Feeds

Trusted computing? Nothing to do with us, says UK IT

Lack of support for conference reveals an awful truth...

The Power of One Infographic

How interested is the computer industry in trusted computing? Not as much as you might think, suggests Eddie Bleasdale of netproject. "They've nothing to sell in this area," he told The Register, "so they're not interested." Bleasdale is mounting a reprise of netrproject's successful 2002 Trusted Computing conference at the end of this month with support from the Department of Trade & Industry, which intended that the event would also attract sponsorship from the UK computer industry, but none has been forthcoming.

In fairness one might suggest that UK industry is getting sick of the Government's addiction to 'self-funding' (aka somebody else picks up the tab) initiatives, but Bleasdale's point is amply supported by the phalanxes who'll show up waving credit cards at the merest mention of biometrics. No sale opportunity, no money from marketing - we can trust them that far, at least.

Bleasdale nevertheless reports a healthy number of sign-ups for the event, where speakers will include Ross Anderson, Alan Cox giving an impartial talk entitled "One Key to rule them all and in the darkness bind them", Smart Card Group CEO and Mondex architect David Everett and, Bleadsdale assures us, a representative of Microsoft who will discourse on trusted computing aspects of Windows Vista. This should provide an opportunity to compare and contrast Microsoft's current plans for trusted computing with John Manferdelli's outline of Palladium (as it then was) at the previous event, and may even indicate that the issue of trusted computing is closer than the IT industry thinks.

The conference takes place in London from 9.30am to 1pm on 26th January, and is free to "senior IT professionals in the private sector", but for security reasons it will be necessary to book ahead. Sign up information can be found here. ®

Mobile application security vulnerability report

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.