Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
'Weby'
"Don't know about news in 2011, but news will come."
Funny you should write that post, I mentioned to my brother that
perhaps we might get an announcement before years end! I felt so strongly about that possibility that I bought 5 July $2.50 calls!!
Not much conviction, but I figure almost 8 months is a long time and if we're still trading under $3.00 come July, I've made a huge mistake in anticipating Waves' adoption timeline!
Wavxmaster
'TPT'
Back over 30 days!! Up another 77,645 shares! Also, second highest SI since: 3/31/2011 10,150,255 Shares Short!!
Not much shorting today:
20111227|WAVX|29176|0|145253|Q
After Hours
Time (ET) After Hours
Price After Hours
Share Volume
16:34 $ 2.13 1,223
16:04 $ 2.159 300
Settle Date Short Int AveDV Days 2 Cover
12/15/2011 9,783,941 312,869 31.271686
11/30/2011 9,706,296 358,656 27.062968
11/15/2011 9,280,191 335,666 27.647099
10/31/2011 8,240,919 467,843 17.614710
10/14/2011 8,326,545 446,886 18.632369
9/30/2011 8,438,248 467,871 18.035416
9/15/2011 8,648,927 340,951 25.367067
8/31/2011 8,407,037 325,747 25.808486
8/15/2011 8,626,533 572,396 15.070918
7/29/2011 8,687,406 285,902 30.385957
Read more: http://www.nasdaq.com/symbol/wavx/short-interest#ixzz1hmU6mUx9
Re short interest #'s coming out today, the # of days to cover should be back up over 30 because of the reduced average daily volume!!
Settle Date ShortInt ADV Days2Cover
11/30/2011 9,706,296 358,656 27.062968
11/15/2011 9,280,191 335,666 27.647099
10/31/2011 8,240,919 467,843 17.614710
10/14/2011 8,326,545 446,886 18.632369
9/30/2011 8,438,248 467,871 18.035416
9/15/2011 8,648,927 340,951 25.367067
8/31/2011 8,407,037 325,747 25.808486
8/15/2011 8,626,533 572,396 15.070918
7/29/2011 8,687,406 285,902 30.385957
Read more: http://www.nasdaq.com/symbol/wavx/short-interest#ixzz1hlD6k3gI
From Fullmoon
http://www.rxpgnews.com/research/NIST-special-publication-expands-government-authentication-options_543850.shtml
NIST special publication expands government authentication options
Dec 21, 2011 - 5:00:00 AM
Government agencies have the option of using the services of companies that have had their authentication systems certified through the Federal Chief Information Officer Council's Trust Framework Provider Adoption Process (TFPAP). This program assesses credentialing processes against federal requirements, including those established in 800-63. To ensure consistency and avoid redundant analysis, NIST strongly encourages agencies to leverage the TFPAP process.
By National Institute of Standards and Technology (NIST), [RxPG] A newly revised publication from the National Institute of Standards and Technology (NIST) expands the options for government agencies that need to verify the identity of users of their Web-based services. Electronic Authentication Guideline (NIST Special Publication 800-63-1) is an extensive revision and update of the original document, released in 2006, and it recognizes that times, and technologies, have changed.
Changes made to the document reflect changes in the state of the art, explains NIST computer security expert Tim Polk, Cryptographic Technology Group manager at NIST. There are new techniques and tools available to government agencies, and this provides them more flexibility in choosing the best authentication methods for their individual needs, without sacrificing security.
When SP 800-63 was first released, its authors assumed that most agencies would handle the business of figuring out if users were who they claimed to be in-house. But since that time, an industry has grown around providing authentication services, and it is often in the best interest of agencies to take advantage of commercial systems or those of other government entities. And while passwords are still the leading mechanism for authenticating user identity, a growing number of systems rely on cryptographic keys or physical tokens.
The revision broadens the discussion of technologies available to agencies and gives a more detailed discussion of these technologies. The guideline applies whether agencies choose to handle authentication directly or leverage services provided by other parties, including commercial companies.
Government agencies have the option of using the services of companies that have had their authentication systems certified through the Federal Chief Information Officer Council's Trust Framework Provider Adoption Process (TFPAP). This program assesses credentialing processes against federal requirements, including those established in 800-63. To ensure consistency and avoid redundant analysis, NIST strongly encourages agencies to leverage the TFPAP process.
SP 800-63-1 is the official implementation guidance for the Office of Management and Budget (OMB) Memorandum 04-04, E-Authentication Guidance for Federal Agencies.* Polk stresses that the revised NIST guideline may inform but is not intended to restrict or constrain the development or use of standards for implementation of the National Strategy for Trusted Identities in Cyberspace (NSTIC). NIST SP 800-63-1 is specifically designated as a guideline for use by federal agencies for electronic authentication. NSTIC, in contrast, has a broader charge: the creation of an Identity Ecosystem, an online environment where individuals and organizations will be able to trust each other because they follow agreed upon standards to obtain and authenticate their digital identities.
'plympton'
"Ha! hold my Brain; be still my beating Heart."
The earliest citation of the full 'be still, my beating heart' comes from William Mountfort's Zelmane, 1705:
Mrs Wavxmaster would question, "What brain?"
Wavxmaster
'titlewave'
Nice summary!! How about weet's post concerning the DOD's procurement starting in Jan 2012!!
"The Army chess consolidated buy period reads as follows:
Consolidated Buy Schedule
CB-14
¦17 Jan 2012 - CB14 Ordering Period Opens.
¦30 Mar 2012 - CB14 Ordering Period Ends.
CB-15
¦11 Jun 2012 - CB15 Ordering Period Opens.
¦28 Sept 2012 - CB15 Ordering Period Ends.
The DOD has mandated 800-147 3.1 as of 01/01/2012. Wave is the only company with a certificate of networthiness. Additionally, it has the only product(WEM) capable of adhering to the stips for BIOS integrity pc startup as per 800-147. Let the good times roll & the games begin!! Happy holiday to all 2012 is ours!! "
Risk reward seems out of balance, but perhaps in a month will see $3.50 and thus a little realignment!
Looking for a prosperous 2012!! T
Wavxmaster
From Fullmoon
"Day sees the requirement to use “standard” hardware and operating systems in tactical deployments, such as Google Android-based smartphones on the battlefield and Microsoft Windows- and Linux-based systems on standard laptop or desktop systems. “Using secure virtualization, commodity hardware and software solutions can be used, but with protection for both sensitive data and applications, as they can be isolated from one another.”
Consolidation and COTS adoption, as well the growing use of encryption to protect data stored on mobile computers, are all recent trends that call for “extra security without compromising on the performance or usability of systems,” Day affirms. Secure information storage challenges typically associated with legacy systems, the use of commercial systems, and the hosting data and personnel having different security levels and clearances on a single system can be met by using high-performance, secure software virtualization combined with modern multi-core hardware, he continues.
Engineers at LynuxWorks and Wave Systems in Lee, Mass., are collaborating on the use of self-encrypting drives (SEDs) with the LynxSecure separation kernel and hypervisor for running multiple operating systems simultaneously on a single endpoint. The solution links individual encrypted disk bands to different secure virtual domains provided by LynxSecure running on a single device"
http://www.militaryaerospace.com/articles/print/volume-22/issue-12/technology-focus/in-defense-of-data.html
In defense of data
Today’s secure storage technologies help deliver mission-critical information in the hands of awaiting defense and aerospace personnel, while maintaining various levels of data security.
BY Courtney E. Howard
Battles increasingly are fought with information—with bits and bytes, rather than with bullets. Competitive advantages are gained by the abilities not only to tap into the stored data of adversaries, but also to protect and defend one’s own data storage. In this new kind of information warfare, offensive tactics most often are classified, yet defensive approaches are the subject of much discussion, debate, and attention.
Data at rest
Defense and aerospace organizations must secure data in transit (DIT), that which is being transmitted or communicated, and data at rest (DAR), which is being stored. “Protecting classified data at rest is a complex issue,” admits Shubhagat Gangopadhyay, director of business development at Curtiss-Wright Controls Embedded Computing in Ashburn, Va.
“Broadly speaking, there are really two ways to secure data storage: by removing the memory from its unsecure environment [where it is being used] to a secure location [such as under lock and key] or encrypting the data such that risk of compromise is vanishingly zero,” Gangopadhyay continues. “In situations where there are potentially hundreds of memory devices to be managed (e.g., a tactical deployment by the Army), the burden of physically securing every bit of unencrypted classified data is logistically cumbersome, thus increasing the risk of compromise.”
Encryption of data in transit has been around for decades, but the application of encryption technology for DAR is relatively new and “brought on by huge capacities that can no longer be destroyed or wiped in a timely manner,” notes Thomas Bohman, senior product manager at Curtiss-Wright Controls Electronic Systems in Santa Clarita, Calif.
“In the past year, there has been a significant increase in demand for mil-aero systems with data storage encryption, as well as rugged, high-speed, high-capacity characteristics,” Bohman adds. “With encryption, only the small key and authentication data needs to be purged to render the data useless to adversaries that capture the storage device.”
Lockheed Martin Aeronautics selected Curtiss-Wright’s Vortex Compact Network Storage (CNS) subsystems for the C-130J Super Hercules airlifter program.
Lockheed Martin Aeronautics selected Curtiss-Wright’s Vortex Compact Network Storage (CNS) subsystems for the C-130J Super Hercules airlifter program.
Encryption explained
Developing and certifying the technology and policies for encryption of U.S. Department of Defense (DOD) classified data is managed by the National Security Agency (NSA), Gangopadhyay explains. The NSA National Information Assurance Glossary, defines and certifies four levels of encryption products and keys: Types 1 through 4. Type 1 product is defined as: “cryptographic equipment, assembly, or component classified or certified by NSA for encrypting and decrypting classified and sensitive national security information when appropriately keyed; developed using established NSA business processes and containing NSA-approved algorithms; and used to protect systems requiring the most stringent protection mechanisms.”
“For large deployments, the cost of such encrypted devices makes it cost-prohibitive,” Gangopadhyay laments. “Additionally, the certification process can be quite long, sometimes resulting in the underlying technol- ogy becoming obsolete prior to the completion of certification.” Type 1 certification is considered a rigorous process in which myriad elements—cryptographic security, functional security, tamper resistance, emissions security (EMSEC/TEMPEST), and security of product manufacturing and distribution processes—are tested and formally analyzed.
NSA officials also define two suites of security algorithms: Suite A and Suite B. Suite A encryption, used for highly sensitive, national-security information, refers to “a specific set of classified cryptographic algorithms used for the protection of some categories of restricted mission-critical information,” according to the National Information Assurance Glossary. Suite B, applied to a majority of data and devices, is “a specific set of cryptographic algorithms suitable for protecting classified and unclassified national-security systems and information throughout the U.S. government and to support interoperability with allies and coalition partners.”
Security guidelines, procedures, and certifications help secure stored data and information at various classification levels. Yet, the growing implementation of commercial off-the-shelf (COTS) devices and systems in mil-aero applications is exacerbating the secure data storage challenge.
COTS conundrum
Defense organizations are increasing ly adopting COTS solutions, such as computer tablets, which is driving the need for a layered approach to securing stored information.
“In the current environment of DOD fiscal austerity, and for devices where technology is experiencing rapid technological change, such as solid-state memory, we see a trend toward using commercial solutions for tactical classified data,” Gangopadhyay says, “especially if the data gets stale in a relatively short time and the encryption technology is based on Suite B cryptography. By using a layered approach toward securing the memory, such technologies can be used for data up to Secret.”
“In the commercial world, several schemes have been developed and are available to meet data security requirements,” Gangopadhyay says. Seagate Technology in Cupertino, Calif., offers several lines of self- encrypting hard drives, for example.
The general trend is that for high-volume and lower-level security needs, techniques based on commercial technology are deemed “good enough,” Gangopadhyay explains. For applications on aircraft or spacecraft, where there is a threat of falling into an enemy’s territory or the data is of high value, more robust techniques will be used. “Therefore, the trend going forward is to split the data storage security into two realms: the lower level based on commercial solutions but with certain additional augmentations, and a higher level.
“The ‘good enough’ solution for securing classified data is an interesting challenge,” Gangopadhyay admits. The encryption part is often straightforward, given that most commercial solutions use a SATA controller with built-in AES-256 (256-bit Advanced Encryption Standard). “The real work is to figure out the key management aspect of deployment, including authentication and key recovery—features that are not always available in a commercial solution. The other part is to put in one or more additional layers of security beyond what is available commercially, making the solution suitable for data up to the Secret level.”
Solving security challenges
The increased use of COTS devices capable of information storage in mil-aero applications and environments has driven the need for increased security considerations and measures. In response to this need, officials at the NSA/CSS (Central Security Service) launched the NSA/CSS Commercial Solutions Center (NCSC). The NCSC is designed to address “the strategic needs of the NSA/CSS and the national security community by harnessing the power of U.S. commercial technology."
Concurrently, officials at the National Institute of Standards & Technology (NIST) Computer Security Division manage “the certification of solutions for securing less sensitive data via the Federal Information Processing Standards (FIPS) certification process,” Gangopadhyay says.
Four major defense and aerospace programs have adopted data-at-rest products from Curtiss-Wright Controls Electronic Systems. Among them are the company’s 3U VPX Flash Storage Module and half-ATR Compact Network Storage (CNS) rugged file server for airborne and ground vehicle DAR applications. “Critical to these programs was the NIST FIPS 140-2 certified encryption technology,” Bohman explains.
“Devices such as tablets and tactically deployed computers in Army vehicles, which will be enormous in number, can use [FIPS] techniques. For handling data at a classification beyond Secret or that needs to be secured for a longer time, Type 1 methods will continue to be used.”
Curtiss-Wright’s CNS is incorporated in the avionics on C-130J aircraft.
Curtiss-Wright’s CNS is incorporated in the avionics on C-130J aircraft.
Airborne applications
Lockheed Martin Aeronautics personnel in Marietta, Ga., have selected Vortex Compact Network Storage (CNS) subsystems from Curtiss-Wright Controls for the C-130J Super Hercules airlifter program. The initial order, placed last month, is valued at $800,000, with a potential lifetime contract value of roughly $7.5 million.
Curtiss-Wright’s Vortex CNS will serve as the network file server in the U.S. Air Force Air Combat Command’s MC-130J special mission aircraft, as well as the Air Force Special Operations Command’s HC-130J personnel recovery aircraft. The new HC/MC-130J Super Hercules extended-range transport aircraft are designed for special missions, including search and rescue (SAR) and combat search and rescue (CSAR).
The rugged, conduction-cooled Vortex CNS network attached storage device enables critical data to be shared over the aircraft’s internal network. The solution, designed to optimize file sharing in military platforms deployed in harsh environments, stores data securely on solid- state memory encrypted with the AES-256 algorithm. Staff at Curtiss-Wright Controls Electronic Systems are designing the CNS in Dayton, Ohio, and manufacturing the subsystems in Littleton, Mass.
Expense at issue
“In today’s environment of defense budget cuts, we see a trend to lower security requirements,” Gangopadhyay relays. “Further, not many low-cost solutions for data storage security will also satisfy DOD needs.
“The situation is temporary and, in the longer term as more ‘good enough’ solutions are developed, every data storage device—even for unclassified data—will be secured via encryption,” Gangopadhyay continues. Already, in the unclassified laptops of military and DOD contract personnel, as well as those of some commercial companies, the hard drives are software-encrypted to protect sensitive data.
As encryption technology is increasingly applied to data-at-rest protection problems, new, better, and faster products will emerge, predicts Bohman. “As important, the market will become more educated on all the issues involved and, hence, make better decisions about the cryptographic characteristics required to protect sensitive information from compromise, and not interfere with the performance of the mission.”
Curtiss-Wright’s XMC/PMC-552 is an example of a high-performance security encrypted solid-state drive for rugged military applications.
Curtiss-Wright’s XMC/PMC-552 is an example of a high-performance security encrypted solid-state drive for rugged military applications.
In the cloud
With military organizations under pressure to do more with less, secure data storage in cloud computing is becoming more and more popular, says Pete Stoneberg, deputy chief information officer, Government Cloud, RightNow Technologies in Bozeman, Mont. (Oracle Corp. in Santa Clara, Calif., is acquiring RightNow Technologies.)
“Cloud-based knowledge management systems not only reduce costs for the Department of Defense at a time when they are experiencing severe budget cuts, but they ensure consistency of information, increase uptime and system availability, and enable shorter implementation times and exceptional scalability,” Stoneberg continues. “For military organizations, meeting security requirements and accreditation standards are essential to providing usable information storage solutions.”
RightNow’s defense-ready hosting capabilities conform to DOD security requirements, enabling the DOD to reap the cost-saving benefits of a secure cloud, says Stoneberg. The RightNow Secure Government Cloud uses the DOD Information Technology Security Certification and Accreditation Process and the DOD Information Assurance Certification and Accreditation Process to ensure compliance with DOD Instruction 8500.2 and U.S. Federal security standard Federal Information Security Management Act (FISMA) NIST 800-53.
U.S. Air Force Personnel Center (AFPC) managers sought to improve the accessibility and consistency, while maintaining the security, of personnel information for members of the Air Force. AFPC officials found their solution at RightNow Technologies, employing multiple components of the RightNow CX suite. They also converted from an on-premise solution to a hosted, Software as a Service (SaaS) model using RightNow’s secure Department of Defense Cloud.
“For the more than 1.5 million active-duty military personnel serving overseas, defending our nation is a 24/7 job. To serve these customers, the DOD will increasingly need to implement multi-channel contact center and Web self-service solutions that allow warfighters to promptly access accurate information at any time from anywhere in the world,” Stoneberg explains. “We see secure software solutions becoming more prevalent for federal government and military agencies alike.”
RightNow CX replaced AFPC’s previous case and knowledge management systems, described as old, outmoded, and poorly integrated. The initial priority was to create a secure Web environment with a user-friendly interface. Recent and significant staff reductions also drove the need for a more efficient system.
“Given the lack of functional personnel in the field due to recent reductions, we needed to get more efficient, and the Web quickly became a critical component in our strategy,” says Captain Michelle Richards, AFPC customer relationship management operations chief. The AFPC, using RightNow CX, reduced the average customer inquiry time from 20 minutes to two minutes, while increasing utilization of the Web knowledge base from 180,000 to 2 million hits per week. The system modernization enables Air Force personnel to dedicate more time to accomplishing missions, rather than spending time hunting for personnel data or performing in-person personnel actions.
Security without sacrifice
Performance is paramount in defense and aerospace applications, and as important as security. Mil-aero personnel, applications, and budgets increasingly require robust systems that meet strict size, weight, power, and cost (SWaP-C) limitations. Robert Day, vice president of marketing at LynuxWorks Inc. in Santa Barbara, Calif., sees “more consolidation, more security requirements, more mobile devices, and more multi-use systems using more standard hardware and software solutions to reduce costs and increase performance.” LynuxWorks offers its LynxSecure Type 1 embedded hypervisor and separation kernel, to enable this next generation of system without compromising performance or security.
“Taking advantage of modern multi-core hardware with secure virtualization, like LynxSecure, allows tactical systems to consolidate from multiple physical systems to multiple secure virtual systems,” Day explains. It saves size, weight, and power for deployed systems without compromising security, as well as allows for the redeployment of multiple legacy software systems onto new hardware platforms without compromising security.
Day sees the requirement to use “standard” hardware and operating systems in tactical deployments, such as Google Android-based smartphones on the battlefield and Microsoft Windows- and Linux-based systems on standard laptop or desktop systems. “Using secure virtualization, commodity hardware and software solutions can be used, but with protection for both sensitive data and applications, as they can be isolated from one another.”
Consolidation and COTS adoption, as well the growing use of encryption to protect data stored on mobile computers, are all recent trends that call for “extra security without compromising on the performance or usability of systems,” Day affirms. Secure information storage challenges typically associated with legacy systems, the use of commercial systems, and the hosting data and personnel having different security levels and clearances on a single system can be met by using high-performance, secure software virtualization combined with modern multi-core hardware, he continues.
Engineers at LynuxWorks and Wave Systems in Lee, Mass., are collaborating on the use of self-encrypting drives (SEDs) with the LynxSecure separation kernel and hypervisor for running multiple operating systems simultaneously on a single endpoint. The solution links individual encrypted disk bands to different secure virtual domains provided by LynxSecure running on a single device.
Portable and mobile
The use of portable and mobile endpoints increase the risk of data compromise; yet, the collaborative use of SEDs and secure virtualization on an endpoint offers protection, says a LynuxWorks representative. “SEDs are a better option than traditional software encryption for protecting data when using virtualization on an endpoint, given that the encryption is ‘built in’ to the drive itself. Multi-banded SEDs feature separate bands on the disk, with each band separately encrypted for storing data with separate levels of security or sensitivity on a single system.”
An end-point device linked to secure virtualization enables multiple virtual machines on a single physical machine, enabling different operating systems and applications to run simultaneously. “Each OS and application set is held in its own secure partition, and the data for each is protected using encrypted drive bands with different encryption keys per partition,” Day explains. “This provides a true secure multi-use/multi-security level system housed in an industry standard endpoint.”
“The LynxSecure separation kernel and hypervisor is helping to bring new levels of protection to sensitive data held on portable endpoint devices,” says Robert Thibadeau, chief scientist/senior vice president at Wave.
The secure data storage needs of mil-aero organizations and end users are unlikely to subside as time wears on; rather, professionals will likely require greater access to data at an increasingly rapid pace on more robust, compact systems. Mil-aero technology firms are luckily working to deliver on future needs and demands.
Not much after hours action, why?
WAVX
Edit Symbol List Save my stocks for next time Investor Tools
Find and Monitor
» Guru Screener/Analysis
» Heatmaps
» Stock Screener
» Stock Widget Tools for WAVX
» Analyst Info
» Insider Holdings Summary
» Stock Consultant
» Stock Report
» Stock Comparison Tracking Tools
Select a tool to begin tracking your stock.
» Portfolio Tracking
» Ticker
» Alerts Newsletter Tools
NASDAQ.com Newsletters are available now. Topics include “NASDAQ Stocks to Watch” and “NASDAQ Guru Investor” » Click here to Sign Up
» FAQs Real Time NLS Trade Reporting FlashQuotes InfoQuotes Summary Quote Charts Interactive Charts Pre-Market Charts After Hours Charts Revenue / EPS Summary Company Financials - View Competitors - Short Interest Company News Press Releases Company News Press Releases Sentiment Analyst Stock Research Stock Report SEC Filings - Holdings/Insider Summary - Institutional Holdings - Insider Form 4 Equity Options Pre-Market Quotes After Hours Quotes Company Research - StockConsultant Stock Comparison - Guru Analysis Annual Report Historical Quotes Call Transcripts Dividend History Lynch Analysis Graham Analysis Validea Momentum Analysis Fool Analysis Dreman Analysis Zweig Analysis Fisher Analysis OShaughnessy Analysis
Symbol List ViewsFlashQuotesInfoQuotesStock DetailsReal-Time QuotesSummary QuotesAfter Hours QuotesPre-market QuotesHistorical QuotesOptions ChainCHARTSBasic ChartsInteractive ChartsAfter Hour Charts
Pre-market Charts
COMPANY NEWSCompany HeadlinesPress ReleasesSentimentTheStreet.comFool.comSTOCK ANALYSISAnalyst ResearchGuru AnalysisStock ReportCompetitorsStock ConsultantStock ComparisonFUNDAMENTALSCall TranscriptsAnnual ReportFinancialsRevenue/EPSSEC FilingsShort InterestDividend HistoryHOLDINGSOwnership SummaryInstitutional HoldingsInsiders
(SEC Form 4)Edit Symbol ListEnter up to 25 symbols separated by commas or spaces in the text box below. These symbols will be available during your session for use on applicable pages.
Go Now
Clear List Don't know the stock symbol? Use the symbol lookup tool.
Alphabetize the sort order of my symbols
Symbol Lookup
Company News and Commentary for WAVX
Former Novell CEO Robert Frankenberg Joins Board of Security Software Developer Wave Systems
12/21/2011 3:31:00 AM - Market Wire
Cisco, Gemalto, Panasonic Security, Wave Systems, and Alpha Technologies Discuss Security Solutions on SecurityStockWatch.com
12/7/2011 7:01:00 PM - Market Wire
4 Digital Companies Reaping Rewards From Cloud Computing
11/30/2011 1:36:00 PM - Seeking Alpha
Samsung Partners With Wave to Extend Trusted Computing Security by Enabling Its Semiconductor Capabilities in PC, Tablet and Consumer Devices
11/14/2011 3:29:00 AM - Market Wire
MEDIA ADVISORY: Wave to Showcase Trusted Computing Innovations Alongside Samsung at CARTES 2011
11/14/2011 3:28:00 AM - Market Wire
Read more WAVX News & Commentary
Subscribe
Wave Systems Corp. (WAVX) After Hours Trading Pre-Market Charts | After Hours Charts Dec. 21, 2011 Market Close: $ 2.19 After Hours Last:
Net / % Change $ 2.19
unch (unch) After Hours High: $ 2.19
After Hours Volume: 2,994 After Hours Low: $ 2.155
Learn more about the After-Hours trading session. Trade Detail
After Hours
Time (ET) After Hours
Price After Hours
Share Volume
16:36 $ 2.19 1,394
16:04 $ 2.155 1,600
Read more: http://www.nasdaq.com/symbol/wavx/after-hours#ixzz1hDbM17t1
'dig'
Did you forget to mention the financing in 2000 which raised $122 million using 3.4 million shares?
It's all just history at this point, I'm more interested in the future! JMHO
Wavxmaster
TPT
I accumulated a little today!! Only another 500 shares.
Mrs Wavxmaster is as disgusted with me as am I of the share price!
That disgust will dissipate as Waves' share price increases, I hope! ; )
Couldn't resist the sale price, $2.15!
Good luck to all of us.
Wavxmaster
'PC'
A little continuation in after hours at the days high!!
Wavxmaster
Wave Systems Corp. (WAVX) After Hours Trading Pre-Market Charts | After Hours Charts Dec. 20, 2011 Market Close: $ 2.22 After Hours Last:
Net / % Change $ 2.22
unch (unch) After Hours High: $ 2.22
After Hours Volume: 24,241 After Hours Low: $ 2.195
Learn more about the After-Hours trading session. Trade Detail
After Hours
Time (ET) After Hours
Price After Hours
Share Volume
16:39 $ 2.22 5,643
16:34 $ 2.22 17,490
16:23 $ 2.22 208
16:07 $ 2.195 900
Read more: http://www.nasdaq.com/symbol/wavx/after-hours#ixzz1h7BhHsT3
Interesting close!!
NLS Time (ET) NLS Price NLS Share Volume
16:00:04 $ 2.22 1,464
16:00:04 $ 2.22 886
16:00:04 $ 2.22 121
16:00:04 $ 2.22 200
16:00:04 $ 2.22 1,268
16:00:04 $ 2.22 100
16:00:04 $ 2.22 235
16:00:04 $ 2.22 100
16:00:04 $ 2.22 750
16:00:04 $ 2.22 100
16:00:04 $ 2.22 500
16:00:04 $ 2.22 500
16:00:04 $ 2.22 17,100
16:00:04 $ 2.22 10,000
16:00:04 $ 2.22 12,000
16:00:04 $ 2.22 200
16:00:04 $ 2.22 200
16:00:04 $ 2.22 600
16:00:04 $ 2.22 500
16:00:04 $ 2.22 300
16:00:04 $ 2.22 600
16:00:04 $ 2.22 100
16:00:04 $ 2.22 2,265
16:00:04 $ 2.22 1,389
16:00:04 $ 2.22 600
16:00:04 $ 2.22 4,270
16:00:04 $ 2.22 9,406
16:00:04 $ 2.22 288
16:00:04 $ 2.22 3,017
16:00:04 $ 2.22 3,011
16:00:04 $ 2.22 700
16:00:04 $ 2.22 562
16:00:04 $ 2.22 900
16:00:04 $ 2.22 35,968
16:00:04 $ 2.22 4,270
16:00:04 $ 2.22 257
16:00:04 $ 2.22 599
16:00:04 $ 2.22 360
16:00:04 $ 2.22 100
16:00:04 $ 2.22 100
16:00:04 $ 2.22 100
16:00:00 $ 2.22 2,650
16:00:00 $ 2.22 59,354
15:59:59 $ 2.22 300
15:59:59 $ 2.22 270
Read more: http://www.nasdaq.com/symbol/wavx/time-sales#ixzz1h6wPf65H
'bridgebuilder'
That's 300 shares! When/if Wave gets to $20, those will surely be expensive seats! $6000.00 OUCH
Wavxmaster
Dec. 19, 2011 Market Close: $ 2.10 After Hours Last:
Net / % Change $ 2.10
unch (unch) After Hours High: $ 2.142
After Hours Volume: 23,426 After Hours Low: $ 2.10
Learn more about the After-Hours trading session. Trade Detail
After Hours
Time (ET) After Hours
Price After Hours
Share Volume
16:30 $ 2.10 13,595
16:30 $ 2.10 3,231
16:04 $ 2.142 6,600
Read more: http://www.nasdaq.com/symbol/wavx/after-hours#ixzz1h1Ig5nQh
A little pre market, 200 shares, also a nice bid
Bid: 2.14 x16,200
Last: 2.15 Change: +0.010 (+0.47%)
Wavxmaster
Wave Systems Corp. (WAVX) After Hours Trading Pre-Market Charts | After Hours Charts Dec. 15, 2011 Market Close: $ 2.15 After Hours Last:
Net / % Change $ 2.15
unch (unch) After Hours High: $ 2.15
After Hours Volume: 18,477 After Hours Low: $ 2.133
Learn more about the After-Hours trading session. Trade Detail
After Hours
Time (ET) After Hours
Price After Hours
Share Volume
16:55 $ 2.15 2,331
16:26 $ 2.15 15,446
16:05 $ 2.133 700
Read more: http://www.nasdaq.com/symbol/wavx/after-hours#ixzz1geQysGv7
Weby
Most likely the journalist would still get it wrong, saying there were holes in the security and the doughnuts were fooly proofed! ; )
Wavxmaster
'remote control'
Have you followed Dabears4 posting history?
Perhaps you should! He's contributed more than most.
Wavxmaster
http://investorshub.advfn.com/boards/Profile.aspx?user=23837
Dec. 13, 2011 Market Close: $ 2.23 After Hours Last:
Net / % Change $ 2.23
After Hours High: $ 2.284
After Hours Volume: 37,925 After Hours Low: $ 2.23
Learn more about the After-Hours trading session. Trade DetailAfter Hours
Time (ET) After Hours
Price After Hours
Share Volume
17:12 $ 2.23 2,324
16:51 $ 2.23 12,972
16:22 $ 2.23 19,829
16:02 $ 2.284 2,600
16:00 $ 2.24 200
Read more: http://www.nasdaq.com/symbol/wavx/after-hours#ixzz1gSLw2rp4
Looking for a minimum $2.37 close, which is the 50 day EMA!!
Wondering how much volume will we see at the close?
Wavxmaster
'jd'
Page 26
Make and Use More Trustworthy Cyber Protocols, Products, Services,
Configurations, and Architectures
12. Reduce Vulnerabilities: Design, build, and operate information and communication
technology to specifically reduce the occurrence of exploitable weaknesses. Enable technology
to sense, react to, and communicate changes in its security or its surroundings in a way that
preserves or enhances its security posture.
Core capabilities for the homeland security enterprise are:
• Leadership in bodies and forums that develop international standards.
• Widespread adoption of security-enabled software and hardware by end-users.
• Guidelines and best practices for incorporating security into the system development
lifecycle.
• Security product evaluation or validation regimes.
• Fundamental research to advance technology and drive the development of standards.
• Innovation in the commercial market enabling the design of new technology to address
emerging threats and attack attribution.
• More agile acquisition processes that specify requirements for more trustworthy products
and services and incorporate supply chain best practices that are competitive, timely, and
promote innovation.
There are 1000 July $5 calls bid at $.20!!
Wavxmaster
Dec. 12, 2011 Market Close: $ 2.22 After Hours Last:
Net / % Change $ 2.22
unch (unch) After Hours High: $ 2.22
After Hours Volume: 21,814 After Hours Low: $ 2.186
Learn more about the After-Hours trading session. Trade DetailAfter Hours
Time (ET) After Hours
Price After Hours
Share Volume
16:42 $ 2.22 665
16:25 $ 2.22 663
16:25 $ 2.22 18,886
16:06 $ 2.186 1,600
Read more: http://www.nasdaq.com/symbol/wavx/after-hours#ixzz1gMMWYy5X
Awk
In connection with the sales of the Class A common stock, the selling stockholders may enter into hedging transactions with broker-dealers or other financial institutions which in turn may:
· engage in short sales of the Class A common stock in the course of hedging their positions;
· sell the Class A common stock short and deliver the Class A common stock to close out short positions;
· loan or pledge the Class A common stock to broker-dealers or other financial institutions that in turn may sell the Class A common stock;
PLAN OF DISTRIBUTION
Wave is registering the Class A common stock covered by this prospectus to permit selling stockholders to conduct public secondary trading of such Class A common stock from time to time after the date of this prospectus. We will not receive any of the proceeds of the sale of the Class A common stock offered by this prospectus. The aggregate proceeds to the selling stockholders from the sale of the Class A common stock will be the purchase price of the Class A common stock less any discounts and commissions. A selling stockholder reserves the right to accept and, together with their agents, to reject, any proposed purchases of Class A common stock to be made directly or through agents.
As described above under “Selling Stockholders — Relationships between Selling Stockholders and Us”, all of the shares issuable to certain recipients of the Liquidation Payment (410,355 shares in total) were deposited with a trust agent, as part of an arrangement to satisfy withholding taxes on the issuance on those shares. Participants may have their shares released from deposit with the trust agent by funding the applicable withholding amount in cash. To the extent that participants do not make that election, the escrow agent has been instructed to sell approximately 60 percent of the remaining shares over the 3 to 4 trading day period after the registration statement of which this prospectus is a part becomes effective and to use the proceeds of those sales to satisfy withholding tax requirements. In addition, shares issuable to certain former shareholders and lenders of Safend Ltd. who are subject to Israeli withholding requirements (1,844,122 shares in total) were deposited with a trust agent, as part of an arrangement to defer withholding taxes on the issuance of those shares, pursuant to an interim ruling obtained from the Israel Tax Authority and in anticipation of further tax rulings currently being sought. Participants may have their shares released from such deposit with the trust agent by funding the applicable withholding amount in cash or upon presentation of a ruling or other certificate exempting from Israeli withholding requirements. We understand that all of these participants have applied for, and are awaiting issuance of, such a ruling or certificate. In the event that such rulings or certificates are not obtained, the trust agent will sell an appropriate number of shares to cover the tax withholding liability on shares that were received by such participants in respect of loans made to Safend Ltd. upon the later of (a) November 15, 2011 (or any extension approved by the ITA) or (b) the third trading day after the date on which the Registration Statement becomes effective. With respect to such Participants whose shares have been issued in consideration for shares of Safend Ltd. the escrow agent will hold or release such shares in accordance with the terms of the interim ruling until issuance of a definitive ruling (and in accordance with its terms) or until expiration of the interim ruling on December 31, 2011 (unless extended by the Israel Tax Authority). Except for the shares that
13
Table of Contents
may be sold by the trust agent, to our knowledge, there are currently no plans, arrangements or understandings between any selling stockholders and any underwriter, broker-dealer or agent regarding the distribution of the Class A common stock covered by this prospectus by the selling stockholders. When and if we are notified by the selling stockholders that any material arrangement has been entered into with a broker-dealer or underwriter for the sale of a material portion of the shares covered by this prospectus, Wave will file a prospectus supplement or post-effective amendment to the registration statement with the SEC that will contain information regarding the material arrangement.
The Class A common stock offered by this prospectus may be sold or otherwise distributed from time to time:
· directly by the selling stockholders and their successors, which include their donees, pledgees or transferees or their successors-in-interest, or
· through underwriters, broker-dealers or agents, who may receive compensation in the form of discounts, commissions or agent’s commissions from the selling stockholders or the purchasers of the Class A common stock (these discounts, concessions or commissions may be in excess of those customary in the types of transactions involved).
The selling stockholders and any underwriters, broker-dealers or agents who participate in the sale or distribution of the Class A common stock may be deemed to be “underwriters” within the meaning of the Securities Act. The selling stockholders from time to time identified as or affiliated with registered broker-dealers participating in the sale or distribution of the Class A common stock from time to time are deemed to be underwriters with respect to securities sold by them pursuant to this prospectus. As a result, any profits on the sale of the securities by such selling stockholders and any discounts, commissions or agent’s commissions or concessions received by any such broker-dealer or agents may be deemed to be underwriting discounts and commissions under the Securities Act. Selling stockholders who are deemed to be “underwriters” within the meaning of Section 2(11) of the Securities Act will be subject to prospectus delivery requirements of the Securities Act. Underwriters are subject to certain statutory liabilities, including, but not limited to, Sections 11, 12 and 17 of the Securities Act.
The Class A common stock may be sold in one or more transactions at:
· fixed prices;
· prevailing market prices at the time of sale;
· prices related to such prevailing market prices;
· varying prices determined at the time of sale; or
· otherwise negotiated prices or without cash consideration.
These sales may be effected in one or more transactions:
· on any national securities exchange or quotation on which the Class A common stock may be listed or quoted at the time of the sale;
· in the over-the-counter market;
· in transactions other than on such exchanges or services or in the over-the-counter market;
· through the writing of options, whether such options are listed on an options exchange or otherwise;
· ordinary brokerage transactions and transactions in which the broker-dealer solicits purchasers;
· block trades in which the broker-dealer will attempt to sell the shares as agent but may position and resell a portion of the block as principal to facilitate the transaction;
14
Table of Contents
· sales “at the market” to or through a market maker or into an existing trading market, on an exchange or otherwise, for the shares;
· purchases by a broker-dealer as principal and resale by the broker-dealer for its account;
· an exchange distribution in accordance with the rules of the applicable exchange;
· privately negotiated transactions;
· through the settlement of short sales;
· broker-dealers may agree with the selling stockholder to sell a specified number of shares at a stipulated price per share;
· through dividends or other distributions made by selling stockholders to their respective partners, members or stockholders;
· through any combination of the foregoing; or
· any other method permitted pursuant to applicable law.
These transactions may include block transactions or crosses. Crosses are transactions in which the same broker acts as an agent on both sides of the trade.
In connection with the sales of the Class A common stock, the selling stockholders may enter into hedging transactions with broker-dealers or other financial institutions which in turn may:
· engage in short sales of the Class A common stock in the course of hedging their positions;
· sell the Class A common stock short and deliver the Class A common stock to close out short positions;
· loan or pledge the Class A common stock to broker-dealers or other financial institutions that in turn may sell the Class A common stock;
· enter into option or other transactions with broker-dealers or other financial institutions that require the delivery to the broker-dealer or other financial institution of the Class A common stock, which the broker-dealer or other financial institution may resell under the prospectus; or
· enter into transactions in which a broker-dealer makes purchases as a principal for resale for its own account or through other types of transactions.
The Class A common stock may be offered to the public either through underwriting syndicates represented by one or more managing underwriters or directly by one or more of such firms. The obligations of underwriters or dealers to purchase the Class A common stock offered will be subject to certain conditions precedent and the terms of any agreement entered into with the underwriters. Any public offering price and any discount or concession allowed or reallowed or paid by underwriters or dealers to other dealers may be changed from time to time.
Wave’s Class A common stock is listed on the NYSE under the symbol “WAVX.”
There can be no assurance that any selling stockholder will sell any or all of the Class A common stock under this prospectus. Further, we cannot determine whether any such selling stockholder will transfer, devise or gift the Class A common stock by other means not described in this prospectus. In addition, any Class A common stock covered by this prospectus that qualifies for sale under Rule 144 of the Securities Act may be sold under Rule 144 rather than under this prospectus. The Class A common stock covered by this prospectus may also be sold to non-U.S. persons outside the U.S. in accordance with Regulation S under the Securities Act rather than under this prospectus. The Class A common stock may be sold in some states only through registered or licensed brokers or dealers. In addition, in some states the Class A common stock
15
Table of Contents
may not be sold unless it has been registered or qualified for sale or an exemption from registration or qualification is available and complied with.
The selling stockholders and any other person participating in the sale of the Class A common stock will be subject to the Exchange Act. The Exchange Act rules include, without limitation, Regulation M, which may limit the timing of purchases and sales of any of the Class A common stock by the selling stockholders and any other such person. In addition, Regulation M may restrict the ability of any person engaged in the distribution of the Class A common stock to engage in market-making activities with respect to the particular Class A common stock. This may affect the marketability of the Class A common stock and the ability of any person or entity to engage in market-making activities with respect to the Class A common stock.
Underwriters, dealers or agents may be authorized to solicit offers by certain institutional investors to purchase the Class A common stock from the selling stockholders pursuant to contracts providing for payment and delivery at a future date. Institutional investors with which these contracts may be made include, among others:
· commercial and savings banks;
· insurance companies;
· pension funds;
· investment companies; or
· educational and charitable institutions.
Wave has agreed to indemnify the selling stockholders against certain liabilities, including liabilities under the Securities Act.
Wave has agreed to pay substantially all of the expenses incidental to the registration, offering and sale of the Class A common stock to the public, including the payment of federal securities law and state blue sky registration fees, except that Wave will not bear, among other things, fees, discounts or commissions or transfer taxes relating to the sale of the Class A common stock.
Awk
I have an idea of what has been rumored about the timeline, but I still like to read it by those much smarter than I!!
If the timeline started with the September2011 NSA Trusted Computing Conference, than we are definitely on our way!
Perhaps I should concentrate on the July $2.50 calls! ; )
Wavxmaster
'weets'
Great stuff!!
Only 1 questions remains, the timeline going forward!
Wavxmaster
-Cyber attacks could wreck world oil supply
By Daniel Fineren
DOHA, Dec 8 (Reuters) - Hackers are bombarding the world's computer controlled energy sector, conducting industrial espionage and threatening potential global havoc through oil supply disruption.
Oil company executives warned that attacks were becoming more frequent and more carefully planned.
"If anybody gets into the area where you can control opening and closing of valves, or release valves, you can imagine what happens," said Ludolf Luehmann, an IT manager at Shell Europe's biggest company .
"It will cost lives and it will cost production, it will cost money, cause fires and cause loss of containment, environmental damage - huge, huge damage," he told the World Petroleum Congress in Doha.
Computers control nearly all the world's energy production and distribution in systems that are increasingly vulnerable to cyber attacks that could put cutting-edge fuel production technology in rival company hands.
"We see an increasing number of attacks on our IT systems and information and there are various motivations behind it - criminal and commercial," said Luehmann. "We see an increasing number of attacks with clear commercial interests, focusing on research and development, to gain the competitive advantage."
He said the Stuxnet computer worm discovered in 2010, the first found that was specifically designed to subvert industrial systems, changed the world of international oil companies because it was the first visible attack to have a significant impact on process control.
But the determination and stamina shown by hackers when they attack industrial systems and companies has now stepped up a gear, and there has been a surge in multi-pronged attacks to break into specific operation systems within producers, he said.
"Cyber crime is a huge issue. It's not restricted to one company or another it's really broad and it is ongoing," said Dennis Painchaud, director of International Government Relations at Canada's Nexen Inc. "It is a very significant risk to our business."
"It's something that we have to stay on top of every day. It is a risk that is only going to grow and is probably one of the preeminent risks that we face today and will continue to face for some time."
Luehmann said hackers were increasingly staging attack over long periods, silently collecting information over weeks or months before attacking specific targets within company operations with the information they have collected over a long period.
"It's a new dimension of attacks that we see in Shell," he said.
NOT IN CONTROL
In October, security software maker Symantec Corp published a report on a mysterious virus, discovered and named Duqu by Hungary's Laboratory of Cryptography and System Security, that contained a code similar to Stuxnet.
Experts said it appeared to be designed to gather data to make it easier to launch future cyber attacks.
Other businesses can shut down their information technology (IT) systems to regularly install rapidly breached software security patches and update vulnerable operating systems.
But energy companies cannot keep taking down plants to patch up security holes.
"Oil needs to keep on flowing," said Riemer Brouwer, head of IT security at Abu Dhabi Company for Onshore Oil Operations (ADCO).
"We have a very strategic position in the global oil and gas market," he added. "If they could bring down one of the big players in the oil and gas market you can imagine what this will do for the oil price - it would blow the market."
Hackers could finance their operations by using options markets to bet on the price movements caused by disruptions, Brouwer said.
"So far we haven't had any major incidents," he said. "But are we really in control? The answer has to be 'no'."
Oil prices usually rise whenever tensions escalate over Iran's disputed nuclear programme - itself thought to be the principal target of the Stuxnet worm and which has already identified Duqu infections - due to concern that oil production or exports from the Middle East could be affected by any conflict.
But the threat of a coordinated attack on energy installations across the world is also real, experts say, and unlike a blockade of the Gulf can be launched from anywhere, with no U.S. military might in sight and little chance of finding the perpetrator.
"We know that the Straits of Hormuz are of strategic importance to the world," said Stephan Klein of business application software developer SAP.
"What about the approximately 80 million barrels that are processed through IT systems?," said Klein, SAP vice president of oil and gas operations in the Middle East and North Africa.
Attacks like Stuxnet are so complex that very few organisations in the world are able to set them up, said Gordon Muehl, chief security officer at Germany's SAP, but it was still too simple to attack industries over the internet.
Only a few years ago hacking was confined to skilled computer programmers, but thanks to online video tutorials, breaking into corporate operating systems is now a free for all.
"Everyone can hack today," Shell's Luehmann said. "The number of potential hackers is not a few very skilled people -- it's everyone." (Editing by William Hardy)
'Dabears4'
Thanks for spelling it out further!!
Wavxmaster
'waveytrain'
The price of Waves' shares during the last reporting period wer quite a bit higher than the $2.00 area. Notice how the closing ,during that reporting period, was near the low of the day! Wave started Nov 15th @ above $2.60. I guess 420,000 shares shorted really help drive down the shareprice!
Below see the price decline between Nov 15th - Nov 30th:
http://bigcharts.marketwatch.com/advchart/frames/frames.asp?show=&insttype=Stock&symb=wavx&time=4&startdate=1%2F4%2F1999&enddate=12%2F5%2F2011&freq=1&compidx=aaaaa%3A0&comptemptext=&comp=none&ma=0&maval=10&uf=0&lf=1&lf2=0&lf3=0&type=2&style=320&size=3&timeFrameToggle=false&compareToToggle=false&indicatorsToggle=false&chartStyleToggle=false&state=11&x=37&y=12
Wavxmaster
PS One good PR will erase that decline! Also, the shorts still have to close their position! ; )
After Hours
Dec. 9, 2011 Market Close: $ 2.18 After Hours Last:
Net / % Change $ 2.18
unch (unch) After Hours High: $ 2.18
After Hours Volume: 31,038 After Hours Low: $ 2.13
Learn more about the After-Hours trading session. Trade DetailAfter Hours
Time (ET) After Hours
Price After Hours
Share Volume
16:33 $ 2.18 27,833
16:05 $ 2.13 1,900
16:00 $ 2.18 996
16:00 $ 2.18 309
Read more: http://www.nasdaq.com/symbol/wavx/after-hours#ixzz1g4mzKe1u
Short Interest up 426,105 shares!!
Today, 134,000 shares traded in final 15 minustes, almost 1/2 of todays volume!
Wave Systems Corp. (WAVX) Short Interest
WAVX
Wave Systems Corp.NASDAQ-CM
Settlement Date Short Interest Avg Daily Share Volume Days To Cover
11/30/2011 9,706,296 358,656 27.062968
11/15/2011 9,280,191 335,666 27.647099
10/31/2011 8,240,919 467,843 17.614710
Read more: http://www.nasdaq.com/symbol/wavx/short-interest#ixzz1g4duwi2S
'New Wave'
And some not so "knowledgeable" people! ; )
Wavxmaster
PS Thanks for keeping us updated!
'Maynard'
NASDAQ Last Sale (NLS) Intraday Trade History:
Wave Systems Corp. (WAVX)
The NASDAQ Last Sale Intraday Trade History Report shows real-time time and sales data for all of your favorite U.S. stocks (listed on NASDAQ, NYSE, and AMEX).
Select time range to see more trades:
Wave Systems Corp.
NLS Time (ET) NLS Price NLS Share Volume
16:00:17 $ 2.01 41,609
16:00:16 $ 2.01 100
16:00:16 $ 2.01 100
16:00:16 $ 2.01 100
16:00:14 $ 2.01 300
16:00:14 $ 2.01 300
16:00:10 $ 2.01 100
16:00:04 $ 2.01 600
16:00:04 $ 2.01 6,771
16:00:04 $ 2.01 1,387
16:00:04 $ 2.01 2,800
16:00:04 $ 2.01 1,400
16:00:04 $ 2.01 349
16:00:04 $ 2.01 1,044
16:00:04 $ 2.01 235
16:00:04 $ 2.01 800
16:00:04 $ 2.01 400
16:00:04 $ 2.01 277
16:00:04 $ 2.01 1,128
16:00:04 $ 2.01 5,076
16:00:04 $ 2.01 30,738
16:00:04 $ 2.01 1,462
16:00:04 $ 2.01 467
16:00:04 $ 2.01 3,810
16:00:04 $ 2.01 4,100
16:00:04 $ 2.01 832
16:00:04 $ 2.01 1,200
16:00:04 $ 2.01 100
16:00:04 $ 2.01 100
16:00:04 $ 2.01 1,000
16:00:04 $ 2.01 200
16:00:04 $ 2.01 200
16:00:04 $ 2.01 200
16:00:04 $ 2.01 7,224
16:00:04 $ 2.01 200
16:00:04 $ 2.01 500
16:00:04 $ 2.01 400
16:00:04 $ 2.01 1,200
16:00:04 $ 2.01 107
16:00:04 $ 2.01 600
16:00:04 $ 2.01 100
16:00:04 $ 2.01 2,292
16:00:00 $ 2.01 2,106
16:00:00 $ 2.01 1,579
16:00:00 $ 2.01 41,609
15:59:59 $ 2.01 200
15:59:59 $ 2.01 722
15:59:59 $ 2.015 100
15:59:59 $ 2.015 100
15:59:59 $ 2.01 100
Read more: http://www.nasdaq.com/symbol/wavx/time-sales#ixzz1fzndjJyI
'alea'
with the "c" = ing cash$$$
Wavxmaster
Interesting how lately there has been quite a lot of after market volume!!
Dec. 7, 2011 Market Close: $ 2.11 After Hours Last:
Net / % Change $ 2.11
unch (unch) After Hours High: $ 2.11
After Hours Volume: 37,171 After Hours Low: $ 2.11
Learn more about the After-Hours trading session. Trade DetailAfter Hours
Time (ET) After Hours
Price After Hours
Share Volume
17:12 $ 2.11 33,840
16:36 $ 2.11 3,331
Read more: http://www.nasdaq.com/symbol/wavx/after-hours#ixzz1ftSgrKTC
'Awk'
Another gem! Check out the date! January 16, 2003
Thanks once again!
Wavxmaster
United States Patent Application 20030014631
Kind Code A1
Sprague, Steven January 16, 2003
Method and system for user and group authentication with pseudo-anonymity over a public network
Abstract
A method of authorizing anonymous access to content by an individual user or a member of an authorized group of users is provided. The method includes receiving a request for access from a user having a persona identifier. Next, a challenge message is generated that includes, at least in part, the persona identifier and verification data, such as pseudo random data. The challenge message is provided to a persona server, which operates as an authentication agent that generates an authentication object extractable only by an individual user or group member. Upon receiving an authentication object from the persona server. The user retrieves decryption data from the persona server. The authentication object is forwarded to the user. If the persona user is authentic, the authentication object packaging is stripped by secure hardware at the user computer using the data from the persona server and the verification data is extracted. Upon receiving and confirming the verification data from the user, the content provider grants the user access to the selected content.
Inventors: Sprague, Steven; (Lenox, MA)
Correspondence Address:
BAKER & BOTTS
30 ROCKEFELLER PLAZA
NEW YORK
NY
10112
Serial No.: 906375
'weets'
Looks as if Wave has a great partner with Samsung!
Samsung Partners with Wave to Extend Trusted Computing Security by Enabling its Semiconductor Capabilities in PC, Tablet and Consumer Devices
Wave Selected to Provide Services, Software and Marketing for New Trusted Computing Security Solutions as Samsung Increases Commitment to Hardware-based Security
Lee, MA — November 14, 2011 — Wave Systems Corp. (NASDAQ:WAVX www.wave.com) announced today an agreement to provide Samsung Electronics with engineering services, consulting, validation and a customized version of Wave’s local management software for Samsung’s Trusted Platform Module (TPM) security chips designed for OEM distribution.
“As businesses worldwide are seeking better security for their critical information and network access, the importance of a fundamental new approach to securing a powerful management infrastructure that ensures only authorized users on known devices are granted access or can execute critical functions has been crucial,” said Dojun Rhee, Vice President of System LSI marketing, Device Solutions, Samsung Electronics. “By combining Wave’s broad expertise/know-how, and strong OEM and enterprise customer relationships in trusted computing with Samsung’s world-leading chip design and manufacturing capabilities, Samsung will provide reliable, competitive trusted computing security chips for our customers.”
“We look forward to providing Samsung’s OEM customers the ability to turn on, manage and leverage the Trusted Platform Module with Wave’s software, to deliver stronger security for end-users and better protection for their critical data,” said Brian Berger, Wave’s Executive Vice President of Marketing and Sales. “Samsung recognizes the power of trusted computing, and this move will empower partners and customers with new, silicon-based means to provide trusted hardware on numerous platform types in the coming years.”
Trusted computing enables organizations to establish a more secure computing environment without compromising functional integrity, privacy or individual rights. The Trusted Computing Group is a not-for-profit organization formed to develop, define and promote open vendor neutral standards for trusted computing building blocks and software interfaces across multiple platforms.
“With billions of handhelds, tablets and slates in the hands of today’s workforce, ensuring that these devices are known and trusted within the organization is paramount,” said Eric Ouellet, Research Vice President at Gartner. “To date, the percentage of attacks against this class of device is relatively small, yet this is likely to change as these kinds of devices are increasingly becoming the primary computing platforms in today’s enterprise environment. Implementing embedded security on these devices is a major step in the right direction and will provide the foundation for preventing tomorrow’s threats and the loss of valuable corporate, employee and customer sensitive data.”
Samsung is a global leader in advanced semiconductor solutions, combining cutting-edge designs, advanced manufacturing processes and quality, and innovative packaging technology to deliver a broad portfolio of semiconductor solutions including security chips for smart cards and NFC-enabled mobile devices.
After market showing:
Bid: 2.23 x31,000 Ask: 2.30 x3,600
Dec. 6, 2011 Market Close: $ 2.22 After Hours Last:
Net / % Change $ 2.22
unch (unch) After Hours High: $ 2.23
After Hours Volume: 16,746 After Hours Low: $ 2.177
Learn more about the After-Hours trading session. Trade DetailAfter Hours
Time (ET) After Hours
Price After Hours
Share Volume
16:29 $ 2.22 436
16:29 $ 2.22 15,210
16:05 $ 2.177 800
16:00 $ 2.23 300
Read more: http://www.nasdaq.com/symbol/wavx/after-hours#ixzz1fnQOtB7V
Wave Systems Corp. (WAVX) After Hours Trading Pre-Market Charts | After Hours Charts Dec. 5, 2011 Market Close: $ 2.24 After Hours Last:
Net / % Change $ 2.24
unch (unch) After Hours High: $ 2.24
After Hours Volume: 53,700 After Hours Low: $ 2.213
Learn more about the After-Hours trading session. Trade DetailAfter Hours
Time (ET) After Hours
Price After Hours
Share Volume
17:19 $ 2.24 45,120
17:18 $ 2.24 7,302
16:30 $ 2.24 628
16:07 $ 2.24 150
16:05 $ 2.213 500
Read more: http://www.nasdaq.com/symbol/wavx/after-hours#ixzz1fhhgTZKG
Keep this in mind when reading the below link:
Wavxmaster
Digital Management and Wave Systems Partner to Deliver Cybersecurity Solutions that Protect Enterprise Devices, Networks and Data
Trusted Computing Market Leaders Align to Provide Compelling Solutions
Bethesda, MD — September 13, 2010 — Digital Management, Inc. (www.digitalmanagement.com), a leading IT solutions and business strategy consulting firm, announced today it has partnered with Wave Systems Corp. (NASDAQ:WAVX; www.wave.com) to deliver comprehensive Trusted Computing solutions to security-conscious government and commercial enterprises.
http://dminc.com/news/dmi_wins_contract_to_operate_and_enhance_hhs_grants.gov_system
DMI Wins Contract to Operate and Enhance HHS Grants.Gov System
Mission Critical Web Application Annually Processes More Than 300,000 Grant Applications for All 26 Federal Grant-making Agencies
Bethesda, MD—November 30, 2011—DMI (www.dminc.com), a leading IT solutions and business strategy consulting firm, today announced that it has won a contract from the U.S. Department of Health and Human Services (HHS) to host, operate, maintain and enhance the agency’s Grants.gov system.
Grants.gov provides a one-stop electronic portal where potential grant recipients can find and apply for Federal grants. The system simplifies grants management, eliminating redundancies, and making transactions with the Government easier, cheaper, quicker and more comprehensible.
Each week, this mission-critical web application receives more than 4 million page views, sends over 1 million email notifications, and processes more than 5,000 grant applications. The Grants.gov program has been relied upon during the recent financial crisis to deliver nearly $210 billion in economic stimulus funds through its contract, grant, and loan programs as part of the American Recovery and Reinvestment Act (ARRA) of 2009.
Under the contract, DMI will provide the ongoing operation, availability, and performance of the Grants.gov system. DMI will also apply leading edge public cloud, analytics, social media and mobile technologies to enhance the functionality, capacity, and availability of the system to meet the expanding expectations of agency and applicant stakeholders. DMI’s new Innovation Center in Washington, D.C. will serve as a sandbox environment to test and pilot new technologies for application to Grants.gov.
“We are honored to have been selected to manage and enhance Grants.gov,” said Jay Sunny Bajaj, DMI’s CEO. “This win is a strong example of the trust our clients place in us to operate some of the world’s most critical systems—with applications that are relied upon by scores of agencies and millions of users. It’s also an affirmation of our leadership in applying advanced technologies to reduce costs while maintaining reliability and enhancing user experience.”