stages of trusted devices would had to have consulted with or entered into an agreement with someone who actually understands the technology. Will it be Wave IP or its IQ that propels this little train over the mountain...
Stay tuned is probably the best advice ever uttered lol...
Regards,
C2
ot SheldonLevine Thank you! /eom
Best Regards,
C2
Ramsey2 re: "You should know"
LOL.. that is hilarious.. Does ANYBODY really know?
Vista data bits are only just becoming available. There are less than 60 people in New England with support for this.. or so I hear.. think.. feel.. in my humble opinion only et cetera.
The only thing I can tell you is that if "self contained" means taking a recovery token and saving it to a USB device then that is NOT going to cut the mustard for any enterprise in my humble opinion. With secure startup I would highly recommend being able to backup your keys securely across the network. We have read that Dell highly recommends this approach regarding TPM keys in general. Will Microsoft highly recommend this as well? My own feeling is how could they not?
I think it is highly probably that we wont know what msft has in mind regarding key escrows until Lonhorn Server is in beta at the earliest. It is way too early to discuss since the client piece do a year earlier is still in the earliest beta phase.
Your question "How do you feel about Seagate's FDE and Vista's Secure Start-up/Full Volume Encrytion and the implications for all of these technologies in your network?"
I think I would love them if and when they ever come out.. wouldn't you? Will wave be able to handle the keys? Why not?
Best Regards,
C2
orda - Re: why
Perhaps because you don't need one. Dell doesn't say you need one. However, they highly recommend that you have one. My personal opinion is you'd be crazy to deploy TPM without one. It is so early that it is a little silly to hang on every word really. From Microsoft's perspective and in my opinion only - everything is self contained if you can back up your recovery token to the recommended usb flash device. This option is available to everyone. Is it the recommended way for an enterprise to go about trusted computing? No way. Admins will setup group policies to control the schedule of key archiving and there should be some intelligence behind the process that detects when keys have changed automatically.
What are we talking about again? Subsuming KTM down the road? I think it is reasonable to expect MSFT would want to. In my opinion and really I have NO WAY of knowing but I strongly feel we wont know until Longhorn Server is in beta.
Sorry for the late response.
Regards,
C2
Hi orda re: betcha
If microsoft subsumes key escrow it wont be until the server side of the Longhorn equation has been shared with us. The Vista beta doesn't show any client signs at this time.
Managing Key Transfers will be critical to enterprises and in my opinion Wave has free reign until we know something more about the server side.
Given how long it has taken Microsoft to get it together I am not confident they'll have a server side solution at all unless they license it from someone that does.
It is hard being in the fetal stages of trusted computing lol... This baby is born when Vista arrives... imho.
Regards,
C2
Hi Ramsey2 RE: Self Contained.
First off I hope you have been very well... just a quick appearance for me today..
"MS is saying that everything is self contained and would not need any external infrastructure like key management, and at the lowest level the same is true for Seagate, but real production implementations of these will likely require key management for backup, recovery, sharing, migration, and roaming of the data and keys. Very similar to what KTM
does for TPMs, yes."
It's a certainty that external key management will be required by enterprises and HIGHLY recommended by Microsoft and TPM providing OEM's like Dell for instance and imho. There isn't an IT Manager in the world that would recommend a "self contained" i.e. TPM backup token on usb device for each user lol... can you imagine that? We have roughly 8000 employees here and the thought that each one would be required to backup a TPM recovery token and keep an eye on their usb flash device IS INSANE !!!!!!!!!!!
Today Microsoft gives you the option of backing up the local administrators password to a usb token device. Do you honestly believe there is one security aware IT Manager out there that would allow end user to do this? At best end user can expect to be "power users" and leave all admin level tasks up to.. the administrator. Enterprises are responsible for their equipment including backing up the keys... it is impossible to even imagine any enterprise would allow their folks to employ the self contained method lol...
Best Regards,
C2
Mukwonago1 / scorpio Welcome Back!!!
Scorpio Esq. I have thought about you often and wondered how you were. I miss your writings.. your travel experiences and worldly wisdom... I take this as great Karma that you have returned There will be great fun in the years to follow and I am thrilled you are going to enjoy it all... grow stronger every day and let's hope this party gets kicked off on the sooner side...
Regards,
C2
ot Hi Sheldonlevine. My apologies for not seeing your earlier post on the topic! It is very interesting to think that there will be various oem ets editions. I have no idea what HP will present because in large part they still seem to be grappling with the technology. Dell embraced the technology and pulled Wave in to educate their brand managers right on down the line it seems.. an endless, exhaustive process that only got easier as Dell folks started to 'get it'. The HP folks including their TPM 'expert' had NO IDEA what the limitations of PSD (personal secure drive) were and the fact Document Manager had NO limitations but in fact is quite powerful! They had no idea if their offering could backup or migrate tpm keys.. they had no idea how you would delegate tpm ownership rights... they frankly just had no idea at all. It was a very different experience than the one Dell had provided... very different.
HP may simply have thought interest was so far out they never bothered to push the product training out to their folks. I was a little stunned the HP Protect Tools product specialist was not really up to speed or even knew what some of the terminology was...
What they REALLY needed was for someone who did know that space better than anyone to come in and "fix it".
Are they still all about in-house solutions or has something happened to change that... I'll know more later I think...
Regards,
C2
ot Hi go-kitesurf. What you say is true. before today I honestly felt the sales rep and even the product specialist were basically clueless. I know this is not fair based on conference calls alone. I will wait for the face to face before deciding what the depth and breadth of knowledge truly is regarding TPM's. I feel $$$$ was an issue with HP but how that relates to Wave I have no idea. Before the employee cuts at HP they were HARPING on the cost of technology and that's why they weren't going with something as off topic as BTX... their equipment quite frankly pales to Dell's offering on many different levels... I'm truly impressed with how far Dell has come over the years... I did not expect the unparalleled quality of both their equipment offering or the professional services offering.
What will HP have to show? I'll know more this week I believe.
I honestly feel like the LONG LONG delay between when I received the equipment and the meeting was so that they could study and learn the technology at hand lol...
Regards,
C2
Snack,Kant,Go-Kite Thank you. I only ask because an HP sales rep directed me to the page today and I wasn't expecting to see anything Wave related... I have asked some follow-up questions. If it is old perhaps there is renewed interest? One can only dream HP is waking up... who knows... I'll know more later today and more later this week for sure.. it could just be a self serving spot for HP showing folks that you can do more with your TPM's today then you may think. I will say this though.. the product specialst for HP Protect Tools told me she was going to use Document Manager personally so she could speak more intelligently about it when we meet.
Regards,
C2
I'm sure this has been posted but it is new to me.
http://h18004.www1.hp.com/products/security/partners.html
Regards,
C2
RWK - in my humble opinion Wave can solve all of their short comings. To my knowledge ONLY Wave can unmask all TPM's and therefore manage all TPM's across the board. It wouldn't surprise me at all to hear all TPM's are not created equally. Despite the drive toward 'standards' there may still be some differences... those differences make any competition to wavx a bloody improbability. Who on earth can A) Do what wavx can all things being even and B) Account for those differences. I know what I'm writing seems like a lot of gobbeldy gook but there it is.. my opinion is all it is. I have to run for the rest of the day - work is heating up.. my apologies..
Regards,
C2
ot Thank you Jaybeaux. I'm glad the Sheldon/Barge words are over. Sheldon is a gifted contributor who helps advance everyone knowledge in a tangible, meaningful way. Barge has more spirit and vision than he is given credit for and always provides the framework of "context" from which he speaks. He has bolstered this community through some of the darkest days when folks were too beaten down or depressed to carry on... his sense of humor will always be with me as well as some other lessons. Heart sick is the only way to describe it when two respected posters lose, even for a moment, their sense of fair play (whether they know it or not)... enough from me.. I hope they both contribute endlessly and do so as though they sit across the table from one another... as surely they will some day.
Regards,
C2
go-kitesurf, orda, RWK sorry fro the late replies..
HP is an interesting study really. HP received a very specific request for proposal from us on some BASIC tpm management... they cannot complete it at this time. They offered that they plan to have some “future” product but that they cannot even get to the NDA stage to discuss because there is NOTHING to show. Clearly they felt TPM was a luke warm (at best) proposition and had inteded to take their sweet time and use HP Open View to manage the TPM. The product specialist and their TPM "expert" were unaware of THIER limitations regarding something basic like PSD (personal secure drive). They were scrambling and completely freaked out about Dell (my impression only from their reaction)... COMPLETELY! They have absolutely been caught with their pants down. I knew they were in serious trouble months ago regarding the technology but kept expecting something... anything from them. Dell is about to destroy HP across the board imho unless HP can pull a rabbit out of its hat. Their equipment is more expensive.. includes less technology specifically the superior thermal handling and acoustic qualities that Dell has through Intel’s BTX. HP told me they would not invest in the "too" expensive BTX technology at this time because no one was really going to be ordering it.. WRONG WRONG WRONG. The very first thing the employee's here noticed was how quiet their desktops were... everything about the pc's were very well received including the value added software. Several employees immediately wanted to order the Dell machines, and have done so, for their homes with the same said value add software.. I have been to several briefings with various players in the trusted space now and the recurring theme has been the same (casual talk) WHAT THE HECK IS HP THINKING WITH A PROPRIETARY SOLUTION ?!???! DELL's embrace of an open standards TPM is warmly received by the MSFT employee's I have met. DELL IS A SUPER STAR IMHO ! You will see a great deal more from Dell regarding TPM’s I believe. I suspect in the future when you boot a Dell machine that the first thing you will see is the DELL splash screen and the next thing you will see is a WAVE login screen.... perfectly, seemlessly integrated into your windows environment... perhaps I'm still dreaming... but one never knows.
Regards,
C2
Hello 24601 re: Infineon. I'm STILL waiting for their solution to show up. I have their latest and greatest equipment but nothing to use with it YET. HP is completely baffled it seems to me... I'll let you know what they show up with when and if they ever do. They are eager to come in here and yet.. they themselves are frustrated that they have NOTHING to show me regarding TPM management solutions. Maybe their "stuff" is in super stealth mode lol... I'll let you know what it is like as long as they allow that... perhaps others here have had different experiences with HP ? Please share... HP equipment by the way is a sad sad shadow of what Dell delivered... You wont see BTX with HP for instance.. perhaps that has changed... it has been AWHILE waiting for them...
Regards,
C2
Snackman regarding wavx and web services. Is it possible the difference of opinion is more with where each sees the still evolving trusted web services finally landing which could heavily involve wavx's ability regarding authentication and ultimately attestation?
Today’s interoperable web services in and of themselves have nothing to do with TPM's as defined today. "Trusted" web services could have nothing to do with TPM's either.
However, tossing semantics aside we can simply say you cannot have truly "trusted" web services without hardened trusted devices at the end points. This would be especially true where HIPPA compliance is required for instance imo. I believe that to be true whether we’re speaking about today’s TPM iteration or tomorrow’s programmable TPM iteration.
Trusted Web Services possible road map? Barge talking about number 2 or 3 perhaps while SL and CM hold hands over number 1 from my limited understanding?
1) SOAP requests over something other than HTTP
2) SOAP request (say real-time quote on wavx) is answered by service you already pay for i.e. E*TRADE and is provided without logging in, (TPM protected certificate is provided to E*TRADES enterprise authentication server). I no longer have to login all over the place as protected/secure/trusted disparate web services are as easy to access as changing paid for TV channels.
3) Multiple SOAP requests (energy services) handled by programmable TPM with a twist. Why shop around for the best energy prices and go through the tedious process of canceling one service and starting another. Why not have my programmable tpm help advocate on my behalf in a legally binding way… hourly by standing in for me (authorization granted based on criteria). I could easily have the ability to perform multiple soap requests for services that may be changing hourly. With already established trust relationships and based on my criteria (lowest price) I’m authenticated to the various service providers and the twist is my programmable tpm also has a back office service that tracks the infinitesimal usages of the various utilities so that each vendor is paid exactly what I owe them. I ultimately do not care Who provides the service that day.. hour.. only that it meets my criteria of low cost. If I ever have a problem with service I simply exclude them from the list of providers with whom to negotiate. My audited invoice would show the minutia if I cared but ultimately I just need to know my bill is half the usual cost and all parties are properly paid in full. If one of them wants loyalty from me – they can offer other value add’s (whatever they are).
In addition to the above scenario where interoperable web services are conducted between trusted devices (trusted web services) we have the traditional expectations from a programmable tpm handling multiple applets, wavelets, finlets et cetera for services whether over the web.. over the air.. whatever.
There exists the reality that tpm evolution continues and there will be some additional iterations perhaps - before a single stock share is 10,000.00 and change (split adjusted naturally).
Because web services, interoperable web services, trusted interoperable web services or rather interoperable web services between trusted devices (today) are still evolving perhaps the men can give eachother a break or take a little break and leave out the humorous metaphores (not very humorous) in order to spend their time teaching us yes it is all about us lol..
Is the above completely flawed? Time will tell... but it isn't too hard to imagine a physician on his tpm enabled tablet pc scrolling through patients sheets with real time data scrolling across the screen.... by the way the patients are all over the world and not in that hospital... seems to me there would need to be something more that trusting my web services are interoperable (big whoopy.. bout time too)... I really think you'd need what barge is referring to as trusted web services. TPM's need to play a role otherwise this kind of data would never freely flow... just too risky.
Back to work for me !!! Enjoy the day !!
Regards,
C2
barge you are certainly more right in my opinion than most here would allow themselves to believe. I have not tuned into this board as much as I should but to compare teaching you to teaching a pig to sing is such a fantastically ignorant short sighted pin headed thing to say. When the curtain is pulled back.. it'll be barges world people see in my opinion... it is already there actually (in beta).. God bless you and the children you protect everyday! I do enjoy the swishy sashay in pink bunny slipper posts I read from time to time on this board.. but over all I prefer your style of posts and vision.. thank you for the years of service my friend. I hope to meet you and shake your hand perhaps sometime next year.
Regards,
C2
ot kantbleveit... you're most welcome!
One thing I feel for sure is that wavx will be fabulously successful... one persons opinion only..
as for your comment about speaking for others lol.. there are those naturally depressed eyeore types with slow healing / never healing? bruised ego's... for sure you do not speak for them... but truly I appreciate your words!
many others are just discovering the new land... a wonderful place already staked out imho.. find a spot.. make yourself comfortable... should be a fun show.. someday.. for you and everyone here I wish nothing but mega success and all the wonderful things that follow... life is too short.. good luck, coninued great dd, and investing to us all...
Regards,
C2
bert1956 1-2weeks
The delay is simple really... still a new offering for Dell.. they are working on a faster delivery but what happens imho is that an invoice is generated and so by the time you receive the equipment the providers of the media have received the order too.. one week gone.. then they ship..
Regards,
C2
cm
I strongly suspect you are correct. Since indeiPHI has not reportedly sold anything in the area of TPM's it wouldn't surprise me at all if they had been disengaged some time ago really... wave is a high flyer or certainly has that potential.. truly unique.. truly on so many levels imho..
What continues to amaze me is how unfathomably compelling their solutions are... this market is only starting to form... in retrospect we will all look back and think we were nuts that is could have happened back in the 90's or since... it is however reasonable to believe it is all coming together rather nicely... and once truly common place it'll seem like it was always here... AIMHO
What's interesting to me is that after several months with the latest and greatest of HP's TPM enabled equipment to demo.. they have yet to produce a single item allowing me to use it lol... they will be in here with their brightest and best...
HP has issues in my opinion... someone fell asleep at the wheel... perhaps the new CEO is waking them up as we speak
Enough babble for one day... I am buried these days in work... have fun ladies and gentlemen.
Regards,
C2
putterboy there is a difference
2.0 is really designed for the optiplex and tpm 1.2 while 1.0 is really for the latitude and 1.1b IMHO
There are additional features... mighty powerful features available with 2.0
owner services
Regards,
C2
1stnflight - esc allows for various levels of authentication. The lowest level is what you currently have I.e. User name and password. What you suggest is a compromised user name and password PLUS an enabled password vault where passwords used to create a key for a particular PIM profile are kept. PIM does not automatically log you onto a pc. Typically you'd use a combination of biometric and windows authentication but there is a trend toward biometrics... Good luck signing that way. Waves ESC allows for biometric logon and all various there of. Have a great weekend.
C2