Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Army deployment
I speculate the initial deployment will be "modest" in size (in line with the "modest" design work that WAVX is doing):
U.S. Army Awards Wave a Contract for the Design of Encryption Management for Vehicle-Based Mobile Computers
I could be wrong though. They could have a ton of mobile computers in the fleet of Army vehicles.
Wave Systems - Contact Information
It looks like the contact info for EMEA and APAC has been updated. There are a few broken links to get to the pages, so the webmaster probably needs to be informed.
The first thing I noticed is there is a lot more phone numbers for EMEA.
http://www.wave.com/about/offices/offices_EMEA.asp
Contact Information — EMEA
Northern Europe
Wave Systems EMEA
47 Belgrave Square
London
SW1X 8QR
United Kingdom
email: emea@wave.com
tel: +44 1235 520956
Ireland: +353 15060364
Netherlands: +31 207168326
Belgium: +32 24012255
Luxembourg: +352 20880762
Sweden: +46 850336419
Finland: +358 923195445
Denmark: +45 36927619
Norway: +47 21034275
Central & Eastern Europe
Main Office:
Wave Systems EMEA
Excellent Business Center – Westhafen Tower
Westhafenplatz 1
D-60327 Frankfurt am Main
Germany
tel: +49 (69) 959 32 393
fax: +49 (69) 959 32 415
email: emea@wave.com
Post & Deliveries:
Wave Systems EMEA
Darmstaedter Landstrasse 87
D-60598 Frankfurt am Main
Germany
Austria: +43 19282277
Poland: +48 223070503
Bulgaria: +359 24917227
Romania: +40 318104940
Estonia: +372 6226594
Lithuania: +370 52055579
Lativa: +371 66013661
Southern Europe, Middle East & Africa
Wave Systems EMEA
24 ter, rue Abbé Larose
44190 Gorges
France
email: emea@wave.com
tel: +33.2.28.07.42.01
Wave Systems EMEA
32 Habarzel St.
Tel-Aviv
Israel
tel: +972 3 6442662
fax: +972 3 6486146
email: emea@wave.com
South Africa: +27 21 4273438
Spain: +34 911147385
Portugal: +351 308802892
Italy: +39 0236003241
Switzerland: +41 445800570
----------------------------------------------------
http://www.wave.com/about/offices/offices_APAC.asp
Contact Information — APAC
Japan
Tomoki Aizawa
Insight International Corporation
3F, SPC Ichigaya Bldg
1-19, Ichigaya-Tamachi, Shinjuku-ku, Tokyo, 162-0842
Japan
phone: +81-3-5206-7850
email: Tomoki.Aizawa@insight-intl.com
Asia Pacific
Frontline Technologies Corporation Ltd
(Company Registration No. 199801489G)
Blk 750 Chai Chee Road
#02-01/02/03 The Oasis
Technopark@Chai Chee
Singapore 46900 www.frontline.com.sg
email:
for Sales :wave_Sales@frontline.com.sg
for Support: wave_Support@frontline.com.sg
Taipei
Ryan Wu
Rm. 5, 8F., No.510, Sec. 2, Ren'ai Rd., Linkou Dist.,
New Taipei City 244, Taiwan (R.O.C.)
phone: +886.91243.9799
email: ryanwu@wave.com
Slide 12 - also identifies Panasonic as a partner.
That's the first time I've seen them listed also.
Great find!
Wave and Safend revenue
Quote from Q3, 2011 conference call:
"...Q3 net revenues also included $156,000 of license revenues from Safend’s operations for only the last eight days of the quarter, as Wave’s acquisition of Safend was completed at the close of business on September 22, 2011..."
SAFEND's revenue:
8 days at end of Q3, 2011 = $156,000
Qtr = $1,779,375 (estimated; ratio of 8 days extrapolated to a quater)
Year = $7,117,500 (estimated; ratio of 8 days extrapolated to 365 days/year)
WAVE'S revenue
$7.5 million - Q1, 2011
$8.1 million - Q2, 2011
$9.5 million - Q3, 2011 (includes $156,000 from Safend; eight days)
My projections
Q4 =$9.5 mil (assumes Wave's revenue is flat) + $1.8 mil (assumes Safend's revenue is flat) = $11.3 mil(estimated)
Total for 2011 = $36.4 mil(estimated)
2012 (assuming no growth in revenue, but hoping some new orders will back fill the dropoff of GM and BASF revenue) = $11.3 mil x 4 quarters = $45.2 mil (estimated)
The above is simply a guess at Wave's minimum revenue for Q4 2011 and FY2012.
Windows 8 - Protecting the pre-OS environment with UEFI
Steven Sinofsky
Microsoft Corporation
22 Sep 2011 3:00 PM
http://blogs.msdn.com/b/b8/archive/2011/09/22/protecting-the-pre-os-environment-with-uefi.aspx
Wave sales team changes
http://www.wave.com/about/sales_regions.asp
They now have two sales reps in the Northeast region. They are broken out by Healthcare and Financial verticals.
Patrick McCahill
Sales: Northeastern Region
Healthcare Vertical: Northeast
908-883-1041
pmccahill@wavesys.com
John Egan
Sales: Northeastern Region
Financial Vertical: Northeast
(908) 852-9029
jegan@wavesys.com
Jeff Fleischer filled the open position for the Southeast. It was vacant due to Spencer Cobb's departure. Carolyn Gluth had been temporarily covering that territory.
Jeff Fleischer
Sales: Southeastern Region
(239) 353-7062
jfleischer@wavesys.com
Testimonial Video - customer list
Here are the customers I could see in the video. I may have missed a couple, since I didn't recognize a logo or two.
Cogent Healthcare
Bost Medical Center
BlueCross BlueShield of Kansas City
HSC - Northern Health and Social Care Trust
Dick's Sporting Goods
CBI health
MSA
Mazda
Diebold
Bordgais
Defense Information Systems Agency
EDS
Northern Health and Social Care Trust
HMSA - Blue Cross Blue Shield
IU - Medical Group
Georgetown University
L3 Communications
Michigan State University
Ratheon
Hennepin County Medical Center
NCI
LifePoint Hospitals
Labette Health
Lufthansa
National Security Agency - United States of America
LeanLogistics
Passport Health Communications, inc
Reader's Digest
Price Waterhouse Coopers
simcoe muskoka - distric health unit
TD Ameritrade
Saint Barnabas Health Care System
Stratis Health
Vega
AdaptaSoft, inc
Papa Ginos
Dendreon
McGrigors
Based on the Seagate release, here is how I interpret the SED volumes over the last few quarters (333 K per quarter).Q4, 2010 1,000,000
Q3, 2010 666,667
Q2, 2010 333,333
If linear growth is estimated over the next 4 quarters (I think that will be conservative), that is 1.33 M SEDs for FY2011.
What percentage of the market will Wave receive?
Any guesses?
Breakdown of revenue by potential market share...
(Assumption of $50/license charged by Wave)
% of market=====$ (Millions)
10%=============6.7
20%=============13.3
30%=============20.0
40%=============26.7
50%=============33.3
60%=============40.0
70%=============46.7
80%=============53.3
90%=============60.0
100%============66.7
Also, any guesses on Maintenance received for those licenses?
Hacker puts admin access to government, military websites on sale
http://www.ibtimes.com/articles/103916/20110123/hacker-admin-access-government-websites-military-educational-imperva-security-blogger-krebs-informat.htm
SouthEast Bank...
I'm guessing it is Synovus:
http://www.synovus.com/index.cfm?catid=4&subject=10
Based upon slide 19 of 21:
http://www.slideshare.net/juniortstanley/data-protection-fde-solution-presentation
A few questions for the board. Hopefully, you can answer them for me. Thanks in advance.
Which product(s) is the government helping to develop features for? (ERAS, ETS, TDM, Bitlocker, KMS, id.wave.com, or something else)?
When does the 16 month contract end with the government?
I'm having trouble finding the press release for it. Seems like it ends at the end of 1st Qtr, 2011 or beginning of 2nd Qtr, 2011.
Estimates of when the cloud offering of ERAS be available?
Will the ERAS cloud offering release also be tied to the release date of id.wave.com?
id.wave.com is essentially a cloud solution so I suspect they will be released at the same time.
How often does Wave come out with MAJOR releases of their software? (ie. one per year?)
How often does Wave come out with MINOR releases of their software? (ie. every quarter?)
Does Wave post the most recent version of the software on their website for download?
Does Wave post release notes for their software on their website? (What's new?, Known issues?). I know their is an FAQ on the website, but interested in seeing concise documents that summarize them.
Does the release dates vary for Server vs Client?
I believe the release dates vary by OEM version (Dell, Seagate, etc).
What certification is required for id.wave.com to be used by the Federal or State Governments?
Received another marketing email from Wave
Full Disk Encryption Evolves
Wave
Simpliying Encryption and Authentication
Transform the way you protect your business information
All Data Protection Solutions are NOT Created Equal
BIOS Passwords and Operating System Passwords
Very minimal protection
• No data encryption
• Easily defeated; no skills required
• Drive can be moved to another PC with BIOS lock disabled
Hard Drive Password (ATA Mode)
Minimal protection
• No data encryption
• Can be defeated in minutes
• Inexpensive hard drive password "cracking" tools available
Software Full Disk Encryption
Good Protection
• Add-on protection
• Expensive to deploy and maintain
• Degrades system performance
• Susceptible to software attacks
Self-Encrypting Drives
Excellent Protection
• Factory-installed security
• Inexpensive to deploy and maintain
• Not vulnerable to software attacks
• No system performance impact
• ISO/IEC standard technology
Read Information Week's "Full Disk Encryption Evolves"
http://www.informationweek.com/news/security/encryption/showArticle.jhtml?articleID=220200076&pgno=1&queryText=&isPrev
Dell recommends self-encrypting hard drives and Wave's EMBASSY® software to secure your business information — encryption is always-on, the keys never leave the drive and compliance with data protection regulations is assured.
Register today for an upcoming webcast to learn about the benefits of factory-installed, hardware-based security! https://www119.livemeeting.com/lrs/wavesystems/Registration.aspx?PageName=191558396
Live webcasts are run every other Thursday, for your convenience. Â Please click here for specific dates and times.
https://www119.livemeeting.com/lrs/wavesystems/Registration.aspx?PageName=191558396
Wave Systems Corp.
http://www.wave.com/
(877) 228-WAVE
sales@wavesys.com
Just received a marketing email from Wave...
Wave - Simplifying Encryption and Authentication
Imagine
seamlessly
integrated
authentication,
encryption and
management.
Come see it at:
Intel Developer Forum (IDF)
San Francisco, CA
September 13-15
Wave Systems booth #679
IT Roadmap Dallas
Dallas, TX
September 14th
Trusted Computing booth #212
NSA Trusted Computing Conference
Orlando, FL
September 14-16
Wave Systems booth #205
Transglobal Secure Collaboration Program (TSCP)
Washington DC
September 14-16
Arizona Technology Summit
Phoenix, AZ
September 15th
Wave Systems booth #111
Forrester’s Security Forum
Boston, MA
September 16-17
Trusted Computing booth #208
Discover how employing built-in security can transform the way you protect your critical business information with:
• Laptop Data Encryption — Self-Encrypting Drives
• Device and User Authentication — Trusted Platform Modules
• Centralized Control & Proof of Compliance — Wave EMBASSY® Software
Learn more about how you can take advantage of these leading solutions — check out Wave's latest video presentation today! (click here = http://www.youtube.com/WaveSystems )
For more information please contact:
Martie Martin
Inside Sales Support
413-243-7097
mmartin@wavesys.com
http://www.wave.com/
More on the HP and GM deal
The bolded section below is probably just a coincidence...
http://www.itchannelplanet.com/enterprisenews/article.php/3894246/HP+Drives+Home+$2+Billion+Enterprise+Services+Contract+With+GM
The multiyear contract means HP will continue to provide the automaker with applications, infrastructure services and support.
HP secured a major contract renewal as part of a $2 billion agreement with automaker General Motors, the companies announced Tuesday. Under terms of the agreement, HP (NYSE: HPQ) will manage GM's (NYSE: GM) technology infrastructure covering everything from network, workplace and mainframe management to applications and systems integration services for GM's global operations.
The new agreement builds on the computer giant's 25-year relationship with GM, the companies said, and HP said it covers a significant portion of work it's already doing for the automaker. The deal also renews GM's existing contract with HP one year early.
"GM's innovative business and in-vehicle technology strategy requires collaborative, cost-effective approaches so we can provide even better service to our customers as we design, build and sell the world's best cars and trucks," Terry Kline, GM's CIO and vice president of IT, said in a statement.
The scope of the deal includes HP providing GM with applications and infrastructure management services to support tens of thousands of desktop PCs and mobile devices as well as GM's manufacturing and supply chain operations.
HP said it will also be charged with providing an overall technology roadmap that supports GM's multiple suppliers and offer global service desk and support services in more than 50 countries and languages. The deal also covers all remote network management for data, network security and videoconferencing services.
Additional tools, technologies and resources will be provided by partners, including Microsoft and PricewaterhouseCoopers, through HP's Agility Alliance. The six-year-old Agility Alliance program, operated under HP's Enterprise Services division, brings in other major technology providers to help the company deliver on IT solutions.
re: id.wave.com
The most notable thing I notice with the new site is that it works with Google Chrome browser. Prior to today, the site only worked with Internet Explorer.
HP strengthens Security Advantage portfolio
Bolds are mine. There may be a few dots here...but I don't see Wave listed on the HP website yet.
http://h20338.www2.hp.com/enterprise/w1/en/technologies/information-security-secure-data-protection.html
http://www.echannelline.com/usa/story.cfm?item=25375
25 January, 2010
By Mark Cox
HP has announced new services and solutions to the HP Secure Advantage portfolio, including ones that offer increased vulnerability assessment, enhanced data protection and improved compliance controls. The portfolio is designed to help customers establish a comprehensive security strategy encompassing key areas of the technology infrastructure -- from the data center to desktops and printers -- across the enterprise and via the cloud.
The focus of HP Secure Advantage has changed and improved, said Chris Whitener, Chief Security Strategist for HP Secure Advantage
"Before we had half the things we have now," Whitner said. "There's a tremendous upgrade in capability and the breadth we can do, with the addition of EDS as services and the addition of ProCurv. But our focus before was to cover everything we had as a company, building security into all of it. Now we are doing things more in an integrated way. We do a lot of the integration of products, to cut down on complexity and cost reducing of integration."
"Analysts now say there are over 800 security vendors, something you don't see in any other area. It's a very overcomplicated area. We are trying to take the complication out."
Their integration services are something partners can use for their customers, Whitener said. They are not something that are only appropriate where very large customers are involved.
"We have checked the heavy lifting and shown specific products work together, so they can recommend them," Whitener said. While many VARs can do some of this themselves, Whitener said it really depends on the VAR, and HP Secure Advantage has expertise in niche areas that many VARs do not.
"Things like secure printing, there aren't many VARs who do that," he said. "Secure key management for encryption is also very niche. We do the integrations so they can concentrate on the value they add to the customers."
The new offerings include two fully integrated printing solutions. HP Access Control Printing Solution Suite authenticates user access with a personal identification number. The HP Scanjet Enterprise 7000n Document Management Workstation Series, provides secure disk erase options and encrypted scan-to-PDF and authentication functionality.
HP helps customers reduce vulnerabilities and improve enforcement of security policies with: the HP Business Service Automation (BSA) Essentials Network, which provides ease of management and reporting of the latest regulatory compliance standards on a single dashboard; the Security Content Automation Protocol (SCAP) certification, which improves communication of compliance reports so that customers can view the current state of compliance electronically on managed devices, and more confidently share reports with auditors; and HP Enterprise Secure Key Manager, which reduces risk of exposure and sensitive data loss with simplified management. The solution enables customers to enforce the necessary policies to meet information security mandates, and provides consistent, unified management of encryption keys across the technology infrastructure. It also supports a spectrum of encryption offerings, from storage to databases, using common client services and cryptographic standards.
"The most important thing for the channel is to realize we are here for them," Whitener said. "Our managed services are not replacing partner services. They are sold through those VARs."
Patching an SED?
If you don't have Intel vPro to turn on and unlock the drive, how do you patch an SED drive?
Thanks
NCI
How NETCENTS Helped NCI Achieve Large Business Status
http://www.afceanova.org/events/bios-presentations/delauche.ppt#1
http://www.marketwatch.com/story/10-q-nci-inc-2009-08-06
For the three months ended June 30, 2009, total revenue increased by 12.6% or $12.2 million, over the same period a year ago. This increase is due to significant growth on some of our IDIQ contracts, particularly the NETCOM EMS and PEO Soldier contracts, as well as a number of new task awards under our GWAC contract vehicles, primarily NETCENTS, TEIS, and ITES-2S, and new contract awards. This growth was partially offset by revenue reductions from programs that have been completed.
Google to Create Government Cloud with Google Apps
By: Clint Boulton
2009-09-15
http://www.eweek.com/c/a/Messaging-and-Collaboration/Google-to-Create-Government-Cloud-With-Google-Apps-131633/
Defense Venture Catalyst Initiative CERDEC Workshop
https://www.fbo.gov/index?&s=opportunity&mode=form&id=fa679e47e90adef01c439c9a603efee2&tab=core&tabmode=list
Defense Venture Catalyst Initiative CERDEC Workshop
Solicitation Number: DEVENCI-20090909-W-CERDEC
Agency: Other Defense Agencies
Office: Office of the Secretary of Defense
Location: Director of Defense Research and Engineering
Solicitation Number:
DEVENCI-20090909-W-CERDEC Notice Type:
Special Notice Synopsis:
Added: Sep 09, 2009 3:40 pm
Defense Venture Catalyst Initiative CERDEC Workshop
The Defense Venture Catalyst Initiative (DeVenCI) will conduct a workshop late calendar 2009 in the Fort Monmouth, NJ area to help discover emerging technologies relevant to the United States Army's Communications-Electronics Research, Development, and Engineering Center (CERDEC). The workshop will provide selected innovative companies who do not normally conduct business with the Department of Defense with an opportunity to make short presentations to DoD representatives about their technologies and products. DeVenCI is looking for companies who have potential solutions in the following areas:
Antennas
Diverse form, fit & function needs
• Conformal/low profile to reduce visual signatures
• Multi-purpose antennas for SATCOM/terrestrial, Single-band/multi-band needs (tunable with optical waveguides)
• Fixed/mobile/moving with emphasis of "On The Move" for both vehicles and dismounted troops
• Nanotechnology and metamaterials to fundamentally change the form & function of antennas
Components
RF power amplifiers
• Increased efficiency > 15%
• Increased BW (2 MHz – 2 GHz on a single device)
Filters
• Increased dynamic range, bandwidth, efficiency and power levels
• Cognitive radios and multiband transceivers requirements are particularly stressing
Software/firmware
• Improved FPGA development tools
• Serial code to parallel code converters and vice-a-versa
• Automated code analysis
• Over-the-air upgrade deployment
• Easier migration from DSP to FPGA
• Advanced signal processing
• Waveform processors implemented in both FPGA and DSP based
• In-band interference mitigation/cancellation
Analog to digital converters/combiners/attenuators
• Broadband and/or frequency > 3 GHz
Encryption
• Both data-at-rest and on-the-move
Improved batteries/power sources
• Fast charging
• Energy scavenging
• Higher power density
• Higher efficiency
• Lightweight components including batteries
Networks
Flexibility
• Rapid setup and reconfiguration (hours not months) for both small and large scale networks
• Rate of change fundamentally different from commercial operations
• Intuitive, simplified user controls and user interfaces
• Bandwidth efficient communications for both voice and data
• User customizable capabilities, tailored to individual soldier, mission and environment
• Distillation of high level policy/directives down to device level configuration
• Near real-time network fault analysis
• Intelligent message/traffic filtering and forwarding based on multiple criteria (origin/destination pairing, content analysis, QOS/SLA)
• Tuned response to changing situation, threats or attack
• Adaptable to diverse, mobile, multipath environments
Cognitive networks and radios
• Intelligent, learning, adaptable, resilient, power efficient
• Fixed/mobile, ad hoc, radio-radio
• Improved optimization and interoperability
• Support both voice and data under field conditions
• Dynamic management and surveillance
• Common, low cost, hardware platform augmented by government policy and security overlays
Infrastructure
• Visual analysis of policy, rules, configuration and topology
• Improved server virtualization deployment and monitoring
• Modeling and simulation of changes prior to deployment
• Intelligent firewalls
• Agent based IDS
• Secure remote management
Security services
• Protect data-at-rest and on-the-move
• Deception-aware software assurance tools
• PKI for a mobile, perhaps dismounted, tactical environment
• Three-component authentication for soldier in battle gear/armor
Efficient spectrum management
• Dynamic spectrum assignment and utilization
• Spectrum monitoring and characterization to identify users as friend, foe or neutral
• Spectrum and network monitoring to shape traffic based on content and/or operational criticality
DeVenCI is a U.S. Department of Defense (DoD) activity whose dual goals are to speed DoD adoption of promising new commercial technologies and to encourage broader commercial support of the DoD supply chain. DeVenCI uses workshops, technical expositions, industry outreach, and a publically available web portal (http://devenci.dtic.mil/) to increase the visibility of DoD needs to commercial companies and technology area experts. It provides timely information to DoD users about emerging technical innovations and pilot opportunities. DeVenCI is a catalyst initiative that does not fund the development of new technologies or businesses. Instead, it focuses on knowledge brokering by encouraging and facilitating the sharing of information to speed adoption of emerging technology solutions to DoD user needs.
Companies interested in applying for participation in this workshop should contact DeVenCI via e-mail at devenci@osd.mil for an application. All applications must be received on or before September 22, 2009. Selected companies will be responsible for their travel and all other expenses associated with participation in this workshop which will be held in the November timeframe.
Contracting Office Address:
1777 North Kent Street
Suite 9030
Arlington, Virginia 22209
Place of Performance:
Defense Venture Catalyst Initiative
1777 North Kent Street, Suite 9030
Rosslyn, Virginia 22209
United States
Primary Point of Contact.:
DeVenCI Office
devenci@osd.mil
RE: id.wave.com
Notice the logo at bottom. It states "Powered by TrustBearer Digital Identity".
It took me several attempts to download the Internet Explorer add-on "tblive-win-x86.exe". They will need to resolve this issue and ensure it's an easy process for end users. BTW, I have IE 6.0.
If I had a Dell laptop, I would continue with the three steps listed below. However, I have an HP 6930p.
FROM THE SITE:
Three steps:
1) Install Add-on
2) Set-up Credential
3) Sign In
Using your Trusted Platform Module (TPM)
Enabling your TPM in BIOS
TPM Setup with Dell Platform: To get detailed instructions on installing and enabling your TPM, please visit http://support.dell.com for the product that you own to find the information you are looking for. Basic steps would include:
Turn on or reboot your computer, during the startup screen, press F2 to go to the BIOS setup menu.
On the BIOS menu, using the arrow keys go to Security settings category, press the Enter > key. Select TPM Security and on the right side of the menu select On.
You have just turned On the TPM hardware on the BIOS, now you need to Activate the TPM. To do so you will need to restart the computer, during the startup screen, press F2 to go into the BIOS setup menu again.
On the BIOS menu, under Security select TPM Activation . On the right side you will select Activate.
You have just enabled the TPM hardware on the BIOS, now you save the configuration, by press key, choose to Save/Exit , then the computer will be restarted.
Adding id.wave.com to your Trusted Sites
To use your TMP with Internet Explorer, you need to add this Site, id.wave.com to your browser's list of trusted sites.
In the Menu bar select Internet Options.
In the Security tab of Internet Option, click the Trusted Sites zone.
Click the Sites button.
In the Trusted Sites dialog, confirm that http(s)://id.wave.com. is shown and click the Add button.
Click the Close button.
Make sure that the Enable Protected Mode checkbox is not checked.
Click the OK button in the Internet Options dialog.
Updating TPM Support Software
To use your TMP with id.wave.com, you need to update your TPM software. Go to http://support.dell.com and select the latest installer for your Computer.
Choose 'Drivers and Downloads'
Click Select Model
Under Select Your Product Line and Laptop, e.g. the Dell Latitude D620, and click Confirm
Under the Results list, expand Securities
Choose Download Now on the Wave Systems Corp – Application, version 3.3.0.26 or above
Run the installer and follow the online instructions.
Byres Security Demonstrates Industrial Control System (SCADA)
July 16, 2009
Protected Connection
To stop questionable traffic from making its way onto the network, learn how a standards-based NAC approach works.
By Lisa Lorenzin
8/20/2009
http://fedtechmagazine.com/article.asp?item_id=619
OT: Fujitsu launches Secure Print Solution
http://www.fujitsu.com/global/news/pr/archives/month/2009/20090826-01.html
HP - Secure printing
http://gcn.firstlightera.com/EN/Microsites/1/HP/AccessControlPrinterandOtherSecurePrintSolutions.htm
HP - Practical considerations for imaging and printing security
Refers to Trusted Computing Group on page 8
http://h30046.www3.hp.com/large/solutions/practical_consideration_WP.pdf
More details...ClearSure from the Fujitsu website.
Pricing is listed at the bottom.
Availability of the service is late September, 2009
http://www.fujitsu.com/global/news/pr/archives/month/2009/20090824-01.html
Digital ID World 2009
Wave is having a panel discussion with Identity Forge and Symplified
More info on Symplified:
http://www.networkworld.com/supp/2009/outlook/010509-startups-to-watch.html?page=8
http://www.prweb.com/releases/cloudsecurity/webaccess/prweb2665364.htm
http://news.idg.no/cw/art.cfm?id=CC317A24-1A64-6A71-CEC15C78F8FD7746
http://www.emediawire.com/releases/accesscontrol/singlesignon/prweb2690204.htm
http://www.symplified.com/
More on Identity Forge:
http://www.identityforge.com/
http://www.itjungle.com/fhs/fhs081809-story07.html
http://www.emediawire.com/releases/2009/8/prweb2708734.htm
OT: Full disk encryption on offsite laptops starts July 27
http://www.lanl.gov/scat/full_disk_encryption_starts_july_27_for_offsite_laptops
Phase 1 secures lost or stolen systems from predators
More than 1,300 employees who use Lab-owned Macintosh and Windows laptop computers offsite are receiving an e-mail message today with instructions on how to have their laptops encrypted for security reasons.
Full disk encryption for Laboratory laptop computers and other equipment used offsite begins July 27. Required by the National Nuclear Security Administration, full disk encryption protects data and information if the laptop is lost, stolen, or accessed by an unauthorized individual, said Phil Ashcraft of Desktop Support and Software Distribution.
Initially targeted in Phase 1 implementation are Windows and Macintosh laptop computers used offsite under a Property Transport Request. Some laptops may already have full disk encryption installed, such as GuardianEdge or PGP, so they aren't part of the first-phase implementation. Laptops that contain unclassified controlled nuclear information (UCNI), also aren't included in Phase 1, said Ashcraft.
Employees who have questions about full disk encryption can go to fde.lanl.gov online or send e-mail to FDEHelp@lanl.gov.
LSU Health Sciences Center
Invitation to Bid
Opening Date: 08/07/2009
The security requirements include:
Integrated Fingerprint Reader
TCG Trusted Platform Module (TPM) 1.2
Universal lock slot
ComputraceComplete (optional)
Motion DataGuard™
http://wwwprd.doa.louisiana.gov/OSP/LaPAC/AGENCY/PDF/03942200.pdf
Google cached version as HTML file:
http://74.125.93.132/search?q=cache:H-6OB0gtSpkJ:wwwprd.doa.louisiana.gov/OSP/LaPAC/AGENCY/PDF/03942200.pdf+%22trusted+platform+module%22+and+2009+site:*.gov&cd=6&hl=en&ct=clnk&gl=us
Return-Oriented Programming versus TPM
Does anyone know if a computer equiped with a TPM would still be vulnerable/susceptible to Return-Oriented Programming?
Computer scientists take over electronic voting machine with new programming technique (w/ Video)
http://www.physorg.com/news169133727.html
OT: Shuffle's new hardware DRM taxes 3rd-party vendors
This one reminded me of '2bStealthy' (if he is out there lurking).
http://www.ipodnn.com/articles/09/03/14/shuffle.has.drm.issues/
Apple's new iPod Shuffle has added a new layer of hardware DRM, possibly preventing third-party companies from reverse-engineering the Shuffle technology in order to build headphones. Electronic Frontier and iLounge have discovered an Apple authentication chip DRM (Digital Right Management) requirement that will mean third-party headphone makers will have to pay fees for the authentication chip and design headphones with the chip included. The authentication chip provides a legal means to prevent headphone makers from reverse-engineering the Shuffle output to create a set of headphones that work with the new iPod. Apple could sue any companies that attempted such an effort for DCMA violations.
Mobile VoIP and "The Cloud"
http://mobile-voip.tmcnet.com/topics/consumer-voip/articles/47844-mobile-voip-the-cloud.htm
Dec 23, 2008
By Mark Hewitt
CTO, i2Telecom
This article originally appeared in the December issue of Internet Telephony magazine.
Over the years it has been called “Grid Computing”, “On Demand”, “Distributed Computing” and “Software as a Service” however I think that unless you are Larry Ellison (News - Alert) we call it “Cloud Computing”.
Microsoft has abandoned trying to fix Vista and replaced it with the Azure Cloud Services Platform, Amazon has already proven the value of Cloud Computing with the Elastic Web and Google’s (News - Alert) Application Engine launched like a rocket. I think I’m in pretty good company when I say that Cloud Computing has arrived.
That said we still have a way to go before we cut the cord and move cloud based applications into the mobile world. With Apple (News - Alert) and RIM significantly restricting applications on their mobile platforms this leaves only OpenMOKO and Android as potential platforms that provide the development community the necessary openness to ensure competitive access to the mobile platform.
Information is only valuable if we can access it when we need it the most and that seems to be more often at the end of a cell phone. It is no wonder why the presentation of the iPhone’s (News - Alert) display and interface became such a hit. It was not just the disintermediation of the carriers’ grip on applications and services available over the wireless network, it was the presentation of content and applications that drove rapid acceptance. As more mobile devices with great displays and better user interfaces appear, the developer community will move quickly to support the untethered with maturing Cloud-based applications. We already see such great examples as Salesforce and LinkedIN
I will no longer be concerned about backing up my files or where a particular report is or even trying to remember in which contact manager my address book is stored. Soon we’ll be able to pick any phone or mobile device and have full access to our applications, services, and information. This will happen without the need to remember different userIDs or Passwords, as is possible today in most every laptop installed with a Trusted Platform Module or the “TPM”. More on that next month. . .
For more information on Grid Computing see the Open Grid Forum (OGF) at www.ogf.org.
Mark Hewitt, Chief Strategic Officer at i2Telecom, writes the Ask the Mobile Expert column for TMCnet. To read more of Mark’s articles, please visit his columnist page.
Edited by Greg Galitzine
TVTonic was the...
third most popular podcast client for CNET subscriptions; NOT the third most popular podcast client for all podcast subscriptions
(that's the way I interpretted it anyways)
Steven Sprague post on Grawrock's blog:
http://communities.intel.com/openport/blogs/proexpert/2007/09/25/hello-world
Sep 26, 2007 11:28 AM Reply steven.sprague
David,
This is a great place to educate everyone on the role and capabilities of TPMs on a Vpro platform. I enjoyed your post and welcome to blogging. There is so much that any IT shop can do with a TPM today. With ten's of millions of units already in the market it is a very valuable asset to improve the security of any network today. You touched on the TPM's role in integrity measurment, it should also be noted that the TPM can be used to form the foundation of any Network access control solution.
The first step in any NAC installation is to establish strong machine identity this is done with either 802.1x or ipsec both of these technologies support client certificate based identity. These technologies set up the location for integrity measurments to be evaluated. It is trivial for IT to use the TPM to generate the key pair for these certificates. The result is that the private key is now held in tamper resistant silicon and can't be migrated by a user or malware. This ensures that only approved machines are ever on the network and that all machines can have integrity measuments reported.
I look forward to discussing the number of roles that the TPM can support for the Vpro platform
Steven
Intel: David Grawrock blog (New!)
http://communities.intel.com/openport/blogs/proexpert/2007/09/25/hello-world
Hello World
Posted by David Grawrock Sep 25, 2007
Hi the vPro team has asked me to blog here regarding the Trusted Platform Module (TPM) and general security issues. For some strange reason I said yes. I have never blogged before, though i do read some blogs regularly, so hopefully I get this right
To give a little bit of my bona fides, I have been the chair of the TPM workgroup for many years and have been the editor of the TPM spec since the begining of the TCG. For extra credit I am also the security architect of Intel Trusted Execution Technology (TXT). Those two jobs may be part of why it seems like I have no real life outside of Intel. But then I really do as this is my 27th year as a soccer coach, this year it is a U14 girls team, Go Shark Bait (ooh ha ha).
Anyway after that little digression some information on the TPM. A vPro platform requires the inclusion of a Version 1.2 TPM. The features of a TPM include storage of measurements, reporting the measurements, protection of information, and basic cryptographic services. I have classes that take hours to give and my first blog post will not cover all of the features and uses of the TPM.
What I will focus on today is that the TPM is an integral part of the platform. Adding a TPM to the platform requires laying out the real estate for the device, adding busses to the device, changing the BIOS to initialize and configure the device, and then OS and applications that take advantage of the TPM. Without all of these changes the TPM does not provide benefits to the platform or the users of the platform. One change that is very important to the platform is the ability to accept and store measurements. The platform is designed to perform a measurement for two critical processes. The first is the boot of the platform. The measurement of the boot process is known as the "static root of trust for measurement" or S-RTM. The other process is the TXT launch and measurement known as the "dynamic root of trust for measurement" or D-RTM. For those just learning about the TPM measurement in this context means take a cryptographic hash of the target (BIOS or VMM). The hash in use is SHA-1.
The result of either RTM is the knowledge, stored in the TPM as a measurement value, of the status of which BIOS just booted the platform or which VMM is executing. Knowledge of the status of the platform then enables both local processes and remote processes to make trust decisions regarding the platform.
Well most likely this is too long for a first post. Please be kind to a first time blogger and let me know what details you would like to dive into.
TVTonic 3.2.3 released
http://www.tvtonic.com/forum/viewtopic.php?t=674
The full version number of this release is 3.2.3.130.
http://www.tvtonic.com/install/
New Features:
Official QuickTime support in Vista Media Center!
Native QuickTime playback has been available with XP for a while, but now it's officially supported in Vista! You must have QuickTime 7.2 or higher installed to view QuickTime videos with TVTonic in Vista Media Center (if you have previously turned on the beta support it will cease to work until you install QuickTime 7.2 or higher). Please note that QuickTime currently isn't supported via XBox or other media extenders. Download QuickTime for free.
True full screen support in Vista Media Center!
OK. This should have been a feature when 3.2 was first released. We admit it! To watch a video item in full screen mode, arrow into the item's details panel and select the 'Play In Full Screen' button. To return from full screen hit the Back key on your remote or Backspace on your keyboard.
Enhancements / bug fixes:
Product update announcements -- you'll now be notified within Media Center when new versions of TVTonic are available.
Better, smarter, faster downloading -- some under-the-hood improvements that will help your channels stay up-to-date without wasting your bandwidth.
I live in Dallas, but couldn't get away from the office to go see the Wave booth.
TVTonic 3.2.2 released
by Tim Whidden in TVTonic Updates Release Notes
http://www.tvtonic.com/forum/viewtopic.php?t=659
http://www.tvtonic.com/news/
July 6th, 2007 @ 13:53
We’ve just released TVTonic 3.2.2!
This is a bug fix release and is most important for people whose computers use the date format dd/mm/yy (as opposed to mm/dd/yy).
The full version number of this release is 3.2.2.119.
Please upgrade or install today.
Here’s what’s updated and fixed:
Updated native QuickTime playback functionality for XP Media Center and Vista Media Center:
Fixed playback issues with QuickTime videos containing more than one video track
Improved handling of QuickTime videos with higher bitrate
Improved QuickTime video playback performance
Fixed an issue with channels not updating after a certain date. This issue only affected systems with date format of dd/mm/yy.
Fixed an issue with product update not working from system tray on Vista.
Fixed an issue with the Download Monitor using excessive CPU.
Please upgrade or install today.
http://www.tvtonic.com/install/