Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Who was the first to break ranks to become the "original" seer and prognosticator of Wave's management and future?
A hint; albeit with unmatchable humor and prose.
I'm positive with all your years of evidence, money, the many reliable and credible witnesses/victims, years of time, along with collective effort/collaborations, and a good legal team you would have a good chance to win too.
For you, the questions are #1: Win what? #2: What would happen to the guilty....if proven guilty?
Noble, valiant, and true? No doubt.
Realistic/practical?
In the world of business there are another 200,000,000 or more just like him; many likely worse to much worse, in a multitude of way, shape, and forms.
Believe it or not, there are much darker sides of humanity than Wave's management.
It's corporate culture. Nothing more, nothing less.
They are not paid for benevolence, goodness, or honesty.
Take what you can, while you can.
Get it?
You mean kind of like the 2008/2009 "subprime global financial crisis/debacle/meltdown" when all the guilty CEO's, associates, and minions were given millions upon millions in bonuses: not to mention their million upon millions in salaries, and millions upon millions they made by selling their shares, as their well paid shill's were pumping the stocks; while the common/average guy lost everything, EVERYTHING; homes, retirement, 401K etc. And not one, NOT ONE, of any of the aforementioned low lifes were indicted; instead just simply sailed off to the sunset to enjoy the rest of their lives?
On a much, MUCH, far lower level Wave is the example of all of the above.
Is that a fair analogy/comparison?
Do tell.
End stage corporate emphysema.
Exactly. The Wave saga is kind of like an overdone reality tv show, with a captivated audience of 18 years.
How much $ is Wave receiving upfront to produce and facilitating these or any other orders?
TPM. Oh, the simplicity! Then comes the simplicity of the software.
How to Use the TPM: A Guide to Hardware-Based Endpoint Security
The Trusted Computing Group’s root of trust, the Trusted Platform Module (TPM), is an integral part of virtually every enterprise level computer sold today. The TPM, a secure cryptographic integrated circuit (IC), provides a hardware-based approach to manage user authentication, network access, data protection and more that takes security to higher level than software-based security. This paper explains how to use and enable the TPM in 4 easy steps.
Taking advantage of the inherent security provided by the Trusted Platform Module (TPM)
Can you really feel sorry for a person whose car is stolen when the keys are left in it? Surprisingly, in a quite similar manner, many IT administrators are doing just that by not using a security feature they have. The Trusted Computing Group's root of trust, the Trusted Platform Module (TPM), is an integral part of virtually every enterprise level computer sold today.
The TPM, a secure cryptographic integrated circuit (IC), provides a hardware-based approach to manage user authentication, network access, data protection and more that takes security to higher level than software-based security. Perhaps surprisingly to many IT and operations staff, the TPM can be combined with widely used enterprise hardware such as network policy enforcement points, including Checkpoint firewalls, Cisco switchers and routers, and other 802.1x-compatible devices.
For those wondering about standards, the International Standard Organization's (ISO) JTC1 (ISO/IEC Joint Committee 1) has approved the transposition of TCG's TPM 1.2 specification to an ISO/IEC standard. With the completion of the comments resolution process currently underway, publication of ISO/IEC 11889, Parts 1-4 is expected in the first half of 2009. This will make the TPM an even more well-established standard security tool, and yet, strangely, many organizations have not taken advantage of its capability.
Why Not?
Potential added cost and complexity are two of the most frequently cited reasons for not using the TPM. Since the TPM comes as standard equipment at very little or no additional cost on enterprise-lev
Four steps to enable and use the TPM
Turn on the TPM from the BIOS.
Load available TPM utility software. Dell, HP, Lenovo and others include software applications for using the TPM in their business desktop and notebook products.
Enable the TPM and take ownership. This is the password that is used for permission to other functions including generate keys.
Use the TPM to generate Keys for a specific need such as fetching a virtual private network (VPN) Certificate using the Microsoft CA (Certificate Authority). To leverage the TPM, the Microsoft CA needs to be told which Cryptographic Service Provider (CSP) to use. Selecting advanced and then the CSP of choice will cause the Key pair to be generated using the TPM.
This is the first step to leverage the TPM's capabilities. Some vendors now offer applications that remotely provision the TPM and manage it, eliminating the need to "touch" each system. In this way, thousands of systems quickly can be made more secure.
Once the TPM is activated, users can easily encrypt files, folders and email as well as more securely manage passwords. To meet multi-factor authentication requirements, the TPM complements fingerprint readers and stores the keys associated with them securely, and the TPM can be used with a smart card reader.
Computer manufacturers and Microsoft provide detailed how-to instructions to enable and use the TPM more extensively including:
HP-UX Trusted Computing Services Administrator's Guide HP-UX 11i v2 from Hewlett Packard and A Step-by-Step Guide to Enable Windows BitLocker Drive Encryption from Microsoft.
Acer, Dell, Fujitsu Ltd., Gateway, Lenovo (IBM), Toshiba and other computer suppliers that ship computers with TPMs have similar how-to information. The sidebar below, "Things to Do with the TPM" shows the minimum effort that should be made to implement the TPM's capability. However, this is just the beginning. Other suppliers provide software and applications tools to simplify taking advantage of enhanced security that the TPM provides. A small sample of other tools available from key manufacturers for the TPM includes:
Award TCG Agent from Phoenix Technologies
Core TCG Software Stack from NTRU Cryptosystems
Embassy Trust Suites and EMBASSY Remote Administration Server (ERAS) from Wave Systems
TPM Professional Management and Support Package from Infineon Technologies AG
Things to Do with the TPM
Set password
Store digital credentials such as passwords in a hardware-based vault
Manage keys with the TPM
Augment smart cards, fingerprint readers and fobs for multi-factor authentication
Encrypt files and folders to control access
Establish state information to enable endpoint integrity
Hash state information prior to hard drive shutdown for endpoint integrity
Enable more secure VPN, remote and wireless access
Use in conjunction with Full Disk Encryption to restrict access to sensitive data
With the TPM as an integral part of existing computers and support from other enterprise hardware such as Cisco routers, concentrators and switches as well as Checkpoint firewalls that natively support public key infrastructure (PKI) authentication, this software can take enterprise security to a much higher level.
IT administrators can take the certificate authentication (CA) that is native in their networking gear and move those certificate authentication software components down to hardware. When users log on to the domain or network, the authentication is performed based on the user providing a credential to the hardware on the machine. This provides hardware-based authentication to wireless networks and virtual private networks (VPNs), while removing the potential of users sharing keys.
Once the TPM is enabled, the Systems Management Server (SMS) and traditional enterprise tools can push certificates down using SMS and the active directory and harden the certificates down to the platform minimizing subsequent user interaction. Instead of enabling the TPM machine by machine, infrastructure tools can help enterprises enhance network and data security.
With a renewed thrust to make potential users aware of the TPM, its capabilities and ease of use, TCG is enlisting the use of tools such as the TCG Blog, blogs at other sites such as Intel vPro Expert Center, its members' sites including online videos such as the Intel Manageability Engine that uses the TPM, University support such the Massachusetts Institute of Technology, University of Birmingham, and many others, as well as third parties to provide how-to examples.
Download this Whitepaper (pdf): How to Use the TPM: A Guide to Hardware-Based Enterprise Security
Remember the multiyear (10 year) EDS contract.
OK Blue, agreed.
Somehow we'll have to work on the "Sevens" idea over the next month or so.
Best Wishes to you as well.
Peace.
wavedreamer, thanks. Nice to know at least one person agrees with the perspective I do my best to express.
My best to you and Blue. Although, Blue seems to enjoy cornering me.
He should buy me a beer at "the sevens" for what he puts me through.
Blue your analogies and comparisons are way out of line/off topic to the subject matter of universal internet/computer/server security. You grossly digressed from the subject matter to an inappropriate/way off base security related matter.....
So what about Beta/VHS and Blu-Ray vs HD DVD? Not hardly closely comparable to universal accepted crucial internet/computer/server security. Is it? Afterall, we are not talking about watching a movie on TV securely.
Also, re-read paragraph 2 and 3 of my original post....again.
You are much more capable to discern and understanding the implications, gist, inference, and suggestions of what I am saying.
Because of corporate IP and competition I highly doubt there will ever come at time when competing companies will come to the table to collaborate and collectively create a common solution. Competitively, this makes no sense. And therefore industry mandate will never happen. The TCG is basically a glaring example of this; no more than a facade of a collective effort.
However, I submit, if not for user discretion of off and on and lack of user friendly TPM software technology the TPM may well have gained significant traction. But then again, as I said, there are billions of computers and servers that do not include TPMs. What do you suggest we do about them?
What does make sense is at some distant point something along the lines of the FCC.
When I said. "Easy to draw the conclusion" I meant industrials/federal mandates will likely never happen, at least not in the next decade or two.
In my mind, that statement was an empirical observation, apparent to all. My apologies for that broad incorrect assumption.
At least the a lottery ticket has an element of "luck" associated with it.
Wave's requires much more than luck. Perhaps something along the lines of Divine intervention can help.
Isn't the TPM considered such a device?
There is no hope whatsoever of a solution for many, many, many years. Perhaps by then, or in the meantime something will replace the computer.
I believe semantically we are saying/concluding the same thing.
However, once again you read and interpret my post incompletely and out of context; and respond to it accordingly.
If you require further clarification from my original post or this one, I do not believe I can restate any of it any clearer.
No disrespect.
A proven unhackable security device/system needs to be mandated by industry and/or federal; without user discretion of off or on.
Then of course, there is the insurmountable magnitude of problems regarding the billions of computers that preceded any proposed mandate.
Easy to draw the conclusion.
It was a "KMPG resignation" from Wave. Quite a difference than Wave terminating their services in order cut expenses.
In my view, either KMPG would not compromise their ethics for Wave, and/or Wave is far behind in payments.
Just another positive sign for the cult like beliers, and another laugh those who see through it.
Never mind. I get it,
Sorry Snackman, not 30, more like the last 60 or so conference calls.
Anything Wave has placed in writing or has said in CC or publicly stated by any agents of Wave cannot be trusted, and more prudently should be considered untruthful.
And who should know better than loooong time devotees and investors of Wave?
Answer is; those who have warned Wave investors for many years.
Hey, and you believe the wording of the 8K, like content the past 30 or so CC calls?
Okay Blue, here you go:
Don't kid yourself, categorically, there are/have been/will be thousands of companies, scam artists, individuals, institutions of every kind everywhere, equal to or worse in every respect as/than Wave Systems.
This is not opinion, but objective fact,
Essentially, Wave is no more than a small time example of this reality. Kind of like a single cloud in the sky.
Remember the subprime global financial debacle when NOT ONE of the greedy guilty, from the CEO's on down, were indicted; instead were rewarded with bonuses of million upon million while selling their shares, and given going away parties, then sailing off to the sunset living happily ever after, while leaving the average/common guy with ZERO, and retiring with nothing.
I submit, Wave's legal form of lies, deceit, and corruption is of little note compared to the BIG picture.
And you know what, it may surprise you, but it is still going on. Take my word for it.
HOWEVER, IN NO WAY DOES THE ABOVE JUSTIFY WAVE"S PAST OR PRESENT EXECUTIVE MANAGEMENT OR BOD FOR THE HARM THEY DID TO ANY AND/OR ALL THEIR INVESTORS WHILE UNDER THE LEGAL PROTECTION OF THE "SAFE HARBOR FORWARD LOOKING STATEMENTS" CLAUSE.
Hope that clarifies. If not, rest my case. I cannot be any more explicit or complete.
What I said is not at all "opinion" but objective facts.
I DO NOT, nor ever had disputed the harm done to the Wave investors by the Sprague/Solms regimes.
You have use your hatred of Wave to support and distort my post on the discussion.
Please re-read my posts on the matter.
When in comes to WAVE, hatred and denial are on equal levels.
You continue insisting on stating I said what I did not say.
I DO NOT at all dispute the harm done to WAVE investors by the Sprague/Solm management/regimes or any BOD member. PLEASE re-read my posts on the matter.
Any honest journalist or Biblical Scholar should see the truth and/or discern the context of what I posted.
Don't kid yourself. Categorically, there are/have been thousands of companies, scam artists, individuals, institutions of every kind everywhere, equal to or worse in every respect as/than than Wave Systems.
Essentially, Wave is no more than a small time example of this reality.
Remember the subprime global financial debacle when NOT ONE of the the guilty were indicted; but instead rewarded with bonuses while selling their shares, and leaving the common/average guy with nothing, and the off to the sunset living happily ever after?
I suggest Wave's legal form lies, deceit, and corruption is of little note compared to the BIG picture.
And you know what, it may surprise you, but it is still going on. Take my word for it.
IT'S CALLED HIGH RISK HIGH REWARD. Or maybe someone should have stepped up and offered Wave .0005 over prime.
More hope for the hopeless. This sad story has gone on far, far, too long.
Hey, what difference does it make if Wave does this or if Wave does that, or whatever happens to Wave?
As it has for many years, the bottom line to any Wave theory or opinion by anyone, the outcome of Wave, regardless of the who, what, or why of the details is a foregone conclusion....
It won't be good.
For years Wavx executive management and BOD are and have been perfect examples of what legally can be gotten away with.
The long Wave investors simply could not/refused to believe, to the point of deep denial..... they were being had.
It is, extremely hard to digest the level protection "safe harbor forward looking statements" give all the bastards to hide behind.
A few desks and chairs, and some office equipment. (if not leased)
You're right, Solms and SKS are not boy scouts.
However, what I said was, "relatively saintly".
The term was used metaphorically, not literally.
Kind of like newspaper delivery boys complaining about the newspaper.
Sure, they suckered in the suckers and were conveniently protected by doing so with "safe harbor forward looking statements" disclosures.
However, to place it in perspective, Wave's past and present management are nothing more than less than petty thieves......compared to the MANY responsible for the 2008 global subprime financial debacle where ALL the guilty parties were rewarded with millions upon millions and given going away parties....and NOT ONE, NOT ONE, was indicted, and went on left to live happily ever after......
While the middle class tax payer got left holding the bag for trillions, and the average so and so investor lost it all.
SKS and SOLMS are relatively saintly,
Yup, Wave management and Board should have been true to their soul as all other corporate governance has always been. They're the only bums in town.
Accept it, it is ALL part of the culture of business vs the average guy.
Like it or not It's called Capitalism (dog eat dog/looking out for #1) and it's here to stay.
Wave is a mere grain of sand in the Rub' al Khali.
Sure there are. Some are probably in for millions.
My wife said, when a friend of Lark Allen posted she was out it was the BIGGEST red flag of all.
Don't forget the stock went from 75 cent to 50 dollars in about 3 years.
How many could have gotten out with mega mega profits?
My wife and I could have made almost million. Instead we were greedy but blessed by losing only 20K.
There's still around 700,000 short shares out there. ANY volume or s/p spike are highly due to shorts getting out.
Ah, yes!!! Those were the days...
Now, it's, "let them eat cake"!
C'est Le Vie!
At little more than one penny per share, either way, what difference does it make?
On a corporate level, Wave is in no better shape than a paper route or standing in line in a soup kitchen.
This is not rocket science that needs to be intellectualize over and over about trivial/moot points.
Once again, Wave's lies and deceit are not a Wave exclusive. It is common place to ALL organizational governance; be it public, private, corporate, political.
Not one CEO or minion was indicted, prosecuted, or jailed during the global sub-prime global debacle.
Instead, they were all rewarded with millions and sold there shares, while the average person lost everything.
Wave's lies and deceit are only an example of the rest of the world.
For Wave, there are no "big ones"; there are no "little ones". There are only regretful, betrayed, and continually fooled investors.
Consider DELL a HUGE and GLARING reference point for the "BIG ONE".