Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Info re FBCB2-BFT missions:
http://en.wikipedia.org/wiki/Project_Manager_Force_XXI_Battle_Command_Brigade_and_Below
http://peoc3t.army.mil/fbcb2/fbcb2.php
http://www-bctc.army.mil/fbcb2.htm
https://secureweb2.hqda.pentagon.mil/VDAS_ArmyPostureStatement/2011/information_papers/PostedDocument.asp?id=109
Options expiration time and date? Do the 2.50 options expire at close of market on Friday?
Thanks.
Do you think we have crossed the "chasm?"
I don't post much, but read a lot. I'm interested in your thoughts re where we are now on the diagram at the bottom of your posts.
Thanks, Richard
Wonder if any of these other firms (additional to Goldman Sachs) bought WAVE:
"As it bought McAfee, Intel was advised by Goldman Sachs Group Inc. and Morrison & Foerster LLP. McAfee’s advisers were Morgan Stanley and Wilson Sonsini Goodrich & Rosati."
Quote is from a Bloomberg article:
http://noir.bloomberg.com/apps/news?pid=20601087&sid=adfVOPQNuM2E&pos=5
RE: Mrs.Weby. Did she make her predictions before or after the market opened and, if after it opened, how soon after? I'll be interested in how she does Monday. A handy rule of thumb: If it happens once, consider it luck; if it happens twice, chalk it up to coincidence; if it happens three time, she's on to something. So if she hits it accurately Monday morning, I want to buy a subscription to Mrs. Weby's (aka The Oracle) Daily Wavx Prediction Service.
Thanks hawkshaw.
Question: Anyone have handy the data re how many shares existed pre-reverse split, in say the glory days of 1999, and how many current shares exist today? I'm trying to get a handle on what percentage of the company a thousand old shares was in 1999, compared to what percentage of the company 1000 current shares is today. I think that in comparing our current holdings to our prior holdings, the most significant comparative metric is the percentage of the company which the shares held back then represented then and what percentage the shares held now represent now.
Also, how many additional shares can the company currently sell or offer to staff?
Thanks in advance to anyone who answers.
Being in the black will be a reason to be thankful, but not to celebrate, as being in the black for many could mean just a few dollars profit for about twelve years of investment. And for many of us, SP = $10 (really only $3.33 per old share) will still leave us deeply in the red, thanks to getting destroyed when WAVE crashed and then being unable to afford to buy much back even at the extremely low prices. I think many dedicated and loyal Wavoids won't be making the trip to Las Vegas at SP = $10. It will have to be at least $30 before I'll feel like celebrating. My hunch is that many others of the less vocal (loyal lurkers) wavoids who have helped keep WAVE afloat, who have lost much $ in the process, and who daily follow this board feel similarly. I congratulate all those who did load up when the SP was about 15 cents per old share, and appreciate Snackman's leadership and the contributions of most of the regular contributors to the board.
He's more like seventy (or older); with a BA in 1961.
Fly Fisher: Nice quote; what is the date the MS security mgr said it? -Thanks
Question: Dates for the WAVX '06 annual conference call or for the 1Q '07? -Thanks
Question: Is "Utimaco's SafeGuard Easy software" competition for us? Thanks in advance for any reply.
"The right move was to move the encryption into the computer itself. Lenovo offered the first line of notebooks (formerly carrying the IBM brand) to build an accelerator, called a Trusted Platform Module (TPM), into the computer. When bundled with Utimaco’s SafeGuard Easy software, which has over three million licenses worldwide, end users get a transparent encryption scheme that grabs only two to six percent of the processors’ attention. Enterprises get comprehensive protection for all files on the disk."
What terrible and sad news. A person's character comes through in their posts; Scott's was the best. Thank you for letting us know. -Richard
Thank You, again, UncleverName, for your very generous (and frequent) gifts to our community; I very much appreciate knowing that I can count on reading your transcripts.
Groups Help Businesses With Security Plan
Mar 29, 7:19 PM (ET)
WASHINGTON (AP) - Help is on the way for small business owners who want to improve their ability to protect data.
The Council of Better Business Bureaus is teaming up with the Privacy and American Business think tank on an educational program to help small businesses lower their vulnerability to viruses and hacking.
The program, called "Security and Privacy Made Simpler," includes free, easy-to-read security and privacy tool kits, with separate kits focused on customer and employee data protection.
The customer data kit is available now, and the employee kit will be out in the fall. The educational materials are accessible online at .http://www.bbb.org/securityandprivacy
(I dont have the time, but someone might want to educate this group re what's now available thru Dell/Gateway etc)
MSFT email re VISTA's capabilities.
I emailed MSFT at tpminfo@microsoft.com with the following query a few days ago (that email address being in a MSFT document linked in a message on this board):
"I have reviewed the MSFT document , "Trusted Platform Module Services Step by Step Guide.doc",
and appreciate the information re initializing, turning on and turning off the TPM. Does VISTA include
the mechanisms for utilizing the TPM within a company's network to enable it to perform attestation
and authentication, protection of passwords, perform digital signing, and eventual use of PKI? Are
some or all of these capabilities within VISTA itself, or is additional software necessary, and, if so, I
would appreciate links for recommended software and resources regarding its use. Thank You Very
Much."
I received the following reply:
"Thank you for your interest in Windows Vista and its use of TPM technology.
Vista does not include any applications that perform attestation, password storage, signing, or PKI extensions. The OS allows 3rd-party vendors to use a Trusted Software Stack that has been ported to work with Vista for application development.
If you are interested in these types of applications, I would suggest contacting companies that offer products utilizing TCG technology. I would also suggest visiting the Trusted Computing Group's website for further information on such companies. That resource can be found here:
https://www.trustedcomputinggroup.org/kshowcase/view
Let me know if you have any further questions.
Thanks,"
Jesse: I can breathe again; you're back! I look forward to your thoughts and prognostications as this thing progresses.
-Maggie (RDSY2K on the old board)
Maybe they'll use them in Vegas; see planned use of handheld wireless devices for gambling:
http://apnews.excite.com/article/20050802/D8BNFN4O0.html
Sorry for the typo, Unclever; no joke intended.
Thank You, Uncleaver!
Babelfish translation of Eamonnshute's Russian Article:
Maternal pays with built-in cryptography
Intel declared about the fact that in the very near future the part of the maternal pays, produced by company for the needs of business, will contain built-in software, intended for the protection of data of user from the unsanctioned access. The solution, which was called name Trusted Platform Module (TPM) is developed together with company Wave Systems from Portlanda (state of Oregon).
On statement Intel, additional microcircuit with the cryptographic program will appear on the maternal pays already in the fourth quarter of present year.
Because of TPM, the users will obtain possibility "in flight" to code and to decode the written and read from the hard disk information, obtaining the same possibilities on the protection of classified information, as if they used the protected "secret" divisions of computer hard disk.
Specification TPM was developed by forces of Trusted Computing Group, the industrial consortium, intended to establish the standards of safety for the computers. Terms Trusted Computing Group, besides Intel, among other are after all metry of computer industry as Advanced Micro Devices (AMD), Hewlett-Packard, IBM and Microsoft.
(Article appeared in 8/1/03 Caspian World News)
the source: 3dnews.ru