The latest Investing Matters Podcast with Jean Roche, Co-Manager of Schroder UK Mid Cap Investment Trust has just been released. Listen here.
https://www.thegazette.co.uk/notice/2610577 Notice timeline for PHLUIDMEDIA, INC (FC026153) Winding-Up Orders 14/09/2016
http://biblehub.com/sermons/auth/adeney/the_fruitless_fig_tree.htm Quote I. THE CONDITION OF THE TREE. 1. It had promise. This was a forward tree as far as leaves were concerned. Earlier than others of the same species in putting forth its foliage, it gave promise of an early supply of fruit, because the figs appear before the leaves. It is dangerous to make great pretensions. To stand out from our brother men with some claim to exceptional honour is to raise expectations of exceptional worth. We should do well to avoid taking such a position unless we are sure we can sustain it without disappointing the hopes we raise. 2. It was not true to its promise. This was the unhappy thing about the tree. If it had been like the backward trees, nothing would have been expected of it. But by giving a sign which in the course of nature should follow the putting forth of fruit, it made a false pretension. Possibly the vigour of the foliage absorbed the sap which should have helped the fruit buds. Great attention to display directly injures the cultivation of really worthy qualities. Religious ostentation is generally barren. II. THE DOOM OF THE TREE. It is to wither. The fig tree is only valued for the sake of its figs. If these are wanting, the tree is worthless. Its luxuriance of leaves is worse than useless, because it prevents other plants from growing where the fruitless branches overshadow the ground.
May I remind the CPS that "Computer Hacking" which is effectively what I was a victim of in 2006 and 2007... on multiple occassions, via this Phorm/BT device, "DOES NOT " cater for the application of "Any such Public Interest Test". http://www.bailii.org/ew/cases/EWCA/Crim/2013/1026.html
Do not use Google to search for information about this Company, as you may then be accused of working for the aforesaid Google.
Quote:- Unaudited revenue derived from Russia has almost doubled, from RUB15.7 million (approximately US$0.3 million) in Q1 2015 to RUB29.0 million (approximately US$0.5 million) in Q2 2015. The growth in revenue is based on demonstrating the performance of the platform to the advertisers through a series of paid for test campaigns. Phorm is now working with six of the top tier global agencies in Russia. This is an English Website, Please DO NOT QUOTE IN ROUBLES! Quote: (approximately US$0.5 million) in Q2 2015. Still totally unprofitable!
http://itsecurity.co.uk/2015/03/uk-court-of-appeal-issues-game-changing-judgment-in-google-safari-case/ The meaning of damage in section 13 of the DPA, in particular, whether there can be a claim for compensation without pecuniary loss The discussion and decision on this point of the case is without doubt some of the most significant interpretation of law with regards to data protection and privacy that we have ever seen in the UK. Google argued that under the Data Protection Act there was no support for damages as a result of distress (except for some very special circumstances explicitly mentioned in the Act) and that because the plaintiffs had suffered no material damage and did not meet the requirements of the special circumstances for distress that there was no merit in the case and therefore it should be dismissed. However, the Court of Appeal not only disagreed, but rewrote UK law on the grounds that the Data Protection Act was not compatible with the Data Protection Directive (95/46/EU): We cannot, therefore, interpret section 13(2) compatibly with article 23. They went on to explain that despite the fact that Parliament had made very explicit reasons for the types of damage that were covered – they had provided no reasoning for the exclusion of general distress or “moral damage” and as such the Court had no choice than to take the position that the DPA was not compatible and that a judgment must be made in line with Article 23 of Directive 95/46/EC with support from Article 47 of the EU Charter of Fundamental Rights. The significance of this decision can not be overstated. As a privacy advocate, one of the biggest hurdles I have been faced with when filing complaints with the Information Commissioner’s Office (ICO) in the UK has been that of damage. In every single case I have filed with the relevant authorities in the UK the decision to take no action has always hinged on the argument that there was no damage. In cases I have filed with ICO (Google’s WiFi scandal, Phorm and many others) they have always used this argument of damage – the same with the Crown Prosecution Service (CPS) over a criminal complaint I filed against Phorm for criminal breaches of Regulation of Investigatory Powers Act (RIPA) – again the CPS argued it would not be in the public interest to pursue a prosecution because there was no “damage”. With this decision from the Court of Appeal, we now have a precedent that states simply that a misuse of private information is in and of itself a damage – and this is what I have been arguing for nearly a decade. The mere act of abuse of a fundamental right is a damage because whether or not there is any material loss fundamental rights are an essential foundation of our society and any attack on those rights, damages society at a core level.
*** and **** highlighted for "needs clarification" Implications? Note: * Revenues are unaudited. The exchange rate used for H2 2014 is GBP0.614:USD1.000 ***and the above figure includes amounts yet to be invoiced.*** The Company is also undertaking a major cost reduction programme that will result in a prioritisation of those markets where commercial traction is being achieved. ***As a result, the Company will be scaling back its operations in Turkey significantly*** and ****moving towards a remote cookie based platform.**** No mention of China??
https://letsencrypt.org/ Let’s Encrypt: Delivering SSL/TLS Everywhere Vital personal and business information flows over the Internet more frequently than ever, and we don't always know when it's happening. It's clear at this point that encrypting is something all of us should be doing. Then why don’t we use TLS (the successor to SSL) everywhere? Every browser in every device supports it. Every server in every data center supports it. Why don’t we just flip the switch? I don't think this is good news for any Company that relies on piggy-backing/hijacking live web users connections to/from Web servers?
Risks? The Technology is aging and more major Webside encryption is not conducive to such monitoring! Plus other on going events linked to this type of monitoring, content invasion/altering etc.... such as... http://www.chinadaily.com.cn/china/2014-09/25/content_18659159.htm China targets pop-up windows for spreading harmful information (Xinhua) Updated: 2014-09-25 09:48 Slated to start in the near future, authorities will push operators to edit and supervise the contents of pop-up windows on their websites, a statement issued following the meeting said. A stricter protocol will also be imposed for operators installing pop-ups. They are banned from using the method to advertise without the consent of users and users should be able to close these windows by one click. Operators are also urged not to install "too many" as to avoid souring the users experience. The statement, however, did not define what was "too many".
http://www.businessspectator.com.au/news/2014/8/13/china/chinese-privacy-case-raises-risks-doing-business-country "It's not just that the tactical business practices need to change, it's the mind-set," Mr. Maisog said. Lawyers said the limitations mean executives, often those sitting in foreign countries, will need to rely on less information to make decisions about their China operations. For instance, lawyers said that companies wary of holding certain kinds of data--such as the official Chinese identification documents prosecutors said were found on Mr. Humphrey's computers--are likely to limit background checks to public records. That will be a challenge in a country without household-telephone directories and where 30% of the population shares just five family names; almost 100 million people are named Wang.
http://recode.net/2014/06/26/scotus-gets-it-encryption-is-a-basic-security-feature-not-a-sign-you-have-something-to-hide/ Quote:- The Supreme Court gets it — unanimously. We need rules that protect privacy in today’s world. Searching a trunk requires a warrant; now, ***so does searching a phone or device.*** Securing a trunk requires a lock, and that’s what emerging digital-privacy companies and encrypted-email services provide. (***highlighting information)
Via a Poster Elsewhere http://www.china.org.cn/china/Off_the_Wire/2014-06/24/content_32754307.htm Brazil unveils new online regulations to tighten security Xinhua, June 24, 2014 Quote The new law means providers can sell Internet access services based on maximum speed, but cannot restrict content. To ensure users' privacy on the web, Internet providers, for example, are forbidden from spying on the content that their clients access. Companies are also forbidden from selling people's personal data.
The Statements I've be Observing ------------------------------- "Couldn't in anyway be construed as ongoing Harassment of the said Defendant, WHILST LEGAL PROCEEDINGS ARE STILL IN PROGRESS!", could it?
What What? No more fellow Company Directors to harass then?
http://www.shanghaidaily.com/article/article_xinhua.aspx?id=206783 Mar 15,2014 Quote:- BEIJING, March 15 (Xinhua) -- Industrial standards for China's Internet advertising went into effect on Saturday as concerns rise over users' information security. The standards, created by the China Internet Association, require that the collection, use, transfer and sharing of user information should stick to mutual agreements and abide by laws and regulations. Websites are required to make clear to users when they are collecting and using information and notify users in a timely manner for privacy protection. Sensitive information can only be collected after agreement by users, according to the standards.
http://www.bbc.co.uk/news/business-26225205 Will China shake the world again? -------------------------------------- Before the crash, investment was the equivalent of about 40% of GDP, around three times the rate in most developed countries and significantly greater even than what Japan invested during its development phase - which preceded its bust of the early 1990s. After the crash, thanks to the stimulus and the unleashing of all that construction, investment surged to an unprecedented 50% of GDP, where it has more or less stayed. Here is the thing: when a big economy is investing at that pace to generate wealth and jobs, it is a racing certainty that much of it will never generate an economic return, that the investment is way beyond what rational decision-making would have produced. That is why in China, there are vast residential developments and even a whole city where the lights are never on and why there are gleaming motorways barely tickled by traffic. ----------------------------------------------- Watch This World: How China Fooled the World - with Robert Peston on BBC Two at 21:00 on Tuesday, 18 February. Or catch it later on the BBC iPlayer.
(with thanks to a poster elsewhere) http://www.thestandard.com.hk/news_detail.asp?we_cat=4&art_id=141869&sid=41395279&con_type=1 Privacy Commissioner Allan Chiang Yam-wang said last year's 1,792 complaints were at a record high, increasing 48 percent on 2012. The rise was partly due to the implementation of an amended law that does not allow the use of personal data in direct marketing. "Some of the complaints were that customers were unable to notify organizations that they did not want their personal data to be used for direct marketing," Chiang said, with channels to say so either not user- friendly or not functioning. _________________________________________ He said too that executives from Facebook responsible for privacy matters had been invited to a briefing on the introduction of amended privacy protection laws in May. Also on spreading the message about confidentiality, the Office of the Privacy Commissioner for Personal Data will publish brochures this year to help social network users to avoid traps. ___________________________________ Chiang is also concerned about section 33 of the Privacy Ordinance, which prohibits transfers of personal data outside Hong Kong without specific approval. It had not been enforced since its enactment in 1995, he said, and it is "high time for the government to have a renewed focus" on it "to ensure that the international status of Hong Kong as a financial center and a data hub is preserved."
https://www.iii.co.uk/investment/detail/?display=discussion&code=cotn%3APHRM.L&it=le&action=detail&id=10974660 Subject "Astroturfing" Poster "Phorm_Team" "Who is Astroturfing and When!" (NOT ME, An Individual who has PERSONALLY seen TOO MANY of this Companies TRICKS!) Stop Intercepting Web Users Communications! http://www.theguardian.com/technology/blog/2008/mar/05/moreonphormnowonthemain Quote:- Update: you'll note comments from a shareholder and from the "Tech team" at Phorm (thanks to both for pitching in). And the present....?? ONE of the Investors! RNS Number : 3497T Phorm Corporation Limited 19 November 2013 US Investors Lippert Heilshorn and Associates +1 212 838 3777 (Investor Relations) http://www.lhai.com/ Quote:- set strategy and implement custom-designed programming utilizing industry best practices. By creating client identity and communicating strategic vision, LHA builds awareness, enthusiasm and sponsorship among target audiences to maximize shareholder value. Quite simply, LHA delivers results that matter. Seen any "new faces" here lately?
That the Phorm process has TWO (not one) Achilles heels. 1) A distributed Database of cookies, to keep usage tracks! (which it needs for FORCIBLY drop onto PC users!) 2) A Large amount of PROCESSING Power! (ASK the NSA/GCHQ about that type of processing) Either or both of which look like they will continually drain FINANCIAL Resources to the point of NON PROFITABILITY. BUT AS ALWAYS "DO YOUR OWN RESEARCH!"