ADVFN Logo ADVFN

We could not find any results for:
Make sure your spelling is correct or try broadening your search.

Trending Now

Toplists

It looks like you aren't logged in.
Click the button below to log in and view your recent history.

Hot Features

Registration Strip Icon for default Register for Free to get streaming real-time quotes, interactive charts, live options flow, and more.

TERN Tern Plc

2.20
0.15 (7.32%)
19 Jul 2024 - Closed
Delayed by 15 minutes
Share Name Share Symbol Market Type Share ISIN Share Description
Tern Plc LSE:TERN London Ordinary Share GB00BFPMV798 ORD 0.02P
  Price Change % Change Share Price Bid Price Offer Price High Price Low Price Open Price Shares Traded Last Trade
  0.15 7.32% 2.20 2.10 2.30 2.20 2.00 2.00 662,211 11:46:42
Industry Sector Turnover Profit EPS - Basic PE Ratio Market Cap
Finance Services 66k -10.45M -0.0269 -0.82 7.97M
Tern Plc is listed in the Finance Services sector of the London Stock Exchange with ticker TERN. The last closing price for Tern was 2.05p. Over the last year, Tern shares have traded in a share price range of 1.65p to 10.50p.

Tern currently has 388,571,510 shares in issue. The market capitalisation of Tern is £7.97 million. Tern has a price to earnings ratio (PE ratio) of -0.82.

Tern Share Discussion Threads

Showing 208551 to 208564 of 449950 messages
Chat Pages: Latest  8350  8349  8348  8347  8346  8345  8344  8343  8342  8341  8340  8339  Older
DateSubjectAuthorDiscuss
07/9/2019
00:24
Honestly Duxy n JonC you are both so obviously anti Tern it is unbelievable. Whether for financial gain, exposure on bulletin boards, remuneration or pure avarice because feel wrongly done elsewhere it matters not. Occasionally you come up with decent points but every single time you fail to balance with this one unmistakable fact ... DA does not need to be the market leader nor one of the market leaders ... DA needs only 1 to 2% of the market to be very successful. Now despite what you say and all the other market competitors even you two halfwits must admit at some point that DA have something and something very likely that will be much more than 1% of the market. And that's before FVR and Wyld and InVma. Honestly would much rather have my money here than where you seem to have yours. Each to there own and time will tell. Hope you have a good weekend. I am and will ...
meganxmas
06/9/2019
22:49
Mobileye, an Intel subsidiary, chose Orange Business Services to provide IoT connectivity for its next-generation product, Mobileye 8 Connect. The connectivity support will be implemented in Asia, Europe, and the U.S.LoL
duxy786
06/9/2019
20:37
Key point to note as andrbea pointed out..."the incorporation of cloud in critical applications, such as key management and key storage, through HSM induces problems common to cloud infrastructures. As a result, cloud hardware security module services are still expensive and are required to be further enhanced."CloudHSM's are provided by HSM providers...last I checked, DA was not a HSM provider.#StupidSheep
duxy786
06/9/2019
20:34
From stead...The rampers are too thick to understand what HSM as a service is, DA are not offering this service but a HSM provider can(So they say). They had an issue with a client and it looks like if you had access to an HSM via keyscaler then you could view all data without restriction and to overcome this they had to develop a fix, this fix has now become the HSM Access Controller, this HSM access controller will allow multiple users to access the data held in an HSM but they will have restricted access, they can only view the data that they are cleared to do so...So now you can see how these HSM providers could offer this service, they could use Keyscaler to sell partitions of an HSM.Whether this affects the FIPS 140-2 certification I am unsure, maybe DA could clarify, if it fails to get FIPS 140-2 certified then it is pointless....
duxy786
06/9/2019
20:06
The rampers are too thick to understand what HSM as a service is, DA are not offering this service but a HSM provider can(So they say). They had an issue with a client and it looks like if you had access to an HSM via keyscaler then you could view all data without restriction and to overcome this they had to develop a fix, this fix has now become the HSM Access Controller, this HSM access controller will allow multiple users to access the data held in an HSM but they will have restricted access, they can only view the data that they are cleared to do so...


So now you can see how these HSM providers could offer this service, they could use Keyscaler to sell partitions of an HSM.

Whether this affects the FIPS 140-2 certification I am unsure, maybe DA could clarify, if it fails to get FIPS 140-2 certified then it is pointless....

stead41
06/9/2019
19:39
Seeman, you are a larf, get a job in a pantomime, oh! Yes you can, Oh! No you can’t.
poppet123
06/9/2019
19:36
yeah Ty m8, I always knew Duxy's IT knowledge amounted to sweet FA but it seems that was being way too generous.

Duxy I know your there, lurky in the backgound, soft's cat got your tongue?

1happydays
06/9/2019
19:02
14.8.19

the cost factor:

Moreover, Hardware Security Module-as-a-Service (HSMaaS) solutions offered by some vendors in the market are expensive. Though hardware security modules offer reliable security, cost is a major factor to be taken care of to capture the market as well as achieve market growth.

Several hardware security module vendors are making efforts to make hardware security module services available at reduced costs by means of cloudHSM. However, the incorporation of cloud in critical applications, such as key management and key storage, through HSM induces problems common to cloud infrastructures. As a result, cloud hardware security module services are still expensive and are required to be further enhanced.

andrbea
06/9/2019
18:59
Happydays, ffs who would seriously consider HSM as a Service. The clue is in the words. If guru Duxy tells you there's no such thing then you should believe him. Except. Hold up. What's thishttps://techcrunch.com/2016/07/06/how-hardware-as-a-service-will-save-iot/And thishttps://searchitchannel.techtarget.com/definition/Hardware-as-a-Service-in-managed-servicesOh dear. Another epic failure by our NHS IT layabout. 10 years behind the leaders.
tyrano1
06/9/2019
18:45
Stop it duxy, you're embarrassing yourself, funny to watch though

duxy7866 Sep '19 - 18:36 - 164227 of 164227

HSM as a service....what utter boll£ck.

HSM - HARDWARE security Module. The key is in the words. Bunch of stupid sheep.

1happydays
06/9/2019
18:41
Who said we are just a plug in or add on LOL....
A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server.

wardy333
06/9/2019
18:19
Andrbea, read that the other day and thought who's copied who ?

Then read DA news again and saw they said following requests.

So either no other solution out there or what is out there doesn't cut it ?

Mmmm

still waiting
06/9/2019
17:21
blog
July 25 2019

HSM as a Service (HSMaaS) for Multicloud Environments

A third encryption key management option to consider provides HSM-grade security with the convenience of a key management service. HSM as a Service offers a centralized approach to encryption key management across the major cloud provider environments—Ali Baba, AWS, Azure, IBM, Google and Oracle, as well as on-premises corporate data centers.

HSM as a Service is available on-demand, scales globally and provides a cloud-friendly API for custom integration and development. When deployed in globally interconnected data centers, HSM as a Service allows an enterprise to locate encryption key management services “at the edge,” supporting high-volume data transactions by minimizing latency.

If you are one of the 84 percent of enterprises employing a multicloud strategy, HSM as a Service may be the most efficient and consistent means of managing encryption keys across the various environments.

Distributed Data Security – Challenges and Options

Managing encryption keys in cloud environments presents new challenges for data security teams. Unlike data maintained in the corporate data center, distributed data-at-a-distance can be exposed to a greater number of breach attempts. With the variety of cloud strategies—private, hybrid and public—and the number of cloud providers hosting data and applications, data security professionals need to implement encryption key management solutions to ensure data security while simplifying overall key management responsibilities.

HSMs, KMS and HSM as a Service can address the full spectrum of encryption key management needs. We’ll explore these options, addressing the pros and cons of each, in greater detail in upcoming distributed data security blogs.

andrbea
06/9/2019
17:00
That must be the lowest number of trades ive seen here.
oldishrocker
Chat Pages: Latest  8350  8349  8348  8347  8346  8345  8344  8343  8342  8341  8340  8339  Older