Not FA,TA or tea leaves.........some DD.
"We will take a look at how TPMs and available applications and services can help you manage network security more effectively."
Wave provides TCG applications & services that help manage
a TC security network.......lets hope they are right &
will be talking about available Wave services by
then...........
Join security technology architects from Atmel, IBM, Intel Corporation, and Wave Systems as they discuss how you can protect your vital business data using Trusted Platform Modules. These hardware components, embedded into desktop PCs and notebooks, can be more effective than software-only security. The TPM provides a protected space for key operations and other security critical tasks that are not protected today. Using tamper-resistant hardware and software, the TPM secures encryption and signature keys at their most vulnerable stages - operations when the keys are being used unencrypted in plain-text form. The TPM is specifically designed to shield unencrypted keys and platform authentication information from software-based attacks. We will take a look at how TPMs and available applications and services can help you manage network security more effectively. And we will review the role of the TPM in authenticating users and handling other security functions.