InvestorsHub Logo
Followers 28
Posts 1761
Boards Moderated 1
Alias Born 07/24/2003

Re: wavxmaster post# 56867

Wednesday, 11/03/2004 10:27:38 AM

Wednesday, November 03, 2004 10:27:38 AM

Post# of 249958
wavxmaster

Trusted Computing Group to Showcase Security Applications at RSA Conference, Europe 2004, Stand #7 PORTLAND, Ore.--(BUSINESS WIRE)--Nov. 1, 2004-- Trusted Computing Group Members to Participate in Two Security Educational Sessions The Trusted Computing Group (TCG), whose specifications have been developed to help vendors build products that protect critical data and information, will participate in two educational sessions at the upcoming RSA Conference, Europe 2004 November 3-5, at the Princess Sofia Hotel in Barcelona, Spain TCG will present two sessions during the RSA Conference, Europe 2004. On Thursday, 4 November, 4:30 p.m., David Grawrock of Intel Corporation will speak at the Implementers Track on "How to Prevent Spoofing and Its Impact on End Users, Servers, and IT Operations." Thorsten Stremlau of IBM will also speak at 11:00 a.m., Friday, 5 November, on a panel addressing "SSL VPN vs. IPSec VPN: Which is Better for Your Organization(R)" TCG will also sponsor the Delegate Lunch which will be held on Thursday, 4 November, 12:15 p.m. - 2:00 p.m. in the Exhibition Hall Trusted Computing Group member company Wave Systems will host a demonstration of Trusted Computing solutions and applications at the TCG stand (#7) at RSA Conference, Europe 2004 To register for the conference or to get more information, visit http://2004.rsaconference.com/europe/ About TCG TCG is an industry standards body formed to develop, define, and promote open standards for trusted computing and security technologies, including hardware building blocks and software interfaces, across multiple platforms, peripherals, and devices. TCG specifications are designed to enable more secure computing environments without compromising functional integrity with the primary goal of helping users to protect their information assets from compromise due to external software attack and physical theft More information and the organization's specifications are available at the Trusted Computing Group's website, www.trustedcomputinggroup.org Brands and trademarks are the property of their respective owners CONTACT: Trusted Computing Group Anne Price, 1-602-840-6495 Mobile 1-602-330-6495 press@trustedcomputinggroup.org Copyright Business Wire 2004



Join InvestorsHub

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.