The staff of TheStreet need to go back to school to learn how to research a company an print facts that are correct. It is obvious and we now know who is shorting this company's stock.
Printing false news under the guise of a Buy recommendation with false negative information included.
Dell is dead money. Especially at today's inflated price due to Goldman Sachs exiting its position for some of its special clients.
Everyone knows when one of the 5 largest banks that are too big to fail change their position such as now that the Fed is behind it. Fed clients need to exit this stock at a smaller loss. So Goldman, the World Bank heavyweight, wields its heavy hand to manipulate another stock for the wealthy.
All fundamentals point to the fact that Dell will be substantially lower in 3-6 months as losses mount.
Bloomberg -- By Nina Mehta - Nov 9, 2012 5:07 PM CT
The SEC is examining Knight’s compliance with the so-called market-access rule, adopted in 2010 to reduce the risk of trading disruptions and improper and manipulative activity. The rule, which went into effect last year, requires brokers to employ risk checks on orders before they’re sent to markets to make sure they aren’t erroneous and don’t exceed preset capital and credit levels.....
Knight bombarded U.S. equity exchanges with erroneous orders on Aug. 1 after improperly installing software that malfunctioned, according to CEO ThomasJoyce. The trading caused volume to surge and prices to swing in dozens of securities listed on the New York Stock Exchange and NYSE Arca.
Knight was taken over by six Wall Street firms including Jefferies Group Inc. and Blackstone Group LP (BX) in August after losses associated with the computer malfunction depleted its capital.
And they still are doing it.... Along with TD Ameritrade, Jeffries Group, Inc., and Blackstone Group LP. These wall street manipulators sponsor hedge funds that have improper access to personal information of other traders through technology that they install onto PCs throughout the world without disclosing the fact that they hack computers to obtain unfair trading advantages and to steal or manipulate share activity for their own profit.
Ludicrous. MM manipulation to steal shares. Knight Trading Group needs to be reported to the SEC today. Again!! Three days in a row of MM manipulation by Knight and TD Ameritrade.
What does a need for capital, a exploration of strategic alternatives, a delay of all meaningful game titles, a massive loss quarter after quarter, a substantial loss of market share and sales, an almost non-existent cash position, and a long list of games that do not reach revenue expectations mean.....
You guessed right.... Bankruptcy.... A need of execs of THQ to explore ways to move equity value from the hands of the common shareholders into the pockets of the execs and new shareholders (newly issued shares and cancellation of existing shares). The writing is on the wall. The conference call just simply confirmed the truth.
I guess January - March is their expected DOA date. Just be sure to exit quickly enough so that the door does not hit you on the way out....
Sentiment: Strong Sell
I agree that THQI will beat estimates of a massive loss to not as nearly a massive loss. But a massive loss is a massive loss. This company is out of cash and will have to declare bankruptcy first before its major games are released in the March-April timeframe. I have invested in this company in the past and others like it.
The management intends to declare bankruptcy first, wipe its debts clean (by cancelling common), and then re-issue new shares before the new games are release in April.
The earnings will result in sub-$2 -- horrible numbers, even with a beat of estimates. They will declare bankruptcy within a few weeks because there are no funds until April.
I will be shorting this stock into the mid-$1s. This company is out of cash....
Sentiment: Strong Sell
5. Access and Accuracy: Consumers have a right to access and correct personal data in usable formats, in a manner that is appropriate to the sensitivity of the data and the risk of adverse consequences to consumers if the data is inaccurate. Companies should use reasonable measures to ensure they maintain accurate personal data. Companies also should provide consumers with reasonable access to personal data that they collect or maintain about them, as well as the appropriate means and opportunity to correct inaccurate data or request its deletion or use limitation. Companies that handle personal data should construe this principle in a manner consistent with freedom of expression and freedom of the press. In determining what measures they may use to maintain accuracy and to provide access, correction, deletion, or suppression capabilities to consumers, companies may also consider the scale, scope, and sensitivity of the personal data that they collect or maintain and the likelihood that its use may expose consumers to financial, physical, or other material harm.
6. Focused Collection: Consumers have a right to reasonable limits on the personal data that companies collect and retain. Companies should collect only as much personal data as they need to accomplish purposes specified under the Respect for Context principle. Companies should securely dispose of or de-identify personal data once they no longer need it, unless they are under a legal obligation to do otherwise.
7. Accountability: Consumers have a right to have personal data handled by companies with appropriate measures in place to assure they adhere to the Consumer Privacy Bill of Rights. Companies should be accountable to enforcement authorities and consumers for adhering to these principles. Companies also should hold employees responsible for adhering to these principles. To achieve this end, companies should train their employees as appropriate to handle personal data consistently with these principles and regularly evaluate their performance in this regard. Where appropriate, companies should conduct full audits. Companies that disclose personal data to third parties should at a minimum ensure that the recipients are under enforceable contractual obligations to adhere to these principles, unless they are required by law to do otherwise.
The Consumer Privacy Bill of Rights will give Internet users the right to: control what data is collected, how their personal data is used and shared; avoid having information collected in one context and then used for another purpose; have data held securely; and to know who is accountable for the misuse of the data. It applies to personal data, which means any data--including aggregations of data--that is linkable to a specific i1. Individual Control: Consumers have a right to exercise control over what personal data companies collect from them and how they use it. Companies should provide consumers appropriate control over the personal data that consumers share with others and over how companies collect, use, or disclose personal data. Companies should enable these choices by providing consumers with easily used and accessible mechanisms that reflect the scale, scope, and sensitivity of the personal data that they collect, use, or disclose, as well as the sensitivity of the uses they make of personal data. Companies should offer consumers clear and simple choices, presented at times and in ways that enable consumers to make meaningful decisions about personal data collection, use, and disclosure. Companies should offer consumers means to withdraw or limit consent that are as accessible and easily used as the methods for granting consent in the first place.
2. Transparency: Consumers have a right to easily understandable and accessible information about privacy and security practices. At times and in places that are most useful to enabling consumers to gain a meaningful understanding of privacy risks and the ability to exercise Individual Control,companies should provide clear descriptions of what personal data they collect, why they need the data, how they will use it, when they will delete the data or de-identify it from consumers, and whether and for what purposes they may share personal data with third parties.
With the SEC about to file a lawsuit against ALU for violating federal law in regards to privacy, the fed needs to access the impact to companies such as AT&T, Verizon, CenturyLink, Windstream Communications, and other American Companies.
Alcatel-Lucent has been found guilty of federal FTC crimes involving violation of privacy protection laws.
For all of the Middle-Eastern people who frequent this board.... This company is run by the French. In no way are Americans (real Americans) okay with spying on people without a warrant (reasonable suspicion supported by the federal court).
If France thinks it is okay to spy on Americans and foreign labor through the ISP, it is about time Americans and other nationalities unite to eliminate this privacy threat and violation of the US Constitiutional mandates. Electronic violation of rights need to be regulated by federal law as well.
Bush cannot change the Constitiution. Nor can Obama. The Constititution can only be changed with 3/4 vote of Congress, and thus, the violation of civil and privacy rights by companies such as Alcatel-Lucent is in violation of Federal and State laws.
This company needs to be shut down by the US government because it is violating constitutional law....
This software is a trojan - rootkit - keylogger software virus. It will slow your system down to a crawl. This is how AT&T and its help desk group is allowed to steal all of your music and videos from your PC. Motive is paid to spy on Americans. That is why Motive Communication software is used by AT&T, Time Warner, British Telecom, Australia Telecom, Chinese Telecom, and most other IP providers in the US (Windstream Communications, Verizon, CenturyLink, etc.).
This company is paid to steal information from your PC. They will share your whole hard drives through indirect, hidden drive shares through their manipulation of the Users directory using link junctions. Look it up. Use "Link Junction" to discover the hidden shares. This company is working for the US government and the French government to make all of your private data public to the Indian contractors who manage your computer on their network servers (your computer is actually booting to a network server through an IPv6 Link Local address).
What I am telling you is true. This company is spying on you and all computers who load the Motive Communications software.....
Does Alcatel offer a clean-up utility for their messy uninstall program for their "AT&T Self-Support Tool"?
AT&T forces a user to install this tool in its internet connection setup, but the tool turns a person's PC into a 3rd World country's distributed computing trojan machine for running many of the 3rd world's illegal businesses and file sharing.
The uninstall of the program leaves 1000s of motive MCCI program entries that are tied to remote servers. The tool apparently opens the PC on which it is installed to allow remote access / control by emloyees throughout the world and partnered with Alcatel-Lucent. The program acts like a Trojan downloader by continually downloading updates to the software even after the software is uninstalled and the directories removed.
Anyone from Motive or Alcatel-Lucent with an idea why the software acts like a rootkit / trojan virus?
When you uninstall both the AT&T Self Support Tool and the Motive MCCI software, the uninstall fails to uninstall and remove about 1000+ entries in the Windows registry.
If left alone, the software continues to re-install itself onto a user's computer and appears to act as a rootkit / keylogger / trojan, continually updating software on the computer to allow remote access / remote control of a person's PC without the permission of the user. Since the uninstall program only temporarily removes the software, but leaves thousands of links to remote sites in the registry, the computers on which the software is installed completely compromises the PCs on which the tool is installed and continues to act like a trojan by re-installing the remote access software.
Does anyone know if either Motive Communications or AT&T offers a cleanup tool to remove this rootkit from a person's computer once the software is determined to be no longer needed?
I pose this question regarding Alcatel-Lucent (specifically regarding the MCCI software provided to Cable / DSL providers):
Is it legal for a firm to remain in business that implements a rootkit / trojan / keylogger software (though its workflow engine that is required to be installed by every cable / dsl home user) without asking the permission of the end-user whether they want every printed page, screen image, mouse event, and file on their system to be sent to a remote "cloud" server without the end-user's permission? And where in their software do they disclose that they intend to use "managed server" software on your computer and convert your system to a workstation dependent on the "managed server" at a remote location?
And where does Alcatel-Lucent disclose to the world that they have the right to change the administrative settings on the end-user's local system (and hide the fact fron the user), as well as "steal" both files and other information from the end-user without making them aware? And is this even legal at all in the United States, Europe, Canada, and most other foreign countries?
This company is selling information to firms and countries that it is illegally stealing from users without their permission and outside the laws of most countries.
Isn't this a matter that should be discussed? Isn't this information pertinent to the company and lawsuits that may arise from the information theft / illegal activities?
You do not understand the context of the message I am trying to discuss. Motive Communications, a subsidiary of Alcatel-Lucent, creates a workflow software that runs on most DSL / Cable modem installations including AT&T, CenturyLink, British Telecom, Windstream Communications, and Time Warner. This software creates ARP entries on the computer on which your modem (typically provided by the DSL / cable company) which create a direct hidden network connection to sites that allow remote users, through the MCCI software installation, to remotely log into and view and modify your files, history, logs, etc. on your computer by creating multiple hidden accounts on your system.
The hidden accounts are created under C:\Users. The two accounts it uses to hack your computer are C:\Users\All Users and C:\Users\Default User. It implements the user hack using junction directory links, modifies the registry to run multiple services (including the use of screen projection, remote shadow copy imaging of your system onto their network, voice recognition, printer faxing via MS Mail of each page you print, etc.).
It also modifies your registry significantly, hides software on your system, changes permissions using active directory / terminal services through IM, etc. Their software imlements a complete recompiled version of the Windows NT kernal on all versions of Windows, possibly the Mac as well. The software uses hidden configuration files under "C:\Windows\System32\config" and will reload your hacked registry from their network whenever you attempt to unhack the hack.
Their hack is almost irreversable. Believe me, I have tried for 3 years to unhack my systems of their software.
Alcatel is involved in spying on Americans using Indian labor working in the US. It is a use of foreign labor to bypass the US Patriot Act's requirements for spying on citizens of foreign countries. By using Indian labor, the Patriot Act's requirements are circumvented and the spying on the American common man is accomplished.
Ever wonder why 3/5 of all employees working for IT firms are Indian / Pakastanian / Mexican / South American / Japanese / Korean / etc. The reason has lies in the IS government's need to bypass the Patriot Act provisions.
Motive Technologies' software runs with most DSL / Cable internet High-Speed DSL / Cable installations. 95 percent of all employees working for Alcatel-Lucent are Indian / Middle Eastern / Arabian / or Russian.
This company is involved in espionage in the US though its French parent comany, Alcatel-Lucent.
Either this is the case, or the US is paying this company to provide un-lawful information regarding American citizens. The MCI software installed with AT&T provided by Motive Communications is a combination keylogger / advanced trojan software that enables remote users to log into the computers of the users on which the software is installed.
It is time that Americans stand up to the injustice that is being implemented by the Patriot Act by the CIA on American citizens. The Act does not allow the spying on American citizens. Congress needs to stop this abuse of the Act by the CIA and by foreign governments.
Most stocks with huge earnings trade at PEs of 1-8 in this bad market. This company posts a massive loss but beats the more massive losses forcast by analysts.
And it goes up. Funny!!!
I have stocks with PEs of 1-3 that beat estimates quarter after quarter while growing revenue at 25-60 percent annually. And they are being killed everytime someone cries wolf, or GREECE, or ITALY, or whatever negative vibe they can throw at the market.
THQ is doing quite bad, and has been for the last few quarters. I guess they should not be under $1.00, but definitely not priced over $2.00.