Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Security Meeting Focuses on the Basics
By SOMINI SENGUPTA
| February 29, 2012, 12:52 pm
.
SAN FRANCISCO — At the annual gathering here for computer security professionals this week, there was a lot of talk about hygiene. Not hand washing, but its digital equivalent.
Five years ago, conference attendees said, they might have been sharing tips on what to do to make their customers safe inside their trusted, protected company networks. These days, they said, there was no inside, and nothing could be trusted. That was in part, they said, because people were online all the time on a variety of devices – all of them vulnerable to attack. A company could no longer expect its employees to log in to their computers in the office. Today, employees are expected to send e-mail on their cellphones and tablets, transmit data over their home wireless network, even reveal themselves (and often, whom they work for) on social networks like Facebook. Everyone must be taught about how vulnerable they are. Every device and every platform needs to be checked. And if something is dangerous – a Web site, a mobile application, an entire machine – it ought to be contained, before it turns into a contagion.
“Basic machine hygiene” is how Scott Charney, the head of Microsoft Trustworthy Computing, described it Tuesday morning in a keynote speech at the RSA Conference. “We need to ensure basic hygiene, and we need to do it at scale.”
Mr. Charney offered the example of an Australian Internet service provider that quarantined one Internet protocol address – which effectively identifies a device and its users – because it kept spewing out malware. It turned out to be a badly infected machine, and its well-intentioned owner was struggling to figure out how to clean it up.
The exhibition hall at the Moscone Center turned out to be a staging ground for all kinds of tonics against a contagion. Several companies promoted products directed at mobile phones and tablets. One company, TrendMicro, said its new package could, for instance, see if an infected mobile device was trying to get into a company’s system. Another company, ZScaler, called itself a security check post, able to monitor every click on every device. Symantec said its new suite of anti-malware products could serve as a reverse firewall, stopping data from leaving a device if it wasn’t supposed to. One start-up, Appthority, monitored risky applications, and offered companies a way to stave them off. It could, for instance, make sure executives’ locations were not being tracked by triangulating which cellphone carrier towers they were near, or warn them that another application threatened to export their contacts.
Along with spine-chilling talks about computer vulnerabilities, there was plenty of entertainment at the RSA convention. At one end of the convention hall, women with blue wigs raffled off iPads and Kindle Fires. At another end of the hall, women in pink fairy dresses gave away stuffed unicorns. There was candy throughout the day, pigs-in-blanket at lunch and free beer at 5 o’clock.
Hackers reportedly linked to ‘Anonymous’ group targeted in global operation supported by INTERPOL
LYON, France ? An international operation supported by INTERPOL against suspected hackers believed to be linked to the so-called ‘Anonymous’ hacking group has seen the arrest of some 25 individuals across four countries in Latin America and Europe.
Operation Unmask was launched in mid-February following a series of coordinated cyber-attacks originating from Argentina, Chile, Colombia and Spain against the Colombian Ministry of Defence and presidential websites, as well as Chile’s Endesa electricity company and its National Library, among others.
The international operation was carried out by national law enforcement officers in Argentina, Chile, Colombia and Spain, under the aegis of INTERPOL’s Latin American Working Group of Experts on Information Technology (IT) Crime, which facilitated the sharing of intelligence following operational meetings in the four participating countries.
Some 250 items of IT equipment and mobile phones were also seized during searches of 40 premises across 15 cities during the operation, as well as payment cards and cash, as part of a continuing investigation into the funding of illegal activities carried out by the suspected hackers who are aged 17 to 40.
“This operation shows that crime in the virtual world does have real consequences for those involved, and that the Internet cannot be seen as a safe haven for criminal activity, no matter where it originates or where it is targeted,” said Bernd Rossbach, Acting INTERPOL Executive Director of Police Services.
INTERPOL working parties on IT crime were created to facilitate the development of strategies, technologies and information on the latest IT crime methods. There are regional working parties for Africa, the Americas, Asia and the South Pacific, Europe, and the Middle East and North Africa.
The main activities of the working parties rest on three pillars: facilitating operations against IT crime among INTERPOL’s 190 member countries, capacity building and addressing emerging threats.
3:19 PM Just hours after Interpol announces the arrests of 25 hackers linked to Anonymous, the international police agency’s website was targeted in a cyberattack that left it unreachable for a period of time. It's probably not the tipping point for cybersecurity stocks such as FTNT, WBSN, WAVX - but it adds to a growing discussion on how many companies and governments still remain ill-prepared to ward off sophisticated attacks on their systems.
drnick, let's continue travelogue discussions over here...
SL's deleted post
micro re: vPro
The answer was already posted. Did you bother to click on the links that mundo supplied previously?
vPro Activation
http://www.intel.com/itcenter/tool/vpro/index.htm
Step 3: Find the Right Software (vPro Software Catalog)
http://www.intelsalestraining.com/vprosoftwareguide/content.htm
For someone who is too busy with a life to sift through all the minutiae, you sure have plenty of time to make repetitive posts complaining that you're not getting the answers you want.
Did you ever think that the information that you are demanding is valuable? It must be, since you keep asking for it. Why do you expect people to hand it over simply because you asked? Escpecially when you continually insult them?
Maybe you should try looking up the answers yourself and then contributing them to the board. Or would that be a waste of your precious time?
BTW, have you ever disclosed, from your "top management" pedestal, that the company you "lead" has only a handful of employees and less than $500k in revenue? Do you even own it? Mantra and D&B don't seem to think so.
SL
First it's an off topic board. Second, I'd have the same problem with the LACK of corporate posting rules. You know I try to be reasonable, but there is a difference between disagreeing, and posting disagreeably Contact me at sumner@optonline.net if you want more clarification.
This board is supposedly uncensored. Why not just migrate the discussion over here?
I assume my post on the main board will be deleted so I will hang it here as well.
In fact they were driven away.
Some of the discussions on the board have been cooked to a faretheewell.
Executive compensation, CFBE, bonuses, predictions etc have been discussed ad nauseam.
If there is anything new to discuss, it usually gets brought here quite quickly.
When there isnews, a bump in share price or relevant discussion the number of posts increases dramatically.
Just hit my room at Leona's place.
Gonna hook up with some unindicted co-conspirators for some due diligence.
Tone Loc's "Funky Cold Medina" on the droid.
Best,
toro
Brant - I'm sure the Screaming Eagles were very appreciative to be able to communicate.
Thanks for your service.
best,
toro
I was with the 101st
in Phu Bai. Attached...not airborne myself. Communications guy.
GW bridge on the right...
Chuck Berry "Little Queenie" on the Droid now.
Swing thought - Hoping my Oct 5's will be deep in the money soon.
Best,
toro
toro - on the road.
Across the Hudson from West Point now.
Hoping for a Father's Day call from my son Capt'n Matt who's a JAG with the 101st Airborne in J'bad Afghanistan.
FWIW "Last time" by the Stones on the Droid now.
Best,
toro
Thought Matt's post should be posted here as well
Posted by: IH Admin [Matt] Date: Thursday, May 21, 2009 1:03:12 PM
In reply to: None Post # of 127857 [Send a link via email]
Re: SEC complaint/etc
Hi guys,
I'm aware of the SEC complaint/Delaware situation that was released today. You guys know the deal - I can't say much without my legal counsel ripping my head off (certainly the way I tend to write).
If/when I'm cleared to update everyone, I will.
ADVFN is aware of the situation and they consider it a personal matter.
Just so rumors aren't circulating -- iHub isn't going anywhere. The community and the incredible Admin team are what make this place. The site has been absolutely rocking lately and there's no reason that will change. We're doing some upgrades next week to the hardware infrastructure and the Nerds are working on some very groovy cutting edge stuff that we've dreamed up the last few weeks that I'm pretty excited to release.
I appreciate all the concern/messages you guys have sent.
Posted by: Qone0 Date: Friday, May 22, 2009 9:37:39 AM
In reply to: rich ruscio who wrote msg# 3144 Post # of 3149
OT,
In case some people have not heard. Matt Brown has been arrested charged by the DOJ.
A link to the thread with all the info.
http://investorshub.advfn.com/boards/board.aspx?board_id=15452
The pump-and-dump scheme involving GH3 International, Inc. stock occurred between October and December 2006. Dynkowski orchestrated this fraud with Matthew W. Brown, who operates a penny stock website called InvestorsHub.com. Brown introduced Dynkowski to a representative of GH3 and to Jacob Canceli, a penny stock promoter who participated in the scheme. Brown acted as a liaison between Dynkowski, Canceli and the issuer. Dynkowski and his associates used wash sales, matched orders, and other manipulative trading, timed to coincide with false, misleading and touting press releases by the company, to inflate the price of GH3 stock. Canceli provided the accounts from which Dynkowski subsequently sold purportedly unrestricted shares received from the issuer. The scheme culminated in mid-December 2006, with Dynkowski dumping 312 million shares of GH3 stock for total illicit proceeds of $747,609.
Really OT until...
...protecting network monitoring of energy production becomes a money-generating event - that is to say, when you are producing energy for the grid and getting paid to put that energy on the grid, you will want a protected meter to ensure you are getting paid for your energy generation (oh, and this is my newest endeavor and your vote would be greatly appreciated!):
http://cincinnatiinnovates.com/contest/entry/Electricity_from_a_Bacterial_Reactor
Exactly, the problem is not that men a thousand times smarter have weighed in, but a thousand times more violent.
Am I my brother's keeper is first of all a question about the use of violence to avoid cooperation and sharing.
We seem to be losing the race of the survival of the fittest if fittest ever meant smartest.
All the points are extremely hard and go to a very philosophical place about wealth distribution. Men a thousand times smarter than myself have weighted in over the course of centuries. I pray we have similar intelligence now. I'm worried that it's a cultural phenomenon that the short term outlook, held by the stock market and government, and consumers will hurt us.
Unix
I thought you might say that remembering some of your past posts on similar subjects.
I actually agree with you on most your points.
SafePass: Online Banking Security Enhancements from Bank of America
SafePass is Bank of America's strongest protection in guarding against Online Banking fraud and identify theft. With SafePass, you get a 6-digit, 1-time-use code sent as a text message to your mobile phone. This code gives you an unrivaled extra layer of security when you authorize sensitive transactions because the code expires as soon as you use it.
Test Drive SafePass!
Bank of America | Privacy & Security | Additional References | Frequently Asked Questions
SafePass™ Frequently Asked Questions
What is SafePass™?
How do I enable SafePass?
How do I use my SafePass code?
What happens if I don't have my SafePass mobile device with me?
What happens if my mobile device becomes lost or stolen?
How do I turn SafePass off?
What happens if I don't receive a SafePass code on my mobile device?
Do I need to have Mobile Banking to use SafePass?
1. SafePass: Online Banking Security Enhancements from Bank of America
... Using Cards Safely ShopSafe SafePass Detecting Fraud Reporting & Resolving...Preferences Additional References SafePass ® : Online Banking Security Enhancements...the panel, and you will: Receive a 6-digit code, sent as a text message 1 , to your...
2. What is SafePassTM?
SafePass is an optional extra layer of protection...message. After you have enabled SafePass, you will be prompted to enter the...SafePass is considered part of two-factor authentication, which uses 'something you know...
3. What is SafePass™?
SafePass is an optional extra layer of protection...message.After you have enabled SafePass, you will be prompted to enter the...SafePass is considered part of two-factor authentication, which uses 'something you know...
4. What is SafePass™?
SafePass is an optional extra layer of protection...message.After you have enabled SafePass, you will be prompted to enter the...SafePass is considered part of two-factor authentication, which uses 'something you know...
5. Bank of America | Newsroom - Press Releases
...Online Banking Latest innovation provides two-factor authentication via one-time password delivered to a mobile phone...sized card Combination of SiteKeyâ?¢ and SafePass provides consumers with a new level of security...
6. Bank of America | Newsroom - Press Releases
... << [Back to Press Releases] SafePass® Card Offers Added Security to Online...today announced the release of the SafePass® Card. The new wallet-sized card...builds on SafePass, a one-time-use, six-digit code sent as a text message to consumers...
7. Bank of America | How It Works
Bank of America: Bank of Opportunity? SafePass? What Is SafePass Extra Security How To Use SafePass How...It Works SafePass is: Easy to use A 6-digit code accessed from your mobile The code expires...
8. Bank of America | SafePass? | Text version
...America: Bank of Opportunity? SafePass? As an industry leader in Online...innovative online security feature yet, SafePass. SafePass is a revolutionary step...directly from your mobile. The random 6-digit code you are provided with expires as soon...
9. Bank of America | How It Works
Bank of America: Bank of Opportunity? SafePass? What Is SafePass Extra Security How To Use SafePass How...It Works SafePass is: Easy to use A 6-digit code accessed from your mobile The code expires...
10. Bank of America | How To Use Safe Pass
Bank of America: Bank of Opportunity? SafePass? What Is SafePass Extra Security How To Use SafePass How To Get Started Using SafePass Anywhere Access Online Use How To Use...
11. Bank of America | How To Use Safe Pass
Bank of America: Bank of Opportunity? SafePass? What Is SafePass Extra Security How To Use SafePass How To Get Started Using SafePass Anywhere Access Online Use How To Use...
12. Bank of America | SafePass?
Bank of America SafePass Service allows you to secure your online banking; sign up today at BankofAmerica.com.
13. How do I use my SafePass code?
Whenever you are attempting an action protected with SafePass, you will be prompted with a panel that asks you to Send SafePass Code. Doing this will send a secure, 1-time code to your mobile device as a text message. In order to complete...
14. Do I need to have Mobile Banking to use SafePass?
No, the only thing you need in order to receive your randomly generated SafePass code is a mobile device that can receive text messages.
15. How do I turn SafePass off?
You can turn SafePass off at any time by visiting the Customer Service menu within Online Banking. You may also call Customer Service at 1.800.933...
Jon Stewart gives Cramer a well deserved spanking...
http://blog.indecisionforever.com/2009/03/13/jon-stewart-and-jim-cramer-the-extended-daily-show-interview/
the 50 million was a typo -- I was meaning five, but thinking that probably meant 50 million suffering.
I won't argue with you about where it will end because
1. You're a bigot about professors (I've spent equal parts of my life as a salesperson, a small business executive, an elementary school principal, and then a college teacher) Some don't know the real world and have never been out of school. They should not all be tarred with that old tired brush-off. It's too easy for you to do that and not respond with thought.
2. NOBODY know how bad it will get after the debit card default crisis starts building, and the economic problems due to hit Japan in 2011 because of their derivative problems come home to roost. We're probably near the bottom for now, but we have to figure out the social problems of living in a wealthy democracy that's not so wealthy anymore.
1% of the population making 20% of the revenue makes NO Sense to me as a student of history. It's more like Rome. The American Empire will crush its own democracy if we don't make some sensible choices. 10% of the population getting 50% of the revenue is also not sustainable.
Professors at least offer other choices beyond let's do away with all taxes. Solutions that are acceptable to some are almost always not acceptable to others -- That's why Jefferson wished to keep us a homogeneous nation of farmers, but that's not the world we live in. It's no accident that the red states that are left are mostly farmers and ranchers who follow the Goldwater tradition. Just say NO (Taxes) is not an answer when 5 million unemployed have 20 million people to support.
Free Market Capitalism doesn't work much better than Socialism -- so we need some new ideas about how to make sure a system works --
First question is what do you actually want to do with the people who work hard, but aren't getting a fair share? This is a tsunami and lots of good folks are drowning. How do you rebuild the system to make it fairer and stronger? Personally, I don't see any thought from the ideologues about that.
Weby, Are you serious? 50 million unemployed? You're a typical liberal spouting numbers. Housing not a problem. I'm buy foreclosures you know why? Because I pay my bills ontime and I don't over spend. chicago Tea party professor. Ohh yeah Jersey and all I forgot.
Weby
Question ?
Does this post by Fullmoon mean that WAVX no longer has lock on interoperability ?
Thanks in advance for your reply
********************************************
Posted by: Fullmoon Date: Monday, March 09, 2009 11:58:00 AM
In reply to: None Post # of 175985
Self-Encrypting Drives Based on New Trusted Computing Group Specifications Now Available
http://www.earthtimes.org/articles/show/self-encrypting-drives-based-on-new-trusted-computing-group-specifications-now-available,742387.shtml
Hard drive vendors have started shipping self-encrypting drives based on the Trusted Computing Group’s specifications, the group noted today. Final specifications for client drives, data center drives and interoperability of self-encrypting drives were published in late January of this year and are widely supported by PC, server, drive and applications providers.
Fujitsu has demonstrated drives based on TCG’s Opal self-encrypting drive specification, which is focused on drives for PCs, while Hitachi GST offers these drives now. Seagate is now working with early adopters IBM and LSI Corporation on data center storage devices supporting the TCG Enterprise self-encrypting drive specification.
Wave Systems Corporation currently provides solutions to set up and manage all available self-encrypting drives. WinMagic provides support and management applications for self-encrypting drives in an enterprise environment for both Windows and Mac platforms. CryptoMill Technologies also has noted its support for the TCG specifications. McAfee will look to support the TCG Opal specification to provide a choice of encryption models and implementation options to its customers.
“TCG's new storage security specifications and resulting drives from the vendors that support them have been needed for some time and address a number of high-performance, interoperability, and security concerns. This change represents a significant improvement for the storage industry and will benefit vendors as well as users who must protect their data,” noted Rob Enderle, president and founder of Enderle Group.
The new specifications give vendors a blueprint for developing self-encrypting storage devices (e.g., hard drives) that lock-down data automatically in less than a second and can be immediately and completely erased in milliseconds. Self-encrypting drives can be easily deployed in the enterprise, because drives based on TCG specifications are easily managed, have reduced cost of deployment and management, and are interoperable across PC platform types.
The TCG approach specifies encryption in the drive itself, rather than in other components of the PC. Putting cryptographic operations in the drive has a number of benefits. These benefits include the ability to encrypt the entire drive contents immediately upon device manufacture, strong protection of the encryption keys combined with strict access control, and no loss of system performance. The contents of the self-encrypting drives are always encrypted and the encryption keys are themselves encrypted and protected in hardware that cannot be observed by other parts of the system. AES and other cryptographic algorithms are supported in the specifications, and vendors can add additional security features to their devices. Because encryption is handled in the drive, overall system performance is not affected and is not subject to attacks targeting other components of the system.
Compared to encryption outside of the drive, self-encrypting drives do not interfere with system maintenance, compression, de-duplication, and end-to-end integrity metrics. In addition, the encryption key never leaves the drive, greatly simplifying key management. The enterprise benefits from these security features are reliable compliance, ease of deployment, and ease of management. Additionally, the repurposing of drives at either redeployment or end-of-life has a significantly lower cost than other options.
In the data center, encryption typically has been costly and time-consuming. This is mainly due to the demands on bandwidth. Self-encrypting drives do encryption inside of each drive, where it is cheaper, safer, and more scalable to implement than encryption in the RAID controller.
Trusted Computing Group, an industry organization that enables computing security, has created a portfolio of specifications to enable more secure computing across the enterprise in PCs, servers, networking gear, applications and other software, hard drives and embedded devices. More information and the organization’s specifications and work groups are available at the Trusted Computing Group’s website, www.trustedcomputinggroup.org.
Brands and trademarks are the property of their respective owners.
Posted by: Fullmoon Date: Monday, March 09, 2009 11:58:00 AM
In reply to: None Post # of 175985
Self-Encrypting Drives Based on New Trusted Computing Group Specifications Now Available
http://www.earthtimes.org/articles/show/self-encrypting-drives-based-on-new-trusted-computing-group-specifications-now-available,742387.shtml
Hard drive vendors have started shipping self-encrypting drives based on the Trusted Computing Group’s specifications, the group noted today. Final specifications for client drives, data center drives and interoperability of self-encrypting drives were published in late January of this year and are widely supported by PC, server, drive and applications providers.
Fujitsu has demonstrated drives based on TCG’s Opal self-encrypting drive specification, which is focused on drives for PCs, while Hitachi GST offers these drives now. Seagate is now working with early adopters IBM and LSI Corporation on data center storage devices supporting the TCG Enterprise self-encrypting drive specification.
]b[Wave Systems Corporation currently provides solutions to set up and manage all available self-encrypting drives. WinMagic provides support and management applications for self-encrypting drives in an enterprise environment for both Windows and Mac platforms. CryptoMill Technologies also has noted its support for the TCG specifications. McAfee will look to support the TCG Opal specification to provide a choice of encryption models and implementation options to its customers.
“TCG's new storage security specifications and resulting drives from the vendors that support them have been needed for some time and address a number of high-performance, interoperability, and security concerns. This change represents a significant improvement for the storage industry and will benefit vendors as well as users who must protect their data,” noted Rob Enderle, president and founder of Enderle Group.
The new specifications give vendors a blueprint for developing self-encrypting storage devices (e.g., hard drives) that lock-down data automatically in less than a second and can be immediately and completely erased in milliseconds. Self-encrypting drives can be easily deployed in the enterprise, because drives based on TCG specifications are easily managed, have reduced cost of deployment and management, and are interoperable across PC platform types.
The TCG approach specifies encryption in the drive itself, rather than in other components of the PC. Putting cryptographic operations in the drive has a number of benefits. These benefits include the ability to encrypt the entire drive contents immediately upon device manufacture, strong protection of the encryption keys combined with strict access control, and no loss of system performance. The contents of the self-encrypting drives are always encrypted and the encryption keys are themselves encrypted and protected in hardware that cannot be observed by other parts of the system. AES and other cryptographic algorithms are supported in the specifications, and vendors can add additional security features to their devices. Because encryption is handled in the drive, overall system performance is not affected and is not subject to attacks targeting other components of the system.
Compared to encryption outside of the drive, self-encrypting drives do not interfere with system maintenance, compression, de-duplication, and end-to-end integrity metrics. In addition, the encryption key never leaves the drive, greatly simplifying key management. The enterprise benefits from these security features are reliable compliance, ease of deployment, and ease of management. Additionally, the repurposing of drives at either redeployment or end-of-life has a significantly lower cost than other options.
In the data center, encryption typically has been costly and time-consuming. This is mainly due to the demands on bandwidth. Self-encrypting drives do encryption inside of each drive, where it is cheaper, safer, and more scalable to implement than encryption in the RAID controller.
Trusted Computing Group, an industry organization that enables computing security, has created a portfolio of specifications to enable more secure computing across the enterprise in PCs, servers, networking gear, applications and other software, hard drives and embedded devices. More information and the organization’s specifications and work groups are available at the Trusted Computing Group’s website, www.trustedcomputinggroup.org.
Brands and trademarks are the property of their respective owners.
Tony
1. Your banging into trees and are lost in the forest.
2. Earmarks are how the system has worked since the constitutional convention. It's called horse trading and it is how the system is SUPPOSED to work.
3. I'll predict that the Democrats will have 64 seats in two years hence. They will continue to spend on people and the future until we dig our way out and up. Study how its been done AFTER every economic crisis for the last 250 years.
Sure there's some nonesense in a trillion dollar bill, but that's the mortar that makes the bill possible. It's no accident that the bill's opponnents come from the parts of the country with the least development and the poorest educational systems. (Southern Republican land) That's no coincidence.
Oh, and by the way, the dems had to fly a guy in from his mothers funeral to get this passed...
You are blinded with partisan politics.
I already told you that based on my first reading, less than half of that bill is the kind of stimulus needed...rebuilding schools, military and gov facilities, etc. Tax cuts are pointless. Spending that doesn't kick in for 18 months, or longer, is pointless. The less than 400billion in infrastructure is more than enough to kick start things. The rest is earmarks.
To allow politicians to abrogate responsibility this early into the first term is not a good sign for the future. For God's sake, Pelosi had a provision to spend some 10 million on the preservation of some freakin' swamp mouse. You really want your tax dollars spent on that?
I guarantee you, if the politicians thnk that they can roll the public this easy, this early, there will be bullsh~t bills like this for the next 4 years.
Tony
If the bill wasn't passed this way -- there would be no bill.
This is not Canada or Australia. It is a huge, complex democracy with 300 million viewpoints.
No matter what was done, the three Republican votes in the Senate would have had to be won and the 50 or so middle of the road blue dog democrats would have to be satisfied.
The bill will be paid with inflated dollars, but the economy will revive and the country will start moving again.
Meanwhile, what better solution do you propose? Cut taxes and let people starve? Make a depression certain -- the likes of which will cause the drop of revenue and the end of medicare and social security payments and EVERYTHING stopping.
Complaining is easy. Governing is sometimes almost impossible.
...and just so there's no confusion, some of the things in the bill may actually be beneficial, but have no place added to a non-debated stimulus bill.
Weby, the bill, as approved, has billlions in non-stimulus related spending (download copies of it here http://www.speaker.gov/blog/?p=1694 and read it -- something the politicos approving this failed to do)
There are billions that won't be spent for at least two years. How does THAT help?
Yes, rebuild schools, roads and other labour intensive infrastrucure projects. Fastest way to get the economy going and confidence up. I think (and I will try to do a detailed look at the bill in the next couple of days) that those types of confidence and economy building stimulants make up about $300 - $400 billion of the bill. The rest really can't be considered much more than vote buying...
$1,000,000,000 for Low-Income Home Energy Assistance
$3,000,000,000 for 'necessary expenses for a ‘‘Prevention and Wellness Fund’’
$39,500,000,000 not available until July 1, 2010 for a "State Fiscal Stabilisation Plan", what ever that is.
How does that stimulate things?
This is money that generations of tax payers will have to give back.
As someone described it, it's like taking buckets of water from the deep end of the pool, spilling half of it on the ground and pouring the rest in the shallow end in an attempt to make the shallow end deeper.
Yes, spending is needed. But for legislators to sign off on something this frickin' huge without even reading it is extremely irresponsible. If I don't scrutinise invoices for $50,000 I'm irresponsible. This is outrageous.
And what do you propose in its place?
Not building infrastructure
Not building schools
Not making bridges safe
A decade or three of no nation building is part of the real problem.
50 million unemployed to feed and house is a real problem.
What's your better solution?
So, my American friends, what's wrong with this picture?
o $800 billion in tax cuts and spending
o no (nada, zero, zilch) support from the republicans
o even 7 democrats voted nay (bipartisan rejection?)
o text released less than 24 hours before the vote.
WTF?
Markets are leading indicators.
The market doesn't like this 'package'
Again, WTF?
Your government is sinking the rest of the world. Rein those mothers in, please.
Nasdaq Grants Wave Extension Until February to Comply With Market Value Rule; Wave to Be Transferred to Nasdaq Capital MarketFont size: A | A | A4:04 PM ET 12/9/08 | Market Wire
RELATED QUOTES
4:00 PM ET 12/9/08
Symbol Last % Chg
WAVX 0.33 -2.94%
Real time quote.
Wave Systems Corp. (NASDAQ: WAVX) announced today that it received notification from the Nasdaq Hearings Panel that shares of the company's common stock will be transferred from the NASDAQ Global Market to the NASDAQ Capital Market, effective with the opening of trading tomorrow, Wednesday, December 10, 2008. Wave's common stock will continue to trade under the ticker symbol "WAVX."
As previously announced, the company has not been in compliance with the Market Value Rule requiring a minimum $50 million market value of listed securities for continued inclusion on the NASDAQ Global Market. If the company cannot demonstrate compliance with all of the required continued listing requirements of the NASDAQ Capital Market, including the $35 million market value of listed securities requirement by February 17, 2009, Wave's shares of common stock will be subject to delisting.
Wave is not required to meet the $1.00 minimum bid price requirement of the NASDAQ Capital Market by February 17, 2009. As previously reported, the company has not been in compliance with the marketplace rule requiring a bid price of the company's common stock to be at a minimum of $1.00. In accordance with the NASDAQ Marketplace rules, Wave had been provided 180 days, or until February 9, 2009, to regain compliance with the Bid Price Rule. On October 16, 2008, the NASDAQ Stock Market suspended enforcement of the Bid Price Rule and the running of related compliance periods until January 19, 2009. Accordingly, the remainder of the Initial Compliance Period begins to run again on January 19, 2009 and ends on May 15, 2009. If Wave gains compliance with the Market Value Rule by February 17, 2009, but then does not regain compliance with the Bid Price Rule by the end of the extended compliance period, the company may be subject to delisting or may be entitled to another 180-day period if Wave meets all of the other initial listing requirements of the NASDAQ Capital Market at the end of the Extended Compliance Period.
Wave plans to exercise diligent efforts to maintain the listing of its common stock on The Nasdaq Capital Market, but there is no assurance that it will be successful in doing so.
WAVX chart updated
Lower High = DOWN. IMHO
I see WAVoids on other board still in denial...
...just had post deleted over there.
Let's see, the pps is now 0.37 and this is after a reverse split from over a year ago. Geeeesh.
CM
Happy Birthday.
Here is a NY Times editorial opinion from someone in your neighborhood. Perhaps you can set her straight.
http://www.nytimes.com/2008/12/10/opinion/lweb10online.html?src=linkedin&pagewanted=print
December 10, 2008
Letter
The Push to Build an Electronic Health System
To the Editor:
Re “Thieves Winning Online War, Maybe Even in Your Computer” (front page, Dec. 6):
There is a real disconnect between the ease of hacking home computers and the federal push to build a national electronic health system.
Health-related information technology systems pose a tremendous new and unrecognized threat to the privacy of personal information.
Cubbyhole databases and encryption are not widely used, authentication and identity-proofing are terrible, and hospitals allow thousands of employees to see hundreds of thousands of patient records.
Health care systems do not use the new “smart” security and consent technologies so we can limit access to those directly involved in our care.
Why rush to require that medical records — including all our sensitive health, prescription, financial, genetic and demographic information — go into unsafe electronic systems that lack ironclad security?
Unlike identity theft, the theft of our personal health information can’t be fixed.
The theft of health data will limit our children’s and grandchildren’s chances for jobs, credit and opportunities in life.
Deborah C. Peel
Austin, Tex., Dec. 8, 2008
The writer, a medical doctor, is the founder and chairwoman of Patient Privacy Rights, a nonprofit organization.
I love the onion.com
http://www.theonion.com/content/news/shitload_of_math_due_monday
I certainly won't delete it although the irony may confuse some.
Just in case the other one gets deleted:
Weby
The president elect has held 3 news conference in 3 days to build credibilty and confidence in his leadership during the financilal crisis.
We got a blog post on tvtonic and a conference call in 5 months.
SKS is probably busier than the new guy.
Unfortunately there are no ihub rules about deleting stupidity.
Also unfortunately, some great posts include unnecessary slurs about some other poster's studpidity and THOSE do get deleted.
I'm well Weby.Thanks for asking.
And I do use this board to comment from time to time on things I know will be deleted from the main board.
There are posters there who only post misinformation fearful opinions, never DD or informed opinions, and who display a complete lack of undersatanding in their investment yet their posts never get deleted and when well informed posters respond, it is their posts who do get deleted.
There otta be a law!!
Tom
Perhaps this board should be used as a complaint board. It's true that the moderators try NOT to delete and sometimes let the first post stand hoping that things will not degenerate.
Often the deletions are by the folks who monitor for ihub and they don't go back to the beginning as people get more ad hominem in their approach to the topic under discussion.
Hope you are well!!!
That other board is like a football game.
The initial foul often goes un-flagged but any response is penalized.
Odd that the initiator gets away scot free and is allowed to go on drivelling but the responses are deleted.
Strange place this Wavoid Community.
I keep a REAL TIME Daily Chart of WAVX (WITH IMPORTANT NOTES
ON THE CHART) at SI Title page at
http://siliconinvestor.advfn.com/subject.aspx?subjectid=46444
Again, a Canadian (me) living in an entirely different country (Oz) pokes his nose in.
A very sane read:
http://www.washingtonpost.com/wp-dyn/content/article/2008/10/23/AR2008102302867_pf.html
"Who do you want answering that phone at 3 a.m.? A man who's been cramming on these issues for the past year, who's never had to make an executive decision affecting so much as a city, let alone the world? A foreign policy novice instinctively inclined to the flabbiest, most vaporous multilateralism (e.g., the Berlin Wall came down because of "a world that stands as one"), and who refers to the most deliberate act of war since Pearl Harbor as "the tragedy of 9/11," a term more appropriate for a bus accident?
Or do you want a man who is the most prepared, most knowledgeable, most serious foreign policy thinker in the United States Senate? A man who not only has the best instincts but has the honor and the courage to, yes, put country first, as when he carried the lonely fight for the surge that turned Iraq from catastrophic defeat into achievable strategic victory?"
"Absence of evidence is not evidence of absence. - Carl Sagan
While both candidates had a helluva hard time actually answering the questions posed by Jim Lehrer, I still think McCain took this one. Obama doesn't seem as comfortable without prepared material...McCain wins foreign policy hands down (although he had a hard time pronouncing Ahmanutjob's name)
Followers
|
45
|
Posters
|
|
Posts (Today)
|
0
|
Posts (Total)
|
675
|
Created
|
07/25/03
|
Type
|
Premium
|
Moderator crazylarry | |||
Assistants Weby Fullmoon |
Volume | |
Day Range: | |
Bid Price | |
Ask Price | |
Last Trade Time: |