Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
What do the Daughters of the American Revolution have to do with Wave?
I hate acronyms? LOL
Thanks Awk and Ispro...
I don't need a TPM, I only wanted to know if the statement 'Vista capable' implied a TPM, which, apparently, it does not.
Dell's Inspiron and the TPM, a question.
I am looking at an ad for Dell's Inspiron 6400 notebook. It comes with Windows XP, but it says it is 'Windows Vista capable'.
Does this mean that the motherboard has a TPM chip installed, A TPM chip can be installed, or that the computer can run Vista as the OS without a TPM.
I would really appreciate a definitive answer as I am looking to buy this computer for my college student grand-daughter.
Thanks
Bingoman
Would someone please tell me how you can have an 'average' trade of 57 shares when the 'minimum' bid and ask is 100 shares.
Barge, Gee I didn't know that!
Hi Barge, sorry for the late reply.
And how is Carly these days? Does she still keep in touch with her 'friends' at HP?
Barge that 10/98 agreement is over seven years old. HP isn't even required to keep the paperwork any more.
Edited: PIV, Personal Identity Verification
NOTE: The contents of this PIV Program website should be considered working documents and are subject to change.
In response to HSPD 12, the NIST Computer Security Division initiated a new program for improving the identification and authentication of Federal employees and contractors for access to Federal facilities and information systems. Federal Information Processing Standard (FIPS) 201, entitled Personal Identity Verification of Federal Employees and Contractors, was developed to satisfy the requirements of HSPD 12, approved by the Secretary of Commerce, and issued on February 25, 2005.
<a href>http://csrc.nist.gov/piv-program/ </a>
Eamon, if you are going to correct spelling and pronounciation on this board you are going to have to give up your day job!
I agree. eom
Vader, it would be interesting to know what Dell's supply was before it was 'sold out'.
dig space
Dutton gets paid to guess
Wave doesn't need the stress
Dig Space building one hypothetical on another, or justifying one with another is like building a house of cards. I certainly would not want to live there.
Tampa - please see my post #88613 to Dig Space. eom
Dig Space, you seem to be admitting some admiration for the way that management has kept this company alive and swinging for the fences. So why not back off for a while and give the company and its management a chance.
Perhaps SKS has really been earning his money. There is nothing in the Capitalist system which says that management has to stay in the poorhouse until it provides a payoff to the investors. I know that you feel they have been overpaid, but they have never tried to deceive anyone regarding their income, and we have all been free to leave if we chose. That is a part of the gamble that we take. The gamble they take is the time and effort they take and the resulting hit their reputations may take, and how it may affecct their future business lives. If you do not feel these gambles are worth the price you should not be here. As you are still here I think it behooves you to back off and leave management to run the company without the criticism. JMHO.
What do Israeli Defense Forces have to do with Seagate and Wave?
Oh, sorry, thats Intel Developer Forum. Gee these overlapping acronyms are driving me crazy.
GoFigure - whose truth?
unixguy only time will tell
but in the mean time Weby and I are betting on SKS.
CM is this the gang that couldn't shoot straight?
Ronle, this is a phishing expedition, the following gives it away;
<<However, failure to confirm your records will result in your account suspension. >>
Pay pal has stated that they will never suspend an account for failure to update in response to a request to update your account in an e-mail.
Eamonshute, re: the 915G
According to the gateway specs the 915G refers to the chipset and not to the board, sorry for the missleading info.
Eamonshute, sorry but the only thing on the label was 915G with no other letters. I was hopeing that someone would know if all 915Gxx boards contained TPM's or at least if all those boards used by Gateway had them. Oh well, I will just have to wait until I can get a peek at the board to see if I can recognize a TPM. But thanks for your response.
Does the Intel 915G have a TPM? The North Valley Occupational Center, an adult part of the Los Angeles School District just received 15 Gateway computers with this board, for use in a Web Page design class I am enrolled in. A label on the box says the 915G is included but it says nothing about a TPM.
Eamon I think you need to set up a matrix to keep up with all these name changes LOL.
Kisamura you are wrong....
We are getting tired of your nonsense much more quickly. We are quite well aware of the risks inherent in this stock, but we are even more aware of its possibilities.
You, on the other hand are wasteing your time here, for what purpose? Just what are you getting out of trying to convince us of the terrible fate that you believe we face. Is it religious? or do you have a need to do good deeds? or is it possibly financial? Whatever... please stop wasteing your time and ours and leave quietly by the side door.
Helpful I write
<p>because I share a birth date with your late father. I can only hope that my children can write as well of me when I am gone.
Good Luck at a sad time.
Cliffdweller you said "Actually, this points out a Trusted Computing restriction ... if I want to use files between machines, they will have to be transported un-encrypted."
I believe this is wrong as you can specify the encryption key using a public key of which the mating private key resides in the receiving computer. I don't believe that you are restricted to any one single key for all encryption, only that you cannot extract any key from the TPM.
Study: European IT managers have false sense of security
Many of them also report that their jobs are stressful
News Story by Scarlet Pruitt
MARCH 15, 2005 (IDG NEWS SERVICE) - Many European IT managers find their jobs extremely stressful, and even those who feel they have done as much as they can to protect their companies against emerging threats are operating under a false sense of security, according to a study released today.
These conclusions were detailed in Websense Inc.'s "Stress in Security" survey of 500 IT managers across Europe.
Although 91% of the managers said they believe their companies have good IT security, 70% said they leave gaps open to common Internet threats, according to the study.
Many known Web-based threats are being overlooked, and a majority of respondents said they have no measures in place to protect against internal hackers or phishing attacks. Phishing, a type of Internet scam where hackers send e-mails enticing recipients to reveal passwords or credit card numbers on bogus Web sites that resemble legitimate Web sites, is an increasingly common type of Internet threat.
Fifty-eight percent of the respondents said they protect against fewer than three of the seven most common Web threats identified in the survey, Websense said.
"The biggest problem is that they are being reactive rather than proactive," said Websense spokeswoman Rebecca Zarkos, who worked on the report.
For example, 35% of respondents said they are unable to stop spyware from sending out confidential company information to external sources, and 56% do not prevent peer-to-peer applications from being run.
Finally, 8% of the European companies surveyed said they have no security measures beyond a basic firewall and an antivirus product in place, Websense said. "They think they are covered by a big umbrella, but obviously there are holes," Zarkos said.
Many IT managers see mobile workers as a threat, as 71% of survey respondents said that corporate laptops used outside the office and then reconnected to the network pose the greatest security risk to their companies. Still, only 21% of the companies surveyed said they have technical restrictions in place to secure reconnected computers, according to Websense.
A possible reason behind the lax security is that IT managers aren't delegating enough responsibility to end users, and too few security policies are enforced, Websense said. Individual employees are given too much freedom to visit Internet sites, which could potentially infect the network and put IT mangers' jobs at risk, the company said.
And the pressure seems to show. Of the IT managers surveyed, 72% said they think their jobs might be at risk following IT security breaches, with Internet attacks being their greatest concern. Furthermore, 20% of IT managers surveyed said that the stress of protecting their companies against Internet threats is greater than starting a new job, moving to a new house, or even getting married or divorced.
"Obviously they are feeling the stress and know that their jobs are on the line, so maybe the problem is that they don't understand the threats," Zarkos said.
Websense advised companies to invest in the appropriate software to secure their networks and to focus on proactive security measures.
http://www.computerworld.com/newsletter/0,4902,100397,00.html?nlid=PM
Weby, If you check your calendar
I think that you will find that the second half of the year starts July 1.
CPA & Unixguy, sorry about the mixup.
CPA you said Cost prohibitive at this point in time, IMHO.
Now you say I'm not sure what it's written in, but if it's Java it's not a big deal.
So why did you make a big deal of it in he first place?
CPA if the software is written properly, and I suspect it is, All the words required by a particular language are written to a separate source file. To prepare a program for a new language only requires a single file to be translated. The hard work in programming is in creating the program logic, and that does not change from country to country, only the words on the screen change. So there is no great investment in preparing a program for a new language.
Thanks Cliffdweller. After looking up similar laptops on HP's site I agree it is really an advertising ploy.
Fry's is advertising a Compaq computer featuring the AMD Athlon 64 processor 3400+ with enhanced virus protection. Is the virus protection simply software supplied with the computer, or could it be hardware? Anyone have any idea?
Kitesurf, thanks for your well written reply. With your permission I would like to send your reply to Mr. Heilman.
I just received this reply from the editor of a small computer oriented magazine. He had written an editorial about computer security which as I recall was all about software security. This was in reply to my letter written in the middle of January.
Anyone care to set him straight regarding the TCG and the TPM? I'm sure there are a number of people here more qualified than I to explain the operation of the chip and its benefits.
Hi xxxxxxxx -
Thanks for writing, and apologies for the late reply. I probably don't know a lot more about this initiative than you do, but even though their intentions seem sound on the surface, I have to admit to some skepticism. That stems from a number of factors, including the fee charged to companies to belong to the Trusted Computing Platform, which I believe runs in the tens of thousands.
Then there's the restrictions that the chip would place on the end-user, such as the inability to run any hardware not approved by the consortium, even the most innocuous no-name peripheral. The TCG claims its first priority to be protecting the consumer, but unless I'm missing something, its main priority seems to be controlling the consumer's computing behavior.
I'll get off my soapbox now; hope this helps.
- Dan Heilman
Editor
ComputerUser
dan@computeruser.com
612-336-9286
On 1/15/05 11:37 PM, "xxxxxxxxxx" wrote:
Dan Heilman
I recently read about an organization called the 'Trusted Computer Group" made up of some the major names in computing,
such as Intel, Hewlett-Packard and AMD, that is promoting a chip for the PC which is supposed to maintain data such as passwords and encryption keys in hardware to protect it from hackers. This chip is also supposed to provide for something called anonymous attestation to assure network correspondents that the computer is who it claims to be and that it has not been hijacked by a hacker. Are you aware of this organization and what it is trying to do, and of the hardware it is promoting? Do you have an opinion of the group? Do you think they will accomplish what they are trying to do?
Thank you
xxxxxxxxxxxxxxxxxxxx
xxbingoman
Eamon - Right On!
When I see a slide bar that short I just skip the whole thing.
And what is the probability the card will be left in the computer and stolen along with the machine. Or maybe someone will decide the chip is just right for their camera.
Eamonshute, you can lead a horse to water but I don't know if you can make the south end use the TPM even if it is installed as standard equipment.
I was told by a Fry's employee that they will have computers with 'security chips' in about two months. I forgot to ask what brands. I'll try to find out the next time I am in the store.