Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Market in the toilet again & Wave UP 3%!! Times they are a changin!
Looking for a market reversal perhaps today, NYSE 1100 new lows, only 5 new highs
Nasdaq 621 new lows, only 3 new highs!
Wavxmaster
Top Cybersecurity Official Cites Hacker Threat to Infrastructure
September 29, 2011, 4:19 PM EDT
Sept. 29 (Bloomberg) -- Damage inflicted by corporate data breaches this year pales in comparison to what might happen if a power grid or chemical plant were targeted by hackers or malicious software, a top U.S. cybersecurity official said.
A cyber attack on the nation’s critical infrastructure “could have cascading effects across multiple sectors” and is “another order of magnitude that we have to be worried about now,” Greg Schaffer, acting deputy undersecretary at the Homeland Security Department, said today.
The nation’s “adversaries” are “knocking on the doors of these systems and in some cases there have been intrusions,” Schaffer said, without detailing which companies were targeted and when.
Schaffer spoke during a tour of facilities at the Energy Department’s Idaho National Laboratory, where DHS has programs that assess technology vulnerabilities in utility, manufacturing and other systems and work with companies in those sectors to address specific cyberthreats. The laboratory is a center for nuclear energy research.
A cybersecurity proposal from the Obama administration calls for the Homeland Security Department to “work with industry” to shore up vulnerabilities in critical infrastructure, such as electrical grids and financial networks. The proposal, submitted to Congress in May, seeks to jump-start efforts in Congress to update U.S. laws in response to the increased threat of cyber attacks capable of crippling business and government operations.
Cybersecurity Legislation
Senate Majority Leader Harry Reid, a Nevada Democrat, is compiling comprehensive cybersecurity legislation on his side of Capitol Hill. In the House, a task force of 12 Republicans led by Representative William “Mac” Thornberry of Texas is expected to send its cybersecurity recommendations to House Speaker John Boehner and Majority Leader Eric Cantor on Oct. 3.
Data breaches at Tokyo-based Sony Corp. and Citigroup Inc. have sharpened U.S. government scrutiny of how businesses protect consumer information and notify the public about cyber attacks. Sony was criticized by U.S. lawmakers including Representative Mary Bono Mack for taking six days to disclose an attack that exposed 100 million customer accounts and prompted the temporary shutdown of the company’s PlayStation Network.
--Editors: Michael Shepard, Allan Holmes
"The message, bottom line, is that government and its partners in the private sector have a common mission in which all have a role to play. The message for the conference will be the role that both government and private sector are moving towards a Trusted Computing model that can help protect our most sensitive information and our critical infrastructure from the collective threats of cyber-criminals, unfriendly nation states and terrorist organizations that act on a political agenda – or just out of pure spleen."
Neil RoiterSeptember 20, 2011
From the Stramella Keynote: The World Grows More Dangerous – Are We Up to the Threats?
It’s not that Anthony Stramella’s presentation on the threat landscape broke any particularly new ground – none of the “I can tell you but then I will have to kill you” stuff that I would still want to hear, even it kills me.
But, with the delivery of a Jon Stewart on the Daily Show, he drew a graphic picture of billions of people and devices – and their companies — at risk and under constant attack in a highly connected world. It’s a world in which vast amounts of information are stored and transmitted at incredible speeds.
Stramella, special assistant to the director at NSA’s Central Service Threat Operations Center, only hinted at the nastiest stuff NSA is dealing with. But discussing the known threats and publically known major security incidents, he asks, “These are the things that everyone knows are going on. Can you imagine what sophisticated adversaries are doing?”
The point is that Stramella can more than imagine, while most of the rest of us have to do our best to understand what he and his NSA colleagues are up against. He stressed how the role of NSA has changed with the threat environment, as the ability to respond to national threats has changed from days waiting for the enemy to send the fleets and troops, to 25 minutes after the missiles launch to….no time at all. The danger is that the first we’ll know of a major cyber attack is when critical systems fail.
The threat operations center are tasked in particular with detecting and reacting to the nastiest threats, activity that Stramella describes, in very technical terms, as “a lot of people looking at very sophisticated, serious bad stuff. Our job is to find and understand that stuff.” The challenge is staggering in terms of the volume and speed of data pouring in, requiring extremely high-end computers (such as Gray Jaguar and even faster machines in China and Japan and faster ones in the works at U.S.) to have the capability to decrypt and analyze.
Much of the presentation presented was at a level that was perhaps a little basic for the conference audience— social engineering, hundreds of thousands of insecure phone apps, unprotected virtual systems without adequate backup and DR plans, people exposing their personal information to anyone and everyone, all in what amounts to a single global network in which anyone can communicate with anyone, anywhere, any time.
But, the collective impact of his message was that the bad guys have something of an upper hand in a world in which people are surprisingly (well, maybe not so much) trusting and careless in their online behavior, despite the messages that have been pounded into them in recent years.
The message, bottom line, is that government and its partners in the private sector have a common mission in which all have a role to play. The message for the conference will be the role that both government and private sector are moving towards a Trusted Computing model that can help protect our most sensitive information and our critical infrastructure from the collective threats of cyber-criminals, unfriendly nation states and terrorist organizations that act on a political agenda – or just out of pure spleen.
Mr. Roiter is a security writer who is not affiliated with the NSA
After Hours Last:
Net / % Change $ 2.23
unch (unch) After Hours High: $ 2.26
After Hours Volume: 28,356 After Hours Low: $ 2.2296
Learn more about the After-Hours trading session. Trade DetailAfter Hours
Time (ET) After Hours
Price After Hours
Share Volume
17:21 $ 2.23 12,647
16:56 $ 2.26 100
16:37 $ 2.26 100
16:29 $ 2.2296 1,376
16:27 $ 2.26 100
16:27 $ 2.23 14,033
Read more: http://www.nasdaq.com/symbol/wavx/after-hours#ixzz1ZlEYIruv
A little action at the close!
Time ET Price Share Volume
16:00:22 $ 2.23 75,421
16:00:06 $ 2.23 1,100
16:00:06 $ 2.23 11,300
16:00:06 $ 2.23 2,800
16:00:06 $ 2.23 8,140
16:00:06 $ 2.23 889
16:00:06 $ 2.23 43,940
16:00:06 $ 2.23 134
16:00:06 $ 2.23 8,931
16:00:06 $ 2.23 13,377
16:00:06 $ 2.23 553
16:00:06 $ 2.23 1,300
16:00:06 $ 2.23 5,000
16:00:06 $ 2.23 5,500
16:00:06 $ 2.23 1,800
16:00:06 $ 2.23 100
16:00:06 $ 2.23 700
16:00:06 $ 2.23 900
16:00:06 $ 2.23 900
16:00:06 $ 2.23 900
16:00:06 $ 2.23 100
16:00:06 $ 2.23 200
16:00:06 $ 2.23 100
16:00:06 $ 2.23 100
16:00:06 $ 2.23 200
16:00:06 $ 2.23 2,000
16:00:06 $ 2.23 1,376
16:00:06 $ 2.23 200
16:00:06 $ 2.23 15,199
16:00:06 $ 2.23 143
16:00:06 $ 2.23 2,300
16:00:06 $ 2.23 1,200
16:00:06 $ 2.23 2,800
16:00:06 $ 2.23 1,376
16:00:06 $ 2.23 300
16:00:06 $ 2.23 4,039
16:00:06 $ 2.23 1,400
16:00:00 $ 2.23 9,500
16:00:00 $ 2.23 75,421
16:00:00 $ 2.24 500
Read more: http://www.nasdaq.com/symbol/wavx/time-sales#ixzz1Zkhu45d9
Nice bid at the close to stop a potential last minute flush!
Wavxmaster
There goes 85,000 shares after the close!
'awk'
I knew there had to be a connection! Neighbors! Lee,Ma/Southeastern Ma
http://maps.google.com/maps?hl=en&cp=10&gs_id=w&xhr=t&q=lee+ma+map&gs_upl=&bav=on.2,or.r_gc.r_pw.,cf.osb&biw=1152&bih=674&um=1&ie=UTF-8&hq=&hnear=0x89e6b15fe8991d19:0x6f242b36b8944bb8,Lee,+MA&gl=us&ei=pv-JTtTeMMe1twfqpv0s&sa=X&oi=geocode_result&ct=image&resnum=1&sqi=2&ved=0CB8Q8gEwAA
http://investorshub.advfn.com/boards/read_msg.aspx?message_id=67608703
http://investorshub.advfn.com/boards/read_msg.aspx?message_id=67586393
He is married with two children and lives in Southeastern Massachusetts.
http://www.neilroiter.com/?page_id=2
Neil Roiter is freelance technology journalist, focusing on information security, risk and compliance since 2001. He was features editor and senior technology editor at Information Security magazine and SearchSecurity.com, and has covered information security from the days of “Internet hooliganism” and hacking for the sheer perverse joy of it, to today’s world of cyber crime as global business and cyberwarfare. He has written extensively on how security works as a function of business and risk, and the technologies — the cools tools that support and help enable policies and processes. In addition to authoring many in-depth feature articles, Neil has published practical tips on security and compliance, market trend analyses and podcast and video interviews. He has also moderated a number of seminars on subjects ranging from data protection to regulatory compliance. For several years, he managed Information Security’s product testing for stand-alone reviews and “bake-off” comparative reviews. In addition to his work as a technology journalist, Neil has worked as an IT project manager for a publishing software company and a newspaper group, leveraging interest in technology and his experience as a reporter, editor and managing editor at daily newspapers. He is married with two children and lives in Southeastern Massachusetts.
Wavxmaster
'awk'
Looks like there's not to many shares available at the $2.20- $2.30 area! Perhaps the shorts are trying to cover! Shares up .07 on 34,000 shares!
Wavxmaster
dig
Interesting that PWC is so involved in all these conferences!
Why do you think they're doing this? Do you think that Wave dangled a ERAS discount for possible future upgrade with WEM?
Thanks
Wavxmaster
Mig
From a pizza franchise to PWC! Now NSA, CESG, TSCP, NATO ect!
Yes, risk has been removed, now it's time for reward!
Wavxmaster
AuthenTec to Demonstrate Mobile Security Solutions at CTIA Enterprise & Applications 2011
8:56 AM ET 10/3/11 | BusinessWire
AuthenTec (NASDAQ: AUTH), a leading provider of security and identity management solutions, today announced that it will exhibit and demonstrate its newest offering for mobile security and identity management at the CTIA Enterprise & Applications 2011 exhibit and conference at the San Diego Convention Center from October 11-13.
AuthenTec will demonstrate Android phones that combine VPN security with a smart sensor, enabling VPN launch with the swipe of a finger. The Company will also demonstrate its digital rights management (DRM) content protection for securely delivering high-value content to Apple and Android phones and tablets. AuthenTec will also exhibit the newest smartphones, tablets and mobile devices that incorporate its smart fingerprint sensors and identity management software for enhanced security and faster/more secure NFC-based mobile commerce. Visitors may learn more by stopping by AuthenTec's exhibit, Booth 201, or arrange a customer meeting by contacting Brent Dietz at brent.dietz@authentec.com.
AuthenTec offers complete security solutions for handset makers, mobile operators, and rich content providers, including fingerprint sensor hardware, identity management software and embedded security. The Company has shipped more than 13 million fingerprint sensors for use in wireless devices and its offering includes the world's smallest navigation and fingerprint matching device for mobile phones. AuthenTec's proven embedded security offering includes its DRM Fusion(TM) Agent for content protection that supports multiple industry standards, and its QuickSec(TM) Mobile VPN solution tailored specifically for Android and iOS phones and tablets
Japan eyes private firms help on cyber attacks-media
Reuters
TOKYO, Oct 2 (Reuters) - Japan plans to work more closely with private companies by sharing information on cyber attacks after defence contractor Mitsubishi Heavy Industries was hacked, Nikkei business daily reported on Sunday.
The government also aims to ratify an international treaty on online crimes, the Nikkei said without citing a source.
The United States has recently pressured Japan to take more action against cyber attacks after Mitsubishi Heavy, which works closely with Boeing, said in September network information such as IP addresses may have been leaked.
Tokyo is considering asking private companies including utilities, railway operators, defence contractors, automakers and electronics to sign an agreement with public bodies to share information on cyber attacks, the Nikkei said.
Once the agreement is in place, the government and the public bodies would then widely share information on such attacks without identifying which firms were targeted, the Nikkei said.
But Tokyo will not establish a new law requiring firms to report online breaches to the government as this would be too difficult, the Nikkei reported.
The government also plans to ratify the Convention on Cybercrime, a treaty dealing with network security breaches and other online crimes by establishing an international network to provide help to investigators globally, the Nikkei said.
Japan, which in 2001 signed the treaty initiated by the Council of Europe, is among the nearly 50 countries that have signed or ratified the treaty, but it has yet to bring this into force.
The government will hold a meeting on Friday to boost information security, the Nikkei reported.
Mitsubishi Heavy has said it so far had not confirmed any leaks on its products or technologies. An outside contractor is now checking whether any sensitive data had been breached.
Rivals IHI Corp and Kawasaki Heavy Industries have also said they have received suspicious e-mails. It is unclear who was responsible for the attacks. (Reporting by Yoko Kubota; Editing by Sugita Katyal
"VMware is not the only company outside the TCG family leveraging Trusted Computing. Google’s Chromebooks are shipping with Trusted Platform Modules, and now TPMs are starting to show up in tablet PCs, says Challener, a panel member speaking at the NSA Trusted Computing Conference."
http://blog.wave.com/roiter/trusted-computing-breakthroughs-in-2011-moving-into-virtualization/
Neil Roiter
September 21, 2011
Trusted Computing Breakthroughs in 2011: Moving into Virtualization
Trusted Computing making its presence felt in virtual environments is among the “revolutionary breakthroughs” highlighted for this security initiative in 2011.
The ability of the VMware ESXI hypervisor using API to read Platform Configuration Registers (PCRs) is very important, says David Challener of the John Hopkins Applied Physics Lab. Significantly, this provides the ability to read the state of the hypervisor in cloud environments.
“The state of the hypervisor in the cloud is extremely important, because if the hypervisor has crashed, then every single VM running underneath it has crashed as well.”
Even more significant is that VMware is not a member of the Trusted Computing Group.
“That sent chills up my spine when I saw it,” he says, “because that means Trusted Computing is moving outside into the general community.”
VMware is not the only company outside the TCG family leveraging Trusted Computing. Google’s Chromebooks are shipping with Trusted Platform Modules, and now TPMs are starting to show up in tablet PCs, says Challener, a panel member speaking at the NSA Trusted Computing Conference.
Also on the virtualization theme, Challener notes the release of the TCG virtual trusted platform specification Tuesday. The specification, some five years in the making, defines TPM requirements in the virtual environment. The specification, he says, means that as VMs move among host servers, they still have the same level of trust in virtual TPM as you place in the physical TPM. He also noted recent research and development in this area into monitoring the state of virtual machines before they migrate from one host to another for load balancing, checking the state of the VM before it is permitted to migrate.
On the developer side, he applauded the porting of Trousers, a free, open-source piece of middleware that allows developers to write software that interacts with the TPM, from Linux-only to a Windows version.
He also notes research into incorporating TPM technology into automobiles, particularly in the area of using cell phones to start cars. He noted a recent hack in which a car was started and the brakes turned off.
“I’m not sure why you have the ability to turn off someone’s brakes,” he says. “Sounds pretty dangerous to me.” Nevertheless, he says, auto makers had begun showing interest in incorporating Trusted Computing technology in their products even before the hack was announced.
When asked if he thought automobiles were a good place to apply TPMs, he replied emphatically that if cell phones were going to communicate with auto computer systems, he wanted to be quite sure that was the right cell phone talking to the right car. Sounds amusing until your car gets jacked or damaged.
Mr. Roiter is a security writer who is not affiliated with the NSA.
Wave Blog
http://blog.wave.com/allen/4-9-million-reasons-to-encrypt-your-data/#more-168
Lark Allen
September 30, 2011
4.9 Million Reasons to Encrypt your Data
Here we go again.
Another massive data breach, this time affecting some 4.9 million active and retired US military personnel. The culprit: an unencrypted backup tape handled by the Science Applications International Corporation, a contractor for the military. SAIC reported the breach of citizen health data to TRICARE, who released a statement two weeks later.
There are situations where the risks of data compromise would seem quite low, such as backup tapes held in a tape vault and inside a protected data center. The urgency to encrypt the data would undoubtedly be reduced based on this lower risk level. Of course, if the tapes are taken outside the data center and transported out in the “exposed world,” then the situation is vastly different. Risks go up exponentially and, unfortunately for some 4.9 million members of the military past and present, the worst was realized when the tape was stolen.
There are caveats, of course. True, the tapes were difficult to read and decipher. And yes, some of the data was encrypted. The organization had also taken “good faith” steps to protect data, in the midst of working on a solution for encrypting all data to ensure compliance with a long-standing federal mandate.
And yet, none of these issues has any bearing on the results of this massive data loss.
The data protection laws are crystal clear about the requirements in these situations: The data MUST be encrypted. The encryption MUST be provable by certifiable evidence, such as defined processes, or, more importantly, the log files must show the exact data and tape ID when the encryption was done. When these requirements are not met, the laws are equally clear that public notification of the loss MUST take place within a specified period and remedies for those who are potentially affected MUST be made.
Every public disclosure of data loss underlines what should be glaringly evident to any organization that has sensitive data stored anywhere: the data MUST be encrypted. More importantly, the encryption MUST be provable in the courts of law. Without both requirements met, the inevitable loss of a laptop or tape is virtually guaranteed to happen at some point. As this case demonstrates, loss of public trust and bad press are sure to follow.
http://www.oregonlive.com/business/index.ssf/2011/07/hacker_group_anonymous_claims.html
Hacker group Anonymous claims to have breached NATO computers
Published: Thursday, July 21, 2011, 8:21 AM Updated: Thursday, July 21, 2011, 8:32 AM
The Associated Press By The Associated Press The Associated Press
LONDON — A group of computer hackers on Thursday claimed to have breached NATO security and accessed hoards of restricted material.
The group called Anonymous said it would be "irresponsible" to publish most of the material it stole from NATO but that it is sitting on about 1 gigabyte of data.
Anonymous posted a PDF file on its Twitter page showing what appeared to be a document headed "NATO Restricted" and dated Aug. 27, 2007.
"Hi NATO," the group teased on Twitter. "Yes, we haz more of your delicious data," hinting that more would be released in the next few days.
A NATO official, who could not be named under standing rules, said the organization was aware that a hacker group had released what it claimed to be classified NATO documents on the Internet.
"NATO security experts are investigating these claims," the official said. "We strongly condemn any leak of classified documents, which can potentially endanger the security of NATO allies, armed forces and citizens."
Anonymous is a loosely organized group of hackers sympathetic to WikiLeaks. It has claimed responsibility for attacks against corporate and government websites worldwide.
The group also claims credit for disrupting the websites of Visa and MasterCard in December when the credit card companies stopped processing donations to WikiLeaks and its founder, Julian Assange.
On Tuesday U.S. authorities announced 14 arrests in connection with December attacks on Internet payment service PayPal that were claimed by Anonymous. Two other Americans, four Dutch nationals and one Briton were arrested on suspicion of participating in other attacks against companies and organizations, U.S. authorities said.
-- The Associated Press
http://www.nato.int/cps/en/natolive/opinions_77934.htm
12 Sep. 2011
''NATO and industry: providing security together''
Speech by NATO Secretary General Anders Fogh Rasmussen at the ACT Industry Day, London
"First, prioritise. At NATO’s Lisbon Summit last year, the Allies committed to focus their investment on eleven areas where we have the most critical need. Areas such as missile defence. Cyber defence. Countering roadside bombs. Medical support. Transport capacity. Command and control. Intelligence and surveillance."
Wavxmaster
'awk'
NATO is an Alliance that consists of 28 independent member countries.
http://www.nato.int/cps/en/natolive/topics_78170.htm?
*
Principal cyber defence activities
Coordinating and advising on cyber defence
The NATO Policy on Cyber Defence will be implemented by NATO’s political, military and technical authorities, as well as by individual Allies. According to the revised policy, the North Atlantic Council provides the high level political oversight on all aspects of implementation. The Council will be apprised of major cyber incidents and attacks and exercises principal decision-making authority in cyber defence related crisis management. The Defence Policy and Planning Committee provides Allies’ oversight and advice on the Alliance’s cyber defence efforts at the expert level. At the working level, the NATO Cyber Defence Management Board (CDMB) has the responsibility for coordinating cyber defence throughout NATO Headquarters and its associated commands and agencies. The NATO CDMB comprises the leaders of the political, military, operational and technical staffs in NATO with responsibilities for cyber defence. The NATO CDMB operates under the auspices of the Emerging Security Challenges Division in NATO HQ (i.e. Chairmanship and staff support).
The NATO Consultation, Control and Command (NC3) Board constitutes the main body for consultation on technical and implementation aspects of cyber defence.
The NATO Military Authorities (NMA) and NATO’s Consultation, Control and Command Agency (NC3A) bear the specific responsibilities for identifying the statement of operational requirements and acquisition and implementation of NATO’s cyber defence capabilities.
Lastly, the NATO Communication and Information Services Agency (NCSA), through its NCIRC Technical Centre, is responsible for provision of technical and operational cyber security services throughout NATO. The NCIRC has a key role in responding to any cyber aggression against the Alliance. It provides a means for handling and reporting incidents and disseminating important incident-related information to system/ security management and users. It also concentrates incident handling into one centralised and coordinated effort, thereby eliminating duplication of effort.
Assisting individual Allies
Prior to the cyber attacks against Estonia in 2007, NATO’s cyber defence efforts were primarily concentrated on protecting the communication systems owned and operated by the Alliance. As a result of the attacks, which were directed against public services and carried out throughout the internet, NATO’s focus has been broadened. NATO has developed and will be continuously enhancing mechanisms for assisting those Allies who seek NATO support for the protection of their communication systems, including through the dispatch of Rapid Reaction Teams (RRTs). While the Allies continue to bear the main responsibility for the safety and security of their communications systems, NATO requires a reliable and secure supporting infrastructure. To this end, it will work with national authorities to develop principles and criteria to ensure a minimum level of cyber defence where national and NATO networks inter-connect.
Research and training
According to the revised policy, NATO will accelerate its efforts in training and education on cyber defence through its existing schools and the cyber defence center in Tallinn. The Cooperative Cyber Defence Centre of Excellence (CCDCoE) in Tallinn, Estonia, which was accredited as a NATO CoE in 2008, conducts research and training on cyber defence and has a staff of 30, including specialists from the sponsoring countries. Further information on CCD CoE can be found at www.ccdcoe.nato.int
Cooperating with partners
As cyber threats do not recognise state borders, nor organisational boundaries, cooperation with partners on cyber defence is an important element of the revised NATO policy. Engagement with partners will be tailored and based on shared values and common approaches, with an emphasis on complementarity and non-duplication. NATO also recognises the importance of harnessing the expertise of the private sector and academia in this complex area where new ideas and new partnerships will be key.
'awk'
I'd have to say that GD & Wave Systems are an odds on favorite to be heavily involved in the NATO 2012 cyber defense procurement! With the end of 2012 as the deadline for completion, and a 3 month clock starting on Sept 20, 2011 for the "procurement process", it looks as if 2012 will be a banner year for the faithful!! ; )
Yeah, things are looking very good!
"On 20 September, NATO formally launched the procurement process for the full operational capability of NATO’s cyber defences, due to be up and running by the end of 2012."
“This is a complex project, with a short deadline – end of 2012,” said Georges D’hollander, NC3A General Manager, “We have given Industry 90-days to compile their bids – thirty days longer than the minimum required period - and will be hosting a bidder’s conference within the next thirty-days. It is our hope that this extra time will avoid bid extensions that could jeopardize the Lisbon Summit deadline."
Wavxmaster
http://www.wave.com/news/tradeshows.asp
http://www.afcea.org/europe/events/tni/11/foreword.asp
19-21 October 2011
Kongresshaus Stadthalle Heidelberg, Germany
"SUPPORTING NATO IN THE NEXT DECADE"
Under the auspices of State Secretary Rüdiger Wolf, Federal Ministry of Defence, Berlin
Exhibitors
http://www.afcea.org/europe/events/tni/11/exhibitors.asp
(Dell, General Dynamics, & WAVE SYSTEMS)
Friday:
1030 – 1050 “State-of-the-Art Technology in Cooperative Implementations”
Mr. Cameron Chehreh, Chief Enterprise Engineer, Intelligence Solutions Div., General Dynamics
1050 – 1110 “Trusted Computing Solutions for Cyber Defence in NATO”
Mr. Steven Sprague, President and CEO, Wave Systems Corp. (US)
Exhibitors
Acme Packet
AFCEA Bonn Chapter
Behörden Spiegel
Cask, LLC
Dell Inc.
DeviceLock Europe GmbH
ESG Elektroniksystem und Logistik GmbH
Eurotempest BV
General Dynamics
Luciad NV
NetApp
Nokia Siemens Networks
Polycom
Rockwell Collins Deutschland GmbH
Rohde & Schwarz International Operations GmbH
SAIC
SAP Belgium
Spectra Logic
UltiSat
Wave Systems corp.
'dig space'
"and about a quarter million shares in options have a strike price of 2.50 set to expire in about 7 trading days."
Perhaps you meant, 17 days!
Wavxmaster
Special Instructions perhaps, All or Nothing, Fill or Kill!
I'm not the one to ask? I see the trades going thru @ $2.50, when there's a bidder @ $2.53? Worst than the casinos!
We're getting a little after hours action though.
Wave Systems Corp. (WAVX) After Hours Trading Pre-Market Charts | After Hours Charts Sep. 29, 2011 Market Close: $ 2.50 After Hours Last:
Net / % Change $ 2.50
unch (unch) After Hours High: $ 2.53
After Hours Volume: 5,481 After Hours Low: $ 2.465
Learn more about the After-Hours trading session. Trade DetailAfter Hours
Time (ET) After Hours
Price After Hours
Share Volume
16:25 $ 2.50 2,781
16:24 $ 2.53 100
16:21 $ 2.465 2,200
16:20 $ 2.50 100
16:20 $ 2.50 100
16:20 $ 2.53 100
16:20 $ 2.53 100
Read more: http://www.nasdaq.com/symbol/wavx/after-hours#ixzz1ZNKPLRoq
After hours now bidding 800 @ $2.54!!
Whatzup
After hours 500 bid # $2,53!
Wavxmaster
'wavedreamer'
Only about 2 hours away! Entry fee is a little steep, $1495.00 or 628 shares of Wave @ $2.38!
New Wave snuck me into the NSA TC Conference, so this shouldn't be to tough! I'll practice my Spanish/Cuban, wear my Juan Valdez sombrero and walk in with a hand full of Cuban cigars!
It's either that or charge the ticket to a stolen credit card! LOL
Wavxmaster
Volume on the way up, heavy, Today not so heavy, 126,000 shares 1/2 way thru the day!
Sept 23, 2011 Volume 552,300 up $.16
Open
2.17
High
2.38
Low
2.17
Close
2.33
Sept 26, 2011 Volume 567,400 up $.16
Open
2.39
High
2.52
Low
2.35
Close
2.49
Sept 27, 2011 Volume 729,900 up $.12
Open
2.59
High
2.77
Low
2.52
Close
2.61
Maynard
The last week the shareprice acted fine!
Just had to fill the gap between $2.50 - $2.52!
http://bigcharts.marketwatch.com/advchart/frames/frames.asp?show=&insttype=Stock&symb=wavx&time=3&startdate=1%2F4%2F1999&enddate=9%2F29%2F2011&freq=8&compidx=aaaaa%3A0&comptemptext=&comp=none&ma=0&maval=9&uf=0&lf=1&lf2=0&lf3=0&type=2&style=320&size=2&timeFrameToggle=false&compareToToggle=false&indicatorsToggle=false&chartStyleToggle=false&state=12&x=36&y=11
'rooster'
That be it!
http://www.turnergouldyachts.com/irish_rover/
alritethen
Current Price: US$ 6,949,000
Perhaps I'll need another 30,000 shares!
Wavxmaster
'alritethen'
Let me put it this way, if Awk's future share price #'s are as accurate as his vision & knowledge of TC, then I already have too many shares! LOL
Wavxmaster
'pep
Looks like we'll have plenty of room!
http://www.boattest.com/boats/boat_video.aspx?ID=2619
Wavxmaster
'pep'
I look forward to the time I can forget about this board, hop on my yacht and cruise the Caribbean! LOL
Wavxmaster
'dig space'
Point taken.
With 500 million potential customers, and only a couple hundred thousand adopters, there does seem to be a little room for growth!
Gov't adoption will spur explosive growth, and it seems to me that the NSA & CESG will light the fuse! Things do look promising.
Wavxmaster
'gucci'
"One could get the feeling that Wave is the center of the world."
You must not be listening, what we are saying is that Wave is the center of the Trusted Computing revolution within the Free World!
Wavxmaster
PS Wave bidding $2.60 pre-market!
Wave Systems Corp. (WAVX) After Hours Trading Pre-Market Charts | After Hours Charts Sep. 28, 2011 Market Close: $ 2.52 After Hours Last:
Net / % Change $ 2.627
.107 (4.25%) After Hours High: $ 2.627
After Hours Volume: 2,000 After Hours Low: $ 2.627
Learn more about the After-Hours trading session. Trade DetailAfter Hours
Time (ET) After Hours
Price After Hours
Share Volume
16:05 $ 2.627 2,000
Read more: http://www.nasdaq.com/symbol/wavx/after-hours#ixzz1ZHRBsX4Y
'wavedreamer'
Keep talking/posting to yourself & awk, it really helps! I'm starting to think that I'm beginning to understand! Technically challenged, I need to read & reread many times for information to sink in.
Thanks
Wavxmaster
Alladinator
Your question "how wavx reacts when the market goes back down" has already been answered! $2.50 support!
Please keep up! ; )
PS Perhaps the shorts are beginning to see the writing on the wall! Their covering should help support the share price until Waves' European deal gets announced! I'm not looking for much downside at this point, only some consolidation before another push upwards!
Well, about 10 minutes without a trade. Perhaps the shorts are like a deer caught in the headlights! Which way should they go!
Either way they'll feel some pain, that is depending where they started from!
Things are definitely starting to get more interesting.
Wavxmaster
alea
Seems as though Putin is there to stay!
Wavxmaster
PS I guess the nation state hacking window is starting to close.
Let's hope too much damage hasn't been done already!
For Wave to reach the Promised Land, Gov't adoption is/was always needed. After last weeks NSA TC Conference and the upcoming conference on Oct 20th in Great Britian, it does seem as though both the NSA & CESG are pushing for this adoption. It's about time!
Perhaps the Governmental glacier has finally made it to the ocean and we will start to feel the waves rise as the glacier calves! These waves should/will be felt everywhere in cyber space and in most geographical locations, that is except North Korea & China ect!
http://www.wavesystems-events.com/speaker.htm
http://www.ncsi.com/nsatc11/index.html
PS Perhaps the shorts are beginning to see the writing on the wall! Their covering should help support the share price until Waves' European deal gets announced! I'm not looking for much downside at this point, only some consolidation before another push upwards!
Wave Systems Corp. (WAVX) After Hours Trading Pre-Market Charts | After Hours Charts Sep. 27, 2011 Market Close: $ 2.61 After Hours Last:
Net / % Change $ 2.61
unch (unch) After Hours High: $ 2.612
After Hours Volume: 18,101 After Hours Low: $ 2.61
Learn more about the After-Hours trading session. Trade DetailAfter Hours
Time (ET) After Hours
Price After Hours
Share Volume
16:50 $ 2.61 8,127
16:45 $ 2.61 3,317
16:23 $ 2.61 5,157
16:05 $ 2.612 1,500
Read more: http://www.nasdaq.com/symbol/wavx/after-hours#ixzz1ZBjeS028
Let's see where the stock price is in another week!
http://bigcharts.marketwatch.com/advchart/frames/frames.asp?symb=wavx&time=&freq=
Wavxmaster