SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Qualcomm Incorporated (QCOM) -- Ignore unavailable to you. Want to Upgrade?


To: Jim Willie CB who wrote (52890)12/7/1999 10:31:00 AM
From: Jenne  Respond to of 152472
 
Bluestone Takes Total-e-Business to Wireless Devices On Stage At Giga Emerging Technology Show; Bluestone's Comprehensive E-Business Platform Reaches Beyond the Browser to Unite Devices with All Corporate Database, Legacy and E-Business Applications Based on J2EE Platforms, Including JSP, XML, and XSL
BUSINESS WIRE - December 07, 1999 10:04
PALM DESERT, Calif., Dec 7, 1999 (BUSINESS WIRE) -- Today in a live presentation made at Giga Information Group Inc.'s Emerging Technology Scene conference, Bluestone(R) Software, Inc., (Nasdaq:BLSW), a leading provider of Enterprise Interaction Management software, demonstrated the power of wireless device access in its Total-e-Business(TM) product suite. Incorporating wireless devices from Symbol Technologies, Inc. (NYSE:SBL) and Qualcomm (Nasdaq:QCOM), the Total-e-Business demonstration illustrates the business advantage of real time integration and data exchange with mobile device users.

"Our customers have long known the value of incorporating wireless devices into their business operations, and we've designed the mobile and wireless systems they need to gain competitive advantage," said Keith Kanneg, director of software marketing for Symbol Technologies. "With Bluestone pioneering the use of XML in our devices, working with Total-e-Business is a natural extension of our efforts to push applications beyond the desktop."

To ensure complete e-business platform support and interactivity for any device, Total-e-Business employs an access methodology based on J2EE standards, including JavaServer Pages (JSPs), Extensible Markup Language (XML), and XML Stylesheet Language (XSL). Consequently, Total-e-Business solutions support a variety of devices and device platforms, including the 3Com Palm VII, Symbol Wireless LAN, Qualcomm PDQ Smart Phone, Wireless Access Protocol (WAP) Phone, Voice XML, and Wireless Markup Language (WML). With Total-e-Business solutions, companies can extend the reach of their e-business solutions beyond the browser and tie devices to corporate databases, legacy systems, and e-business applications that comprise a Total-e-Business solution.

"The Emerging Technology Scene is a showcase for innovative IT solutions, so the Giga audience understands the value of extending real-time e-business activities to the rapidly growing pool of cell phones, palmtops, and other devices carried by customers, suppliers, partners, and employees," said John H. Capobianco, senior vice president of worldwide marketing for Bluestone. "Industry analysts anticipate one billion cell phones in use by 2003. Anticipating the e-business opportunities created by the exploding device market, Bluestone engineered Total-e-Business to support extreme access -- not only in terms of performance and fault-tolerance, but also in terms of devices."

Taking Business Beyond the Browser with Total-e-Business

The live, all wireless Total-e-Business demonstration at The Emerging Technology Scene served as a proof of concept to illustrate the feasibility and the benefits of integrating devices with Total-e-Business.

For the Total-e-Business demonstration, a Bluestone representative went into the conference audience and -- using the ruggedized Symbol SPT 1740 RF PalmPilot -- scanned the bar-coded name tag of a randomly selected attendee and entered the attendee's cell phone number. Using Bluestone's ConXML application software, the scanned data was converted to XML and uplinked via wireless protocols to a Symbol Spectrum24 Wireless LAN receiver connected to the Total-e-Business server. Total-e-Business software, including the Sapphire/Web Application Server and XML Suite Integration Server, automatically personalized the data and displayed the attendee's name on a Web page. At the same time, the name was sent to a separate room (simulating an off-site manufacturing facility) where the name was custom printed onto a t-shirt. Simultaneously, the Total-e-Business software sent an email to an on-stage Qualcomm PDQ Smart Phone, which dialed the cell phone of the randomly selected conference attendee with notification of the customized t-shirt's completion.

Nancy Lee, senior product manager for XML at Sun Microsystems, Inc., affirmed, "Java captivated the IT market with its 'write once, run anywhere' promise. With Total-e-Business, Bluestone delivers on that promise by creating an e-business platform that takes the run-anywhere philosophy to the exploding arena of intelligent, non-PC devices using XML."

As the Total-e-Business demonstration suggests, the value of integrating devices into a Total-e-Business solution centers on dramatically expanding a company's e-business audience to include local and remote customers, partners, and employees using mobile devices. As suggested by Bluestone's Giga demonstration, using technologies that are available today, Total-e-Business solutions can leverage LANS, WANS, and radio frequency (RF) protocols to communicate with a wide range of devices. This allows corporations to integrate these devices into the IT infrastructure as they gain widespread usage. Consequently, Total-e-Business application scenarios allow businesses to maximize the cost saving and revenue generating opportunities that distributed wireless communication brings to e-business. The capabilities demonstrated at the Giga conference can be applied to diverse industries, including hospitals, manufacturing inventory control, retail, even tradeshow promotion.

Total-e-Business can also integrate with wide area scenarios, including applications that open up corporate communications and knowledge bases to device users, as well as those that focus on reservation or delivery services, such as Food.com, the Internet's premier restaurant takeout and delivery service. For example, using Total-e-Business, Food.com plans to make its service available through Palm Pilots, Web phones, and TV set-top boxes, as well as standard PC browsers.

About Bluestone's Total-e-Business

Total-e-Business combines best-of-breed components for content management, personalization, and e-commerce with Bluestone's award-winning Sapphire/Web Application Server infrastructure and Bluestone XML Suite Integration Server -- based on JSP and XML standards. Total-e-Business makes a company's e-business a vital and seamless extension of its overall business strategy by consolidating all e-business interactions with business partners, suppliers, vendors, customers, and employees. By providing a global-class e-business platform, companies can place fundamental business control of the e-business enterprise in the hands of business experts, allowing IT personnel to concentrate on technology excellence.



To: Jim Willie CB who wrote (52890)12/7/1999 10:38:00 AM
From: Boplicity  Read Replies (2) | Respond to of 152472
 
QCOM also has small trend channel going with the 400 range as the top, but it's too soon to rely on such a short trend. So I'll rely on my years of watching.

Just got a great deal on INSP. Milehigh it's the stock we have been looking for.

greg



To: Jim Willie CB who wrote (52890)12/7/1999 10:45:00 AM
From: JohnG  Read Replies (1) | Respond to of 152472
 
GSM Cracked Source Article=Wired Magazine--one of my favorites.
JohnG

Cell Phone Crypto Penetrated
by Declan McCullagh

10:55 a.m. 6.Dec.1999 PST
Israeli researchers have discovered
design flaws that allow the
descrambling of supposedly private
conversations carried by hundreds of
millions of wireless phones.

Alex Biryukov and Adi Shamir describe
in a paper to be published this week
how a PC with 128 MB RAM and large
hard drives can penetrate the security
of a phone call or data transmission in
less than one second.

More Infostructure in Wired News
Read more about Gadgets and Gizmos
Check back with Wired News for
continuing coverage
Read more Politics -- from Wired News
Read more Technology -- from Wired
News

The flawed algorithm appears in digital
GSM phones made by companies such
as Motorola, Ericsson, and Siemens,
and used by well over 100 million
customers in Europe and the United
States. Recent estimates say there are
over 230 million users worldwide who
account for 65 percent of the digital
wireless market.

Although the paper describes how the
GSM scrambling algorithm can be
deciphered if a call is intercepted,
plucking a transmission from the air is
not yet practical for individuals to do.

James Moran, the fraud and security
director of the GSM Association in
Dublin, says that "nowhere in the world
has it been demonstrated --an ability
to intercept a call on the GSM network.
That's a fact.... To our knowledge
there's no hardware capable of
intercepting."

The GSM Association, an industry
group, touts the standards as
"designed to conform to the most
stringent standards of security possible
from the outset [and] unchallenged as
the world's most secure public digital
wireless system."

Not any more.

Shamir says the paper he co-authored
with a Weizmann Institute of Science
colleague in Rehovot, Israel, describes
a successful attack on the A5/1
algorithm, which is used for GSM voice
and data confidentiality. It builds on the
results of previous attempts to attack
the cipher.

"It's quite a complex idea, in which we
fight on many fronts to accumulate
several small improvements which
together make a big difference, so the
paper is not easy to read or write,"
Shamir, a co-inventor of the RSA public
key crypto system in 1977, said in an
email to Wired News.

Cell Phone Crypto Penetrated page 2

10:55 a.m. 6.Dec.1999 PST

continued
A group of Silicon Valley cypherpunks
has organized previous efforts to
highlight what they view as the poor
security of GSM encryption standards.

In April 1998 they reported that it was
possible to clone a GSM phone, which
the US Cellular Telecommunications
Industry Association dismissed as more
theoretical than practical. The North
American GSM Alliance similarly
dismissed cloning as a serious threat in
a statement.

Earlier this year, the group, which
includes Marc Briceno, Ian Goldberg,
and David Wagner, described how to
penetrate the less-secure GSM A5/2
algorithm used in some Pacific rim
countries in less than a second. In May
1999 they released the source code to
A5/1, which the Weizmann Institute
computer scientists used in their
analysis of the cipher.

"Because of Biryukov and Shamir's
real-time attack against A5/1 and our
group's 15 millisecond attack against
A5/2, all the GSM voice privacy ciphers
used worldwide can be broken by an
attacker with just a single PC and some
radio hardware," Briceno said.

"Since the voice privacy encryption is
performed by the handset, only
replacing the handset would address
the flaws found in the recent attacks,"
he said.

The GSM Alliance's Moran said he
needed time to review the paper, which
has not yet been released. But he said
it would be a topic of a discussion at
the next GSM security working group
meeting on 16 December.

Previously the GSM encryption
algorithms have come under fire for
being developed in secret away from
public scrutiny -- which most experts
say is the only way to ensure high
security.

Moran said "it wasn't the attitude at
the time to publish algorithms" when
the A5 ciphers was developed in 1989,
but current ones being created will be
published for peer review.