Hi Alea
I suppose that Micro and others who still believe as he does (and there are a lot of them...not on these boards, but among IT pros), are simply stuck in the current and soon to be past model of security architecture. Or lack of one. Right now, many organizations use a piecemeal approach to security, buying applications that protect against what they view as their biggest vulnerablilities. This produces a Rube Goldberg machine kind of security, with layer upon layer of protective applications. Each one protects against a different thing.
Thus, if you don't need a part of these layers of security, you don't buy it. That's how IT people have thought about security. To ask them to jump from that to the world of Trusted Computing is a pretty far leap. It's an entirely new thought process.