Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Hock, it is a rather remarkable number isn't it? It's also illuminating when you consider how much time some of them spend here telling us we've bought a scam company. One poster 40 straight hours, another 25 hours, etc. Just imagine what it must be like to post for 40 straight hours without a break? That is one *very* seriously motivated individual. I've been reading message boards since 1995 and I can't recall anyone being so driven to do that.
And I've only looked at a few people's profile.
At this point, I really don't care whether the company is a scam or not, let's just keep moving the pps up for a couple of weeks and get back above a dime so some of the decent people on this board can recover some of their losses! (Of course I'm only jesting).
One thing we know for certain with this stock at this point is longs have been wrong, flippers have been wrong, shorts have been wrong and "the SEC is going to shut it down" mantra crowd has been wrong.
What tomorrow brings no one can say for certain. I'm hoping for another good day. There is one thing most won't argue with, this penny stock is on a lot of people's radar screen at this point. The right news could send it skyrocketing and the wrong news could send it plummeting. Even at 2 cents this stock is one of the most dangerous and risky plays around.
So play it accordingly with slot machine money only!
Did anybody get any .0235 today? I had a large order in at that price and it didn't even partially fill.
We'll see tomorrow...
Hey folks, if someone has been banned, that's a call Matt has made and we should respect and enforce it as the moderators. Posting another persons posts from another board who is banned here, defeats the meaning of the effort and is metaphorically tossing Matt the middle finger.
Those posts will be deleted and repeat offenders will be cause for harsher action.
Interesting article from InfoWeek talking about future adoptions of security technology.
The New Security Solutions
Emerging security technology has several admirable goals: proactive, integrated, inferential
By Larry Greenemeier
InformationWeek
Dec 4, 2006 12:00 AM
These are some of tomorrow's security measures: Systems that integrate door locks and surveillance cameras with the logic and analytics of IT systems. Biometric devices that go beyond skin deep to verify identities. Network systems that infer the significance of pilfered data before the criminals do.
Fortunately, a lot of this work is going on today.
The trend that ties together these emerging technologies--the ones that will succeed, anyway--is their proactivity. As security threats evolve, systems and applications will have to know when they're under attack and be trusted to respond automatically, while at the same time keeping key IT and security personnel apprised.
Perhaps the greatest advance in security since the Sept. 11, 2001, terrorist attacks is linking physical and IT security technologies. One area where that trend is prominent is video surveillance.
Early next year, IBM will include its Smart Surveillance middleware as part of its Digital Video Surveillance services. Smart Surveillance, straight out of IBM's T.J. Watson Research Center, integrates analytical capabilities into camera, radar, chemical-sensor, and audio surveillance systems so that they can detect suspicious activity and send up red flags when necessary. With Smart Surveillance, a truck parked in the wrong area of an airport, an airline passenger attempting to enter through an exit corridor, or a customer removing an item from a shelf and walking past the cashier line would all initiate pages, text messages, and other security alerts. IBM's middleware also has a searchable index that will be able to link related items such as license plates, car color, and the driver's facial image.
The ability to store digital video on a hard drive, rather than analog footage on tape, completely changed the market for recording and managing video surveillance, says Stephen Russell, CEO of 3VR Security, a maker of video management systems, which pegged the global market for those systems at $3.8 billion in 2005. For one, digital video includes a time stamp that makes it searchable in ways that analog video isn't. 3VR takes that idea further by making digital video searchable by information that can be analyzed, such as biometric data or images. This is done by tagging video images similar to the way Google tags Web pages.
Nanoident's sensors will let your fingers do the ID work
The most recent version of 3VR's Intelligent Video Management System includes a software developers' kit that lets companies integrate the searchable surveillance system with other systems, including those that control access to facilities and networks through, for example, fingerprint scanners or facial-recognition systems. The 3VR technology has been integrated with transaction systems used in banking environments, access control systems commonly used in buildings, and sources of data such as federal law enforcement watch lists, Russell says.
Within three years, technology will be available to load the digital images of employees and expected visitors and then match those images with surveillance video of people walking through a company's front door. But first, facial-recognition software must get a lot better than its less than 30% accuracy rate, says Jeff Platon, VP of Cisco Security Solutions marketing.
This integration of surveillance systems with IT networks is significant. Historically, security has fallen into two camps: information security on one side and the physical walls, locks, and the guys with guns on the other. Their convergence has been hampered by the inability to connect the physical and logical worlds--that is, until networked digital video allowed the two to come together.
Cisco is working to bring together network and physical security, having launched its Intelligent Converged Environment unit in April after acquiring SyPixx Networks, a maker of video surveillance software and hardware. In September, Cisco said it was working with lock vendor Assa Abloy to integrate Cisco's IP-based access control and identity management capabilities with Assa Abloy's "intelligent" badge readers and door-lock components. That integration would prevent someone who doesn't use an access badge at the front door, for example, from logging on to the company's local network.
Access management vendor Imprivata also is developing integrated physical and network security technology. Its OneSign Physical/Logical appliance works with security badge systems and considers a user's location before deciding whether to grant remote or local network access.
Because of this convergence, in a lot of companies physical and IT security leaders are starting to report to a chief security officer, says Bill Stuntz, CEO of BroadWare Technologies, a vendor of IP-based digital video surveillance systems and services. "The big move from analog to digital video means physical security is becoming the IT manager's domain, and [he or she] will ultimately be in control of the budget for this," Stuntz says.
MORE THAN A FINGERPRINT
Imagine a biometric finger scanner that checks your identity using not only your fingerprint but the tissue structure and hemoglobin levels in your finger as well. That's the vision of Nanoident Technologies, an Austrian company that specializes in semiconductors printed onto glass, plastic foil, or paper rather than written onto a silicon chip. Nanoident builds security features such as photonic and microfluidic sensors into its system-on-a-chip semiconductors, which means they could be embedded in cell phones or devices the size of a credit card without taking up much space or using much power.
The typical "swipe" fingerprint sensor, with which a finger is rubbed across a sensitive metal plate so that its image can be captured and compared against a fingerprint database for authentication, is 15 millimeters long by 2 millimeters wide. The size of such swipe sensors makes them popular with PC makers: Hewlett-Packard alone ships 250,000 PCs a month with embedded fingerprint readers.
Such sensors have potential in the mobile phone market, says Nanoident CEO Klaus Schroeter, where size, price, and cool features drive sales. Nanoident's finger scanners would be small enough for a cell phone but large enough to fit an entire fingerprint.
Where were you at 12:15? 3VR's surveillance tagging makes it easy to find out.
For fingerprint authentication technology to be widely deployed, it will have to get more accurate, says Schroeter. He puts fingerprint biometrics at 98% accurate but says that needs to be increased to 99.9% for businesses to feel comfortable deploying the technology. "It's easy to fake a fingerprint today," Schroeter says, explaining that when someone touches a piece of glass and leaves behind a fingerprint, it can be photographed and made into a stamp that's 95% accurate.
Nanoident's technology is more accurate, Schroeter says. "We capture the structure beneath the fingerprint using red and infrared light to penetrate the finger up to several millimeters," he says. "We measure the skin parameters and hemoglobin content of the blood so we can then say if this is a live finger, as opposed to a fake fingerprint."
Nanoident claims to include all of the technology for acquiring fingerprints, extracting data, matching against a database, and storing the information on the semiconductor itself. The complexity of manufacturing printed semiconductors with light-sensitive photonic sensors has kept the company from releasing its technology sooner, Schroeter says, but with advances in manufacturing processes, Nanoident plans to open a printing facility in Austria in January.
Nanoident subsidiary Bioident Technologies positions its technology as a disposable photonic lab-on-a-chip that can be used to detect and analyze chemical and biological agents in the air, food, or water supplies. Bioident's microprocessors will let scientists, researchers, and first responders carry devices that let them check for contamination out in the field. A sample of potentially contaminated water could be dropped on a chip containing a microfluidic sensor, which would create a chemical reaction that provides information about what's in the water. Since these printed microprocessors would be inexpensive, they could then be discarded and replaced with a new processor. "Imagine if I could just carry a chip that could do all of my diagnostics [work] rather than taking it back to a lab," says Bioident CEO Wasiq Bokhari.
Mistletoe Technologies sells a chip that includes an embedded VPN, a firewall, and denial-of-service prevention features. It already partners with network appliance makers such as BroadWeb and Viking Interworks to embed VPN and firewall chips into their devices.
ARE YOU TRUSTWORTHY?
The Trusted Computing Group, a not-for-profit organization formed in 2003 by HP, IBM, Intel, Microsoft, and other IT heavyweights, is developing standards for securing systems and data from external attacks and physical theft.
The fruits of the group's efforts are most visible in its Trusted Network Connect standards, the basis for network access control technology offered by almost every IT vendor except Cisco, which prefers to have networks operate primarily on Cisco technology. Another of the group's successes has been the Trusted Platform Module, a microcontroller affixed to a PC's motherboard that's used to store encryption keys, passwords, and digital certificates separate from the hard drive. TPMs have been embedded in more than 40 million PCs shipped since 2003.
Advocates say trusted computing is the future of security. "Ten years from now, you won't have a user name and password," says Steven Sprague, CEO of Wave Systems, which is on the Trusted Computing Group's board. "You will authenticate the human being to the machine, and the machine will authenticate you to the network."
Sprague and others predict the TPM's capabilities will be expanded so it becomes the first component in a "chain of trust" by storing logon and password information about a PC's authorized user, as well as by defining the types and versions of applications that should be running on the PC. Any inconsistencies between the TPM's directory and what's found on the PC would keep the PC from booting. Critical applications and capabilities such as e-mail, Web access, and local protection of data are thereby made much more secure, says Tony Redmond, VP of security and CTO of Hewlett-Packard Services.
Working groups within the Trusted Computing Group are looking for ways to create TPM chips that can be used on peripherals and storage devices. The goal is to give devices the ability to pass a user's credentials automatically so the user doesn't have to authenticate to every application, network, and Web site throughout a workday. Devices based on the Trusted Computing Group's new Mobile Trusted Module specification should start showing up by the middle of next year.
But trusted computing is hardly a quick fix. It could take eight or nine years to transform the IT infrastructures to the point where people can identify themselves from wherever they log on to the network, Redmond says. Another key is the emergence of operating systems that acknowledge the presence of TPMs, something Microsoft's Windows Vista promises to do. There are several groups working on Linux and other open source code to leverage TPM capabilities.
MORE THAN VIRTUALLY SAFE
Virtualization software, which carves up the assets of a PC or server into smaller virtual machines, is seen as a way to consolidate hardware and software, but its security implications are undeniable. For example, the hypervisor that's used to manage these virtual machines is in charge of the system before the system is; it gets loaded early and can make sure any software being loaded is free of security problems and provide alerts when the software behaves erratically.
Forty million PCs sport the Trusted Computing Group's TPM microcontroller
When Intel introduced vPro in April, it touted the technology as providing PCs with built-in manageability, proactive security, and energy-efficient performance. VPro consists of Intel's Conroe processor, Pro/1000 network connection, and Q965 Express chipset, as well as active management and virtualization capabilities.
By the middle of next year, Intel and Symantec will offer security for vPro that defends against malware specifically designed to shut down a computer's security defenses, such as antivirus and anti-spyware applications. Symantec's Virtual Security Solution will use vPro's hardware-assisted virtualization capabilities to contain any malware threats on a given virtual machine within the PC, so that other virtual machines can't be infected.
But the hypervisor can become a new place for attackers to hide malware, warns Paul Kocher, president of Cryptography Research. "Virtualization has huge benefits from a management perspective, but it creates as many problems as it solves," he says. "You can move a firewall to a virtual layer, but it's not clear that this makes the firewall more effective at protecting the PC."
A NETWORK APPROACH
Toward the end of the decade, companies will not only be able to better monitor the contents of data sent over the network, they'll also be able to determine whether seemingly innocuous bits of information about customers, employees, and partners can be pieced together by criminals to gain access to more sensitive information. Call it an inferential data threat.
"Given the amount of information out there, you need some at least semiautomated way of figuring out what information you can and can't release," says Jessica Staddon, area manager of the Palo Alto Research Center's security and privacy research group.
PARC has created prototype privacy monitoring software designed to understand the inferences in data, the meaning of a name, address, or other piece of data, so it can be removed--or obfuscated, in the case of an electronic document--before it's sent out across the network. For example, if the privacy monitor determines that only one person in a database has a certain combination of attributes--female, born in 1969, lives in the 94061 ZIP code--then it would prohibit those three pieces of data from being accessed together unless the person accessing it had specific permission to do so. This would help protect databases accessed through Web applications from being pilfered via SQL injection attacks, which try to trick Web apps into extracting information the attacker has no right to, data that can be used later to acquire more sensitive information.
Staddon and her team at PARC, a subsidiary of Xerox, envision a network security application that sends the end user--whether it's a blogger, HR manager, or CFO--a warning if data in a file could be used as part of a larger inference. Another option is to integrate this capability into Word, Excel, or whichever tool is used to create the file or e-mail. However, this type of use is much more difficult to develop than examining inferences that can be made against data extracted from a database. Data contained in documents is usually unstructured, and the number of inferences could be much greater as the number of people with access to information grows.
Part of PARC's work on data inference emerged from technology it was planning to develop through a grant from the Defense Advanced Research Projects Agency for its Total Information Awareness project. In 2002 Darpa presented TIA as a way to detect, classify, identify, and track terrorists to prevent attacks. The thinking was that law enforcement could use a combination of biometric, database, natural language processing, evidence extraction, and inferential technology to collect information about transactions made by terrorists before an attack, and thus head off trouble.
Public concern about the misuse of data forced the government to discontinue funding TIA the following year, but PARC's research has continued. "We did deliver some code to Darpa, but we didn't go as far with the project as we would have if the funding had continued," Staddon says. PARC is hoping that it can work with Xerox to bring an automated content inference application to market.
The goal of much of the laboratory work at PARC and elsewhere is to "get to the point where computers are doing a lot more work to check to see what's happening, and any abnormal conditions would be responded to automatically," HP's Redmond says. Computers looking out for computers--now there's an idea with potential.
http://www.informationweek.com/windows/showArticle.jhtml?articleID=196600664&pgno=1&queryTex....
It doesn't appear to me Microsoft has much "catching up" do do as it relates to computer devices. Fingerprint mouse, fingerprint reader and fingerprint keyboard are being sold at reasonable prices today.
___________________________________________________
This page profiles Microsoft's innovative lineup of biometric products. The new fingerprint reader can help you to remember all those online passwords — and it can work for several family members. Simply place your finger on the device and it recognizes your preferred computer settings and all of your passwords. Check it out! You'll find the following products on this page:
http://www.microsoft.com/canada/home/products/5.0.21_biometrics.aspx
Take a tour. Nice marketing campaign.
http://www.microsoft.com/hardware/mouseandkeyboard/features/fingerprint.mspx
Watch how everyone reacts when people start lifting fingerprints and spoofing them into those readers. LOL
You may be right Ely, however, if it impacts the computer and possibly standards down the road, Intel and Microsoft have more than likely already been involved in the development.
Check out this manual.
Intel Biometric User Authentication Fingerprint Sensor Product Guidelines
http://www.intel.com/design/mobile/platform/downloads/FingerprintSensorProductGuidelines.pdf
I doubt the Department of Defense is purchasing for the entire defense industry. That would be extremely unusual for such a small device. Under rare circumstances they may issue a message telling every military unit to utilize fingertip recognition when purchasing portable memory sticks, but they haven't done so as of yet. And I doubt they would single out one company to purchase from. Besides, there is no way CyberKey could possibly meet that kind of demand in a reasonable amount of time. Literally hundreds of thousands of people use memory sticks.
They did force everyone in the military very recently to use a smart card reader when accessing quite a few military related websites. And that's been a real pain for people to deal with.
I agree to a large extent. I think the management team has done a great job in getting out in front and marketing their products to government buyers. It's one of the main reasons I became a shareholder.
One thing I would have a caution with is I don't see "the government" as a monolithic buyer. In other words, Homeland defense may love CyberKey, but that doesn't mean someone from the Marines or Army is going to be buying the product over a competitors product. One strategy which could help is to obtain a National Stock Number for their products to ease military purchasing. That would be worth a pr if they obtained one and give them a significant competitive advantage.
Sorry, you lost me with this approach. Perhaps you could explain in more detailed technical terms why a chip couldn't be created with fingertip recognition embedded?
I have a difficult time believing CyberKey's solution is unique enough to protect them against competitors.
My impression (and I'm open to be convinced otherwise), is there are a variety of solutions and CyberKey has one approach. If they sit on their laurels someone else could go after a large government contract that basically meets the same need.
For instance, why couldn't Toshiba line up a large government contract and offer these at a significantly lower price?
http://www.geeks.com/details.asp?invtid=USBBIO-2GB-AX-DT&cat=FLM&cpc=FLMbsc
I would also not discount the big chip makers offering some kind of embedded fingertip recognition technology. If Intel, AMD or a hundred other microchip companies wanted to go after this market, I believe they could. For instance, check out the biometric keyboards today. Don't think CyberKey has anything to do with them. I would think a bios company like PTEC would be interested in this capability.
http://www.zvetcobiometrics.com/Business/Products/fingerprint_devices.asp?gclid=CMD9gLOSh4kCFRRsSgod....
Hope this answered what you were trying to get at.
Here is one report from the CEO interview BrentJanice did.
http://www.investorshub.com/boards/read_msg.asp?message_id=14375512
We have two patents. One for Block Management and one for the Digital Rights Management process as well as 5 other patents pending.
The Block Management Patent deals with bad sectors on a hard drive or flash drive. Other companies say they have it but Cyberkey has the patent.
Yes, that is a very true statement imam. However, I firmly believe if CyberKey doesn't do it someone else will.
If a year from now someone designs and builds a serious website devoted to biometrics under a name such as BioKey.com and it takes off, it would really bother me as a shareholder. Bottom line; I would be willing to forgo quarterly profits and strong pps moves for the next year if management was spending shareholder capital toward that kind of effort.
I don't think there is much question about it, this industry is going to get *very* large in the next decade. The real question is who will lead it?
Hummertt, the potential is especially high when you consider the entire world needs these devices and biometric fingerprint safety can be sold anywhere. No doubt there will be considerable competition in this awakening sector, so the quicker CyberKey ramps up production channels and gets product awareness the better.
That's one reason I disagree a bit with the idea they should be satisfied with ramping up production steadily and not feel something is wrong when a product is out of stock. My approach would be to find multiple OEM channels, where they can offer an array of different products with the CyberKey name attached, then establish a serious web identification presence now.
CyberKey is a great brand name in and of itself for this industry and the industry really doesn't have one yet. If they can be the first well known biometric sales web site, it could pay big dividends down the road.
I feel like I'm writing a lot but not really saying what I want to say. Let me put it this way; instead of being out of invetory for safes as the holiday season is upon us, why not offer a range of biometric safe devices, similar to the ones at this website?
http://www.corporatesafe.com/store/item.asp?ITEM_ID=4&DEPARTMENT_ID=25&gclid=CO7u2aWCh4kCFTA....
An entire line of safes, some designed for home builders, some for gun owners, some for the car, the boat, the RV, at the office etc.
As long as CyberKey is not making the product, all they need do is line up the distribution channel while advertising via a web portal. I would also establish an affiliate model with one of the leaders such as linkshare.com and have an array of banners available so other web sites could advertise the products, offering 5% of the sales coming through those banners.
Ahh, it always looks easy from the comfort of your easy chair typing on the net huh?
One area I would focus on if CyberKey wants to tap into the online market is to get their products listed on Froogle. Putting biometrics into the search box should turn up all kinds of Cyberkey products. Perhaps paying for a bit of advertisement to Google would be a smart move?
http://froogle.google.com/froogle?q=Biometrics&hl=en&btnG=Search+Froogle&lmode=online&am....
Something I don't understand. If you go to CyberKey's website and try and buy a fingerprint lock for $249.00 the site says it's back ordered and unavailable until after the holidays. http://cyberkeysolutions.com/index.php?option=com_content&task=view&id=120&Itemid=160
However, if you go to this site which is the OEM CyberKey purchases the lock from. You can purchase the same lock for $249.00 without restrictions now.
http://www.sequiam.com/products/biolock/
greenspirit@headscratching.com
Thanks, that would be another nice development. Not sure if it's been discussed, but it seems to me CyberKey and Sequiam would make a good fit if they merged. With the Toshiba's of the world taking tepid steps into some of their turf, it would be a smart long term move to line up the source of thier biometrics devices. Any rumors on that front?
http://www.sequiam.com/
This is an interesting article. They also looked poised for significant growth in this sector.
Unlocking the future with the swipe of a finger
At least a half-dozen Central Florida companies are finding consumer applications for biometric technologies.
What is biometrics?
Biometrics is the measurement and analysis of people's physical qualities such as fingerprints, eye retinas and facial characteristics. These measurements can be used by computerized products to identify individuals for security purposes.
Fingerprint recognition: Used to authenticate the identity of a person signing on to a computer, entering a building, unlocking a door or performing other tasks.
Retinal scan: Analyzes the back of the eye to identify a person; can be used to control access to secure areas of military bases and power plants.
Facial recognition: Used to identify a person from a digital image stored among groups of images in a database.
Your fingers may not walk as much through the Yellow Pages these days, but they are finding practical new uses -- and generating sizable revenue for some companies -- with the growth of the biometrics business.
The swipe of a finger can unlock the front door, potentially making the house key obsolete. The same fingertip can control access to a computer, making it unnecessary to remember passwords. In lieu of a credit card, it can even be used to buy milk and bread at a convenience store.
Central Florida is home to a half-dozen or more companies at the forefront of a growing consumer focus on biometric technologies, which until recently were largely limited to government and defense applications.
"It's a significant area for the development of consumer-centric products," said Sapna Capoor, a London-based biometrics analyst for Frost & Sullivan, a technology and market-analysis company with 26 offices worldwide.
A leading example of a new biometric product for consumers is the residential door lock developed by Sequiam Biometrics Inc. of Orlando. The lock, which uses fingerprint-identification technology, will be test marketed by Kwikset Corp., a subsidiary of Black & Decker Corp.
"Sequiam's partnership with Black & Decker will be significant in showcasing the product and giving it credibility," Capoor said. "It's still [in its] early days, but the door lock has the credentials for rapid adoption -- convenience, affordability and a secure tool that could replace door keys."
Biometric devices are also beginning to appear at some stores' checkout counters as an alternative to cash and magnetic-strip payment cards. Next year, cell phones with fingerprint readers for secure transactions are expected to be introduced in the U.S., having already been tried in Japan.
"It's all coming to a neighborhood store near you," said Walter Hamilton, chairman of the International Biometrics Industry Association, a trade group that represents many of the estimated 200 biometrics companies around the world.
Other developments include identification-management programs in homeland security and border protection, he said. New electronic-passport systems will include not just fingerprint sensors but also facial-image scanners. And starting next year, transportation-industry workers with access to secure areas are expected to get biometric ID cards.
Not all of the new applications are tied directly to Central Florida's biometrics companies, but key components and selected products are under development at companies like AuthenTec Inc. of Melbourne, IDS Worldwide Inc. of Altamonte Springs, Zvetco Biometrics LLC of Orlando, and Access Biometrics LLC of Orlando.
Many of these companies, though less than a decade old, have mushroomed in combined employment from a handful of people to as many as 600 workers, with their revenues growing commensurately.
Here's a look at some of the local companies and their specialties:
Sequiam Biometrics
The company's new deadbolt is the result of five years and $25 million worth of research and development that produced at least 20 test models before a final version was chosen, Chief Executive Officer Nick VandenBrekel said.
"We are stressing convenience in our approach to consumers," he said. "People lose more than 60 million keys a year. We are offering the ultimate convenience -- just swipe your finger and, bang, you're in."
Early acceptance of the door lock may depend on how tech-savvy consumers are, said Capoor, the Frost and Sullivan analyst.
"It will take some awareness-raising to drive adoption, and it's really about getting into the mindset," she said. "It's already used on laptops and computers, so it is becoming more integrated into daily lifestyles."
Sequiam, which has grown from six employees when it was founded in 1999 to 80 now, expects to see sales explode from the $5 million to $7 million range this year to $40 million next year, driven by the new door lock, VandenBrekel said.
AuthenTec Inc.
This 9year-old Melbourne company has already shipped more than 12 million fingerprint sensors for use in a variety of products, from computers and cell phones to access controls in airports and government or corporate offices.
The company, which employs about 100 and whose sales have doubled in each of the past three years, has about 50 percent of the global market for personal-computer authentication and password replacement, spokesman Jim Burke said.Its technology will also be used in 2010 by the U.S. Census Bureau, whose field workers will carry handheld computers supplied by another, much larger Melbourne-based company, Harris Corp.
IDS Worldwide Inc.
From a staff of two in 1997, IDS has mushroomed to more than 600 people worldwide, including 40 Orlando-based executives and sales people, company founder Pat Downs says.
"Our sales have been growing at 1,000 percent for the last three years, and we will hit between $750 million to $1 billion this year," Downs said.
IDS, based in Altamonte Springs, designs and deploys biometric security devices used in finance, transportation, health care and other businesses.
Its engineers have created products with some of the highest levels of encryption, or security, now available. One of its products, a computer mouse, uses biometric fingerprint technology and is already compliant with the upcoming version of Windows, called Vista -- making it the first biometric device ready for the new Microsoft Corp. operating system, Downs said.
Zvetco Biometrics LLC
This 8-year-old company, with a staff of 12, recently launched a fingerprint reader designed for government, business and Web transactions. The device captures a larger, more detailed fingerprint image than other readers, making it well-suited to large-scale database searches.
"Our products are designed to protect information across the Internet in the business-to-business sector," CEO Zavi Cohen said.
"Financial services is our No. 1 business, with health care No. 2 and then retail point-of-sale," Cohen said. "We are doing well, have been profitable since 2000, and haven't had any infusion of outside capital."
Access Biometrics LLC
"Our niche is the high-end device used in industrial environments and factories," Chief Technology Officer George Cook said in describing the 11/2-year-old company's fingerprint sensors, which plug into a computer. "We want to be the Cadillac of fingerprint sensors."
The company's sensor replaces the time clock, preventing a worker from punching in for a buddy taking an unauthorized break.
Access is also looking at possible expansion into products for securing medical records.
"We're still a small company, but we've tripled in size in the past year and hope to break into six figures in sales next year," Cook said.
Chris Cobbs can be reached at ccobbs@orlandosentinel.com or 407-420-5447.
http://www.orlandosentinel.com/business/orl-cover2706nov27,0,6738710.story?page=1&coll=orl-busin....
Rocket, what kind of news to your foresee us seeing in the not too distant future?
Looks like the $249.00 fingerprint door lock may be selling pretty well. Back-ordered and not taking any new orders until after XMAS.
http://cyberkeysolutions.com/index.php?page=shop.product_details&flypage=shop.flypage&produc...
I concur. Re-entry at .023 with 500K.
I'll start by getting up in front of the room. Hi, my names Mike and I'm an IHUBAHOLIC. LOL
Here's what I think has spooked the stock. How can you compete with one of the big boys that make the chips?
http://www.geeks.com/details.asp?invtid=USBBIO-2GB-AX-DT&cat=FLM&cpc=FLMbsc
Your Price: $124.99 for 2 GIG
The new Axiom BioDrive is a biometric USB flash drive that provides secure data protection by requiring an authenticated fingerprint to access files. Once the drive is plugged in, the security features are instantly recognized on all current Windows operating systems without the need of downloading any drivers. Simply plug in the drive, swipe your fingerprint, and you have instant access to all of your protected files. Ranging in capacities from 256MB to 2GB, always have the secure files you need everywhere you go.
Wow! That is an amazing posting history. Someone either doesn't sleep and is totally addicted to posting or there are multiple people using his/her profile.
Board, I've added the photo's Airys took to the photo site. Thanks for the pictures Airys!
http://public.fotki.com/greenspirit/
Most of them are under the Harrow Operation folder.
You know something that kills me sand, with all the self-professed knowledgeable people now telling us they predicted this mess, not one of them had the guts to take Fish up on his 5 grand bet a few weeks ago.
Sure looks that way sand. The only rabbit that can be pulled out of the hat to save our butts now is the audit. Otherwise, unfortunately slow disintegration....
Party, you gotta admit these are classic cement posts from the past. Maybe some of those old posts about Petar being a billionaire would also be funny to read now.
http://www.investorshub.com/boards/read_msg.asp?message_id=13119073
http://www.investorshub.com/boards/read_msg.asp?message_id=13121990
http://www.investorshub.com/boards/read_msg.asp?message_id=13168977
Interesting take budge. I personally think we have a natural craving for "creative tension". It's different than discussion or dialogue.
The difficult balancing act is straying from creative tension into personal admonishment of the ideas which cause the tension.
In fairness it probably wasn't as bad as my post portrayed. I just didn't want things to get out of hand and through experience know how quickly it can.
I also hate to see fdjr and other moderators taking the heat from people when they see the high ban list, then make utterly unfounded assumptions about why the list is so high.
95% of it is because of repeated personal attacks.
My humble advice, if someone is being swarmy or sarcastic or just plain rude, don't elevate the issue, *disengage*, press the delete button and forget about it. There is no need to attack back, because the site is moderated and within a reasonable amount of time the post will be deleted. If we miss the post (which can easily happen), send us a pm or email if the post is particularly bothersome.
I had a day-dream, we were at a rather large party and I walked into the room, someone came up to me and said "who are you" and I said, here's a hint "NO PERSONAL ATTACKS" and they knew right away. LOL A broken record I do imitate.
Heck, that's not a bad idea! Thoroughly written and documented research reports, including pictures etc, similar to what you can find on big board stocks.
You could probably sell them for 100 bucks a piece via the web.
Board, do you see how the personal attacks are adding up now? Seriously, is this the kind of board we want?
Matt has allowed many of you to repost again and some of you are already personally attacking members of the board and one another.
I really hate to get on a soap box like this, but for pete sake, adhere to the TOU! If you've forgotten them, re-read them.
No personal attacks. Talk about ideas, talk about the stock, talk about issues surrounding the stock. Just lay off talking negatively about eachother. If you have to write stuff about other posters, sign up to be a paying member and send it via pm.
I'm not exactly sure, but someone on the board said a capital L and a lower case l look the same in some scrip formats. And poeple have used the same technique before on the old Yahoo boards.
The only way I could tell was by viewing the posting history.
Board, I keep getting pm's so let me clarify.
1. Nickulliana aka Angela has not been booted. Here she is. I think she's flying today.
http://www.investorshub.com/boards/profile.asp?User=80502
2. Some clown impersonating her surname and saying foul mouthed things did. Here he/she was.
http://www.investorshub.com/boards/profile.asp?User=88344
Hope this helps.
Don't know for certain, but I would be very surprised if the numbers matched up. Over 90% sure they wouldn't.
I think you're talking about this site. You have to cut and past it.
https://esos.state.nv.us/SOSServices/AnonymousAccess/CorpSearch/CorpSearch.aspx
Matt took care of business.
http://www.investorshub.com/boards/profile.asp?User=88344
Space, did you read through that website? Very unusual some of the connections to Cairo and Lebanon, along with of course the UAE.
Also interesting to read the areas of practice page.
The drama continues! LOL
That was interesting, VFIN just moved in rapidly on the high bid, scooped up 1.2 million shares and disappeared.
They are from Boca Raton, Florida. hmmmm
VFIN, who are these guys, who are they representing and why do they all of a sudden want a lot of shares?
http://www.vfinance.com/home.asp?ToolPage=aboutus.asp&ab=full
vFinance Investments, Inc. (the “Company”), a subsidiary of vFinance, Inc. (www.vfinance.com ), is a financial services company which specializes in emerging opportunities, providing investment banking, trading, trend forecasting, and consulting services to micro, small and mid-cap high-growth companies, and to institutional and high net-worth investors seeking above-market returns.
The Company possesses an exceptional understanding of small-cap and micro-cap market stocks gained from being a market maker in over 2500 stocks in those categories, from its experienced investment banking team, and from the large number of plans posted or summarized on its website which is ranked as a leading destination for companies seeking capital with over 3 million visitors annually from over 175 countries. Its new Sterling Fixed Income Division has an established reputation for superior yield trend forecasting.
The Company offers personalized service through its global financial consultants located in offices in 30 U.S. cities and in Latin America, and through its trading desk. The trading desk offers, among other things, ADR liquidity pools and effective market liquidation strategies. The Company continues to provide new services including EquityStation, which offers its clients electronic direct market access (DMA).
Good catch market, maybe I'm not looking at the correct site, because I could have sworn I used a site on the net once that listed every lawyer in the U.S.
I'll take a look around.