Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
200k shares in the last 10 min moved the share price from 1.26 to 1.34.
Someone either didn't want to be out over the long weekend or traders that shorted at 1.96 didn't want to be short over the long weekend.
Hopefully the Easter Bunny (Bill S) will bring us a golden egg for Monday's open.
Best to all,
toro
Disclaimer - All I did this week was hold. But I'll take the one week change from .95 to 1.34, an increase of .39 or 41% every week forever.
Wavey - I had a small bid in at $1.35 after the day's close of $1.28 and above the day's high of $1.34 - but no takers.
Best,
toro
Wave Cloud for Self-Encrypting Drive Management
http://wave.com/wave-cloud-self-encrypting-drive-management
is a must see and well worth registering at Wave.com's website to view (also a new feature). The video is fantastic. Rich Lee product manager for cloud services at Wave Systems does a great job taking you through the process of setting up cloud management of self-encrypting drives.
Best,
toro
I disagree.......
I think it looks the headline video that many tech CEOs stand in front of at their annual meetings and whip the shareholder faithful into a frenzy - Jobs/Apple....Ballmer/Microsoft...
It is to some extent tongue in cheek while containing a real message "Right now" and engendering broad interest...
although like many things WAVX it seems to evoke a binary reaction - Love/Hate.
Best,
toro
Wave SED success stories
Dig - thanks excellent post....
and as I recall this is the scenario predicted in your doughnut hole posts.
So pretty much as expected, revenue growing, outpaced by expense incurred in anticipation of more rapidly growing revenue.
"This is what a doughnut hole is feels like from the inside".
best,
toro
Lugan.....the company in effect prints new "electronic" shares and through a transfer agent DWACs them to your account electronically. These are new shares that increase the total outstanding share count. The warrant holders send the cash to the company who puts it in the Wave coffers.
So the pressure on the stock price in the short term is WAVX shareholders selling WAVX shares to raise the cash and the longer term pressure is dilution of existing shares.
best,
toro
dig - thanks for yet another cogent analysis.
Best,
toro
Dig - appreciate your many cogent analyses.....
but what remaining warrants?
I was an investor in the last PP that granted warrants (to my knowledge) in March of 2009 and those had an exercise deadline of last Friday as I recall (I purchased mine last month at $.55/share).
best,
toro
Blue - an equivalent share jump would be to $15/share since the IBM/Intel thingy was pre-reverse split (ignoring the increase in shares, increase in short holdings and who knows how many actual shares in the float).
I know if I was short now I would sleep only when the market is closed and have my buys loaded and ready to execute when the market is open.
The shorts are playing for pennies now while risking losing dollars. They got lucky with the Safend purchase and the ATM and are living on borrowed time (shares).
Best,
toro
Blue Fin - from yours
http://www.spaceref.com/news/viewsr.html?pid=40079
NASA Lags Far Behind Other Federal Agencies in Protecting Data on Agency Laptops
Encrypting sensitive data on notebooks and other mobile computing devices is a widely recognized best practice and an action required by the Office of Management and Budget (OMB). However, NASA has been slow to implement full-disk encryption on the notebook computers and other mobile computing devices it provides to its employees, potentially exposing sensitive information to unauthorized disclosure when such devices are lost or stolen. In fact, in its fiscal year (FY) 2010 report to Congress on FISMA implementation, the OMB reported a Government-wide encryption rate for these devices of 54 percent. However, as of February 1, 2012, only 1 percent of NASA portable devices/laptops have been encrypted.
Best,
toro
Jake - very interesting post.
I understand that there external SEDs. I can't recall the specifics, but could an external tpm SED drive be used to get all of those functions in a legacy non-tpm machine.
Best,
toro
Todays action - is related to the "Notice of Effectiveness" S3.
So today some of those Safenders who received Wave stock as payment are able to sell that stock.
So IMO we saw continous shorting and pressure on the shareprice since the Safend deal. Prior to today they had to borrow stock and sell it to get their money and today that group can return the shares borrowed.
There is another group who were unable to find shares to borrow and sell - and that group is selling the their newly "Effective" shares today.
JMHO - ICBW.
Best,
toro
Data Connectors - Wave is at six of their meetings - Seattle, Raleigh, Chicago, San Jose, Houston and the day afte the last one in Salt Lake City Wave is at the RSA show in San Francisco.
About Data Connectors
We are dedicated to producing high-quality annual executive symposiums focusing on driving the future of business in the new age of the digital economy.
As we move forward to a new frontier of Internet growth, technology is revitalizing the business economy faster than ever. Working together with industry leaders, associations, publications and key executives, Data Connectors produces intensive, multilevel conference programs designed to showcase the broad spectrum of new and emerging products and services to solve business challenges.
To successfully capitalize on the enormous opportunities the Internet provides, our high-quality forums, advanced marketing techniques and high caliber speakers ensure that our programs deliver what they promise.
Best,
toro
You better start sugar coating this or else !
I have warrants that I must exercise or not by 3/12.
I had planned to pay for that exorcism by the proceeds from some (when purchased) deep in the money Jan $2.50 leaps.
So, if you don't start blowing some smoke up my dress - I swear I'm gonna pass on supporting the company (as near as I can reckon) for about 40 minutes.
Best to all (tongue firmly in cheek),
toro
Dabears and Bridge - re:Alabama
I thought so too. Maybe it was from a slide at the SHM presentation.
Here's the South Carolina announcement.
http://www.wave.com/news/press_archive/11/110214_SCDOR.asp#
South Carolina Department of Revenue Selects Wave To Protect Taxpayer Information
State Protects Business and Personal Tax Data with Self-Encrypting Drives
Lee, MA — February 14, 2011 — Wave Systems Corp. (NASDAQ:WAVX www.wave.com) today announced that the South Carolina Department of Revenue (SCDOR) has chosen Wave’s EMBASSY® software to manage data security for its fleet of laptops. Agency personnel routinely handle confidential taxpayer data—from property records to social security numbers and tax returns. The state chose self-encrypting drives (SEDs) to ensure this data is always protected, while also giving users significant performance advantages over software encryption.
“The South Carolina Department of Revenue is staying true to its mission of operating in a manner that instills the highest public confidence by selecting what we view as the best encryption solution on the market today,” commented Brian Berger, Wave’s Executive Vice President of Marketing and Sales. “We believe that South Carolina tax payers can feel confident that their state officials have made a good decision in safeguarding their personal data. This deployment of Wave products and SEDs can serve as a blueprint for state agencies looking to upgrade to the strength of hardware encryption.”
The mission of the SCDOR is to impartially administer the revenue and regulatory laws of the state, recommending improvements and providing guidance in fostering compliance with regulatory laws. The agency administers 32 taxes (in addition to alcohol beverage licensing and business registrations), and collects roughly $6.1 billion in annual revenue. The agency is comprised of departments that include Auditing, Collection Services, Human Resources and Legislative Services, among others.
SCDOR ordered both software licenses and accompanying maintenance agreements for Wave’s flagship EMBASSY Remote Administration Server (ERAS). ERAS gives IT the power to turn on each SED in seconds (as opposed to up to 24 hours per PC with software-based encryption), setting security policies and providing detailed event logs to demonstrate that data was fully encrypted if a laptop should become lost or stolen.
The agency was presented with two other encryption options before choosing SEDs with Wave EMBASSY software as the ‘standard build’ on each new employee laptop. Self-encrypting drives can offer greater security and performance over software encryption, as the heavy processing draw of encryption is moved to the hard drive’s independent processor.
Best,
toro
NIST.gov site draft publication
http://csrc.nist.gov/publications/PubsDrafts.html
Dec. 8, 2011
SP 800-155
DRAFT BIOS Integrity Measurement Guidelines
NIST announces the public comment release of NIST Special Publication 800-155, BIOS Integrity Measurement Guidelines. This document outlines the security components and security guidelines needed to establish a secure Basic Input/Output System (BIOS) integrity measurement and reporting chain. BIOS is a critical security component in systems due to its unique and privileged position within the personal computer (PC) architecture. A malicious or outdated BIOS could allow or be part of a sophisticated, targeted attack on an organization —either a permanent denial of service (if the BIOS is corrupted) or a persistent malware presence (if the BIOS is implanted with malware). The guidelines in this document are intended to facilitate the development of products that can detect problems with the BIOS so that organizations can take appropriate remedial action to prevent or limit harm. The security controls and procedures specified in this document are oriented to desktops and laptops deployed in an enterprise environment.
NIST requests comments on draft SP 800-155 by January 20, 2012. Please submit comments to 800-155comments@nist.gov, with "Comments SP 800-155" in the subject line.
BIOS Integrity
Measurement
Guidelines (Draft)
Recommendations of the National Institute
of Standards and Technology
Andrew Regenscheid
Karen Scarfone
Acknowledgments
The authors wish to thank their colleagues who reviewed drafts of this document and contributed to its
technical content. In particular, the authors would like to acknowledge the contributions of Greg
Kazmierczak and Robert Thibadeau of Wave Systems, and Kurt Roemer from Citrix, who provided
helpful comments and feedback on early drafts of this document. We would also like to thank our
colleagues at NIST that reviewed early drafts of this document, including Bill Burr, Donna Dodson, Tim
Polk, Matthew Scholl, Murugiah Souppaya, Bill Burr, and David Waltermire.
Abstract
This document outlines the security components and security guidelines needed to establish a secure
Basic Input/Output System (BIOS) integrity measurement and reporting chain. Unauthorized
modification of BIOS firmware constitutes a significant threat because of the BIOS’s unique and
privileged position within the PC architecture. The document focuses on two scenarios: detecting changes
to the system BIOS code stored on the system flash, and detecting changes to the system BIOS
configuration. The document is intended for hardware and software vendors that develop products that
can support secure BIOS integrity measurement mechanisms, and may also be of use for organizations
developing enterprise procurement or deployment strategies for these technologies.
Nice to see Wave employees in the thick of this.
Best,
toro
Thanks - Dabears - from yours
http://www.is.northropgrumman.com/products/mda/assets/MDA_factsht1.pdf
Workstation Computing Power
- Intel x86 Core 2 Duo 1.86 GHz
processor
- 250 GB Removable HDD,
up to 640 GB (option)
- 8 GB RAM
- TPM 1.2
Best,
toro
Yes - to take funds out of a Roth IRA conversion (after paying the income tax in year 1) there is a 10% early withdrawal penalty for 5 years (which if Wave goes ballastic may still be cheaper than the 15 % capital gains tax).
I converted some of my shares from an IRA to a Roth IRA two years ago, paid the income tax, and am 2/5ths of the way to 100% tax free redemption of WAVX stock from my Roth IRA.
In addition (to WAVX in an IRA, Roth IRA and an after-tax account), I hold $0.55 warrants for WAVX exercisable 3/9/12 at the latest - so it would really be convenient if the hockey stick would go vertical soon.
Best to all,
toro
Jake - VW ? From your link - translation anyone
http://www.it-sa.de/fileadmin/itsa_files/Handouts/2011/BL_Do_14_00_Souren.pdf
Two pages in the middle of that document written in german by the CIO of VW.
Do we know about VW yet ?
Best,
toro
More vulnerable systems
http://redtape.msnbc.msn.com/_news/2011/11/29/9076395-exclusive-millions-of-printers-open-to-devastating-hack-attack-researchers-say
Exclusive: Millions of printers open to devastating hack attack, researchers say
Columbia University / msnbc.com compilation
By Bob Sullivan
Could a hacker from half-way around the planet control your printer and give it instructions so frantic that it could eventually catch fire? Or use a hijacked printer as a copy machine for criminals, making it easy to commit identity theft or even take control of entire networks that would otherwise be secure?
It’s not only possible, but likely, say researchers at Columbia University, who claim they've discovered a new class of computer security flaws that could impact millions of businesses, consumers, and even government agencies.
Printers can be remotely controlled by computer criminals over the Internet, with the potential to steal personal information, attack otherwise secure networks and even cause physical damage, the researchers argue in a vulnerability warning first reported by msnbc.com. They say there's no easy fix for the flaw they’ve identified in some Hewlett-Packard LaserJet printer lines – and perhaps on other firms’ printers, too – and there's no way to tell if hackers have already exploited it.
The researchers, who have working quietly for months in an electronics lab under a series of government and industry grants, described the flaw in a private briefing for federal agencies two weeks ago. They told Hewlett Packard about it last week.
HP said Monday that it is still reviewing details of the vulnerability, and is unable to confirm or deny many of the researchers’ claims, but generally disputes the researchers’ characterization of the flaw as widespread. Keith Moore, chief technologist for HP's printer division, said the firm "takes this very seriously,” but his initial research suggests the likelihood that the vulnerability can be exploited in the real world is low in most cases.
“Until we verify the security issue, it is difficult to comment,” he said, adding that the firm cannot say yet what printer models are impacted.
But the Columbia researchers say the security vulnerability is so fundamental that it may impact tens of millions of printers and other hardware that use hard-to-update “firmware” that’s flawed.
'Crystal clear'
The flaw involves firmware that runs so-called "embedded systems" such as computer printers, which increasingly are packed with functions that make them operate more like full-fledged computers. They also are commonly connected to the Internet.
"The problem is, technology companies aren't really looking into this corner of the Internet. But we are," said Columbia professor Salvatore Stolfo, who directed the research in the Computer Science Department of Columbia University’s School of Engineering and Applied Science. “The research on this is crystal clear. The impact of this is very large. These devices are completely open and available to be exploited.”
Printer security flaws have long been theorized, but the Columbia researchers say they've discovered the first-ever doorway into millions of printers worldwide. In one demonstration of an attack based on the flaw, Stolfo and fellow researcher Ang Cui showed how a hijacked computer could be given instructions that would continuously heat up the printer’s fuser – which is designed to dry the ink once it’s applied to paper – eventually causing the paper to turn brown and smoke.
In that demonstration, a thermal switch shut the printer down – basically, causing it to self-destruct – before a fire started, but the researchers believe other printers might be used as fire starters, giving computer hackers a dangerous new tool that could allow simple computer code to wreak real-world havoc.
Cui and Stolfo say they've reverse engineered software that controls common Hewlett-Packard LaserJet printers. Those printers allow firmware upgrades through a process called "Remote Firmware Update." Every time the printer accepts a job, it checks to see if a software update is included in that job. But they say printers they examined don't discriminate the source of the update software – a typical digital signature is not used to verify the upgrade software’s authenticity – so anyone can instruct the printer to erase its operating software and install a booby-trapped version.
In all cases, the Columbia researchers claim, duping a would-be target into printing a virus-laden document is enough to take control of that person's printer; but in some cases, printers are configured to accept print jobs via the Internet, meaning the virus can be installed remotely, without any interaction by the printer's owner.
“It's like selling a car without selling the keys to lock it,” Stolfo said. “It’s totally insecure.”
Columbia University
Columbia researcher Ang Cui explains how he was able to infect an HP printer with malicious code.
Rewriting the printer's firmware takes only about 30 seconds, and a virus would be virtually impossible to detect once installed. Only pulling the computer chips out of the printer and testing them would reveal an attack, Cui said. No modern antivirus software has the ability to scan, let alone fix, the software which runs on embedded chips in a printer.
“First of all, how the hell doesn't HP have a signature or certificate indicating that new firmware is real firmware from HP?” said Mikko Hypponen, head of research at security firm F-Secure, when told of the flaw. “Printers have been a weak spot for many corporate networks. Many people don’t realize that a printer is just another computer on a network with exactly the same problems and, if compromised, the same impact.”
There are plenty of points of contention between HP and the researchers, however. Moore, the HP executive, said the firm’s newer printers do require digitally signed firmware upgrades, and have since 2009. The printers tested by the researchers are older models, Moore said.
In contrast, the Columbia researchers say they purchased one of the printers they hacked in September at a major New York City office supply store.
Moore also said that the impact of any potential vulnerability is limited because most home users have InkJet printers – not LaserJet printers – and they do not permit remote firmware upgrade, he said.
Still, a widespread flaw in LaserJet printers would raise serious issues. Hewlett Packard dominates the printer market; the firm says it's sold 100 million LaserJet printers since 1984, meaning millions of computers could be vulnerable. HP, by far the dominant printer seller worldwide with 42 percent of the market, sells about 50 million printers of all kinds annually, according to IDC.
In an exclusive demonstration for msnbc.com at Columbia University’s Intrusion Detection Systems Laboratory, Cui and Stolfo revealed the kind of havoc an attacker could wreak once they gained control of a printer. After sending a virus-laced print job to a target printer, the device's small screen read, in sequence, "Erasing...Programming...Code Update Complete."
In one demonstration, Cui printed a tax return on an infected printer, which in turn sent the tax form to a second computer playing the part of a hacker’s machine. The latter computer then scanned the document for critical information such as Social Security numbers, and when it found one, automatically published it on a Twitter feed.
A hacker who merely wanted to wreak havoc could easily disable thousands – or perhaps millions – of vulnerable printers, Cui said, as it is trivial to send the printer upgrades that would render it inoperable.
Beachhead?
But the researchers say the possibilities created by hijacked printers go far beyond pranks or identity theft. Printers on a company network are nearly always trusted by other computers. A hijacked printer could act as a beachhead to attack a company's network that was otherwise protected by a firewall. Few companies are prepared to protect themselves from an attack by their own printer.
Moore also disagreed with this assertion. He said standard print jobs could not be used to initiate a firmware upgrade; only specially-crafted files sent directly to the printer can do that. Were that true, the vulnerability could only be exploited on printers left exposed to the Internet; printers behind a firewall would be safe.
“This (vulnerability) is probably not as broad as what I had heard in their first announcement,” Moore said. “It sounds like we disagree on what the exposure might be.”
But the Columbia researchers say standard print commands sent both from a Macintosh computer and a PC running Linux tricked an HP printer into reprogramming itself. Moore later conceded that might be true; but the two sides disagreed on whether users in a Microsoft Windows environment were safe from the attack.
Even home users with printers that are not directly connected to the Internet are at risk, Cui said. As long as the printer is connected to a computer – through a USB cable, for example – it could be used to launch attacks, or as part of a botnet.
A quick scan of unprotected printers left open to Internet attack by the researchers found 40,000 devices that they said could be infected within minutes.
Cui discovered the lack of authentication by physically disassembling the printer, and painstakingly reading output from its chipset, one character at a time. The chips run off-the-shelf operating systems like VxWorks and Linx, a scaled-down version of the Linux operating system designed for embedded devices. Reprogramming the chip was relatively easy, he said – and now that the concept has been proven, he thinks others could reproduce his work in a day or two.
"In fact, it's almost impossible to think that someone else hasn't already done this," he said.
Fixing the flaw will not be easy, Stolfo said. There is no natural path to update printer operating system software, as there is for desktop PC software. It's possible a consortium of firms could "push out a fix," once one is available, he said. He urged HP to work with companies like Microsoft to help consumers update their printers. (Msnbc.com is a joint venture of Microsoft and NBC Universal.)
One particularly vexing part of the fix: Printers that are already compromised by rogue software likely cannot be fixed. An attacker could easily shut down the pathway for future updates that would “cure” an infected printer.
“If and when HP rolls out a fix, if a printer is already compromised, the fix would be completely ineffective. Once you own the firmware, you own it forever. That’s why this problem is so serious, and so different,” Cui said. “This is nothing like fixing a virus on your PC.”
Such inability to help consumers manually secure their printers could ultimately have disastrous consequences, Stolfo said.
“It may ultimately lead to telling everyone they just have to throw their printers out and start over,” he said. "Fixing this is going to require a very coordinated effort by the industry," Stolfo said.
Rogue software
Hypponen said that the anti-virus industry could develop software tools that would detect booby-trapped print jobs in word processing documents or emails, and thwart attempts to update printers with rogue software that way. But such an approach would hardly be foolproof.
The Columbia researchers are just beginning to sample printers sold by other manufacturers; the research is inconclusive so far, but Stolfo and Cui believe the problem is not limited to Hewlett-Packard machines.
“I think it is very wise to broadcast the problem as soon as possible so all of the printer manufacturers start looking at their security architectures more seriously,” Stolfo said. “It is conceivable that all printers are vulnerable. …Printers that are 3-, 4-, 5-years-old and older, I’d think, all used unsigned software. The question is, ‘How many of those printers are out there?’ It could be much more than 100 million.”
That’s why Stolfo and Cui decided to go public with the vulnerability: They believe the sheer scope of the flaw requires immediate attention and cooperation from multiple elements of the tech industry. The two are currently helping HP devise a mitigation strategy.
HP continues to research the potential flaw, but it’s too early for the firm to announce which products might be impacted, or what consumers should do.
“Until we know things like whether Windows users are affected, whether this is a class or specific product issue, it is frankly irresponsible to say more,” Moore said. “If this turns out to be the broad (problem) that's being discussed…we will reach out to customers and get it fixed. We support our customers and value their trust.”
Printers, however, are just the tip of the iceberg when it comes to vulnerable embedded devices, Stolfo warned. Columbia researchers have found that many gadgets now wired to connect to the Internet – including DVD players, telephone conference tools, even home appliances – have no security at all.
"Right now, very few people are thinking about the security of all these devices, so we're moving on to look at many more of them,” Stolfo said, noting that supposedly secure offices – even in sensitive government agencies – have networked teleconferencing devices, printers, even thermostats that create security risks.
“This is a whole area that is being ignored,” he continued. “While most folks are focused on applications, there is a comfort level with (embedded systems) that is nonsensical. There's no focus on the security of these devices we take for granted and we carry into secure environments every day.”
Best,
toro
oknpv - as Ron used to "Trust but verify".
Best,
toro
Plympton - thanks.
Is that a field downloadable element (i.e a sotware upgrade), or must it be factory baked in ?
best,
toro
BB re:android
Be aware that the Android OS is very insecure and most/many IT departments won't allow them to be used as a "business" phone with direct e-mail and calendar updates.
I have a Droid and have to do it all via the browser and webmail, while my colleagues with Apples and BlackBerries are directly connected.
Maybe Wave can help.
Best,
toro
Cash 10.9 mil. So this series of investment seminars...
Wave to Present at the Morgan Keegan, Canaccord Genuity and Oppenheimer Conferences in New York and Boston August 8th-10th
aren't for a pipe to tap the new shelf.
toro
Plympton - Thanks for the correction
http://i.dell.com/sites/content/shared-content/data-sheets/en/Documents/latitude-e6420-spec-sheet.pdf
Know your data is secure with Dell’s Data Protection | Encryption• 11 and encrypted hard drive options
or ruggedized
http://i.dell.com/sites/content/shared-content/data-sheets/en/Documents/latitude-e6420-xfr-spec-sheet.pdf
TPM 1.28 , optional fingerprint reader, the hard drive options don't specify encryption but the text section indicates "Confident security: Know your data is secure with Dell’s Data Protection, encrypted hard drive options and
control who has access to your data with Dell ControlVault™, contactless smart card and fingerprint reader
login access options."
Best,
toro
Plymptom - great find - The Federal Emergency Management Agency (with 7200 employees), looking to improve the security, mobility and manageability of its IT infrastructure, has decided to standardize on three notebook computers for employees to use at work or in the field.
Dell 6410 optional encrypted HD (don't know if the Intel chip set has TPM function - but no TPM mentioned)
http://i.dell.com/sites/content/shared-content/data-sheets/en/Documents/latitude-e6410-atg-spec-sheet-121510-336pm.pdf
Dell 6320 - with TPM, optional fingerprint reader, and encrypted HD
http://i.dell.com/sites/content/shared-content/data-sheets/en/Documents/latitude-e6320-spec-sheet.pdf
HP 8460 - with TPM,optional fingerprint reader and encrypted HD
http://h10010.www1.hp.com/wwpc/pscmisc/vac/us/product_pdfs/HP_Elitebook_8460p_Datasheet.pdf
FEMA is nested in Homeland security with its cybersecurity initiative
http://www.dhs.gov/files/cybersecurity.shtm
Maybe Wave is on its way.
Best,
toro
Brant - actually I hadn't ever done that (and didn't know you could). But now I see how the scandal hacking was possible.
So wouldn't a TPM hardened system have prevented this from happening - one that requires a TPM hardened phone (something you have) and a password (something you know) make this hacking impossible?
Best,
toro
Brant - wouldn't that take physical possession of the phone. Two component identification - somethng you have (a phone that identifies itself to the network) and something you know (your password).
So without the phone, the hacker would have to gain access to a server on the network and then guess the password (or have a program that guessed it).
So is the something you have component the weakest link - would hardening this aspect with a TPM solve the problem ?
best,
toro
OT - Murdoc scandal and Trusted computing.
What does "Hacked into a phone" mean, how is it done ? Is it done at the client end, is it done at the server end, do you need physical possesion of the phone, and lastly; would TPMs, trusted computing, and Wave software have a role in preventing this from occurring ?
Tia,
toro
Russell Index 2011 membership lists (it's official).....
http://www.russell.com/Indexes/tools-resources/reconstitution.asp
As Of 6/27/2011....
Russell Global Indexes
U.S.
WAVE SYSTEMS CORP WAVX
As of 06/27/2011 Russell Indexes.
Russell 3000® Index membership list
WAVE SYSTEMS CORP WAVX
As of 06/27/2011 Russell Indexes.
Russell Microcap® Index membership list
WAVE SYSTEMS CORP WAVX
So as expected (hoped) Wave is on the 3000, the Microcap and the Global, but not 1000, the 2000 or the Midcap.
Best,
toro
I think the final juggling is next Mon - ICBW.....
Wave is not on the June 24th list of deletions in any of the Russell indices, but the final list is official on June 27th....
http://www.russell.com/indexes/tools-resources/reconstitution/reconstitution-changes.asp
Reconstitution schedule
June 10
Preliminary additions and deletions to the Russell Global, Russell 3000® and Russell Microcap® Indexes published after 3:00 p.m. PST
June 17
Updates to the list of additions and deletions
June 24
Updates to the list of additions and deletions
Reconstitution final after the close of the U.S. markets June 27
Final membership lists posted for the Russell Global, Russell 3000, Russell 1000®, Russell 2000®, Russell Midcap® and Russell Microcap Indexes
Best.
toro
Unc - you are probably correct - warrants wouldn't be trustworthy if they required future approval.
Best,
toro
Dr Nick, I too am holding warrants (expiring in 3/12).....
.....so this shelf is welcome, but really amounts to no more than necessary housekeeping IMO, and (again IMO) is unrelated to the SP action of the last two days.
Best,
toro
Lee residents cleaning up after severe storms
updated 6/10/2011 10:46:23 WNYT
Lee, Massachusetts took a direct hit from those strong storms that moved across our region Thursday and the day before.
Residents say it's the worst thunderstorm they've seen in a long time.
Edward Rand clocked the winds at over 110 miles an hour with his home weather station.
Those winds took down massive trees as if they were toothpicks, and pulled down power lines.
Resident Marie Baron said, "i grew up here and i don't remember storms like this. Last night the sky did turn green. It was scary."
More than 20% of the town was without electricity last night.
Crews were out all day trying to restore power.
No word on when it will be fully restored.
Best,
toro
ex pat- thanks.
Wave is not on the June 10th list of deletions in any of the Russell indices, but there are two more deletions dates before the final list is official on June 27th....
http://www.russell.com/indexes/tools-resources/reconstitution/reconstitution-changes.asp
Reconstitution schedule
June 10
Preliminary additions and deletions to the Russell Global, Russell 3000® and Russell Microcap® Indexes published after 3:00 p.m. PST
June 17
Updates to the list of additions and deletions
June 24
Updates to the list of additions and deletions
Reconstitution final after the close of the U.S. markets June 27
Final membership lists posted for the Russell Global, Russell 3000, Russell 1000®, Russell 2000®, Russell Midcap® and Russell Microcap Indexes
Best,
toro
Ex Pat
As a vet you are entitled....
thank you for your service.
best,
toro
Bought at $2.62....
....IMO the bottom's in and we go up from here.
Best,
toro
Just upgraded to IE 9 64 bit (on windows 7 Ultimate) and it is blindingly fast.
Yes - lots of opportunity now
I just bought July $2.50s for $1.90.
Best,
toro