Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
chart dont mean anything anymore, nothing in the way
Very happy with todays outcome, thought we would all be in a bigger hole then we are, brighter days ahead (I HOPE) imo
Added more on the last dip
10 days ago we were at .0037, look at i now .03 and not stoping
i hope this little volume is the start of something
i hope this little volume is the start of something
GDSM up 300% last week from, .005 to .02
do we go to 30 cents on monday???
Another Down Day
MY GOD, look at how fast it come sback up in 8 trades lol
Radian Reports Fourth Quarter and Full Year 2011 Financial Results
Print
Alert
Radian (NYSE:RDN)
Intraday Stock Chart
Today : Thursday 23 February 2012
Radian Group Inc. (NYSE: RDN) today reported a net loss for the quarter ended December 31, 2011, of $121.5 million, or $0.92 per diluted share, which included combined net gains from the change in fair value of derivatives and other financial instruments of $102.2 million and an income tax provision of $65.4 million. This compares to a net loss for the quarter ended December 31, 2010, of $1.1 billion, or $8.55 per diluted share. Net income for the full year 2011 was $302.2 million, or $2.26 per diluted share, which included combined net gains from the change in fair value of derivatives and other financial instruments of $821.7 million. This compares to a net loss of $1.8 billion, or $15.74 per diluted share, for the prior year. The fourth quarter and year ended December 31, 2010, included the establishment of a valuation allowance against the company’s deferred tax asset and significant fair value losses as described below. Book value per share at December 31, 2011, was $8.88.
“Our financial results in the fourth quarter and for the full-year 2011 were impacted by the challenges of our legacy portfolio as well as the macroeconomic environment,” said Chief Executive Officer S.A. Ibrahim. “That said, we believe the credit environment is stabilizing and we remain encouraged by the steady improvement in our number of primary delinquent loans, which declined by 12% from 2010, and by our ability to capture the leading market share of outstanding credit quality business.”
Mr. Ibrahim continued, “Over the past two years, we have taken meaningful actions to improve the financial flexibility and the operating performance of the company. We have positioned Radian with a growing and diversified customer base to capture more high-quality mortgage insurance business. We are off to a strong start in 2012 with $2 billion of new business written in January and a decline in delinquent loans.”
CAPITAL AND LIQUIDITY UPDATE
-
Radian Guaranty’s risk-to-capital ratio was 21.5:1 as of December 31, 2011, compared to 21.4:1 at September 30, 2011, and 16.8:1 at December 31, 2010. A $100 million capital contribution from Radian Group is included in Radian Guaranty’s December 31, 2011, statutory capital position.
-
Radian Group maintains approximately $480 million of currently available liquidity. Earlier today, the company announced the commencement of a “modified Dutch auction” tender offer, to repurchase a portion of its $250 million of debt maturing in February 2013 at a discount to face value.
-
In the event Radian Guaranty is no longer in compliance with the risk-based capital requirements of certain states, the company is preparing to continue writing new business in those states through state-specific waivers or similar relief, or by using Radian Mortgage Assurance Inc. (RMAI), a wholly owned subsidiary of Radian Guaranty. Radian is in the process of finalizing agreements with Fannie Mae and Freddie Mac to use RMAI as an eligible mortgage insurer, subject to certain conditions, and is expecting to announce the details of those agreements in the near term. In addition to the $17 million of existing capital in RMAI, Radian Group will contribute $50 million of additional capital to RMAI in the event that Radian Guaranty were to exceed a 25:1 risk-to-capital level.
FOURTH QUARTER HIGHLIGHTS
• New mortgage insurance written (NIW) increased to $6.5 billion, compared to $4.1 billion in the third quarter and $3.8 billion in the fourth quarter of 2010. In addition, the Home Affordable Refinance Program (HARP) accounted for $656.8 million of insurance not included in Radian Guaranty’s NIW total for the quarter. NIW continued to consist of loans with excellent risk characteristics, and the company held the leading position in the private mortgage insurance industry with an estimated 31 percent market share in the fourth quarter of 2011. Radian wrote an additional $2 billion in NIW in January 2012, compared to $1.1 billion in January 2011.
• The net loss for the fourth quarter was $121.5 million.
-
The net loss was impacted by the pre-tax gain recognized on derivatives and other financial instruments of $102.2 million. The unrealized gain resulted mainly from a widening of Radian’s credit spread that reduced the fair value of the company’s derivative liabilities.
-
The net loss was also impacted by an income tax provision of $65.4 million. The income tax provision is due primarily to a re-measurement of the company’s uncertain tax positions related to its portfolio of REMIC residuals.
-
Results for the comparable fourth quarter and year-ended 2010 periods included a non-cash, GAAP accounting charge of $841.5 million related to establishing a valuation allowance against substantially all of the company’s net deferred tax asset as well as a pre-tax loss from the change in fair value of derivatives and other financial instruments of $237.7 million for the quarter and $770.4 million for the year.
• The mortgage insurance provision for losses was $333.3 million in the fourth quarter of 2011, compared to $426.3 million in the prior-year period. Mortgage insurance loss reserves were approximately $3.2 billion as of December 31, 2011, which was essentially flat to the third quarter of 2011, and down from $3.5 billion as of December 31, 2010. First-lien reserves were $26,007 per primary default as of December 31, 2011, compared to $25,346 as of September 30, 2011, and $23,374 a year ago.
• The total number of primary delinquent loans increased slightly in the fourth quarter compared to the third quarter of 2011, and decreased by 12 percent compared to the fourth quarter of 2010. As the company disclosed last week, the total number of primary delinquencies declined 1 percent from December 2011 to January 2012.
• Mortgage insurance claims paid were $291.6 million ($254.7 million excluding the impact from first-lien terminations), compared to $392.9 million a year ago. For the full-year 2011, total mortgage insurance claims paid were $1.5 billion, compared to $1.3 billion for the year-ended December 31, 2010. The company continues to expect mortgage insurance claims paid of approximately $1.3 billion for the full-year 2012.
• Radian Asset Assurance Inc. continues to serve as an important source of capital support for Radian Guaranty and is expected to continue to provide Radian Guaranty with cash infusions over time.
-
As of December 31, 2011, Radian Asset had approximately $1.0 billion in statutory surplus with an additional $1.2 billion in claims-paying resources.
-
Radian Asset is expected to pay an ordinary dividend of approximately $50 million to Radian Guaranty in 2012.
RECENT EVENT
• As previously disclosed, on January 24, 2012, Radian Asset entered into a three-part transaction with subsidiaries of Assured Guaranty Ltd. that included the commutation of a $13.8 billion portfolio reinsured by Radian Asset; the ceding of $1.8 billion of public finance business; and an agreement to sell Municipal and Infrastructure Assurance Corporation for $91 million, subject to regulatory approval. The transaction is expected to positively impact Radian Asset’s, and thus the primary mortgage insurance subsidiary Radian Guaranty’s, statutory capital in the first quarter of 2012 by $100 million.
CONFERENCE CALL
The company will discuss each of these items in its conference call today, Thursday, February 23, 2012, at 10:00 a.m. Eastern time. The conference call will be broadcast live over the Internet at http://www.radian.biz/page?name=Webcasts or at www.radian.biz. The call may also be accessed by dialing (800) 230-1059 inside the U.S., or (612) 234-9959 for international callers, using passcode 232387 or by referencing Radian.
A replay of the webcast will be available on the Radian website approximately two hours after the live broadcast ends for a period of one year. A replay of the conference call will be available approximately two and a half hours after the call ends for a period of two weeks, using the following dial-in numbers and passcode: (800) 475-6701 inside the U.S., or (320) 365-3844 for international callers, passcode 232387.
In addition to the information provided in the company's earnings news release, other statistical and financial information, which is expected to be referred to during the conference call, will be available on Radian's website under Investors >Quarterly Results, or by clicking on http://www.radian.biz/page?name=QuarterlyResults
if anyone wants in, this is the pullback to get in on
u jinx
you got to love that
9s r here
9s r here
Alexza Prices $22 Million Public Offering
PrintAlert
Alexza (NASDAQ:ALXA)
Intraday Stock Chart
Today : Friday 17 February 2012
Alexza Pharmaceuticals, Inc. (Nasdaq: ALXA), or the Company, today announced that it has priced its previously announced underwritten public offering of 44,000,000 shares of common stock and warrants to purchase 44,000,000 shares of common stock. The common stock and warrants will be issued separately, but will be sold in combination in the offering, with a warrant to purchase one share of common stock for each share of common stock sold. The price to the public for each share and related warrant is $0.50, for an aggregate offering amount of approximately $22 million. The net proceeds to Alexza, after underwriting discounts and commissions and other offering expenses, and assuming the warrants are not exercised, are expected to be approximately $20.4 million. Alexza plans to use the net proceeds from the sale of securities primarily for general corporate purposes, including regulatory, clinical trial, research and development, general and administrative and manufacturing expenses.
The warrants are exercisable at an exercise price of $0.50 per share beginning one year and one day from the date of issuance and will expire on the fifth anniversary of the date of issuance. The offering is expected to close on or about February 23, 2012, subject to customary closing conditions.
JMP Securities LLC is acting as the sole book-running manager in the offering.
The common stock and warrants described above are being offered pursuant to a shelf registration statement on Form S-3 previously declared effective by the Securities and Exchange Commission, or the SEC, on May 20, 2010.
A preliminary prospectus supplement related to the offering was filed with the SEC on February 16, 2012 and is available on the SEC's website located at http://www.sec.gov. A final prospectus supplement related to the offering will be filed with the SEC today. When available, copies of the final prospectus supplement relating to the offering and the accompanying base prospectus may be obtained by contacting JMP Securities LLC, 600 Montgomery Street, 10th Floor, San Francisco, California 94111, Attention: Prospectus Department, (415) 835-8985. A copy of the final prospectus supplement relating to the offering and the accompanying base prospectus may also be accessed on the SEC website, http://www.sec.gov. Before you invest, you should read the final prospectus supplement and the accompanying base prospectus and other documents Alexza has filed or will file with the SEC for more complete information about Alexza and the offering.
This press release shall not constitute an offer to sell or the solicitation of an offer to buy any securities of Alexza nor shall there be any sale of such securities in any state or jurisdiction in which such offer, solicitation or sale would be unlawful prior to registration or qualification under the securities laws of any such state or jurisdiction.
no sale in 15 mins now, whats that about?
Thank a million Lowman, much appreciated, learned alot
Pompis Energy
Do you love Monster Trucks? Now you can see them up close and personal for the price of an empty can of Pompis! The Advanced Auto Parts Monster Jam presented by Pompis Energy will be at Kay Yeager Stadium in Wichita Falls March 2nd and 3rd. You can meet the drivers and take photos with the trucks at the Pompis Party in the Pits by bringing an empty Pompis can from 7-Eleven to be recycled. The party is on Saturday the 3rd from 11:30 am to 1 pm. Hope to see you there!
Taken from there Facebook page
iam holding with you
Omnibus Hearing February 1, 2012
(10:30 a.m. ET)
Omnibus Hearing February 16, 2012
(10:30 a.m. ET)
Confirmation Hearing
> Notice of Confirmation Hearing
February 16, 2012
(9:30 a.m. ET)
Omnibus Hearing March 1, 2012
(10:30 a.m. ET)
Omnibus Hearing March 14, 2012
(10:30 a.m. ET)
prove it
88 mill yesterday, no volume today so far hmmmm
Awesome video, thanks for sharing, hope we hear something soon
Jints is right, iam new to this board, but one thing is for sure, you all need to taake a step back., let be, the way it goes is the way it goes, you all have been wrong about eveything u said today. Just wait and we will all see
Alphatec Spine to Present at the Canaccord Genuity Musculoskeletal Conference
PrintAlert
Alphatec Holdings, Inc. (MM) (NASDAQ:ATEC)
Intraday Stock Chart
Today : Tuesday 31 January 2012
Alphatec Holdings, Inc. (Nasdaq:ATEC), the parent company of Alphatec Spine, Inc., a medical device company that designs, develops, manufactures and markets products for the surgical treatment of spine disorders, with a focus on treating conditions related to the aging spine, today announced it will present at the Canaccord Genuity Musculoskeletal Conference on Tuesday, February 7, 2012 at 2:20 p.m. Pacific Time at the Parc 55 Wyndham Hotel, San Francisco, California.
During such presentation, Michael O'Neill, Alphatec Spine's Chief Financial Officer, will provide a corporate overview of the Company. A live audio webcast of the presentation at the Canaccord Genuity Musculoskeletal Conference will be accessible through the Company's investor relations website at www.alphatecspine.com. An archived edition of the presentation will be available later that day and will be available for at least 30 days afterwards.
Iam very eagar to see tomorrow, I would like to know how many people actually tuned into the interview with Roy. How is this going to get out, how are people going to know about this.
awesome finish
up up up and up
WHat an awesome sign , I hope
i care, lol
Another beautiful day with FBC, I believe it should keep going right thru earnings imo
wow wow wow what is leading this chevy
no reason we cant get another 6% today
Oknpv here is the link i got it from, you determine if it is bs or not, thanks http://www.all-about-security.de/kolumnen/interviews/artikel/13756-
Joseph Souren, VP & GM - Wave Systems EMEA
Joseph Souren
Wave Systems has been around since 1988. When and for what purpose Wave was founded? Who were the founders?
Wave Systems was founded in 1988 and is a publicly traded company since 1994. For 22 years, Wave has experience in the development of IT security solutions in hardware and is a founding and board member of the Trusted Computing Group. In the first years after its founding Wave has a "secure transaction vault" and developed the related technology, with the aim to use it as a commercial portal.
Our CEO Steven Sprague has developed an encryption / encoding that was sold and later became a core element which was, we now know as iTunes. The "vault concept" ("Safe Approach") has many possibilities in the field of IT security opened and has the advantage that it is built into the architecture of a system and not as a layer "set out" is. This is the vision and strategy of Wave. Together with the Trusted Computing Group, we have developed the latest industry standards such as the TPM (Trusted Platform Module), which is installed on 500 million systems worldwide, and the SED (Self Encrypting Drive).
What is the security myth?
In the past 15 years, especially the issues of "compliance" and "integration" that prompted organizations to implement security solutions. To protect each individual layer of the network to be able, developed and sold many vendors called a "layered approach" , composed of different products and is oriented to the "layers" or layers of the OSI model. Was able to each layer of the network are protected. We must not forget that the OSI model was developed for data communication and not even for a public network like the Internet, as it stands today, and certainly not for a reliable IT systems. There must be security at the various layers of functions are introduced, which must be adapted to the circumstances of the respective layers, which once again succeed even less well. If, for example, use multiple services at Layer 4 of the same port can also no simple firewall without "stateful inspection" to filter out the potentially dangerous service. This is a simple example of only one layer. And this applies equally to all seven layers. Because each layer can be the target of attack, and this is always true: The security is only as good as the weakest link in the chain. In summary one can say that much effort is needed, and probably be necessary in the future to protect a network. As an example of how a technology has been affected by the attacks in the real world, the wireless LAN security to call. Attacks on these have contributed to more and more were working on their improvement. In the implementation of security is the OSI model today, unfortunately, still to abused isolated observations to make: are on a layer there is a weak point, so quickly become an authentication or an encryption installed. The result is that a variety of security products applied at the same time. With the use of these products you are then indeed compliant (compliant), has to exist but in no way a chance to attack. And that is exactly what the Security Myth: The use of multiple security products also means just more work and less and less effect . And this effect increases dramatically because right now that we use only the standard PC platforms, new devices such as smart phones, tablets, etc. in large numbers. With every new device must be re-assured that this example not dangerous for the corporate network. Companies spend millions of firewalls, but use PCs with a tamper-proof identity! This is exactly as if at a security checkpoint, the using elaborate X-ray machines and gas chromatographs, but would clean would any car without number plates simple and could it happen, including the driver. The expense with injected into the OSI layered security measures in conjunction with devices such as PCs, smartphones, tablets, etc., you can save yourself, if this no secure identity and integrity provide measurable. They give soothing feeling that superficially compliant (compliant) to be. Yet it soon becomes clear that the defense of the PCs to potential attacks from the real world has not grown. That is, it's just a matter of time before attackers to the company or authority harm. The necessary security technologies and products are already available. They are now only used by a small number of companies and authorities. TPM and SED components, which are now supplied as standard in business PCs. You are not activated, and this has the consequence that the OSI model injected security measures are on shaky ground. Any business or agency loses ultimately a lot of money. In the media reported several violations of data security in a row, as such as network intrusions and data theft. But that is just the tip of the iceberg! Even among the leading vendors that offer supposed "solutions" to the problem, it came several times to security breaches, and they have been hacked repeatedly. This meant that governments were noisy, laws were changed, and exacerbated in the future. The adhesion area of corporate governance has been extended and today's Internet-and white-collar crime takes place on a more advanced level. Gartner, the Trusted Computing Group and the Communications-Electronics Security Group (CESG) - all have announced exactly that, all with the same message for Governments and industry: Think about your safety and integrated approach available industry standards such as TPM and SED by default in your security architecture. SEDs are often understood only as a faster and more stable alternative to software-based disk encryption. But a SED is much more: It is a Trusted Drive, an embedded system that protects itself completely. Furthermore, it precludes tampering with the firmware that provides evidence in court proceedings are not open to doubt. It can be demonstrated, for example, after a theft, if a hard drive was encrypted at the time of the theft really. For today's IT Security leads the way "more of the same" - the use of multiple security products simultaneously - in fact, more and Although more risk, higher costs and more work. By the Trusted Computing Group (TCG) has developed security architecture sets the security myth by TPM and SED finally over.
The Wave Endpoint Monitor will be the industry's first solution to be found with the help of a standard security chip malware and other advanced persistent threats (APT) and defused. This hide undetected in the host systems and target the theft of confidential data by economic, political or strategic value.
What exactly is it?
Wave is the founder of embedded IT security, and our Chief Scientist of the inventor of the Self Encrypting Drive. Our company owns more than 20 years experience as a research company and an innovator. We have many solutions centrally manage and thereby only one thing: real security. But there is also another aspect that is important to us in this context, namely the ease of use.
If you look at the world today, must be protected from all the infrastructure, because it hosts the attacks. It is essential that the available embedded hardware industry standards are used to reduce the total cost of ownership (TCO) and maximize safety. This is very different from today's security solutions that slow down systems and affect the performance. They are as business-blocker vs. Enabler perceived. When Intel finally a vendor-dependent product as an industry wide innovation announced they forgot to announce that Wave already a solution, "the sixth-generation" offers. This is managed centrally and has many additional features, such as a secure VPN from 50 to 100,000 users - - Self-Encrypting Drives, etc. For many years this solution is used by organizations of different sizes, across all industries through. So far we have not yet realized how uncertain our security provisions have been. So far we have used multi-layer products, and thus could only provide "compliance". Until now this has been sufficient, as the legislation in the past, our opinion was a little too loose. The critical infrastructures are being attacked, and yet no one sees that they can defend themselves against these attacks to defend. For years, we look calmly at present, including our IP and in-house expertise will be stolen before our very eyes.
Endpoint Security Monitor utilizes functions of a previously used chips. Dell, HP, Lenovo and integrate the Trusted Platform Module "(TPM) and already have hundreds of millions of systems shipped! Thus, companies must before APTs and other complex threats to be protected. This all sounds very simple, very clear and very clear. It sounds, however, been so clear that it runs the risk of storing these statements in the short-term memory and much too easily as "noted" store. The statement alone raises to dozens of questions! The first and most logical question would be:
"If there are already hundreds of millions of systems have been delivered and are in daily use, then why they are not actively used? If they are used, what the user must then purchase additional products? Is not that redundant? Is it possible that everything has already been included on the chip, but no activation by Dell, HP or Lenovo took place? If so, why?
Embedded Security is not a magic bullet, and will continue already existing protection measures. Nevertheless, the TPMs and SEDs already protect against the latest advanced persistent threats (APT). They also protect data in real time, in the Silicon hardware level of the device. Thus they have a crucial distinguishing feature that can offer many safety features. Applying Waves centralized management and reporting software that enables true data-compliance and the protection can be guaranteed against APT. I wonder now, why would you buy an extra bag and attach it to the steering wheel or some other brakes that only a slow will be? These days but every car has an airbag and even braking. Nobody would buy a car without brakes and airbags, does it? The airbag and the brakes can be compared with the TPM and the SED. And yet everyone buys Software Encryption Solution and tokens can be broken into and they are expensive. This is illogical, because for years is an effective and reliable solution available. When we talk about the contrast between truth and myth, we notice that the people and businesses to wake up slowly. All have now understood that the 'old' strategy does not provide true security. In conjunction with the EU data law and stricter regulations regarding compliance, we have all realized that it was necessary to find a different approach. The old provider 'are now under an obligation to explain why they have sold this myth for 10 years, although the TPMs and SEDs were available long ago. Wave now has over other companies a head start of 20 years, because we are the inventors of this technology.
As we have seen, are TPM and SEDs is essential for the protection of desktops and notebooks. Also have significance for these networks?
PCs today are generally in enterprise networks interconnected. These devices are now unfortunately in many enterprise networks are the Achilles heel of the entire network infrastructure!
The endpoints have two weaknesses: First, the manipulable identity. In a terminal device with manipulable ID you can have no confidence. The second vulnerability is reflected by the identification of the network on its effect on network security. The OSI model is already in itself the justification of the need to use Trusted Devices. OSI describes, such as hubs, switches, routers, servers, and devices such as PCs communicate with each other. To protect these devices, some security mechanisms are used. It is already running, realize the layers two through seven security functions in hardware. This always happens when either a reliable level of security is required or if the slowdown of data transfer must be prevented. As examples we can High Security Modules (HSM) in the form of a plug-in card for a server or Cisco VPN IPSec with hardware encryption engine call, etc. If we consider the connection between a server and the PC via a VPN tunnel, so there is the server on a solid foundation. This can be explained by the construction of a bridge with two piers from each different material explained: On one side is a concrete bridge pillar that supports a bridge made ??of steel. The bridge abutment on the other side, however, consists of unstable material and therefore breaks easily assembled. The stability of the bridge can not therefore be guaranteed. Applying this picture to the OSI model, so can the unstable bridge piers compared to a PC that is not a "Trusted Device", ie neither TPM nor SED are enabled. If the unstable bridge pier now collapsing, the bridge falls together as a whole. Transferred to the OSI model, this means the danger of OSI through a single PC without TPM and SED.
Thus all the security mechanisms are vulnerable to attacks for two to seven layers. Utility companies and authorities in their PCs or TPM SEDs, therefore they threaten not only individual PCs, but the entire network security! Every euro spent on network security - at what level of the OSI model ever - is a waste of money.
Cloud computing is currently "the theme of" par excellence. How Wave Endpoint Monitor behaves in relation to cloud services? What it does, who needs it and what are the benefits?
Cloud computing takes place by definition much more abstract than client-server computing with fat clients. The data are in the "cloud", and as the word implies, is not entirely clear where the "cloud" is. The owner of the data, be it the individual or the company may require that the cloud service provider ensures all means that only the owner can access the data. This knows its PCs and can provide them with a tamper-proof ID TPM. On this PC Wave Endpoint Monitor ensures that no malware creeps who tries to send data from PC to other targets to divert. As mentioned in the OSI model already shown, it is important that the endpoint is a trusted device. TPM is for the hardware component. Wave Endpoint Monitor sets this "root of trust" one, through the integrity measurements and reported to the central server, which then makes decisions on access to the network. The Wave Endpoint Monitor is already in the client-server model is necessary, in the cloud it is vitally necessary, and indeed for the adoption of cloud computing itself.
Wave of the future will run very many vendors, a cold shiver down the back? Who makes it, in your opinion, the hardest?
I can not say whom this paradigm shift in my opinion will meet to see who will or who will catch him adjust. All I can say in my experience in this business is that the sale of the truth will always win the upper hand over the sale of a myth
Flagstar Bancorp Announces Fourth Quarter 2011 Earnings CallLast update: 1/10/2012 5:20:00 PMTROY, Mich., Jan. 10, 2012 /PRNewswire via COMTEX/ -- Flagstar Bancorp, Inc. (FBC) today released instructions for its fourth quarter 2011 earnings call, which will be held on Wednesday, January 25, 2012, from 11 a.m. to noon (ET). The purpose of the call is to discuss fourth quarter and full-year 2011 financial results, which will be released after the market closes on January 24, 2012. Representing the Company on the call will be Joseph P. Campanelli, chairman and CEO, and Paul D. Borja, CFO. To join the call, please dial (866) 834-5823 toll free or (973) 341-3018, and use passcode: 40653036. Please call at least 10 minutes before the call is scheduled to begin. A replay will be available for five business days by calling (855) 859-2056 toll free or (404) 537-3406, and use passcode: 40653036. The conference call will also be available as a live audiocast on the Investor Relations section of flagstar.com. It will be archived on that site and will be available for replay and download. A slide presentation to accompany the conference call will also be posted on the site. Questions may be asked during the conference call or by emailing investors@flagstar.com. Any questions concerning the call should be directed to Bradley T. Howes, investor relations officer, at (248) 312-2000.
Knock Knock