Optimization and Visualization of Strategies for Platforms

Total Page:16

File Type:pdf, Size:1020Kb

Optimization and Visualization of Strategies for Platforms Optimization and Visualization of Strategies for Platforms, Complements, and Services. by Richard B. LeVine BA, Psychology, State University of New York at Albany, 1980 MS, Computer Science, Union College, Schenectady New York, 1986 SUBMITTED TO THE ALFRED P. SLOAN SCHOOL OF MANAGEMENT IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTERS OF SCIENCE at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 2003 ©2003 Richard B. LeVine. All rights reserved. The author hereby grants to MIT permission to reproduce and to distribute publicly paper and electronic copies of this thesis document in whole or in part. Signature of Author: Alfred P. Sloan School of Management May 8, 2003 Certified by: Professor James Utterback, Chair, Management of Technology Program Reader Certified by: Professor Michael Cusumano, Sloan Management Review Distinguished Professor of Management Thesis Supervisor Accepted by: David Weber Director, Management of Technology Program 1 of 160 Optimization and Visualization of Strategies for Platforms, Complements, and Services by Richard B. LeVine Submitted to the Alfred P. Sloan School of Management on May 8, 2003, in Partial Fulfillment of the Requirement for the Degree of Masters of Science. Abstract This thesis probes the causal elements of product platform strategies and the effects of platform strategy on a firm. Platform strategies may be driven by internal or external forces, and the lifecycle of a firm and of a platform strategy evolve over time in response to both the needs of the firm and the changes in the external environment. This external environment may consist of a “platform ecology,” in which the platform strategies of firms affect one another. These effects may be positive, buoying revenues, or negative, eliminating markets and appropriating value. The thesis assumes that a company whose strategy is to produce complements or services for another firm’s platform may be said to have a platform strategy, and further assumes that a company with a modular platform strategy built primarily for its own internal use may also be said to have a platform strategy. Finally, this thesis will demonstrate example visualization techniques that make the nature of such platform strategies more apparent. This thesis asks and tries to answer a few key questions: • What comprises the elements of a platform strategy? • What kinds of companies adopt these strategies? • What circumstances drive adoption? • What outcomes can be expected? • What happens to such a strategy over time? The thesis asserts and attempts to prove these hypotheses: • Platform Strategies of one firm can influence those of many other firms, by direct effect on the other firms, or by simple economic benefit example. • Return on Investment (ROI) is influenced by these strategies. • Beyond ROI and thus Profit fluctuations, company survival, in an evolutionary Darwinian sense, may depend on these strategic choices. Thesis Supervisor: Dr. Michael A. Cusumano Title: Professor Sloan School of Management 2 of 160 Acknowledgements My thanks go to everyone who motivated me and supported me throughout this process, especially my children, Celeste and Vivian. I did not see them very often during this challenging year at the MIT Sloan School, but they were never far from my mind and heart. While I was learning about frameworks, innovation, and modularity, Celeste, two years old, learned to walk and talk, and Vivian, age four, learned the rudiments of dance. On Sunday nights when I’d get ready to go away for a full week of school, Vivian would often get solemn and say “It will be ok daddy, I know you have to go to school. I’m going to school someday too.” To Professor Michael Cusumano, for supervising my thesis, and for authoring Microsoft Secrets and Platform Leadership. Those two books motivated me to choose this strategic direction, and have put me on a path that may change my career and my life. To Dave Weber, Professor James Utterback, Jennifer Mapes, and Marc O’Mansky, who put a face of warmth and understanding on this incredibly intense academic program. I also want to thank the following senior industry executives who lent hours of their time to providing data and insights for the case research presented in this thesis: • Mr. John Schwarz, Chief Operating Officer and President, Symantec Corporation • Mr. Marvin Keshner, Director, Printing Systems and Solutions for IPG CTO office, Hewlett Packard Corporation • Mr. Jon Otterstatter, Chief Technology Officer of SPSS Incorporated • Dr. Steve Chaput, Vice President of Strategy, SPSS Incorporated • Mr. Leland Wilkinson, Vice President, SPSS Incorporated • Mr. Rimas Buinevicius, Chairman of the Board and CEO, Sonic Foundry Corporation • Mr. Robert Zitter, Senior Vice President of Technology Strategy, Home Box Office Incorporated 3 of 160 Table of Contents ABSTRACT...................................................................................................................................................2 CHAPTER 1: INTRODUCTION AND MOTIVATION..........................................................................8 INTRODUCTION............................................................................................................................................8 MOTIVATIONS .............................................................................................................................................9 ASSUMPTIONS AND DEFINITIONS ..............................................................................................................10 STRATEGY QUESTIONS..............................................................................................................................13 CHAPTER 2: THESIS STRUCTURE .....................................................................................................15 AUDIENCE .................................................................................................................................................15 STRUCTURE OF THESIS ..............................................................................................................................15 METHODOLOGY ........................................................................................................................................16 Research via Publications ...................................................................................................................16 Research via Interviews.......................................................................................................................16 Director, Printing Systems and Solution for IPG CTO office..............................................................16 CHAPTER 3: HISTORICAL AND PRIOR LITERATURE PERSPECTIVES..................................18 INTRODUCTION..........................................................................................................................................18 COMPETITION AND INNOVATION ...............................................................................................................18 SOFTWARE INDUSTRY INSIGHT .................................................................................................................20 “Microsoft Secrets”.............................................................................................................................20 “Platform Leadership”........................................................................................................................23 Winners and Losers .............................................................................................................................24 “Opening the Xbox”............................................................................................................................24 Hardware Complements Books............................................................................................................25 Modularity ...........................................................................................................................................26 CHAPTER 4: SPSS INCORPORATED CASE.......................................................................................32 COMPANY HISTORY ..................................................................................................................................32 Leadership ...........................................................................................................................................33 PRODUCT DIRECTION ................................................................................................................................34 COMPETITORS ...........................................................................................................................................36 STRATEGIC CHOICES .................................................................................................................................36 Strategy, Policy, and Influence ............................................................................................................36 The SPSS Internal Platform Effort.......................................................................................................38 Internal Platform to Drive Competitiveness ........................................................................................39 FINANCIAL TRENDS...................................................................................................................................42 4 of 160 THE
Recommended publications
  • Symantec Software Datasheet
    Data Sheet: Endpoint Management Altiris™ Client Management Suite 7.0 Deploy, manage, secure, and troubleshoot Overview The suite delivers tools that are based on the IT The cost of a PC is only a small part of its total cost. Infrastructure Library (ITIL) to help align processes with Nearly 80 percent of the total cost of owning a client industry best practices so you can more efficiently system goes toward the support and maintenance of manage your client systems. the PC. Altiris™ Client Management Suite from Symantec automates time-consuming and redundant tasks to reduce the effort and costs associated with deploying, managing, securing, and troubleshooting client systems so organizations can gain control of their IT environments. Client Management Suite Delivers Client Management Suite ushers in a new generation of systems management by bringing end users, administrators, and key business decision makers Altiris Client Management Suite deploys, manages, secures, and together. The suite helps you align with organizational troubleshoots systems through the entire IT lifecycle. You can manage more technologies, with greater efficiency, on more objectives by providing easy-to-use self-service tools to platforms. users, powerful management tools to IT administrators, and custom dashboards to decision makers. Client Management Suite provides complete visibility into your organization's client systems so you can see Finding extra time is challenging, yet that's what Client what you have, where it's located, and what state it's in. Management Suite is designed to do. Now you can focus The suite's flexible and actionable reporting tools not on key initiatives that can help your business grow.
    [Show full text]
  • Virus Bulletin, January 1993
    January 1993 ISSN 0956-9979 THE AUTHORITATIVE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Richard Ford Technical Editor: Fridrik Skulason Consulting Editor: Edward Wilding Advisory Board: Jim Bates, Bates Associates, UK, Andrew Busey, Datawatch Corporation, USA, David M. Chess, IBM Research, Phil Crewe, Fingerprint, UK, David Ferbrache, Defence Research Agency, UK, Ray Glath, RG Software Inc., USA, Hans Gliss, Datenschutz Berater, West Germany, Ross M. Greenberg, Software Concepts Design, USA, Dr. Harold Joseph Highland, Compulit Microcomputer Security Evaluation Laboratory, USA, Dr. Jan Hruska, Sophos, UK, Dr. Keith Jackson, Walsham Contracts, UK, Owen Keane, Barrister, UK, John Laws, Defence Research Agency, UK, Tony Pitts, Digital Equipment Corporation, UK, Yisrael Radai, Hebrew University of Jerusalem, Israel, Martin Samociuk, Network Security Management, UK, John Sherwood, Sherwood Associates, UK, Prof. Eugene Spafford, Purdue University, USA, Dr. Peter Tippett, Certus Corporation, USA, Steve R. White, IBM Research, Dr. Ken Wong, PA Consulting Group, UK, Ken van Wyk, CERT, USA. CONTENTS SCANNER UPDATE 1993 Scanner Shoot-Out 8 EDITORIAL Imageline v. McAfee 2 VIRUS ANALYSES NEWS 1. The CMOS1 Virus 13 2. DOSHUNTER - Search S&S Caught Out 3 And Destroy 15 Chinese Whispers 3 3. Penza - Variations on a Familiar Theme 16 A Rose By Any Other Name 3 PRODUCT REVIEWS IBM PC VIRUSES (UPDATE) 4 1. IBM AntiVirus 18 INSIGHT 2. PC Tools 8 21 Scotland Yard’s Virus Hunters 6 END NOTES & NEWS 24 VIRUS BULLETIN ©1993 Virus Bulletin Ltd, 21 The Quadrant, Abingdon Science Park, Oxon, OX14 3YS, England. Tel (+44) 235 555139. /90/$0.00+2.50 This bulletin is available only to qualified subscribers.
    [Show full text]
  • Ppalmtop Aper
    FALL 991 ,....----THE PPalmtop aper INSIDE: Publisher's Message. • . .. 1 LeHers ............••..•... 2 Most Frequently Asked HP 95LX News from HP Questions to HP Technical Support NewsStream Receiver ......... 4 DictionaryfThesaurus . .. ....... 7 We thank the HP technical support stafffor their Other products .. .. 9 considerable efforts in compiling for The HP Palmtop Paper readers these answers to the most often asked HP HP 95LX Support ............ 9 95LX questions. In this first of a two-part series, HP's CompuServe ............... 10 900-number support staff answers querie.1l concerning Most Asked Questions ........ 13 file transfer, programming, printing, phone directory HP Support ................ 16 conversion, internal RAM and RAM cards, AC adapter, DOS Connection batteries, and installing the HP 95LX Connectivity Pack. File Compression ... .... ... 17 DOS Software .............. 20 By the Hewlett-Packard HP 95LX Support Staff Quick Tips ..•..•.....•.. 22·23 Columns Batteries Looking Glass .............. 25 Sawy User . ............... 27 How can I make my batteries last longer? Programmer's Corner ......... 30 First, use the AC adapter whenever possible. Applications Getting Started . .. 33 which continuously update the screen (i.e. TigerFox), or use the serial port (i.e. FILER or COMM) use more power than programs Thaddeus Computing News ... 35 which spend most of the time waiting for keystrokes. Use of the HP Palmtop Paper: the future ... 35 AC adapter is especially important with these high power usage How to contribute .... .. 35 programs. HP Palmtop Paper on disk ..... 35 Free Subscriber's disk. .. 36 Second, always close the FILER and COMM applications Challenge to readers . .. 36 when they are not in use. These two applications turn on the power to the 95LX's serial port.
    [Show full text]
  • Virus Bulletin, March 1992
    March 1992 ISSN 0956-9979 THE AUTHORITATIVE INTERNATIONAL PUBLICATION ON COMPUTER VIRUSE PREVENTION, RECOGNITION AND REMOVAL Editor: Edward Wilding Technical Editor: Fridrik Skulason Editorial Advisors: Jim Bates, Bates Associates, UK, David Ferbrache, Defence Research Agency, UK, Christoph Fischer, University of Karlsruhe, Germany, Ray Glath, RG Software Inc., USA, Hans Gliss, Datenschutz Berater, West Germany, Ross M. Greenberg, Software Concepts Design, USA, Dr. Harold Joseph Highland, Compulit Microcomputer Security Evaluation Laboratory, USA, Dr. Jan Hruska, Sophos, UK, Dr. Keith Jackson, Walsham Contracts, UK, Owen Keane, Barrister, UK, John Laws, Defence Research Agency, UK, David T. Lindsay, Digital Equipment Corporation, UK, Yisrael Radai, Hebrew University of Jerusalem, Israel, Martin Samociuk, Network Security Management, UK, John Sherwood, Sherwood Associates, UK, Prof. Eugene Spafford, Purdue University, USA, Dr. Peter Tippett, Certus International Corporation, USA, Dr. Ken Wong, PA Consulting Group, UK, Ken van Wyk, CERT, USA. CONTENTS SUPPORT SURVEY Out-of-Hours Technical Support 14 EDITOR’S DIARY Our Man in Havana 2 BOOK REVIEWS HEADLINES 1. The Little Black Book of The Onward March of Computer Viruses 17 Michelangelo 3 2. A Pathology of Computer LETTERS 5 Viruses 18 IBM PC VIRUSES (UPDATE) 7 PRODUCT REVIEW VIRUS PREVALENCE TABLE 10 PC Armour 19 FIELD REPORT PUBLIC DOMAIN Maltese Software Under Siege 11 Stealth Bomber 22 VIRUS ANALYSIS 777 - Revenge Attacker 12 END-NOTES & NEWS 24 VIRUS BULLETIN ©1992 Virus Bulletin Ltd, 21 The Quadrant, Abingdon Science Park, Oxon, OX14 3YS, England. Tel (+44) 235 555139. /92/$0.00+2.50 This bulletin is available only to qualified subscribers. No part of this publication may be reproduced, stored in a retrieval system, or transmitted by any form or by any means, electronic, magnetic, optical or photocopying, without the prior written permission of the publishers.
    [Show full text]
  • Strike First
    GET UP TO $ BACK30 THE RISE OF COBRA Via Mail-In Rebate* ONly IN Theaters STRWITH ITKHEE SPEED FIR OFS NOTRTON * Receive $30 via mail-in rebate with the purchase of Norton™ Internet Security 2009 or $20 with the purchase of Norton™ AntiVirus 2009. Offer good for purchases made between 6/21/09 and 10/19/09 at participating retailers. Rebate submissions must be postmarked within 30 days of purchase. Limit one rebate per product per customer. Read below or visit www.norton.com/gijoe for complete Terms and Conditions. To receive your rebate from Symantec, please follow these steps: Terms and Conditions 1. Purchase Norton™ Internet Security 2009 or Norton™ AntiVirus 2009 between 6/21/09 and 10/19/09 • The G.I. Joe rebate offer is valid only for stand-alone, retail (boxed or downloaded) purchases of Norton at a participating retailer (Norton Internet Security 2009 customers receive a $30 Visa® Prepaid Card. Internet Security 2009 and Norton AntiVirus 2009. Purchases must be made between 6/21/09 and Norton AntiVirus 2009 customers receive a $20 Visa Prepaid Card. Purchases made from Office Depot 10/19/09 at a participating retailer. Offer not available with site licenses, trialware, NFRs, products will receive their rebate in the form of a check.). pre-installed or supplied by a manufacturer (OEM), multi-user packs (other than Norton Internet Security 2. Read and complete this rebate request form. Or you can pre-submit your rebate at for 3-users), academic offers, auction purchases, or with any other offer except the upgrade/competitive www.symantecrebates.com.
    [Show full text]
  • The Fourth Paradigm
    ABOUT THE FOURTH PARADIGM This book presents the first broad look at the rapidly emerging field of data- THE FOUR intensive science, with the goal of influencing the worldwide scientific and com- puting research communities and inspiring the next generation of scientists. Increasingly, scientific breakthroughs will be powered by advanced computing capabilities that help researchers manipulate and explore massive datasets. The speed at which any given scientific discipline advances will depend on how well its researchers collaborate with one another, and with technologists, in areas of eScience such as databases, workflow management, visualization, and cloud- computing technologies. This collection of essays expands on the vision of pio- T neering computer scientist Jim Gray for a new, fourth paradigm of discovery based H PARADIGM on data-intensive science and offers insights into how it can be fully realized. “The impact of Jim Gray’s thinking is continuing to get people to think in a new way about how data and software are redefining what it means to do science.” —Bill GaTES “I often tell people working in eScience that they aren’t in this field because they are visionaries or super-intelligent—it’s because they care about science The and they are alive now. It is about technology changing the world, and science taking advantage of it, to do more and do better.” —RhyS FRANCIS, AUSTRALIAN eRESEARCH INFRASTRUCTURE COUNCIL F OURTH “One of the greatest challenges for 21st-century science is how we respond to this new era of data-intensive
    [Show full text]
  • Essential Trends and Dynamics of the Endpoint Security Industry
    Essential Trends and Dynamics of the Endpoint Security Industry Lenny Zeltser wrote this paper together with a co-author who chose to remain anonymous. May 2005 This paper examines trends and dynamics of the endpoint security industry, and shows how business strategies of market leaders such as Symantec exemplify these factors. When exploring current developments in the information security marketplace, we stipulate that this sector is beginning to converge with the general IT software industry in response to factors such as the evolution of the industry structure, competitive dynamics, regulatory compliance efforts, and the maturing state of security products. Lenny Zeltser & Co-Author Page 1 Table of Contents Introduction ......................................................................................................................... 2 Characteristics of the Endpoint Security Industry........................................................... 2 Scope of the Industry ............................................................................................................ 2 Industry Size Estimates.........................................................................................................3 Structural Characteristics of the Industry............................................................................... 3 Competitive Dynamics........................................................................................................... 4 Industry Evolution: From 1990 to 2005 ............................................................................
    [Show full text]
  • Newsletter of Stanford Palo Alto Users Group for PC
    ' mmm ~ I.__ __v_o_i_. _x_•_11_______ J_u_L_v_•_9_9s _________ N_o_ ._1_ __. Q Newsletter of Stanford Palo Alto Users Group for PC Q TABLE OF CONTENTS President's Piece Brain Christopher, SPAUG President 2 ~ New BBS Kendric Smith 2 Banks, Microsoft, and Online Banking Larry Weinberg J Norton DeskTop for Windows Lee Ammons 4 Internet Access in Public Libraries s Renewals 6 Anti-Virus for OS/2 David Varney 7 Why I Like OS/2 Jack Cook 8 Internet SIG 9 Membership Application 10 Resource Center SP AUG 11 ..... Ji GENERAL MEETING McAFEE ASSOCIATES - Latest Anti-Virus Software INCAT SYSTEMS - YAMAHA Recordable CD-ROM WATERGATE SOFTWARE - PC Doctor for IRQ Conflicts WEDNESDAY. JULY 26, 7:3 PM SPAUG NOW HAS A Conference ON A LOCAL First Class BBS. Nick Chinn. the Sysop (system operator) of Dead Winners Dog Party.has kindly provided space on his BBS for A new adventure is a click away for prize an interactive Conference for SPAUG. All you need winners at the June General Meeting. Del Philpott is a computer with a modem. Just dial (415) 968- and Clark Moore both won Pixar's Typestry. Frank 7919. You will see a few introductory screens of Kimbel and Bill McElhrney won Ares software information and be prompted to enter a User ID and Font Minder and Font Chameleon . Larry Turpen a password. New users will be prompted lo fill out won the Better Homes & Garden's Healthily a registration form. Cooking. After logging on, go to Conferences and select BBS Closed SPAUG. You can read what has been posted by other, and you can post your own material that you On July 5th, the Board of Directors feel will be of interest to others in the PC unanimously voted lo close the SPAUG BBS.
    [Show full text]
  • Sustaining Software Innovation from the Client to the Web Working Paper
    Principles that Matter: Sustaining Software Innovation from the Client to the Web Marco Iansiti Working Paper 09-142 Copyright © 2009 by Marco Iansiti Working papers are in draft form. This working paper is distributed for purposes of comment and discussion only. It may not be reproduced without permission of the copyright holder. Copies of working papers are available from the author. Principles that Matter: Sustaining Software Innovation 1 from the Client to the Web Marco Iansiti David Sarnoff Professor of Business Administration Director of Research Harvard Business School Boston, MA 02163 June 15, 2009 1 The early work for this paper was based on a project funded by Microsoft Corporation. The author has consulted for a variety of companies in the information technology sector. The author would like to acknowledge Greg Richards and Robert Bock from Keystone Strategy LLC for invaluable suggestions. 1. Overview The information technology industry forms an ecosystem that consists of thousands of companies producing a vast array of interconnected products and services for consumers and businesses. This ecosystem was valued at more than $3 Trillion in 2008.2 More so than in any other industry, unique opportunities for new technology products and services stem from the ability of IT businesses to build new offerings in combination with existing technologies. This creates an unusual degree of interdependence among information technology products and services and, as a result, unique opportunities exist to encourage competition and innovation. In the growing ecosystem of companies that provide software services delivered via the internet - or “cloud computing” - the opportunities and risks are compounded by a significant increase in interdependence between products and services.
    [Show full text]
  • Us 2019 / 0319868 A1
    US 20190319868A1 ( 19) United States (12 ) Patent Application Publication ( 10) Pub . No. : US 2019 /0319868 A1 Svennebring et al. ( 43 ) Pub . Date : Oct. 17 , 2019 ( 54 ) LINK PERFORMANCE PREDICTION (52 ) U . S . CI. TECHNOLOGIES CPC .. .. H04L 43/ 0882 (2013 . 01 ); H04W 24 /08 ( 2013 . 01 ) (71 ) Applicant : Intel Corporation , Santa Clara , CA (57 ) ABSTRACT (US ) Various systems and methods for determining and commu nicating Link Performance Predictions (LPPs ), such as in ( 72 ) Inventors : Jonas Svennebring , Sollentuna (SE ) ; connection with management of radio communication links, Antony Vance Jeyaraj, Bengaluru ( IN ) are discussed herein . The LPPs are predictions of future network behaviors /metrics ( e . g . , bandwidth , latency , capac (21 ) Appl . No. : 16 /452 , 352 ity , coverage holes , etc . ) . The LPPs are communicated to applications and /or network infrastructure, which allows the applications/ infrastructure to make operational decisions for ( 22 ) Filed : Jun . 25 , 2019 improved signaling / link resource utilization . In embodi ments , the link performance analysis is divided into multiple layers that determine their own link performance metrics, Publication Classification which are then fused together to make an LPP. Each layer (51 ) Int . Cl. runs different algorithms, and provides respective results to H04L 12 / 26 ( 2006 .01 ) an LPP layer /engine that fuses the results together to obtain H04W 24 / 08 (2006 .01 ) the LPP . Other embodiments are described and / or claimed . 700 Spatio - Temporal History Data Tx1 : C1 TIDE _ 1, DE _ 2 . .. Txt : C2 T2 DE _ 1 , DE _ 2 , . .. win Txs : C3 122 T : DE _ 1, DE _ 2 , .. TN DE _ 1 , DE _ 2 .. TxN : CN CELL LOAD MODEL 710 Real- Time Data 744 704 Patent Application Publication Oct.
    [Show full text]
  • Engineered Computer Appliance
    Network Video Recorder (NVR) DATASHEET Engineered Computer Appliance Even small businesses deserve top-of-the-line CCTV technology that is durable, feature- packed and cost efficient. The MX Series performs like a pro, yet is easy on your pocket. Powerful recording and live display tech- nology Up to 32 HD channel inputs Up to 30 days of continuous video storage Active video storage and network protection Supports up to 4 hot-swap dedicated video storage hard disks Automatic daily hard disk drive health check, disk guard and recording activity for potential CCTV no recording monitoring. DATASHEET revision 201407311800 Dedicated Video Storage Video storage configurations Four hot swap HDDs bay for dedicated video storage support 720HD@32CH, 30days: 16TB (4TBx 4unit) four 3.5-inch SATA HDDs. 1080HD@16CH, 30days: 16TB (4TB x 4unit) One internal SSD for OS use only. Max dedicated video storage: 16TB (4TB x 4unit) Triple monitor output supported Live Display Performance (for HDCCTV) DVI* / HDMI / DP 1080HD 16CH (2.86Mbps) 12FPS each CH Max resolution 4096x2304 (4k, HDMI/DP) 720HD 16CH (1.43Mbps) 24FPS each CH Max resolution 1920x1200 (DVI*) 720HD 32CH (1.43Mbps) 07FPS each CH *Supports DVI to VGA Conversion NOTE: Performance may very depend on video surveillance software. Networking Processor, memory, audio Single LAN (RJ45 connector) Intel i5 Quad-core 4 threads processor 10/100/1000Base-T Gigabit Ethernet 4GB system memory, 1600MHz DDR3 Audio line out jack, 3.5mm (Green) Heartbeat Security Key Programmable micro controller for system auto healing and 128-bit Blowfish encryption algorithms. monitoring. Digital I/O. connectable to CMS Alarm.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]