Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Thanks. That's good news.
I do not expect to go since:
"Conference attendance is by invitation only."
http://gcff.chineseworldnet.com/event/en_event_register_pro.asp?ie=32&ia=1&ied=1
I was not aware of it. Do you have details?
So San Francisco is not included?
Please let me know the details.
Thanks
Interesting:
wallstreet1234
Alias Born On: Saturday, May 31, 2008
It would be nice to see that number significantly increase.
How many people usually attend the SHM?
Leftovers from the past.
After a few half full glasses of Cabernet Sauvignon I began wondering if there is such a thing as half full?
If half full is ok, then why is half empty not ok?
We are dealing here with gradations of a physical state. Just as full can be subdivided down, so too can empty be subdivided up.
Technically you may be right, in a purely literal sense, but I wonder how the Supreme Court would rule if physicists were allowed to participate and make a case for partially filled emptiness.
Dell and Seagate up strongly. Prelude to WAVE.
Dell Laptops: Laptops are expected to grow at six times the rate of desktop systems for the next several years, and Dell plans to increase the speed with which it introduces new products, while lowering costs and tailoring mobile devices for specific customer segments. The Dell XPS M1330 laptop was labeled a “dream machine” in Time Magazine’s Best Inventions of 2007 issue earlier this month.
Dell (NASDAQ:DELL) today reported record fiscal first quarter revenue of $16 billion, a 9 percent year-over-year increase, and earnings of $0.38 cents per share, a 12 percent increase. The results were driven by better-than-industry growth of commercial and consumer products and services, and lower operating expense as a percent of revenue.
Product shipments in the quarter increased 22 percent, with servers growing three times the industry rate at 21 percent. Storage revenue increased 15 percent and enhanced services revenue was up 13 percent. Notebook unit growth, a Dell strategic priority, rose sharply at 43 percent and 1.2 times the industry growth rate. Consumer units grew at more than two times the industry rate and the company increased its global share by 1.2 points to 8.8 percent during the quarter.
Its back down.
Looks correct.
The last press release is dated Jan 30, 2008:
http://www.dnaprint.com/welcome/press/press_recent/2008/0130/DNAG-Colo.pdf
It is certainly possible.
Dell reports earning tomorrow.
I believe he takes big sips, so his glass is always half empty.
I came up with similar numbers and removed a pending sale at .65.
The less shares available, the faster the move up.
Why do you say that?
Seagate barely mentioned FDE drives in their last 2 conference calls and not one analyst brought up the subject. I believe there has been a short lag in engagement, which will now go into high gear with yesterday's NSA announcement. This should certainly help propel WAVX forward.
The knee jerk selling of WAVX shares due to the low revenue numbers seems to have ended. Any buying should move SP to the upside. Nice to see Seagate moving up significantly, perhaps due to yesterday's news.
Another interesting point about Michigan State is that it is located in Lansing, the state capital, and could impact state government decisions regarding computer security. As a member of the Big 10 this could also act as a catalyst to decisions by many other major universities.
Today I believe we were shown the light at the end of the tunnel. With larger enterprises on board and publicly committed to allowing WAVX to broadcast satisfied usage, today's light will just continue to grow brighter. This will be quickly recognized by larger investors and the SP will appreciate. I am buckling up for a nice ride to the upside.
This tragic earthquake seems to have hit Sichuan province. I do not have records of any HRCT activity there.
On root kits and TPMs:
There was some IHUB discussion on root kits a year ago. Here are 2 links to help understand the issue:
https://www.trustedcomputinggroup.org/news/Industry_Data/Whitepaper_Rootkit_Strom_v3.pdf
Of the many types of infection, rootkits are the most troubling. A rootkit is a special software program that hides on a
PC without the user's knowledge or permission. Rootkits can perform many nefarious functions, capturing and
forwarding passwords and other confidential information, sending out spam, attacking other machines, or allowing
remote control of the machine's operations. This can expose an enterprise to legal liability as well as potential data
loss on the individual PCs that have been compromised.
The Trusted Computing Group (TCG) has been working for years to create building blocks for trusted hardware and
software that makes PCs and other systems less vulnerable to rootkits and other malware. In this TCG white paper,
we explore what makes rootkits so dangerous and how TCG technology can be used to stop their spread.
http://en.wikipedia.org/wiki/Rootkit
How does a TPM guard against root kits?
From PC World on root kits:
http://news.yahoo.com/s/pcworld/145703;_ylt=AiQ7OT.dBQkfkdZwOueUNLgDW7oF
Security researchers have developed a new type of malicious rootkit software that hides itself in an obscure part of a computer's microprocessor, hidden from current antivirus products.
Called a System Management Mode (SMM) rootkit, the software runs in a protected part of a computer's memory that can be locked and rendered invisible to the operating system, but which can give attackers a picture of what's happening in a computer's memory.
The SMM rootkit comes with keylogging and communications software and could be used to steal sensitive information from a victim's computer. It was built by Shawn Embleton and Sherri Sparks, who run an Oviedo, Florida, security company called Clear Hat Consulting.
The proof-of-concept software will be demonstrated publicly for the first time at the Black Hat security conference in Las Vegas this August.
The rootkits used by cyber crooks today are sneaky programs designed to cover up their tracks while they run in order to avoid detection. Rootkits hit the mainstream in late 2005 when Sony BMG Music used rootkit techniques to hide its copy protection software. The music company was ultimately forced to recall millions of CDs amid the ensuing scandal.
In recent years, however, researchers have been looking at ways to run rootkits outside of the operating system, where they are much harder to detect. For example, two years ago researcher Joanna Rutkowska introduced a rootkit called Blue Pill, which used AMD's chip-level virtualization technology to hide itself. She said the technology could eventually be used to create "100 percent undetectable malware."
"Rootkits are going more and more toward the hardware," said Sparks, who wrote another rootkit three years ago called Shadow Walker. "The deeper into the system you go, the more power you have and the harder it is to detect you."
Blue Pill took advantage of new virtualization technologies that are now being added to microprocessors, but the SMM rootkit uses a feature that has been around for much longer and can be found in many more machines. SMM dates back to Intel's 386 processors, where it was added as a way to help hardware vendors fix bugs in their products using software. The technology is also used to help manage the computer's power management, taking it into sleep mode, for example.
In many ways, an SMM rootkit, running in a locked part of memory, would be more difficult to detect than Blue Pill, said John Heasman, director of research with NGS Software, a security consulting firm. "An SMM rootkit has major ramifications for things like [antivirus software products]," he said. "They will be blind to it."
Researchers have suspected for several years that malicious software could be written to run in SMM. In 2006, researcher Loic Duflot demonstrated how SMM malware would work. "Duflot wrote a small SMM handler that compromised the security model of the OS," Embleton said. "We took the idea further by writing a more complex SMM handler that incorporated rootkit-like techniques."
In addition to a debugger, Sparks and Embleton had to write driver code in hard-to-use assembly language to make their rootkit work. "Debugging it was the hardest thing," Sparks said.
Being divorced from the operating system makes the SMM rootkit stealthy, but it also means that hackers have to write this driver code expressly for the system they are attacking.
"I don't see it as a widespread threat, because it's very hardware-dependent," Sparks said. "You would see this in a targeted attack."
But will it be 100 percent undetectable? Sparks says no. "I'm not saying it's undetectable, but I do think it would be difficult to detect." She and Embleton will talk more about detection techniques during their Black Hat session, she said.
Brand new rootkits don't come along every day, Heasman said. "It will be one of the most interesting, if not the most interesting, at Black Hat this year," he said.
Last year it was on May 10.
Have you considered averaging down?
Like "the hair of the dog" it may help ease your pain.
More than one in 10 big British businesses has detected computer hackers on their IT networks, a government report said Tuesday, warning of a rampant rise in such activity.
http://news.yahoo.com/s/afp/20080422/tc_afp/britainitcrime;_ylt=ApTf8O45TVYHHN7RN5s_91h0bBAF
Seagate CC April 15 2PM PST
877-223-6202
If anybody is able to get on the question Q, it would be nice to know how many FDE drives were sold last quarter and what sort of projections the company might have for future sales.
Seagate CC April 15 2PM PST
877-223-6202
If anybody is able to get on the question Q, it would be nice to know how many FDE drives were sold last quarter and what sort of projections the company might have for future sales.
I agree. Their fax machine is turned off and voices come on.
Thanks Andi,
The call seemed to work after I put in double spaces following the 011 and the 86. However, I got error messages on both numbers suggesting the recipient's fax machine was not ready.
Has anybody sent a their proxy via fax?
I am having no luck with the numbers provided:
0086-21-511-13719
0086-21-511-13398
I also tried putting a 1 in front, but with no success.
OT For those of you interested in the story of oil allow me to recommend "The Oil and the Glory: The Pursuit of Empire and Fortune on the Caspian Sea" by Steve Levine, published in 2007. It is a truly fascinating and thrilling read.
It would be nice to have a conference call right after the meeting, or at least a PR note as to the "new" company direction.
I will keep my eye out for that. Stonehaven makes a good Shiraz.
I've been on the wagon for the last few weeks due to high blood pressure and medication. This is more by experiment than required by the Doctor. Couple more weeks and I will be tasting again.
Any recommendations?
Hey, I was close!!