Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Today had so many positive signs. Not the least of which was the positive & solid way we traded.
Another big one for me was seeing Steven Dice getting the stamp of approval from xxxxcslewis. What a plus for us all to have them here. Thanks guys.
Regards
WAVXALMIMAN
FWIW
<<In addition to his political work, Trippi has consulted with a number of leading corporations including MasterCard, Toyota, DaimlerChrysler, SES Americom, LabCorp, IBM, Lionsgate Films, BestBuy, MSNBC, Wave Systems, and Progeny Linux Systems. Trippi is especially acclaimed within the technology community. In 2004 he won Wired Magazine’s Rave Award for his use of innovative technology in politics. Leading Internet companies, from Yahoo!, to Google, to Bebo invite him to speak to their employees and affiliates.>>
http://joetrippi.com/blog/?page_id=1374
brant, they were so obvious it was laughable, but what are you going to do? MoMo brings out these know-it-all schmoozers cause it's part of the game.
I'm sticking with the DD, and I know who to trust.
I enjoy your posts and candidness.
Regards
Elan
glo, just leave it. If you liked it @ 10:09AM you'll likely like it later.
Good luck
Elan
Snackman, that 40% figure from your post of Friday last really stuck a cord with me. If this so, and things play out as you suspect, than the significance of those kind of numbers could be stunning.
4M-5M share trading days will suck that float dry in no time and then the only way (overall) is up.
It feels great. Again, not just the numbers, but the news.
Regards
Elan
Snackman. Without a doubt. I was stunned to read this . Had to do it 2x no less. Today's numbers are wonderful, but HP, Dell, Lenovo.....amazing!
Great job all these years. Thanks
Elan
Those of you who don't subscribe to The Atlantic might find this interesting reading. Perhaps during a lull in todays trading.
http://www.theatlantic.com/doc/201003/china-cyber-war
Thank you VH.
I am in agreement and repeat, "This may be the odd one that never fills."
Regards
Elan
VH, you're doing a very fine running analysis. Please keep it up.
Now I'm not predicting how this may play out, but there is still a gap from Jan 4 at 1.59.
This may be the odd one that never fills.
Regards
4xcslewis, Mind the gap, as they say in London, and I do. This just may be one of those cases where we get to witness at least 1 gap left in the dust.
BTW thanks for all your exxxxcellant posts over the years. Now and always a must read.
Regards
Elan
I just had a nice order filled immediately. But I buy @ market in times like these.
Snackman. Yes. It's that and more for the 52 weeks past.
Regards
Elan
Snackman, my guess is your guess is right. The 5Mplus might not be enormous, but these guys aren't going to spend money in this economy, $timulou$ dough or not, to buy something without significant value. This is the real deal.
re: the pizza connection, imho most of it has been w/ tongue in cheek, just like the reference to being located over a cold cut distributor. Big deal. It has worked so far, and as we now know some U.S. automaker thinks it works too.
Regards
Elan
remote, No. eom
Snackman, I am elated over the recent news and rise. Elated!
I read automaker as just that. But silly ol non nitpickin me in a burst of irrational exuberance as I fiddled with the buy button, failed to notice the a slight difference in the wording.
A big deal? I think not.
Though I wouldn't mind if it was a purely automotive company. Like NAPA. 6000 stores across the country.
Maybe one of these days.
regards
Elan
zen, so why "automaker" in the header and "automotive company in the text?
I wish they wouldn't do that. A small thing perhaps, but still as you say, this company learned their lesson. Let's hope so.
"Wave Receives $5.7 Million in Software License and Maintenance Orders for a Global Automaker"
"......EMBASSY(R) Remote Administration Server (ERAS) software for a U.S.-based automotive company"
With all that is publicly available w/ a simple click to wave.com, it makes me wonder why employees of all ilk (or is that ilks?)from our partnership companies haven't stocked up. Surely they see the potential upside, why else would their head office, such as Dell, be taking us onboard?
Maybe it's happened and I just can't see it through the glass darkly.
BTW Junior shows up this evening w/ his new Dell Thumb Swiping Wave not as yet Enabled unit.
............we'll work on this
Elan
A fun visual : What is Google Chrome OS?
fwiw...Google Chromium (Chrome) OS versus the TPM
http://blogoftrust.com/google-chromium-os-versus-the-tpm/445
Thanks to all for your insights re: young Vital and his new unit. Weby, your post should be particularly helpful.
I'm going to email all your comments and Wave links and follow it up with a phone call.
In his line of work, simply the security issue alone should resonate with him.
Thanks
Elan
BTW what a most interesting day
good morning. Here is a challenge I'm faced with and could use a little help. A close family member just purchased a new business model Dell, and knowing my interest in WAVX mentioned to me the thumb swipe and Wave juggler.
"Great!" sez I,"and how do you like it? You've activated it of course?"
"No", sez he, " I don't want to complicate things".
And this from someone who is rather tech savvy.
I couldn't get anywhere with him, not even by encouraging his curiosity.
So if this was your 23 y.o. nephew what might you say to him?
Any thoughts?
I'll pass them on.
somehow I feel there's a lot of this out there.
TIA
Elan
barge,"Will Walmart launch Trusted Computing?"
It took me awhile to recover, but then....well I'm still getting over the fact that they are now the worlds No.1 purveyors of live lobsters for cryin' out loud.
This could be even bigger than Papa Ginos.
Much bigger.
Regards
Elan
http://www.suntimes.com/business/1471966,w-walmart-size-medical-records-031109.article
Guardian Edge HDQRS
http://maps.google.com/maps?f=q&source=s_q&hl=en&geocode=&q=475+Brannan+Street,+Suite+400+San+Francisco,+CA+94107-5421&sll=37.0625,-95.677068&sspn=28.334641,55.195312&ie=UTF8&ll=37.778923,-122.395746&spn=0.00043,0.000842&t=h&z=20&layer=c&cbll=37.778979,-122.395673&panoid=jOxCJqm1_Tf60pHkEJ3tgA&cbp=12,136.70647805137727,,0,5.143312101910828
Who knows. Maybe there's a Boars Head Provisions in Suite 200.
Cybersecurity Chief Resigns
http://online.wsj.com/article/SB123638468860758145.html
WASHINGTON -- The government's coordinator for cybersecurity programs has quit, criticizing what he described as the National Security Agency's grip on cybersecurity.
Rod Beckstrom, a former Silicon Valley entrepreneur, said in his resignation letter that the NSA's central role in cybersecurity is "a bad strategy" because it is important to have a civilian agency taking a key role in the issue. The NSA is part of the Department of Defense. (Read Mr. Beckstrom's resignation letter.)
The power battles Mr. Beckstrom describes in his resignation letter illustrate the challenges ahead for the Obama administration as it plans its defense against governments and terrorists who might try to disrupt U.S. computer systems, cybersecurity specialists said. One issue is what part or parts of the government should lead the effort.
The Bush administration last year started a cybersecurity initiative to protect government networks, which was estimated to cost at least $6 billion in 2009 and $30 to $40 billion over the next several years. The Obama administration is conducting a 60-day review of that effort and related policies. The reviewers, led by the official who started the cyber initiative for the Bush administration, are expected to issue recommendations next month.
Mr. Beckstrom's National Cybersecurity Center, created last March to coordinate all government cybersecurity efforts, answered to the secretary of homeland security.
In reality, "NSA currently dominates most national cyber efforts," Mr. Beckstrom wrote to Homeland Security Secretary Janet Napolitano on Thursday. "While acknowledging the critical importance of NSA to our intelligence efforts, I believe this is a bad strategy on multiple grounds."
He added that "the threats to our democratic processes are significant if all top level government network security and monitoring are handled by any one organization (either directly or indirectly)." That echoed the view of some privacy advocates who worry about a government agency having too much information on individuals.
NSA spokeswoman Marci Green declined to comment on the resignation letter. Mr. Beckstrom declined to comment.
Some Homeland Security officials said Mr. Beckstrom's criticism stemmed from personality clashes and an inability to adapt to the way business is done in Washington.
Department of Homeland Security spokeswoman Amy Kudwa said that the Department of Homeland Security has "a strong relationship" with the NSA. Homeland Security "continues to work in close collaboration with all of our federal partners on protecting federal civilian networks, and is fully engaged in the 60-day cybersecurity review," she said.
Ms. Kudwa declined to respond to Mr. Beckstrom's specific critiques. "We thank Rod for his service, and regret his departure," she said.
In his letter, Mr. Beckstrom said his office was funded for just five weeks out of the past year and had just five people working in it. During the rest of the period, he borrowed staff and office space from other agencies.
Despite the lack of funding, Mr. Beckstrom said his center delivered a number of cybersecurity tools, The White House's Office of Management and Budget declined to comment.
News to me. Thought I'd pass this on.
Once Thought Safe, WPA Wi-Fi Encryption Is Cracked
Thursday, November 06, 2008 1:20 AM PST
Security researchers say they've developed a way to partially crack the Wi-Fi Protected Access (WPA) encryption standard used to protect data on many wireless networks.
The attack, described as the first practical attack on WPA, will be discussed at the PacSec conference in Tokyo next week. There, researcher Erik Tews will show how he was able to crack WPA encryption, in order to read data being sent from a router to a laptop computer. The attack could also be used to send bogus information to a client connected to the router.
To do this, Tews and his co-researcher Martin Beck found a way to break the Temporal Key Integrity Protocol (TKIP) key, used by WPA, in a relatively short amount of time: 12 to 15 minutes, according to Dragos Ruiu, the PacSec conference's organizer.
They have not, however, managed to crack the encryption keys used to secure data that goes from the PC to the router in this particular attack
Security experts had known that TKIP could be cracked using what's known as a dictionary attack. Using massive computational resources, the attacker essentially cracks the encryption by making an extremely large number of educated guesses as to what key is being used to secure the wireless data.
The work of Tews and Beck does not involve a dictionary attack, however.
To pull off their trick, the researchers first discovered a way to trick a WPA router into sending them large amounts of data. This makes cracking the key easier, but this technique is also combined with a "mathematical breakthrough," that lets them crack WPA much more quickly than any previous attempt, Ruiu said.
Tews is planning to publish the cryptographic work in an academic journal in the coming months, Ruiu said. Some of the code used in the attack was quietly added to Beck's Aircrack-ng Wi-Fi encryption hacking tool two weeks ago, he added.
WPA is widely used on today's Wi-Fi networks and is considered a better alternative to the original WEP (Wired Equivalent Privacy) standard, which was developed in the late 1990s. Soon after the development of WEP, however, hackers found a way to break its encryption and it is now considered insecure by most security professionals. Store chain T.J. Maxx was in the process of upgrading from WEP to WPA encryption when it experienced one of the most widely publicized data breaches in U.S. history, in which hundreds of millions of credit card numbers were stolen over a two-year period.
A new wireless standard known as WPA2 is considered safe from the attack developed by Tews and Beck, but many WPA2 routers also support WPA.
"Everybody has been saying, 'Go to WPA because WEP is broken,'" Ruiu said. "This is a break in WPA."
If WPA is significantly compromised, it would be a big blow for enterprise customers who have been increasingly adopting it, said Sri Sundaralingam, vice president of product management with wireless network security vendor AirTight Networks. Although customers can adopt Wi-Fi technology such as WPA2 or virtual private network software that will protect them from this attack, there are still may devices that connect to the network using WPA, or even the thoroughly cracked WEP standard, he said.
Ruiu expects a lot more WPA research to follow this work. "Its just the starting point," he said. "Erik and Martin have just opened the box on a whole new hacker playground.
http://www.pcworld.com/businesscenter/article/153396/once_thought_safe_wpa_wifi_encryption_is_cracked.html
Ingrian and SafeNet Present - Blueprints for Encryption Success
{ Anyone heading to this one?
I seem to remember these guys came up about a year ago.}
Ingrian and SafeNet Present - Blueprints for Encryption Success
From: Ingrian Networks (Ingrian_Networks@mail.vresp.com)
Sent:
Thu 3/20/08 1:03 PM
Reply-to:
Ingrian Networks (reply-999b934387-c6d0b843b3-66f6@u.cts.vresp.com)
BLUEPRINTS for ENCRYPTION SUCCESS
Mapping Data Privacy Initiatives to Business Requirements
Tuesday, April 8th at 6:00pm (PST)
Register TODAY space is limited:
https://www.ingrian.com/info/reg_ingr_rsa.html
Featured Customer Speakers:
Matt Haynes - Senior Manager, Infrastructure Performance Assurance, U.S. Cellular
Sreenivas Kancharla - Senior Manager and Lead Security Architect, Symantec
Featured Analyst:
Jon Oltsik - Senior Analyst, Enterprise Strategy Group
The W Hotel, San Francisco (walking distance from the Moscone Center)
Tuesday, April 8, 2008
6:00 PM to 9:00PM
Please join us for this extraordinary event to get sound implementation strategies from pedigree security and compliance experts. Our speakers were selected based on their experiences in implementing successful data encryption projects from start to finish. Learn how to work through the trials and tribulations of making encryption work to achieve data privacy and compliance, without disrupting day-to-day operations. This is your chance to rub the elbows with industry experts, colleagues facing similar data encryption challenges, and get strategies from the leading provider of data encryption solutions – directly from the source. Exchange and share the experiences related to your specific environment in a casual and inviting setting.
Event Program:
* 6:00 PM – 6:30 PM Cocktails, Hors d’oeuvres
* 6:30 PM – 7:00 PM Welcome Introduction & Research Findings by ESG
* 7:00 PM – 7:20 PM U.S. Cellular Interviewed on Key and Policy Management
* 7:20 PM – 7:40 PM Symantec Interviewed on Data Discovery and Classification
* 7:40 PM – 8:00 PM Q&A
* 8:00 PM – 9:00 PM Reception
You will learn:
* Tried and true “blueprints” for architecting a solid encryption foundation
* How to map data privacy initiatives to business requirements
* How Symantec and U.S. Cellular defined encryption processes to solve critical business objectives
* Post implementation: how to manage and operationalize encryption
* Using encryption as your competitive advantage—why it’s beyond fines and mandates
and more...
SPACE IS LIMITED. Last year's event was over-booked - Please arrive 10 minutes
early to hold your seat.
Haven’t registered to RSA? Use Ingrian’s code and get in for free (expo only)!
http://www.rsaconference.com/2008/US/
Ingrian code: EXH8IGN
See you at the show,
Ingrian and SafeNet Team
Ingrian Booth # 328, SafeNet Booth #1039
If you no longer wish to receive these emails, please reply to this message with "Unsubscribe" in the subject line or simply click on the following link: Unsubscribe
Ingrian Networks
350 Convention Way
Redwood City, California 94063
Read the VerticalResponse marketing policy.
Laptops on the Lam, Again
Did the Transportation Security Administration miss the memo on safeguarding sensitive private data?
Wednesday, October 17, 2007; Page A16
THE TRANSPORTATION Security Administration isn't terribly secure when it comes to safeguarding personal information. An external computer hard drive with data on 100,000 staffers was reported missing from a secure area at the agency on May 3. Now, two laptops that belonged to a TSA contractor, Integrated Biometric Technology, and that contained details on 3,930 people have disappeared. It's yet another example of the federal government unwittingly aiding and abetting potential identity thieves.
Safeguarding personal information has been the law of the land since passage of the Privacy Act of 1974 and the Federal Information Security Management Act of 2004. But you wouldn't know it by the many stories about federal agencies accidentally letting Social Security numbers and other private, sensitive information slip away. An April report by the Internal Revenue Service's inspector general estimated that 500 laptops were stolen or lost at the IRS over a 3 1/2 -year period. At the Commerce Department, 1,000 laptops disappeared last year. One laptop was stolen from the Department of Veterans Affairs -- with 26.5 million records on it.
In May, an exasperated Office of Management and Budget issued a 22-page memo to all federal departments that can be summed up thusly: Shape up. Put locks on the doors. Limit access to sensitive information. And keep to a minimum the number of people who have access. The directive gave departments and agencies 120 days to come up with breach notification plans and ways to limit the use of Social Security numbers for identification purposes. This would include "reducing the volume of collected and retained information to the minimum necessary; limiting access to only those individuals who must have such access; and using encryption, strong authentication procedures, and other security controls to make information unusable by unauthorized individuals."
Seems as though the encryption advice didn't get to Integrated Biometric Technology, which was advised by the TSA to encrypt data on its hard drives after it was discovered that previously deleted information on the missing laptops could be recovered. Names, addresses, birthdays, commercial driver's license numbers, in addition to Social Security numbers, for some, were gathered because drivers hauling hazardous materials need security clearances. Until agencies such as the TSA come up with better ways to keep such sensitive data from getting into the wrong hands, those breach notification plans will be dog-eared from overuse.
http://www.washingtonpost.com/wp-dyn/content/article/2007/10/16/AR2007101601818.html
thnx for the link wavxmaster. In particular, I find this part quite interesting. This may be the rubbing 2 sticks together that gets things heated up.
Regards
Elan
http://www.secureworldexpo.com/events/index.php?id=237
Start Encrypting Now, The Lawyers Are Coming!
01:15 PM - 02:00 PM
As if breach notification regulations weren’t incentive enough to encrypt sensitive data, the civil courts are turning up the heat. Every lost laptop in the news raises public awareness of how vulnerable sensitive information can be. It also raises the bar for “reasonable” actions required to protect that data. The scent of money is in the water and the sharks circling. It is only a matter of time before the courts determine the failure to encrypt is unreasonable and let one of the sharks take a bite at a business. This panel will discuss strategies, methods and tools for protecting data and protecting the bottom line.
Panelists:
Gretchen Hellman, Sr. Director of Marketing, Vormetric
Charles Baumert, Senior Product Manager, Ingrian
Ed Gaudet, Sr Vice President Marketing & Corporate Development, Liquid Machines
Mike Alexenko, Executive Director, Strategic Marketing, Seagate Technology
Lark Allen, Executive Vice President, Wave Systems Corp.
WSJ/Tech Stocks Get Giddy
By Tom Lauricella
Word Count: 1,008 | Companies Featured in This Article: Google, Apple, Research in Motion, Cisco Systems, Juniper Networks, Nvidia, LSI
Technology stocks are posting big gains, after a long period when they were scoffed at by the market, and some money managers say the recent rally is just the beginning.
Yesterday, three of the best-known tech stocks finished at all-time highs: Google Inc., Apple Inc. and BlackBerry maker Research in Motion Ltd. And the tech-dominated Nasdaq-100 index of large nonfinancial stocks is now up 18% so far this year, reaching its highest level since February 2001.
"There's a lot to be positive about in tech,"(bolds mine) says Bruce Bartlett, a portfolio manager at the $263 million Lord Abbett Large-Cap Growth Fund, ...
http://online.wsj.com/article/SB119076485174439300.html?mod=loomia&loomia_si=1
Regards & thanks to all
Elan
Dell to sell PCs, notebooks in China through Gome stores
http://www.marketwatch.com/news/story/dell-sell-pcs-notebooks-china/story.aspx?guid=%7B5E9D9DE5-7DC0...
By Aaron Back
Last Update: 5:28 AM ET Sep 24, 2007
PrintPrint EmailE-mail Subscribe to RSSSubscribe to RSS DisableDisable Live Quotes
(Adds company comments, GOME share price, share placement by GOME chairman.)
BEIJING (MarketWatch) -- Personal computer vendor Dell Inc. (DELL:
dell inc com
News, chart, profile, more
Last: 27.76-0.09-0.32%
7:55am 09/24/2007
Delayed quote data
Add to portfolio
Analyst
Create alert
Insider
Discuss
Financials
Sponsored by:
DELL27.76, -0.09, -0.3%) said Monday that from next month it will start selling its PCs and notebooks in China through the country's largest electronics retailer, GOME Group.
Sales will start through 50 GOME stores before expanding to more stores in the first half of next year, Dell said in a statement Monday.
The Chinese retailer, the parent company of Hong Kong-listed GOME Electrical Appliances Holding Ltd. (0493.HK), has around 950 stores across 210 cities in China, GOME Vice President Wang Junzhou said during a press conference Monday.
"For Dell, this is a great opportunity to extend connections with Chinese customers we have not reached in the past," Michael Tatelman, vice president of marketing and sales for Dell's global consumer business, said in the statement.
Dell, the world's second-largest PC vendor after Hewlett-Packard Co., has traditionally sold computers over the Internet or by telephone, but in May it said it would sell computers through Wal-Mart Stores Inc. in the U.S.
Since then it has signed deals with retailers in the U.K., Japan and Russia.
"Although the direct model is great for many people, in Asian cultures and China in particular many people want to see and touch and feel things before they actually take them home," Tatelman said on the sidelines of the press conference.
Dell is the fourth-biggest computer vendor in China by shipments behind Lenovo Group Ltd., Hewlett-Packard, and Founder Technology Group Corp., according to research firms IDC and Gartner Inc.
"Our market share in China is obviously well below our global average, so we hope to be successful here and get our rightful share of the business," Tatelman said.
For GOME, the Dell arrangement will expand its PC product offerings amid increasingly heated competition. Last year, Best Buy Co., America's largest electronics chain, opened an outlet in Shanghai. Best Buy, which owns a majority stake in China's fourth-largest electronics retailer, Jiangsu Five Star Appliance Co., will be speeding up expansion of its retail network following encouraging sales from its Shanghai store, according to a person familiar with the matter.
At 0700 GMT, GOME Electrical Appliances' Hong Kong shares were down 9.5% at HK$13.52 following a share placement Friday by chairman and controlling shareholder Wong Kwong-yu, who sold 170 million shares at HK$13.74 each.
Wong raised HK$2.34 billion from the deal, cutting his stake in the company to 42.84% from 48.06%. No reason was given for the sale. Shares of GOME had more than doubled since the beginning of the year before the placement.
-Contact: 201-938-5400 End of Story
NPR/On Point:..(Barge you'll like this)
TV goes to the web -- and change happens.
This programme is on right now. All very familiar to waveoids, but very nice to hear this sort of thing on mainsteam media.
link
http://www.onpointradio.org/shows/2007/09/20070919_b_main.asp
the webcast link
http://www.wbur.org/listen/feed/shoutcast.asx
cm, Well done. T'was a certain disambiguation that I found rather.....?
...well the dog and I just had a drink and now back to work for me.
Looking forward to hearing more when you have the time.
Regards
Elan
ootommy, Heaven's no. And let me address that issue with a quote from a high gov't offal:
...the government opposed and forbade “any criminal acts undermining computer systems, including hacking”.
“We have explicit laws and regulations in this regard."
He goes on to say:
"Hacking is a global issue and China is frequently a victim."
OOOOOps. My bad. That was one of their guys. It had such a ring of truth I thought it was coming from the White House.
Press on....
Elan
Breaking News: All Online Data Lost After Internet Crash
Officials confirm that all online data has been lost after the Internet crashed and was forced to restart.
http://www.theonion.com/content/video/breaking_news_all_online_data
Has anyone seen this?
http://sattube.com/tv2mypc/index2.htm
This showed up the other day via e-spam.
Checking them out, I come to find quite a list of like types.
All of which makes me wonder how this relates to our crew down on Franklin St.
Any comments greatly appreciated.
Elan
Ramsey, your Wave 2007 Interop post pumped me up a' plenty. That was a very fine piece, thanks.
As for buying more today.....perhaps after I get over the shock of last Fridays nosedive coupled with my compulsion to continue "adding at these prices".
Regards
Elan
cygnus, your 1st 2 points were of course correct & no surprise to anyone here.
Why blow it with such a cheesy supposition as "spragues will continue to soak up all this cash".
You end up sounding like a paid shill.
Elan
Mind you, I love Wave, but if this drags on much longer, Vortex might be appropriate in any name change.
EV
Greetings alea,
On occasion I need to remind myself that Wave is but a flyspeck in the land of giants, so Mr Oltsik can certainly be forgiven for failing to mention my favourite investment.
Concerning the SoftOne, how can one think rationally with out being at least somewhat cynical?
Regards
Elan
alea, Great commentary..ahhhh..so sad, so true.
It seems Mr. Oltsik has an MBA and a BA degree from the University of Massachusetts, Amherst, so close to Lee. To bad, he could have dropped by the Wave Deli for a sandwich & a tour.
regards
Elan