InvestorsHub Logo
icon url

oknpv

01/11/11 2:50 PM

#204698 RE: internet #204697

internet...I think we are on the same track. I believe SP can & will zoom on news & projections. Go-Kite wrote..."news regarding high growth of sales", so that included (to me) SP performance way ahead of revenues.
icon url

awk

01/11/11 3:00 PM

#204699 RE: internet #204697

internet: Share price... (edited)

Agreed!

So, this board and its many contributors have put together the scope of the opportunity over the past few years. In general, the board has been right (although not regarding timing). The opportunity is, to paraphrase Steven, "enormous..."

There have been a couple of key events that point to a rapidly increasing acceptance and to deplaoyment of the TCG technologies:

1. NSA Trusted Computing Conference & Exhibition (September 2010, Orlando)

2. The automaker deal. The PwC deal.

3. NSTIC (last week)
.. http://www.besttechie.net/2011/01/10/how-trusted-ids-could-revolutionize-privacy/

I have said it a long time ago, and I say it again: Things are very good!

Oh, and by the way, for years the black forces have repeatedly proclaimed that "the street gets it". Now I say "the street got it and the share price is increasing in the absence of news..."
icon url

awk

01/11/11 3:27 PM

#204703 RE: internet #204697

Links to all Wave/TCG videos…


Updated Video Links

From Youtube's "Wave Systems" channel
http://www.youtube.com/user/WaveSystems#p/u


Featuring Mr. Sprague, "Leveraging Hardware Security in 350 Million Platforms" gives viewers a brief overview of Trusted Computing, from the history behind the TCG, to an introduction of both the TPM and SED as embedded forms of hardware security, designed by the security and PC industry to counter the vulnerabilities of software security





The second video, "Trusted Computing: Establishing Device Identity" evaluates how TPMs act as the foundation for device identity, ensuring that only known machines are allowed network access. The TPM is a highly secure "container" for user and device keys, providing device identity much the same way as a SIM chip does on mobile phone networks.





The third video in the series, "Trusted Computing: Employing Hardware Encryption" introduces viewers to hardware-based disk encryption. Mr. Sprague addresses the impact of new legislation mandating encryption and points to performance differences between software and hardware full-disk encryption (FDE), along with deployment considerations.





In Trusted Computing: "Considerations for Deploying in the Enterprise" Wave Systems’ President and CEO Steven Sprague argues that, for as powerful as Trusted Computing security is, to extract its true value, IT must have and use the right management tools. By turning on and managing the Trusted Platform Modules (TPM) on employee PCs, IT can add greater security to organizations’ virtual private networks. With self-encrypting drives (SEDs), management software is needed to configure each drive, set security policies and perform event logging to prove encryption was turned on should a laptop become lost or stolen.





In "Trusted Computing: Deploying in a Mixed Environment" Mr. Sprague addresses a common question: How should we proceed when Trusted Computing security isn’t on every PC in our enterprise?” Keys and certificates should be stored in TPMs wherever possible and selecting an SED should become standard practice for all new PC purchases. In the meantime, IT should evaluate the best transitional approaches, including deployment of Microsoft BitLocker to encrypt data.





There is a long history of the government becoming a first adopter and advocate for technology that serves the greater public good. Look no farther than the development of the Internet as proof. In "Trusted Computing: Government Adoption" Mr. Sprague illustrates how the government is again playing a leadership role, as evidenced by the Department of Defense mandate to include TPMs on all new laptops.





In the series finale "Trusted Computing: What the Future Looks Like" Mr. Sprague cites precedents of how the industry’s decision to embed technology transformed the way we compute. Ethernet transformed networking; USB forever changed the perception of peripherals. The infrastructure is in place for the TPM to act as the subscriber management system for all Cloud and Web-based services.





Trusted Computing: Considerations for Managing Hardware Encryption



ERAS for Bitlocker V2



Wave for Microsoft Direct Access



id.wave.com Product Demonstration:
Tying a Trusted Platform Module to OpenID




From Youtube's "Trusted Computing" channel
http://www.youtube.com/user/TrustedComputing


NSA Tusted Computing Conference, September 2010
Dr.Michael Willett talks about the current and future adoption of trusted computing technologies



NSA Tusted Computing Conference, September 2010
Dr. Robert Thibadeau on Device Authentication




NSA's first Trusted Computing Conference and Exposition (25:00)
http://www.nsa.gov/ia/Media_Center/index.shtml

.
icon url

Workingcapital

01/11/11 4:03 PM

#204708 RE: internet #204697

Your analogy conveys to me that the FDA approves a drug produced by a singular specific company. The NSA did not go to that extent. However, I don't think you are too off the mark. Nearly all things TPM is Wave's oyster to dominate or squander. Perhaps that why calls for a savvy COO or non-techie CEO are so prevalent.