Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
It was only because of the meeting last year in Vegas that I decided to keep and subtantially raise my position in Hartcourt as well as FLTL. Meeting the management was invaluable and I believe most of the 40 or so people present would heartily agree.
The so-called Platform Preview release of Internet Explorer 5.5 became "officially" available December 3rd, with a second beta released Feb. 16 and a final "gold code" build released to manufacturing in June, 2000 for a July 12, 2000 release. English and International versions of the final 5.5 release became officially available on July 12th, along with a readme file describing the changes and recommended installation procedures.
http://pcbuyersguide.com/solutions/web/IE55.html
Good news MT, thanks.
For a nice little timeline on DNA related cases go to:
http://timelinesdb.com/listevents.php?subjid=287&title=DNA
OT
These days every board has its own Lithuanian translator. The diaspora put them everywhere!
Thanks Eamon.
I was only able to find one recent mention of Sinosun and Wave presenting together at a TCG conference in Beijing in April. Pretty quiet there since then.
Translation already provided.
WAVX has acknowledged distributors in the US and Europe but I do not recall seeing any mention of distrition channels in China or India. Does anybody have any insights on this?
Nicely put, but IMHO directed to wrong person.
I agree.
It looks as if some of that inventory did get sold per the following PRs:
2005 Jun 6, Hartcourt is pleased to announce that it has successfully closed a transaction with the Xinjiang Provincial Public Security Bureau (state police) on a multimedia network appli-cation solution with a contract value of RMB 3.8 million. The Radvision products we distribute and the application services will be integrated with Xinjiang police's security monitoring system, anti-terror system, emergency response system and the video conference system. Hartcourt sold the solution based on the "multimedia platform" concept that concentrated on "creating multimedia synergistic functions" to meet the customer needs.
(IHub #64939, 6/6/05)
2005 Jun 16, The Hartcourt Companies, Inc., is pleased to announce that it has successfully closed a sales transaction with the China Power Group as the end user. The sale, valued at RMB 2.1 million, made by Hartcourt's operating subsidiary with the Radvision MCU products, was a part of a videoconferencing system China Power was setting up within its corporate communication infrastructure.
(IHub #65131, 6/16/05)
This may have been posted, but the details are new to me.
2005 Apr 25, In its Version 3.0, Revision Draft 0.51, dated April 25, 2005, Microsoft has required TPM version 1.2 in its draft Longhorn operating system hardware requirements for logo compliance for "Gold" level business PCs. Wave believes that a significant percentage of the approximately 150 million-unit PC market will include TPMs by December 2006, which is Microsoft's stated launch date for Longhorn.
(http://biz.yahoo.com/e/050510/wavx10-q.html)
Learn how to build in trust and security for embedded systems at the upcoming Embedded Security Seminar. On Monday, September 12, 2005 experts from the Trusted Computing Group's membership will address embedded security development and design. Topics will include the Trusted Platform Module (TPM) architecture and its usage; security for mobile systems; trusted drives and other peripherals; writing trusted applications; and infrastructure to enable trusted systems to communicate and provide a secure environment among systems.
TCG members from Intel, Sygate and Wave Systems and industry expert Loring Wirbel of EE Times will discuss "Trusted Platforms: Making Them Talk and Work Together". Trusted platforms present a good way to secure systems and data in embedded applications. But how do these individual systems interact together, across the network and with other parts of the enterprise? Topics will include ensuring that mobile devices or those hanging off the network are authenticated and safe; key transfer and key management across systems; trusted server issues; and applications for trusted embedded systems.
https://www.trustedcomputinggroup.org/events
“Next to knowing when to seize an opportunity, the most important thing in life is to know when to forego an advantage.”
http://www.brainyquote.com/quotes/authors/b/benjamin_disraeli.html
Jeever! Perhaps the future will vindicate your exuberant faith. In the mean time, give us an idea of your personal commitment and let us know how many DNAG shares you currently hold long.
Cramer made a major endorsement of Radvision rather than just a mention. This bodes well.
To refresh the HRCT relation:
2004 Nov 2, The Hartcourt Companies, Inc., today announced that it has signed a definitive agreement to purchase 90% of Control Tech Electrics Technology (Shanghai) Co., Ltd, a sole distributor of Radvision video & audio conferencing products in China.
(IHub #58373, 11/2/04)
2005 Jun 6, Hartcourt is pleased to announce that it has successfully closed a transaction with the Xinjiang Provincial Public Security Bureau (state police) on a multimedia network appli-cation solution with a contract value of RMB 3.8 million. The Radvision products we distribute and the application services will be integrated with Xinjiang police's security monitoring system, anti-terror system, emergency response system and the video conference system. Hartcourt sold the solution based on the "multimedia platform" concept that concentrated on "creating multimedia synergistic functions" to meet the customer needs.
(IHub #64939, 6/6/05)
2005 Jun 16, The Hartcourt Companies, Inc., is pleased to announce that it has successfully closed a sales transaction with the China Power Group as the end user. The sale, valued at RMB 2.1 million, made by Hartcourt's operating subsidiary with the Radvision MCU products, was a part of a videoconferencing system China Power was setting up within its corporate communication infrastructure.
(IHub #65131, 6/16/05)
Looks like AuthenTec is privately held.
http://www.authentec.com/
DNAG should volunteer its services to help identify bodies in the wake of Katrina.
All data from the timelines.ws stie is being transferred to a Database format at:
http://www.timelinesdb.com
Shareholder Strategy:
The principal manufacturers of TPMs include:
Atmel; Broadcom; Infineon; National Semiconductor and ST Micro.
If I have missed any, just add them to the list.
The general public is not aware of TPMs much less WAVX.
It is very interesting to hear the responses to questions addressed to the helpdesks of PC manufacturers regarding their incorporation of TPMs. But I believe we can have much more bang to our efforts if we question public broadcasters such as Jim Cramer on their views regarding the TPM manufacturers. Cramer is touting a big tech rally for the Fall. I have not heard any caller questions on the above TPM manufacturers associated to TPMs. Cramer has heralded Broadcom as a "best of breed" but not with any mention of TPMs.
For those not familiar with Jim Cramer, he is now the CNBC guru on stock analysis for the individual investor. His daily show is repeated 2 times nightly for those who miss the afternoon (B)Oooojah. It makes no sense to call the show and ask about WAVX because the company is too small. They will not let you on. But you can call and ask about the above TPM manufacturers. Triple
(B)oooyah for this one to the 3rd power:
Call 1-800-743-CNBC(2622).
Clearly he should continue doubling every day until he gets to 50%. At that point we can reconsider our advice.
Yes. Many shares. And I plan to buy many more.
Great! Now we have faith based physics. "And the humble shall inherit the NYSE." As to Multi dimensional gravatons, let me know what time they cross so that I can keep a close watch. It may well effect my decision on the attending the meeting in Vegas.
Perhaps posted already, but a good summary on the TPM.
On trusted computing and Linux
http://lwn.net/Articles/144681/
OLS: Linux and trusted computing
The term "trusted computing" tends to elicit a suspicious response in the free software community. It has come to be associated with digital restrictions management schemes, locked-down systems, and similar, untrustworthy mechanisms. At the 2005 Ottawa Linux Symposium, Emily Ratliff and Tom Lendacky discussed the state of trusted computing support for Linux and tried to show how this technology can be a good thing to have. Trusted computing does not have to be evil.
At the lowest level, trusted computing is implemented by a small chip called the "trusted platform module" or TPM. The Linux kernel has had driver support for TPM chips since 2.6.12; a couple of chips are supported now, with drivers for others in the works. Many systems - laptops in particular - are currently equipped with TPM chips, so this is a technology which Linux users can play with today.
A TPM provides a number of features to the host system. It includes a protected memory area, and a restricted set of commands which can operate on that area. "Platform configuration registers" (PCRs) are a special sort of hashed accumulator which can be used to track the current hardware and software configuration of the system. The TPM also includes a cryptographic processor with a number of basic functions: a random number generator, SHA hash calculator, etc. And there is some non-volatile RAM for holding keys and such.
A TPM-equipped system requires support in the BIOS. Before the system boots, the BIOS will "measure" the current hardware state, storing the result in a PCR. The boot loader will also be checksummed, with the result going into another PCR. The boot loader is then run; its job is to stash a checksum of the kernel into yet another register before actually booting that kernel. Once the kernel is up, the "trusted software stack" takes charge of talking to the TPM, providing access to its services and keeping an eye on the state of the system. Systems which provide a TPM typically also include the needed BIOS support; this support could also be added by projects like FreeBIOS and OpenBIOS. There are versions of the Grub bootloader which can handle the next step; LILO patches also exist. Once the kernel is booted, the TPM driver takes over, with the user-space being handled by the TrouSerS TSS stack.
TrouSerS makes a number of TPM capabilities available to the system. If the TPM has RSA capabilities, TrouSerS can perform RSA key pair generation, along with encryption and decryption. There is support for remote attestation functionality (more about that momentarily). The TSS can be used to "seal" data; such data will be encrypted in such a way that it can only be decrypted if certain PCRs contain the same values. This capability can also be used to bind data to a specific system; move an encrypted file to another host, and that host's TPM will simply lack the keys it needs to decrypt that file. Needless to say, if you make use of these features, you need to give some real thought to recovery plans; there are various sorts of key escrow schemes and such which can be used to get your data back should your motherboard (with its TPM chip) go up in flames.
The TrouSerS package also provides a set of tools for TPM configuration tasks. However, a number of BIOS implementations will lock down the TPM before invoking the boot loader, so TPM configuration is often best done by working directly with the BIOS. There is also a PCKS#11 library; PCKS#11 is a standard API for working with cryptographic hardware.
At the next level is the integrity measurement architecture (IMA) code. IMA was covered on the LWN Kernel Page last May; look there for the details. In short: IMA uses a PCR to accumulate checksums of every application and library run on the system since boot; this checksum, when signed by the TPM, can be provided to another system to prove that the measured system is running a specific list of software, that the programs have not been modified, and that nothing which is not on the list has been run. If the chain of trust (starting with the BIOS) holds together, a remote system can have a high degree of confidence that the list is accurate and complete.
Since last May, the IMA code has been significantly reworked (it took a fair amount of criticism on the kernel list). Among other things, it no longer hooks in as a Linux security module. The next step, however, will be a security module; it is called the "extended verification module." It includes a fair amount of security enforcement policy. This module can, for example, check that the extended attributes on files have not been changed by any third party. SELinux makes heavy use of extended attributes; with this mechanism in place, an SELinux system can remain secure even if somebody moves the disk to a different system and makes changes to the SELinux labels. Once back on the original system, those changes will be detected.
So why would a Linux user care about all of this? Some of the things that can be done with the TPM include:
Key protection. A user can store GPG keys (or others) in the TPM and not have to worry about those keys being extracted and disclosed by a compromised application.
System integrity checking. The measurement capabilities can be used to ensure that the binaries on the system have not been tampered with; it is a sort of Tripwire with hardware support.
In the corporate environment, the remote attestation features provided by IMA can be used to keep compromised systems from affecting the company network. Simply require systems to provide their "measurement" before giving them access to the network, and any system which has, say, been infected with malware at a conference will be detected and locked out.
Similarly, a conference attendee using an "email garden" terminal to access a mail server could, in the future, require that terminal to verify itself to the server before any sort of access is allowed.
Attestation could be used in electronic voting machines to verify that they are running the proper (hopefully open source) software.
And so on. The point is that there are legitimate uses for a hardware-based mechanism which can, with a reasonable level of confidence, verify that a system's software has not been compromised.
On the other hand, this same technology has a number of other potential uses. It could be used by company IT cops to ensure that employees are not running "unapproved" software, be it games, unlicensed copies of proprietary software, or Linux. Remote attestation is a boon for companies like TiVo, which can use it to ensure that the remote system is running current software and has not been cracked. Providers of web services could be sure that you really are running Internet Explorer. It does not take much imagination to come up with several unpleasant scenarios involving trusted computing and locked-down systems.
What it comes down to is that "trusted computing," like computing itself, is a tool which can be used in many ways. One does not have to look very far to find people using Linux in ways that one, personally, might not approve of. The TPM hackers feel that, given that the technology is available, let's use it. Properly used, this hardware can help to ensure that we remain in charge of our systems, and that much, certainly, is a good thing.
I keep mine listed on AOL. You have to enter changes manually.
Nice compared to the Aug 12, 2004, revenue of $6000.
2004 Aug 12, Wave reported a net loss to common stockholders of $4.3 million, or $0.06 per basic share, for the second quarter of 2004, compared to a net loss to common stockholders of $6.3 million, or $0.12 per basic share, in the second quarter ended June 30, 2003. The weighted average number of basic shares outstanding in the second quarters of 2004 and 2003, was 67,363,000 and 52,096,000, respectively. For the second quarter ended June 30, 2004, Wave Systems reported net revenue principally related to OEM shipments of its EMBASSY(R) Trust Suite (ETS) software of $6,000, compared to revenue of $34,000 in the second quarter ended June 30, 2003. Second quarter revenue from ETS shipments were roughly in line with levels achieved in the preceding two quarters.
(IHub #50281, 8/12/04)
India calls for tighter laws on data security:
NEW DELHI - Stung by a recent scandal that rocked India's booming business processing industry, the government on Tuesday announced that it will tighten laws to prevent cyber crime and ensure data secrecy, an official said.
Prime Minister Manmohan Singh told a special meeting of software company representatives Tuesday that stringent punishment would follow any breach of secrecy, illegal transfers of commercial information and other cyber crimes.
Existing laws would be tightened to ensure that any criminal activity in the outsourcing business was prosecuted, said Sanjaya Baru, the prime minister's spokesman.
The Indian government's tough message to software company heads was the fallout of last week's revelation by a British newspaper that an Indian call center employee had allegedly sold personal data on 1,000 British customers to an undercover reporter.
The employee, Karan Bahree, was fired from his job at Web designer Infinity eSearch after The Sun newspaper alleged that he supplied details on the Britons' bank accounts, credit cards, passports and drivers' licenses, including numbers and pass codes, addresses and phone numbers.
The tabloid said it paid Bahree 3 pounds ($5.40) each for the data.
Although Bahree denied any wrongdoing, the sting operation revealed the vulnerability of hundreds of Western firms that rely on business outsourcing firms in countries such as India, where skilled professionals can provide backoffice support for a fraction of what it would cost in a developed country.
Indian software companies have established themselves as global leaders in providing telemarketing services, call center operations, payroll accounting and credit card processing.
Kiran Karnik, head of the software industry trade group, said Tuesday that the Indian data processing industry was committed to ensuring "ensuring the highest standards of data privacy."
However, at the meeting with Singh, Karnik also expressed concern that the recent scandal "may well have been a sting operation directed to give Indian industry a bad name against the background of growing competitiveness," Baru said.
The National Association of Software and Service Companies or NASSCOM, said was building a central database of all outsourcing industry employees to prevent criminals from getting jobs in the sector and threatening the data security of global companies.
2005 Mar 9, Wave Systems Corp. announced its EMBASSY® Trust Suite (ETS) software for trusted computing will be demonstrated at the Giesecke & Devrient (G&D) booth at the CeBIT 2005 trade show, March 10-16, 2005. At CeBIT 2005, Wave will highlight the newest trusted computing capabilities of its ETS software, including policy management, and management tools to enable hardware security in applications such as email and wireless authentication. Wave has designed its ETS software to be easy to use, to be interoperable across all available platforms and security chip vendors, and to offer server solution upgrades needed by enter-prises and government users.
(IHub #72549, 3/9/05)
2005 Apr 12, Giesecke & Devrient (G&D) and Wave Systems Corp. (WAVX) have formed a strategic alliance to offer an enhanced security solution to address the trusted computing mar-ket. The G&D-Wave Systems collaboration will address the organizations' joint development activities in the fields of smart card technology and trusted computing software.
(IHub #76483, 4/12/05)
Looks like the Jun 14 earning report knocked SMTR down a bit.
This could be approaching a good entry point again.
If FLTL Gross revenue is $656,790.
And if outstanding shares are 15.1 million
Then 656,790 / 15.1 mil = $.0434/shr
This puts the share price ($.075) at 1.7 times rev/shr.
I suspect that they see good value in FLTL as an established trading entity and that this allows them to participate in the growth. By themselves they would not have a face in the equity markets.
DayStar Tech surges on first sales pact (DSTI) By Tomi Kilgore
NEW YORK (MarketWatch) -- Shares of DayStar Technologies (DSTI) surged 21% after the company said it entered into its first sales agreement for its exclusive TerraFoil solar cells. The stock was last up $1.44 at $8.32. As part of the agreement, TerraFoil will be delivered monthly to Blitzstrom GmbH with escalating volume through end of 2008. Financial terms were not disclosed.
That's a ridiculous statement unless you know something that nobody else does!
Any estimate on share price over the next 6 months?
FLTL taking quite a hit these last 2 days.
Anybody have any insights?
Would you like white or red?
Nice move on the close. Maybe something brewing!
Today was a very sad day. For years I have been gathering daily joy in anticipation of the WAVX train departing from its lowly station. I have jumped awake each morning wondering if this will be the day and joyed thoroughly in all the back and forth jousting between WAVX waivers and bashers. But today it looks as if this joyous period of anticipation is over. Now I must actually get into the mindset of the ride. For those of us who are true believers in the saying “anticipation is half the fun” it is clear that half the fun is now gone. There is nothing left now but to buy my altitude sickness pills, and I hate taking meds, and prepare for the 2nd half. At least my wife will be pleased. She’s always preferred the ride: More and more research is proving the old saying, "anticipation is half the fun". A recent study by Dr. Berk and his colleague David Felten, M.D., Ph.D., shows that even the "expectation" of watching a one-hour humorous video, provides positive changes in mood states prior to the actual viewing of the video.
(www.wchstv.com/newsroom/healthyforlife/1867.shtml)
On revaluation of the yuan:
"The immediate potential winners from a revaluation (of the yuan) will be companies that sell a lot into Asia. That's because their Asian revenue will be worth more when converted into dollars, euros and other European currencies"
(WSJ, 5/26/05, P.C16)
Could be a sign of value to come!?!