Full compendium of mi2g speeches released on web
    
   
  London, UK - 17 November 2004, 20:00 GMT - In the interest of providing 
    a complete and historic perspective on mi2g's long standing position 
    on Open Source versus Proprietary computing environments - including Linux, 
    Microsoft Windows and BSD - as well as global security matters, mi2g 
    is releasing the full compendium of public session speeches made by DK 
    Matai and colleagues over the last three years. This is to be a gratis 
    service and all charges for speeches have been suspended with immediate effect. 
    In order to review the historic speeches, simply click here. 
    
    
    We acknowledge some of the public speeches were delivered at the request of 
    the British Parliamentary IT Committee (PITCOM), Lloyd's of London, the International 
    Underwriting Association (IUA), the British Computer Society - Information 
    Security Specialist Group (BCS-ISSG), the Institute of Economic Affairs (IEA), 
    Hong Kong and Shanghai Bank Corporation (HSBC), VISA International, International 
    Business Machines (IBM) Corporation, the Asymmetric Threats Contingency Alliance 
    (ATCA) and the Real Time Club (RTC). The views expressed in the speeches are 
    entirely those of DK Matai, mi2g colleagues and the mi2g Intelligence 
    Unit, prevailing at that time. 
    
    "This historic set of speeches should set the record straight amongst 
    those who seek to speculate about our commitment to Open Source and our long 
    term interest in analysing, building and maintaining secure computing environments," 
    said DK Matai, 
    Executive Chairman, mi2g. "By opening 
    our historic views to the public we are making our strategic thinking completely 
    transparent. We should therefore be able to mitigate the smear campaign which 
    is raging since we came out in favour of Apple and BSD."
    
    The DK Matai speeches in PDF format span the period from July 2001 to February 
    2004 and include historic milestones:
    
    1. The Coming Linux 
    Tsunami - An Open Source Revolution [17th October 2001]
    
    2. Exploration of 
    the effects of an Asymmetric Attack - [30th May 2002]
    
    3. Trust in Computing 
    Platforms [18th July 2002]
    
    4. Asymmetric Threats 
    Contingency Alliance - First Session [28th November 2002]
    
    5. The Economic Impact 
    of War with Iraq [11th December 2002]
    
    6. Asymmetric Threats 
    Contingency Alliance - Second Session [3rd April 2003]
    
    7. Asymmetric Threats 
    Contingency Alliance - Third Session [18th February 2004]
    
    [ENDS]
    
  Related Articles:
  17th November 2004 - Full compendium 
    of mi2g speeches released on web
    12th November 2004 - Exclusive interview of DK Matai 
    with Linux/Security Pipeline
    12th November 2004 - Deep study: The ongoing Linux Attacks 
    fallout
    6th November 2004 - Experts challenge mi2g security 
    study: mi2g response
    5th N0vember 2004 - The relativistic approach to safety 
    - uptime versus market share
    2nd November 2004 - Deep study: The world's safest computing 
    environment
    24th March 2004 - Five solutions to the rising identity 
    theft and malware problem
    2nd March 2004 - Disturbing the sanctity of the Linux 
    Church
     19th February 2004 - The World's safest Operating 
    System
  
  Coverage:
    
    Information 
    Security News: mi2g defends its Linux claims - Insecure.org
    mi2g 
    defends its Linux claims - Virus.org
    mi2g defends 
    its Linux claims - The Inquirer
    Interviews: 
    DK Matai with Linux/Security Pipeline - Linuxtimes.net
    Exclusive 
    interview of DK Matai with Linux/Security Pipeline - LinuxSecurity.com
    Exclusive 
    interview of DK Matai with Linux/Security Pipeline - eBCVG IT Security
    Apple's 
    Mac OS X is much more secure than Linux or Windows - MacDailyNews
    Furore 
    over OS security survey - ITWeb
    Sloppy 
    Sysadmins Leave Linux Security Lacking - InternetWeek.com
    Sloppy 
    Sysadmins Leave Linux Security Lacking - CRN
    Sloppy 
    Admins Leave Linux Vulnerable To Security Breaches - Information Week
    Linux 
    is 'most breached' OS on the Net, security research firm says - ARNnet
    Linux 
    is 'most breached' OS on the Net, security research firm says - LinuxWorld
    Linux 
    is 'most breached' OS on the Net, security research firm says - ComputerWorld
    Security 
    company defends Linux-is-vulnerable survey - HNS
    The 
    worlds safest computing environment - TechCentral
    mi2g response: 
    Experts challenge mi2g security study - eBCVG IT Security
    PC 
    Pro: Security Company Defends Linux-is-Vulnerable Survey - linux today
    Study: 
    Linux Is Least Secure OS - WindowsITPro
    Linux 
    Most Breached OS, Says New Report - CXO Today
    Survey: 
    Mac OS X most secure, Linux least - ITWeb
    Mac 
    OS X, BSD Unix top security survey - Neowin.net
    Mac 
    OS X, BSD Unix top security survey - Computer World
    Study: 
    OS X World's Safest OS From Security Attacks - MacNewsWorld
    Study 
    Recommends Mac OS X as Safest OS - Slashdot
    Mac 
    OS X, BSD Unix top security survey - MacCentral
    Security: 
    Mac OS X Good, Linux Bad - eBCVG IT Security
    Study: 
    Apple's Mac OS X 'world's safest and most secure' operating system - MacDailyNews
    Study: 
    OS X World's Safest OS From Security Attacks - the Mac Observer
    The world's 
    safest computing environment - eBCVG IT Security
    Mac 
    OS X - 'world's safest' - Macworld Daily News
    The 
    world's safest computing environment - TechCentral
  
  
  mi2g is at the leading edge of building secure on-line banking, broking 
  and trading architectures. The principal applications of our technology are:
  
  1. 
D2-Banking; 
  2. 
Digital Risk Management; and 
  3. 
Bespoke Security Architecture.
  
  
mi2g pioneers enterprise-wide security practices and technology to save 
  time and cut cost. We enhance comparative advantage within financial services 
  and government agencies. Our real time intelligence is deployed worldwide for 
  contingency capability, executive decision making and strategic threat assessment.
  
  
mi2g Research Methodology: The Frequently Asked Questions (FAQ) List 
  is available from 
here in pdf. Please 
  note 
terms and conditions of use listed on 
www.mi2g.net
  Full details of the October 2004 report are available as of 1st November 
    2004 and can be ordered from here. 
    (To view contents sample please click here).