ADVFN Logo ADVFN

We could not find any results for:
Make sure your spelling is correct or try broadening your search.

Trending Now

Toplists

It looks like you aren't logged in.
Click the button below to log in and view your recent history.

Hot Features

Registration Strip Icon for monitor Customisable watchlists with full streaming quotes from leading exchanges, such as LSE, NASDAQ, NYSE, AMEX, Bovespa, BIT and more.

TERN Tern Plc

2.20
0.15 (7.32%)
19 Jul 2024 - Closed
Delayed by 15 minutes
Share Name Share Symbol Market Type Share ISIN Share Description
Tern Plc LSE:TERN London Ordinary Share GB00BFPMV798 ORD 0.02P
  Price Change % Change Share Price Bid Price Offer Price High Price Low Price Open Price Shares Traded Last Trade
  0.15 7.32% 2.20 2.10 2.30 2.20 2.00 2.00 662,211 11:46:42
Industry Sector Turnover Profit EPS - Basic PE Ratio Market Cap
Finance Services 66k -10.45M -0.0269 -0.82 7.97M
Tern Plc is listed in the Finance Services sector of the London Stock Exchange with ticker TERN. The last closing price for Tern was 2.05p. Over the last year, Tern shares have traded in a share price range of 1.65p to 10.50p.

Tern currently has 388,571,510 shares in issue. The market capitalisation of Tern is £7.97 million. Tern has a price to earnings ratio (PE ratio) of -0.82.

Tern Share Discussion Threads

Showing 209026 to 209040 of 449950 messages
Chat Pages: Latest  8362  8361  8360  8359  8358  8357  8356  8355  8354  8353  8352  8351  Older
DateSubjectAuthorDiscuss
11/9/2019
08:04
Oh look he's back with his bum chum aka wardy .. wonder if they both live in the same home?#PensionersRus
duxy786
11/9/2019
07:45
Perhaps DA could offer Green Shield Stamps to boost turnover.
jonc
11/9/2019
07:43
DAs revenues??!?Want to give us all your estimate??I could do with a laugh.
jonc
11/9/2019
07:36
Not dead then what a shame.
wardy333
11/9/2019
07:35
Usual 7AM barrage of negative bullsh1t from the team. Keep it up boys, it isn’t working and you’re going to lose everything very soon.

I personally don’t think we’ll hear anything before the Microsoft/DA webinar, that’s when the news flow will start.

Pounds not pence as many on here say.

maarleck
11/9/2019
07:26
Expect the latter sweepie.....this is AIM after all. You seem to have over invested here or is it just your personality that you can't handle monetary loss. If that is your case, suggest you prepare yourself of the next placing and a massive drop in SP, heading this way.
duxy786
11/9/2019
07:24
Sorry meant IOT not AI
duxy786
11/9/2019
07:23
My preferred approach to Al security is network slicing...network slicing securityFirst of all, network slicing provides isolation between the slices, both in terms of traffic and resources. While traffic isolation also can be provided by Virtual Private Networks (VPN), resource isolation requires support from the network. Isolating resources and control in addition to user traffic plays an important role in protecting critical systems from DoS attacks. For example, if IoT devices of a particular kind, all having a common vulnerability, are placed in one slice, the scope of a potential attack can be limited. As a consequence, the more slices we have, the better the resources are isolated. In the extreme case, we could have dedicated slices for specific services, tenants, geographical areas and device classes.Slices can be customized with different security mechanisms and policies. For example, there may not be any need to offer direct internet connectivity to devices in a slice where the services are provided as virtual network functions (VNFs) within the slice. Each slice can operate with different security functionality, such as firewall configurations, access policies, packet inspection, etc. that has been customized for the given services. Slices can provide their own charging and authentication schemes.Second, if devices with similar behavior and characteristics are allocated to the same slice, it is easier to observe the typical behavior and detect anomalies and changes in behavior and traffic patterns. For instance, a device in an IoT slice whose traffic no longer matches IoT traffic patterns might trigger a warning.As a reaction to threats, we have also studied mechanisms for transferring a device from one slice to another. This, combined with the possibility to dynamically create new slices, allows a security function to isolate devices to a separate slice. For example, once suspicious behavior has been observed, the affected devices could be transferred to a quarantine slice, which may be a replica of the original slice with certain modifications. This slice may be configured with more strict firewalls, restricting traffic to specific destinations, lower bandwidth, firewalls, and/or inspection functions for deeper analysis. Instead of completely blocking the device, we can allow it to operate under tighter restrictions. 
duxy786
11/9/2019
07:22
With this silence news when they can be bothered to put it out will either BE MASSIVE or be a complete betrayal to lth
sweepie2
11/9/2019
07:18
September 10, 2019 PHOENIX--(BUSINESS WIRE)--Leading global technology solutions provider Avnet (Nasdaq: AVT) has entered into a strategic alliance with Trusted Objects, a software company specializing in the Internet of Things (IoT) security, to bring to market a scalable end-to-end security solution for low-power IoT devices. The relationship provides IoT customers with the ability to comprehensively secure their devices while speeding time to market, reducing costs and managing complexityhttps://www.businesswire.com/news/home/20190910005860/en/Avnet-Trusted-Objects-Form-Strategic-Alliance-Secure
duxy786
11/9/2019
07:15
https://www.trusted-objects.com/
duxy786
11/9/2019
07:15
TRUSTED OBJECTSOur vision is that end-to-end security - from device to cloud - is a critical success factor for IoT deployment.Our mission is to provide state of the art security solutions and services enabling a strong root of trust for the IoT ecosystem.Proven technologyTrusted Objects solutions and services are based on long-standing and proven smart security technologies. They are scalable and adapted to meet the requirements of the IoT market, from the design phase to the product life management..Secure digital identityIoT complex ecosystem requires a robust root of trust. Trusted Objects solutions and services provide secure digital identity to connected devices making each device unique and protected against logical and physical attacks. Compliance with existing and future regulations on data protection (GDPR, NIS and others) is facilitated.Integrability and cost-effectivenessSecurity technologies developed by Trusted Objects are easy to integrate into the IoT value chain and are optimized to provide cost-effective solutions while significantly reinforcing security.
duxy786
11/9/2019
07:07
The CURRENT STATE of TERN=========================Disclaimer: this is not a shorter attack or investment advice. Do as you please and DYOR before investing.The rampers here have pushed the share price to 10p because device authority got in partnerships with some global companies. This ramping has been used time and time again to push the share price up. What they would rather not tell people is that these partnerships are used to develop a connector for Device Authority's Keyscaler to the vendors platform so it can hopefully be sold as a solution together. Head to the DA website to look at the vendor connectors all built using these partnerships.These partnerships therefore cost money not bring in money until and ofcourse, when a joint solution is sold. The last contract was announced back in December 2018. They have, since, not announced a single  contract. The rampers will tell you that ARM came to Intel to scale their solution, somthing Intel rely on DA  to do for them as they are the only one able to do it.....what utter rubbish. In this very recent article, ARM says the following: "The advanced automation engine has evolved within the platform as we have gone and deployed millions of active IoT devices, which on a manual basis is not impossible, particularly as we scale," said Nigel Chadwick, general manager and vice president, connectivity at Arm's IoT Services Group. Full article:Arm's Latest IoT Connectivity Platform Features AutomationThe latest Pelion IoT connectivity leverages functionality from the IoT-X platform from Stream Technologies, which Arm acquired last year. Written byBrian Buntz2nd August 2019. The article is available here: https://www.iotworldtoday.com/2019/08/02/arms-latest-iot-connectivity-platform-features-automation/So there you have it, from the horses mouth. Arm Pelion plagform is now being uaed by millions of devices. Here are some of the other partnerships discussed in detail....On the Microsoft front....Microsoft adds iot device protection to azure security center...without Keyscalar.....Full article:https://www.bleepingcomputer.com/news/microsoft/microsoft-adds-iot-device-protection-to-azure-security-center/On the Intel front:It is all there in black n white"For customers without a device management platform, or for IoT platform providers that want full device lifecycle management capabilities, Intel can offer Intel SDO that comes pre-integrated with Wind River Helix* Device Cloud. The combination of the two solutions enables a complete hardware-secured device lifecycle-from onboarding a clean device baseline to delivering a secure software update."Intel lists a Solutions brief with DA, but when you click on this link, it takes you to the detailed brief of the IoT Provisioning with Intel® Secure Device Onboard (Intel® SDO) download page.https://www.intel.co.uk/content/dam/www/public/us/en/documents/product-briefs/intel-secure-device-onboard-product-brief.pdfI have already proven that Intel now use the ARM Pelion Platform for scale and Intel have themselves announced this. Keyscalar, is an Add on but unnecessary now that Pelion can do it all and it's a one stop shop for IOT management. Google it, you will find it.On the nCipher front:They nearly got in with nCipher, but as I have proved, nCipher will now use their new Parent company EnTRUST Datacard's IOT platform, going forward, which can do everything Keyscalar can and more.On the Sectigo IoT Manager front:I have proved that the Sectigo IoT Manager does not use or need Keyscalar - This was proven correct by no other than the CTO of Sectigo IOT see here:The future of PKI in Modern EnterprisesA Talks with Tim Callan, Senior Fellow and Jason Soroko, CTO of IOT at Sectigo.https://www.brighttalk.com/webcast/17629/357259/the-future-of-pki-in-the-modern-enterpriseChief Technical Officer speaks for Sectigo and says it CLEARLY at 35:30.On the Gemalto front:I have proved that Gemalto's Keysecure has nothing to do with Keyscaler and does not mention its use or integration in posts: 152049, 152053, 152056 and 152092 i.e.https://safenet.gemalto.com/resources/data-protection/keysecure-key-management-product-brief/Gemalto Third-party Integration Support:Identity Management: Centrify Privilege Service, Lieberman SoftwareOn the GlobalSign front:I have also proved GlobalSign does not use KeyscalarLongview partners with GlobalSign and Intrinsic ID to deliver comprehensive IoT securityHttps://www.theinternetofallthings.com/longview-partners-with-globalsign-and-intrinsic-id-to-deliver-comprehensive-iot-security/and the latest:GlobalSign safeguards the certified equipment and equipment webservers of LXI members, from the manufacturing floor through end-customer deployment. This is accomplished through a device identity provisioning and management system, built on the GlobalSign IoT Identity Platform in partnership with security framework provider beame.io’s authentication services.https://www.helpnetsecurity.com/2019/06/19/globalsign-lxi/So, on the Device Authority Keyscaler front:Why partner with anyone else if Keyscalar and Device Authority partnership allowed them to do everything and more according to the scum of this thread.Still zero funding from investors with very deep pockets of Silicon Valley. Sad really. Begging bowl out soon.To summerise, the rampers here would have everyone believe the world needs Keyscalar and at one point use to scream "Keyscaler Inside" but reality is that the world is doing IoT perfectly well without Keyscalar and companies like Mocana, with 100 Million devices already on-boarded proves without a shadow of a doubt, that Keyscalar is redundant.So what of Device Authority now. Well with no external funding and only DA propping it up, expect more Placings and More loans....and best they can hope for is a clean exit at a few thousand pounds if they are lucky.
duxy786
11/9/2019
07:06
Morning rampers.
jonc
11/9/2019
06:36
Warriorz7,I believe the majority of people do care if there is a proven liar, deceitful, fantasy hindsight trader on a board as people like this will use any trick possible for their own gain. Just because that person is positive in their posts here doesn't mean they are suddenly trustworthy and doing what they claim to be.You may be happy to turn a blind eye to it, many will find it extremely distasteful and potential new investors should extremely wary.
crazytowner
Chat Pages: Latest  8362  8361  8360  8359  8358  8357  8356  8355  8354  8353  8352  8351  Older