Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
I was told by the CEO to contact somebody named Phil after I sent an email to the CEO.
Here are the current list of questions that I'm about to send to the CEO on Linkedin, can I get some public input such as additional questions that you would love to ask him?
1. What is the IR person's email? Typically that's listed on corporate websites.
2. Will the company update the website to show such basic information such as the IR person's email, and links to social media accounts so the general public including the investors could be kept up to date with the company's activities?
3 When will the company update the financials such as the float date which hasn't be updated since the year 2016, and the number of share holders which is listed to be "148" which is another figure from the year 2016?
https://www.otcmarkets.com/stock/GRSO/security
4.
5.
6.
You can also directly message the CEO.
https://www.linkedin.com/in/chad-fischl-86b02610/
No big deal if they gave us a link to download software they're developing. I just want an update of substance.
https://www.grsoinvest.com/contact
Ask for an update.
I'm thinking of biting the bullet by paying for 1 month of subscription to linkedin to contact the CEO to ask some questions.
They need to drop news soon.
Do you have premium so you can message the guy?
Is this our company?
Edit:apparently not.
Does GRSO have a linkedin page to see current leadership?
If you guys can get me some company emails I'll see what I can do to get the ball rolling on the share price.
They just need to announce that they're doing a pilot program to grow stuff on $BYND's property.
We would lurch to 5-10 bucks a share in a day if they were to emphasize issues with our supply chain such as how a large percentage of produce is contaminated with fecal mater.
They could run campaigns such as #fecalfree.
Imagine the stock price when they announce that BYND is going to do a complete switch to vertically grown produce.
Why can't we grow or sell equipment to companies like Beyond Meat?
Thanks. I'll give it a read. I just wish the company was more pro-active. It could become the next Beyond Meat company with it's farming tech.
Source on this information?
Do you want the the company to be engaged with the public more or are you fine with basic information such as the float size not being updated since the year 2016?
Why do you ask?
Would you guys please email the company to get them to update the financial information such as the float size which hasn't been updated since 2016?
https://www.grsoinvest.com/contact
https://www.otcmarkets.com/stock/GRSO/security
It's your investor's duty to remind them to do so.
Management needs to be more engaged.
Does GRSO have a way for investors to communicate with leadership?
Very annoying.
Questions.
1. Is there an investor relations email?
2. When are the next earnings?
What would really wipe out APRN is somebody like Amazon and all of their growing number of distribution centers announced that they will offer a home equivalent of Cysco
https://finance.yahoo.com/news/meal-kit-delivery-firm-hellofresh-054348999.html
Meal-kit delivery firm HelloFresh breaks-even on strong U.S. sales
Intel $INTC CPUs impacted by new Zombieload side-channel attack
https://www.zdnet.com/article/intel-cpus-impacted-by-new-zombieload-side-channel-attack/
Academics have discovered a new class of vulnerabilities in Intel processors that can allow attackers to retrieve data being processed inside a CPU.
The leading attack in this new vulnerability class is a security flaw named Zombieload, which is another side-channel attack in the same category as Meltdown, Spectre, and Foreshadow.
New attack on speculative execution
Just like the first three, Zombieload is exploited by taking advantage of the speculative execution process, which is an optimization technique that Intel added to its CPUs to improve data processing speeds and performance.
For more than a year, academics have been poking holes in various components of the speculative execution process, revealing ways to leak data from various CPU buffer zones and data processing operations. Meltdown, Spectre, and Foreshadow have shown how various CPU components leak data during the speculative execution process.
Today, an international team of academics -- including some of the people involved in the original Meltdown and Spectre research -- along with security researchers from Bitdefender have disclosed a new attack impacting the speculative execution process.
This one is what researchers have named a Microarchitectural Data Sampling (MDS) attack, and targets a CPU's microarchitectural data structures, such as the load, store, and line fill buffers, which the CPU uses for fast reads/writes of data being processed inside the CPU. These are smaller-sized caches that are used alongside the main CPU cache.
By exploiting normal speculative execution operations that work within these microarchitectural structures, an MDS attack can infer data that is being processed in the CPU by other apps, to which an attacker shouldn't normally have access to.
Academics have discovered four such MDS attacks, targeting store buffers (CVE-2018-12126 aka Fallout), load buffers (CVE-2018-12127), line fill buffers (CVE-2018-12130, aka the Zombieload attack, or RIDL), and uncacheable memory (CVE-2019-11091) --with Zombieload being the most dangerous of all because it can retrieve more information than the others.
There are both good news and bad news in regards to Zombieload and fellow MDS attacks.
The bad news
In several research papers published today, academics say that all Intel CPUs released since 2011 are most likely vulnerable.
Processors for desktops, laptops, and (cloud) servers are all impacted, researchers said on a special website they've set up with information about the Zombieload flaws.
Several YouTube demos [1, 2, 3] showed just how deadly MDS attacks can be, with researchers employing in one case a Zombieload attack to monitor websites that a user was visiting using a privacy-protecting Tor Browser running inside a virtual machine.
What this means is that malware capable of carrying out a Zombieload attack can effectively break all privacy protections that exist between apps, similar to how both Meltdown and Spectre broke those lines, but via other vulnerabilities in the speculative execution process.
The good news
But things aren't as bleak as they were when Meltdown and Spectre were first disclosed in January 2018. For starters, Intel hasn't been caught with its pants down like the last time, and the company has already shipped microcode updates.
Furthermore, newer processors aren't impacted, as they already include protections against speculative execution attacks --such as the MDS attacks-- since last year when Meltdown and Spectre first hit, and Intel modified the way its CPU's worked.
In addition, Microsoft, Apple, and the Linux project are expected to have operating system updates roll out later today, or in the coming days.
"Microarchitectural Data Sampling (MDS) is already addressed at the hardware level in many of our recent 8th and 9th Generation Intel Core processors, as well as the 2nd Generation Intel Xeon Scalable Processor Family," Intel told ZDNet via email last week.
"For other affected products, mitigation is available through microcode updates, coupled with corresponding updates to operating system and hypervisor software that are available starting today."
Security
Furthermore, in its own technical paper on the MDS attacks, Intel also points out other issues with this attack that makes it highly unlikely that Zombieload and its two brethren flaws would ever be used in a real-world scenario:
- These structures are much smaller than the first level data cache (L1D), and therefore hold less data and are overwritten more frequently.
- As with other speculative execution side channels, exploiting these vulnerabilities outside of a laboratory environment is extremely complex relative to other methods that attackers have at their disposal.
- It is also more difficult to use MDS attacks to infer data that is associated with a specific memory address, which may require the malicious actor to collect significant amounts of data to analyze and locate any secret data.
- Only recently accessed data can be leaked with one of these MDS attacks.
- Turning off hyperthreading prevents attacks.
The best course of action right now is to apply all the patches that will be released later today. Additional reading material is available below (some links will be added as they become public):
https://old.reddit.com/r/RedditMinusMods/
Look at all of those removed posts.
I'm hoping that we hit 28 in the aftermarket today, then 30-32 because that yearly stock holder's event, then continue to climb after the 15th because of anticipation for Computex, and climb once more because of E3.
AMD might have a GPU that performs like the 1070 which costs over 500 dollars but sells for 350 bucks. If that's true then even with Tarrifs the stock will go up like crazy. SO many people want to upgrade but they don't want to pay AMD's compeitor's cost.
Microsoft will be talking about their game streaming service around the same time of AMD's GPU announcement.
AMD (AMD) will hold its Annual Meeting of Stockholders on Wednesday, May 15, 2019 at 9 a.m. PDT at its corporate headquarters, 2485 Augustine Drive, Santa Clara, California, and online through a virtual meeting at amd.onlineshareholdermeeting.com. Forward-looking and other material information may be discussed during the meeting.
https://finance.yahoo.com/news/amd-host-annual-meeting-stockholders-201500245.html
Like reddit but less censorship
Has there been any push to get sites like Voat or services like Telegram to support it?
We've hit 23.00 dollars a share!
Supermicro Announces Expansion of Silicon Valley Corporate Headquarters and Groundbreaking for New 800,000-Square Foot Building
New Construction Further Expands Supermicro's Engineering, Manufacturing and
Service Capacity Worldwide to support the Company's Continued Rapid Growth
PR Newswire
SAN JOSE, Calif., April 28, 2019
SAN JOSE, Calif., April 28, 2019 /PRNewswire/ -- Super Micro Computer,
Inc. (SMCI), a global leader in enterprise computing, storage, networking
solutions and green computing technology, today is celebrating the official
groundbreaking of its new 800,000-square foot building in Taiwan and the
further expansion of its Silicon Valley Headquarters, now surpassing over one
million square feet of engineering, design and manufacturing in San Jose,
California.
Preview of Supermicro 9-story Building at Asia Tech & Science campus
The groundbreaking ceremony in Taiwan is being attended by over 200 business
and government dignitaries at the Supermicro Asia Tech and Science campus.
The new nine-story building will expand production capacity, hardware and
software R&D, and support the latest and future technologies and product
including EDSFF all-flash NVMe and RSD^2 – Supermicro's revolutionary
Resource-Saving Designs optimized with industry Rack Scale Design to deliver
superior performance and efficiency while reducing TCO and environmental
impact.
Supermicro's Corporate Headquarters includes engineering, manufacturing and
customer service making Supermicro the only Tier 1 systems vendor to build its
servers in Silicon Valley and worldwide. Building 23 is the third of five
facilities that the company has under construction now at its San Jose based
Green Computing Park, and it is scheduled for completion by the end of 2019.
"Having our design, engineering, manufacturing and service teams here at our
Silicon Valley campus gives Supermicro a great position for computing
architecture innovation and the agility to quickly respond to the newest
technologies in the industry and to our customer's needs and unique
requirements, which is a major advantage that we have over the competition,"
said Charles Liang, President and CEO of Supermicro. "As our business
continues to rapidly scale with over 1.2 million server and storage systems
shipped globally last year, increasing our production capacity and
capabilities is vital to keeping up with our rapid growth. Building 23 in San
Jose, along with the opening of the large new facility at our technology
campus in Taiwan, provides the additional capacity and rack scale integration
plug and play capabilities to ensure that we can provide the best possible
service to our enterprise, datacenter, channel and cloud customers."
Supermicro leverages its strength in design and engineering to lead the way
with first-to-market server and storage technology innovations like all-flash
NVMe systems in U.2, EDSFF and NF1 form factors, Resource-Saving systems for
better TCO and TCE (Total Cost to the Environment) as well as 5G
infrastructure optimization from the Edge to the Cloud. The company offers the
industry's broadest portfolio of advanced server and storage solutions
including the popular BigTwin™ and SuperBlade® product lines and provides rack
scale integration with rack plug and play capabilities.
For more information on Supermicro and Supermicro products, visit
www.supermicro.com.
Follow Supermicro on Facebook and Twitter to receive their latest news and
announcements.
About Super Micro Computer, Inc. (SMCI)
Supermicro®, the leading innovator in high-performance, high-efficiency server
technology is a premier provider of advanced Server Building Block Solutions®
for Data Center, Cloud Computing, Enterprise IT, Hadoop/Big Data, HPC and
Embedded Systems worldwide. Supermicro is committed to protecting the
environment through its "We Keep IT Green®" initiative and provides customers
with the most energy-efficient, environmentally-friendly solutions available
on the market.
Supermicro, SuperServer, Server Building Block Solutions, BigTwin, SuperBlade
and We Keep IT Green are trademarks and/or registered trademarks of Super
Micro Computer, Inc.
All other brands, names and trademarks are the property of their respective
owners.
SMCI-F
https://www.bloomberg.com/amp/press-releases/2019-04-29/supermicro-announces-expansion-of-silicon-valley-corporate-headquarters-and-groundbreaking-for-new-800-000-square-foot-building
good or bad?
Has anyone had any luck contacting the IR over the delisting and the possibility to get back on the exchange?
So will we see a 1:1000 split?
Another ceo of a company said many times that there wouldn't be split. Guess what happened?
Thanks for the heads up.
Expect a crash soon after.
You should NOT be loading up. A R/S will wipe you out.
If a R/S is going to happen then bail.