“In describing the motivation behind Intel’s recent purchase of McAfee for a packed-out audience at the Intel Developer Forum, Intel’s Paul Otellini framed it as an effort to move the way the company approaches security “from a known-bad model to a known-good model.” Otellini went on to briefly describe the shift in a way that sounded innocuous enough–current A/V efforts focus on building up a library of known threats against which they protect a user, but Intel would love to move to a world where only code from known and trusted parties runs on x86 systems. It sounds sensible enough, so what could be objectionable about that? ”Here is some more Tech News from around the web:
- Security researchers ‘destroy’ Microsoft ASP.NET security @ The Inquirer
- Dadi Perlmutter talks hardware @ SemiAccurate
- Complete IDF 2010 Coverage @ ExtremeTech
- Intel’s Sandy Bridge Architecture Exposed @ AnandTech
- IDF San Francisco 2010: Intel demos OASIS project @ DigiTimes
- Intel IDF 2010 Coverage: Intel DP67BG Burrage Motherboard Pictures @ Legit Reviews
- AMD Benchmarks Zacate APU, 2x Faster GPU Performance than Core i5 @ AnandTech
- NVIDIA Announces Parallel Nsight 1.5 & CUDA Toolkit 3.2 @ AnandTech
- Mac OS X Public Beta @ Ars Technica
- Adobe exploit bears fingerprints of hack on Google @ The Register
- Critical Flash vuln under active attack, Adobe warns @ The Register
- 18W Fusion APU goes head to head with Core i5 @ The Tech Report
- Gigabyte dresses up Sandy Bridge in gold, blue @ The Tech Report
- Beginners Guides: 101 Tech Tip Tweaks for Windows @ PCSTATS
- Canon PowerShot S95 Review @ Digital Trends
Intel’s Antivirus plans might bear a resemblance to the iTunes store?
Thanks to information shared by Paul Otellini during the IDF about Intel’s security plans after the purchase of McAfee, Ars Technica has a new allusion to attempt to describe what they may be doing and oddly it does not involve cars. Instead of trying to describe Palladium and Trusted Platform Management, two terms which describe technology that never caught on and many have not heard of, Ars turns to iTunes and Apple’s sales models. Apple can control what software is allowed to run on their mobile hardware to a degree unseen in the PC ecosystem and that control offers a high degree of security. Picture Intel products that will only ever run code verified as safe and secure and that is guaranteed unchanged during transmission. Read on here.