||EPS - Basic
||Market Cap (m)
Tern Share Discussion Threads
Showing 115351 to 115371 of 115375 messages
|The puppets Harry and Soft T are errand boys for Winnie the Pooh I thought you all figured that one out already.|
|I think the tern bod have been a bit naïve to think the tern share price would rise without news when they give a big chunk of equity away at 7p but AS and Darron make the bulk of money when DA is sold so will want a big exit as well.
the 10% flippers have no interest in Stage 3, so better when they are gone imho.|
|harrissen kick started the buying ..good chap ..kk|
|sellers come, sellers go but iot market is a stayer.
DA will shine with or without this seller.|
|Harrissen. Do you think that the only people who buy shares in Tern are the ones that read this board. I would guess that only a very small % of Tern shareholders read this board.soft 1. Why do you take such pleasure in people losing money?|
|only one reason shares 8.5p and everybody knows it success equals sustained buying, or just the reverse.|
|Seller is never far away,take a few weeks off mate, two more days and we won't be able to blame Tax reasons so lets see what happens.|
|What is a 'Golden Cross'
The golden cross is a bullish breakout pattern formed from a crossover involving a security's short-term moving average (such as the 50-day moving average) breaking above its long-term moving average (such as 200-day moving average) or resistance level. As long-term indicators carry more weight, the golden cross indicates a bull market on the horizon and is reinforced by high trading volumes.
Read more: Golden Cross Definition | Investopedia|
|3 years of the same nonsense. Will be the same right down to insolvency. Funny though.
Still Waiting 29 Mar '17 - 10:20 - 62521 of 62523 1 0
still feel a blockbuster rns from da/tern and you just won't be able to buy in any significant qty ..|
|Blockbuster RNS? pleading for 4 years now-------there aint none, pity.|
|big holders still take every opportunity to get out-------------they know the score------------industry not buying DA solutions---------if it were this share would be flying,simple.|
|still feel a blockbuster rns from da/tern and you just won't be able to buy in any significant qty ..|
|8.62-----------off to the races-------------!!!!!!!!!!!!!!!!!!!!|
|There must a few bucks to be made in IoT security. Here's another security player (Mocana) that has embedded its software in GE devices, they claim.
Mocana has about 200 customers using its IoT security products including Schneider Electric. The firm’s customer base is primarily in the industrial manufacturing, automation, aerospace, and utilities area. Mocana also works with GE Digital’s Predix IoT platform and has incorporated its security software into several GE devices across the company’s product lines.
Mocana Vice President of Engineering Srinivas Kumar said the company’s security platform has a modular design and an automated digital certificate so companies can scale their IoT deployments. He added that the platform has a hardened inside-out approach that ensures endpoint and gateway trustworthiness, data and device security, and authentication.
“Any application running on the device will internally generate their certificates showing proof on the device,” Kumar said.
He added that one of the big challenges in the IoT industry is that many companies focus on physical security and use a layered networking defense. However, it is difficult to defend against malware and phishing schemes without adding security at the end points. “We provision certificates on endpoints, and that will help companies scale to millions of devices more easily,” he said.
|8.62 off to the races :)|
|TbUrns.....I'm in your boat and thought the same !!!|
|another article (March 28):
Anything connected to the Internet has the potential to be exploited, whether it’s your refrigerator or an industrial control system. The sheer number of connected devices makes this complex for businesses.
Take a mining operation where 20 pieces of equipment each has hundreds to millions of sensors collecting and reporting real-time data. Each of these sensors is a connected “thing” that needs to deliver information to and from the network. One of these sensors may detect wear on the piece of equipment and report back the need for maintenance, or even control pausing its workload or shifting workload to another piece of equipment. Hacking this device could be used to send false instructions to physical equipment putting performance or safety in jeopardy.
There are endless scenarios where the industrial IoT, if accessed by hackers, could wreak havoc. Imagine the impact of a successful attack on the energy grid, chemical plants, medical equipment, oil fields or even traffic lights or ATMs. Then, there’s the scenario we saw last fall where unsecure IoT devices were used for a distributed denial-of-service (DDoS) attack on a massive scale.
|I thought I was doing well ebomber with 1/2M fully paid for, way to go!|
|Sector article (March 28):
Organisations require an IoT idM solution that can provide the following key security capabilities:
Relationships – Between entities & users are essential, and must be monitored over their full lifecycle.
Adaptive authentication and policy-based data access governance – Helps in establishing finely tuned, contextual control.
End-to-end encryption – Ensures data is secured at the network and the device, as well as everywhere else along its journey.
Extreme scale, performance and availability – Reliably handles the massive volumes of data the IoT generates.
Full-featured privacy, preference and consent management – Fully ensures users can control their IoT experiences.
Aside from the necessity of protecting user data through effectively securing devices, there is a genuine opportunity to create new methods of authenticating users via the devices in the IoT. Two and Multi-factor authentication methods used on our smartphones provides an early example of this trend. The smartphone makes a strong authentication device because, for most users, it is always in their possession so easily accessible. Being tightly bound to a user is arguably even more true of the emerging class of wearables used to monitor people’s fitness, sleep and other personal metrics.
Security is simply too important to be treated as an afterthought in the IoT. If security features are added on like an extra coating of paint to existing identity management solutions, important capabilities will likely be missed. Securing identity data for IoT environments is complex, so it must be an underlying part of the IAM infrastructure. We’ve only just scratched the surface of the IoT. To realise its full potential, we need to make sure to get its security right from the beginning.
|Absolutely priceless. Think you are mixing up buying with selling.
goldfinger_196429 Mar '17 - 09:51 - 62512 of 62512 0 0
Anyone selling now really needs to see a shrink imo|
|Anyone selling now really needs to see a shrink imo|